Adobe-Runtime-Support icon indicating copy to clipboard operation
Adobe-Runtime-Support copied to clipboard

[ISSUE] PlayStore crash reports

Open bobaoapae opened this issue 4 months ago • 3 comments

AIRSDK: 51.1.1.5 (happens on old versions too).

*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 12051 >>> br.com.redesurftank.android <<<

backtrace:
  #00  pc 0x0000000000f374b1  /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #01  pc 0x00000000004df48c  /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #02  pc 0x00000000002838a8  /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #03  pc 0x0000000000286fe0  /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #04  pc 0x000000000028a454  /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #05  pc 0x000000000038c3e0  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+112)
  #06  pc 0x00000000020078f4  /memfd:jit-cache (com.adobe.air.customHandler.handleMessage+116)
  #07  pc 0x0000000000aecfd8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+168)
  #08  pc 0x0000000000af118c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+1084)
  #09  pc 0x0000000000af0c9c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+1132)
  #10  pc 0x000000000083d5cc  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+1580)
  #11  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #12  pc 0x000000000035e42c  /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
  #13  pc 0x00000000006c8cb8  /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
  #14  pc 0x00000000003929c4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
  #15  pc 0x0000000000cf3f14  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+132)
  #16  pc 0x0000000000d00824  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+4468)
  #17  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #18  pc 0x000000000034df38  /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
  #19  pc 0x000000000034beec  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
  #20  pc 0x0000000000739d7c  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
  #21  pc 0x00000000000e7ca8  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+104)
  #22  pc 0x00000000000f4494  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1028)
  #23  pc 0x000000000000258c  /system/bin/app_process64 (main+1324)
  #24  pc 0x000000000008c798  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 25770 >>> br.com.redesurftank.android <<<

backtrace:
  #00  pc 0x0000000000437a70  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #01  pc 0x00000000005ccddc  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #02  pc 0x00000000006a467c  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #03  pc 0x00000000006a42d0  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #04  pc 0x00000000006a3d94  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #05  pc 0x00000000004ddc34  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #06  pc 0x00000000004df724  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #07  pc 0x00000000002838a8  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #08  pc 0x0000000000286fe0  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #09  pc 0x000000000028a454  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #10  pc 0x00000000003243e0  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+112)
  #11  pc 0x00000000020022d4  /memfd:jit-cache (com.adobe.air.customHandler.handleMessage+116)
  #12  pc 0x0000000000a2c088  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+168)
  #13  pc 0x000000000077f620  /apex/com.android.art/lib64/libart.so (nterp_helper+4016)
  #14  pc 0x00000000001f0c6e  /system/framework/framework.jar (android.os.Looper.loopOnce+558)
  #15  pc 0x0000000000a2ff14  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+1124)
  #16  pc 0x0000000000758358  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+2264)
  #17  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #18  pc 0x000000000035e42c  /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
  #19  pc 0x00000000006c8b78  /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
  #20  pc 0x000000000032a9c4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
  #21  pc 0x0000000000cb72b8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136)
  #22  pc 0x0000000000cc11ec  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+3340)
  #23  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #24  pc 0x000000000034df38  /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
  #25  pc 0x000000000034beec  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
  #26  pc 0x0000000000739bf4  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
  #27  pc 0x00000000000bfc04  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+124)
  #28  pc 0x00000000000cc34c  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+844)
  #29  pc 0x000000000000255c  /system/bin/app_process64 (main+1284)
  #30  pc 0x000000000004aa48  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+100)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 9238 >>> br.com.redesurftank.android <<<

backtrace:
  #00  pc 0x0000000000f374b1  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #01  pc 0x00000000004df48c  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #02  pc 0x00000000002838a8  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #03  pc 0x0000000000286fe0  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #04  pc 0x000000000028a454  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #05  pc 0x000000000002c084  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/oat/arm64/base.odex (art_jni_trampoline+116)
  #06  pc 0x00000000005b8fb0  /apex/com.android.art/lib64/libart.so (nterp_helper+4016)
  #07  pc 0x0000000000286a38  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/base.apk (com.adobe.air.customHandler.handleMessage+20)
  #08  pc 0x0000000000b34068  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+168)
  #09  pc 0x0000000000b3836c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+1084)
  #10  pc 0x0000000000b37e7c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+1132)
  #11  pc 0x0000000000878b4c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+1580)
  #12  pc 0x000000000033aa80  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #13  pc 0x000000000037bf18  /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1556)
  #14  pc 0x000000000037b8f4  /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
  #15  pc 0x00000000003985f8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+120)
  #16  pc 0x0000000000d43ef4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+132)
  #17  pc 0x0000000000d510d4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+4532)
  #18  pc 0x000000000033aa80  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #19  pc 0x00000000004e1f4c  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+728)
  #20  pc 0x000000000057a164  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+156)
  #21  pc 0x00000000000e7ca8  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+104)
  #22  pc 0x00000000000f4494  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1028)
  #23  pc 0x000000000000258c  /system/bin/app_process64 (main+1324)
  #24  pc 0x000000000008c798  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 10217 >>> br.com.redesurftank.android <<<

backtrace:
  #00  pc 0x00000000007ace84  /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #01  pc 0x00000000007ac484  /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #02  pc 0x00000000009d8014  /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #03  pc 0x00000000009d7ca4  /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #04  pc 0x000000000033a58c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+140)
  #05  pc 0x000000000077fc80  /apex/com.android.art/lib64/libart.so (nterp_helper+5648)
  #06  pc 0x0000000000272210  /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/base.apk (com.adobe.air.AndroidInputManager.onInputDeviceAdded+112)
  #07  pc 0x000000000077f5c4  /apex/com.android.art/lib64/libart.so (nterp_helper+3924)
  #08  pc 0x000000000027222e  /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/base.apk (com.adobe.air.AndroidInputManager.onInputDeviceChanged+6)
  #09  pc 0x00000000007803e4  /apex/com.android.art/lib64/libart.so (nterp_helper+7540)
  #10  pc 0x00000000002383c4  /system/framework/framework.jar (android.hardware.input.InputManagerGlobal$InputDeviceListenerDelegate.handleMessage+20)
  #11  pc 0x000000000095b358  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+152)
  #12  pc 0x000000000095ed84  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+1044)
  #13  pc 0x000000000095e8d4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+916)
  #14  pc 0x00000000006fec1c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+1372)
  #15  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #16  pc 0x000000000035e42c  /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
  #17  pc 0x00000000006c8b78  /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
  #18  pc 0x000000000032e244  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
  #19  pc 0x0000000000c7dbe4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116)
  #20  pc 0x0000000000c88838  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+3384)
  #21  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #22  pc 0x000000000034df38  /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
  #23  pc 0x000000000034beec  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
  #24  pc 0x0000000000739bf4  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
  #25  pc 0x00000000000e6be8  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108)
  #26  pc 0x00000000000f3e6c  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+924)
  #27  pc 0x00000000000027a4  /system/bin/app_process64 (main+1868)
  #28  pc 0x000000000008d99c  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 14500 >>> br.com.redesurftank.android <<<

backtrace:
  #00  pc 0x00000000009d7d6c  /data/app/~~BoWntC6wEstSv7CQUdWEBg==/br.com.redesurftank.android-Gn0-LMgjRfkRzaBe9JbznQ==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #01  pc 0x000000000038e230  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+128)
  #02  pc 0x000000000077fc80  /apex/com.android.art/lib64/libart.so (nterp_helper+5648)
  #03  pc 0x0000000000272268  /data/app/~~BoWntC6wEstSv7CQUdWEBg==/br.com.redesurftank.android-Gn0-LMgjRfkRzaBe9JbznQ==/base.apk (com.adobe.air.AndroidInputManager.onInputDeviceRemoved+32)
  #04  pc 0x000000000077f5c4  /apex/com.android.art/lib64/libart.so (nterp_helper+3924)
  #05  pc 0x0000000000272228  /data/app/~~BoWntC6wEstSv7CQUdWEBg==/br.com.redesurftank.android-Gn0-LMgjRfkRzaBe9JbznQ==/base.apk (com.adobe.air.AndroidInputManager.onInputDeviceChanged)
  #06  pc 0x00000000007803e4  /apex/com.android.art/lib64/libart.so (nterp_helper+7540)
  #07  pc 0x00000000001c7578  /system/framework/framework.jar (android.hardware.input.InputManagerGlobal$InputDeviceListenerDelegate.handleMessage+20)
  #08  pc 0x0000000000aedaf8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+168)
  #09  pc 0x0000000000af1ccc  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+1084)
  #10  pc 0x0000000000af17dc  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+1132)
  #11  pc 0x000000000083be4c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+1580)
  #12  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #13  pc 0x000000000035e42c  /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
  #14  pc 0x00000000006c8b78  /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
  #15  pc 0x00000000003929c4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
  #16  pc 0x0000000000cf4224  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+132)
  #17  pc 0x0000000000d00a34  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+4468)
  #18  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #19  pc 0x000000000034df38  /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
  #20  pc 0x000000000034beec  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
  #21  pc 0x0000000000739bf4  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
  #22  pc 0x00000000000e0ca8  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+104)
  #23  pc 0x00000000000ed414  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1028)
  #24  pc 0x000000000000258c  /system/bin/app_process64 (main+1324)
  #25  pc 0x000000000008c798  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104)

Those crash reports get more than 5% rate on play reports. And this it's a lot more than the threshold, so my app get penalized.

bobaoapae avatar Oct 10 '24 12:10 bobaoapae