我正在创建一个视频聊天应用程序,我希望用户从该网站和android应用程序中调用该应用程序。我在网站服务器上创建会话,并通过REST API将sessionId发送到android应用。
这是php会话创建代码:
$opentok = new OpenTok(API_KEY_OPENTOK, API_SECRET_OPENTOK);
// Create a session that attempts to use peer-to-peer streaming:
$session = $opentok->createSession();
// Store this sessionId in the database for later use
$sessionId = $session->getSessionId();
// Generate a Token from just a sessionId (fetched from a database)
$token = $opentok->generateToken($sessionId);
然后,此代码将被传递到应该连接到会话的android设备。
这是android代码:
mSession = new Session.Builder(MakeCallActivity.this, String.valueOf(API_KEY), sessionId).build();
mSession.setSessionListener(MakeCallActivity.this);
mSession.connect(token);
问题在于,它可以在应用程序的BUILD版本上运行,但在应用程序的发行版上崩溃,并且我不明白为什么。这是崩溃的堆栈跟踪:
--------- beginning of crash
2020-10-07 17:31:53.996 2851-2962/? E/NativeSemDvfsCpuManager: release:: Start
2020-10-07 17:31:53.996 2851-2962/? E/NativeSemDvfsCpuManager: release():: mIsAcquired = 1 , mName = CPU , mTagName : AudioFlinger
2020-10-07 17:31:53.998 2851-2962/? E/NativeCustomFrequencyManager: [NativeCFMS] BpCustomFrequencyManager::releaseDVFSLock()
2020-10-07 17:31:53.998 2851-2962/? E/NativeSemDvfsCpuManager: release:: End
2020-10-07 17:31:54.039 3009-3140/? E/IptablesRestoreController: [iptables debug]iptables-restore execute *filter
-D fw_powersave -m owner --uid-owner 10052 -j RETURN
COMMIT
2020-10-07 17:31:54.052 3009-3140/? E/IptablesRestoreController: [iptables debug]iptables-restore execute done, res : 0
2020-10-07 17:31:54.133 14639-14639/? E/crash_dump32: unknown process state: t
2020-10-07 17:31:54.239 14639-14639/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2020-10-07 17:31:54.240 14639-14639/? A/DEBUG: Build fingerprint: 'samsung/j5y17ltexx/j5y17lte:9/PPR1.180610.011/J530FXWS7CTF4:user/release-keys'
2020-10-07 17:31:54.240 14639-14639/? A/DEBUG: Revision: '7'
2020-10-07 17:31:54.240 14639-14639/? A/DEBUG: ABI: 'arm'
2020-10-07 17:31:54.240 14639-14639/? A/DEBUG: pid: 13928, tid: 13928, name: com.hallar.app >>> com.hallar.app <<<
2020-10-07 17:31:54.240 14639-14639/? A/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
2020-10-07 17:31:54.241 14639-14639/? A/DEBUG: r0 00000000 r1 00003668 r2 00000006 r3 00000008
2020-10-07 17:31:54.241 14639-14639/? A/DEBUG: r4 00003668 r5 00003668 r6 fffea52c r7 0000010c
2020-10-07 17:31:54.241 14639-14639/? A/DEBUG: r8 b7a002f1 r9 b7a797b4 r10 b79e0106 r11 b79e0143
2020-10-07 17:31:54.241 14639-14639/? A/DEBUG: ip 00000041 sp fffea518 lr ec77004d pc ec766f4a
2020-10-07 17:31:54.544 2851-2962/? E/NativeSemDvfsCpuManager: acquire:: Start
2020-10-07 17:31:54.544 2851-2962/? E/NativeSemDvfsCpuManager: acquire:: timeout = -1 mIsAcquired = 0 mTagName : AudioFlinger
2020-10-07 17:31:54.545 2851-2962/? E/NativeCustomFrequencyManager: [NativeCFMS] BpCustomFrequencyManager::acquireDVFSLock()
2020-10-07 17:31:54.545 2851-2962/? E/NativeSemDvfsCpuManager: acquire:: End
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: backtrace:
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #00 pc 0001cf4a /system/lib/libc.so (abort+58)
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #01 pc 001ab88d /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #02 pc 00297ce7 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #03 pc 00297e43 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #04 pc 00298689 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #05 pc 002985ab /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #06 pc 002985e9 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #07 pc 00129068 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #08 pc 0008f92c /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so (otc_init+48)
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #09 pc 00072f54 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #10 pc 000756d0 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/lib/arm/libopentok.so
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #11 pc 000441af /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.odex (offset 0x43000) (com.opentok.android.v3.Session.initNative+222)
2020-10-07 17:31:54.587 14639-14639/? A/DEBUG: #12 pc 00421575 /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #13 pc 003f9b41 /system/lib/libart.so (art_quick_invoke_stub+224)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #14 pc 000a180d /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #15 pc 001ecedb /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+230)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #16 pc 001e8a51 /system/lib/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+800)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #17 pc 003f68c7 /system/lib/libart.so (MterpInvokeDirectRange+170)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #18 pc 00414714 /system/lib/libart.so (ExecuteMterpImpl+15252)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #19 pc 0051e9a4 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (com.opentok.android.v3.Session.<init>+224)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #20 pc 001cc457 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #21 pc 001d0d8f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #22 pc 001e8a37 /system/lib/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+774)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #23 pc 003f68c7 /system/lib/libart.so (MterpInvokeDirectRange+170)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #24 pc 00414714 /system/lib/libart.so (ExecuteMterpImpl+15252)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #25 pc 0051de80 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (com.opentok.android.v3.Session$Builder.build+92)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #26 pc 001cc457 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #27 pc 001d0d8f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.588 14639-14639/? A/DEBUG: #28 pc 001e7b3f /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+762)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #29 pc 003f6c43 /system/lib/libart.so (MterpInvokeVirtualQuick+434)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #30 pc 00418094 /system/lib/libart.so (ExecuteMterpImpl+29972)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #31 pc 0050dc62 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (com.opentok.android.Session.<init>+514)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #32 pc 001cc457 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #33 pc 001d0d8f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #34 pc 001e8a37 /system/lib/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+774)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #35 pc 003f68c7 /system/lib/libart.so (MterpInvokeDirectRange+170)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #36 pc 00414714 /system/lib/libart.so (ExecuteMterpImpl+15252)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #37 pc 0050d4f6 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (com.opentok.android.Session$Builder.build+50)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #38 pc 001cc457 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #39 pc 001d0d8f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #40 pc 001e7b3f /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+762)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #41 pc 003f6c43 /system/lib/libart.so (MterpInvokeVirtualQuick+434)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #42 pc 00418094 /system/lib/libart.so (ExecuteMterpImpl+29972)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #43 pc 004d7708 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (com.hallar.app.MakeCallActivity$a.a+192)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #44 pc 001cc457 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #45 pc 001d0d8f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #46 pc 001e7b3f /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+762)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #47 pc 003f6c43 /system/lib/libart.so (MterpInvokeVirtualQuick+434)
2020-10-07 17:31:54.589 14639-14639/? A/DEBUG: #48 pc 00418094 /system/lib/libart.so (ExecuteMterpImpl+29972)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #49 pc 004ce14c /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (com.hallar.app.v1.a+8)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #50 pc 001cc457 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #51 pc 001d0d8f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #52 pc 001e7b3f /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+762)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #53 pc 003f53b9 /system/lib/libart.so (MterpInvokeInterface+1024)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #54 pc 00414514 /system/lib/libart.so (ExecuteMterpImpl+14740)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #55 pc 00268088 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (c.a.a.w.o.c+16)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #56 pc 001cc457 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #57 pc 001d0d8f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #58 pc 001e7b3f /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+762)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #59 pc 003f6c43 /system/lib/libart.so (MterpInvokeVirtualQuick+434)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #60 pc 00418094 /system/lib/libart.so (ExecuteMterpImpl+29972)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #61 pc 00268060 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (c.a.a.w.o.a+4)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #62 pc 001cc457 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #63 pc 001d0d8f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #64 pc 001e7b3f /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+762)
2020-10-07 17:31:54.590 14639-14639/? A/DEBUG: #65 pc 003f6c43 /system/lib/libart.so (MterpInvokeVirtualQuick+434)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #66 pc 00418094 /system/lib/libart.so (ExecuteMterpImpl+29972)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #67 pc 00263bc4 /data/app/com.hallar.app-SOM2K08v26FkbtY0UnZJzw==/oat/arm/base.vdex (c.a.a.f$b.run+60)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #68 pc 001cc457 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3949094868+354)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #69 pc 001d0cdb /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #70 pc 003e8083 /system/lib/libart.so (artQuickToInterpreterBridge+882)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #71 pc 00425aff /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #72 pc 00983809 /system/framework/arm/boot-framework.oat (offset 0x401000) (android.os.Handler.dispatchMessage+64)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #73 pc 00985f5b /system/framework/arm/boot-framework.oat (offset 0x401000) (android.os.Looper.loop+1162)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #74 pc 007dce33 /system/framework/arm/boot-framework.oat (offset 0x401000) (android.app.ActivityThread.main+690)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #75 pc 00421575 /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #76 pc 003f9c43 /system/lib/libart.so (art_quick_invoke_static_stub+222)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #77 pc 000a181f /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #78 pc 00358111 /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #79 pc 00359563 /system/lib/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned int)+962)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #80 pc 003080a9 /system/lib/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+40)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #81 pc 0011328f /system/framework/arm/boot.oat (offset 0x10d000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+110)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #82 pc 00bdd9c3 /system/framework/arm/boot-framework.oat (offset 0x401000) (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+114)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #83 pc 00be3561 /system/framework/arm/boot-framework.oat (offset 0x401000) (com.android.internal.os.ZygoteInit.main+2016)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #84 pc 00421575 /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #85 pc 003f9c43 /system/lib/libart.so (art_quick_invoke_static_stub+222)
2020-10-07 17:31:54.591 14639-14639/? A/DEBUG: #86 pc 000a181f /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG: #87 pc 00358111 /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG: #88 pc 00357f25 /system/lib/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+300)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG: #89 pc 002992a9 /system/lib/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+476)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG: #90 pc 00071c33 /system/lib/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+38)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG: #91 pc 000740df /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+478)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG: #92 pc 00002f35 /system/bin/app_process32 (main+728)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG: #93 pc 0008dccd /system/lib/libc.so (__libc_init+48)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG: #94 pc 00002c1d /system/bin/app_process32 (_start_main+40)
2020-10-07 17:31:54.592 14639-14639/? A/DEBUG: #95 pc 00000306 <anonymous:ed14f000>```