airsdk / Adobe-Runtime-Support

Report, track and discuss issues in Adobe AIR. Monitored by Adobe - and HARMAN - and maintained by the AIR community.
203 stars 11 forks source link

[ISSUE] PlayStore crash reports #3516

Open bobaoapae opened 1 week ago

bobaoapae commented 1 week ago

AIRSDK: 51.1.1.5 (happens on old versions too).

*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 12051 >>> br.com.redesurftank.android <<<

backtrace:
  #00  pc 0x0000000000f374b1  /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #01  pc 0x00000000004df48c  /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #02  pc 0x00000000002838a8  /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #03  pc 0x0000000000286fe0  /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #04  pc 0x000000000028a454  /data/app/~~PRoq8czn7JAsx0H6Ds4KaA==/br.com.redesurftank.android-KGh26C6jqGyrflINWhDdyw==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #05  pc 0x000000000038c3e0  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+112)
  #06  pc 0x00000000020078f4  /memfd:jit-cache (com.adobe.air.customHandler.handleMessage+116)
  #07  pc 0x0000000000aecfd8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+168)
  #08  pc 0x0000000000af118c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+1084)
  #09  pc 0x0000000000af0c9c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+1132)
  #10  pc 0x000000000083d5cc  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+1580)
  #11  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #12  pc 0x000000000035e42c  /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
  #13  pc 0x00000000006c8cb8  /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
  #14  pc 0x00000000003929c4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
  #15  pc 0x0000000000cf3f14  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+132)
  #16  pc 0x0000000000d00824  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+4468)
  #17  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #18  pc 0x000000000034df38  /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
  #19  pc 0x000000000034beec  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
  #20  pc 0x0000000000739d7c  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
  #21  pc 0x00000000000e7ca8  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+104)
  #22  pc 0x00000000000f4494  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1028)
  #23  pc 0x000000000000258c  /system/bin/app_process64 (main+1324)
  #24  pc 0x000000000008c798  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 25770 >>> br.com.redesurftank.android <<<

backtrace:
  #00  pc 0x0000000000437a70  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #01  pc 0x00000000005ccddc  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #02  pc 0x00000000006a467c  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #03  pc 0x00000000006a42d0  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #04  pc 0x00000000006a3d94  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #05  pc 0x00000000004ddc34  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #06  pc 0x00000000004df724  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #07  pc 0x00000000002838a8  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #08  pc 0x0000000000286fe0  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #09  pc 0x000000000028a454  /data/app/~~Egxf2Qh9ANm0_Zk5ozpGjA==/br.com.redesurftank.android-rFv30JvQQkiiMQ5Sj_kF_Q==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #10  pc 0x00000000003243e0  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+112)
  #11  pc 0x00000000020022d4  /memfd:jit-cache (com.adobe.air.customHandler.handleMessage+116)
  #12  pc 0x0000000000a2c088  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+168)
  #13  pc 0x000000000077f620  /apex/com.android.art/lib64/libart.so (nterp_helper+4016)
  #14  pc 0x00000000001f0c6e  /system/framework/framework.jar (android.os.Looper.loopOnce+558)
  #15  pc 0x0000000000a2ff14  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+1124)
  #16  pc 0x0000000000758358  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+2264)
  #17  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #18  pc 0x000000000035e42c  /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
  #19  pc 0x00000000006c8b78  /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
  #20  pc 0x000000000032a9c4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
  #21  pc 0x0000000000cb72b8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136)
  #22  pc 0x0000000000cc11ec  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+3340)
  #23  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #24  pc 0x000000000034df38  /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
  #25  pc 0x000000000034beec  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
  #26  pc 0x0000000000739bf4  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
  #27  pc 0x00000000000bfc04  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+124)
  #28  pc 0x00000000000cc34c  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+844)
  #29  pc 0x000000000000255c  /system/bin/app_process64 (main+1284)
  #30  pc 0x000000000004aa48  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+100)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 9238 >>> br.com.redesurftank.android <<<

backtrace:
  #00  pc 0x0000000000f374b1  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #01  pc 0x00000000004df48c  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #02  pc 0x00000000002838a8  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #03  pc 0x0000000000286fe0  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #04  pc 0x000000000028a454  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #05  pc 0x000000000002c084  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/oat/arm64/base.odex (art_jni_trampoline+116)
  #06  pc 0x00000000005b8fb0  /apex/com.android.art/lib64/libart.so (nterp_helper+4016)
  #07  pc 0x0000000000286a38  /data/app/~~yyCf-rdBE7TKOBLxzp6eHw==/br.com.redesurftank.android-961loH48yfHAOjnqw3K-iA==/base.apk (com.adobe.air.customHandler.handleMessage+20)
  #08  pc 0x0000000000b34068  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+168)
  #09  pc 0x0000000000b3836c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+1084)
  #10  pc 0x0000000000b37e7c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+1132)
  #11  pc 0x0000000000878b4c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+1580)
  #12  pc 0x000000000033aa80  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #13  pc 0x000000000037bf18  /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1556)
  #14  pc 0x000000000037b8f4  /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
  #15  pc 0x00000000003985f8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+120)
  #16  pc 0x0000000000d43ef4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+132)
  #17  pc 0x0000000000d510d4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+4532)
  #18  pc 0x000000000033aa80  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #19  pc 0x00000000004e1f4c  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+728)
  #20  pc 0x000000000057a164  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+156)
  #21  pc 0x00000000000e7ca8  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+104)
  #22  pc 0x00000000000f4494  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1028)
  #23  pc 0x000000000000258c  /system/bin/app_process64 (main+1324)
  #24  pc 0x000000000008c798  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 10217 >>> br.com.redesurftank.android <<<

backtrace:
  #00  pc 0x00000000007ace84  /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #01  pc 0x00000000007ac484  /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #02  pc 0x00000000009d8014  /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #03  pc 0x00000000009d7ca4  /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #04  pc 0x000000000033a58c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+140)
  #05  pc 0x000000000077fc80  /apex/com.android.art/lib64/libart.so (nterp_helper+5648)
  #06  pc 0x0000000000272210  /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/base.apk (com.adobe.air.AndroidInputManager.onInputDeviceAdded+112)
  #07  pc 0x000000000077f5c4  /apex/com.android.art/lib64/libart.so (nterp_helper+3924)
  #08  pc 0x000000000027222e  /data/app/~~PqfnY4qGRfy8W_okCP5S4A==/br.com.redesurftank.android-taqTo-5uu1siF31gV6j-Ig==/base.apk (com.adobe.air.AndroidInputManager.onInputDeviceChanged+6)
  #09  pc 0x00000000007803e4  /apex/com.android.art/lib64/libart.so (nterp_helper+7540)
  #10  pc 0x00000000002383c4  /system/framework/framework.jar (android.hardware.input.InputManagerGlobal$InputDeviceListenerDelegate.handleMessage+20)
  #11  pc 0x000000000095b358  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+152)
  #12  pc 0x000000000095ed84  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+1044)
  #13  pc 0x000000000095e8d4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+916)
  #14  pc 0x00000000006fec1c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+1372)
  #15  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #16  pc 0x000000000035e42c  /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
  #17  pc 0x00000000006c8b78  /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
  #18  pc 0x000000000032e244  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
  #19  pc 0x0000000000c7dbe4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116)
  #20  pc 0x0000000000c88838  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+3384)
  #21  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #22  pc 0x000000000034df38  /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
  #23  pc 0x000000000034beec  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
  #24  pc 0x0000000000739bf4  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
  #25  pc 0x00000000000e6be8  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108)
  #26  pc 0x00000000000f3e6c  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+924)
  #27  pc 0x00000000000027a4  /system/bin/app_process64 (main+1868)
  #28  pc 0x000000000008d99c  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 14500 >>> br.com.redesurftank.android <<<

backtrace:
  #00  pc 0x00000000009d7d6c  /data/app/~~BoWntC6wEstSv7CQUdWEBg==/br.com.redesurftank.android-Gn0-LMgjRfkRzaBe9JbznQ==/split_config.arm64_v8a.apk!libCore.so (BuildId: ba60c4697042c7591599c30310802b09339b8b85)
  #01  pc 0x000000000038e230  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+128)
  #02  pc 0x000000000077fc80  /apex/com.android.art/lib64/libart.so (nterp_helper+5648)
  #03  pc 0x0000000000272268  /data/app/~~BoWntC6wEstSv7CQUdWEBg==/br.com.redesurftank.android-Gn0-LMgjRfkRzaBe9JbznQ==/base.apk (com.adobe.air.AndroidInputManager.onInputDeviceRemoved+32)
  #04  pc 0x000000000077f5c4  /apex/com.android.art/lib64/libart.so (nterp_helper+3924)
  #05  pc 0x0000000000272228  /data/app/~~BoWntC6wEstSv7CQUdWEBg==/br.com.redesurftank.android-Gn0-LMgjRfkRzaBe9JbznQ==/base.apk (com.adobe.air.AndroidInputManager.onInputDeviceChanged)
  #06  pc 0x00000000007803e4  /apex/com.android.art/lib64/libart.so (nterp_helper+7540)
  #07  pc 0x00000000001c7578  /system/framework/framework.jar (android.hardware.input.InputManagerGlobal$InputDeviceListenerDelegate.handleMessage+20)
  #08  pc 0x0000000000aedaf8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+168)
  #09  pc 0x0000000000af1ccc  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+1084)
  #10  pc 0x0000000000af17dc  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+1132)
  #11  pc 0x000000000083be4c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+1580)
  #12  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #13  pc 0x000000000035e42c  /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
  #14  pc 0x00000000006c8b78  /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
  #15  pc 0x00000000003929c4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
  #16  pc 0x0000000000cf4224  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+132)
  #17  pc 0x0000000000d00a34  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+4468)
  #18  pc 0x0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #19  pc 0x000000000034df38  /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
  #20  pc 0x000000000034beec  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
  #21  pc 0x0000000000739bf4  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
  #22  pc 0x00000000000e0ca8  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+104)
  #23  pc 0x00000000000ed414  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1028)
  #24  pc 0x000000000000258c  /system/bin/app_process64 (main+1324)
  #25  pc 0x000000000008c798  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104)

Those crash reports get more than 5% rate on play reports. And this it's a lot more than the threshold, so my app get penalized.

ajwfrost commented 5 days ago

First and third issues there are the same but are very odd - within a core run function, there's a dynamic branch, and the value that it's branching to is wrong (f374b1 is not within the libCore program data, and is not even a valid address for arm64 code!). But very tricky to work out which actual bit of code this is referring to as it's a massive function, I'll see if we can get some extra debug/disassembly data for that...

Second issue is a Loader object that is adding a child, and we're queuing up the child object to be decoded into a bitmap in the background, and there's a crash that looks to be caused by a null argument to this method: we can work backwards to see if there's an error condition we're missing, and at least it should be possible to add null-checks to prevent the crash.

Fourth and fifth issues are in the addition and removal (respectively) of an input device. This should be something we can address but can I check whether this was running in a background thread i.e. do you have the Android flag set to true? It's got a thread ID 10217, 14500 etc, but I'm not sure because the initial thread set-up seems to be just from Android OS rather than AIR..

thanks

bobaoapae commented 5 days ago

Running in background is set to false

ajwfrost commented 5 days ago

Thanks So I think we can add protection for 2, 4 and 5.

Issues 1 and 3 are where it's calling a virtual method and something seems to have corrupted the virtual method table, it should call to 0x285428 but instead is hitting 0xf374b1 (well, if there's any register information available in the dump, we can check that for sure: all we see is the crash location here, it would be nice to know values of x0, x8 and x9). Would be great if we could get a way to reproduce this one!