--------- beginning of main
03-23 [Link].225 31972 31972 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].335 31972 31972 W [Link]: [Link]:
[Link]
03-23 [Link].336 31972 31972 W [Link]: at
[Link](Native Method)
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].336 31972 31972 W [Link]: at
[Link](Native Method)
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].336 31972 31972 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link](Native Method)
03-23 [Link].336 31972 31972 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].336 31972 31972 W [Link]: at
[Link]([Link])
03-23 [Link].383 31972 31972 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].809 11278 11278 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].894 11278 11278 W [Link]: [Link]:
[Link]
03-23 [Link].894 11278 11278 W [Link]: at
[Link](Native Method)
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].894 11278 11278 W [Link]: at
[Link](Native Method)
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].894 11278 11278 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link](Native Method)
03-23 [Link].894 11278 11278 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].894 11278 11278 W [Link]: at
[Link]([Link])
03-23 [Link].941 11278 11278 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].294 11278 11278 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].294 11278 11278 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].653 11278 13572 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].082 11278 11278 W [Link]: type=1400 audit(0.0:449477): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/libc++_shared.so"
dev="dm-45" ino=67449 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].086 11278 11278 W [Link]: type=1400 audit(0.0:449478): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]" dev="dm-
45" ino=166543 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].090 11278 11278 W [Link]: type=1400 audit(0.0:449479): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].102 11278 11278 W [Link]: type=1400 audit(0.0:449480): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=147570 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].110 11278 11278 W [Link]: type=1400 audit(0.0:449481): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].110 11278 11278 W [Link]: type=1400 audit(0.0:449482): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].110 11278 11278 W [Link]: type=1400 audit(0.0:449483): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].110 11278 11278 W [Link]: type=1400 audit(0.0:449484): avc:
denied { execmod } for path="/apex/[Link]/lib64/bionic/[Link]"
dev="loop26" ino=38 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:system_lib_file:s0 tclass=file permissive=0 app=[Link]
03-23 [Link].191 11278 11278 W [Link]: Method void X.0eU.A0h(X.0tK,
boolean) failed lock verification and will run slower.
03-23 [Link].191 11278 11278 W [Link]: Common causes for lock
verification issues are non-optimized dex code
03-23 [Link].191 11278 11278 W [Link]: and incorrect proguard
optimizations.
03-23 [Link].198 11278 13706 W [Link]: Method void
X.2rL.A03([Link]) failed lock verification and will run slower.
03-23 [Link].220 11278 11278 W fb-breakpad: HandleSigmuxSignal pid: 11278 tid:
11278 signo: 11
03-23 [Link].221 11278 11278 W fb-breakpad: Requesting g_crash_mutex in tid:
11278
03-23 [Link].221 11278 11278 W fb-breakpad: Cloned at crash time, sig: 11
si_code: 2
03-23 [Link].234 13711 11278 W fb-breakpad: Start writing minidump with flags:
805
03-23 [Link].077 13711 11278 W fb-breakpad: Finish writing minidump
--------- beginning of crash
03-23 [Link].090 11278 11278 F libc : Fatal signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x7400000004 in tid 11278 ([Link]), pid 11278
([Link])
03-23 [Link].686 13738 13738 W crash_dump64: type=1400 audit(0.0:449490): avc:
denied { search } for name="/" dev="dm-2" ino=2
scontext=u:r:crash_dump:s0:c75,c257,c512,c768 tcontext=u:object_r:preload_file:s0
tclass=dir permissive=0 app=[Link]
03-23 [Link].686 13738 13738 W crash_dump64: type=1400 audit(0.0:449491): avc:
denied { search } for name="/" dev="dm-2" ino=2
scontext=u:r:crash_dump:s0:c75,c257,c512,c768 tcontext=u:object_r:preload_file:s0
tclass=dir permissive=0 app=[Link]
03-23 [Link].686 13738 13738 W crash_dump64: type=1400 audit(0.0:449492): avc:
denied { search } for name="/" dev="dm-2" ino=2
scontext=u:r:crash_dump:s0:c75,c257,c512,c768 tcontext=u:object_r:preload_file:s0
tclass=dir permissive=0 app=[Link]
03-23 [Link].686 13738 13738 W crash_dump64: type=1400 audit(0.0:449493): avc:
denied { search } for name="/" dev="dm-2" ino=2
scontext=u:r:crash_dump:s0:c75,c257,c512,c768 tcontext=u:object_r:preload_file:s0
tclass=dir permissive=0 app=[Link]
03-23 [Link].786 13738 13738 F DEBUG : *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ***
03-23 [Link].786 13738 13738 F DEBUG : Build fingerprint:
'TCL/T612B_LT/Ladybird_Pro:13/TP1A.220624.014/2BAE:user/release-keys'
03-23 [Link].786 13738 13738 F DEBUG : Revision: '0'
03-23 [Link].786 13738 13738 F DEBUG : ABI: 'arm64'
03-23 [Link].786 13738 13738 F DEBUG : Timestamp: 2024-03-23
[Link].181623001-0300
03-23 [Link].786 13738 13738 F DEBUG : Process uptime: 1398s
03-23 [Link].786 13738 13738 F DEBUG : Cmdline: [Link]
03-23 [Link].786 13738 13738 F DEBUG : pid: 11278, tid: 11278, name:
[Link] >>> [Link] <<<
03-23 [Link].786 13738 13738 F DEBUG : uid: 10331
03-23 [Link].786 13738 13738 F DEBUG : signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x0000007400000004
03-23 [Link].786 13738 13738 F DEBUG : x0 b4000072cbe75098 x1
0000007fdd580524 x2 0000000000002eeb x3 000000000111017e
03-23 [Link].786 13738 13738 F DEBUG : x4 b40000733edc6d58 x5
0000000000000000 x6 0000000000000000 x7 0000000000000200
03-23 [Link].786 13738 13738 F DEBUG : x8 b400007400000004 x9
000000007f010005 x10 00000073fe54b154 x11 000000000011017e
03-23 [Link].786 13738 13738 F DEBUG : x12 0000000000000000 x13
0000000000000000 x14 ffffffffffffffff x15 00000073fe54b154
03-23 [Link].786 13738 13738 F DEBUG : x16 000000000011017d x17
00000073f80fe340 x18 000000740773a000 x19 00000074068ec000
03-23 [Link].786 13738 13738 F DEBUG : x20 000000000111017e x21
b40000733edc6c28 x22 0000007fdd580618 x23 b40000733edc6d58
03-23 [Link].786 13738 13738 F DEBUG : x24 b4000072cbe1df60 x25
0000007fdd5806f0 x26 b4000072cbe1dff0 x27 0000007fdd580610
03-23 [Link].786 13738 13738 F DEBUG : x28 0000007fdd580600 x29
0000007fdd580530
03-23 [Link].786 13738 13738 F DEBUG : lr 00000073f80fe3d8 sp
0000007fdd580520 pc 0000007400000004 pst 0000000060000000
03-23 [Link].786 13738 13738 F DEBUG : backtrace:
03-23 [Link].786 13738 13738 F DEBUG : #00 pc 0000000001a00004
<anonymous:73fe600000>
03-23 [Link].786 13738 13738 F DEBUG : #01 pc 00000000000543d4
/system/lib64/[Link] (android::IdmapResMap::Lookup(unsigned int)
const+148) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].786 13738 13738 F DEBUG : #02 pc 00000000000423f4
/system/lib64/[Link] (android::AssetManager2::FindEntry(unsigned int,
unsigned short, bool, bool) const+580) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].786 13738 13738 F DEBUG : #03 pc 0000000000043e3c
/system/lib64/[Link] (android::AssetManager2::GetResource(unsigned int,
bool, unsigned short) const+92) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].786 13738 13738 F DEBUG : #04 pc 0000000000173db0
/system/lib64/libandroid_runtime.so (android::NativeGetResourceValue(_JNIEnv*,
_jclass*, long, int, short, _jobject*, unsigned char)+112) (BuildId:
71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].786 13738 13738 F DEBUG : #05 pc 0000000000391370
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+144)
03-23 [Link].786 13738 13738 F DEBUG : #06 pc 00000000007c8284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].786 13738 13738 F DEBUG : #07 pc 00000000007d2c58
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].786 13738 13738 F DEBUG : #08 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].786 13738 13738 F DEBUG : #09 pc 000000000000c7cc
/system/framework/[Link]
([Link]+0)
03-23 [Link].786 13738 13738 F DEBUG : #10 pc 000000000092a008
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+200)
03-23 [Link].786 13738 13738 F DEBUG : #11 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].786 13738 13738 F DEBUG : #12 pc 00000000009be94c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+4)
03-23 [Link].786 13738 13738 F DEBUG : #13 pc 0000000000ee69fc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+156)
03-23 [Link].786 13738 13738 F DEBUG : #14 pc 0000000000eee090
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1728)
03-23 [Link].786 13738 13738 F DEBUG : #15 pc 0000000000e449a4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].787 13738 13738 F DEBUG : #16 pc 0000000000c2aaf8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].787 13738 13738 F DEBUG : #17 pc 0000000000e4554c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2156)
03-23 [Link].787 13738 13738 F DEBUG : #18 pc 0000000000e43330
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+320)
03-23 [Link].787 13738 13738 F DEBUG : #19 pc 0000000000e46284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+68)
03-23 [Link].787 13738 13738 F DEBUG : #20 pc 000000000033eba4
/apex/[Link]/lib64/[Link] (art_quick_invoke_stub+612) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #21 pc 0000000000512a44
/apex/[Link]/lib64/[Link] (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&,
art::Instruction const*, unsigned short, bool, art::JValue*)+1976) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #22 pc 0000000000493244
/apex/[Link]/lib64/[Link] (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)
+1012) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #23 pc 0000000000357dd8
/apex/[Link]/lib64/[Link] (ExecuteSwitchImplAsm+8) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #24 pc 000000000143c46c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] (X.5de.A08+0)
03-23 [Link].787 13738 13738 F DEBUG : #25 pc 0000000000371b14
/apex/[Link]/lib64/[Link] (art::interpreter::Execute(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.[Link].8722505846101882172)+232)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #26 pc 000000000037140c
/apex/[Link]/lib64/[Link] (artQuickToInterpreterBridge+964) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #27 pc 0000000000355768
/apex/[Link]/lib64/[Link] (art_quick_to_interpreter_bridge+88)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #28 pc 00000000005ba818
/apex/[Link]/lib64/[Link] (nterp_helper+152) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #29 pc 00000000012ee450
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+20)
03-23 [Link].787 13738 13738 F DEBUG : #30 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #31 pc 00000000012ecd52
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+18)
03-23 [Link].787 13738 13738 F DEBUG : #32 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #33 pc 0000000000a1c5e4
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+8)
03-23 [Link].787 13738 13738 F DEBUG : #34 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #35 pc 0000000000f74c92
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+66)
03-23 [Link].787 13738 13738 F DEBUG : #36 pc 0000000000a47294
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+964)
03-23 [Link].787 13738 13738 F DEBUG : #37 pc 0000000000771ac0
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+80)
03-23 [Link].787 13738 13738 F DEBUG : #38 pc 0000000000869150
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3600)
03-23 [Link].787 13738 13738 F DEBUG : #39 pc 0000000000873254
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1556)
03-23 [Link].787 13738 13738 F DEBUG : #40 pc 0000000000a5625c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+476)
03-23 [Link].787 13738 13738 F DEBUG : #41 pc 00000000007abfe4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+580)
03-23 [Link].787 13738 13738 F DEBUG : #42 pc 00000000007abd24
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+740)
03-23 [Link].787 13738 13738 F DEBUG : #43 pc 000000000084be38
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+1320)
03-23 [Link].787 13738 13738 F DEBUG : #44 pc 0000000000ac30d8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+168)
03-23 [Link].787 13738 13738 F DEBUG : #45 pc 0000000000ac6eec
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1388)
03-23 [Link].787 13738 13738 F DEBUG : #46 pc 0000000000ac68cc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1132)
03-23 [Link].787 13738 13738 F DEBUG : #47 pc 0000000000867314
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2404)
03-23 [Link].787 13738 13738 F DEBUG : #48 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #49 pc 000000000037ff40
/apex/[Link]/lib64/[Link] (_jobject*
art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable
const&, _jobject*, _jobject*, _jobject*, unsigned long)+1556) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #50 pc 000000000037f91c
/apex/[Link]/lib64/[Link] (art::Method_invoke(_JNIEnv*, _jobject*,
_jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #51 pc 000000000038b6a8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+120)
03-23 [Link].787 13738 13738 F DEBUG : #52 pc 0000000000de3038
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+136)
03-23 [Link].787 13738 13738 F DEBUG : #53 pc 0000000000deed20
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3664)
03-23 [Link].787 13738 13738 F DEBUG : #54 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #55 pc 00000000004e3440
/apex/[Link]/lib64/[Link] (art::JValue
art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&,
_jobject*, _jmethodID*, std::__va_list)+728) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].787 13738 13738 F DEBUG : #56 pc 0000000000---------
beginning of main
03-23 [Link].829 13738 13738 E crash_dump64: read_resp: Failed read ack from
aee_aed: Connection reset by peer
03-23 [Link].844 13738 13738 E crash_dump64: crash_mini_dump_notify: writing
'start dumping' fail: Broken pipe
03-23 [Link].392 11279 11279 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].492 11279 11279 W [Link]: [Link]:
[Link]
03-23 [Link].493 11279 11279 W [Link]: at
[Link](Native Method)
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].493 11279 11279 W [Link]: at
[Link](Native Method)
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].493 11279 11279 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link](Native Method)
03-23 [Link].493 11279 11279 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].493 11279 11279 W [Link]: at
[Link]([Link])
03-23 [Link].548 11279 11279 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].597 11279 13828 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].681 11279 11279 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].681 11279 11279 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].690 11279 11279 W [Link]: type=1400 audit(0.0:449494): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/libc++_shared.so"
dev="dm-45" ino=67449 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].690 11279 11279 W [Link]: type=1400 audit(0.0:449495): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]" dev="dm-
45" ino=166543 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].694 11279 11279 W [Link]: type=1400 audit(0.0:449496): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].706 11279 11279 W [Link]: type=1400 audit(0.0:449497): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=147570 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].710 11279 11279 W [Link]: type=1400 audit(0.0:449498): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].710 11279 11279 W [Link]: type=1400 audit(0.0:449499): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].760 11279 13889 W [Link]: Method void
X.2rL.A03([Link]) failed lock verification and will run slower.
03-23 [Link].760 11279 13889 W [Link]: Common causes for lock
verification issues are non-optimized dex code
03-23 [Link].760 11279 13889 W [Link]: and incorrect proguard
optimizations.
03-23 [Link].769 11279 11279 W [Link]: Method void X.0eU.A0h(X.0tK,
boolean) failed lock verification and will run slower.
03-23 [Link].790 11279 11279 W fb-breakpad: HandleSigmuxSignal pid: 11279 tid:
11279 signo: 11
03-23 [Link].790 11279 11279 W fb-breakpad: Requesting g_crash_mutex in tid:
11279
03-23 [Link].790 11279 11279 W fb-breakpad: Cloned at crash time, sig: 11
si_code: 2
03-23 [Link].798 13898 11279 W fb-breakpad: Start writing minidump with flags:
805
03-23 [Link].273 13898 11279 W fb-breakpad: Finish writing minidump
--------- beginning of crash
03-23 [Link].282 11279 11279 F libc : Fatal signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x7400000004 in tid 11279 ([Link]), pid 11279
([Link])
03-23 [Link].625 13912 13912 F DEBUG : *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ***
03-23 [Link].626 13912 13912 F DEBUG : Build fingerprint:
'TCL/T612B_LT/Ladybird_Pro:13/TP1A.220624.014/2BAE:user/release-keys'
03-23 [Link].626 13912 13912 F DEBUG : Revision: '0'
03-23 [Link].626 13912 13912 F DEBUG : ABI: 'arm64'
03-23 [Link].626 13912 13912 F DEBUG : Timestamp: 2024-03-23
[Link].342197232-0300
03-23 [Link].626 13912 13912 F DEBUG : Process uptime: 1405s
03-23 [Link].626 13912 13912 F DEBUG : Cmdline: [Link]
03-23 [Link].626 13912 13912 F DEBUG : pid: 11279, tid: 11279, name:
[Link] >>> [Link] <<<
03-23 [Link].626 13912 13912 F DEBUG : uid: 10331
03-23 [Link].626 13912 13912 F DEBUG : signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x0000007400000004
03-23 [Link].626 13912 13912 F DEBUG : x0 b400007344cff818 x1
0000007fdd580524 x2 0000000000002eeb x3 000000000111017e
03-23 [Link].626 13912 13912 F DEBUG : x4 b40000733edc6d58 x5
0000000000000000 x6 0000000000000000 x7 0000000000000200
03-23 [Link].626 13912 13912 F DEBUG : x8 b400007400000004 x9
000000007f010005 x10 00000073fe54b154 x11 000000000011017e
03-23 [Link].626 13912 13912 F DEBUG : x12 0000000000000000 x13
0000000000000000 x14 ffffffffffffffff x15 00000073fe54b154
03-23 [Link].626 13912 13912 F DEBUG : x16 000000000011017d x17
00000073f80fe340 x18 000000740773a000 x19 00000074068ec000
03-23 [Link].626 13912 13912 F DEBUG : x20 000000000111017e x21
b40000733edc6c28 x22 0000007fdd580618 x23 b40000733edc6d58
03-23 [Link].626 13912 13912 F DEBUG : x24 b400007338df1560 x25
0000007fdd5806f0 x26 b400007338df15f0 x27 0000007fdd580610
03-23 [Link].626 13912 13912 F DEBUG : x28 0000007fdd580600 x29
0000007fdd580530
03-23 [Link].626 13912 13912 F DEBUG : lr 00000073f80fe3d8 sp
0000007fdd580520 pc 0000007400000004 pst 0000000060000000
03-23 [Link].626 13912 13912 F DEBUG : backtrace:
03-23 [Link].626 13912 13912 F DEBUG : #00 pc 0000000001a00004
<anonymous:73fe600000>
03-23 [Link].626 13912 13912 F DEBUG : #01 pc 00000000000543d4
/system/lib64/[Link] (android::IdmapResMap::Lookup(unsigned int)
const+148) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].626 13912 13912 F DEBUG : #02 pc 00000000000423f4
/system/lib64/[Link] (android::AssetManager2::FindEntry(unsigned int,
unsigned short, bool, bool) const+580) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].626 13912 13912 F DEBUG : #03 pc 0000000000043e3c
/system/lib64/[Link] (android::AssetManager2::GetResource(unsigned int,
bool, unsigned short) const+92) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].626 13912 13912 F DEBUG : #04 pc 0000000000173db0
/system/lib64/libandroid_runtime.so (android::NativeGetResourceValue(_JNIEnv*,
_jclass*, long, int, short, _jobject*, unsigned char)+112) (BuildId:
71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].626 13912 13912 F DEBUG : #05 pc 0000000000391370
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+144)
03-23 [Link].626 13912 13912 F DEBUG : #06 pc 00000000007c8284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].626 13912 13912 F DEBUG : #07 pc 00000000007d2c58
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].626 13912 13912 F DEBUG : #08 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #09 pc 000000000000c7cc
/system/framework/[Link]
([Link]+0)
03-23 [Link].626 13912 13912 F DEBUG : #10 pc 000000000092a008
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+200)
03-23 [Link].626 13912 13912 F DEBUG : #11 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #12 pc 00000000009be94c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+4)
03-23 [Link].626 13912 13912 F DEBUG : #13 pc 0000000000ee69fc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+156)
03-23 [Link].626 13912 13912 F DEBUG : #14 pc 0000000000eee090
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1728)
03-23 [Link].626 13912 13912 F DEBUG : #15 pc 0000000000e449a4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].626 13912 13912 F DEBUG : #16 pc 0000000000c2aaf8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].626 13912 13912 F DEBUG : #17 pc 0000000000e4554c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2156)
03-23 [Link].626 13912 13912 F DEBUG : #18 pc 0000000000e43330
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+320)
03-23 [Link].626 13912 13912 F DEBUG : #19 pc 0000000000e46284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+68)
03-23 [Link].626 13912 13912 F DEBUG : #20 pc 000000000033eba4
/apex/[Link]/lib64/[Link] (art_quick_invoke_stub+612) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #21 pc 0000000000512a44
/apex/[Link]/lib64/[Link] (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&,
art::Instruction const*, unsigned short, bool, art::JValue*)+1976) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #22 pc 0000000000493244
/apex/[Link]/lib64/[Link] (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)
+1012) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #23 pc 0000000000357dd8
/apex/[Link]/lib64/[Link] (ExecuteSwitchImplAsm+8) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #24 pc 000000000143c46c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] (X.5de.A08+0)
03-23 [Link].626 13912 13912 F DEBUG : #25 pc 0000000000371b14
/apex/[Link]/lib64/[Link] (art::interpreter::Execute(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.[Link].8722505846101882172)+232)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #26 pc 000000000037140c
/apex/[Link]/lib64/[Link] (artQuickToInterpreterBridge+964) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #27 pc 0000000000355768
/apex/[Link]/lib64/[Link] (art_quick_to_interpreter_bridge+88)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #28 pc 00000000005ba818
/apex/[Link]/lib64/[Link] (nterp_helper+152) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #29 pc 00000000012ee450
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+20)
03-23 [Link].626 13912 13912 F DEBUG : #30 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #31 pc 00000000012ecd52
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+18)
03-23 [Link].626 13912 13912 F DEBUG : #32 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #33 pc 0000000000a1c5e4
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+8)
03-23 [Link].626 13912 13912 F DEBUG : #34 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #35 pc 0000000000f74c92
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+66)
03-23 [Link].626 13912 13912 F DEBUG : #36 pc 0000000000a47294
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+964)
03-23 [Link].626 13912 13912 F DEBUG : #37 pc 0000000000771ac0
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+80)
03-23 [Link].626 13912 13912 F DEBUG : #38 pc 0000000000869150
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3600)
03-23 [Link].626 13912 13912 F DEBUG : #39 pc 0000000000873254
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1556)
03-23 [Link].626 13912 13912 F DEBUG : #40 pc 0000000000a5625c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+476)
03-23 [Link].626 13912 13912 F DEBUG : #41 pc 00000000007abfe4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+580)
03-23 [Link].626 13912 13912 F DEBUG : #42 pc 00000000007abd24
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+740)
03-23 [Link].626 13912 13912 F DEBUG : #43 pc 000000000084be38
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+1320)
03-23 [Link].626 13912 13912 F DEBUG : #44 pc 0000000000ac30d8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+168)
03-23 [Link].626 13912 13912 F DEBUG : #45 pc 0000000000ac6eec
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1388)
03-23 [Link].626 13912 13912 F DEBUG : #46 pc 0000000000ac68cc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1132)
03-23 [Link].626 13912 13912 F DEBUG : #47 pc 0000000000867314
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2404)
03-23 [Link].626 13912 13912 F DEBUG : #48 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #49 pc 000000000037ff40
/apex/[Link]/lib64/[Link] (_jobject*
art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable
const&, _jobject*, _jobject*, _jobject*, unsigned long)+1556) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #50 pc 000000000037f91c
/apex/[Link]/lib64/[Link] (art::Method_invoke(_JNIEnv*, _jobject*,
_jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #51 pc 000000000038b6a8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+120)
03-23 [Link].626 13912 13912 F DEBUG : #52 pc 0000000000de3038
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+136)
03-23 [Link].626 13912 13912 F DEBUG : #53 pc 0000000000deed20
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3664)
03-23 [Link].626 13912 13912 F DEBUG : #54 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #55 pc 00000000004e3440
/apex/[Link]/lib64/[Link] (art::JValue
art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&,
_jobject*, _jmethodID*, std::__va_list)+728) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #56 pc 000000000057c91c
/apex/[Link]/lib64/[Link]
(art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*,
std::__va_list)+156) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].626 13912 13912 F DEBUG : #57 pc 00000000000c4cd8
/s--------- beginning of main
03-23 [Link].657 13912 13912 E crash_dump64: read_resp: Failed read ack from
aee_aed: Connection reset by peer
03-23 [Link].660 13912 13912 E crash_dump64: crash_mini_dump_notify: writing
'start dumping' fail: Broken pipe
03-23 [Link].753 11280 11280 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].849 11280 11280 W [Link]: [Link]:
[Link]
03-23 [Link].849 11280 11280 W [Link]: at
[Link](Native Method)
03-23 [Link].849 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].849 11280 11280 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].849 11280 11280 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].849 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].850 11280 11280 W [Link]: at
[Link](Native Method)
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].850 11280 11280 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link](Native Method)
03-23 [Link].850 11280 11280 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].850 11280 11280 W [Link]: at
[Link]([Link])
03-23 [Link].926 11280 11280 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].990 11280 13972 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].092 11280 11280 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].092 11280 11280 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].102 11280 11280 W [Link]: type=1400 audit(0.0:449511): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/libc++_shared.so"
dev="dm-45" ino=67449 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].102 11280 11280 W [Link]: type=1400 audit(0.0:449512): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]" dev="dm-
45" ino=166543 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].106 11280 11280 W [Link]: type=1400 audit(0.0:449513): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].118 11280 11280 W [Link]: type=1400 audit(0.0:449514): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=147570 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].122 11280 11280 W [Link]: type=1400 audit(0.0:449515): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].175 11280 14023 W [Link]: Method void
X.2rL.A03([Link]) failed lock verification and will run slower.
03-23 [Link].175 11280 14023 W [Link]: Common causes for lock
verification issues are non-optimized dex code
03-23 [Link].175 11280 14023 W [Link]: and incorrect proguard
optimizations.
03-23 [Link].184 11280 11280 W [Link]: Method void X.0eU.A0h(X.0tK,
boolean) failed lock verification and will run slower.
03-23 [Link].208 11280 11280 W fb-breakpad: HandleSigmuxSignal pid: 11280 tid:
11280 signo: 11
03-23 [Link].208 11280 11280 W fb-breakpad: Requesting g_crash_mutex in tid:
11280
03-23 [Link].208 11280 11280 W fb-breakpad: Cloned at crash time, sig: 11
si_code: 2
03-23 [Link].216 14050 11280 W fb-breakpad: Start writing minidump with flags:
805
03-23 [Link].704 14050 11280 W fb-breakpad: Finish writing minidump
--------- beginning of crash
03-23 [Link].713 11280 11280 F libc : Fatal signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x7400000004 in tid 11280 ([Link]), pid 11280
([Link])
03-23 [Link].053 14058 14058 F DEBUG : *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ***
03-23 [Link].053 14058 14058 F DEBUG : Build fingerprint:
'TCL/T612B_LT/Ladybird_Pro:13/TP1A.220624.014/2BAE:user/release-keys'
03-23 [Link].053 14058 14058 F DEBUG : Revision: '0'
03-23 [Link].053 14058 14058 F DEBUG : ABI: 'arm64'
03-23 [Link].053 14058 14058 F DEBUG : Timestamp: 2024-03-23
[Link].774275694-0300
03-23 [Link].053 14058 14058 F DEBUG : Process uptime: 1409s
03-23 [Link].053 14058 14058 F DEBUG : Cmdline: [Link]
03-23 [Link].053 14058 14058 F DEBUG : pid: 11280, tid: 11280, name:
[Link] >>> [Link] <<<
03-23 [Link].053 14058 14058 F DEBUG : uid: 10331
03-23 [Link].053 14058 14058 F DEBUG : signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x0000007400000004
03-23 [Link].054 14058 14058 F DEBUG : x0 b400007344cfe818 x1
0000007fdd580524 x2 0000000000002eeb x3 000000000111017e
03-23 [Link].054 14058 14058 F DEBUG : x4 b40000733edc6d58 x5
0000000000000000 x6 0000000000000000 x7 0000000000000200
03-23 [Link].054 14058 14058 F DEBUG : x8 b400007400000004 x9
000000007f010005 x10 00000073fe54b154 x11 000000000011017e
03-23 [Link].054 14058 14058 F DEBUG : x12 0000000000000000 x13
0000000000000000 x14 ffffffffffffffff x15 00000073fe54b154
03-23 [Link].054 14058 14058 F DEBUG : x16 000000000011017d x17
00000073f80fe340 x18 000000740773a000 x19 00000074068ec000
03-23 [Link].054 14058 14058 F DEBUG : x20 000000000111017e x21
b40000733edc6c28 x22 0000007fdd580618 x23 b40000733edc6d58
03-23 [Link].054 14058 14058 F DEBUG : x24 b400007344adb560 x25
0000007fdd5806f0 x26 b400007344adb5f0 x27 0000007fdd580610
03-23 [Link].054 14058 14058 F DEBUG : x28 0000007fdd580600 x29
0000007fdd580530
03-23 [Link].054 14058 14058 F DEBUG : lr 00000073f80fe3d8 sp
0000007fdd580520 pc 0000007400000004 pst 0000000060000000
03-23 [Link].054 14058 14058 F DEBUG : backtrace:
03-23 [Link].054 14058 14058 F DEBUG : #00 pc 0000000001a00004
<anonymous:73fe600000>
03-23 [Link].054 14058 14058 F DEBUG : #01 pc 00000000000543d4
/system/lib64/[Link] (android::IdmapResMap::Lookup(unsigned int)
const+148) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].054 14058 14058 F DEBUG : #02 pc 00000000000423f4
/system/lib64/[Link] (android::AssetManager2::FindEntry(unsigned int,
unsigned short, bool, bool) const+580) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].054 14058 14058 F DEBUG : #03 pc 0000000000043e3c
/system/lib64/[Link] (android::AssetManager2::GetResource(unsigned int,
bool, unsigned short) const+92) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].054 14058 14058 F DEBUG : #04 pc 0000000000173db0
/system/lib64/libandroid_runtime.so (android::NativeGetResourceValue(_JNIEnv*,
_jclass*, long, int, short, _jobject*, unsigned char)+112) (BuildId:
71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].054 14058 14058 F DEBUG : #05 pc 0000000000391370
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+144)
03-23 [Link].054 14058 14058 F DEBUG : #06 pc 00000000007c8284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].054 14058 14058 F DEBUG : #07 pc 00000000007d2c58
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].054 14058 14058 F DEBUG : #08 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #09 pc 000000000000c7cc
/system/framework/[Link]
([Link]+0)
03-23 [Link].054 14058 14058 F DEBUG : #10 pc 000000000092a008
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+200)
03-23 [Link].054 14058 14058 F DEBUG : #11 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #12 pc 00000000009be94c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+4)
03-23 [Link].054 14058 14058 F DEBUG : #13 pc 0000000000ee69fc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+156)
03-23 [Link].054 14058 14058 F DEBUG : #14 pc 0000000000eee090
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1728)
03-23 [Link].054 14058 14058 F DEBUG : #15 pc 0000000000e449a4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].054 14058 14058 F DEBUG : #16 pc 0000000000c2aaf8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].054 14058 14058 F DEBUG : #17 pc 0000000000e4554c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2156)
03-23 [Link].054 14058 14058 F DEBUG : #18 pc 0000000000e43330
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+320)
03-23 [Link].054 14058 14058 F DEBUG : #19 pc 0000000000e46284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+68)
03-23 [Link].054 14058 14058 F DEBUG : #20 pc 000000000033eba4
/apex/[Link]/lib64/[Link] (art_quick_invoke_stub+612) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #21 pc 0000000000512a44
/apex/[Link]/lib64/[Link] (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&,
art::Instruction const*, unsigned short, bool, art::JValue*)+1976) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #22 pc 0000000000493244
/apex/[Link]/lib64/[Link] (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)
+1012) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #23 pc 0000000000357dd8
/apex/[Link]/lib64/[Link] (ExecuteSwitchImplAsm+8) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #24 pc 000000000143c46c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] (X.5de.A08+0)
03-23 [Link].054 14058 14058 F DEBUG : #25 pc 0000000000371b14
/apex/[Link]/lib64/[Link] (art::interpreter::Execute(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.[Link].8722505846101882172)+232)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #26 pc 000000000037140c
/apex/[Link]/lib64/[Link] (artQuickToInterpreterBridge+964) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #27 pc 0000000000355768
/apex/[Link]/lib64/[Link] (art_quick_to_interpreter_bridge+88)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #28 pc 00000000005ba818
/apex/[Link]/lib64/[Link] (nterp_helper+152) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #29 pc 00000000012ee450
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+20)
03-23 [Link].054 14058 14058 F DEBUG : #30 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #31 pc 00000000012ecd52
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+18)
03-23 [Link].054 14058 14058 F DEBUG : #32 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #33 pc 0000000000a1c5e4
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+8)
03-23 [Link].054 14058 14058 F DEBUG : #34 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #35 pc 0000000000f74c92
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+66)
03-23 [Link].054 14058 14058 F DEBUG : #36 pc 0000000000a47294
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+964)
03-23 [Link].054 14058 14058 F DEBUG : #37 pc 0000000000771ac0
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+80)
03-23 [Link].054 14058 14058 F DEBUG : #38 pc 0000000000869150
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3600)
03-23 [Link].054 14058 14058 F DEBUG : #39 pc 0000000000873254
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1556)
03-23 [Link].054 14058 14058 F DEBUG : #40 pc 0000000000a5625c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+476)
03-23 [Link].054 14058 14058 F DEBUG : #41 pc 00000000007abfe4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+580)
03-23 [Link].054 14058 14058 F DEBUG : #42 pc 00000000007abd24
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+740)
03-23 [Link].054 14058 14058 F DEBUG : #43 pc 000000000084be38
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+1320)
03-23 [Link].054 14058 14058 F DEBUG : #44 pc 0000000000ac30d8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+168)
03-23 [Link].054 14058 14058 F DEBUG : #45 pc 0000000000ac6eec
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1388)
03-23 [Link].054 14058 14058 F DEBUG : #46 pc 0000000000ac68cc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1132)
03-23 [Link].054 14058 14058 F DEBUG : #47 pc 0000000000867314
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2404)
03-23 [Link].054 14058 14058 F DEBUG : #48 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #49 pc 000000000037ff40
/apex/[Link]/lib64/[Link] (_jobject*
art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable
const&, _jobject*, _jobject*, _jobject*, unsigned long)+1556) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #50 pc 000000000037f91c
/apex/[Link]/lib64/[Link] (art::Method_invoke(_JNIEnv*, _jobject*,
_jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #51 pc 000000000038b6a8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+120)
03-23 [Link].054 14058 14058 F DEBUG : #52 pc 0000000000de3038
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+136)
03-23 [Link].054 14058 14058 F DEBUG : #53 pc 0000000000deed20
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3664)
03-23 [Link].054 14058 14058 F DEBUG : #54 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #55 pc 00000000004e3440
/apex/[Link]/lib64/[Link] (art::JValue
art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&,
_jobject*, _jmethodID*, std::__va_list)+728) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #56 pc 000000000057c91c
/apex/[Link]/lib64/[Link]
(art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*,
std::__va_list)+156) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].054 14058 14058 F DEBUG : #57 pc 00000000000c4cd8
/system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*,
_jmethodID*, ...)+120) (BuildId: 71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].054 14058 14058 F DEBUG : #58 pc 00000000000d0c94
/system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*,
android::Vector<android::String8> const&, bool)+9--------- beginning of main
03-23 [Link].085 14058 14058 E crash_dump64: read_resp: Failed read ack from
aee_aed: Connection reset by peer
03-23 [Link].087 14058 14058 E crash_dump64: crash_mini_dump_notify: writing
'start dumping' fail: Broken pipe
03-23 [Link].276 11286 11286 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].388 11286 11286 W [Link]: [Link]:
[Link]
03-23 [Link].389 11286 11286 W [Link]: at
[Link](Native Method)
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].389 11286 11286 W [Link]: at
[Link](Native Method)
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].389 11286 11286 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link](Native Method)
03-23 [Link].389 11286 11286 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].389 11286 11286 W [Link]: at
[Link]([Link])
03-23 [Link].466 11286 11286 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].516 11286 14104 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].622 11286 11286 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].622 11286 11286 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].630 11286 11286 W [Link]: type=1400 audit(0.0:449528): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/libc++_shared.so"
dev="dm-45" ino=67449 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].634 11286 11286 W [Link]: type=1400 audit(0.0:449529): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]" dev="dm-
45" ino=166543 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].638 11286 11286 W [Link]: type=1400 audit(0.0:449530): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].650 11286 11286 W [Link]: type=1400 audit(0.0:449531): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=147570 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].658 11286 11286 W [Link]: type=1400 audit(0.0:449532): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/[Link]"
dev="dm-45" ino=160651 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].712 11286 14135 W [Link]: Method void
X.2rL.A03([Link]) failed lock verification and will run slower.
03-23 [Link].712 11286 14135 W [Link]: Common causes for lock
verification issues are non-optimized dex code
03-23 [Link].712 11286 14135 W [Link]: and incorrect proguard
optimizations.
03-23 [Link].722 11286 11286 W [Link]: Method void X.0eU.A0h(X.0tK,
boolean) failed lock verification and will run slower.
03-23 [Link].745 11286 11286 W fb-breakpad: HandleSigmuxSignal pid: 11286 tid:
11286 signo: 11
03-23 [Link].745 11286 11286 W fb-breakpad: Requesting g_crash_mutex in tid:
11286
03-23 [Link].745 11286 11286 W fb-breakpad: Cloned at crash time, sig: 11
si_code: 2
03-23 [Link].753 14141 11286 W fb-breakpad: Start writing minidump with flags:
805
03-23 [Link].239 14141 11286 W fb-breakpad: Finish writing minidump
--------- beginning of crash
03-23 [Link].248 11286 11286 F libc : Fatal signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x7400000004 in tid 11286 ([Link]), pid 11286
([Link])
03-23 [Link].590 14150 14150 F DEBUG : *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ***
03-23 [Link].590 14150 14150 F DEBUG : Build fingerprint:
'TCL/T612B_LT/Ladybird_Pro:13/TP1A.220624.014/2BAE:user/release-keys'
03-23 [Link].590 14150 14150 F DEBUG : Revision: '0'
03-23 [Link].590 14150 14150 F DEBUG : ABI: 'arm64'
03-23 [Link].590 14150 14150 F DEBUG : Timestamp: 2024-03-23
[Link].308706386-0300
03-23 [Link].590 14150 14150 F DEBUG : Process uptime: 1411s
03-23 [Link].590 14150 14150 F DEBUG : Cmdline: [Link]
03-23 [Link].590 14150 14150 F DEBUG : pid: 11286, tid: 11286, name:
[Link] >>> [Link] <<<
03-23 [Link].590 14150 14150 F DEBUG : uid: 10331
03-23 [Link].590 14150 14150 F DEBUG : signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x0000007400000004
03-23 [Link].590 14150 14150 F DEBUG : x0 b400007344d00818 x1
0000007fdd580524 x2 0000000000002eeb x3 000000000111017e
03-23 [Link].590 14150 14150 F DEBUG : x4 b40000733edc6fd8 x5
0000000000000000 x6 0000000000000000 x7 0000000000000200
03-23 [Link].590 14150 14150 F DEBUG : x8 b400007400000004 x9
000000007f010005 x10 00000073fe54b154 x11 000000000011017e
03-23 [Link].590 14150 14150 F DEBUG : x12 0000000000000000 x13
0000000000000000 x14 ffffffffffffffff x15 00000073fe54b154
03-23 [Link].590 14150 14150 F DEBUG : x16 000000000011017d x17
00000073f80fe340 x18 000000740773a000 x19 00000074068ec000
03-23 [Link].590 14150 14150 F DEBUG : x20 000000000111017e x21
b40000733edc6ea8 x22 0000007fdd580618 x23 b40000733edc6fd8
03-23 [Link].590 14150 14150 F DEBUG : x24 b400007338df6560 x25
0000007fdd5806f0 x26 b400007338df65f0 x27 0000007fdd580610
03-23 [Link].590 14150 14150 F DEBUG : x28 0000007fdd580600 x29
0000007fdd580530
03-23 [Link].590 14150 14150 F DEBUG : lr 00000073f80fe3d8 sp
0000007fdd580520 pc 0000007400000004 pst 0000000060000000
03-23 [Link].590 14150 14150 F DEBUG : backtrace:
03-23 [Link].590 14150 14150 F DEBUG : #00 pc 0000000001a00004
<anonymous:73fe600000>
03-23 [Link].590 14150 14150 F DEBUG : #01 pc 00000000000543d4
/system/lib64/[Link] (android::IdmapResMap::Lookup(unsigned int)
const+148) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].590 14150 14150 F DEBUG : #02 pc 00000000000423f4
/system/lib64/[Link] (android::AssetManager2::FindEntry(unsigned int,
unsigned short, bool, bool) const+580) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].591 14150 14150 F DEBUG : #03 pc 0000000000043e3c
/system/lib64/[Link] (android::AssetManager2::GetResource(unsigned int,
bool, unsigned short) const+92) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].591 14150 14150 F DEBUG : #04 pc 0000000000173db0
/system/lib64/libandroid_runtime.so (android::NativeGetResourceValue(_JNIEnv*,
_jclass*, long, int, short, _jobject*, unsigned char)+112) (BuildId:
71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].591 14150 14150 F DEBUG : #05 pc 0000000000391370
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+144)
03-23 [Link].591 14150 14150 F DEBUG : #06 pc 00000000007c8284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].591 14150 14150 F DEBUG : #07 pc 00000000007d2c58
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].591 14150 14150 F DEBUG : #08 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #09 pc 000000000000c7cc
/system/framework/[Link]
([Link]+0)
03-23 [Link].591 14150 14150 F DEBUG : #10 pc 000000000092a008
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+200)
03-23 [Link].591 14150 14150 F DEBUG : #11 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #12 pc 00000000009be94c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+4)
03-23 [Link].591 14150 14150 F DEBUG : #13 pc 0000000000ee69fc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+156)
03-23 [Link].591 14150 14150 F DEBUG : #14 pc 0000000000eee090
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1728)
03-23 [Link].591 14150 14150 F DEBUG : #15 pc 0000000000e449a4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].591 14150 14150 F DEBUG : #16 pc 0000000000c2aaf8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].591 14150 14150 F DEBUG : #17 pc 0000000000e4554c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2156)
03-23 [Link].591 14150 14150 F DEBUG : #18 pc 0000000000e43330
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+320)
03-23 [Link].591 14150 14150 F DEBUG : #19 pc 0000000000e46284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+68)
03-23 [Link].591 14150 14150 F DEBUG : #20 pc 000000000033eba4
/apex/[Link]/lib64/[Link] (art_quick_invoke_stub+612) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #21 pc 0000000000512a44
/apex/[Link]/lib64/[Link] (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&,
art::Instruction const*, unsigned short, bool, art::JValue*)+1976) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #22 pc 0000000000493244
/apex/[Link]/lib64/[Link] (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)
+1012) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #23 pc 0000000000357dd8
/apex/[Link]/lib64/[Link] (ExecuteSwitchImplAsm+8) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #24 pc 000000000143c46c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] (X.5de.A08+0)
03-23 [Link].591 14150 14150 F DEBUG : #25 pc 0000000000371b14
/apex/[Link]/lib64/[Link] (art::interpreter::Execute(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.[Link].8722505846101882172)+232)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #26 pc 000000000037140c
/apex/[Link]/lib64/[Link] (artQuickToInterpreterBridge+964) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #27 pc 0000000000355768
/apex/[Link]/lib64/[Link] (art_quick_to_interpreter_bridge+88)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #28 pc 00000000005ba818
/apex/[Link]/lib64/[Link] (nterp_helper+152) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #29 pc 00000000012ee450
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+20)
03-23 [Link].591 14150 14150 F DEBUG : #30 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #31 pc 00000000012ecd52
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+18)
03-23 [Link].591 14150 14150 F DEBUG : #32 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #33 pc 0000000000a1c5e4
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+8)
03-23 [Link].591 14150 14150 F DEBUG : #34 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #35 pc 0000000000f74c92
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+66)
03-23 [Link].591 14150 14150 F DEBUG : #36 pc 0000000000a47294
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+964)
03-23 [Link].591 14150 14150 F DEBUG : #37 pc 0000000000771ac0
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+80)
03-23 [Link].591 14150 14150 F DEBUG : #38 pc 0000000000869150
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3600)
03-23 [Link].591 14150 14150 F DEBUG : #39 pc 0000000000873254
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1556)
03-23 [Link].591 14150 14150 F DEBUG : #40 pc 0000000000a5625c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+476)
03-23 [Link].591 14150 14150 F DEBUG : #41 pc 00000000007abfe4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+580)
03-23 [Link].591 14150 14150 F DEBUG : #42 pc 00000000007abd24
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+740)
03-23 [Link].591 14150 14150 F DEBUG : #43 pc 000000000084be38
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+1320)
03-23 [Link].591 14150 14150 F DEBUG : #44 pc 0000000000ac30d8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+168)
03-23 [Link].591 14150 14150 F DEBUG : #45 pc 0000000000ac6eec
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1388)
03-23 [Link].591 14150 14150 F DEBUG : #46 pc 0000000000ac68cc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1132)
03-23 [Link].591 14150 14150 F DEBUG : #47 pc 0000000000867314
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2404)
03-23 [Link].591 14150 14150 F DEBUG : #48 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #49 pc 000000000037ff40
/apex/[Link]/lib64/[Link] (_jobject*
art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable
const&, _jobject*, _jobject*, _jobject*, unsigned long)+1556) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #50 pc 000000000037f91c
/apex/[Link]/lib64/[Link] (art::Method_invoke(_JNIEnv*, _jobject*,
_jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #51 pc 000000000038b6a8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+120)
03-23 [Link].591 14150 14150 F DEBUG : #52 pc 0000000000de3038
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+136)
03-23 [Link].591 14150 14150 F DEBUG : #53 pc 0000000000deed20
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3664)
03-23 [Link].591 14150 14150 F DEBUG : #54 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quick_invoke_static_stub+640) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #55 pc 00000000004e3440
/apex/[Link]/lib64/[Link] (art::JValue
art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&,
_jobject*, _jmethodID*, std::__va_list)+728) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #56 pc 000000000057c91c
/apex/[Link]/lib64/[Link]
(art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*,
std::__va_list)+156) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].591 14150 14150 F DEBUG : #57 pc 00000000000c4cd8
/system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*,
_jmethodID*, ...)+120) (BuildId: 71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].591 14150 14150 F DEBUG : #58 pc 00000000000d0c94
/system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*,
android::Vector<android::String8> const&, bool)+9--------- beginning of main
03-23 [Link].621 14150 14150 E crash_dump64: read_resp: Failed read ack from
aee_aed: Connection reset by peer
03-23 [Link].625 14150 14150 E crash_dump64: crash_mini_dump_notify: writing
'start dumping' fail: Broken pipe
03-23 [Link].320 11287 11287 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].423 11287 11287 W [Link]: [Link]:
[Link]
03-23 [Link].423 11287 11287 W [Link]: at
[Link](Native Method)
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].423 11287 11287 W [Link]: at
[Link](Native Method)
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].423 11287 11287 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link](Native Method)
03-23 [Link].423 11287 11287 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].423 11287 11287 W [Link]: at
[Link]([Link])
03-23 [Link].499 11287 11287 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].543 11287 14182 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].656 11287 11287 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].656 11287 11287 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].741 11287 14214 W [Link]: Method void
X.2rL.A03([Link]) failed lock verification and will run slower.
03-23 [Link].741 11287 14214 W [Link]: Common causes for lock
verification issues are non-optimized dex code
03-23 [Link].741 11287 14214 W [Link]: and incorrect proguard
optimizations.
03-23 [Link].748 11287 11287 W [Link]: Method void X.0eU.A0h(X.0tK,
boolean) failed lock verification and will run slower.
03-23 [Link].771 11287 11287 W fb-breakpad: HandleSigmuxSignal pid: 11287 tid:
11287 signo: 11
03-23 [Link].771 11287 11287 W fb-breakpad: Requesting g_crash_mutex in tid:
11287
03-23 [Link].771 11287 11287 W fb-breakpad: Cloned at crash time, sig: 11
si_code: 2
03-23 [Link].779 14221 11287 W fb-breakpad: Start writing minidump with flags:
805
03-23 [Link].263 14221 11287 W fb-breakpad: Finish writing minidump
--------- beginning of crash
03-23 [Link].272 11287 11287 F libc : Fatal signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x7400000004 in tid 11287 ([Link]), pid 11287
([Link])
03-23 [Link].627 14230 14230 F DEBUG : *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ***
03-23 [Link].627 14230 14230 F DEBUG : Build fingerprint:
'TCL/T612B_LT/Ladybird_Pro:13/TP1A.220624.014/2BAE:user/release-keys'
03-23 [Link].627 14230 14230 F DEBUG : Revision: '0'
03-23 [Link].627 14230 14230 F DEBUG : ABI: 'arm64'
03-23 [Link].627 14230 14230 F DEBUG : Timestamp: 2024-03-23
[Link].338746079-0300
03-23 [Link].627 14230 14230 F DEBUG : Process uptime: 1415s
03-23 [Link].627 14230 14230 F DEBUG : Cmdline: [Link]
03-23 [Link].627 14230 14230 F DEBUG : pid: 11287, tid: 11287, name:
[Link] >>> [Link] <<<
03-23 [Link].627 14230 14230 F DEBUG : uid: 10331
03-23 [Link].627 14230 14230 F DEBUG : signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x0000007400000004
03-23 [Link].627 14230 14230 F DEBUG : x0 b400007344cf6818 x1
0000007fdd580524 x2 0000000000002eeb x3 000000000111017e
03-23 [Link].627 14230 14230 F DEBUG : x4 b40000733edc6d58 x5
0000000000000000 x6 0000000000000000 x7 0000000000000200
03-23 [Link].627 14230 14230 F DEBUG : x8 b400007400000004 x9
000000007f010005 x10 00000073fe54b154 x11 000000000011017e
03-23 [Link].627 14230 14230 F DEBUG : x12 0000000000000000 x13
0000000000000000 x14 ffffffffffffffff x15 00000073fe54b154
03-23 [Link].627 14230 14230 F DEBUG : x16 000000000011017d x17
00000073f80fe340 x18 000000740773a000 x19 00000074068ec000
03-23 [Link].627 14230 14230 F DEBUG : x20 000000000111017e x21
b40000733edc6c28 x22 0000007fdd580618 x23 b40000733edc6d58
03-23 [Link].627 14230 14230 F DEBUG : x24 b400007344aaf560 x25
0000007fdd5806f0 x26 b400007344aaf5f0 x27 0000007fdd580610
03-23 [Link].627 14230 14230 F DEBUG : x28 0000007fdd580600 x29
0000007fdd580530
03-23 [Link].627 14230 14230 F DEBUG : lr 00000073f80fe3d8 sp
0000007fdd580520 pc 0000007400000004 pst 0000000060000000
03-23 [Link].628 14230 14230 F DEBUG : backtrace:
03-23 [Link].628 14230 14230 F DEBUG : #00 pc 0000000001a00004
<anonymous:73fe600000>
03-23 [Link].628 14230 14230 F DEBUG : #01 pc 00000000000543d4
/system/lib64/[Link] (android::IdmapResMap::Lookup(unsigned int)
const+148) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].628 14230 14230 F DEBUG : #02 pc 00000000000423f4
/system/lib64/[Link] (android::AssetManager2::FindEntry(unsigned int,
unsigned short, bool, bool) const+580) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].628 14230 14230 F DEBUG : #03 pc 0000000000043e3c
/system/lib64/[Link] (android::AssetManager2::GetResource(unsigned int,
bool, unsigned short) const+92) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].628 14230 14230 F DEBUG : #04 pc 0000000000173db0
/system/lib64/libandroid_runtime.so (android::NativeGetResourceValue(_JNIEnv*,
_jclass*, long, int, short, _jobject*, unsigned char)+112) (BuildId:
71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].628 14230 14230 F DEBUG : #05 pc 0000000000391370
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+144)
03-23 [Link].628 14230 14230 F DEBUG : #06 pc 00000000007c8284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].628 14230 14230 F DEBUG : #07 pc 00000000007d2c58
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].628 14230 14230 F DEBUG : #08 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #09 pc 000000000000c7cc
/system/framework/[Link]
([Link]+0)
03-23 [Link].628 14230 14230 F DEBUG : #10 pc 000000000092a008
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+200)
03-23 [Link].628 14230 14230 F DEBUG : #11 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #12 pc 00000000009be94c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+4)
03-23 [Link].628 14230 14230 F DEBUG : #13 pc 0000000000ee69fc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+156)
03-23 [Link].628 14230 14230 F DEBUG : #14 pc 0000000000eee090
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1728)
03-23 [Link].628 14230 14230 F DEBUG : #15 pc 0000000000e449a4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].628 14230 14230 F DEBUG : #16 pc 0000000000c2aaf8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].628 14230 14230 F DEBUG : #17 pc 0000000000e4554c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2156)
03-23 [Link].628 14230 14230 F DEBUG : #18 pc 0000000000e43330
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+320)
03-23 [Link].628 14230 14230 F DEBUG : #19 pc 0000000000e46284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+68)
03-23 [Link].628 14230 14230 F DEBUG : #20 pc 000000000033eba4
/apex/[Link]/lib64/[Link] (art_quick_invoke_stub+612) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #21 pc 0000000000512a44
/apex/[Link]/lib64/[Link] (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&,
art::Instruction const*, unsigned short, bool, art::JValue*)+1976) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #22 pc 0000000000493244
/apex/[Link]/lib64/[Link] (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)
+1012) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #23 pc 0000000000357dd8
/apex/[Link]/lib64/[Link] (ExecuteSwitchImplAsm+8) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #24 pc 000000000143c46c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] (X.5de.A08+0)
03-23 [Link].628 14230 14230 F DEBUG : #25 pc 0000000000371b14
/apex/[Link]/lib64/[Link] (art::interpreter::Execute(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.[Link].8722505846101882172)+232)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #26 pc 000000000037140c
/apex/[Link]/lib64/[Link] (artQuickToInterpreterBridge+964) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #27 pc 0000000000355768
/apex/[Link]/lib64/[Link] (art_quick_to_interpreter_bridge+88)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #28 pc 00000000005ba818
/apex/[Link]/lib64/[Link] (nterp_helper+152) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #29 pc 00000000012ee450
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+20)
03-23 [Link].628 14230 14230 F DEBUG : #30 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #31 pc 00000000012ecd52
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+18)
03-23 [Link].628 14230 14230 F DEBUG : #32 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #33 pc 0000000000a1c5e4
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+8)
03-23 [Link].628 14230 14230 F DEBUG : #34 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].628 14230 14230 F DEBUG : #35 pc 0000000000f74c92
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+66)
03-23 [Link].628 14230 14230 F DEBUG : #36 pc 0000000000a47294
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+964)
03-23 [Link].628 14230 14230 F DEBUG : #37 pc 0000000000771ac0
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+80)
03-23 [Link].628 14230 14230 F DEBUG : #38 pc 0000000000869150
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3600)
03-23 [Link].628 14230 14230 F DEBUG : #39 pc 0000000000873254
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1556)
03-23 [Link].628 14230 14230 F DEBUG : #40 pc 0000000000a5625c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+476)
03-23 [Link].628 14230 14230 F DEBUG : #41 pc 00000000007abfe4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+580)
03-23 [Link].628 14230 14230 F DEBUG : #42 pc 00000000007abd24
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+740)
03-23 [Link].628 14230 14230 F DEBUG : #43 pc 000000000084be38
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+1320)
03-23 [Link].628 14230 14230 F DEBUG : #44 pc 0000000000ac30d8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+168)
03-23 [Link].628 14230 14230 F DEBUG : #45 pc 0000000000ac6eec
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1388)
03-23 [Link].628 14230 14230 F DEBUG : #46 pc 0000000000ac68cc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1132)
03-23 [Link].628 14230 14230 F DEBUG : #47 pc 0000000000867314
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2404)
03-23 [Link].628 14230 14230 F DEBUG : #48 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_qu--------- beginning of main
03-23 [Link].659 14230 14230 E crash_dump64: read_resp: Failed read ack from
aee_aed: Connection reset by peer
03-23 [Link].662 14230 14230 E crash_dump64: crash_mini_dump_notify: writing
'start dumping' fail: Broken pipe
03-23 [Link].706 13748 13748 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].821 13748 13748 W [Link]: [Link]:
[Link]
03-23 [Link].821 13748 13748 W [Link]: at
[Link](Native Method)
03-23 [Link].821 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].821 13748 13748 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].821 13748 13748 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].821 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].821 13748 13748 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].821 13748 13748 W [Link]: at
[Link](Native Method)
03-23 [Link].821 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].821 13748 13748 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].821 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].822 13748 13748 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link](Native Method)
03-23 [Link].822 13748 13748 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].822 13748 13748 W [Link]: at
[Link]([Link])
03-23 [Link].893 13748 13748 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].944 13748 14259 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].040 13748 13748 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].040 13748 13748 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].126 13748 14292 W [Link]: Method void
X.2rL.A03([Link]) failed lock verification and will run slower.
03-23 [Link].126 13748 14292 W [Link]: Common causes for lock
verification issues are non-optimized dex code
03-23 [Link].126 13748 14292 W [Link]: and incorrect proguard
optimizations.
03-23 [Link].133 13748 13748 W [Link]: Method void X.0eU.A0h(X.0tK,
boolean) failed lock verification and will run slower.
03-23 [Link].156 13748 13748 W fb-breakpad: HandleSigmuxSignal pid: 13748 tid:
13748 signo: 11
03-23 [Link].156 13748 13748 W fb-breakpad: Requesting g_crash_mutex in tid:
13748
03-23 [Link].156 13748 13748 W fb-breakpad: Cloned at crash time, sig: 11
si_code: 2
03-23 [Link].165 14298 13748 W fb-breakpad: Start writing minidump with flags:
805
03-23 [Link].695 14298 13748 W fb-breakpad: Finish writing minidump
--------- beginning of crash
03-23 [Link].704 13748 13748 F libc : Fatal signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x7400000004 in tid 13748 ([Link]), pid 13748
([Link])
03-23 [Link].067 14306 14306 F DEBUG : *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ***
03-23 [Link].067 14306 14306 F DEBUG : Build fingerprint:
'TCL/T612B_LT/Ladybird_Pro:13/TP1A.220624.014/2BAE:user/release-keys'
03-23 [Link].067 14306 14306 F DEBUG : Revision: '0'
03-23 [Link].067 14306 14306 F DEBUG : ABI: 'arm64'
03-23 [Link].067 14306 14306 F DEBUG : Timestamp: 2024-03-23
[Link].768815079-0300
03-23 [Link].067 14306 14306 F DEBUG : Process uptime: 20s
03-23 [Link].067 14306 14306 F DEBUG : Cmdline: [Link]
03-23 [Link].067 14306 14306 F DEBUG : pid: 13748, tid: 13748, name:
[Link] >>> [Link] <<<
03-23 [Link].067 14306 14306 F DEBUG : uid: 10331
03-23 [Link].067 14306 14306 F DEBUG : signal 11 (SIGSEGV), code 2
(SEGV_ACCERR), fault addr 0x0000007400000004
03-23 [Link].067 14306 14306 F DEBUG : x0 b400007344cf7818 x1
0000007fdd580524 x2 0000000000002eeb x3 000000000111017e
03-23 [Link].067 14306 14306 F DEBUG : x4 b40000733edc6d58 x5
0000000000000000 x6 0000000000000000 x7 0000000000000200
03-23 [Link].067 14306 14306 F DEBUG : x8 b400007400000004 x9
000000007f010005 x10 00000073fe54b154 x11 000000000011017e
03-23 [Link].067 14306 14306 F DEBUG : x12 0000000000000000 x13
0000000000000000 x14 ffffffffffffffff x15 00000073fe54b154
03-23 [Link].067 14306 14306 F DEBUG : x16 000000000011017d x17
00000073f80fe340 x18 000000740773a000 x19 00000074068ec000
03-23 [Link].067 14306 14306 F DEBUG : x20 000000000111017e x21
b40000733edc6c28 x22 0000007fdd580618 x23 b40000733edc6d58
03-23 [Link].067 14306 14306 F DEBUG : x24 b400007338dfa560 x25
0000007fdd5806f0 x26 b400007338dfa5f0 x27 0000007fdd580610
03-23 [Link].067 14306 14306 F DEBUG : x28 0000007fdd580600 x29
0000007fdd580530
03-23 [Link].067 14306 14306 F DEBUG : lr 00000073f80fe3d8 sp
0000007fdd580520 pc 0000007400000004 pst 0000000060000000
03-23 [Link].067 14306 14306 F DEBUG : backtrace:
03-23 [Link].067 14306 14306 F DEBUG : #00 pc 0000000001a00004
<anonymous:73fe600000>
03-23 [Link].067 14306 14306 F DEBUG : #01 pc 00000000000543d4
/system/lib64/[Link] (android::IdmapResMap::Lookup(unsigned int)
const+148) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].067 14306 14306 F DEBUG : #02 pc 00000000000423f4
/system/lib64/[Link] (android::AssetManager2::FindEntry(unsigned int,
unsigned short, bool, bool) const+580) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].067 14306 14306 F DEBUG : #03 pc 0000000000043e3c
/system/lib64/[Link] (android::AssetManager2::GetResource(unsigned int,
bool, unsigned short) const+92) (BuildId: 77b71f8f427a30af2020be3e532a0bac)
03-23 [Link].067 14306 14306 F DEBUG : #04 pc 0000000000173db0
/system/lib64/libandroid_runtime.so (android::NativeGetResourceValue(_JNIEnv*,
_jclass*, long, int, short, _jobject*, unsigned char)+112) (BuildId:
71336236aac47a28dd93ed0f9e47d0c6)
03-23 [Link].067 14306 14306 F DEBUG : #05 pc 0000000000391370
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
(art_jni_trampoline+144)
03-23 [Link].067 14306 14306 F DEBUG : #06 pc 00000000007c8284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].067 14306 14306 F DEBUG : #07 pc 00000000007d2c58
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].067 14306 14306 F DEBUG : #08 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #09 pc 000000000000c7cc
/system/framework/[Link]
([Link]+0)
03-23 [Link].067 14306 14306 F DEBUG : #10 pc 000000000092a008
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+200)
03-23 [Link].067 14306 14306 F DEBUG : #11 pc 00000000005bb730
/apex/[Link]/lib64/[Link] (nterp_helper+4016) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #12 pc 00000000009be94c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+4)
03-23 [Link].067 14306 14306 F DEBUG : #13 pc 0000000000ee69fc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+156)
03-23 [Link].067 14306 14306 F DEBUG : #14 pc 0000000000eee090
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1728)
03-23 [Link].067 14306 14306 F DEBUG : #15 pc 0000000000e449a4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+132)
03-23 [Link].067 14306 14306 F DEBUG : #16 pc 0000000000c2aaf8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+88)
03-23 [Link].067 14306 14306 F DEBUG : #17 pc 0000000000e4554c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2156)
03-23 [Link].067 14306 14306 F DEBUG : #18 pc 0000000000e43330
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+320)
03-23 [Link].067 14306 14306 F DEBUG : #19 pc 0000000000e46284
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+68)
03-23 [Link].067 14306 14306 F DEBUG : #20 pc 000000000033eba4
/apex/[Link]/lib64/[Link] (art_quick_invoke_stub+612) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #21 pc 0000000000512a44
/apex/[Link]/lib64/[Link] (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&,
art::Instruction const*, unsigned short, bool, art::JValue*)+1976) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #22 pc 0000000000493244
/apex/[Link]/lib64/[Link] (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)
+1012) (BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #23 pc 0000000000357dd8
/apex/[Link]/lib64/[Link] (ExecuteSwitchImplAsm+8) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #24 pc 000000000143c46c
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] (X.5de.A08+0)
03-23 [Link].067 14306 14306 F DEBUG : #25 pc 0000000000371b14
/apex/[Link]/lib64/[Link] (art::interpreter::Execute(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.[Link].8722505846101882172)+232)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].067 14306 14306 F DEBUG : #26 pc 000000000037140c
/apex/[Link]/lib64/[Link] (artQuickToInterpreterBridge+964) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].068 14306 14306 F DEBUG : #27 pc 0000000000355768
/apex/[Link]/lib64/[Link] (art_quick_to_interpreter_bridge+88)
(BuildId: 41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].068 14306 14306 F DEBUG : #28 pc 00000000005ba818
/apex/[Link]/lib64/[Link] (nterp_helper+152) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].068 14306 14306 F DEBUG : #29 pc 00000000012ee450
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+20)
03-23 [Link].068 14306 14306 F DEBUG : #30 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].068 14306 14306 F DEBUG : #31 pc 00000000012ecd52
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+18)
03-23 [Link].068 14306 14306 F DEBUG : #32 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].068 14306 14306 F DEBUG : #33 pc 0000000000a1c5e4
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+8)
03-23 [Link].068 14306 14306 F DEBUG : #34 pc 00000000005bb6d4
/apex/[Link]/lib64/[Link] (nterp_helper+3924) (BuildId:
41ac8dfed2977c7a168799976d23a7f8)
03-23 [Link].068 14306 14306 F DEBUG : #35 pc 0000000000f74c92
/data/app/~~RFXToVfSEOsrvwtQxhgfeQ==/[Link]-RoqEtqCExLnWxcTCDGvm4w==/oat/
arm64/[Link] ([Link]+66)
03-23 [Link].068 14306 14306 F DEBUG : #36 pc 0000000000a47294
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+964)
03-23 [Link].068 14306 14306 F DEBUG : #37 pc 0000000000771ac0
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+80)
03-23 [Link].068 14306 14306 F DEBUG : #38 pc 0000000000869150
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+3600)
03-23 [Link].068 14306 14306 F DEBUG : #39 pc 0000000000873254
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1556)
03-23 [Link].068 14306 14306 F DEBUG : #40 pc 0000000000a5625c
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+476)
03-23 [Link].068 14306 14306 F DEBUG : #41 pc 00000000007abfe4
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+580)
03-23 [Link].068 14306 14306 F DEBUG : #42 pc 00000000007abd24
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+740)
03-23 [Link].068 14306 14306 F DEBUG : #43 pc 000000000084be38
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]$[Link]+1320)
03-23 [Link].068 14306 14306 F DEBUG : #44 pc 0000000000ac30d8
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+168)
03-23 [Link].068 14306 14306 F DEBUG : #45 pc 0000000000ac6eec
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1388)
03-23 [Link].068 14306 14306 F DEBUG : #46 pc 0000000000ac68cc
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+1132)
03-23 [Link].068 14306 14306 F DEBUG : #47 pc 0000000000867314
/data/misc/apexdata/[Link]/dalvik-cache/arm64/[Link]
([Link]+2404)
03-23 [Link].068 14306 14306 F DEBUG : #48 pc 000000000033ee80
/apex/[Link]/lib64/[Link] (art_quic--------- beginning of main
03-23 [Link].099 14306 14306 E crash_dump64: read_resp: Failed read ack from
aee_aed: Connection reset by peer
03-23 [Link].102 14306 14306 E crash_dump64: crash_mini_dump_notify: writing
'start dumping' fail: Broken pipe
03-23 [Link].685 13749 13749 E [Link]: Not starting debugger since
process cannot load the jdwp agent.
03-23 [Link].776 13749 13749 W [Link]: [Link]:
[Link]
03-23 [Link].777 13749 13749 W [Link]: at
[Link](Native Method)
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link].loadLibrary0([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at [Link].<clinit>(Unknown
Source:2)
03-23 [Link].777 13749 13749 W [Link]: at
[Link](Native Method)
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link](Unknown Source:0)
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at [Link].-$
$Nest$mhandleBindApplication(Unknown Source:0)
03-23 [Link].777 13749 13749 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link](Native Method)
03-23 [Link].777 13749 13749 W [Link]: at
[Link]$[Link]([Link])
03-23 [Link].777 13749 13749 W [Link]: at
[Link]([Link])
03-23 [Link].839 13749 13749 E CustomActivityOnCrash: IMPORTANT WARNING! You
already have an UncaughtExceptionHandler, are you sure this is correct? If you use
a custom UncaughtExceptionHandler, you must initialize it AFTER
CustomActivityOnCrash! Installing anyway, but your original handler will not be
called.
03-23 [Link].890 13749 14348 W LibraryVersion: Failed to get app version for
libraryName: firebase-iid
03-23 [Link].059 13749 13749 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/OpenSSLSocketImpl;->setUseSessionTickets(Z)V (max-
target-q,core-platform-api, reflection, denied)
03-23 [Link].059 13749 13749 W [Link]: Accessing hidden method
Lcom/android/org/conscrypt/AbstractConscryptSocket;->setUseSessionTickets(Z)V (max-
target-q, reflection, denied)
03-23 [Link].078 13749 13749 W [Link]: type=1400 audit(0.0:449579): avc:
granted { execute } for
path="/data/data/[Link]/files/decompressed/[Link]/libc++_shared.so"
dev="dm-45" ino=67449 scontext=u:r:untrusted_app:s0:c75,c257,c512,c768
tcontext=u:object_r:app_data_file:s0:c75,c257,c512,c768 tclass=file
app=[Link]
03-23 [Link].082 13749 13749 W [Link]: type=1400 audit(0.0:449580): avc:
granted { execut