12-24 09:50:15.664 2101 2147 D ActivityTrigger: activityResumeTrigger: The activity in ApplicationInfo{729e913 org.qtproject.example.android_freeze_test} is now in focus and seems to be in full-screen mode 12-24 09:50:15.664 2101 2147 E ActivityTrigger: activityResumeTrigger: not whiteListedorg.qtproject.example.android_freeze_test/org.qtproject.qt5.android.bindings.QtActivity/1 12-24 09:50:15.665 589 611 E ANDR-PERF-MPCTL: Invalid profile no. 0, total profiles 0 only 12-24 09:50:15.666 8389 14868 I Authzen : [DeviceStateSyncManager] The server is in sync with current state. Nothing to do 12-24 09:50:15.673 589 611 E ANDR-PERF-OPTSHANDLER: Perflock resource /sys/class/devfreq/soc:qcom,llccbw/min_freq not supported 12-24 09:50:15.673 589 611 E ANDR-PERF-RESOURCEQS: Failed to apply optimization [12, 0] 12-24 09:50:15.674 589 611 E ANDR-PERF-OPTSHANDLER: Failed to read /sys/class/kgsl/kgsl-3d0/force_no_nap 12-24 09:50:15.674 589 611 E ANDR-PERF-RESOURCEQS: Failed to apply optimization [10, 7] 12-24 09:50:15.680 2856 2856 D StatusBar: disable disable2 12-24 09:50:15.683 6929 6929 I PhenotypeExpConfig: com.google.android.apps.inputmethod.libs.experiments.PhenotypeExperimentConfiguration: refreshConfiguration() : Force = false : UpdateAvailable = false : Age = 35 minutes : MaxAge = 720 minutes 12-24 09:50:15.684 6929 6929 I LatinIme: com.google.android.apps.inputmethod.libs.latin5.LatinIme: onDeactivate() 12-24 09:50:15.685 2101 2159 I DisplayPowerController: Unblocked screen on after 88 ms 12-24 09:50:15.686 14840 14840 F libc : Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x1c15a74 in tid 14840 (oid_freeze_test), pid 14840 (oid_freeze_test) 12-24 09:50:15.707 2822 2822 D BtOppService: action : android.intent.action.SCREEN_ON 12-24 09:50:15.711 2101 3987 V LocSvc_HIDL_Subscription_jni: screen_status_update 12-24 09:50:15.711 2101 3987 V LocSvc_HIDL_Subscription_jni: [screen_status_update][528] [HC] =>> [HS] 12-24 09:50:15.711 584 584 V LocSvc_HIDL_IzatSubscription: [screenStatusUpdate][575] [HS] <<<<= [HC] 12-24 09:50:15.711 2101 3987 V LocSvc_HIDL_Subscription_jni: Exit Result 0 12-24 09:50:15.712 3194 3194 D DPMJ : |SERVICE| DPM received action android.intent.action.SCREEN_ON 12-24 09:50:15.712 3194 3194 I DPMJ : |SERVICE| sendScreenState: state: true 12-24 09:50:15.713 3661 3661 E LibSecureUISvc: svc_sock_send_message(suisvc): invalid remote socket suilst 12-24 09:50:15.741 14884 14884 I crash_dump32: obtaining output fd from tombstoned, type: kDebuggerdTombstone 12-24 09:50:15.742 1041 1041 I /system/bin/tombstoned: received crash request for pid 14840 12-24 09:50:15.743 14884 14884 I crash_dump32: performing dump of process 14840 (target tid = 14840) 12-24 09:50:15.760 14884 14884 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 12-24 09:50:15.760 14884 14884 F DEBUG : Build fingerprint: 'xiaomi/tissot/tissot_sprout:9/PKQ1.180917.001/V10.0.2.0.PDHMIFK:user/release-keys' 12-24 09:50:15.760 14884 14884 F DEBUG : Revision: '0' 12-24 09:50:15.760 14884 14884 F DEBUG : ABI: 'arm' 12-24 09:50:15.760 14884 14884 F DEBUG : pid: 14840, tid: 14840, name: oid_freeze_test >>> org.qtproject.example.android_freeze_test <<< 12-24 09:50:15.760 14884 14884 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x1c15a74 12-24 09:50:15.760 14884 14884 F DEBUG : r0 1f54384a r1 e3ac8000 r2 01c15a70 r3 00000000 12-24 09:50:15.760 14884 14884 F DEBUG : r4 01c15a70 r5 e3ac8000 r6 e3a1f280 r7 e3a1b100 12-24 09:50:15.760 14884 14884 F DEBUG : r8 e353fc80 r9 ffad54b8 r10 000003a7 r11 ffad54ec 12-24 09:50:15.760 14884 14884 F DEBUG : ip 00000011 sp ffad5378 lr e3529685 pc e33883c8 12-24 09:50:15.770 2101 2240 D KeyLayoutMap: mapKey: scanCode=116, usageCode=0x00000000 ~ Result keyCode=26, outFlags=0x00000000. 12-24 09:50:15.770 2101 2240 D WindowManager: interceptKeyTq keycode=26 interactive=true keyguardActive=false policyFlags=22000000 12-24 09:50:15.868 813 813 D SurfaceFlinger: Finished set power mode=2, type=0 12-24 09:50:15.868 2101 2812 D SurfaceControl: Excessive delay in setPowerMode() 12-24 09:50:15.868 2101 2159 W PowerManagerService: Screen on took 277 ms 12-24 09:50:15.868 2101 2159 I DreamManagerService: Gently waking up from dream. 12-24 09:50:15.869 2101 2155 I DreamManagerService: Performing gentle wake from dream. 12-24 09:50:15.869 2856 30711 D KeyguardViewMediator: notifyScreenTurnedOn 12-24 09:50:15.893 2101 3648 I DreamManagerService: Leaving dreamland. 12-24 09:50:15.893 2101 2155 I DreamManagerService: Performing gentle wake from dream. 12-24 09:50:15.893 2101 2155 I DreamController: Stopping dream: name=ComponentInfo{com.android.systemui/com.android.systemui.doze.DozeService}, isTest=false, canDoze=true, userId=0 12-24 09:50:15.893 2856 2856 D KeyguardViewMediator: handleNotifyScreenTurnedOn 12-24 09:50:15.894 2101 2101 W AlarmManager: Unrecognized alarm listener com.android.server.job.controllers.-$$Lambda$IdleController$IdlenessTracker$nTdS-lGBXcES5VWKcJFmQFgU7IU@6502765 12-24 09:50:16.298 14884 14884 F DEBUG : 12-24 09:50:16.298 14884 14884 F DEBUG : backtrace: 12-24 09:50:16.298 14884 14884 F DEBUG : #00 pc 0024f3c8 /system/lib/libart.so (art::jit::Jit::AddSamples(art::Thread*, art::ArtMethod*, unsigned short, bool)+32) 12-24 09:50:16.298 14884 14884 F DEBUG : #01 pc 003f0681 /system/lib/libart.so (MterpAddHotnessBatch+40) 12-24 09:50:16.298 14884 14884 F DEBUG : #02 pc 00416f4c /system/lib/libart.so (ExecuteMterpImpl+66380) 12-24 09:50:16.298 14884 14884 F DEBUG : #03 pc 000196ac /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/org.qtproject.example.android_freeze_test-9ZIXY6shlep4K2LjaaYrbQ==/base.apk (deleted) (org.qtproject.qt5.android.bindings.QtApplication.invokeDelegateMethod+12) 12-24 09:50:16.298 14884 14884 F DEBUG : #04 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.298 14884 14884 F DEBUG : #05 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.298 14884 14884 F DEBUG : #06 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.298 14884 14884 F DEBUG : #07 pc 003ecd67 /system/lib/libart.so (MterpInvokeStatic+130) 12-24 09:50:16.298 14884 14884 F DEBUG : #08 pc 0040a514 /system/lib/libart.so (ExecuteMterpImpl+14612) 12-24 09:50:16.298 14884 14884 F DEBUG : #09 pc 000197a6 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/org.qtproject.example.android_freeze_test-9ZIXY6shlep4K2LjaaYrbQ==/base.apk (deleted) (org.qtproject.qt5.android.bindings.QtApplication.invokeDelegate+202) 12-24 09:50:16.299 14884 14884 F DEBUG : #10 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.299 14884 14884 F DEBUG : #11 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.299 14884 14884 F DEBUG : #12 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.299 14884 14884 F DEBUG : #13 pc 003ecd67 /system/lib/libart.so (MterpInvokeStatic+130) 12-24 09:50:16.299 14884 14884 F DEBUG : #14 pc 0040a514 /system/lib/libart.so (ExecuteMterpImpl+14612) 12-24 09:50:16.299 14884 14884 F DEBUG : #15 pc 0001927c /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/org.qtproject.example.android_freeze_test-9ZIXY6shlep4K2LjaaYrbQ==/base.apk (deleted) (org.qtproject.qt5.android.bindings.QtActivity.onResume+12) 12-24 09:50:16.299 14884 14884 F DEBUG : #16 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.299 14884 14884 F DEBUG : #17 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.299 14884 14884 F DEBUG : #18 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.299 14884 14884 F DEBUG : #19 pc 003ebd8b /system/lib/libart.so (MterpInvokeVirtual+442) 12-24 09:50:16.299 14884 14884 F DEBUG : #20 pc 0040a394 /system/lib/libart.so (ExecuteMterpImpl+14228) 12-24 09:50:16.299 14884 14884 F DEBUG : #21 pc 003e3e4e /system/framework/boot-framework.vdex (android.app.Instrumentation.callActivityOnResume+6) 12-24 09:50:16.299 14884 14884 F DEBUG : #22 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.299 14884 14884 F DEBUG : #23 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.299 14884 14884 F DEBUG : #24 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.299 14884 14884 F DEBUG : #25 pc 003ebd8b /system/lib/libart.so (MterpInvokeVirtual+442) 12-24 09:50:16.299 14884 14884 F DEBUG : #26 pc 0040a394 /system/lib/libart.so (ExecuteMterpImpl+14228) 12-24 09:50:16.299 14884 14884 F DEBUG : #27 pc 003a8b4a /system/framework/boot-framework.vdex (android.app.Activity.performResume+50) 12-24 09:50:16.299 14884 14884 F DEBUG : #28 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.299 14884 14884 F DEBUG : #29 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.299 14884 14884 F DEBUG : #30 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.299 14884 14884 F DEBUG : #31 pc 003ebd8b /system/lib/libart.so (MterpInvokeVirtual+442) 12-24 09:50:16.299 14884 14884 F DEBUG : #32 pc 0040a394 /system/lib/libart.so (ExecuteMterpImpl+14228) 12-24 09:50:16.299 14884 14884 F DEBUG : #33 pc 0039b52e /system/framework/boot-framework.vdex (android.app.ActivityThread.performResumeActivity+208) 12-24 09:50:16.299 14884 14884 F DEBUG : #34 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.300 14884 14884 F DEBUG : #35 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.300 14884 14884 F DEBUG : #36 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.300 14884 14884 F DEBUG : #37 pc 003ebd8b /system/lib/libart.so (MterpInvokeVirtual+442) 12-24 09:50:16.300 14884 14884 F DEBUG : #38 pc 0040a394 /system/lib/libart.so (ExecuteMterpImpl+14228) 12-24 09:50:16.300 14884 14884 F DEBUG : #39 pc 003a1b2a /system/framework/boot-framework.vdex (android.app.ActivityThread.handleResumeActivity+12) 12-24 09:50:16.300 14884 14884 F DEBUG : #40 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.300 14884 14884 F DEBUG : #41 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.300 14884 14884 F DEBUG : #42 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.300 14884 14884 F DEBUG : #43 pc 003ebd8b /system/lib/libart.so (MterpInvokeVirtual+442) 12-24 09:50:16.300 14884 14884 F DEBUG : #44 pc 0040a394 /system/lib/libart.so (ExecuteMterpImpl+14228) 12-24 09:50:16.300 14884 14884 F DEBUG : #45 pc 0042d262 /system/framework/boot-framework.vdex (android.app.servertransaction.ResumeActivityItem.execute+24) 12-24 09:50:16.300 14884 14884 F DEBUG : #46 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.300 14884 14884 F DEBUG : #47 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.300 14884 14884 F DEBUG : #48 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.300 14884 14884 F DEBUG : #49 pc 003ebd8b /system/lib/libart.so (MterpInvokeVirtual+442) 12-24 09:50:16.300 14884 14884 F DEBUG : #50 pc 0040a394 /system/lib/libart.so (ExecuteMterpImpl+14228) 12-24 09:50:16.300 14884 14884 F DEBUG : #51 pc 0042da90 /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.executeLifecycleState+104) 12-24 09:50:16.300 14884 14884 F DEBUG : #52 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.300 14884 14884 F DEBUG : #53 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.300 14884 14884 F DEBUG : #54 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.300 14884 14884 F DEBUG : #55 pc 003ecc1d /system/lib/libart.so (MterpInvokeDirect+196) 12-24 09:50:16.300 14884 14884 F DEBUG : #56 pc 0040a494 /system/lib/libart.so (ExecuteMterpImpl+14484) 12-24 09:50:16.300 14884 14884 F DEBUG : #57 pc 0042d8f4 /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.execute+74) 12-24 09:50:16.300 14884 14884 F DEBUG : #58 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.300 14884 14884 F DEBUG : #59 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.300 14884 14884 F DEBUG : #60 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.301 14884 14884 F DEBUG : #61 pc 003ebd8b /system/lib/libart.so (MterpInvokeVirtual+442) 12-24 09:50:16.301 14884 14884 F DEBUG : #62 pc 0040a394 /system/lib/libart.so (ExecuteMterpImpl+14228) 12-24 09:50:16.301 14884 14884 F DEBUG : #63 pc 00399f98 /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+72) 12-24 09:50:16.301 14884 14884 F DEBUG : #64 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.301 14884 14884 F DEBUG : #65 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.301 14884 14884 F DEBUG : #66 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.301 14884 14884 F DEBUG : #67 pc 003ebd8b /system/lib/libart.so (MterpInvokeVirtual+442) 12-24 09:50:16.301 14884 14884 F DEBUG : #68 pc 0040a394 /system/lib/libart.so (ExecuteMterpImpl+14228) 12-24 09:50:16.301 14884 14884 F DEBUG : #69 pc 00b0fa5e /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42) 12-24 09:50:16.301 14884 14884 F DEBUG : #70 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.301 14884 14884 F DEBUG : #71 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.301 14884 14884 F DEBUG : #72 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.301 14884 14884 F DEBUG : #73 pc 003ebd8b /system/lib/libart.so (MterpInvokeVirtual+442) 12-24 09:50:16.301 14884 14884 F DEBUG : #74 pc 0040a394 /system/lib/libart.so (ExecuteMterpImpl+14228) 12-24 09:50:16.301 14884 14884 F DEBUG : #75 pc 00b22238 /system/framework/boot-framework.vdex (android.os.Looper.loop+404) 12-24 09:50:16.301 14884 14884 F DEBUG : #76 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.301 14884 14884 F DEBUG : #77 pc 001cc6ef /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 12-24 09:50:16.301 14884 14884 F DEBUG : #78 pc 001e3493 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 12-24 09:50:16.301 14884 14884 F DEBUG : #79 pc 003ecd67 /system/lib/libart.so (MterpInvokeStatic+130) 12-24 09:50:16.301 14884 14884 F DEBUG : #80 pc 0040a514 /system/lib/libart.so (ExecuteMterpImpl+14612) 12-24 09:50:16.301 14884 14884 F DEBUG : #81 pc 003a2b42 /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214) 12-24 09:50:16.301 14884 14884 F DEBUG : #82 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.301 14884 14884 F DEBUG : #83 pc 001cc63b /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82) 12-24 09:50:16.301 14884 14884 F DEBUG : #84 pc 003df5fb /system/lib/libart.so (artQuickToInterpreterBridge+890) 12-24 09:50:16.301 14884 14884 F DEBUG : #85 pc 0041baff /system/lib/libart.so (art_quick_to_interpreter_bridge+30) 12-24 09:50:16.301 14884 14884 F DEBUG : #86 pc 00417575 /system/lib/libart.so (art_quick_invoke_stub_internal+68) 12-24 09:50:16.302 14884 14884 F DEBUG : #87 pc 003f125f /system/lib/libart.so (art_quick_invoke_static_stub+222) 12-24 09:50:16.302 14884 14884 F DEBUG : #88 pc 000a1043 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154) 12-24 09:50:16.302 14884 14884 F DEBUG : #89 pc 0035093d /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52) 12-24 09:50:16.302 14884 14884 F DEBUG : #90 pc 00351d85 /system/lib/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned int)+960) 12-24 09:50:16.302 14884 14884 F DEBUG : #91 pc 00302b15 /system/lib/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+40) 12-24 09:50:16.302 14884 14884 F DEBUG : #92 pc 006ab577 /system/framework/arm/boot-core-oj.oat (offset 0x2c9000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+110) 12-24 09:50:16.302 14884 14884 F DEBUG : #93 pc 00417575 /system/lib/libart.so (art_quick_invoke_stub_internal+68) 12-24 09:50:16.302 14884 14884 F DEBUG : #94 pc 003f115b /system/lib/libart.so (art_quick_invoke_stub+226) 12-24 09:50:16.302 14884 14884 F DEBUG : #95 pc 000a1031 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136) 12-24 09:50:16.302 14884 14884 F DEBUG : #96 pc 001e87b9 /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+232) 12-24 09:50:16.302 14884 14884 F DEBUG : #97 pc 001e34a9 /system/lib/libart.so (bool art::interpreter::DoCall(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+776) 12-24 09:50:16.302 14884 14884 F DEBUG : #98 pc 003ebd8b /system/lib/libart.so (MterpInvokeVirtual+442) 12-24 09:50:16.302 14884 14884 F DEBUG : #99 pc 0040a394 /system/lib/libart.so (ExecuteMterpImpl+14228) 12-24 09:50:16.302 14884 14884 F DEBUG : #100 pc 00dc944a /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22) 12-24 09:50:16.302 14884 14884 F DEBUG : #101 pc 001c7e21 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3309772950+352) 12-24 09:50:16.302 14884 14884 F DEBUG : #102 pc 001cc63b /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82) 12-24 09:50:16.302 14884 14884 F DEBUG : #103 pc 003df5fb /system/lib/libart.so (artQuickToInterpreterBridge+890) 12-24 09:50:16.302 14884 14884 F DEBUG : #104 pc 0041baff /system/lib/libart.so (art_quick_to_interpreter_bridge+30) 12-24 09:50:16.302 14884 14884 F DEBUG : #105 pc 0165c8f1 /system/framework/arm/boot-framework.oat (offset 0x8c0000) (com.android.internal.os.ZygoteInit.main+2896) 12-24 09:50:16.302 14884 14884 F DEBUG : #106 pc 00417575 /system/lib/libart.so (art_quick_invoke_stub_internal+68) 12-24 09:50:16.302 14884 14884 F DEBUG : #107 pc 003f125f /system/lib/libart.so (art_quick_invoke_static_stub+222) 12-24 09:50:16.302 14884 14884 F DEBUG : #108 pc 000a1043 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154) 12-24 09:50:16.302 14884 14884 F DEBUG : #109 pc 0035093d /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52) 12-24 09:50:16.302 14884 14884 F DEBUG : #110 pc 00350759 /system/lib/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+304) 12-24 09:50:16.302 14884 14884 F DEBUG : #111 pc 0029493d /system/lib/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+476) 12-24 09:50:16.302 14884 14884 F DEBUG : #112 pc 0006d819 /system/lib/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+28) 12-24 09:50:16.302 14884 14884 F DEBUG : #113 pc 0006f9cf /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector const&, bool)+466) 12-24 09:50:16.303 14884 14884 F DEBUG : #114 pc 00001b21 /system/bin/app_process32 (main+880) 12-24 09:50:16.303 14884 14884 F DEBUG : #115 pc 000a2b3d /system/lib/libc.so (__libc_init+48) 12-24 09:50:16.303 14884 14884 F DEBUG : #116 pc 0000176f /system/bin/app_process32 (_start_main+46) 12-24 09:50:16.303 14884 14884 F DEBUG : #117 pc 0001ba43 /system/bin/linker (__dl__ZNSt3__112__hash_tableINS_17__hash_value_typeIjP6soinfoEENS_22__unordered_map_hasherIjS4_NS_4hashIjEELb1EEENS_21__unordered_map_equalIjS4_NS_8equal_toIjEELb1EEENS_9allocatorIS4_EEE14__erase_uniqueIjEEjRKT_+102) 12-24 09:50:16.303 14884 14884 F DEBUG : #118 pc 007feb1a [stack:ff2db000]