0% found this document useful (0 votes)
49 views35 pages

WhatsApp Debugger and Class Errors

The document contains log output from an Android application. It reports errors loading classes and libraries. It also contains debugging information like method lock verification and crash reporting logs.

Uploaded by

Marii Beheran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views35 pages

WhatsApp Debugger and Class Errors

The document contains log output from an Android application. It reports errors loading classes and libraries. It also contains debugging information like method lock verification and crash reporting logs.

Uploaded by

Marii Beheran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd

--------- beginning of main

03-23 [Link].225 31972 31972 E [Link]: Not starting debugger since


process cannot load the jdwp agent.
03-23 [Link].335 31972 31972 W [Link]: [Link]:
[Link]
03-23 [Link].336 31972 31972 W [Link]: at
[Link](Native Method)
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].336 31972 31972 W [Link]: at
[Link](Native Method)
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].336 31972 31972 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link](Native Method)
03-23 [Link].336 31972 31972 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].383 31972 31972 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].809 11278 11278 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].894 11278 11278 W [Link]: [Link]:
[Link]
03-23 [Link].894 11278 11278 W [Link]: at
[Link](Native Method)
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].894 11278 11278 W [Link]: at
[Link](Native Method)
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].894 11278 11278 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link](Native Method)
03-23 [Link].894 11278 11278 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].941 11278 11278 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].294 11278 11278 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].294 11278 11278 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].653 11278 13572 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].082 11278 11278 W [Link]: type=1400 audit(0.0:449477): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/libc++_shared.so"
dev="dm-45" ino=67449 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].086 11278 11278 W [Link]: type=1400 audit(0.0:449478): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]" dev="dm-
45" ino=166543 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].090 11278 11278 W [Link]: type=1400 audit(0.0:449479): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].102 11278 11278 W [Link]: type=1400 audit(0.0:449480): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=147570 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].110 11278 11278 W [Link]: type=1400 audit(0.0:449481): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].110 11278 11278 W [Link]: type=1400 audit(0.0:449482): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].110 11278 11278 W [Link]: type=1400 audit(0.0:449483): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].110 11278 11278 W [Link]: type=1400 audit(0.0:449484): avc:
denied { execmod } for path="/apex/[Link]/lib64/bionic/[Link]"
dev="loop26" ino=38 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:system_lib_file:s0 tclass=file permissive=0 app=[Link]
03-23 [Link].191 11278 11278 W [Link]: Method void X.0eU.A0h(X.0tK,
boolean) failed lock verification and will run slower.
03-23 [Link].191 11278 11278 W [Link]: Common causes for lock
verification issues are non-optimized dex code
03-23 [Link].191 11278 11278 W [Link]: and incorrect proguard
optimizations.
03-23 [Link].198 11278 13706 W [Link]: Method void
X.2rL.A03([Link]) failed lock verification and will run slower.
03-23 [Link].220 11278 11278 W fb-breakpad: HandleSigmuxSignal pid: 11278 tid:
11278 signo: 11
03-23 [Link].221 11278 11278 W fb-breakpad: Requesting g_crash_mutex in tid:
11278
03-23 [Link].221 11278 11278 W fb-breakpad: Cloned at crash time, sig: 11
si_code: 2
03-23 [Link].234 13711 11278 W fb-breakpad: Start writing minidump with flags:
805
03-23 [Link].077 13711 11278 W fb-breakpad: Finish writing minidump
--------- beginning of crash
03-23 [Link].090 11278 11278 F libc : Fatal signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x7400000004 in tid 11278 ([Link]), pid 11278
([Link])
03-23 [Link].686 13738 13738 W crash_dump64: type=1400 audit(0.0:449490): avc:
denied { search } for name="/" dev="dm-2" ino=2
scontext=u:r:crash_dump:s0:c75,c257,c512,c768 tcontext=u:object_r:preload_file:s0
tclass=dir permissive=0 app=[Link]
03-23 [Link].686 13738 13738 W crash_dump64: type=1400 audit(0.0:449491): avc:
denied { search } for name="/" dev="dm-2" ino=2
scontext=u:r:crash_dump:s0:c75,c257,c512,c768 tcontext=u:object_r:preload_file:s0
tclass=dir permissive=0 app=[Link]
03-23 [Link].686 13738 13738 W crash_dump64: type=1400 audit(0.0:449492): avc:
denied { search } for name="/" dev="dm-2" ino=2
scontext=u:r:crash_dump:s0:c75,c257,c512,c768 tcontext=u:object_r:preload_file:s0
tclass=dir permissive=0 app=[Link]
03-23 [Link].686 13738 13738 W crash_dump64: type=1400 audit(0.0:449493): avc:
denied { search } for name="/" dev="dm-2" ino=2
scontext=u:r:crash_dump:s0:c75,c257,c512,c768 tcontext=u:object_r:preload_file:s0
tclass=dir permissive=0 app=[Link]
03-23 [Link].786 13738 13738 F DEBUG : *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ***
03-23 [Link].786 13738 13738 F DEBUG : Build fingerprint:
'TCL/T612B_LT/Ladybird_Pro:13/TP1A.220624.014/2BAE:user/release-keys'
03-23 [Link].786 13738 13738 F DEBUG : Revision: '0'
03-23 [Link].786 13738 13738 F DEBUG : ABI: 'arm64'
03-23 [Link].786 13738 13738 F DEBUG : Timestamp: 2024-03-23
[Link].181623001-0300
03-23 [Link].786 13738 13738 F DEBUG : Process uptime: 1398s
03-23 [Link].786 13738 13738 F DEBUG : Cmdline: [Link]
03-23 [Link].786 13738 13738 F DEBUG : pid: 11278, tid: 11278, name:
[Link] >>> [Link] <<<
03-23 [Link].786 13738 13738 F DEBUG : uid: 10331
03-23 [Link].786 13738 13738 F DEBUG : signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x0000007400000004
03-23 [Link].786 13738 13738 F DEBUG : x0 b4000072cbe75098 x1
0000007fdd580524 x2 0000000000002eeb x3 000000000111017e
03-23 [Link].786 13738 13738 F DEBUG : x4 b40000733edc6d58 x5
0000000000000000 x6 0000000000000000 x7 0000000000000200
03-23 [Link].786 13738 13738 F DEBUG : x8 b400007400000004 x9
000000007f010005 x10 00000073fe54b154 x11 000000000011017e
03-23 [Link].786 13738 13738 F DEBUG : x12 0000000000000000 x13
0000000000000000 x14 ffffffffffffffff x15 00000073fe54b154
03-23 [Link].786 13738 13738 F DEBUG : x16 000000000011017d x17
00000073f80fe340 x18 000000740773a000 x19 00000074068ec000
03-23 [Link].786 13738 13738 F DEBUG : x20 000000000111017e x21
b40000733edc6c28 x22 0000007fdd580618 x23 b40000733edc6d58
03-23 [Link].786 13738 13738 F DEBUG : x24 b4000072cbe1df60 x25
0000007fdd5806f0 x26 b4000072cbe1dff0 x27 0000007fdd580610
03-23 [Link].786 13738 13738 F DEBUG : x28 0000007fdd580600 x29
0000007fdd580530
03-23 [Link].786 13738 13738 F DEBUG : lr 00000073f80fe3d8 sp
0000007fdd580520 pc 0000007400000004 pst 0000000060000000
03-23 [Link].786 13738 13738 F DEBUG : backtrace:
03-23 [Link].786 13738 13738 F DEBUG : #00 pc 0000000001a00004
<anonymous:73fe600000>
03-23 [Link].786 13738 13738 F DEBUG : #01 pc 00000000000543d4
/system/lib64/[Link] (android::IdmapResMap::Lookup(unsigned int)
const+148) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].786 13738 13738 F DEBUG : #02 pc 00000000000423f4
/system/lib64/[Link] (android::AssetManager2::FindEntry(unsigned int,
unsigned short, bool, bool) const+580) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].786 13738 13738 F DEBUG : #03 pc 0000000000043e3c
/system/lib64/[Link] (android::AssetManager2::GetResource(unsigned int,
bool, unsigned short) const+92) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].786 13738 13738 F DEBUG : #04 pc 0000000000173db0
/system/lib64/libandroid_runtime.so (android::NativeGetResourceValue(_JNIEnv*,
_jclass*, long, int, short, _jobject*, unsigned char)+112) (BuildId:
71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].786 13738 13738 F DEBUG : #05 pc 0000000000391370
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+144)
03-23 [Link].786 13738 13738 F DEBUG : #06 pc 00000000007c8284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].786 13738 13738 F DEBUG : #07 pc 00000000007d2c58
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].786 13738 13738 F DEBUG : #08 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].786 13738 13738 F DEBUG : #09 pc 000000000000c7cc
/system/framework/[Link]
([Link]+0)
03-23 [Link].786 13738 13738 F DEBUG : #10 pc 000000000092a008
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+200)
03-23 [Link].786 13738 13738 F DEBUG : #11 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].786 13738 13738 F DEBUG : #12 pc 00000000009be94c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+4)
03-23 [Link].786 13738 13738 F DEBUG : #13 pc 0000000000ee69fc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+156)
03-23 [Link].786 13738 13738 F DEBUG : #14 pc 0000000000eee090
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1728)
03-23 [Link].786 13738 13738 F DEBUG : #15 pc 0000000000e449a4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].787 13738 13738 F DEBUG : #16 pc 0000000000c2aaf8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].787 13738 13738 F DEBUG : #17 pc 0000000000e4554c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2156)
03-23 [Link].787 13738 13738 F DEBUG : #18 pc 0000000000e43330
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+320)
03-23 [Link].787 13738 13738 F DEBUG : #19 pc 0000000000e46284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+68)
03-23 [Link].787 13738 13738 F DEBUG : #20 pc 000000000033eba4
/apex/[Link]/lib64/[Link] (art_quick_invoke_stub+612) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #21 pc 0000000000512a44
/apex/[Link]/lib64/[Link] (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&,
art::Instruction const*, unsigned short, bool, art::JValue*)+1976) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #22 pc 0000000000493244
/apex/[Link]/lib64/[Link] (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)
+1012) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #23 pc 0000000000357dd8
/apex/[Link]/lib64/[Link] (ExecuteSwitchImplAsm+8) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #24 pc 000000000143c46c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] (X.5de.A08+0)
03-23 [Link].787 13738 13738 F DEBUG : #25 pc 0000000000371b14
/apex/[Link]/lib64/[Link] (art::interpreter::Execute(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.[Link].8722505846101882172)+232)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #26 pc 000000000037140c
/apex/[Link]/lib64/[Link] (artQuickToInterpreterBridge+964) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #27 pc 0000000000355768
/apex/[Link]/lib64/[Link] (art_quick_to_interpreter_bridge+88)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #28 pc 00000000005ba818
/apex/[Link]/lib64/[Link] (nterp_helper+152) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #29 pc 00000000012ee450
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+20)
03-23 [Link].787 13738 13738 F DEBUG : #30 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #31 pc 00000000012ecd52
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+18)
03-23 [Link].787 13738 13738 F DEBUG : #32 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #33 pc 0000000000a1c5e4
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+8)
03-23 [Link].787 13738 13738 F DEBUG : #34 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #35 pc 0000000000f74c92
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+66)
03-23 [Link].787 13738 13738 F DEBUG : #36 pc 0000000000a47294
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+964)
03-23 [Link].787 13738 13738 F DEBUG : #37 pc 0000000000771ac0
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+80)
03-23 [Link].787 13738 13738 F DEBUG : #38 pc 0000000000869150
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3600)
03-23 [Link].787 13738 13738 F DEBUG : #39 pc 0000000000873254
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1556)
03-23 [Link].787 13738 13738 F DEBUG : #40 pc 0000000000a5625c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+476)
03-23 [Link].787 13738 13738 F DEBUG : #41 pc 00000000007abfe4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+580)
03-23 [Link].787 13738 13738 F DEBUG : #42 pc 00000000007abd24
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+740)
03-23 [Link].787 13738 13738 F DEBUG : #43 pc 000000000084be38
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+1320)
03-23 [Link].787 13738 13738 F DEBUG : #44 pc 0000000000ac30d8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+168)
03-23 [Link].787 13738 13738 F DEBUG : #45 pc 0000000000ac6eec
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1388)
03-23 [Link].787 13738 13738 F DEBUG : #46 pc 0000000000ac68cc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1132)
03-23 [Link].787 13738 13738 F DEBUG : #47 pc 0000000000867314
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2404)
03-23 [Link].787 13738 13738 F DEBUG : #48 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #49 pc 000000000037ff40
/apex/[Link]/lib64/[Link] (_jobject*
art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable
const&, _jobject*, _jobject*, _jobject*, unsigned long)+1556) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #50 pc 000000000037f91c
/apex/[Link]/lib64/[Link] (art::Method_invoke(_JNIEnv*, _jobject*,
_jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #51 pc 000000000038b6a8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+120)
03-23 [Link].787 13738 13738 F DEBUG : #52 pc 0000000000de3038
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+136)
03-23 [Link].787 13738 13738 F DEBUG : #53 pc 0000000000deed20
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3664)
03-23 [Link].787 13738 13738 F DEBUG : #54 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #55 pc 00000000004e3440
/apex/[Link]/lib64/[Link] (art::JValue
art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&,
_jobject*, _jmethodID*, std::__va_list)+728) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #56 pc 0000000000---------
beginning of main
03-23 [Link].829 13738 13738 E crash_dump64: read_resp: Failed read ack from
aee_aed: Connection reset by peer
03-23 [Link].844 13738 13738 E crash_dump64: crash_mini_dump_notify: writing
'start dumping' fail: Broken pipe
03-23 [Link].392 11279 11279 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].492 11279 11279 W [Link]: [Link]:
[Link]
03-23 [Link].493 11279 11279 W [Link]: at
[Link](Native Method)
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].493 11279 11279 W [Link]: at
[Link](Native Method)
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].493 11279 11279 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link](Native Method)
03-23 [Link].493 11279 11279 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].548 11279 11279 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].597 11279 13828 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].681 11279 11279 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].681 11279 11279 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].690 11279 11279 W [Link]: type=1400 audit(0.0:449494): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/libc++_shared.so"
dev="dm-45" ino=67449 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].690 11279 11279 W [Link]: type=1400 audit(0.0:449495): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]" dev="dm-
45" ino=166543 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].694 11279 11279 W [Link]: type=1400 audit(0.0:449496): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].706 11279 11279 W [Link]: type=1400 audit(0.0:449497): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=147570 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].710 11279 11279 W [Link]: type=1400 audit(0.0:449498): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].710 11279 11279 W [Link]: type=1400 audit(0.0:449499): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].760 11279 13889 W [Link]: Method void
X.2rL.A03([Link]) failed lock verification and will run slower.
03-23 [Link].760 11279 13889 W [Link]: Common causes for lock
verification issues are non-optimized dex code
03-23 [Link].760 11279 13889 W [Link]: and incorrect proguard
optimizations.
03-23 [Link].769 11279 11279 W [Link]: Method void X.0eU.A0h(X.0tK,
boolean) failed lock verification and will run slower.
03-23 [Link].790 11279 11279 W fb-breakpad: HandleSigmuxSignal pid: 11279 tid:
11279 signo: 11
03-23 [Link].790 11279 11279 W fb-breakpad: Requesting g_crash_mutex in tid:
11279
03-23 [Link].790 11279 11279 W fb-breakpad: Cloned at crash time, sig: 11
si_code: 2
03-23 [Link].798 13898 11279 W fb-breakpad: Start writing minidump with flags:
805
03-23 [Link].273 13898 11279 W fb-breakpad: Finish writing minidump
--------- beginning of crash
03-23 [Link].282 11279 11279 F libc : Fatal signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x7400000004 in tid 11279 ([Link]), pid 11279
([Link])
03-23 [Link].625 13912 13912 F DEBUG : *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ***
03-23 [Link].626 13912 13912 F DEBUG : Build fingerprint:
'TCL/T612B_LT/Ladybird_Pro:13/TP1A.220624.014/2BAE:user/release-keys'
03-23 [Link].626 13912 13912 F DEBUG : Revision: '0'
03-23 [Link].626 13912 13912 F DEBUG : ABI: 'arm64'
03-23 [Link].626 13912 13912 F DEBUG : Timestamp: 2024-03-23
[Link].342197232-0300
03-23 [Link].626 13912 13912 F DEBUG : Process uptime: 1405s
03-23 [Link].626 13912 13912 F DEBUG : Cmdline: [Link]
03-23 [Link].626 13912 13912 F DEBUG : pid: 11279, tid: 11279, name:
[Link] >>> [Link] <<<
03-23 [Link].626 13912 13912 F DEBUG : uid: 10331
03-23 [Link].626 13912 13912 F DEBUG : signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x0000007400000004
03-23 [Link].626 13912 13912 F DEBUG : x0 b400007344cff818 x1
0000007fdd580524 x2 0000000000002eeb x3 000000000111017e
03-23 [Link].626 13912 13912 F DEBUG : x4 b40000733edc6d58 x5
0000000000000000 x6 0000000000000000 x7 0000000000000200
03-23 [Link].626 13912 13912 F DEBUG : x8 b400007400000004 x9
000000007f010005 x10 00000073fe54b154 x11 000000000011017e
03-23 [Link].626 13912 13912 F DEBUG : x12 0000000000000000 x13
0000000000000000 x14 ffffffffffffffff x15 00000073fe54b154
03-23 [Link].626 13912 13912 F DEBUG : x16 000000000011017d x17
00000073f80fe340 x18 000000740773a000 x19 00000074068ec000
03-23 [Link].626 13912 13912 F DEBUG : x20 000000000111017e x21
b40000733edc6c28 x22 0000007fdd580618 x23 b40000733edc6d58
03-23 [Link].626 13912 13912 F DEBUG : x24 b400007338df1560 x25
0000007fdd5806f0 x26 b400007338df15f0 x27 0000007fdd580610
03-23 [Link].626 13912 13912 F DEBUG : x28 0000007fdd580600 x29
0000007fdd580530
03-23 [Link].626 13912 13912 F DEBUG : lr 00000073f80fe3d8 sp
0000007fdd580520 pc 0000007400000004 pst 0000000060000000
03-23 [Link].626 13912 13912 F DEBUG : backtrace:
03-23 [Link].626 13912 13912 F DEBUG : #00 pc 0000000001a00004
<anonymous:73fe600000>
03-23 [Link].626 13912 13912 F DEBUG : #01 pc 00000000000543d4
/system/lib64/[Link] (android::IdmapResMap::Lookup(unsigned int)
const+148) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].626 13912 13912 F DEBUG : #02 pc 00000000000423f4
/system/lib64/[Link] (android::AssetManager2::FindEntry(unsigned int,
unsigned short, bool, bool) const+580) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].626 13912 13912 F DEBUG : #03 pc 0000000000043e3c
/system/lib64/[Link] (android::AssetManager2::GetResource(unsigned int,
bool, unsigned short) const+92) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].626 13912 13912 F DEBUG : #04 pc 0000000000173db0
/system/lib64/libandroid_runtime.so (android::NativeGetResourceValue(_JNIEnv*,
_jclass*, long, int, short, _jobject*, unsigned char)+112) (BuildId:
71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].626 13912 13912 F DEBUG : #05 pc 0000000000391370
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+144)
03-23 [Link].626 13912 13912 F DEBUG : #06 pc 00000000007c8284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].626 13912 13912 F DEBUG : #07 pc 00000000007d2c58
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].626 13912 13912 F DEBUG : #08 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #09 pc 000000000000c7cc
/system/framework/[Link]
([Link]+0)
03-23 [Link].626 13912 13912 F DEBUG : #10 pc 000000000092a008
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+200)
03-23 [Link].626 13912 13912 F DEBUG : #11 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #12 pc 00000000009be94c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+4)
03-23 [Link].626 13912 13912 F DEBUG : #13 pc 0000000000ee69fc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+156)
03-23 [Link].626 13912 13912 F DEBUG : #14 pc 0000000000eee090
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1728)
03-23 [Link].626 13912 13912 F DEBUG : #15 pc 0000000000e449a4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].626 13912 13912 F DEBUG : #16 pc 0000000000c2aaf8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].626 13912 13912 F DEBUG : #17 pc 0000000000e4554c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2156)
03-23 [Link].626 13912 13912 F DEBUG : #18 pc 0000000000e43330
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+320)
03-23 [Link].626 13912 13912 F DEBUG : #19 pc 0000000000e46284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+68)
03-23 [Link].626 13912 13912 F DEBUG : #20 pc 000000000033eba4
/apex/[Link]/lib64/[Link] (art_quick_invoke_stub+612) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #21 pc 0000000000512a44
/apex/[Link]/lib64/[Link] (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&,
art::Instruction const*, unsigned short, bool, art::JValue*)+1976) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #22 pc 0000000000493244
/apex/[Link]/lib64/[Link] (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)
+1012) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #23 pc 0000000000357dd8
/apex/[Link]/lib64/[Link] (ExecuteSwitchImplAsm+8) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #24 pc 000000000143c46c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] (X.5de.A08+0)
03-23 [Link].626 13912 13912 F DEBUG : #25 pc 0000000000371b14
/apex/[Link]/lib64/[Link] (art::interpreter::Execute(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.[Link].8722505846101882172)+232)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #26 pc 000000000037140c
/apex/[Link]/lib64/[Link] (artQuickToInterpreterBridge+964) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #27 pc 0000000000355768
/apex/[Link]/lib64/[Link] (art_quick_to_interpreter_bridge+88)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #28 pc 00000000005ba818
/apex/[Link]/lib64/[Link] (nterp_helper+152) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #29 pc 00000000012ee450
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+20)
03-23 [Link].626 13912 13912 F DEBUG : #30 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #31 pc 00000000012ecd52
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+18)
03-23 [Link].626 13912 13912 F DEBUG : #32 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #33 pc 0000000000a1c5e4
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+8)
03-23 [Link].626 13912 13912 F DEBUG : #34 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #35 pc 0000000000f74c92
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+66)
03-23 [Link].626 13912 13912 F DEBUG : #36 pc 0000000000a47294
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+964)
03-23 [Link].626 13912 13912 F DEBUG : #37 pc 0000000000771ac0
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+80)
03-23 [Link].626 13912 13912 F DEBUG : #38 pc 0000000000869150
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3600)
03-23 [Link].626 13912 13912 F DEBUG : #39 pc 0000000000873254
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1556)
03-23 [Link].626 13912 13912 F DEBUG : #40 pc 0000000000a5625c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+476)
03-23 [Link].626 13912 13912 F DEBUG : #41 pc 00000000007abfe4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+580)
03-23 [Link].626 13912 13912 F DEBUG : #42 pc 00000000007abd24
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+740)
03-23 [Link].626 13912 13912 F DEBUG : #43 pc 000000000084be38
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+1320)
03-23 [Link].626 13912 13912 F DEBUG : #44 pc 0000000000ac30d8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+168)
03-23 [Link].626 13912 13912 F DEBUG : #45 pc 0000000000ac6eec
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1388)
03-23 [Link].626 13912 13912 F DEBUG : #46 pc 0000000000ac68cc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1132)
03-23 [Link].626 13912 13912 F DEBUG : #47 pc 0000000000867314
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2404)
03-23 [Link].626 13912 13912 F DEBUG : #48 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #49 pc 000000000037ff40
/apex/[Link]/lib64/[Link] (_jobject*
art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable
const&, _jobject*, _jobject*, _jobject*, unsigned long)+1556) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #50 pc 000000000037f91c
/apex/[Link]/lib64/[Link] (art::Method_invoke(_JNIEnv*, _jobject*,
_jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #51 pc 000000000038b6a8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+120)
03-23 [Link].626 13912 13912 F DEBUG : #52 pc 0000000000de3038
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+136)
03-23 [Link].626 13912 13912 F DEBUG : #53 pc 0000000000deed20
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3664)
03-23 [Link].626 13912 13912 F DEBUG : #54 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #55 pc 00000000004e3440
/apex/[Link]/lib64/[Link] (art::JValue
art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&,
_jobject*, _jmethodID*, std::__va_list)+728) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #56 pc 000000000057c91c
/apex/[Link]/lib64/[Link]
(art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*,
std::__va_list)+156) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #57 pc 00000000000c4cd8
/s--------- beginning of main
03-23 [Link].657 13912 13912 E crash_dump64: read_resp: Failed read ack from
aee_aed: Connection reset by peer
03-23 [Link].660 13912 13912 E crash_dump64: crash_mini_dump_notify: writing
'start dumping' fail: Broken pipe
03-23 [Link].753 11280 11280 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].849 11280 11280 W [Link]: [Link]:
[Link]
03-23 [Link].849 11280 11280 W [Link]: at
[Link](Native Method)
03-23 [Link].849 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].849 11280 11280 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].849 11280 11280 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].849 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].850 11280 11280 W [Link]: at
[Link](Native Method)
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].850 11280 11280 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link](Native Method)
03-23 [Link].850 11280 11280 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].926 11280 11280 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].990 11280 13972 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].092 11280 11280 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].092 11280 11280 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].102 11280 11280 W [Link]: type=1400 audit(0.0:449511): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/libc++_shared.so"
dev="dm-45" ino=67449 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].102 11280 11280 W [Link]: type=1400 audit(0.0:449512): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]" dev="dm-
45" ino=166543 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].106 11280 11280 W [Link]: type=1400 audit(0.0:449513): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].118 11280 11280 W [Link]: type=1400 audit(0.0:449514): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=147570 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].122 11280 11280 W [Link]: type=1400 audit(0.0:449515): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].175 11280 14023 W [Link]: Method void
X.2rL.A03([Link]) failed lock verification and will run slower.
03-23 [Link].175 11280 14023 W [Link]: Common causes for lock
verification issues are non-optimized dex code
03-23 [Link].175 11280 14023 W [Link]: and incorrect proguard
optimizations.
03-23 [Link].184 11280 11280 W [Link]: Method void X.0eU.A0h(X.0tK,
boolean) failed lock verification and will run slower.
03-23 [Link].208 11280 11280 W fb-breakpad: HandleSigmuxSignal pid: 11280 tid:
11280 signo: 11
03-23 [Link].208 11280 11280 W fb-breakpad: Requesting g_crash_mutex in tid:
11280
03-23 [Link].208 11280 11280 W fb-breakpad: Cloned at crash time, sig: 11
si_code: 2
03-23 [Link].216 14050 11280 W fb-breakpad: Start writing minidump with flags:
805
03-23 [Link].704 14050 11280 W fb-breakpad: Finish writing minidump
--------- beginning of crash
03-23 [Link].713 11280 11280 F libc : Fatal signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x7400000004 in tid 11280 ([Link]), pid 11280
([Link])
03-23 [Link].053 14058 14058 F DEBUG : *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ***
03-23 [Link].053 14058 14058 F DEBUG : Build fingerprint:
'TCL/T612B_LT/Ladybird_Pro:13/TP1A.220624.014/2BAE:user/release-keys'
03-23 [Link].053 14058 14058 F DEBUG : Revision: '0'
03-23 [Link].053 14058 14058 F DEBUG : ABI: 'arm64'
03-23 [Link].053 14058 14058 F DEBUG : Timestamp: 2024-03-23
[Link].774275694-0300
03-23 [Link].053 14058 14058 F DEBUG : Process uptime: 1409s
03-23 [Link].053 14058 14058 F DEBUG : Cmdline: [Link]
03-23 [Link].053 14058 14058 F DEBUG : pid: 11280, tid: 11280, name:
[Link] >>> [Link] <<<
03-23 [Link].053 14058 14058 F DEBUG : uid: 10331
03-23 [Link].053 14058 14058 F DEBUG : signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x0000007400000004
03-23 [Link].054 14058 14058 F DEBUG : x0 b400007344cfe818 x1
0000007fdd580524 x2 0000000000002eeb x3 000000000111017e
03-23 [Link].054 14058 14058 F DEBUG : x4 b40000733edc6d58 x5
0000000000000000 x6 0000000000000000 x7 0000000000000200
03-23 [Link].054 14058 14058 F DEBUG : x8 b400007400000004 x9
000000007f010005 x10 00000073fe54b154 x11 000000000011017e
03-23 [Link].054 14058 14058 F DEBUG : x12 0000000000000000 x13
0000000000000000 x14 ffffffffffffffff x15 00000073fe54b154
03-23 [Link].054 14058 14058 F DEBUG : x16 000000000011017d x17
00000073f80fe340 x18 000000740773a000 x19 00000074068ec000
03-23 [Link].054 14058 14058 F DEBUG : x20 000000000111017e x21
b40000733edc6c28 x22 0000007fdd580618 x23 b40000733edc6d58
03-23 [Link].054 14058 14058 F DEBUG : x24 b400007344adb560 x25
0000007fdd5806f0 x26 b400007344adb5f0 x27 0000007fdd580610
03-23 [Link].054 14058 14058 F DEBUG : x28 0000007fdd580600 x29
0000007fdd580530
03-23 [Link].054 14058 14058 F DEBUG : lr 00000073f80fe3d8 sp
0000007fdd580520 pc 0000007400000004 pst 0000000060000000
03-23 [Link].054 14058 14058 F DEBUG : backtrace:
03-23 [Link].054 14058 14058 F DEBUG : #00 pc 0000000001a00004
<anonymous:73fe600000>
03-23 [Link].054 14058 14058 F DEBUG : #01 pc 00000000000543d4
/system/lib64/[Link] (android::IdmapResMap::Lookup(unsigned int)
const+148) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].054 14058 14058 F DEBUG : #02 pc 00000000000423f4
/system/lib64/[Link] (android::AssetManager2::FindEntry(unsigned int,
unsigned short, bool, bool) const+580) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].054 14058 14058 F DEBUG : #03 pc 0000000000043e3c
/system/lib64/[Link] (android::AssetManager2::GetResource(unsigned int,
bool, unsigned short) const+92) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].054 14058 14058 F DEBUG : #04 pc 0000000000173db0
/system/lib64/libandroid_runtime.so (android::NativeGetResourceValue(_JNIEnv*,
_jclass*, long, int, short, _jobject*, unsigned char)+112) (BuildId:
71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].054 14058 14058 F DEBUG : #05 pc 0000000000391370
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+144)
03-23 [Link].054 14058 14058 F DEBUG : #06 pc 00000000007c8284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].054 14058 14058 F DEBUG : #07 pc 00000000007d2c58
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].054 14058 14058 F DEBUG : #08 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #09 pc 000000000000c7cc
/system/framework/[Link]
([Link]+0)
03-23 [Link].054 14058 14058 F DEBUG : #10 pc 000000000092a008
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+200)
03-23 [Link].054 14058 14058 F DEBUG : #11 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #12 pc 00000000009be94c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+4)
03-23 [Link].054 14058 14058 F DEBUG : #13 pc 0000000000ee69fc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+156)
03-23 [Link].054 14058 14058 F DEBUG : #14 pc 0000000000eee090
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1728)
03-23 [Link].054 14058 14058 F DEBUG : #15 pc 0000000000e449a4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].054 14058 14058 F DEBUG : #16 pc 0000000000c2aaf8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].054 14058 14058 F DEBUG : #17 pc 0000000000e4554c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2156)
03-23 [Link].054 14058 14058 F DEBUG : #18 pc 0000000000e43330
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+320)
03-23 [Link].054 14058 14058 F DEBUG : #19 pc 0000000000e46284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+68)
03-23 [Link].054 14058 14058 F DEBUG : #20 pc 000000000033eba4
/apex/[Link]/lib64/[Link] (art_quick_invoke_stub+612) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #21 pc 0000000000512a44
/apex/[Link]/lib64/[Link] (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&,
art::Instruction const*, unsigned short, bool, art::JValue*)+1976) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #22 pc 0000000000493244
/apex/[Link]/lib64/[Link] (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)
+1012) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #23 pc 0000000000357dd8
/apex/[Link]/lib64/[Link] (ExecuteSwitchImplAsm+8) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #24 pc 000000000143c46c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] (X.5de.A08+0)
03-23 [Link].054 14058 14058 F DEBUG : #25 pc 0000000000371b14
/apex/[Link]/lib64/[Link] (art::interpreter::Execute(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.[Link].8722505846101882172)+232)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #26 pc 000000000037140c
/apex/[Link]/lib64/[Link] (artQuickToInterpreterBridge+964) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #27 pc 0000000000355768
/apex/[Link]/lib64/[Link] (art_quick_to_interpreter_bridge+88)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #28 pc 00000000005ba818
/apex/[Link]/lib64/[Link] (nterp_helper+152) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #29 pc 00000000012ee450
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+20)
03-23 [Link].054 14058 14058 F DEBUG : #30 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #31 pc 00000000012ecd52
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+18)
03-23 [Link].054 14058 14058 F DEBUG : #32 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #33 pc 0000000000a1c5e4
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+8)
03-23 [Link].054 14058 14058 F DEBUG : #34 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #35 pc 0000000000f74c92
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+66)
03-23 [Link].054 14058 14058 F DEBUG : #36 pc 0000000000a47294
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+964)
03-23 [Link].054 14058 14058 F DEBUG : #37 pc 0000000000771ac0
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+80)
03-23 [Link].054 14058 14058 F DEBUG : #38 pc 0000000000869150
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3600)
03-23 [Link].054 14058 14058 F DEBUG : #39 pc 0000000000873254
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1556)
03-23 [Link].054 14058 14058 F DEBUG : #40 pc 0000000000a5625c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+476)
03-23 [Link].054 14058 14058 F DEBUG : #41 pc 00000000007abfe4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+580)
03-23 [Link].054 14058 14058 F DEBUG : #42 pc 00000000007abd24
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+740)
03-23 [Link].054 14058 14058 F DEBUG : #43 pc 000000000084be38
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+1320)
03-23 [Link].054 14058 14058 F DEBUG : #44 pc 0000000000ac30d8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+168)
03-23 [Link].054 14058 14058 F DEBUG : #45 pc 0000000000ac6eec
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1388)
03-23 [Link].054 14058 14058 F DEBUG : #46 pc 0000000000ac68cc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1132)
03-23 [Link].054 14058 14058 F DEBUG : #47 pc 0000000000867314
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2404)
03-23 [Link].054 14058 14058 F DEBUG : #48 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #49 pc 000000000037ff40
/apex/[Link]/lib64/[Link] (_jobject*
art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable
const&, _jobject*, _jobject*, _jobject*, unsigned long)+1556) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #50 pc 000000000037f91c
/apex/[Link]/lib64/[Link] (art::Method_invoke(_JNIEnv*, _jobject*,
_jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #51 pc 000000000038b6a8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+120)
03-23 [Link].054 14058 14058 F DEBUG : #52 pc 0000000000de3038
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+136)
03-23 [Link].054 14058 14058 F DEBUG : #53 pc 0000000000deed20
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3664)
03-23 [Link].054 14058 14058 F DEBUG : #54 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #55 pc 00000000004e3440
/apex/[Link]/lib64/[Link] (art::JValue
art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&,
_jobject*, _jmethodID*, std::__va_list)+728) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #56 pc 000000000057c91c
/apex/[Link]/lib64/[Link]
(art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*,
std::__va_list)+156) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #57 pc 00000000000c4cd8
/system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*,
_jmethodID*, ...)+120) (BuildId: 71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].054 14058 14058 F DEBUG : #58 pc 00000000000d0c94
/system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*,
android::Vector<android::String8> const&, bool)+9--------- beginning of main
03-23 [Link].085 14058 14058 E crash_dump64: read_resp: Failed read ack from
aee_aed: Connection reset by peer
03-23 [Link].087 14058 14058 E crash_dump64: crash_mini_dump_notify: writing
'start dumping' fail: Broken pipe
03-23 [Link].276 11286 11286 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].388 11286 11286 W [Link]: [Link]:
[Link]
03-23 [Link].389 11286 11286 W [Link]: at
[Link](Native Method)
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].389 11286 11286 W [Link]: at
[Link](Native Method)
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].389 11286 11286 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link](Native Method)
03-23 [Link].389 11286 11286 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].466 11286 11286 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].516 11286 14104 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].622 11286 11286 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].622 11286 11286 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].630 11286 11286 W [Link]: type=1400 audit(0.0:449528): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/libc++_shared.so"
dev="dm-45" ino=67449 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].634 11286 11286 W [Link]: type=1400 audit(0.0:449529): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]" dev="dm-
45" ino=166543 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].638 11286 11286 W [Link]: type=1400 audit(0.0:449530): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].650 11286 11286 W [Link]: type=1400 audit(0.0:449531): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=147570 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].658 11286 11286 W [Link]: type=1400 audit(0.0:449532): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].712 11286 14135 W [Link]: Method void
X.2rL.A03([Link]) failed lock verification and will run slower.
03-23 [Link].712 11286 14135 W [Link]: Common causes for lock
verification issues are non-optimized dex code
03-23 [Link].712 11286 14135 W [Link]: and incorrect proguard
optimizations.
03-23 [Link].722 11286 11286 W [Link]: Method void X.0eU.A0h(X.0tK,
boolean) failed lock verification and will run slower.
03-23 [Link].745 11286 11286 W fb-breakpad: HandleSigmuxSignal pid: 11286 tid:
11286 signo: 11
03-23 [Link].745 11286 11286 W fb-breakpad: Requesting g_crash_mutex in tid:
11286
03-23 [Link].745 11286 11286 W fb-breakpad: Cloned at crash time, sig: 11
si_code: 2
03-23 [Link].753 14141 11286 W fb-breakpad: Start writing minidump with flags:
805
03-23 [Link].239 14141 11286 W fb-breakpad: Finish writing minidump
--------- beginning of crash
03-23 [Link].248 11286 11286 F libc : Fatal signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x7400000004 in tid 11286 ([Link]), pid 11286
([Link])
03-23 [Link].590 14150 14150 F DEBUG : *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ***
03-23 [Link].590 14150 14150 F DEBUG : Build fingerprint:
'TCL/T612B_LT/Ladybird_Pro:13/TP1A.220624.014/2BAE:user/release-keys'
03-23 [Link].590 14150 14150 F DEBUG : Revision: '0'
03-23 [Link].590 14150 14150 F DEBUG : ABI: 'arm64'
03-23 [Link].590 14150 14150 F DEBUG : Timestamp: 2024-03-23
[Link].308706386-0300
03-23 [Link].590 14150 14150 F DEBUG : Process uptime: 1411s
03-23 [Link].590 14150 14150 F DEBUG : Cmdline: [Link]
03-23 [Link].590 14150 14150 F DEBUG : pid: 11286, tid: 11286, name:
[Link] >>> [Link] <<<
03-23 [Link].590 14150 14150 F DEBUG : uid: 10331
03-23 [Link].590 14150 14150 F DEBUG : signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x0000007400000004
03-23 [Link].590 14150 14150 F DEBUG : x0 b400007344d00818 x1
0000007fdd580524 x2 0000000000002eeb x3 000000000111017e
03-23 [Link].590 14150 14150 F DEBUG : x4 b40000733edc6fd8 x5
0000000000000000 x6 0000000000000000 x7 0000000000000200
03-23 [Link].590 14150 14150 F DEBUG : x8 b400007400000004 x9
000000007f010005 x10 00000073fe54b154 x11 000000000011017e
03-23 [Link].590 14150 14150 F DEBUG : x12 0000000000000000 x13
0000000000000000 x14 ffffffffffffffff x15 00000073fe54b154
03-23 [Link].590 14150 14150 F DEBUG : x16 000000000011017d x17
00000073f80fe340 x18 000000740773a000 x19 00000074068ec000
03-23 [Link].590 14150 14150 F DEBUG : x20 000000000111017e x21
b40000733edc6ea8 x22 0000007fdd580618 x23 b40000733edc6fd8
03-23 [Link].590 14150 14150 F DEBUG : x24 b400007338df6560 x25
0000007fdd5806f0 x26 b400007338df65f0 x27 0000007fdd580610
03-23 [Link].590 14150 14150 F DEBUG : x28 0000007fdd580600 x29
0000007fdd580530
03-23 [Link].590 14150 14150 F DEBUG : lr 00000073f80fe3d8 sp
0000007fdd580520 pc 0000007400000004 pst 0000000060000000
03-23 [Link].590 14150 14150 F DEBUG : backtrace:
03-23 [Link].590 14150 14150 F DEBUG : #00 pc 0000000001a00004
<anonymous:73fe600000>
03-23 [Link].590 14150 14150 F DEBUG : #01 pc 00000000000543d4
/system/lib64/[Link] (android::IdmapResMap::Lookup(unsigned int)
const+148) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].590 14150 14150 F DEBUG : #02 pc 00000000000423f4
/system/lib64/[Link] (android::AssetManager2::FindEntry(unsigned int,
unsigned short, bool, bool) const+580) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].591 14150 14150 F DEBUG : #03 pc 0000000000043e3c
/system/lib64/[Link] (android::AssetManager2::GetResource(unsigned int,
bool, unsigned short) const+92) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].591 14150 14150 F DEBUG : #04 pc 0000000000173db0
/system/lib64/libandroid_runtime.so (android::NativeGetResourceValue(_JNIEnv*,
_jclass*, long, int, short, _jobject*, unsigned char)+112) (BuildId:
71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].591 14150 14150 F DEBUG : #05 pc 0000000000391370
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+144)
03-23 [Link].591 14150 14150 F DEBUG : #06 pc 00000000007c8284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].591 14150 14150 F DEBUG : #07 pc 00000000007d2c58
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].591 14150 14150 F DEBUG : #08 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #09 pc 000000000000c7cc
/system/framework/[Link]
([Link]+0)
03-23 [Link].591 14150 14150 F DEBUG : #10 pc 000000000092a008
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+200)
03-23 [Link].591 14150 14150 F DEBUG : #11 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #12 pc 00000000009be94c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+4)
03-23 [Link].591 14150 14150 F DEBUG : #13 pc 0000000000ee69fc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+156)
03-23 [Link].591 14150 14150 F DEBUG : #14 pc 0000000000eee090
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1728)
03-23 [Link].591 14150 14150 F DEBUG : #15 pc 0000000000e449a4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].591 14150 14150 F DEBUG : #16 pc 0000000000c2aaf8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].591 14150 14150 F DEBUG : #17 pc 0000000000e4554c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2156)
03-23 [Link].591 14150 14150 F DEBUG : #18 pc 0000000000e43330
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+320)
03-23 [Link].591 14150 14150 F DEBUG : #19 pc 0000000000e46284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+68)
03-23 [Link].591 14150 14150 F DEBUG : #20 pc 000000000033eba4
/apex/[Link]/lib64/[Link] (art_quick_invoke_stub+612) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #21 pc 0000000000512a44
/apex/[Link]/lib64/[Link] (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&,
art::Instruction const*, unsigned short, bool, art::JValue*)+1976) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #22 pc 0000000000493244
/apex/[Link]/lib64/[Link] (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)
+1012) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #23 pc 0000000000357dd8
/apex/[Link]/lib64/[Link] (ExecuteSwitchImplAsm+8) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #24 pc 000000000143c46c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] (X.5de.A08+0)
03-23 [Link].591 14150 14150 F DEBUG : #25 pc 0000000000371b14
/apex/[Link]/lib64/[Link] (art::interpreter::Execute(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.[Link].8722505846101882172)+232)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #26 pc 000000000037140c
/apex/[Link]/lib64/[Link] (artQuickToInterpreterBridge+964) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #27 pc 0000000000355768
/apex/[Link]/lib64/[Link] (art_quick_to_interpreter_bridge+88)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #28 pc 00000000005ba818
/apex/[Link]/lib64/[Link] (nterp_helper+152) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #29 pc 00000000012ee450
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+20)
03-23 [Link].591 14150 14150 F DEBUG : #30 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #31 pc 00000000012ecd52
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+18)
03-23 [Link].591 14150 14150 F DEBUG : #32 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #33 pc 0000000000a1c5e4
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+8)
03-23 [Link].591 14150 14150 F DEBUG : #34 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #35 pc 0000000000f74c92
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+66)
03-23 [Link].591 14150 14150 F DEBUG : #36 pc 0000000000a47294
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+964)
03-23 [Link].591 14150 14150 F DEBUG : #37 pc 0000000000771ac0
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+80)
03-23 [Link].591 14150 14150 F DEBUG : #38 pc 0000000000869150
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3600)
03-23 [Link].591 14150 14150 F DEBUG : #39 pc 0000000000873254
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1556)
03-23 [Link].591 14150 14150 F DEBUG : #40 pc 0000000000a5625c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+476)
03-23 [Link].591 14150 14150 F DEBUG : #41 pc 00000000007abfe4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+580)
03-23 [Link].591 14150 14150 F DEBUG : #42 pc 00000000007abd24
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+740)
03-23 [Link].591 14150 14150 F DEBUG : #43 pc 000000000084be38
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+1320)
03-23 [Link].591 14150 14150 F DEBUG : #44 pc 0000000000ac30d8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+168)
03-23 [Link].591 14150 14150 F DEBUG : #45 pc 0000000000ac6eec
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1388)
03-23 [Link].591 14150 14150 F DEBUG : #46 pc 0000000000ac68cc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1132)
03-23 [Link].591 14150 14150 F DEBUG : #47 pc 0000000000867314
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2404)
03-23 [Link].591 14150 14150 F DEBUG : #48 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #49 pc 000000000037ff40
/apex/[Link]/lib64/[Link] (_jobject*
art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable
const&, _jobject*, _jobject*, _jobject*, unsigned long)+1556) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #50 pc 000000000037f91c
/apex/[Link]/lib64/[Link] (art::Method_invoke(_JNIEnv*, _jobject*,
_jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #51 pc 000000000038b6a8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+120)
03-23 [Link].591 14150 14150 F DEBUG : #52 pc 0000000000de3038
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+136)
03-23 [Link].591 14150 14150 F DEBUG : #53 pc 0000000000deed20
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3664)
03-23 [Link].591 14150 14150 F DEBUG : #54 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #55 pc 00000000004e3440
/apex/[Link]/lib64/[Link] (art::JValue
art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&,
_jobject*, _jmethodID*, std::__va_list)+728) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #56 pc 000000000057c91c
/apex/[Link]/lib64/[Link]
(art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*,
std::__va_list)+156) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #57 pc 00000000000c4cd8
/system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*,
_jmethodID*, ...)+120) (BuildId: 71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].591 14150 14150 F DEBUG : #58 pc 00000000000d0c94
/system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*,
android::Vector<android::String8> const&, bool)+9--------- beginning of main
03-23 [Link].621 14150 14150 E crash_dump64: read_resp: Failed read ack from
aee_aed: Connection reset by peer
03-23 [Link].625 14150 14150 E crash_dump64: crash_mini_dump_notify: writing
'start dumping' fail: Broken pipe
03-23 [Link].320 11287 11287 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].423 11287 11287 W [Link]: [Link]:
[Link]
03-23 [Link].423 11287 11287 W [Link]: at
[Link](Native Method)
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].423 11287 11287 W [Link]: at
[Link](Native Method)
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].423 11287 11287 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link](Native Method)
03-23 [Link].423 11287 11287 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].499 11287 11287 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].543 11287 14182 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].656 11287 11287 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].656 11287 11287 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].741 11287 14214 W [Link]: Method void
X.2rL.A03([Link]) failed lock verification and will run slower.
03-23 [Link].741 11287 14214 W [Link]: Common causes for lock
verification issues are non-optimized dex code
03-23 [Link].741 11287 14214 W [Link]: and incorrect proguard
optimizations.
03-23 [Link].748 11287 11287 W [Link]: Method void X.0eU.A0h(X.0tK,
boolean) failed lock verification and will run slower.
03-23 [Link].771 11287 11287 W fb-breakpad: HandleSigmuxSignal pid: 11287 tid:
11287 signo: 11
03-23 [Link].771 11287 11287 W fb-breakpad: Requesting g_crash_mutex in tid:
11287
03-23 [Link].771 11287 11287 W fb-breakpad: Cloned at crash time, sig: 11
si_code: 2
03-23 [Link].779 14221 11287 W fb-breakpad: Start writing minidump with flags:
805
03-23 [Link].263 14221 11287 W fb-breakpad: Finish writing minidump
--------- beginning of crash
03-23 [Link].272 11287 11287 F libc : Fatal signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x7400000004 in tid 11287 ([Link]), pid 11287
([Link])
03-23 [Link].627 14230 14230 F DEBUG : *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ***
03-23 [Link].627 14230 14230 F DEBUG : Build fingerprint:
'TCL/T612B_LT/Ladybird_Pro:13/TP1A.220624.014/2BAE:user/release-keys'
03-23 [Link].627 14230 14230 F DEBUG : Revision: '0'
03-23 [Link].627 14230 14230 F DEBUG : ABI: 'arm64'
03-23 [Link].627 14230 14230 F DEBUG : Timestamp: 2024-03-23
[Link].338746079-0300
03-23 [Link].627 14230 14230 F DEBUG : Process uptime: 1415s
03-23 [Link].627 14230 14230 F DEBUG : Cmdline: [Link]
03-23 [Link].627 14230 14230 F DEBUG : pid: 11287, tid: 11287, name:
[Link] >>> [Link] <<<
03-23 [Link].627 14230 14230 F DEBUG : uid: 10331
03-23 [Link].627 14230 14230 F DEBUG : signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x0000007400000004
03-23 [Link].627 14230 14230 F DEBUG : x0 b400007344cf6818 x1
0000007fdd580524 x2 0000000000002eeb x3 000000000111017e
03-23 [Link].627 14230 14230 F DEBUG : x4 b40000733edc6d58 x5
0000000000000000 x6 0000000000000000 x7 0000000000000200
03-23 [Link].627 14230 14230 F DEBUG : x8 b400007400000004 x9
000000007f010005 x10 00000073fe54b154 x11 000000000011017e
03-23 [Link].627 14230 14230 F DEBUG : x12 0000000000000000 x13
0000000000000000 x14 ffffffffffffffff x15 00000073fe54b154
03-23 [Link].627 14230 14230 F DEBUG : x16 000000000011017d x17
00000073f80fe340 x18 000000740773a000 x19 00000074068ec000
03-23 [Link].627 14230 14230 F DEBUG : x20 000000000111017e x21
b40000733edc6c28 x22 0000007fdd580618 x23 b40000733edc6d58
03-23 [Link].627 14230 14230 F DEBUG : x24 b400007344aaf560 x25
0000007fdd5806f0 x26 b400007344aaf5f0 x27 0000007fdd580610
03-23 [Link].627 14230 14230 F DEBUG : x28 0000007fdd580600 x29
0000007fdd580530
03-23 [Link].627 14230 14230 F DEBUG : lr 00000073f80fe3d8 sp
0000007fdd580520 pc 0000007400000004 pst 0000000060000000
03-23 [Link].628 14230 14230 F DEBUG : backtrace:
03-23 [Link].628 14230 14230 F DEBUG : #00 pc 0000000001a00004
<anonymous:73fe600000>
03-23 [Link].628 14230 14230 F DEBUG : #01 pc 00000000000543d4
/system/lib64/[Link] (android::IdmapResMap::Lookup(unsigned int)
const+148) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].628 14230 14230 F DEBUG : #02 pc 00000000000423f4
/system/lib64/[Link] (android::AssetManager2::FindEntry(unsigned int,
unsigned short, bool, bool) const+580) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].628 14230 14230 F DEBUG : #03 pc 0000000000043e3c
/system/lib64/[Link] (android::AssetManager2::GetResource(unsigned int,
bool, unsigned short) const+92) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].628 14230 14230 F DEBUG : #04 pc 0000000000173db0
/system/lib64/libandroid_runtime.so (android::NativeGetResourceValue(_JNIEnv*,
_jclass*, long, int, short, _jobject*, unsigned char)+112) (BuildId:
71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].628 14230 14230 F DEBUG : #05 pc 0000000000391370
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+144)
03-23 [Link].628 14230 14230 F DEBUG : #06 pc 00000000007c8284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].628 14230 14230 F DEBUG : #07 pc 00000000007d2c58
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].628 14230 14230 F DEBUG : #08 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #09 pc 000000000000c7cc
/system/framework/[Link]
([Link]+0)
03-23 [Link].628 14230 14230 F DEBUG : #10 pc 000000000092a008
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+200)
03-23 [Link].628 14230 14230 F DEBUG : #11 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #12 pc 00000000009be94c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+4)
03-23 [Link].628 14230 14230 F DEBUG : #13 pc 0000000000ee69fc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+156)
03-23 [Link].628 14230 14230 F DEBUG : #14 pc 0000000000eee090
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1728)
03-23 [Link].628 14230 14230 F DEBUG : #15 pc 0000000000e449a4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].628 14230 14230 F DEBUG : #16 pc 0000000000c2aaf8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].628 14230 14230 F DEBUG : #17 pc 0000000000e4554c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2156)
03-23 [Link].628 14230 14230 F DEBUG : #18 pc 0000000000e43330
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+320)
03-23 [Link].628 14230 14230 F DEBUG : #19 pc 0000000000e46284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+68)
03-23 [Link].628 14230 14230 F DEBUG : #20 pc 000000000033eba4
/apex/[Link]/lib64/[Link] (art_quick_invoke_stub+612) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #21 pc 0000000000512a44
/apex/[Link]/lib64/[Link] (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&,
art::Instruction const*, unsigned short, bool, art::JValue*)+1976) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #22 pc 0000000000493244
/apex/[Link]/lib64/[Link] (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)
+1012) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #23 pc 0000000000357dd8
/apex/[Link]/lib64/[Link] (ExecuteSwitchImplAsm+8) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #24 pc 000000000143c46c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] (X.5de.A08+0)
03-23 [Link].628 14230 14230 F DEBUG : #25 pc 0000000000371b14
/apex/[Link]/lib64/[Link] (art::interpreter::Execute(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.[Link].8722505846101882172)+232)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #26 pc 000000000037140c
/apex/[Link]/lib64/[Link] (artQuickToInterpreterBridge+964) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #27 pc 0000000000355768
/apex/[Link]/lib64/[Link] (art_quick_to_interpreter_bridge+88)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #28 pc 00000000005ba818
/apex/[Link]/lib64/[Link] (nterp_helper+152) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #29 pc 00000000012ee450
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+20)
03-23 [Link].628 14230 14230 F DEBUG : #30 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #31 pc 00000000012ecd52
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+18)
03-23 [Link].628 14230 14230 F DEBUG : #32 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #33 pc 0000000000a1c5e4
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+8)
03-23 [Link].628 14230 14230 F DEBUG : #34 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #35 pc 0000000000f74c92
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+66)
03-23 [Link].628 14230 14230 F DEBUG : #36 pc 0000000000a47294
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+964)
03-23 [Link].628 14230 14230 F DEBUG : #37 pc 0000000000771ac0
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+80)
03-23 [Link].628 14230 14230 F DEBUG : #38 pc 0000000000869150
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3600)
03-23 [Link].628 14230 14230 F DEBUG : #39 pc 0000000000873254
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1556)
03-23 [Link].628 14230 14230 F DEBUG : #40 pc 0000000000a5625c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+476)
03-23 [Link].628 14230 14230 F DEBUG : #41 pc 00000000007abfe4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+580)
03-23 [Link].628 14230 14230 F DEBUG : #42 pc 00000000007abd24
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+740)
03-23 [Link].628 14230 14230 F DEBUG : #43 pc 000000000084be38
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+1320)
03-23 [Link].628 14230 14230 F DEBUG : #44 pc 0000000000ac30d8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+168)
03-23 [Link].628 14230 14230 F DEBUG : #45 pc 0000000000ac6eec
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1388)
03-23 [Link].628 14230 14230 F DEBUG : #46 pc 0000000000ac68cc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1132)
03-23 [Link].628 14230 14230 F DEBUG : #47 pc 0000000000867314
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2404)
03-23 [Link].628 14230 14230 F DEBUG : #48 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_qu--------- beginning of main
03-23 [Link].659 14230 14230 E crash_dump64: read_resp: Failed read ack from
aee_aed: Connection reset by peer
03-23 [Link].662 14230 14230 E crash_dump64: crash_mini_dump_notify: writing
'start dumping' fail: Broken pipe
03-23 [Link].706 13748 13748 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].821 13748 13748 W [Link]: [Link]:
[Link]
03-23 [Link].821 13748 13748 W [Link]: at
[Link](Native Method)
03-23 [Link].821 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].821 13748 13748 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].821 13748 13748 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].821 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].821 13748 13748 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].821 13748 13748 W [Link]: at
[Link](Native Method)
03-23 [Link].821 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].821 13748 13748 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].821 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].822 13748 13748 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link](Native Method)
03-23 [Link].822 13748 13748 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].893 13748 13748 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].944 13748 14259 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].040 13748 13748 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].040 13748 13748 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].126 13748 14292 W [Link]: Method void
X.2rL.A03([Link]) failed lock verification and will run slower.
03-23 [Link].126 13748 14292 W [Link]: Common causes for lock
verification issues are non-optimized dex code
03-23 [Link].126 13748 14292 W [Link]: and incorrect proguard
optimizations.
03-23 [Link].133 13748 13748 W [Link]: Method void X.0eU.A0h(X.0tK,
boolean) failed lock verification and will run slower.
03-23 [Link].156 13748 13748 W fb-breakpad: HandleSigmuxSignal pid: 13748 tid:
13748 signo: 11
03-23 [Link].156 13748 13748 W fb-breakpad: Requesting g_crash_mutex in tid:
13748
03-23 [Link].156 13748 13748 W fb-breakpad: Cloned at crash time, sig: 11
si_code: 2
03-23 [Link].165 14298 13748 W fb-breakpad: Start writing minidump with flags:
805
03-23 [Link].695 14298 13748 W fb-breakpad: Finish writing minidump
--------- beginning of crash
03-23 [Link].704 13748 13748 F libc : Fatal signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x7400000004 in tid 13748 ([Link]), pid 13748
([Link])
03-23 [Link].067 14306 14306 F DEBUG : *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ***
03-23 [Link].067 14306 14306 F DEBUG : Build fingerprint:
'TCL/T612B_LT/Ladybird_Pro:13/TP1A.220624.014/2BAE:user/release-keys'
03-23 [Link].067 14306 14306 F DEBUG : Revision: '0'
03-23 [Link].067 14306 14306 F DEBUG : ABI: 'arm64'
03-23 [Link].067 14306 14306 F DEBUG : Timestamp: 2024-03-23
[Link].768815079-0300
03-23 [Link].067 14306 14306 F DEBUG : Process uptime: 20s
03-23 [Link].067 14306 14306 F DEBUG : Cmdline: [Link]
03-23 [Link].067 14306 14306 F DEBUG : pid: 13748, tid: 13748, name:
[Link] >>> [Link] <<<
03-23 [Link].067 14306 14306 F DEBUG : uid: 10331
03-23 [Link].067 14306 14306 F DEBUG : signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x0000007400000004
03-23 [Link].067 14306 14306 F DEBUG : x0 b400007344cf7818 x1
0000007fdd580524 x2 0000000000002eeb x3 000000000111017e
03-23 [Link].067 14306 14306 F DEBUG : x4 b40000733edc6d58 x5
0000000000000000 x6 0000000000000000 x7 0000000000000200
03-23 [Link].067 14306 14306 F DEBUG : x8 b400007400000004 x9
000000007f010005 x10 00000073fe54b154 x11 000000000011017e
03-23 [Link].067 14306 14306 F DEBUG : x12 0000000000000000 x13
0000000000000000 x14 ffffffffffffffff x15 00000073fe54b154
03-23 [Link].067 14306 14306 F DEBUG : x16 000000000011017d x17
00000073f80fe340 x18 000000740773a000 x19 00000074068ec000
03-23 [Link].067 14306 14306 F DEBUG : x20 000000000111017e x21
b40000733edc6c28 x22 0000007fdd580618 x23 b40000733edc6d58
03-23 [Link].067 14306 14306 F DEBUG : x24 b400007338dfa560 x25
0000007fdd5806f0 x26 b400007338dfa5f0 x27 0000007fdd580610
03-23 [Link].067 14306 14306 F DEBUG : x28 0000007fdd580600 x29
0000007fdd580530
03-23 [Link].067 14306 14306 F DEBUG : lr 00000073f80fe3d8 sp
0000007fdd580520 pc 0000007400000004 pst 0000000060000000
03-23 [Link].067 14306 14306 F DEBUG : backtrace:
03-23 [Link].067 14306 14306 F DEBUG : #00 pc 0000000001a00004
<anonymous:73fe600000>
03-23 [Link].067 14306 14306 F DEBUG : #01 pc 00000000000543d4
/system/lib64/[Link] (android::IdmapResMap::Lookup(unsigned int)
const+148) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].067 14306 14306 F DEBUG : #02 pc 00000000000423f4
/system/lib64/[Link] (android::AssetManager2::FindEntry(unsigned int,
unsigned short, bool, bool) const+580) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].067 14306 14306 F DEBUG : #03 pc 0000000000043e3c
/system/lib64/[Link] (android::AssetManager2::GetResource(unsigned int,
bool, unsigned short) const+92) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].067 14306 14306 F DEBUG : #04 pc 0000000000173db0
/system/lib64/libandroid_runtime.so (android::NativeGetResourceValue(_JNIEnv*,
_jclass*, long, int, short, _jobject*, unsigned char)+112) (BuildId:
71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].067 14306 14306 F DEBUG : #05 pc 0000000000391370
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+144)
03-23 [Link].067 14306 14306 F DEBUG : #06 pc 00000000007c8284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].067 14306 14306 F DEBUG : #07 pc 00000000007d2c58
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].067 14306 14306 F DEBUG : #08 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #09 pc 000000000000c7cc
/system/framework/[Link]
([Link]+0)
03-23 [Link].067 14306 14306 F DEBUG : #10 pc 000000000092a008
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+200)
03-23 [Link].067 14306 14306 F DEBUG : #11 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #12 pc 00000000009be94c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+4)
03-23 [Link].067 14306 14306 F DEBUG : #13 pc 0000000000ee69fc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+156)
03-23 [Link].067 14306 14306 F DEBUG : #14 pc 0000000000eee090
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1728)
03-23 [Link].067 14306 14306 F DEBUG : #15 pc 0000000000e449a4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].067 14306 14306 F DEBUG : #16 pc 0000000000c2aaf8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].067 14306 14306 F DEBUG : #17 pc 0000000000e4554c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2156)
03-23 [Link].067 14306 14306 F DEBUG : #18 pc 0000000000e43330
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+320)
03-23 [Link].067 14306 14306 F DEBUG : #19 pc 0000000000e46284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+68)
03-23 [Link].067 14306 14306 F DEBUG : #20 pc 000000000033eba4
/apex/[Link]/lib64/[Link] (art_quick_invoke_stub+612) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #21 pc 0000000000512a44
/apex/[Link]/lib64/[Link] (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&,
art::Instruction const*, unsigned short, bool, art::JValue*)+1976) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #22 pc 0000000000493244
/apex/[Link]/lib64/[Link] (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)
+1012) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #23 pc 0000000000357dd8
/apex/[Link]/lib64/[Link] (ExecuteSwitchImplAsm+8) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #24 pc 000000000143c46c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] (X.5de.A08+0)
03-23 [Link].067 14306 14306 F DEBUG : #25 pc 0000000000371b14
/apex/[Link]/lib64/[Link] (art::interpreter::Execute(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.[Link].8722505846101882172)+232)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #26 pc 000000000037140c
/apex/[Link]/lib64/[Link] (artQuickToInterpreterBridge+964) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].068 14306 14306 F DEBUG : #27 pc 0000000000355768
/apex/[Link]/lib64/[Link] (art_quick_to_interpreter_bridge+88)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].068 14306 14306 F DEBUG : #28 pc 00000000005ba818
/apex/[Link]/lib64/[Link] (nterp_helper+152) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].068 14306 14306 F DEBUG : #29 pc 00000000012ee450
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+20)
03-23 [Link].068 14306 14306 F DEBUG : #30 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].068 14306 14306 F DEBUG : #31 pc 00000000012ecd52
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+18)
03-23 [Link].068 14306 14306 F DEBUG : #32 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].068 14306 14306 F DEBUG : #33 pc 0000000000a1c5e4
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+8)
03-23 [Link].068 14306 14306 F DEBUG : #34 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].068 14306 14306 F DEBUG : #35 pc 0000000000f74c92
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+66)
03-23 [Link].068 14306 14306 F DEBUG : #36 pc 0000000000a47294
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+964)
03-23 [Link].068 14306 14306 F DEBUG : #37 pc 0000000000771ac0
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+80)
03-23 [Link].068 14306 14306 F DEBUG : #38 pc 0000000000869150
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3600)
03-23 [Link].068 14306 14306 F DEBUG : #39 pc 0000000000873254
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1556)
03-23 [Link].068 14306 14306 F DEBUG : #40 pc 0000000000a5625c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+476)
03-23 [Link].068 14306 14306 F DEBUG : #41 pc 00000000007abfe4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+580)
03-23 [Link].068 14306 14306 F DEBUG : #42 pc 00000000007abd24
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+740)
03-23 [Link].068 14306 14306 F DEBUG : #43 pc 000000000084be38
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+1320)
03-23 [Link].068 14306 14306 F DEBUG : #44 pc 0000000000ac30d8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+168)
03-23 [Link].068 14306 14306 F DEBUG : #45 pc 0000000000ac6eec
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1388)
03-23 [Link].068 14306 14306 F DEBUG : #46 pc 0000000000ac68cc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1132)
03-23 [Link].068 14306 14306 F DEBUG : #47 pc 0000000000867314
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2404)
03-23 [Link].068 14306 14306 F DEBUG : #48 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quic--------- beginning of main
03-23 [Link].099 14306 14306 E crash_dump64: read_resp: Failed read ack from
aee_aed: Connection reset by peer
03-23 [Link].102 14306 14306 E crash_dump64: crash_mini_dump_notify: writing
'start dumping' fail: Broken pipe
03-23 [Link].685 13749 13749 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].776 13749 13749 W [Link]: [Link]:
[Link]
03-23 [Link].777 13749 13749 W [Link]: at
[Link](Native Method)
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].777 13749 13749 W [Link]: at
[Link](Native Method)
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].777 13749 13749 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link](Native Method)
03-23 [Link].777 13749 13749 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].839 13749 13749 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].890 13749 14348 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].059 13749 13749 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].059 13749 13749 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].078 13749 13749 W [Link]: type=1400 audit(0.0:449579): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/libc++_shared.so"
dev="dm-45" ino=67449 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].082 13749 13749 W [Link]: type=1400 audit(0.0:449580): avc:
granted { execut

You might also like