Closed anou2023 closed 1 year ago
你好, 是 AppActivity.java 这个文件吗?请查看项目的 native 目录内是否存在呢?
具体路径为:{Project}/native/engine/android/app
你好,感谢您的解答,已经找到了,但编译的时候报下面的错误了,能否帮忙看看是什么原因导致的吗?
万分感谢!
------------------ 原始邮件 ------------------ 发件人: @.>; 发送时间: 2023年8月22日(星期二) 晚上6:13 收件人: @.>; 抄送: @.>; @.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
你好, 是 AppActivity.java 这个文件吗?请查看项目的 native 目录内是否存在呢?
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
图片似乎有错误
cmd.exe /C "cd . && I:\AndroidSdk\ndk\25.1.8937393\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe --target=i686-none-linux-android21 --sysroot=I:/AndroidSdk/ndk/25.1.8937393/toolchains/llvm/prebuilt/windows-x86_64/sysroot -fPIC -g -DANDROID -fdata-sections -ffunction-sections -funwind-tables -fstack-protector-strong -no-canonical-prefixes -mstackrealign -D_FORTIFY_SOURCE=2 -Wformat -Werror=format-security -fsigned-char -ffunction-sections -fdata-sections -fstrict-aliasing -frtti -fexceptions -fvisibility=hidden -fvisibility-inlines-hidden -O2 -g -DNDEBUG -static-libstdc++ -Wl,--build-id=sha1 -Wl,--no-rosegment -Wl,--fatal-warnings -Wl,--gc-sections -Wl,--no-undefined -Qunused-arguments -u GameActivityonCreate -Wl,--gc-sections -shared -Wl,-soname,libcocos.so -o J:\Project\Game\Card\Test\build\android\proj\build\Test\intermediates\cxx\RelWithDebInfo\595i4i5a\obj\x86\libcocos.so CMakeFiles/cocos.dir/J/Project/Game/Card/Test/native/engine/common/Classes/Game.cpp.o -Wl,--whole-archive libcocos_jni.a -Wl,--no-whole-archive libcocos_engine.a -llog libandroid_platform.a -landroid libpaddleboat_static.a -lOpenSLES I:/AndroidSdk/ndk/25.1.8937393/toolchains/llvm/prebuilt/windows-x86_64/sysroot/usr/lib/i686-linux-android/21/libEGL.so -ljnigraphics boost/container/libboost_container.a libpvmp3dec.a libvorbisidec.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/v8/libinspector.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libjpeg.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libpng.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libwebp.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libuv.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libz.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/v8/libv8_monolith.a -latomic -lm && cd ."
ld: error: undefined hidden symbol: __stack_chk_fail_local >>> referenced by uv-common.o:(uv__unknown_err_code) in archive C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libuv.a >>> referenced by uv-common.o:(uv_ip6_addr) in archive C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libuv.a >>> referenced by inet.o:(inet_ntop4) in archive C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libuv.a >>> referenced 26 more times
cmd.exe /C "cd . && I:\AndroidSdk\ndk\25.1.8937393\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe --target=i686-none-linux-android21 --sysroot=I:/AndroidSdk/ndk/25.1.8937393/toolchains/llvm/prebuilt/windows-x86_64/sysroot -fPIC -g -DANDROID -fdata-sections -ffunction-sections -funwind-tables -fstack-protector-strong -no-canonical-prefixes -mstackrealign -D_FORTIFY_SOURCE=2 -Wformat -Werror=format-security -fsigned-char -ffunction-sections -fdata-sections -fstrict-aliasing -frtti -fexceptions -fvisibility=hidden -fvisibility-inlines-hidden -O2 -g -DNDEBUG -static-libstdc++ -Wl,--build-id=sha1 -Wl,--no-rosegment -Wl,--fatal-warnings -Wl,--gc-sections -Wl,--no-undefined -Qunused-arguments -u GameActivityonCreate -Wl,--gc-sections -shared -Wl,-soname,libcocos.so -o J:\Project\Game\Card\Test\build\android\proj\build\Test\intermediates\cxx\RelWithDebInfo\595i4i5a\obj\x86\libcocos.so CMakeFiles/cocos.dir/J/Project/Game/Card/Test/native/engine/common/Classes/Game.cpp.o -Wl,--whole-archive libcocos_jni.a -Wl,--no-whole-archive libcocos_engine.a -llog libandroid_platform.a -landroid libpaddleboat_static.a -lOpenSLES I:/AndroidSdk/ndk/25.1.8937393/toolchains/llvm/prebuilt/windows-x86_64/sysroot/usr/lib/i686-linux-android/21/libEGL.so -ljnigraphics boost/container/libboost_container.a libpvmp3dec.a libvorbisidec.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/v8/libinspector.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libjpeg.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libpng.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libwebp.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libuv.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/libz.a C:/ProgramData/cocos/editors/Creator/3.8.0/resources/resources/3d/engine/native/external/cmake/../android/x86/v8/libv8_monolith.a -latomic -lm && cd ."
clang++: error: linker command failed with exit code 1 (use -v to see invocation)
辛苦帮忙看看,谢谢!
------------------ 原始邮件 ------------------ 发件人: "cocos/cocos-docs" @.>; 发送时间: 2023年8月22日(星期二) 晚上6:18 @.>; @.**@.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
图片似乎有错误
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
看起来是 C++ 链接出错误。 SDK、NDK 等的版本要求是否和文档一致呢?
NDK用的是18.1.5063045;SDK用的是33呢
------------------ 原始邮件 ------------------ 发件人: "cocos/cocos-docs" @.>; 发送时间: 2023年8月22日(星期二) 晚上6:25 @.>; @.**@.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
看起来是 C++ 链接出错误。 SDK、NDK 等的版本要求是否和文档一致呢?
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
升级下 NDK 试试,目前的版本要求是 r21 - 23 如果不行,可以尝试将构建日志发到 docs@cocos.com 我联系引擎的同事帮忙处理下。
嗯嗯,好的,谢谢,我重新构建重新编译试试,
版本这样设置应该是可以的吧?
------------------ 原始邮件 ------------------ 发件人: @.>; 发送时间: 2023年8月22日(星期二) 晚上6:29 收件人: @.>; 抄送: @.>; @.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
升级下 NDK 试试,目前的版本要求是 r21 - 23 如果不行,可以尝试将构建日志发到 @.*** 我联系引擎的同事帮忙处理下。
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
您好,请教个问题:cocoscretor2.x能加谷歌最新广告吗?我这边2.4版本的项目添加谷歌广告一直编译不通过。谢谢!
------------------ 原始邮件 ------------------ 发件人: "cocos/cocos-docs" @.>; 发送时间: 2023年8月22日(星期二) 晚上6:29 @.>; @.**@.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
升级下 NDK 试试,目前的版本要求是 r21 - 23 如果不行,可以尝试将构建日志发到 @.*** 我联系引擎的同事帮忙处理下。
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
报的错是什么呢?
感谢你的解答,我这边估计是gradle那些版本的问题,请问creator2.4.11版本的建议gradle用什么版本好?我这边根据对应的版本再重新编译试试。
------------------ 原始邮件 ------------------ 发件人: @.>; 发送时间: 2023年8月28日(星期一) 上午10:52 收件人: @.>; 抄送: @.>; @.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
报的错是什么呢?
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
嗯嗯,我按这个文档的版本编译试一下,还有问题我再请教您了,再次感谢!
------------------ 原始邮件 ------------------ 发件人: @.>; 发送时间: 2023年8月28日(星期一) 中午11:11 收件人: @.>; 抄送: @.>; @.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
请参考下这个文档 https://docs.cocos.com/creator/2.4/manual/zh/publish/setup-native-development.html?h=gradle
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
您好!这个文档里显示V2.4.7之后的版本构建出来的项目是删除了 game,将其项目设置合并到 instantapp 中,但我用2.4.11版本构建出来的版本还是包含了instantapp 和 game这两个模块。是我构建得有问题吗?
------------------ 原始邮件 ------------------ 发件人: "cocos/cocos-docs" @.>; 发送时间: 2023年8月28日(星期一) 中午11:11 @.>; @.**@.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
请参考下这个文档 https://docs.cocos.com/creator/2.4/manual/zh/publish/setup-native-development.html?h=gradle
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
您好,请教个问题,我这边接入谷歌激励视频广告时,在视频播放后安卓这边调用JS会闪退。LOG如下: The user earned the reward. 0 type=1400 audit(0.0:620): avc: denied { open } for path="/data/local/cfg-aahhh/app_sysprop" dev="sdb2" ino=131801 scontext=u:r:untrusted_app:s0:c90,c256,c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=1 type=1300 audit(0.0:620): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffffffc160 a2=0 a3=0 items=0 ppid=3624 auid=4294967295 uid=10090 gid=10090 euid=10090 suid=10090 fsuid=10090 egid=10090 sgid=10090 fsgid=10090 tty=(none) ses=4294967295 exe="/system/bin/app_process64" subj=u:r:untrusted_app:s0:c90,c256,c512,c768 key=(null) app_process main with argv: /system/bin --application org.chromium.components.crash.browser.CrashpadMain /system/bin/app_process64 --sanitization-information=0x5d000224540 --write-minidump-to-log --database=/data/user/0/com.anou.solitaire/cache/WebView/Crashpad --annotation=abi_name=x86_64, x86, arm64-v8a, armeabi-v7a, armeabi --annotation=android_build_fp=Android/aosp_marlin/marlin:9/PQ3A.190605.08171456/3793265:user/release-keys --annotation=android_build_id=PQ3A.190605.08171456 --annotation=board=SM-N9760 --annotation=brand=samsung --annotation=channel=unknown --annotation=custom_themes=false --annotation=device=marlin --annotation=gms_core_version=gms versionCode not available. --annotation=installer_package_name= --annotation=model=SM-N9760 --annotation=plat=Android --annotation=prod=AndroidWebView --annotation=ptype=browser --annotation=resources_version=Not Enabled --annotation=sdk=28 --annotation=ver=91.0.4472.114 --trace-parent-with-exception=0x5d000318808 >>>>>> START com.android.internal.os.RuntimeInit uid 10090 <<<<<< Error opening trace file: No such file or directory (2) enter native_bridge2_isCompatibleWith 3 Found /system/lib64/libhoudini.so version 3 The ClassLoaderContext is a special shared library. Could not create mount namespace. PreInitializeNativeBridge name=unknown instruction_set=x86_64 Failed to bind-mount /system/lib64/x86_64/cpuinfo as /proc/cpuinfo: Operation not permitted call UnloadNativeBridge! state=2 type=1400 audit(0.0:621): avc: denied { mounton } for path="/proc/cpuinfo" dev="proc" ino=4026531993 scontext=u:r:untrusted_app:s0:c90,c256,c512,c768 tcontext=u:object_r:proc_cpuinfo:s0 tclass=file permissive=1 Calling main entry org.chromium.components.crash.browser.CrashpadMain Shutting down VM Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x95a0 in tid 3624 (.anou.solitaire), pid 3624 (.anou.solitaire) Error opening trace file: No such file or directory (2) Unknown channel option 'SO_TIMEOUT' for channel '[id: 0x85b41b14]' obtaining output fd from tombstoned, type: kDebuggerdTombstone received crash request for pid 3624 performing dump of process 3624 (target tid = 3624)
Build fingerprint: 'Android/aosp_marlin/marlin:9/PQ3A.190605.08171456/3793265:user/release-keys' Revision: '0' ABI: 'x86_64' pid: 3624, tid: 3624, name: .anou.solitaire >>> com.anou.solitaire <<< signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x95a0 rax 0000000000000000 rbx 0000000000000000 rcx 00007ffff7ff8948 rdx 00007fffffff5e18 r8 000000000000004e r9 00007fffffff5dd4 r10 00007ffff348e817 r11 00007fffffff6094 r12 00007fffffff6090 r13 00007ffff348e814 r14 00007fffffff5dc0 r15 00007ffff2dd6328 rdi 00007fffffff5dc0 rsi 0000000000000000 rbp 00007fffffff5cc0 rsp 00007fffffff5c80 rip 00007fff5815479f
backtrace: #00 pc 0000000000fd379f /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/lib/x86_64/libcocos2djs.so (v8::HandleScope::Initialize(v8::Isolate)+111) #01 pc 00000000006d15e4 /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/lib/x86_64/libcocos2djs.so (se::AutoHandleScope::AutoHandleScope()+36) #02 pc 0000000000844809 /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/lib/x86_64/libcocos2djs.so (Java_org_cocos2dx_lib_Cocos2dxJavascriptJavaBridge_evalString+121) #03 pc 00000000005a3be1 /system/lib64/libart.so (art_quick_generic_jni_trampoline+209) #04 pc 0000000000599996 /system/lib64/libart.so (art_quick_invoke_static_stub+806) #05 pc 00000000000cf432 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+242) #06 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+299) #07 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1223) #08 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171) #09 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617) #10 pc 0000000000002154 /dev/ashmem/dalvik-classes5.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk!classes5.dex (deleted) (org.cocos2dx.javascript.GoogleAd.sendMsgToJs+108) #11 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #12 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #13 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #14 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171) #15 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617) #16 pc 0000000000001a92 /dev/ashmem/dalvik-classes5.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk!classes5.dex (deleted) (org.cocos2dx.javascript.GoogleAd$5$1.onUserEarnedReward+74) #17 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #18 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #19 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #20 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #21 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #22 pc 00000000003a8c1e /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzbwf.zzk+18) #23 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #24 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #25 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #26 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #27 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #28 pc 00000000004338d2 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzeym.zza+34) #29 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #30 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #31 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #32 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #33 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #34 pc 0000000000431f22 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzews.zza+14) #35 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #36 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #37 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #38 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171) #39 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617) #40 pc 0000000000433cfe /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzeyq.zzp+14) #41 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #42 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #43 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #44 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605) #45 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233) #46 pc 00000000003eaee4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcyo.zza+16) #47 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #48 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #49 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #50 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #51 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #52 pc 00000000003ebaf4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzczn.zzw+4) #53 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #54 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #55 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #56 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171) #57 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617) #58 pc 00000000003eb9f2 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzczn.zzp+34) #59 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #60 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #61 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #62 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #63 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #64 pc 00000000003e96f8 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcwh.zza+16) #65 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #66 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #67 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #68 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #69 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #70 pc 00000000003ec328 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzdao.run+8) #71 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #72 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #73 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #74 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #75 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #76 pc 00000000003b1490 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcab.execute+28) #77 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #78 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #79 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #80 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #81 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #82 pc 00000000003b1560 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcad.execute+4) #83 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #84 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145) #85 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140) #86 pc 000000000002d83a /dev/ashmem/dalvik-jit-code-cache (deleted) (com.google.android.gms.internal.ads.zzdaq.zzp+426) #87 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756) #88 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+209) #89 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+299) #90 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1223) #91 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605) #92 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233) #93 pc 00000000003e9b26 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcwn.zzd+10) #94 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #95 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #96 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #97 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605) #98 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233) #99 pc 00000000003fe4cc /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzdmj.zza+52) #100 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #101 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #102 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #103 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #104 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #105 pc 00000000003ee0b4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzdda.zza+8) #106 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #107 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #108 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #109 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #110 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #111 pc 00000000003ec328 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzdao.run+8) #112 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #113 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #114 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #115 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #116 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #117 pc 000000000045f1e8 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzfvq.execute) #118 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #119 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #120 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #121 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #122 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #123 pc 00000000003b1560 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcad.execute+4) #124 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #125 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145) #126 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140) #127 pc 000000000002d83a /dev/ashmem/dalvik-jit-code-cache (deleted) (com.google.android.gms.internal.ads.zzdaq.zzp+426) #128 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756) #129 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+209) #130 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+299) #131 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1223) #132 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605) #133 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233) #134 pc 00000000003ee27e /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzddd.zza+10) #135 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #136 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #137 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #138 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #139 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #140 pc 000000000038ec7a /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzbiz.zza+118) #141 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #142 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145) #143 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140) #144 pc 000000000004cfb4 /dev/ashmem/dalvik-jit-code-cache (deleted) (com.google.android.gms.internal.ads.zzcfg.zzP+740) #145 pc 0000000000034041 /dev/ashmem/dalvik-jit-code-cache (deleted) (com.google.android.gms.internal.ads.zzcfg.zzj+785) #146 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756) #147 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+209) #148 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+299) #149 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1223) #150 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459) #151 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745) #152 pc 00000000003c691c /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcfz.zza+44) #153 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #154 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #155 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #156 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605) #157 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233) #158 pc 00000000003c6754 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcfx.run+8) #159 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #160 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145) #161 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140) #162 pc 00000000000630a9 /dev/ashmem/dalvik-jit-code-cache (deleted) (android.os.Handler.handleCallback+73) #163 pc 000000000005d949 /dev/ashmem/dalvik-jit-code-cache (deleted) (android.os.Handler.dispatchMessage+73) #164 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756) #165 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+209) #166 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+299) #167 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1223) #168 pc 0000000000566f15 /system/lib64/libart.so (MterpInvokeSuper+1413) #169 pc 000000000058ab99 /system/lib64/libart.so (ExecuteMterpImpl+14361) #170 pc 000000000044db28 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzfmd.zza) #171 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #172 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #173 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #174 pc 0000000000566f15 /system/lib64/libart.so (MterpInvokeSuper+1413) #175 pc 000000000058ab99 /system/lib64/libart.so (ExecuteMterpImpl+14361) #176 pc 00000000002e7e32 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.ads.internal.util.zzf.zza+2) #177 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #178 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #179 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #180 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605) #181 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233) #182 pc 000000000044db10 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-bDFwi26Q1vmu1s9u_rkc_A==/base.apk (deleted) (com.google.android.gms.internal.ads.zzfmd.dispatchMessage) #183 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #184 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #185 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #186 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605) #187 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233) #188 pc 0000000000aef3b0 /system/framework/boot-framework.vdex (android.os.Looper.loop+404) #189 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #190 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209) #191 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198) #192 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171) #193 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617) #194 pc 000000000038662e /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214) #195 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529) #196 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145) #197 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140) #198 pc 0000000000599996 /system/lib64/libart.so (art_quick_invoke_static_stub+806) #199 pc 00000000000cf432 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+242) #200 pc 00000000004953f8 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+72) #201 pc 0000000000497055 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jobject, _jobject*, unsigned long)+1365) Tombstone written to: /data/tombstones/tombstone_38 Force finishing activity com.anou.solitaire/com.google.android.gms.ads.AdActivity Copying /data/tombstones/tombstone_38 to DropBox (SYSTEM_TOMBSTONE) Force finishing activity com.anou.solitaire/org.cocos2dx.javascript.AppActivity checking android.permission.READ_FRAME_BUFFER for uid=1000 => granted (91 us) hw_composer sent 12 syncs in 385s HostConnection::HostConnection: pid=1570, tid=4032, this=0x7fff4b3087a0 fastpipe: Connect success HostRPC::connect sucess: app=system_server, pid=1570, tid=4032, this=0x7fff50014e00 queryAndSetGLESMaxVersion select gles-version: 3.1 hostGLVersion:45 process:system_server A resource failed to call close. updateRotationUnchecked! mLastOrientation=-1 old-mRotation=3 old-mAltOrientation=false new-mRotation=0 new-mAltOrientation=false performLayoutAndPlaceSurfacesLocked called while in layout. Callers=com.android.server.wm.WindowSurfacePlacer.performSurfacePlacement:155 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacement:145 com.android.server.wm.WindowManagerService.reconfigureDisplayLocked:5467 uid=1000(system) FinalizerDaemon identical 39 lines A resource failed to call close. HostConnection::HostConnection: pid=1570, tid=4035, this=0x7fff7282e000 fastpipe: Connect success HostRPC::connect sucess: app=system_server, pid=1570, tid=4035, this=0x7fff52acce40 queryAndSetGLESMaxVersion select gles-version: 3.1 hostGLVersion:45 process:system_server android::hardware::configstore::V1_0::ISurfaceFlingerConfigs::hasWideColorDisplay retrieved: 0 android::hardware::configstore::V1_0::ISurfaceFlingerConfigs::hasHDRDisplay retrieved: 0 Initialized EGL, version 1.4 Swap behavior 1 eglCreateContext request GLES major-version=2 channel '4cf70f5 com.anou.solitaire/com.google.android.gms.ads.AdActivity (server)' ~ Consumer closed input channel or an error occurred. events=0x9 channel '4cf70f5 com.anou.solitaire/com.google.android.gms.ads.AdActivity (server)' ~ Channel is unrecoverably broken and will be disposed! !!! Observer died. Quickly, do something, ... anything... !!! Observer died. Quickly, do something, ... anything... eglCreateContext: 0x7fff729f1460: maj 3 min 1 rcv 4 channel 'f7467ca com.anou.solitaire/org.cocos2dx.javascript.AppActivity (server)' ~ Consumer closed input channel or an error occurred. events=0x9 channel 'f7467ca com.anou.solitaire/org.cocos2dx.javascript.AppActivity (server)' ~ Channel is unrecoverably broken and will be disposed! Process 3624 exited due to signal (11)
能帮我看看是什么原因导致的吗?谢谢!
------------------ 原始邮件 ------------------ 发件人: "cocos/cocos-docs" @.>; 发送时间: 2023年8月28日(星期一) 中午11:11 @.>; @.**@.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
请参考下这个文档 https://docs.cocos.com/creator/2.4/manual/zh/publish/setup-native-development.html?h=gradle
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
这类问题建议去 论坛咨询,那边做过相关的内容的人多一些 。
顺便你这个日志全是乱码。。
你可以检查下调用谷歌的api 是不是满足他的调用需求,比如是在 ui 线程调用。我看你是 jsBridge 发送的
感谢您的回复,我尝试了用UI主线程调用调用Cocos2dxJavascriptJavaBridge.evalString这个方法,结果也是一样的。
------------------ 原始邮件 ------------------ 发件人: "cocos/cocos-docs" @.>; 发送时间: 2023年8月29日(星期二) 下午4:50 @.>; @.**@.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
你可以检查下调用谷歌的api 是不是满足他的调用需求,比如是在 ui 线程调用。我看你是 jsBridge 发送的
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
只要调用过谷歌激励广告后,即使广告已经关闭了,再跟JS交互也是一样会报这个错误。
------------------ 原始邮件 ------------------ 发件人: @.>; 发送时间: 2023年8月29日(星期二) 下午4:50 收件人: @.>; 抄送: @.>; @.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
你可以检查下调用谷歌的api 是不是满足他的调用需求,比如是在 ui 线程调用。我看你是 jsBridge 发送的
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
在论坛里没找到相关问题的帖子, 报错LOG,
辛苦帮忙看看好吗? ------------------ 原始邮件 ------------------ 发件人: "cocos/cocos-docs" @.>; 发送时间: 2023年8月29日(星期二) 下午4:48 @.>; @.**@.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
这类问题建议去 论坛咨询,那边做过相关的内容的人多一些 。
顺便你这个日志全是乱码。。
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
我测试了谷歌横幅跟插屏广告是正常的,就激励视频播放会有这问题。
------------------ 原始邮件 ------------------ 发件人: "cocos/cocos-docs" @.>; 发送时间: 2023年8月29日(星期二) 下午4:50 @.>; @.**@.>; 主题: Re: [cocos/cocos-docs] cocos creator3.8构建后没有生成activity (Issue #2761)
你可以检查下调用谷歌的api 是不是满足他的调用需求,比如是在 ui 线程调用。我看你是 jsBridge 发送的
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>
不要用邮件回复了 你直接用浏览器打开这个地址 https://github.com/cocos/cocos-docs/issues/2761 来粘贴日志 否则浏览器显示全是乱码
以下为LOG:
2023-08-29 17:25:18.885 5864-5864 google ad com.anou.solitaire D The user earned the reward.
2023-08-29 17:25:18.885 5864-5864 google ad com.anou.solitaire D 0
2023-08-29 17:25:19.026 6224-6224 appproc app_process64 I app_process main with argv: /system/bin --application org.chromium.components.crash.browser.CrashpadMain /system/bin/app_process64 --sanitization-information=0x1c0000224540 --write-minidump-to-log --database=/data/user/0/com.anou.solitaire/cache/WebView/Crashpad --annotation=abi_name=x86_64, x86, arm64-v8a, armeabi-v7a, armeabi --annotation=android_build_fp=Android/aosp_marlin/marlin:9/PQ3A.190605.08171456/3793265:user/release-keys --annotation=android_build_id=PQ3A.190605.08171456 --annotation=board=SM-N9760 --annotation=brand=samsung --annotation=channel=unknown --annotation=custom_themes=false --annotation=device=marlin --annotation=gms_core_version=gms versionCode not available. --annotation=installer_package_name= --annotation=model=SM-N9760 --annotation=plat=Android --annotation=prod=AndroidWebView --annotation=ptype=browser --annotation=resources_version=Not Enabled --annotation=sdk=28 --annotation=ver=91.0.4472.114 --trace-parent-with-exception=0x1c0000318808
2023-08-29 17:25:19.027 6224-6224 AndroidRuntime app_process64 D >>>>>> START com.android.internal.os.RuntimeInit uid 10090 <<<<<<
2023-08-29 17:25:19.031 6224-6224 cutils-trace app_process64 E Error opening trace file: No such file or directory (2)
2023-08-29 17:25:19.052 6224-6224 libnb app_process64 V enter native_bridge2_isCompatibleWith 3
2023-08-29 17:25:19.059 6224-6224 libnb app_process64 I Found /system/lib64/libhoudini.so version 3
2023-08-29 17:25:19.091 6224-6224 /system/bi..._process64 app_process64 I The ClassLoaderContext is a special shared library.
2023-08-29 17:25:19.094 6224-6224 /system/bi..._process64 app_process64 W Could not create mount namespace.
2023-08-29 17:25:19.094 6224-6224 nativebridge app_process64 D PreInitializeNativeBridge name=unknown instruction_set=x86_64
2023-08-29 17:25:19.094 6224-6224 nativebridge app_process64 W Failed to bind-mount /system/lib64/x86_64/cpuinfo as /proc/cpuinfo: Operation not permitted
2023-08-29 17:25:19.094 6224-6224 nativebridge app_process64 D call UnloadNativeBridge! state=2
2023-08-29 17:25:19.091 6224-6224 main app_process64 I type=1400 audit(0.0:1019): avc: denied { mounton } for path="/proc/cpuinfo" dev="proc" ino=4026531993 scontext=u:r:untrusted_app:s0:c90,c256,c512,c768 tcontext=u:object_r:proc_cpuinfo:s0 tclass=file permissive=1
2023-08-29 17:25:19.113 6224-6224 AndroidRuntime app_process64 D Calling main entry org.chromium.components.crash.browser.CrashpadMain
2023-08-29 17:25:19.150 6224-6224 AndroidRuntime app_process64 D Shutting down VM
2023-08-29 17:25:19.159 5864-5864 libc com.anou.solitaire A Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x95a0 in tid 5864 (.anou.solitaire), pid 5864 (.anou.solitaire)
2023-08-29 17:25:19.161 6234-6234 crash_dump64 pid-6234 I type=1400 audit(0.0:1020): avc: denied { getattr } for path="/data/local/cfg-aahhh/app_sysprop" dev="sdb2" ino=131824 scontext=u:r:crash_dump:s0:c90,c256,c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=1
2023-08-29 17:25:19.169 6234-6234 cutils-trace pid-6234 E Error opening trace file: No such file or directory (2)
2023-08-29 17:25:19.184 6235-6235 crash_dump64 pid-6235 I obtaining output fd from tombstoned, type: kDebuggerdTombstone
2023-08-29 17:25:19.184 1473-1473 /system/bin/tombstoned tombstoned I received crash request for pid 5864
2023-08-29 17:25:19.185 6235-6235 crash_dump64 pid-6235 I performing dump of process 5864 (target tid = 5864)
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A Build fingerprint: 'Android/aosp_marlin/marlin:9/PQ3A.190605.08171456/3793265:user/release-keys'
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A Revision: '0'
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A ABI: 'x86_64'
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A pid: 5864, tid: 5864, name: .anou.solitaire >>> com.anou.solitaire <<<
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x95a0
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A rax 0000000000000000 rbx 0000000000000000 rcx 00007ffff7ff8948 rdx 00007fffffff5528
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A r8 000000000000004e r9 00007fffffff54e4 r10 00007ffff39df817 r11 00007fffffff57a4
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A r12 00007fffffff57a0 r13 00007ffff39df814 r14 00007fffffff54d0 r15 00007ffff2e48328
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A rdi 00007fffffff54d0 rsi 0000000000000000
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A rbp 00007fffffff53d0 rsp 00007fffffff5390 rip 00007fff5809679f
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A
backtrace:
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #00 pc 0000000000fd379f /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/lib/x86_64/libcocos2djs.so (v8::HandleScope::Initialize(v8::Isolate)+111)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #01 pc 00000000006d15e4 /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/lib/x86_64/libcocos2djs.so (se::AutoHandleScope::AutoHandleScope()+36)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #02 pc 0000000000844809 /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/lib/x86_64/libcocos2djs.so (Java_org_cocos2dx_lib_Cocos2dxJavascriptJavaBridge_evalString+121)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #03 pc 00000000005a3be1 /system/lib64/libart.so (art_quick_generic_jni_trampoline+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #04 pc 0000000000599996 /system/lib64/libart.so (art_quick_invoke_static_stub+806)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #05 pc 00000000000cf432 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+242)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #06 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+299)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #07 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1223)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #08 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #09 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #10 pc 0000000000002288 /dev/ashmem/dalvik-classes5.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk!classes5.dex (deleted) (org.cocos2dx.javascript.GoogleAd.sendMsgToJs+108)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #11 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #12 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #13 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #14 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #15 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #16 pc 0000000000001b48 /dev/ashmem/dalvik-classes5.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk!classes5.dex (deleted) (org.cocos2dx.javascript.GoogleAd$5$1$1.run+24)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #17 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #18 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #19 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #20 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #21 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #22 pc 000000000038aa3e /system/framework/boot-framework.vdex (android.app.Activity.runOnUiThread+28)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #23 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #24 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #25 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #26 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #27 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #28 pc 0000000000001bc8 /dev/ashmem/dalvik-classes5.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk!classes5.dex (deleted) (org.cocos2dx.javascript.GoogleAd$5$1.onUserEarnedReward+76)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #29 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #30 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #31 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #32 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #33 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #34 pc 00000000003a8c1e /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzbwf.zzk+18)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #35 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #36 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #37 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #38 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #39 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #40 pc 00000000004338d2 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzeym.zza+34)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #41 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #42 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #43 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #44 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #45 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #46 pc 0000000000431f22 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzews.zza+14)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #47 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #48 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #49 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #50 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #51 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #52 pc 0000000000433cfe /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzeyq.zzp+14)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #53 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #54 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #55 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #56 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #57 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #58 pc 00000000003eaee4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcyo.zza+16)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #59 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #60 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #61 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #62 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #63 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #64 pc 00000000003ebaf4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzczn.zzw+4)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #65 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #66 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #67 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #68 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #69 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #70 pc 00000000003eb9f2 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzczn.zzp+34)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #71 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #72 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #73 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #74 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #75 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #76 pc 00000000003e96f8 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcwh.zza+16)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #77 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #78 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #79 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #80 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #81 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #82 pc 00000000003ec328 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzdao.run+8)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #83 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #84 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #85 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #86 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #87 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #88 pc 00000000003b1490 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcab.execute+28)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #89 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #90 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #91 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #92 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #93 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #94 pc 00000000003b1560 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcad.execute+4)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #95 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #96 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #97 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #98 pc 000000000002cb8a /dev/ashmem/dalvik-jit-code-cache (deleted) (com.google.android.gms.internal.ads.zzdaq.zzp+426)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #99 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #100 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #101 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+299)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #102 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1223)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #103 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #104 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #105 pc 00000000003e9b26 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcwn.zzd+10)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #106 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #107 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #108 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #109 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #110 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #111 pc 00000000003fe4cc /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzdmj.zza+52)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #112 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #113 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #114 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #115 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #116 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #117 pc 00000000003ee0b4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzdda.zza+8)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #118 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #119 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #120 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #121 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #122 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #123 pc 00000000003ec328 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzdao.run+8)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #124 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #125 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #126 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #127 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #128 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #129 pc 000000000045f1e8 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzfvq.execute)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #130 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #131 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #132 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #133 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #134 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #135 pc 00000000003b1560 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcad.execute+4)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #136 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #137 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #138 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #139 pc 000000000002cb8a /dev/ashmem/dalvik-jit-code-cache (deleted) (com.google.android.gms.internal.ads.zzdaq.zzp+426)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #140 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #141 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #142 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+299)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #143 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1223)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #144 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #145 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #146 pc 00000000003ee27e /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzddd.zza+10)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #147 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #148 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #149 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #150 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #151 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #152 pc 000000000038ec7a /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzbiz.zza+118)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #153 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #154 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #155 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #156 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #157 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #158 pc 00000000003c1c20 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcfg.zzP+176)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #159 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #160 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #161 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #162 pc 0000000000033a61 /dev/ashmem/dalvik-jit-code-cache (deleted) (com.google.android.gms.internal.ads.zzcfg.zzj+785)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #163 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #164 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #165 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+299)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #166 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1223)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #167 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #168 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #169 pc 00000000003c691c /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcfz.zza+44)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #170 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #171 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #172 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #173 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #174 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #175 pc 00000000003c6754 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcfx.run+8)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #176 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #177 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #178 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #179 pc 000000000005c2d9 /dev/ashmem/dalvik-jit-code-cache (deleted) (android.os.Handler.handleCallback+73)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #180 pc 00000000000566e9 /dev/ashmem/dalvik-jit-code-cache (deleted) (android.os.Handler.dispatchMessage+73)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #181 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #182 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #183 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+299)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #184 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1223)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #185 pc 0000000000566f15 /system/lib64/libart.so (MterpInvokeSuper+1413)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #186 pc 000000000058ab99 /system/lib64/libart.so (ExecuteMterpImpl+14361)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #187 pc 000000000044db28 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzfmd.zza)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #188 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #189 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #190 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #191 pc 0000000000566f15 /system/lib64/libart.so (MterpInvokeSuper+1413)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #192 pc 000000000058ab99 /system/lib64/libart.so (ExecuteMterpImpl+14361)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #193 pc 00000000002e7e32 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.ads.internal.util.zzf.zza+2)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #194 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #195 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #196 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #197 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #198 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #199 pc 000000000044db10 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzfmd.dispatchMessage)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #200 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #201 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #202 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #203 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #204 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #205 pc 0000000000aef3b0 /system/framework/boot-framework.vdex (android.os.Looper.loop+404)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #206 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #207 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #208 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #209 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #210 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #211 pc 000000000038662e /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #212 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #213 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #214 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #215 pc 0000000000599996 /system/lib64/libart.so (art_quick_invoke_static_stub+806)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #216 pc 00000000000cf432 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+242)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #217 pc 00000000004953f8 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+72)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #218 pc 0000000000497055 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jobject, _jobject, unsigned long)+1365)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #219 pc 0000000000417947 /system/lib64/libart.so (art::Method_invoke(_JNIEnv, _jobject, _jobject, _jobjectArray)+39)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #220 pc 000000000011c623 /system/framework/x86_64/boot.oat (offset 0x110000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+227)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #221 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #222 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #223 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+299)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #224 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1223)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #225 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #226 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #227 pc 0000000000c10bc2 /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #228 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #229 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #230 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #231 pc 0000000000c09124 /system/framework/x86_64/boot-framework.oat (offset 0x3c4000) (com.android.internal.os.ZygoteInit.main+2804)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #232 pc 0000000000599996 /system/lib64/libart.so (art_quick_invoke_static_stub+806)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #233 pc 00000000000cf432 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+242)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #234 pc 00000000004953f8 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+72)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #235 pc 0000000000494ff9 /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jmethodID, __va_list_tag)+409)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #236 pc 000000000038aaf7 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv, _jclass, _jmethodID, va_list_tag)+791)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #237 pc 00000000000b31a1 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+129)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #238 pc 00000000000b5fcd /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const, android::Vector
检查下代码总是否有访问空指针的情况。 建议去论坛发个帖子问问。
检查了代码,没有空指针,播放视频后不交互是没问题,一交互就会闪退,这个项目比较急……。辛苦您了!
这里可以看到问题是执行某些js时出错了。 可以跟踪下这里的堆栈调用查看哪里出问题。
// 广告结束 notifyAdFinished: function(data) { console.log("Ad finished with data: " + data,this.onAdFinished); this.onAdFinished.emit("onAdFinished",data); } 这个是调用的JS里的接口,不播放视频这个接口是可以正常调用的呢
您好,请教个问题,我在启用自定义插件时报404错误,请问是什么原因导致的?辛苦了!
这个项目是我从cocos商城购买的
你好,插件问题可以找 Store 的客服人员帮忙解决
方法如下
在 Store 的个人中心找到帮助文档
在文档中找到如下的地址:
我联系了作者,但这个问题好像是引擎方面的问题呢
您好,后面启用自定义插件弹出来了,填了信息提交后再点击就会闪一下弹框,还是没打开自定义。请问是什么原因呢?
非文档问题,此issue关闭
cocos creator3.8构建后没有生成activity,请问是什么原因,有朋友遇到过这种情况吗? AndroidManifest.xml文件也是空的