Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cocos creator3.8构建后没有生成activity #2761

Closed
anou2023 opened this issue Aug 22, 2023 · 33 comments
Closed

cocos creator3.8构建后没有生成activity #2761

anou2023 opened this issue Aug 22, 2023 · 33 comments

Comments

@anou2023
Copy link

cocos creator3.8构建后没有生成activity,请问是什么原因,有朋友遇到过这种情况吗?
image
AndroidManifest.xml文件也是空的

@anou2023 anou2023 changed the title 原生开发 cocos creator3.8构建后没有生成activity Aug 22, 2023
@UniqueDisplayNameIsInUse
Copy link

UniqueDisplayNameIsInUse commented Aug 22, 2023

你好,
是 AppActivity.java 这个文件吗?请查看项目的 native 目录内是否存在呢?

具体路径为:{Project}/native/engine/android/app

@anou2023
Copy link
Author

anou2023 commented Aug 22, 2023 via email

@UniqueDisplayNameIsInUse

图片似乎有错误

@anou2023
Copy link
Author

anou2023 commented Aug 22, 2023 via email

@UniqueDisplayNameIsInUse

看起来是 C++ 链接出错误。
SDK、NDK 等的版本要求是否和文档一致呢?

@anou2023
Copy link
Author

anou2023 commented Aug 22, 2023 via email

@UniqueDisplayNameIsInUse
Copy link

UniqueDisplayNameIsInUse commented Aug 22, 2023

升级下 NDK 试试,目前的版本要求是 r21 - 23
如果不行,可以尝试将构建日志发到 [email protected]
我联系引擎的同事帮忙处理下。

@anou2023
Copy link
Author

anou2023 commented Aug 22, 2023 via email

@anou2023
Copy link
Author

anou2023 commented Aug 28, 2023 via email

@UniqueDisplayNameIsInUse

报的错是什么呢?

@anou2023
Copy link
Author

anou2023 commented Aug 28, 2023 via email

@UniqueDisplayNameIsInUse

@anou2023
Copy link
Author

anou2023 commented Aug 28, 2023 via email

@anou2023
Copy link
Author

anou2023 commented Aug 28, 2023 via email

@anou2023
Copy link
Author

anou2023 commented Aug 29, 2023 via email

@UniqueDisplayNameIsInUse

这类问题建议去 论坛咨询,那边做过相关的内容的人多一些 。

顺便你这个日志全是乱码。。

@UniqueDisplayNameIsInUse

你可以检查下调用谷歌的api 是不是满足他的调用需求,比如是在 ui 线程调用。我看你是 jsBridge 发送的
image

@anou2023
Copy link
Author

anou2023 commented Aug 29, 2023 via email

@anou2023
Copy link
Author

anou2023 commented Aug 29, 2023 via email

@anou2023
Copy link
Author

anou2023 commented Aug 29, 2023 via email

@anou2023
Copy link
Author

anou2023 commented Aug 29, 2023 via email

@UniqueDisplayNameIsInUse

不要用邮件回复了 你直接用浏览器打开这个地址 #2761 来粘贴日志
否则浏览器显示全是乱码
image

@anou2023
Copy link
Author

以下为LOG:
2023-08-29 17:25:18.885 5864-5864 google ad com.anou.solitaire D The user earned the reward.
2023-08-29 17:25:18.885 5864-5864 google ad com.anou.solitaire D 0
2023-08-29 17:25:19.026 6224-6224 appproc app_process64 I app_process main with argv: /system/bin --application org.chromium.components.crash.browser.CrashpadMain /system/bin/app_process64 --sanitization-information=0x1c0000224540 --write-minidump-to-log --database=/data/user/0/com.anou.solitaire/cache/WebView/Crashpad --annotation=abi_name=x86_64, x86, arm64-v8a, armeabi-v7a, armeabi --annotation=android_build_fp=Android/aosp_marlin/marlin:9/PQ3A.190605.08171456/3793265:user/release-keys --annotation=android_build_id=PQ3A.190605.08171456 --annotation=board=SM-N9760 --annotation=brand=samsung --annotation=channel=unknown --annotation=custom_themes=false --annotation=device=marlin --annotation=gms_core_version=gms versionCode not available. --annotation=installer_package_name= --annotation=model=SM-N9760 --annotation=plat=Android --annotation=prod=AndroidWebView --annotation=ptype=browser --annotation=resources_version=Not Enabled --annotation=sdk=28 --annotation=ver=91.0.4472.114 --trace-parent-with-exception=0x1c0000318808
2023-08-29 17:25:19.027 6224-6224 AndroidRuntime app_process64 D >>>>>> START com.android.internal.os.RuntimeInit uid 10090 <<<<<<
2023-08-29 17:25:19.031 6224-6224 cutils-trace app_process64 E Error opening trace file: No such file or directory (2)
2023-08-29 17:25:19.052 6224-6224 libnb app_process64 V enter native_bridge2_isCompatibleWith 3
2023-08-29 17:25:19.059 6224-6224 libnb app_process64 I Found /system/lib64/libhoudini.so version 3
2023-08-29 17:25:19.091 6224-6224 /system/bi..._process64 app_process64 I The ClassLoaderContext is a special shared library.
2023-08-29 17:25:19.094 6224-6224 /system/bi..._process64 app_process64 W Could not create mount namespace.
2023-08-29 17:25:19.094 6224-6224 nativebridge app_process64 D PreInitializeNativeBridge name=unknown instruction_set=x86_64
2023-08-29 17:25:19.094 6224-6224 nativebridge app_process64 W Failed to bind-mount /system/lib64/x86_64/cpuinfo as /proc/cpuinfo: Operation not permitted
2023-08-29 17:25:19.094 6224-6224 nativebridge app_process64 D call UnloadNativeBridge! state=2
2023-08-29 17:25:19.091 6224-6224 main app_process64 I type=1400 audit(0.0:1019): avc: denied { mounton } for path="/proc/cpuinfo" dev="proc" ino=4026531993 scontext=u:r:untrusted_app:s0:c90,c256,c512,c768 tcontext=u:object_r:proc_cpuinfo:s0 tclass=file permissive=1
2023-08-29 17:25:19.113 6224-6224 AndroidRuntime app_process64 D Calling main entry org.chromium.components.crash.browser.CrashpadMain
2023-08-29 17:25:19.150 6224-6224 AndroidRuntime app_process64 D Shutting down VM
2023-08-29 17:25:19.159 5864-5864 libc com.anou.solitaire A Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x95a0 in tid 5864 (.anou.solitaire), pid 5864 (.anou.solitaire)
2023-08-29 17:25:19.161 6234-6234 crash_dump64 pid-6234 I type=1400 audit(0.0:1020): avc: denied { getattr } for path="/data/local/cfg-aahhh/app_sysprop" dev="sdb2" ino=131824 scontext=u:r:crash_dump:s0:c90,c256,c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=1
2023-08-29 17:25:19.169 6234-6234 cutils-trace pid-6234 E Error opening trace file: No such file or directory (2)
2023-08-29 17:25:19.184 6235-6235 crash_dump64 pid-6235 I obtaining output fd from tombstoned, type: kDebuggerdTombstone
2023-08-29 17:25:19.184 1473-1473 /system/bin/tombstoned tombstoned I received crash request for pid 5864
2023-08-29 17:25:19.185 6235-6235 crash_dump64 pid-6235 I performing dump of process 5864 (target tid = 5864)
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A Build fingerprint: 'Android/aosp_marlin/marlin:9/PQ3A.190605.08171456/3793265:user/release-keys'
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A Revision: '0'
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A ABI: 'x86_64'
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A pid: 5864, tid: 5864, name: .anou.solitaire >>> com.anou.solitaire <<<
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x95a0
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A rax 0000000000000000 rbx 0000000000000000 rcx 00007ffff7ff8948 rdx 00007fffffff5528
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A r8 000000000000004e r9 00007fffffff54e4 r10 00007ffff39df817 r11 00007fffffff57a4
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A r12 00007fffffff57a0 r13 00007ffff39df814 r14 00007fffffff54d0 r15 00007ffff2e48328
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A rdi 00007fffffff54d0 rsi 0000000000000000
2023-08-29 17:25:19.189 6235-6235 DEBUG pid-6235 A rbp 00007fffffff53d0 rsp 00007fffffff5390 rip 00007fff5809679f
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A
backtrace:
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #00 pc 0000000000fd379f /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/lib/x86_64/libcocos2djs.so (v8::HandleScope::Initialize(v8::Isolate*)+111)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #1 pc 00000000006d15e4 /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/lib/x86_64/libcocos2djs.so (se::AutoHandleScope::AutoHandleScope()+36)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #2 pc 0000000000844809 /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/lib/x86_64/libcocos2djs.so (Java_org_cocos2dx_lib_Cocos2dxJavascriptJavaBridge_evalString+121)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #3 pc 00000000005a3be1 /system/lib64/libart.so (art_quick_generic_jni_trampoline+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #4 pc 0000000000599996 /system/lib64/libart.so (art_quick_invoke_static_stub+806)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #5 pc 00000000000cf432 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+242)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #6 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+299)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #7 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1223)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #8 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #9 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #10 pc 0000000000002288 /dev/ashmem/dalvik-classes5.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk!classes5.dex (deleted) (org.cocos2dx.javascript.GoogleAd.sendMsgToJs+108)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #11 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #12 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #13 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #14 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #15 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #16 pc 0000000000001b48 /dev/ashmem/dalvik-classes5.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk!classes5.dex (deleted) (org.cocos2dx.javascript.GoogleAd$5$1$1.run+24)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #17 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #18 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #19 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #20 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #21 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #22 pc 000000000038aa3e /system/framework/boot-framework.vdex (android.app.Activity.runOnUiThread+28)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #23 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #24 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #25 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #26 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #27 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #28 pc 0000000000001bc8 /dev/ashmem/dalvik-classes5.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk!classes5.dex (deleted) (org.cocos2dx.javascript.GoogleAd$5$1.onUserEarnedReward+76)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #29 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #30 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #31 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #32 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #33 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #34 pc 00000000003a8c1e /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzbwf.zzk+18)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #35 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #36 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #37 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #38 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #39 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #40 pc 00000000004338d2 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzeym.zza+34)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #41 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #42 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #43 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #44 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #45 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #46 pc 0000000000431f22 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzews.zza+14)
2023-08-29 17:25:19.280 6235-6235 DEBUG pid-6235 A #47 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #48 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #49 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #50 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #51 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #52 pc 0000000000433cfe /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzeyq.zzp+14)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #53 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #54 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #55 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #56 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #57 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #58 pc 00000000003eaee4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcyo.zza+16)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #59 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #60 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #61 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #62 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #63 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #64 pc 00000000003ebaf4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzczn.zzw+4)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #65 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #66 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #67 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #68 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #69 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #70 pc 00000000003eb9f2 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzczn.zzp+34)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #71 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #72 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #73 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #74 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #75 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #76 pc 00000000003e96f8 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcwh.zza+16)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #77 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #78 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #79 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #80 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #81 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #82 pc 00000000003ec328 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzdao.run+8)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #83 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #84 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #85 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #86 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #87 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #88 pc 00000000003b1490 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcab.execute+28)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #89 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #90 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #91 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #92 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #93 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #94 pc 00000000003b1560 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcad.execute+4)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #95 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #96 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #97 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #98 pc 000000000002cb8a /dev/ashmem/dalvik-jit-code-cache (deleted) (com.google.android.gms.internal.ads.zzdaq.zzp+426)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #99 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #100 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #101 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+299)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #102 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1223)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #103 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #104 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #105 pc 00000000003e9b26 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcwn.zzd+10)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #106 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #107 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #108 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #109 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #110 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #111 pc 00000000003fe4cc /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzdmj.zza+52)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #112 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #113 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #114 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #115 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #116 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #117 pc 00000000003ee0b4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzdda.zza+8)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #118 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #119 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #120 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #121 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #122 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #123 pc 00000000003ec328 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzdao.run+8)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #124 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #125 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #126 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #127 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #128 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #129 pc 000000000045f1e8 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzfvq.execute)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #130 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #131 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #132 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #133 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #134 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #135 pc 00000000003b1560 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcad.execute+4)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #136 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #137 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #138 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #139 pc 000000000002cb8a /dev/ashmem/dalvik-jit-code-cache (deleted) (com.google.android.gms.internal.ads.zzdaq.zzp+426)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #140 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #141 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #142 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+299)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #143 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1223)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #144 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #145 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #146 pc 00000000003ee27e /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzddd.zza+10)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #147 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #148 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #149 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #150 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #151 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #152 pc 000000000038ec7a /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzbiz.zza+118)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #153 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #154 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #155 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #156 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #157 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #158 pc 00000000003c1c20 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcfg.zzP+176)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #159 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #160 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #161 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #162 pc 0000000000033a61 /dev/ashmem/dalvik-jit-code-cache (deleted) (com.google.android.gms.internal.ads.zzcfg.zzj+785)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #163 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #164 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #165 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+299)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #166 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1223)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #167 pc 0000000000567863 /system/lib64/libart.so (MterpInvokeInterface+1459)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #168 pc 000000000058ad19 /system/lib64/libart.so (ExecuteMterpImpl+14745)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #169 pc 00000000003c691c /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcfz.zza+44)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #170 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #171 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #172 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #173 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #174 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #175 pc 00000000003c6754 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzcfx.run+8)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #176 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #177 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #178 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #179 pc 000000000005c2d9 /dev/ashmem/dalvik-jit-code-cache (deleted) (android.os.Handler.handleCallback+73)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #180 pc 00000000000566e9 /dev/ashmem/dalvik-jit-code-cache (deleted) (android.os.Handler.dispatchMessage+73)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #181 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #182 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #183 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+299)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #184 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1223)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #185 pc 0000000000566f15 /system/lib64/libart.so (MterpInvokeSuper+1413)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #186 pc 000000000058ab99 /system/lib64/libart.so (ExecuteMterpImpl+14361)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #187 pc 000000000044db28 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzfmd.zza)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #188 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #189 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #190 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #191 pc 0000000000566f15 /system/lib64/libart.so (MterpInvokeSuper+1413)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #192 pc 000000000058ab99 /system/lib64/libart.so (ExecuteMterpImpl+14361)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #193 pc 00000000002e7e32 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.ads.internal.util.zzf.zza+2)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #194 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #195 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #196 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #197 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #198 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #199 pc 000000000044db10 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.anou.solitaire-oppoSPnkKHiCGbSWv7-nSg==/base.apk (deleted) (com.google.android.gms.internal.ads.zzfmd.dispatchMessage)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #200 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #201 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #202 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #203 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #204 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #205 pc 0000000000aef3b0 /system/framework/boot-framework.vdex (android.os.Looper.loop+404)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #206 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #207 pc 00000000002697d1 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #208 pc 000000000028b35e /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1198)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #209 pc 0000000000567e0b /system/lib64/libart.so (MterpInvokeStatic+171)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #210 pc 000000000058ac99 /system/lib64/libart.so (ExecuteMterpImpl+14617)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #211 pc 000000000038662e /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #212 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #213 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #214 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #215 pc 0000000000599996 /system/lib64/libart.so (art_quick_invoke_static_stub+806)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #216 pc 00000000000cf432 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+242)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #217 pc 00000000004953f8 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+72)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #218 pc 0000000000497055 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1365)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #219 pc 0000000000417947 /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+39)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #220 pc 000000000011c623 /system/framework/x86_64/boot.oat (offset 0x110000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+227)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #221 pc 0000000000599634 /system/lib64/libart.so (art_quick_invoke_stub+756)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #222 pc 00000000000cf411 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+209)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #223 pc 0000000000291e8b /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+299)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #224 pc 000000000028b377 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1223)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #225 pc 000000000056688d /system/lib64/libart.so (MterpInvokeVirtual+605)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #226 pc 000000000058ab19 /system/lib64/libart.so (ExecuteMterpImpl+14233)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #227 pc 0000000000c10bc2 /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #228 pc 0000000000263cd1 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2306892542+529)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #229 pc 00000000005559e9 /system/lib64/libart.so (artQuickToInterpreterBridge+1145)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #230 pc 00000000005a3d6c /system/lib64/libart.so (art_quick_to_interpreter_bridge+140)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #231 pc 0000000000c09124 /system/framework/x86_64/boot-framework.oat (offset 0x3c4000) (com.android.internal.os.ZygoteInit.main+2804)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #232 pc 0000000000599996 /system/lib64/libart.so (art_quick_invoke_static_stub+806)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #233 pc 00000000000cf432 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+242)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #234 pc 00000000004953f8 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+72)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #235 pc 0000000000494ff9 /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, __va_list_tag*)+409)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #236 pc 000000000038aaf7 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, __va_list_tag*)+791)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #237 pc 00000000000b31a1 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+129)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #238 pc 00000000000b5fcd /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+701)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #239 pc 0000000000002277 /system/bin/app_process64 (main+1479)
2023-08-29 17:25:19.281 6235-6235 DEBUG pid-6235 A #240 pc 00000000000bd19c /system/lib64/libc.so (__libc_init+92)
2023-08-29 17:25:19.605 1473-1473 /system/bin/tombstoned tombstoned E Tombstone written to: /data/tombstones/tombstone_43
2023-08-29 17:25:19.607 1566-1586 BootReceiver system_server I Copying /data/tombstones/tombstone_43 to DropBox (SYSTEM_TOMBSTONE)
2023-08-29 17:25:19.614 1566-6238 ActivityManager system_server W Force finishing activity com.anou.solitaire/com.google.android.gms.ads.AdActivity
2023-08-29 17:25:19.616 1566-6238 ActivityManager system_server W Force finishing activity com.anou.solitaire/org.cocos2dx.javascript.AppActivity
2023-08-29 17:25:19.631 1431-1490 hwcomposer [email protected] D hw_composer sent 18 syncs in 139s
2023-08-29 17:25:19.633 1566-6238 HostConnection system_server I HostConnection::HostConnection: pid=1566, tid=6238, this=0x7fff509e1a60
2023-08-29 17:25:19.635 1566-6238 system_server I fastpipe: Connect success
2023-08-29 17:25:19.635 1566-6238 HostConnection system_server D HostRPC::connect sucess: app=system_server, pid=1566, tid=6238, this=0x7fff502e4d00
2023-08-29 17:25:19.635 1566-6238 HostConnection system_server D queryAndSetGLESMaxVersion select gles-version: 3.1 hostGLVersion:45 process:system_server
2023-08-29 17:25:19.637 1566-6238 WindowManager system_server D updateRotationUnchecked! mLastOrientation=-1 old-mRotation=3 old-mAltOrientation=false new-mRotation=0 new-mAltOrientation=false
2023-08-29 17:25:19.640 1566-5082 HostConnection system_server I HostConnection::HostConnection: pid=1566, tid=5082, this=0x7fff4cceb6c0
2023-08-29 17:25:19.640 1566-5082 system_server I fastpipe: Connect success
2023-08-29 17:25:19.641 1566-5082 HostConnection system_server D HostRPC::connect sucess: app=system_server, pid=1566, tid=5082, this=0x7fff4ae6b900
2023-08-29 17:25:19.641 1566-5082 HostConnection system_server D queryAndSetGLESMaxVersion select gles-version: 3.1 hostGLVersion:45 process:system_server
2023-08-29 17:25:19.641 1566-5082 ConfigStore system_server I android::hardware::configstore::V1_0::ISurfaceFlingerConfigs::hasWideColorDisplay retrieved: 0
2023-08-29 17:25:19.641 1566-5082 ConfigStore system_server I android::hardware::configstore::V1_0::ISurfaceFlingerConfigs::hasHDRDisplay retrieved: 0
2023-08-29 17:25:19.641 1566-5082 OpenGLRenderer system_server I Initialized EGL, version 1.4
2023-08-29 17:25:19.641 1566-5082 OpenGLRenderer system_server D Swap behavior 1
2023-08-29 17:25:19.641 1566-5082 EGL_adreno system_server I eglCreateContext request GLES major-version=2
2023-08-29 17:25:19.642 1566-6238 WindowManager system_server W performLayoutAndPlaceSurfacesLocked called while in layout. Callers=com.android.server.wm.WindowSurfacePlacer.performSurfacePlacement:155 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacement:145 com.android.server.wm.WindowManagerService.reconfigureDisplayLocked:5467
2023-08-29 17:25:19.646 1566-1647 InputDispatcher system_server W channel 'c67591f com.anou.solitaire/com.google.android.gms.ads.AdActivity (server)' ~ Consumer closed input channel or an error occurred. events=0x9
2023-08-29 17:25:19.646 1566-1647 InputDispatcher system_server E channel 'c67591f com.anou.solitaire/com.google.android.gms.ads.AdActivity (server)' ~ Channel is unrecoverably broken and will be disposed!
2023-08-29 17:25:19.647 1566-5082 EGL_adreno system_server D eglCreateContext: 0x7fff4cdb7760: maj 3 min 1 rcv 4
2023-08-29 17:25:19.653 1469-3293 OMXNodeInstance media.codec E !!! Observer died. Quickly, do something, ... anything...
2023-08-29 17:25:19.653 1469-1785 OMXNodeInstance media.codec E !!! Observer died. Quickly, do something, ... anything...
2023-08-29 17:25:19.654 1566-1647 InputDispatcher system_server W channel '5a2f157 com.anou.solitaire/org.cocos2dx.javascript.AppActivity (server)' ~ Consumer closed input channel or an error occurred. events=0x9
1970-01-01 08:00:00.000 0-0 I ---------------------------- PROCESS ENDED (5864) for package com.anou.solitaire ----------------------------
2023-08-29 17:25:19.654 1566-1647 InputDispatcher system_server E channel '5a2f157 com.anou.solitaire/org.cocos2dx.javascript.AppActivity (server)' ~ Channel is unrecoverably broken and will be disposed!
2023-08-29 17:25:19.660 1566-5082 EGL_adreno system_server D eglMakeCurrent: 0x7fff4cdb7760: ver 3 1 (tinfo 0x7fff4cc42de0)
2023-08-29 17:25:19.661 1396-1396 Zygote pid-1396 I Process 5864 exited due to signal (11)
2023-08-29 17:25:19.662 1566-6238 HostConnection system_server I HostConnection::~HostConnection, pid=1566, tid=6238, this=0x7fff509e1a60, m_stream=0x7fff502e4d00
2023-08-29 17:25:19.663 1566-6238 system_server I fastpipe: close connect
2023-08-29 17:25:19.667 1566-3310 WindowManager system_server I WIN DEATH: Window{c67591f u0 com.anou.solitaire/com.google.android.gms.ads.AdActivity}
2023-08-29 17:25:19.668 1450-1450 lowmemorykiller lmkd E Error opening /proc/5864/oom_score_adj; errno=2
2023-08-29 17:25:19.670 1450-1450 lowmemorykiller lmkd E Error writing /proc/5948/oom_score_adj; errno=22
2023-08-29 17:25:19.670 1566-3310 InputDispatcher system_server W Attempted to unregister already unregistered input channel 'c67591f com.anou.solitaire/com.google.android.gms.ads.AdActivity (server)'
2023-08-29 17:25:19.671 1566-5523 ConnectivityService system_server D ConnectivityService NetworkRequestInfo binderDied(NetworkRequest [ LISTEN id=47, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&FOREGROUND Unwanted: Uid: 10090] ], android.os.BinderProxy@88de8e9)
2023-08-29 17:25:19.671 1566-1576 ConnectivityService system_server D ConnectivityService NetworkRequestInfo binderDied(NetworkRequest [ TRACK_DEFAULT id=44, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Unwanted: Uid: 10090] ], android.os.BinderProxy@e99596e)
2023-08-29 17:25:19.671 1566-5083 ConnectivityService system_server D ConnectivityService NetworkRequestInfo binderDied(NetworkRequest [ TRACK_DEFAULT id=46, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Unwanted: Uid: 10090] ], android.os.BinderProxy@99ec80f)
2023-08-29 17:25:19.671 1566-4065 ConnectivityService system_server D ConnectivityService NetworkRequestInfo binderDied(NetworkRequest [ TRACK_DEFAULT id=45, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Unwanted: Uid: 10090] ], android.os.BinderProxy@429f09c)
2023-08-29 17:25:19.672 1734-1734 Zygote webview_zygote I Process 5948 exited cleanly (0)
2023-08-29 17:25:19.672 1566-5082 HostConnection system_server D ExtendedRCEncoderContext GL_VERSION return OpenGL ES 3.1
2023-08-29 17:25:19.675 1566-2024 WindowManager system_server I WIN DEATH: Window{5a2f157 u0 com.anou.solitaire/org.cocos2dx.javascript.AppActivity}
2023-08-29 17:25:19.675 1566-2024 InputDispatcher system_server W Attempted to unregister already unregistered input channel '5a2f157 com.anou.solitaire/org.cocos2dx.javascript.AppActivity (server)'
2023-08-29 17:25:19.676 1566-1589 DisplayManagerService system_server W Failed to notify process 5864 that displays changed, assuming it died.
android.os.DeadObjectException
at android.os.BinderProxy.transactNative(Native Method)
at android.os.BinderProxy.transact(Binder.java:1127)
at android.hardware.display.IDisplayManagerCallback$Stub$Proxy.onDisplayEvent(IDisplayManagerCallback.java:85)
at com.android.server.display.DisplayManagerService$CallbackRecord.notifyDisplayEventAsync(DisplayManagerService.java:1608)
at com.android.server.display.DisplayManagerService.deliverDisplayEvent(DisplayManagerService.java:1391)
at com.android.server.display.DisplayManagerService.access$400(DisplayManagerService.java:145)
at com.android.server.display.DisplayManagerService$DisplayManagerHandler.handleMessage(DisplayManagerService.java:1531)
at android.os.Handler.dispatchMessage(Handler.java:106)
at android.os.Looper.loop(Looper.java:193)
at android.os.HandlerThread.run(HandlerThread.java:65)
at com.android.server.ServiceThread.run(ServiceThread.java:44)
2023-08-29 17:25:19.677 1566-1589 DisplayManagerService system_server W Failed to notify process 5948 that displays changed, assuming it died.
android.os.DeadObjectException
at android.os.BinderProxy.transactNative(Native Method)
at android.os.BinderProxy.transact(Binder.java:1127)
at android.hardware.display.IDisplayManagerCallback$Stub$Proxy.onDisplayEvent(IDisplayManagerCallback.java:85)
at com.android.server.display.DisplayManagerService$CallbackRecord.notifyDisplayEventAsync(DisplayManagerService.java:1608)
at com.android.server.display.DisplayManagerService.deliverDisplayEvent(DisplayManagerService.java:1391)
at com.android.server.display.DisplayManagerService.access$400(DisplayManagerService.java:145)
at com.android.server.display.DisplayManagerService$DisplayManagerHandler.handleMessage(DisplayManagerService.java:1531)
at android.os.Handler.dispatchMessage(Handler.java:106)
at android.os.Looper.loop(Looper.java:193)
at android.os.HandlerThread.run(HandlerThread.java:65)
at com.android.server.ServiceThread.run(ServiceThread.java:44)
2023-08-29 17:25:19.678 1566-1577 ActivityManager system_server I Process com.android.webview:sandboxed_process0 (pid 5948) has died: vis +99TOP
2023-08-29 17:25:19.678 1566-1583 libprocessgroup system_server W Failed to open process cgroup uid 99008 pid 5948: No such file or directory
2023-08-29 17:25:19.678 1566-1583 libprocessgroup system_server E Error encountered killing process cgroup uid 99008 pid 5948: No such file or directory
2023-08-29 17:25:19.679 2136-2136 ContextImpl com.android.coreservice W Calling a method in the system process without a qualified user: android.app.ContextImpl.startService:1531 android.content.ContextWrapper.startService:664 android.content.ContextWrapper.startService:664 com.android.coreservice.CoreBroadcastReceiver.onReceive:69 android.app.ActivityThread.handleReceiver:3424
2023-08-29 17:25:19.679 1566-1577 ActivityManager system_server W Scheduling restart of crashed service com.anou.solitaire/org.chromium.content.app.SandboxedProcessService0 in 1000ms
2023-08-29 17:25:19.680 1566-5082 GLESv2_enc system_server W no support GL_NUM_PROGRAM_BINARY_FORMATS
2023-08-29 17:25:19.683 1566-1584 KernelCpuSpeedReader system_server E Failed to read cpu-freq: /sys/devices/system/cpu/cpu0/cpufreq/stats/time_in_state (No such file or directory)
2023-08-29 17:25:19.683 1566-1589 ActivityManager system_server I Config changes=20000480 {1.0 460mcc65535mnc [mzn_IR,es_ES,zh_CN,bas_CM] ldrtl sw600dp w1066dp h576dp 240dpi lrg long land finger qwerty/v/v -nav/h winConfig={ mBounds=Rect(0, 0 - 0, 0) mAppBounds=Rect(0, 0 - 1600, 900) mWindowingMode=fullscreen mActivityType=undefined} s.27}
2023-08-29 17:25:19.683 1566-1584 KernelWakelockReader system_server E neither /proc/wakelocks nor /d/wakeup_sources exists
2023-08-29 17:25:19.686 1705-1988 EGL_adreno com.android.systemui D eglMakeCurrent: 0x7fff6c03c940: ver 3 1 (tinfo 0x7fff6c070200)
2023-08-29 17:25:19.688 1566-1584 BatteryStatsImpl system_server W Couldn't get kernel wake lock stats
2023-08-29 17:25:19.692 1705-1988 EGL_adreno com.android.systemui E tid 1988: eglSurfaceAttrib(1338): error 0x3009 (EGL_BAD_MATCH)
2023-08-29 17:25:19.692 1705-1988 OpenGLRenderer com.android.systemui W Failed to set EGL_SWAP_BEHAVIOR on surface 0x7fff6c1a7100, error=EGL_BAD_MATCH
2023-08-29 17:25:19.695 1566-1589 ActivityManager system_server E Failed to schedule configuration change
android.os.DeadObjectException
at android.os.BinderProxy.transactNative(Native Method)
at android.os.BinderProxy.transact(Binder.java:1127)
at android.app.IApplicationThread$Stub$Proxy.scheduleTransaction(IApplicationThread.java:1777)
at android.app.servertransaction.ClientTransaction.schedule(ClientTransaction.java:129)
at com.android.server.am.ClientLifecycleManager.scheduleTransaction(ClientLifecycleManager.java:47)
at com.android.server.am.ClientLifecycleManager.scheduleTransaction(ClientLifecycleManager.java:100)
at com.android.server.am.ActivityManagerService.updateGlobalConfigurationLocked(ActivityManagerService.java:22988)
at com.android.server.am.ActivityManagerService.updateDisplayOverrideConfigurationLocked(ActivityManagerService.java:23101)
at com.android.server.am.ActivityManagerService.updateDisplayOverrideConfiguration(ActivityManagerService.java:23067)
at com.android.server.wm.WindowManagerService.sendNewConfiguration(WindowManagerService.java:4421)
at com.android.server.wm.WindowManagerService$H.handleMessage(WindowManagerService.java:4872)
at android.os.Handler.dispatchMessage(Handler.java:106)
at android.os.Looper.loop(Looper.java:193)
at android.os.HandlerThread.run(HandlerThread.java:65)
at com.android.server.ServiceThread.run(ServiceThread.java:44)
2023-08-29 17:25:19.703 2264-2264 AndroidAutoSize com.android.flysilkworm D initScaledDensity = 1.5 on ConfigurationChanged
2023-08-29 17:25:19.705 1566-1589 ActivityManager system_server I Override config changes=20000480 {1.0 460mcc65535mnc [mzn_IR,es_ES,zh_CN,bas_CM] ldrtl sw600dp w1066dp h576dp 240dpi lrg long land finger qwerty/v/v -nav/h winConfig={ mBounds=Rect(0, 0 - 1600, 900) mAppBounds=Rect(0, 0 - 1600, 900) mWindowingMode=fullscreen mActivityType=undefined} s.27} for displayId=0
2023-08-29 17:25:19.715 1566-1783 ActivityManager system_server I Process com.anou.solitaire (pid 5864) has died: vis +99TOP
2023-08-29 17:25:19.715 1566-1583 libprocessgroup system_server W kill(-5864, 9) failed: No such process
辛苦帮忙看看,谢谢!

@UniqueDisplayNameIsInUse

image
检查下代码总是否有访问空指针的情况。
建议去论坛发个帖子问问。

@anou2023
Copy link
Author

检查了代码,没有空指针,播放视频后不交互是没问题,一交互就会闪退,这个项目比较急……。辛苦您了!

@UniqueDisplayNameIsInUse

image

这里可以看到问题是执行某些js时出错了。
可以跟踪下这里的堆栈调用查看哪里出问题。

@anou2023
Copy link
Author

// 广告结束
notifyAdFinished: function(data) {
console.log("Ad finished with data: " + data,this.onAdFinished);
this.onAdFinished.emit("onAdFinished",data);
}
这个是调用的JS里的接口,不播放视频这个接口是可以正常调用的呢

@anou2023
Copy link
Author

anou2023 commented Sep 1, 2023

image
您好,请教个问题,我在启用自定义插件时报404错误,请问是什么原因导致的?辛苦了!

@anou2023
Copy link
Author

anou2023 commented Sep 1, 2023

这个项目是我从cocos商城购买的

@UniqueDisplayNameIsInUse

你好,插件问题可以找 Store 的客服人员帮忙解决

方法如下

在 Store 的个人中心找到帮助文档
image

在文档中找到如下的地址:
image

@anou2023
Copy link
Author

anou2023 commented Sep 1, 2023

我联系了作者,但这个问题好像是引擎方面的问题呢

@anou2023
Copy link
Author

anou2023 commented Sep 1, 2023

您好,后面启用自定义插件弹出来了,填了信息提交后再点击就会闪一下弹框,还是没打开自定义。请问是什么原因呢?

@UniqueDisplayNameIsInUse

非文档问题,此issue关闭

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants