Adobe-Runtime-Support
Adobe-Runtime-Support copied to clipboard
[ISSUE] PlayStore crash reports
AIRSDK: 51.1.1.5 (happens on old versions too).
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 12051 >>> br.com.redesurftank.android <<<
backtrace:
#00 pc 0x0000000000f374b1 /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#01 pc 0x00000000004df48c /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#02 pc 0x00000000002838a8 /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#03 pc 0x0000000000286fe0 /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#04 pc 0x000000000028a454 /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#05 pc 0x000000000038c3e0 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+112)
#06 pc 0x00000000020078f4 /memfd:jit-cache (com.adobe.air.customHandler.handleMessage+116)
#07 pc 0x0000000000aecfd8 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+168)
#08 pc 0x0000000000af118c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+1084)
#09 pc 0x0000000000af0c9c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+1132)
#10 pc 0x000000000083d5cc /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+1580)
#11 pc 0x0000000000362a40 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
#12 pc 0x000000000035e42c /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
#13 pc 0x00000000006c8cb8 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
#14 pc 0x00000000003929c4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
#15 pc 0x0000000000cf3f14 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+132)
#16 pc 0x0000000000d00824 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+4468)
#17 pc 0x0000000000362a40 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
#18 pc 0x000000000034df38 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
#19 pc 0x000000000034beec /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
#20 pc 0x0000000000739d7c /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
#21 pc 0x00000000000e7ca8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+104)
#22 pc 0x00000000000f4494 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1028)
#23 pc 0x000000000000258c /system/bin/app_process64 (main+1324)
#24 pc 0x000000000008c798 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 25770 >>> br.com.redesurftank.android <<<
backtrace:
#00 pc 0x0000000000437a70 /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#01 pc 0x00000000005ccddc /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#02 pc 0x00000000006a467c /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#03 pc 0x00000000006a42d0 /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#04 pc 0x00000000006a3d94 /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#05 pc 0x00000000004ddc34 /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#06 pc 0x00000000004df724 /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#07 pc 0x00000000002838a8 /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#08 pc 0x0000000000286fe0 /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#09 pc 0x000000000028a454 /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#10 pc 0x00000000003243e0 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+112)
#11 pc 0x00000000020022d4 /memfd:jit-cache (com.adobe.air.customHandler.handleMessage+116)
#12 pc 0x0000000000a2c088 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+168)
#13 pc 0x000000000077f620 /apex/com.android.art/lib64/libart.so (nterp_helper+4016)
#14 pc 0x00000000001f0c6e /system/framework/framework.jar (android.os.Looper.loopOnce+558)
#15 pc 0x0000000000a2ff14 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+1124)
#16 pc 0x0000000000758358 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+2264)
#17 pc 0x0000000000362a40 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
#18 pc 0x000000000035e42c /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
#19 pc 0x00000000006c8b78 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
#20 pc 0x000000000032a9c4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
#21 pc 0x0000000000cb72b8 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136)
#22 pc 0x0000000000cc11ec /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+3340)
#23 pc 0x0000000000362a40 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
#24 pc 0x000000000034df38 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
#25 pc 0x000000000034beec /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
#26 pc 0x0000000000739bf4 /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
#27 pc 0x00000000000bfc04 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+124)
#28 pc 0x00000000000cc34c /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+844)
#29 pc 0x000000000000255c /system/bin/app_process64 (main+1284)
#30 pc 0x000000000004aa48 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+100)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 9238 >>> br.com.redesurftank.android <<<
backtrace:
#00 pc 0x0000000000f374b1 /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#01 pc 0x00000000004df48c /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#02 pc 0x00000000002838a8 /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#03 pc 0x0000000000286fe0 /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#04 pc 0x000000000028a454 /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#05 pc 0x000000000002c084 /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/oat/arm64/base.odex (art_jni_trampoline+116)
#06 pc 0x00000000005b8fb0 /apex/com.android.art/lib64/libart.so (nterp_helper+4016)
#07 pc 0x0000000000286a38 /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/base.apk (com.adobe.air.customHandler.handleMessage+20)
#08 pc 0x0000000000b34068 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+168)
#09 pc 0x0000000000b3836c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+1084)
#10 pc 0x0000000000b37e7c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+1132)
#11 pc 0x0000000000878b4c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+1580)
#12 pc 0x000000000033aa80 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
#13 pc 0x000000000037bf18 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1556)
#14 pc 0x000000000037b8f4 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
#15 pc 0x00000000003985f8 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+120)
#16 pc 0x0000000000d43ef4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+132)
#17 pc 0x0000000000d510d4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+4532)
#18 pc 0x000000000033aa80 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
#19 pc 0x00000000004e1f4c /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+728)
#20 pc 0x000000000057a164 /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+156)
#21 pc 0x00000000000e7ca8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+104)
#22 pc 0x00000000000f4494 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1028)
#23 pc 0x000000000000258c /system/bin/app_process64 (main+1324)
#24 pc 0x000000000008c798 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 10217 >>> br.com.redesurftank.android <<<
backtrace:
#00 pc 0x00000000007ace84 /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#01 pc 0x00000000007ac484 /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#02 pc 0x00000000009d8014 /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#03 pc 0x00000000009d7ca4 /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#04 pc 0x000000000033a58c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+140)
#05 pc 0x000000000077fc80 /apex/com.android.art/lib64/libart.so (nterp_helper+5648)
#06 pc 0x0000000000272210 /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/base.apk (com.adobe.air.AndroidInputManager.onInputDeviceAdded+112)
#07 pc 0x000000000077f5c4 /apex/com.android.art/lib64/libart.so (nterp_helper+3924)
#08 pc 0x000000000027222e /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/base.apk (com.adobe.air.AndroidInputManager.onInputDeviceChanged+6)
#09 pc 0x00000000007803e4 /apex/com.android.art/lib64/libart.so (nterp_helper+7540)
#10 pc 0x00000000002383c4 /system/framework/framework.jar (android.hardware.input.InputManagerGlobal$InputDeviceListenerDelegate.handleMessage+20)
#11 pc 0x000000000095b358 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+152)
#12 pc 0x000000000095ed84 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+1044)
#13 pc 0x000000000095e8d4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+916)
#14 pc 0x00000000006fec1c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+1372)
#15 pc 0x0000000000362a40 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
#16 pc 0x000000000035e42c /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
#17 pc 0x00000000006c8b78 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
#18 pc 0x000000000032e244 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
#19 pc 0x0000000000c7dbe4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116)
#20 pc 0x0000000000c88838 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+3384)
#21 pc 0x0000000000362a40 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
#22 pc 0x000000000034df38 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
#23 pc 0x000000000034beec /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
#24 pc 0x0000000000739bf4 /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
#25 pc 0x00000000000e6be8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108)
#26 pc 0x00000000000f3e6c /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+924)
#27 pc 0x00000000000027a4 /system/bin/app_process64 (main+1868)
#28 pc 0x000000000008d99c /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 14500 >>> br.com.redesurftank.android <<<
backtrace:
#00 pc 0x00000000009d7d6c /data/app/~~BoWntC6wEstSv7CQUdWEBg==/br.com.redesurftank.android-Gn0-LMgjRfkRzaBe9JbznQ==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
#01 pc 0x000000000038e230 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+128)
#02 pc 0x000000000077fc80 /apex/com.android.art/lib64/libart.so (nterp_helper+5648)
#03 pc 0x0000000000272268 /data/app/~~BoWntC6wEstSv7CQUdWEBg==/br.com.redesurftank.android-Gn0-LMgjRfkRzaBe9JbznQ==/base.apk (com.adobe.air.AndroidInputManager.onInputDeviceRemoved+32)
#04 pc 0x000000000077f5c4 /apex/com.android.art/lib64/libart.so (nterp_helper+3924)
#05 pc 0x0000000000272228 /data/app/~~BoWntC6wEstSv7CQUdWEBg==/br.com.redesurftank.android-Gn0-LMgjRfkRzaBe9JbznQ==/base.apk (com.adobe.air.AndroidInputManager.onInputDeviceChanged)
#06 pc 0x00000000007803e4 /apex/com.android.art/lib64/libart.so (nterp_helper+7540)
#07 pc 0x00000000001c7578 /system/framework/framework.jar (android.hardware.input.InputManagerGlobal$InputDeviceListenerDelegate.handleMessage+20)
#08 pc 0x0000000000aedaf8 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+168)
#09 pc 0x0000000000af1ccc /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+1084)
#10 pc 0x0000000000af17dc /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+1132)
#11 pc 0x000000000083be4c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+1580)
#12 pc 0x0000000000362a40 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
#13 pc 0x000000000035e42c /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
#14 pc 0x00000000006c8b78 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
#15 pc 0x00000000003929c4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
#16 pc 0x0000000000cf4224 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+132)
#17 pc 0x0000000000d00a34 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+4468)
#18 pc 0x0000000000362a40 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
#19 pc 0x000000000034df38 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
#20 pc 0x000000000034beec /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
#21 pc 0x0000000000739bf4 /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
#22 pc 0x00000000000e0ca8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+104)
#23 pc 0x00000000000ed414 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1028)
#24 pc 0x000000000000258c /system/bin/app_process64 (main+1324)
#25 pc 0x000000000008c798 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104)
Those crash reports get more than 5% rate on play reports. And this it's a lot more than the threshold, so my app get penalized.