Any clue what to do here? Devices impacted range from Android 12-Android 14, SDK 31-34 but not "every" device with those OS or SDK details has this issue.
I've done a bunch of research and the most I've gathered is "libc.so" is related to Java.
Any assistance would be greatly appreciated!!!
backtrace:
#00 pc 0x0000000000015615 /data/app/~~uSRyij_GC9Fo5-_ScSFJWQ==/com.richcoast.kinglucha-zDAmAx2ZvtddeDI5cAdb-w==/split_config.x86_64.apk!libRuntimeNative.so (CColMask::orIt(short*, CMask*, int, int, bool)+1381) (BuildId: af85b5bdb9c7a23dd0ae95ee495888a8903baf66)
#01 pc 0x0000000000015062 /data/app/~~uSRyij_GC9Fo5-_ScSFJWQ==/com.richcoast.kinglucha-zDAmAx2ZvtddeDI5cAdb-w==/split_config.x86_64.apk!libRuntimeNative.so (CColMask::orMask(CMask*, int, int, int, int)+66) (BuildId: af85b5bdb9c7a23dd0ae95ee495888a8903baf66)
#02 pc 0x00000000003a03ab /apex/Please login to see this link. (art_quick_generic_jni_trampoline+219)
#03 pc 0x000000000038d0f5 /apex/Please login to see this link. (nterp_helper+5805)
#04 pc 0x00000000000cd23c /data/app/~~uSRyij_GC9Fo5-_ScSFJWQ==/com.richcoast.kinglucha-zDAmAx2ZvtddeDI5cAdb-w==/oat/x86_64/base.vdex (RunLoop.CRun.redrawLevel+2976)
#05 pc 0x000000000038c8e0 /apex/Please login to see this link. (nterp_helper+3736)
#06 pc 0x00000000000c83e0 /data/app/~~uSRyij_GC9Fo5-_ScSFJWQ==/com.richcoast.kinglucha-zDAmAx2ZvtddeDI5cAdb-w==/oat/x86_64/base.vdex (RunLoop.CRun.initRunLoop+76)
#07 pc 0x000000000038c8e0 /apex/Please login to see this link. (nterp_helper+3736)
#08 pc 0x000000000009a57a /data/app/~~uSRyij_GC9Fo5-_ScSFJWQ==/com.richcoast.kinglucha-zDAmAx2ZvtddeDI5cAdb-w==/oat/x86_64/base.vdex (Application.CRunApp.startTheFrame+410)
#09 pc 0x000000000038c8e0 /apex/Please login to see this link. (nterp_helper+3736)
#10 pc 0x000000000009a262 /data/app/~~uSRyij_GC9Fo5-_ScSFJWQ==/com.richcoast.kinglucha-zDAmAx2ZvtddeDI5cAdb-w==/oat/x86_64/base.vdex (Application.CRunApp.playApplication+342)
#11 pc 0x000000000038c8e0 /apex/Please login to see this link. (nterp_helper+3736)
#12 pc 0x000000000009ee5e /data/app/~~uSRyij_GC9Fo5-_ScSFJWQ==/com.richcoast.kinglucha-zDAmAx2ZvtddeDI5cAdb-w==/oat/x86_64/base.vdex (Application.CRunTimerTask.run+50)
#13 pc 0x0000000002076ea6 /memfd:jit-zygote-cache (android.os.Handler.dispatchMessage+86)
#14 pc 0x000000000038c945 /apex/Please login to see this link. (nterp_helper+3837)
#15 pc 0x00000000004595f6 /system/framework/framework.jar (android.os.Looper.loopOnce+334)
#16 pc 0x00000000020935c6 /memfd:jit-zygote-cache (android.os.Looper.loop+550)
#17 pc 0x000000000038baed /apex/Please login to see this link. (nterp_helper+165)
#18 pc 0x00000000001c8a1e /system/framework/framework.jar (android.app.ActivityThread.main+202)
#19 pc 0x00000000003953f6 /apex/Please login to see this link. (art_quick_invoke_static_stub+806)
#20 pc 0x000000000041da89 /apex/Please login to see this link. (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+233)
#21 pc 0x00000000008194c2 /apex/Please login to see this link. (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1442)
#22 pc 0x0000000000772698 /apex/Please login to see this link. (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+56)
#23 pc 0x00000000000b5a30 /apex/Please login to see this link. (art_jni_trampoline+144)
#24 pc 0x000000000038c945 /apex/Please login to see this link. (nterp_helper+3837)
#25 pc 0x000000000024a7e2 /system/framework/framework.jar (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
#26 pc 0x000000000038d63d /apex/Please login to see this link. (nterp_helper+7157)
#27 pc 0x0000000000250774 /system/framework/framework.jar (com.android.internal.os.ZygoteInit.main+612)
#28 pc 0x00000000003953f6 /apex/Please login to see this link. (art_quick_invoke_static_stub+806)
#29 pc 0x000000000041da89 /apex/Please login to see this link. (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+233)
#30 pc 0x0000000000819e71 /apex/Please login to see this link. (art::JValue art::InvokeWithVarArgs<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, __va_list_tag*)+465)
#31 pc 0x00000000006ce81c /apex/Please login to see this link. (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, __va_list_tag*)+620)
#32 pc 0x00000000000d2884 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+164)
#33 pc 0x00000000000def81 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+865)
#34 pc 0x0000000000002f9f /system/bin/app_process64 (main+1599)
#35 pc 0x000000000004ffb9 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+89)