这是indexloc提供的服务,不要输入任何密码
Skip to content

Conversation

@creepy-pasta101
Copy link
Contributor

Must solve #25

@creepy-pasta101
Copy link
Contributor Author

More errors coming in...

--------- beginning of system
--------- beginning of crash
09-05 10:26:38.950  3797  3876 F libc    : Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x30 in tid 3876 (com.termux.x11), pid 3797 (com.termux.x11)
09-05 10:26:39.115  5643  5643 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
09-05 10:26:39.116  5643  5643 F DEBUG   : Build fingerprint: 'OPPO/CPH2083/OP4BFB:9/PPR1.180610.011/1622190523:user/release-keys'
09-05 10:26:39.116  5643  5643 F DEBUG   : Revision: '0'
09-05 10:26:39.116  5643  5643 F DEBUG   : ABI: 'arm64'
09-05 10:26:39.116  5643  5643 F DEBUG   : pid: 3797, tid: 3876, name: com.termux.x11  >>> com.termux.x11 <<<
09-05 10:26:39.116  5643  5643 F DEBUG   : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x30
09-05 10:26:39.116  5643  5643 F DEBUG   : Cause: null pointer dereference
09-05 10:26:39.116  5643  5643 F DEBUG   :     x0  0000007909b00ae4  x1  0000007909b006e0  x2  0000000000000008  x3  0000000000000008
09-05 10:26:39.116  5643  5643 F DEBUG   :     x4  0000000000000000  x5  0000000000000008  x6  0000000000000000  x7  000000000044138a
09-05 10:26:39.116  5643  5643 F DEBUG   :     x8  000000790a60ff90  x9  000000790a0fdd80  x10 0000000000000000  x11 000000790a60f000
09-05 10:26:39.116  5643  5643 F DEBUG   :     x12 0000000000000030  x13 0000000000000055  x14 00000000ffffffff  x15 00004aaac89d9cf6
09-05 10:26:39.116  5643  5643 F DEBUG   :     x16 0000007909b73ae8  x17 0000007909b09a2c  x18 0000007909853cca  x19 0000007925653de0
09-05 10:26:39.116  5643  5643 F DEBUG   :     x20 00000079098550a8  x21 0000000000000000  x22 0000000000000001  x23 0000007909855588
09-05 10:26:39.116  5643  5643 F DEBUG   :     x24 0000007909855570  x25 0000007909758000  x26 00000079ac17d5e0  x27 0000007909b133cc
09-05 10:26:39.116  5643  5643 F DEBUG   :     x28 0000007fd71317e0  x29 0000007909854f80
09-05 10:26:39.116  5643  5643 F DEBUG   :     sp  0000007909854f60  lr  0000007909b00b0c  pc  0000007909b00b3c
09-05 10:26:39.119  5643  5643 F DEBUG   : 
09-05 10:26:39.119  5643  5643 F DEBUG   : backtrace:
09-05 10:26:39.119  5643  5643 F DEBUG   :     #00 pc 000000000004db3c  /data/app/com.termux.x11-QzojC-LTxUQUGzKBMDhTUw==/base.apk (offset 0x47d000)
09-05 10:26:39.119  5643  5643 F DEBUG   :     #01 pc 000000000004d6dc  /data/app/com.termux.x11-QzojC-LTxUQUGzKBMDhTUw==/base.apk (offset 0x47d000) (std::__ndk1::function<void ()>::operator()() const+56)
09-05 10:26:39.119  5643  5643 F DEBUG   :     #02 pc 000000000004e040  /data/app/com.termux.x11-QzojC-LTxUQUGzKBMDhTUw==/base.apk (offset 0x47d000) (LorieMessageQueue::run()+236)
09-05 10:26:39.119  5643  5643 F DEBUG   :     #03 pc 00000000000455c4  /data/app/com.termux.x11-QzojC-LTxUQUGzKBMDhTUw==/base.apk (offset 0x47d000) (proc(int, unsigned int, void*)+128)
09-05 10:26:39.119  5643  5643 F DEBUG   :     #04 pc 000000000000a460  /data/app/com.termux.x11-QzojC-LTxUQUGzKBMDhTUw==/base.apk (offset 0x546000) (wl_event_loop_dispatch+388)
09-05 14:25:03.512 10497 10555 F libc    : Fatal signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x790a945a30 in tid 10555 (com.termux.x11), pid 10497 (com.termux.x11)
09-05 14:25:03.624 13145 13145 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
09-05 14:25:03.625 13145 13145 F DEBUG   : Build fingerprint: 'OPPO/CPH2083/OP4BFB:9/PPR1.180610.011/1622190523:user/release-keys'
09-05 14:25:03.625 13145 13145 F DEBUG   : Revision: '0'
09-05 14:25:03.625 13145 13145 F DEBUG   : ABI: 'arm64'
09-05 14:25:03.625 13145 13145 F DEBUG   : pid: 10497, tid: 10555, name: com.termux.x11  >>> com.termux.x11 <<<
09-05 14:25:03.625 13145 13145 F DEBUG   : signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x790a945a30
09-05 14:25:03.625 13145 13145 F DEBUG   :     x0  000000790a15cfa0  x1  0000007909c136e0  x2  0000000000000008  x3  0000000000000008
09-05 14:25:03.625 13145 13145 F DEBUG   :     x4  0000000000000000  x5  0000000000000008  x6  0018000200000011  x7  000000000162637f
09-05 14:25:03.625 13145 13145 F DEBUG   :     x8  000000790a02b3f0  x9  000000790a15cfa0  x10 000000790a945a30  x11 000000790a02b000
09-05 14:25:03.625 13145 13145 F DEBUG   :     x12 0000000000000030  x13 0000000000000055  x14 0000000000000000  x15 aaaaaaaaaaaaaaab
09-05 14:25:03.625 13145 13145 F DEBUG   :     x16 0000007909c86ae8  x17 0000007909c1ca2c  x18 00000079a63fc000  x19 0000007925653de0
09-05 14:25:03.625 13145 13145 F DEBUG   :     x20 00000079098130a8  x21 0000000000000000  x22 0000000000000001  x23 0000007909813588
09-05 14:25:03.625 13145 13145 F DEBUG   :     x24 0000007909813570  x25 0000007909716000  x26 00000079ac17d5e0  x27 0000007909c263cc
09-05 14:25:03.625 13145 13145 F DEBUG   :     x28 0000007fd71317e0  x29 0000007909812f80
09-05 14:25:03.625 13145 13145 F DEBUG   :     sp  0000007909812f60  lr  0000007909c13b48  pc  000000790a945a30
09-05 14:25:03.775 13145 13145 F DEBUG   : 
09-05 14:25:03.775 13145 13145 F DEBUG   : backtrace:
09-05 14:25:03.775 13145 13145 F DEBUG   :     #00 pc 0000000000b45a30  [anon:libc_malloc:0000007909e00000]
09-05 14:25:03.775 13145 13145 F DEBUG   :     #01 pc 000000000004db44  /data/app/com.termux.x11-3kBGJBsHB3DHgtZbsDHlgw==/base.apk (offset 0x47d000)
09-05 14:25:03.775 13145 13145 F DEBUG   :     #02 pc 000000000004d6dc  /data/app/com.termux.x11-3kBGJBsHB3DHgtZbsDHlgw==/base.apk (offset 0x47d000) (std::__ndk1::function<void ()>::operator()() const+56)
09-05 14:25:03.775 13145 13145 F DEBUG   :     #03 pc 000000000004e040  /data/app/com.termux.x11-3kBGJBsHB3DHgtZbsDHlgw==/base.apk (offset 0x47d000) (LorieMessageQueue::run()+236)
09-05 14:25:03.775 13145 13145 F DEBUG   :     #04 pc 00000000000455c4  /data/app/com.termux.x11-3kBGJBsHB3DHgtZbsDHlgw==/base.apk (offset 0x47d000) (proc(int, unsigned int, void*)+128)
09-05 14:25:03.775 13145 13145 F DEBUG   :     #05 pc 000000000000a460  /data/app/com.termux.x11-3kBGJBsHB3DHgtZbsDHlgw==/base.apk (offset 0x546000) (wl_event_loop_dispatch+388)
09-05 14:31:23.642 13330 13350 F libc    : Fatal signal 7 (SIGBUS), code 1 (BUS_ADRALN), fault addr 0x1 in tid 13350 (com.termux.x11), pid 13330 (com.termux.x11)
09-05 14:31:23.726 14016 14016 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
09-05 14:31:23.726 14016 14016 F DEBUG   : Build fingerprint: 'OPPO/CPH2083/OP4BFB:9/PPR1.180610.011/1622190523:user/release-keys'
09-05 14:31:23.726 14016 14016 F DEBUG   : Revision: '0'
09-05 14:31:23.726 14016 14016 F DEBUG   : ABI: 'arm64'
09-05 14:31:23.726 14016 14016 F DEBUG   : pid: 13330, tid: 13350, name: com.termux.x11  >>> com.termux.x11 <<<
09-05 14:31:23.726 14016 14016 F DEBUG   : signal 7 (SIGBUS), code 1 (BUS_ADRALN), fault addr 0x1
09-05 14:31:23.726 14016 14016 F DEBUG   :     x0  0000007909e279f0  x1  0000007909bc36e0  x2  000000790a000000  x3  000000790a1a7750
09-05 14:31:23.726 14016 14016 F DEBUG   :     x4  0000000000000000  x5  000000790a9d345c  x6  0008000300000011  x7  0008000300000011
09-05 14:31:23.726 14016 14016 F DEBUG   :     x8  000000790a324a80  x9  0000007909e279f0  x10 0000000000000001  x11 000000790a324000
09-05 14:31:23.726 14016 14016 F DEBUG   :     x12 0000000000000030  x13 0000000000000055  x14 00000000ffffffff  x15 aaaaaaaaaaaaaaab
09-05 14:31:23.726 14016 14016 F DEBUG   :     x16 0000007909c36ae8  x17 0000007909bcca2c  x18 00000079a63fc000  x19 0000007925653de0
09-05 14:31:23.726 14016 14016 F DEBUG   :     x20 00000079098050a8  x21 0000000000000000  x22 0000000000000001  x23 0000007909805588
09-05 14:31:23.726 14016 14016 F DEBUG   :     x24 0000007909805570  x25 0000007909708000  x26 00000079ac17d5e0  x27 0000007909bd63cc
09-05 14:31:23.727 14016 14016 F DEBUG   :     x28 0000007fd71317e0  x29 0000007909804f80
09-05 14:31:23.727 14016 14016 F DEBUG   :     sp  0000007909804f60  lr  0000007909bc3b48  pc  0000000000000001
09-05 14:31:23.727 14016 14016 F DEBUG   : 
09-05 14:31:23.727 14016 14016 F DEBUG   : backtrace:
09-05 14:31:23.728 14016 14016 F DEBUG   :     #00 pc 0000000000000001  <unknown>
09-05 14:31:23.728 14016 14016 F DEBUG   :     #01 pc 000000000004db44  /data/app/com.termux.x11-3kBGJBsHB3DHgtZbsDHlgw==/base.apk (offset 0x47d000)
09-05 14:31:23.728 14016 14016 F DEBUG   :     #02 pc 000000000004d6dc  /data/app/com.termux.x11-3kBGJBsHB3DHgtZbsDHlgw==/base.apk (offset 0x47d000) (std::__ndk1::function<void ()>::operator()() const+56)
09-05 14:31:23.728 14016 14016 F DEBUG   :     #03 pc 000000000004e040  /data/app/com.termux.x11-3kBGJBsHB3DHgtZbsDHlgw==/base.apk (offset 0x47d000) (LorieMessageQueue::run()+236)
09-05 14:31:23.728 14016 14016 F DEBUG   :     #04 pc 00000000000455c4  /data/app/com.termux.x11-3kBGJBsHB3DHgtZbsDHlgw==/base.apk (offset 0x47d000) (proc(int, unsigned int, void*)+128)
09-05 14:31:23.728 14016 14016 F DEBUG   :     #05 pc 000000000000a460  /data/app/com.termux.x11-3kBGJBsHB3DHgtZbsDHlgw==/base.apk (offset 0x546000) (wl_event_loop_dispatch+388)
--------- beginning of main
09-06 08:02:39.167 18699 18699 F libc    : Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x676f65726f6863 in tid 18699 (com.termux.x11), pid 18699 (com.termux.x11)
09-06 08:02:39.327 19757 19757 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
09-06 08:02:39.328 19757 19757 F DEBUG   : Build fingerprint: 'OPPO/CPH2083/OP4BFB:9/PPR1.180610.011/1622190523:user/release-keys'
09-06 08:02:39.328 19757 19757 F DEBUG   : Revision: '0'
09-06 08:02:39.328 19757 19757 F DEBUG   : ABI: 'arm64'
09-06 08:02:39.328 19757 19757 F DEBUG   : pid: 18699, tid: 18699, name: com.termux.x11  >>> com.termux.x11 <<<
09-06 08:02:39.328 19757 19757 F DEBUG   : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x676f65726f6863
09-06 08:02:39.328 19757 19757 F DEBUG   :     x0  0000007908811da0  x1  000000790aa7c7bc  x2  0000007fd712dae0  x3  00000000000000a8
09-06 08:02:39.328 19757 19757 F DEBUG   :     x4  0000000000000010  x5  0000007fd712dae0  x6  0000007fd712e004  x7  0000007fd712e000
09-06 08:02:39.328 19757 19757 F DEBUG   :     x8  72676f65726f6843  x9  0000000000000000  x10 0000007fd712daf8  x11 9f042e1a41163467
09-06 08:02:39.328 19757 19757 F DEBUG   :     x12 9f042e1a41163467  x13 0000007fd712dae0  x14 0000007fd712dae0  x15 aaaaaaaaaaaaaaab
09-06 08:02:39.328 19757 19757 F DEBUG   :     x16 000000790aaec1b8  x17 000000790aa80d50  x18 00000079a63fc000  x19 000000792560dc00
09-06 08:02:39.328 19757 19757 F DEBUG   :     x20 0000000000000000  x21 000000792560dc00  x22 0000007fd712e390  x23 00000079a6a4187e
09-06 08:02:39.328 19757 19757 F DEBUG   :     x24 0000000000000018  x25 00000079ac17d5e0  x26 000000792560dca0  x27 0000000000000000
09-06 08:02:39.328 19757 19757 F DEBUG   :     x28 0000007fd712e0b0  x29 0000007fd712db60
09-06 08:02:39.328 19757 19757 F DEBUG   :     sp  0000007fd712db30  lr  000000790aa7c7bc  pc  000000790aa7c7c0
09-06 08:02:39.848 19757 19757 F DEBUG   : 
09-06 08:02:39.848 19757 19757 F DEBUG   : backtrace:
09-06 08:02:39.848 19757 19757 F DEBUG   :     #00 pc 00000000000527c0  /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk (offset 0x1bc000)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #01 pc 00000000000526e0  /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk (offset 0x1bc000) (_ZNSt6__ndk18functionIFvvEEC2ERKS2_+72)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #02 pc 000000000005267c  /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk (offset 0x1bc000) (_ZNSt6__ndk19allocatorINS_8functionIFvvEEEE9constructIS3_JRKS3_EEEvPT_DpOT0_+112)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #03 pc 0000000000052594  /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk (offset 0x1bc000) (_ZNSt6__ndk116allocator_traitsINS_9allocatorINS_8functionIFvvEEEEEE11__constructIS4_JRKS4_EEEvNS_17integral_constantIbLb1EEERS5_PT_DpOT0_+136)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #04 pc 000000000004ee2c  /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk (offset 0x1bc000) (_ZNSt6__ndk116allocator_traitsINS_9allocatorINS_8functionIFvvEEEEEE9constructIS4_JRKS4_EEEvRS5_PT_DpOT0_+124)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #05 pc 000000000004e99c  /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk (offset 0x1bc000) (std::__ndk1::deque<std::__ndk1::function<void ()>, std::__ndk1::allocator<std::__ndk1::allocator>>::push_back(std::__ndk1::allocator const&)+188)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #06 pc 000000000004de68  /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk (offset 0x1bc000)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #07 pc 000000000004dd68  /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk (offset 0x1bc000) (LorieMessageQueue::write(std::__ndk1::function<void ()>)+96)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #08 pc 000000000006ed5c  /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk (offset 0x1bc000) (_ZN17LorieMessageQueue4callIFvjjjE15LorieCompositorJRPS2_RjS5_S5_EEEvMT0_T_DpOT1_+268)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #09 pc 000000000005f02c  /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk (offset 0x1bc000) (_ZN16LorieFuncWrapperI15LorieCompositorvJjjjEEclEjjj+152)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #10 pc 000000000005f110  /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk (offset 0x1bc000) (Java_com_termux_x11_LorieService_touchMotion+172)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #11 pc 000000000056d1e0  /system/lib64/libart.so (art_quick_generic_jni_trampoline+144)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #12 pc 0000000000564188  /system/lib64/libart.so (art_quick_invoke_stub+584)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #13 pc 00000000000d0340  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #14 pc 0000000000284d68  /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #15 pc 000000000027fe30  /system/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+752)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #16 pc 00000000005360bc  /system/lib64/libart.so (MterpInvokeDirectRange+244)
09-06 08:02:39.848 19757 19757 F DEBUG   :     #17 pc 0000000000556b94  /system/lib64/libart.so (ExecuteMterpImpl+15252)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #18 pc 0000000000004c24  /dev/ashmem/dalvik-classes3.dex extracted in memory from /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk!classes3.dex (deleted) (com.termux.x11.LorieService.touchMotion+12)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #19 pc 0000000000258820  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3584819052+496)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #20 pc 000000000025e3a0  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #21 pc 000000000027ed08  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #22 pc 0000000000534888  /system/lib64/libart.so (MterpInvokeDirect+296)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #23 pc 0000000000556894  /system/lib64/libart.so (ExecuteMterpImpl+14484)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #24 pc 00000000000046a0  /dev/ashmem/dalvik-classes3.dex extracted in memory from /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk!classes3.dex (deleted) (com.termux.x11.LorieService.access$600)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #25 pc 0000000000258820  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3584819052+496)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #26 pc 000000000025e3a0  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #27 pc 000000000027ed08  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #28 pc 0000000000534a4c  /system/lib64/libart.so (MterpInvokeStatic+204)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #29 pc 0000000000556914  /system/lib64/libart.so (ExecuteMterpImpl+14612)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #30 pc 0000000000004246  /dev/ashmem/dalvik-classes3.dex extracted in memory from /data/app/com.termux.x11-oC5tiYP0qjipVGTYxGCIuQ==/base.apk!classes3.dex (deleted) (com.termux.x11.LorieService$ServiceEventListener.onTouchMotion+10)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #31 pc 0000000000258820  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3584819052+496)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #32 pc 0000000000522f60  /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #33 pc 000000000056d2fc  /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #34 pc 0000000000027eec  /dev/ashmem/dalvik-jit-code-cache (deleted) (com.termux.x11.TouchParser.onTouchEvent+444)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #35 pc 0000000000032e08  /dev/ashmem/dalvik-jit-code-cache (deleted) (com.termux.x11.LorieService$ServiceEventListener.onTouch+120)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #36 pc 0000000000026e5c  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.View.dispatchTouchEvent+524)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #37 pc 0000000000021bfc  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTransformedTouchEvent+956)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #38 pc 0000000000022ee4  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTouchEvent+3316)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #39 pc 0000000000021bfc  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTransformedTouchEvent+956)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #40 pc 0000000000022ee4  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTouchEvent+3316)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #41 pc 0000000000021bfc  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTransformedTouchEvent+956)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #42 pc 0000000000022ee4  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTouchEvent+3316)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #43 pc 0000000000021bfc  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTransformedTouchEvent+956)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #44 pc 0000000000022ee4  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTouchEvent+3316)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #45 pc 0000000000021bfc  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTransformedTouchEvent+956)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #46 pc 0000000000022ee4  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTouchEvent+3316)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #47 pc 0000000000021bfc  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTransformedTouchEvent+956)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #48 pc 0000000000022ee4  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTouchEvent+3316)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #49 pc 0000000000021bfc  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTransformedTouchEvent+956)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #50 pc 0000000000022ee4  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewGroup.dispatchTouchEvent+3316)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #51 pc 0000000000035a6c  /dev/ashmem/dalvik-jit-code-cache (deleted) (com.android.internal.policy.DecorView.superDispatchTouchEvent+44)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #52 pc 0000000000564188  /system/lib64/libart.so (art_quick_invoke_stub+584)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #53 pc 00000000000d0340  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #54 pc 0000000000284d68  /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #55 pc 000000000027ed24  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #56 pc 0000000000533548  /system/lib64/libart.so (MterpInvokeVirtual+584)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #57 pc 0000000000556794  /system/lib64/libart.so (ExecuteMterpImpl+14228)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #58 pc 00000000010f5b02  /system/framework/boot-framework.vdex (com.android.internal.policy.PhoneWindow.superDispatchTouchEvent+4)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #59 pc 0000000000258820  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3584819052+496)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #60 pc 0000000000522f60  /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #61 pc 000000000056d2fc  /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #62 pc 000000000003254c  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.app.Activity.dispatchTouchEvent+252)
09-06 08:02:39.849 19757 19757 F DEBUG   :     #63 pc 0000000000036b84  /dev/ashmem/dalvik-jit-code-cache (deleted) (androidx.appcompat.view.WindowCallbackWrapper.dispatchTouchEvent+68)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #64 pc 000000000002ddb8  /dev/ashmem/dalvik-jit-code-cache (deleted) (com.android.internal.policy.DecorView.dispatchTouchEvent+312)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #65 pc 0000000000035160  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.View.dispatchPointerEvent+128)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #66 pc 0000000000034238  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$ViewPostImeInputStage.processPointerEvent+888)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #67 pc 000000000002d4f0  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$ViewPostImeInputStage.onProcess+144)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #68 pc 0000000000002b3c  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$InputStage.deliver+284)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #69 pc 0000000000024604  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$InputStage.onDeliverToNext+676)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #70 pc 0000000000029320  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$InputStage.forward+48)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #71 pc 0000000000033b8c  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$AsyncInputStage.forward+76)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #72 pc 000000000002aa6c  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$InputStage.apply+60)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #73 pc 0000000000030b34  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$AsyncInputStage.apply+100)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #74 pc 0000000000002b5c  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$InputStage.deliver+316)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #75 pc 0000000000024604  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$InputStage.onDeliverToNext+676)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #76 pc 0000000000029320  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$InputStage.forward+48)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #77 pc 000000000002aa6c  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$InputStage.apply+60)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #78 pc 0000000000002b5c  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$InputStage.deliver+316)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #79 pc 0000000000034f5c  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl.deliverInputEvent+412)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #80 pc 00000000000356e8  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl.doProcessInputEvents+600)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #81 pc 0000000000035f98  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl.enqueueInputEvent+1240)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #82 pc 0000000000032ef8  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.ViewRootImpl$WindowInputEventReceiver.onInputEvent+120)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #83 pc 0000000000031198  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.InputEventReceiver.dispatchInputEvent+136)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #84 pc 0000000000564188  /system/lib64/libart.so (art_quick_invoke_stub+584)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #85 pc 00000000000d0340  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #86 pc 00000000004674b0  /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #87 pc 0000000000468848  /system/lib64/libart.so (art::InvokeVirtualOrInterfaceWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+432)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #88 pc 0000000000346578  /system/lib64/libart.so (art::JNI::CallVoidMethodV(_JNIEnv*, _jobject*, _jmethodID*, std::__va_list)+648)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #89 pc 0000000000100f04  /system/lib64/libart.so (art::(anonymous namespace)::CheckJNI::CallMethodV(char const*, _JNIEnv*, _jobject*, _jclass*, _jmethodID*, std::__va_list, art::Primitive::Type, art::InvokeType)+2372)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #90 pc 00000000000ee1d4  /system/lib64/libart.so (art::(anonymous namespace)::CheckJNI::CallVoidMethodV(_JNIEnv*, _jobject*, _jmethodID*, std::__va_list)+84)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #91 pc 00000000000c8e28  /system/lib64/libandroid_runtime.so (_JNIEnv::CallVoidMethod(_jobject*, _jmethodID*, ...)+120)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #92 pc 00000000000fcd28  /system/lib64/libandroid_runtime.so (android::NativeInputEventReceiver::consumeEvents(_JNIEnv*, bool, long, bool*)+280)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #93 pc 00000000000fdac0  /system/lib64/libandroid_runtime.so (android::nativeConsumeBatchedInputEvents(_JNIEnv*, _jclass*, long, long)+96)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #94 pc 0000000000dee510  /system/framework/arm64/boot-framework.oat (offset 0x9c1000) (android.database.sqlite.SQLiteConnection.nativeIsReadOnly [DEDUPED]+160)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #95 pc 0000000000030cb0  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.InputEventReceiver.consumeBatchedInputEvents+128)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #96 pc 0000000000564188  /system/lib64/libart.so (art_quick_invoke_stub+584)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #97 pc 00000000000d0340  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #98 pc 0000000000284d68  /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #99 pc 000000000027ed24  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #100 pc 0000000000533548  /system/lib64/libart.so (MterpInvokeVirtual+584)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #101 pc 0000000000556794  /system/lib64/libart.so (ExecuteMterpImpl+14228)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #102 pc 0000000000cf078c  /system/framework/boot-framework.vdex (android.view.ViewRootImpl.doConsumeBatchedInput+96)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #103 pc 0000000000258820  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3584819052+496)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #104 pc 000000000025e3a0  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #105 pc 000000000027ed08  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #106 pc 0000000000533548  /system/lib64/libart.so (MterpInvokeVirtual+584)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #107 pc 0000000000556794  /system/lib64/libart.so (ExecuteMterpImpl+14228)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #108 pc 0000000000b3b88e  /system/framework/boot-framework.vdex (android.view.ViewRootImpl$ConsumeBatchedInputRunnable.run+20)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #109 pc 0000000000258820  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3584819052+496)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #110 pc 0000000000522f60  /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #111 pc 000000000056d2fc  /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #112 pc 0000000000037350  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.Choreographer$CallbackRecord.run+240)
09-06 08:02:39.850 19757 19757 F DEBUG   :     #113 pc 000000000002506c  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.Choreographer.doCallbacks+1228)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #114 pc 0000000000026410  /dev/ashmem/dalvik-jit-code-cache (deleted) (android.view.Choreographer.doFrame+2464)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #115 pc 0000000000564188  /system/lib64/libart.so (art_quick_invoke_stub+584)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #116 pc 00000000000d0340  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #117 pc 0000000000284d68  /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #118 pc 000000000027ed24  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #119 pc 0000000000533548  /system/lib64/libart.so (MterpInvokeVirtual+584)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #120 pc 0000000000556794  /system/lib64/libart.so (ExecuteMterpImpl+14228)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #121 pc 0000000000b20c26  /system/framework/boot-framework.vdex (android.view.Choreographer$FrameDisplayEventReceiver.run+18)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #122 pc 0000000000258820  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3584819052+496)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #123 pc 000000000025e3a0  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #124 pc 000000000027ed08  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #125 pc 00000000005344c0  /system/lib64/libart.so (MterpInvokeInterface+1392)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #126 pc 0000000000556994  /system/lib64/libart.so (ExecuteMterpImpl+14740)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #127 pc 0000000000bf9996  /system/framework/boot-framework.vdex (android.os.Handler.handleCallback+4)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #128 pc 0000000000258820  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3584819052+496)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #129 pc 000000000025e3a0  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #130 pc 000000000027ed08  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #131 pc 0000000000534a4c  /system/lib64/libart.so (MterpInvokeStatic+204)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #132 pc 0000000000556914  /system/lib64/libart.so (ExecuteMterpImpl+14612)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #133 pc 0000000000aa6c0c  /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+8)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #134 pc 0000000000258820  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3584819052+496)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #135 pc 000000000025e3a0  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #136 pc 000000000027ed08  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #137 pc 0000000000533548  /system/lib64/libart.so (MterpInvokeVirtual+584)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #138 pc 0000000000556794  /system/lib64/libart.so (ExecuteMterpImpl+14228)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #139 pc 0000000000aadf5a  /system/framework/boot-framework.vdex (android.os.Looper.loop+504)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #140 pc 0000000000258820  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3584819052+496)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #141 pc 000000000025e3a0  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #142 pc 000000000027ed08  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #143 pc 0000000000534a4c  /system/lib64/libart.so (MterpInvokeStatic+204)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #144 pc 0000000000556914  /system/lib64/libart.so (ExecuteMterpImpl+14612)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #145 pc 00000000003f42b2  /system/framework/boot-framework.vdex (android.app.ActivityThread.main+234)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #146 pc 0000000000258820  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3584819052+496)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #147 pc 0000000000522f60  /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #148 pc 000000000056d2fc  /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #149 pc 000000000056444c  /system/lib64/libart.so (art_quick_invoke_static_stub+604)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #150 pc 00000000000d0360  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #151 pc 00000000004674b0  /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #152 pc 0000000000468f08  /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #153 pc 00000000003f7c28  /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+48)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #154 pc 00000000005c1b94  /system/framework/arm64/boot.oat (offset 0x2c9000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #155 pc 0000000000564188  /system/lib64/libart.so (art_quick_invoke_stub+584)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #156 pc 00000000000d0340  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #157 pc 0000000000284d68  /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #158 pc 000000000027ed24  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #159 pc 0000000000533548  /system/lib64/libart.so (MterpInvokeVirtual+584)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #160 pc 0000000000556794  /system/lib64/libart.so (ExecuteMterpImpl+14228)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #161 pc 00000000010ec8e2  /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #162 pc 0000000000258820  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3584819052+496)
09-06 08:02:39.851 19757 19757 F DEBUG   :     #163 pc 0000000000522f60  /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
09-06 08:02:39.852 19757 19757 F DEBUG   :     #164 pc 000000000056d2fc  /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
09-06 08:02:39.852 19757 19757 F DEBUG   :     #165 pc 0000000002938378  /system/framework/arm64/boot-framework.oat (offset 0x9c1000) (com.android.internal.os.ZygoteInit.main+2152)
09-06 08:02:39.852 19757 19757 F DEBUG   :     #166 pc 000000000056444c  /system/lib64/libart.so (art_quick_invoke_static_stub+604)
09-06 08:02:39.852 19757 19757 F DEBUG   :     #167 pc 00000000000d0360  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
09-06 08:02:39.852 19757 19757 F DEBUG   :     #168 pc 00000000004674b0  /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
09-06 08:02:39.852 19757 19757 F DEBUG   :     #169 pc 0000000000467108  /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+416)
09-06 08:02:39.852 19757 19757 F DEBUG   :     #170 pc 00000000003698a4  /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+644)
09-06 08:02:39.852 19757 19757 F DEBUG   :     #171 pc 00000000000b5a30  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120)
09-06 08:02:39.852 19757 19757 F DEBUG   :     #172 pc 00000000000b8470  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+896)
09-06 08:02:39.852 19757 19757 F DEBUG   :     #173 pc 0000000000002228  /system/bin/app_process64 (main+1200)
09-06 08:02:39.852 19757 19757 F DEBUG   :     #174 pc 00000000000ad0f8  /system/lib64/libc.so (__libc_init+88)

@twaik
Copy link
Member

twaik commented Oct 9, 2021

That is likely errors of LorieMessage queue...

@twaik twaik closed this Oct 9, 2021
@twaik twaik deleted the native branch July 26, 2022 09:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants