Advertisement
Guest User

Untitled

a guest
Dec 1st, 2020
60
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 12.67 KB | None | 0 0
  1. *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
  2. pid: 0, tid: 0 >>> ***.******.*** <<<
  3.  
  4. backtrace:
  5. #00 pc 0000000000022988 /system/lib64/libc.so (abort+116)
  6. #00 pc 0000000000047694 /system/lib64/libc++.so (abort_message+248)
  7. #00 pc 00000000000477b0 /system/lib64/libc++.so (demangling_terminate_handler()+44)
  8. #00 pc 0000000000059f3c /system/lib64/libc++.so (std::__terminate(void (*)())+12)
  9. #00 pc 0000000000059fc4 /system/lib64/libc++.so (std::terminate()+72)
  10. #00 pc 00000000000b2380 /system/lib64/libc++.so (std::__1::thread::~thread()+20)
  11. #00 pc 000000000008626c /system/lib64/libc.so (__cxa_finalize+196)
  12. #00 pc 000000000001c798 /system/lib64/libc.so (exit+24)
  13. #00 pc 000000000001cd9c /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/liblua.so (offset 0x3f1000) (os_exit) (SourceCode: /Users/runner/work/corona/corona/external/lua-5.1.3/src/loslib.c:221)
  14. #00 pc 000000000001380c /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/liblua.so (offset 0x3f1000) (luaD_precall) (SourceCode: /Users/runner/work/corona/corona/external/lua-5.1.3/src/ldo.c:340)
  15. #00 pc 00000000000288f8 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/liblua.so (offset 0x3f1000) (luaV_execute) (SourceCode: /Users/runner/work/corona/corona/external/lua-5.1.3/src/lvm.c:595)
  16. #00 pc 0000000000013e14 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/liblua.so (offset 0x3f1000) (luaD_call) (SourceCode: /Users/runner/work/corona/corona/external/lua-5.1.3/src/ldo.c:398)
  17. #00 pc 000000000001314c /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/liblua.so (offset 0x3f1000) (luaD_rawrunprotected) (SourceCode: /Users/runner/work/corona/corona/external/lua-5.1.3/src/ldo.c:135)
  18. #00 pc 000000000001413c /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/liblua.so (offset 0x3f1000) (luaD_pcall) (SourceCode: /Users/runner/work/corona/corona/external/lua-5.1.3/src/ldo.c:484)
  19. #00 pc 000000000000a3a4 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/liblua.so (offset 0x3f1000) (lua_pcall) (SourceCode: /Users/runner/work/corona/corona/external/lua-5.1.3/src/lapi.c:821)
  20. #00 pc 00000000000e8008 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/libcorona.so (offset 0x41000) (Rtt::LuaContext::DoCall(lua_State*, int, int)) (SourceCode: /Users/runner/work/corona/corona/librtt/Rtt_LuaContext.cpp:896)
  21. #00 pc 000000000011b098 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/libcorona.so (offset 0x41000) (Rtt::Runtime::DispatchEvent(Rtt::MEvent const&)) (SourceCode: /Users/runner/work/corona/corona/librtt/Rtt_Runtime.cpp:1678)
  22. #00 pc 000000000011954c /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/libcorona.so (offset 0x41000) (Rtt::Runtime::OnSystemEvent(Rtt::SystemEvent::_Type)) (SourceCode: /Users/runner/work/corona/corona/librtt/Rtt_Runtime.cpp:1423)
  23. #00 pc 000000000011954c /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/libcorona.so (offset 0x41000) (Rtt::Runtime::~Runtime()) (SourceCode: /Users/runner/work/corona/corona/librtt/Rtt_Runtime.cpp:219)
  24. #00 pc 0000000000119738 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/libcorona.so (offset 0x41000) (Rtt::Runtime::~Runtime()) (SourceCode: /Users/runner/work/corona/corona/librtt/Rtt_Runtime.cpp:212)
  25. #00 pc 0000000000041698 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/libcorona.so (offset 0x41000) (JavaToNativeBridge::Deinit()) (SourceCode: /Users/runner/work/corona/corona/platform/android/ndk/jni/JavaToNativeBridge.cpp:285)
  26. #00 pc 0000000000046830 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/split_config.arm64_v8a.apk!lib/arm64-v8a/libcorona.so (offset 0x41000) (Java_com_ansca_corona_JavaToNativeShim_nativeDone) (SourceCode: /Users/runner/work/corona/corona/platform/android/ndk/jni/JavaToNativeShim.cpp:212)
  27. #00 pc 000000000001f0b8 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/oat/arm64/base.odex (offset 0x1f000) (com.ansca.corona.JavaToNativeShim.nativeAbortShowingImageProvider [DEDUPED]+152)
  28. #00 pc 000000000058024c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
  29. #00 pc 00000000000d8628 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
  30. #00 pc 000000000028cec8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
  31. #00 pc 0000000000286ed0 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
  32. #00 pc 0000000000548984 /system/lib64/libart.so (MterpInvokeStatic+204)
  33. #00 pc 0000000000572694 /system/lib64/libart.so (ExecuteMterpImpl+14612)
  34. #00 pc 0000000000049136 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/oat/arm64/base.vdex (com.ansca.corona.JavaToNativeShim.destroy+14)
  35. #00 pc 0000000000260bd4 /system/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool) (.llvm.2850692617)+488)
  36. #00 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
  37. #00 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
  38. #00 pc 0000000000548984 /system/lib64/libart.so (MterpInvokeStatic+204)
  39. #00 pc 0000000000572694 /system/lib64/libart.so (ExecuteMterpImpl+14612)
  40. #00 pc 0000000000040aa6 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/oat/arm64/base.vdex (com.ansca.corona.Controller.destroy+66)
  41. #00 pc 0000000000260bd4 /system/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool) (.llvm.2850692617)+488)
  42. #00 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
  43. #00 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
  44. #00 pc 000000000054a4c8 /system/lib64/libart.so (MterpInvokeVirtualQuick+584)
  45. #00 pc 0000000000576294 /system/lib64/libart.so (ExecuteMterpImpl+29972)
  46. #00 pc 0000000000045666 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/oat/arm64/base.vdex (com.ansca.corona.CoronaRuntime.dispose+46)
  47. #00 pc 0000000000260bd4 /system/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool) (.llvm.2850692617)+488)
  48. #00 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
  49. #00 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
  50. #00 pc 000000000054a4c8 /system/lib64/libart.so (MterpInvokeVirtualQuick+584)
  51. #00 pc 0000000000576294 /system/lib64/libart.so (ExecuteMterpImpl+29972)
  52. #00 pc 00000000000426f8 /data/app/***.******.***-4yPgOFZ3TBWBWfE_ub8-AQ==/oat/arm64/base.vdex (com.ansca.corona.CoronaActivity.onDestroy+50)
  53. #00 pc 0000000000260bd4 /system/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool) (.llvm.2850692617)+488)
  54. #00 pc 0000000000533414 /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
  55. #00 pc 00000000005890fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
  56. #00 pc 0000000000b66ab4 /system/framework/arm64/boot-framework.oat (offset 0x415000) (android.app.Activity.performDestroy+148)
  57. #00 pc 0000000000818aa4 /system/framework/arm64/boot-framework.oat (offset 0x415000) (android.app.Instrumentation.callActivityOnDestroy+52)
  58. #00 pc 00000000009517a8 /system/framework/arm64/boot-framework.oat (offset 0x415000) (android.app.ActivityThread.performDestroyActivity+1064)
  59. #00 pc 000000000094c92c /system/framework/arm64/boot-framework.oat (offset 0x415000) (android.app.ActivityThread.handleDestroyActivity+92)
  60. #00 pc 0000000000b8e748 /system/framework/arm64/boot-framework.oat (offset 0x415000) (android.app.servertransaction.DestroyActivityItem.execute+136)
  61. #00 pc 000000000083be50 /system/framework/arm64/boot-framework.oat (offset 0x415000) (android.app.servertransaction.TransactionExecutor.executeLifecycleState+416)
  62. #00 pc 000000000083c4e0 /system/framework/arm64/boot-framework.oat (offset 0x415000) (android.app.servertransaction.TransactionExecutor.execute+304)
  63. #00 pc 0000000000934928 /system/framework/arm64/boot-framework.oat (offset 0x415000) (android.app.ActivityThread$H.handleMessage+1720)
  64. #00 pc 0000000000baf2e4 /system/framework/arm64/boot-framework.oat (offset 0x415000) (android.os.Handler.dispatchMessage+180)
  65. #00 pc 0000000000bb2750 /system/framework/arm64/boot-framework.oat (offset 0x415000) (android.os.Looper.loop+1472)
  66. #00 pc 0000000000945754 /system/framework/arm64/boot-framework.oat (offset 0x415000) (android.app.ActivityThread.main+1236)
  67. #00 pc 000000000058024c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
  68. #00 pc 00000000000d8628 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
  69. #00 pc 000000000047ac6c /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
  70. #00 pc 000000000047c6c0 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
  71. #00 pc 000000000040be28 /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52)
  72. #00 pc 00000000001456d4 /system/framework/arm64/boot.oat (offset 0x13b000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
  73. #00 pc 0000000000edc878 /system/framework/arm64/boot-framework.oat (offset 0x415000) (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136)
  74. #00 pc 0000000000ee389c /system/framework/arm64/boot-framework.oat (offset 0x415000) (com.android.internal.os.ZygoteInit.main+2540)
  75. #00 pc 000000000058024c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
  76. #00 pc 00000000000d8628 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
  77. #00 pc 000000000047ac6c /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
  78. #00 pc 000000000047a8cc /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+424)
  79. #00 pc 0000000000370200 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+660)
  80. #00 pc 00000000000b9bcc /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120)
  81. #00 pc 00000000000bc944 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+780)
  82. #00 pc 0000000000002368 /system/bin/app_process64 (main+1444)
  83. #00 pc 00000000000ae7e4 /system/lib64/libc.so (__libc_init+88)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement