Opentok Android-适用于BUILD版本,但不适用于RELEASE版本

时间:2020-10-07 14:41:40

标签: php android opentok

我正在创建一个视频聊天应用程序,我希望用户从该网站和android应用程序中调用该应用程序。我在网站服务器上创建会话,并通过REST API将sessionId发送到android应用。

这是php会话创建代码:

$opentok = new OpenTok(API_KEY_OPENTOK, API_SECRET_OPENTOK);

// Create a session that attempts to use peer-to-peer streaming:
$session = $opentok->createSession();


// Store this sessionId in the database for later use
$sessionId = $session->getSessionId();


// Generate a Token from just a sessionId (fetched from a database)
$token = $opentok->generateToken($sessionId);

然后,此代码将被传递到应该连接到会话的android设备。

这是android代码:

mSession = new Session.Builder(MakeCallActivity.this, String.valueOf(API_KEY), sessionId).build();
mSession.setSessionListener(MakeCallActivity.this);
mSession.connect(token);

问题在于,它可以在应用程序的BUILD版本上运行,但在应用程序的发行版上崩溃,并且我不明白为什么。这是崩溃的堆栈跟踪:

--------- beginning of crash
2020-10-07 17:31:53.996 2851-2962/? E/NativeSemDvfsCpuManager: release:: Start
2020-10-07 17:31:53.996 2851-2962/? E/NativeSemDvfsCpuManager: release():: mIsAcquired = 1 , mName = CPU  , mTagName : AudioFlinger 
2020-10-07 17:31:53.998 2851-2962/? E/NativeCustomFrequencyManager: [NativeCFMS] BpCustomFrequencyManager::releaseDVFSLock() 
2020-10-07 17:31:53.998 2851-2962/? E/NativeSemDvfsCpuManager: release:: End
2020-10-07 17:31:54.039 3009-3140/? E/IptablesRestoreController: [iptables debug]iptables-restore execute *filter
    -D fw_powersave -m owner --uid-owner 10052 -j RETURN
    COMMIT
2020-10-07 17:31:54.052 3009-3140/? E/IptablesRestoreController: [iptables debug]iptables-restore execute done, res : 0
2020-10-07 17:31:54.133 14639-14639/? E/crash_dump32: unknown process state: t
2020-10-07 17:31:54.239 14639-14639/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2020-10-07 17:31:54.240 14639-14639/? A/DEBUG: Build fingerprint: 'samsung/j5y17ltexx/j5y17lte:9/PPR1.180610.011/J530FXWS7CTF4:user/release-keys'
2020-10-07 17:31:54.240 14639-14639/? A/DEBUG: Revision: '7'
2020-10-07 17:31:54.240 14639-14639/? A/DEBUG: ABI: 'arm'
2020-10-07 17:31:54.240 14639-14639/? A/DEBUG: pid: 13928, tid: 13928, name: com.hallar.app  >>> com.hallar.app <<<
2020-10-07 17:31:54.240 14639-14639/? A/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
2020-10-07 17:31:54.241 14639-14639/? A/DEBUG:     r0  00000000  r1  00003668  r2  00000006  r3  00000008
2020-10-07 17:31:54.241 14639-14639/? A/DEBUG:     r4  00003668  r5  00003668  r6  fffea52c  r7  0000010c
2020-10-07 17:31:54.241 14639-14639/? A/DEBUG:     r8  b7a002f1  r9  b7a797b4  r10 b79e0106  r11 b79e0143
2020-10-07 17:31:54.241 14639-14639/? A/DEBUG:     ip  00000041  sp  fffea518  lr  ec77004d  pc  ec766f4a
2020-10-07 17:31:54.544 2851-2962/? E/NativeSemDvfsCpuManager: acquire:: Start
2020-10-07 17:31:54.544 2851-2962/? E/NativeSemDvfsCpuManager: acquire:: timeout = -1 mIsAcquired = 0  mTagName : AudioFlinger 
2020-10-07 17:31:54.545 2851-2962/? E/NativeCustomFrequencyManager: [NativeCFMS] BpCustomFrequencyManager::acquireDVFSLock() 
2020-10-07 17:31:54.545 2851-2962/? E/NativeSemDvfsCpuManager: acquire:: End
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: backtrace:
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #00 pc 0001cf4a  /system/lib/libc.so (abort+58)
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #01 pc 001ab88d  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #02 pc 00297ce7  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #03 pc 00297e43  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #04 pc 00298689  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #05 pc 002985ab  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #06 pc 002985e9  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #07 pc 00129068  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #08 pc 0008f92c  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so (otc_init+48)
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #09 pc 00072f54  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #10 pc 000756d0  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #11 pc 000441af  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.odex (offset 0x43000) (com.opentok.android.v3.Session.initNative+222)
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG:     #12 pc 00421575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #13 pc 003f9b41  /system/lib/libart.so (art_quick_invoke_stub+224)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #14 pc 000a180d  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #15 pc 001ecedb  /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+230)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #16 pc 001e8a51  /system/lib/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+800)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #17 pc 003f68c7  /system/lib/libart.so (MterpInvokeDirectRange+170)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #18 pc 00414714  /system/lib/libart.so (ExecuteMterpImpl+15252)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #19 pc 0051e9a4  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (com.opentok.android.v3.Session.<init>+224)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #20 pc 001cc457  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #21 pc 001d0d8f  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #22 pc 001e8a37  /system/lib/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+774)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #23 pc 003f68c7  /system/lib/libart.so (MterpInvokeDirectRange+170)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #24 pc 00414714  /system/lib/libart.so (ExecuteMterpImpl+15252)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #25 pc 0051de80  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (com.opentok.android.v3.Session$Builder.build+92)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #26 pc 001cc457  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #27 pc 001d0d8f  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG:     #28 pc 001e7b3f  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+762)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #29 pc 003f6c43  /system/lib/libart.so (MterpInvokeVirtualQuick+434)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #30 pc 00418094  /system/lib/libart.so (ExecuteMterpImpl+29972)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #31 pc 0050dc62  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (com.opentok.android.Session.<init>+514)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #32 pc 001cc457  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #33 pc 001d0d8f  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #34 pc 001e8a37  /system/lib/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+774)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #35 pc 003f68c7  /system/lib/libart.so (MterpInvokeDirectRange+170)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #36 pc 00414714  /system/lib/libart.so (ExecuteMterpImpl+15252)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #37 pc 0050d4f6  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (com.opentok.android.Session$Builder.build+50)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #38 pc 001cc457  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #39 pc 001d0d8f  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #40 pc 001e7b3f  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+762)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #41 pc 003f6c43  /system/lib/libart.so (MterpInvokeVirtualQuick+434)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #42 pc 00418094  /system/lib/libart.so (ExecuteMterpImpl+29972)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #43 pc 004d7708  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (com.hallar.app.MakeCallActivity$a.a+192)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #44 pc 001cc457  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #45 pc 001d0d8f  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #46 pc 001e7b3f  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+762)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #47 pc 003f6c43  /system/lib/libart.so (MterpInvokeVirtualQuick+434)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG:     #48 pc 00418094  /system/lib/libart.so (ExecuteMterpImpl+29972)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #49 pc 004ce14c  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (com.hallar.app.v1.a+8)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #50 pc 001cc457  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #51 pc 001d0d8f  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #52 pc 001e7b3f  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+762)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #53 pc 003f53b9  /system/lib/libart.so (MterpInvokeInterface+1024)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #54 pc 00414514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #55 pc 00268088  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (c.a.a.w.o.c+16)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #56 pc 001cc457  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #57 pc 001d0d8f  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #58 pc 001e7b3f  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+762)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #59 pc 003f6c43  /system/lib/libart.so (MterpInvokeVirtualQuick+434)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #60 pc 00418094  /system/lib/libart.so (ExecuteMterpImpl+29972)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #61 pc 00268060  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (c.a.a.w.o.a+4)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #62 pc 001cc457  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #63 pc 001d0d8f  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #64 pc 001e7b3f  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+762)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG:     #65 pc 003f6c43  /system/lib/libart.so (MterpInvokeVirtualQuick+434)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #66 pc 00418094  /system/lib/libart.so (ExecuteMterpImpl+29972)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #67 pc 00263bc4  /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (c.a.a.f$b.run+60)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #68 pc 001cc457  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #69 pc 001d0cdb  /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #70 pc 003e8083  /system/lib/libart.so (artQuickToInterpreterBridge+882)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #71 pc 00425aff  /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #72 pc 00983809  /system/framework/arm/boot-framework.oat (offset 0x401000) (android.os.Handler.dispatchMessage+64)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #73 pc 00985f5b  /system/framework/arm/boot-framework.oat (offset 0x401000) (android.os.Looper.loop+1162)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #74 pc 007dce33  /system/framework/arm/boot-framework.oat (offset 0x401000) (android.app.ActivityThread.main+690)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #75 pc 00421575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #76 pc 003f9c43  /system/lib/libart.so (art_quick_invoke_static_stub+222)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #77 pc 000a181f  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #78 pc 00358111  /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #79 pc 00359563  /system/lib/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned int)+962)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #80 pc 003080a9  /system/lib/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+40)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #81 pc 0011328f  /system/framework/arm/boot.oat (offset 0x10d000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+110)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #82 pc 00bdd9c3  /system/framework/arm/boot-framework.oat (offset 0x401000) (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+114)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #83 pc 00be3561  /system/framework/arm/boot-framework.oat (offset 0x401000) (com.android.internal.os.ZygoteInit.main+2016)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #84 pc 00421575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #85 pc 003f9c43  /system/lib/libart.so (art_quick_invoke_static_stub+222)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG:     #86 pc 000a181f  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG:     #87 pc 00358111  /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG:     #88 pc 00357f25  /system/lib/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+300)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG:     #89 pc 002992a9  /system/lib/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+476)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG:     #90 pc 00071c33  /system/lib/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+38)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG:     #91 pc 000740df  /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+478)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG:     #92 pc 00002f35  /system/bin/app_process32 (main+728)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG:     #93 pc 0008dccd  /system/lib/libc.so (__libc_init+48)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG:     #94 pc 00002c1d  /system/bin/app_process32 (_start_main+40)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG:     #95 pc 00000306  <anonymous:ed14f000>``` 

0 个答案:

没有答案