2020-01-09 10:24:35.448 17174-17174/com.zirak.easyformpdf A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x31 in tid 17174 (rak.easyformpdf), pid 17174 (rak.easyformpdf) 2020-01-09 10:24:35.566 17863-17863/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 2020-01-09 10:24:35.567 17863-17863/? A/DEBUG: Build fingerprint: 'samsung/gts4lveea/gts4lv:9/PPR1.180610.011/T725XXU1ASJ3:user/release-keys' 2020-01-09 10:24:35.567 17863-17863/? A/DEBUG: Revision: '5' 2020-01-09 10:24:35.567 17863-17863/? A/DEBUG: ABI: 'arm' 2020-01-09 10:24:35.567 17863-17863/? A/DEBUG: pid: 17174, tid: 17174, name: rak.easyformpdf >>> com.zirak.easyformpdf <<< 2020-01-09 10:24:35.567 17863-17863/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x31 2020-01-09 10:24:35.567 17863-17863/? A/DEBUG: Cause: null pointer dereference 2020-01-09 10:24:35.567 17863-17863/? A/DEBUG: r0 00000000 r1 e16f40e8 r2 00000000 r3 e16f40e8 2020-01-09 10:24:35.567 17863-17863/? A/DEBUG: r4 00000001 r5 00000078 r6 00000031 r7 00000000 2020-01-09 10:24:35.567 17863-17863/? A/DEBUG: r8 e21ab938 r9 cbdbac80 r10 cbdbac80 r11 cbdbac88 2020-01-09 10:24:35.567 17863-17863/? A/DEBUG: ip ea8f2d00 sp ffdb6220 lr ea8c7de3 pc ccac3c2e 2020-01-09 10:24:35.808 17863-17863/? A/DEBUG: backtrace: 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #00 pc 000efc2e /data/app/com.zirak.easyformpdf-vLtjvOBvkaLopNAOEVQvPQ==/lib/arm/librdpdf.so 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #01 pc 00089773 /data/app/com.zirak.easyformpdf-vLtjvOBvkaLopNAOEVQvPQ==/lib/arm/librdpdf.so 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #02 pc 0002aff1 /data/app/com.zirak.easyformpdf-vLtjvOBvkaLopNAOEVQvPQ==/lib/arm/librdpdf.so (Java_com_radaee_pdf_Document_importPage+64) 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #03 pc 0041f079 /system/lib/libart.so (art_quick_generic_jni_trampoline+40) 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #04 pc 0041ab75 /system/lib/libart.so (art_quick_invoke_stub_internal+68) 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #05 pc 003f41fb /system/lib/libart.so (art_quick_invoke_static_stub+222) 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #06 pc 000a1843 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154) 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #07 pc 001e99a5 /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+232) 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #08 pc 001e54fd /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+696) 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #09 pc 003f0f1d /system/lib/libart.so (MterpInvokeStaticRange+100) 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #10 pc 0040dc94 /system/lib/libart.so (ExecuteMterpImpl+15380) 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #11 pc 000fe0f8 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.zirak.easyformpdf-vLtjvOBvkaLopNAOEVQvPQ==/base.apk_17174_17174 (deleted) (com.radaee.pdf.Document.ImportPage+20) 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #12 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.809 17863-17863/? A/DEBUG: #13 pc 001cd8c7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #14 pc 001e466b /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #15 pc 003eed1f /system/lib/libart.so (MterpInvokeVirtual+442) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #16 pc 0040d814 /system/lib/libart.so (ExecuteMterpImpl+14228) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #17 pc 00124d58 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.zirak.easyformpdf-vLtjvOBvkaLopNAOEVQvPQ==/base.apk_17174_17174 (deleted) (com.radaee.reader.configuration.Document.addAttachment+248) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #18 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #19 pc 001cd8c7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #20 pc 001e466b /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #21 pc 003eed1f /system/lib/libart.so (MterpInvokeVirtual+442) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #22 pc 0040d814 /system/lib/libart.so (ExecuteMterpImpl+14228) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #23 pc 001205f4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.zirak.easyformpdf-vLtjvOBvkaLopNAOEVQvPQ==/base.apk_17174_17174 (deleted) (com.radaee.reader.ShowPDFActivity.addAttachment+52) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #24 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #25 pc 001cd8c7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #26 pc 001e466b /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #27 pc 003efbb1 /system/lib/libart.so (MterpInvokeDirect+196) 2020-01-09 10:24:35.810 17863-17863/? A/DEBUG: #28 pc 0040d914 /system/lib/libart.so (ExecuteMterpImpl+14484) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #29 pc 001205a8 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.zirak.easyformpdf-vLtjvOBvkaLopNAOEVQvPQ==/base.apk_17174_17174 (deleted) (com.radaee.reader.ShowPDFActivity.access$800) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #30 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #31 pc 001cd8c7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #32 pc 001e466b /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #33 pc 003efcfb /system/lib/libart.so (MterpInvokeStatic+130) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #34 pc 0040d994 /system/lib/libart.so (ExecuteMterpImpl+14612) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #35 pc 0011de98 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.zirak.easyformpdf-vLtjvOBvkaLopNAOEVQvPQ==/base.apk_17174_17174 (deleted) (com.radaee.reader.ShowPDFActivity$16.onClick+24) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #36 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #37 pc 001cd8c7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #38 pc 001e466b /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #39 pc 003ef8ed /system/lib/libart.so (MterpInvokeInterface+1020) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #40 pc 0040da14 /system/lib/libart.so (ExecuteMterpImpl+14740) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #41 pc 013ac920 /system/framework/boot-framework.vdex (com.android.internal.app.AlertController$AlertParams$3.onItemClick+20) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #42 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #43 pc 001cd8c7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2020-01-09 10:24:35.811 17863-17863/? A/DEBUG: #44 pc 001e54e7 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+674) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #45 pc 003f0b49 /system/lib/libart.so (MterpInvokeInterfaceRange+1016) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #46 pc 0040dd14 /system/lib/libart.so (ExecuteMterpImpl+15508) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #47 pc 0141fbf8 /system/framework/boot-framework.vdex (android.widget.AdapterView.performItemClick+48) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #48 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #49 pc 001cd8c7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #50 pc 001e54e7 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+674) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #51 pc 003f0495 /system/lib/libart.so (MterpInvokeSuperRange+1092) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #52 pc 0040db94 /system/lib/libart.so (ExecuteMterpImpl+15124) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #53 pc 0136d360 /system/framework/boot-framework.vdex (android.widget.AbsListView.performItemClick+412) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #54 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #55 pc 001cd8c7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #56 pc 001e466b /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #57 pc 003eed1f /system/lib/libart.so (MterpInvokeVirtual+442) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #58 pc 0040d814 /system/lib/libart.so (ExecuteMterpImpl+14228) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #59 pc 0136b43c /system/framework/boot-framework.vdex (android.widget.AbsListView$PerformClick.run+144) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #60 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #61 pc 001cd8c7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2020-01-09 10:24:35.812 17863-17863/? A/DEBUG: #62 pc 001e466b /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #63 pc 003f1163 /system/lib/libart.so (MterpInvokeVirtualQuick+422) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #64 pc 00411594 /system/lib/libart.so (ExecuteMterpImpl+29972) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #65 pc 0141e800 /system/framework/boot-framework.vdex (android.widget.AbsListView$7.run+108) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #66 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #67 pc 001cd813 /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #68 pc 003e2563 /system/lib/libart.so (artQuickToInterpreterBridge+890) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #69 pc 0041f0ff /system/lib/libart.so (art_quick_to_interpreter_bridge+30) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #70 pc 0007e21d /dev/ashmem/dalvik-jit-code-cache_17174_17174 (deleted) (android.os.Handler.handleCallback+52) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #71 pc 0007c393 /dev/ashmem/dalvik-jit-code-cache_17174_17174 (deleted) (android.os.Handler.dispatchMessage+58) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #72 pc 0008d0bd /dev/ashmem/dalvik-jit-code-cache_17174_17174 (deleted) (android.os.Looper.loop+892) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #73 pc 0041abbb /system/lib/libart.so (art_quick_osr_stub+42) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #74 pc 0024fca1 /system/lib/libart.so (art::jit::Jit::MaybeDoOnStackReplacement(art::Thread*, art::ArtMethod*, unsigned int, int, art::JValue*)+1464) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #75 pc 003f36f7 /system/lib/libart.so (MterpMaybeDoOnStackReplacement+86) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #76 pc 0041a2f4 /system/lib/libart.so (ExecuteMterpImpl+66164) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #77 pc 00c7671e /system/framework/boot-framework.vdex (android.os.Looper.loop+930) 2020-01-09 10:24:35.813 17863-17863/? A/DEBUG: #78 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #79 pc 001cd8c7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #80 pc 001e466b /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #81 pc 003efcfb /system/lib/libart.so (MterpInvokeStatic+130) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #82 pc 0040d994 /system/lib/libart.so (ExecuteMterpImpl+14612) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #83 pc 004c4e84 /system/framework/boot-framework.vdex (android.app.ActivityThread.main+220) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #84 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #85 pc 001cd813 /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #86 pc 003e2563 /system/lib/libart.so (artQuickToInterpreterBridge+890) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #87 pc 0041f0ff /system/lib/libart.so (art_quick_to_interpreter_bridge+30) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #88 pc 0041ab75 /system/lib/libart.so (art_quick_invoke_stub_internal+68) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #89 pc 003f41fb /system/lib/libart.so (art_quick_invoke_static_stub+222) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #90 pc 000a1843 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #91 pc 0035231d /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #92 pc 00353765 /system/lib/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned int)+960) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #93 pc 00303eb1 /system/lib/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+40) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #94 pc 00114297 /system/framework/arm/boot.oat (offset 0x10e000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+110) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #95 pc 0041ab75 /system/lib/libart.so (art_quick_invoke_stub_internal+68) 2020-01-09 10:24:35.814 17863-17863/? A/DEBUG: #96 pc 003f40f7 /system/lib/libart.so (art_quick_invoke_stub+226) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #97 pc 000a1831 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #98 pc 001e99a5 /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+232) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #99 pc 001e4681 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+776) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #100 pc 003eed1f /system/lib/libart.so (MterpInvokeVirtual+442) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #101 pc 0040d814 /system/lib/libart.so (ExecuteMterpImpl+14228) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #102 pc 013dacce /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #103 pc 001c8ff9 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2120558370+352) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #104 pc 001cd813 /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #105 pc 003e2563 /system/lib/libart.so (artQuickToInterpreterBridge+890) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #106 pc 0041f0ff /system/lib/libart.so (art_quick_to_interpreter_bridge+30) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #107 pc 00be09c5 /system/framework/arm/boot-framework.oat (offset 0x3fe000) (com.android.internal.os.ZygoteInit.main+1916) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #108 pc 0041ab75 /system/lib/libart.so (art_quick_invoke_stub_internal+68) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #109 pc 003f41fb /system/lib/libart.so (art_quick_invoke_static_stub+222) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #110 pc 000a1843 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #111 pc 0035231d /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #112 pc 00352139 /system/lib/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+304) 2020-01-09 10:24:35.815 17863-17863/? A/DEBUG: #113 pc 00295c1d /system/lib/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+476) 2020-01-09 10:24:35.816 17863-17863/? A/DEBUG: #114 pc 000712fd /system/lib/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+28) 2020-01-09 10:24:35.816 17863-17863/? A/DEBUG: #115 pc 00073645 /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector const&, bool)+484) 2020-01-09 10:24:35.816 17863-17863/? A/DEBUG: #116 pc 00002f17 /system/bin/app_process32 (main+714) 2020-01-09 10:24:35.816 17863-17863/? A/DEBUG: #117 pc 000a498d /system/lib/libc.so (__libc_init+48) 2020-01-09 10:24:35.816 17863-17863/? A/DEBUG: #118 pc 00002c0b /system/bin/app_process32 (_start_main+46) 2020-01-09 10:24:35.816 17863-17863/? A/DEBUG: #119 pc 00019f79 /system/bin/linker (__dl__ZN6soinfoD1Ev+16) 2020-01-09 10:24:35.816 17863-17863/? A/DEBUG: #120 pc 007fe812 [stack:ff5bc000] 2020-01-09 10:24:36.138 1023-1023/? E//system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_09