It seems there is a NULL pointer in your native code. you can find where the exeception happens by checking the pc:804216fc and find the upper calling function by lr:afc1d698. then follow the call stack and look up the key address in the android system map , you may catch the bad guy.
2009/4/19 Paranoia <zheny...@gmail.com> > > Thanks! > > the following is the log from native code. > > I/DEBUG ( 543): *** *** *** *** *** *** *** *** *** *** *** *** *** > *** *** *** > I/DEBUG ( 543): Build fingerprint: 'generic/generic/generic/:1.5/ > CUPCAKE/eng.xxxxxx.20090418.095237:eng/test-keys' > I/DEBUG ( 543): pid: 644, tid: 644 >>> com.xxx.xxxx.xxx <<< > I/DEBUG ( 543): signal 7 (SIGBUS), fault addr 00000000 > I/DEBUG ( 543): r0 0019a890 r1 0000054c r2 ffffffff r3 00198aa0 > I/DEBUG ( 543): r4 016a0002 r5 44d1b338 r6 00000005 r7 0013f4f8 > I/DEBUG ( 543): r8 beb81550 r9 41049ba8 10 41049b94 fp 00000000 > I/DEBUG ( 543): ip 000000ce sp beb813d0 lr afc1d698 pc > 804216fc cpsr 20000030 > I/DEBUG ( 543): #00 pc 000216fc /system/lib/libxxxx.so > I/DEBUG ( 543): #01 pc 0001279c /system/lib/libxxxx.so > I/DEBUG ( 543): #02 pc 0000d41a /system/lib/libxxxx.so > I/DEBUG ( 543): #03 pc 0000c59e /system/lib/libxxxx.so > I/DEBUG ( 543): #04 pc 0000b486 /system/lib/libxxxx.so > I/DEBUG ( 543): #05 pc 0000c252 /system/lib/libxxxx.so > I/DEBUG ( 543): #06 pc 00008a7a /system/lib/libxxxx.so > I/DEBUG ( 543): #07 pc 0000e3b4 /system/lib/libdvm.so > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to android-developers@googlegroups.com To unsubscribe from this group, send email to android-developers-unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/android-developers?hl=en -~----------~----~----~----~------~----~------~--~---