Flutchat icon indicating copy to clipboard operation
Flutchat copied to clipboard

Android Release Build Crash

Open harshit-prog opened this issue 5 years ago • 3 comments

This is the stack trace when I tried to connect the call.

No pending exception expected: java.lang.ClassNotFoundException: Didn't find class "com.opentok.android.v3.Session$Capabilities" on path: DexPathList[[zip file "/data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/base.apk"],nativeLibraryDirectories=[/data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/lib/arm64, /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/base.apk!/lib/arm64-v8a, /system/lib64]]

2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: Build fingerprint: 'xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.3.0.PEIMIXM:user/release-keys' 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: Revision: '0' 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: ABI: 'arm64' 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: pid: 11059, tid: 11059, name: m.example.Cx360 >>> com.example.Cx360 <<< 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr -------- 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: Abort message: 'thread.cc:2165] No pending exception expected: java.lang.ClassNotFoundException: Didn't find class "com.opentok.android.v3.Session$Capabilities" on path: DexPathList[[zip file "/data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/base.apk"],nativeLibraryDirectories=[/data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/lib/arm64, /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/base.apk!/lib/arm64-v8a, /system/lib64]]' 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x0 0000000000000000 x1 0000000000002b33 x2 0000000000000006 x3 0000000000000008 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x4 000024393f4f282a x5 000024393f4f282a x6 000024393f4f282a x7 2a284f3f3924ffff 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x8 0000000000000083 x9 ce7ce6939b3fb02a x10 0000000000000000 x11 fffffffc7ffffbdf 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x12 0000000000000001 x13 ffffffffffffffff x14 ffff000000000000 x15 ffffffffffffffff 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x16 00000079cab4f2b0 x17 00000079caa6ecd0 x18 0000000000000010 x19 0000000000002b33 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x20 0000000000002b33 x21 0000007939d50100 x22 0000000000000058 x23 00000079491a0608 2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x24 0000000000000058 x25 0000007fc5a07c89 x26 000000000000005b x27 00000079cf61a5e0 2020-04-06 19:18:15.764 11158-11158/? A/DEBUG: x28 00000079cf61a5e0 x29 0000007fc5a07bf0 2020-04-06 19:18:15.764 11158-11158/? A/DEBUG: sp 0000007fc5a07bb0 lr 00000079caa62144 pc 00000079caa6216c 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: backtrace: 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #00 pc 000000000002216c /system/lib64/libc.so (abort+116) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #01 pc 0000000000465684 /system/lib64/libart.so (art::Runtime::Abort(char const*)+1196) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #02 pc 0000000000008ce0 /system/lib64/libbase.so (android::base::LogMessage::~LogMessage()+724) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #03 pc 0000000000495474 /system/lib64/libart.so (art::Thread::AssertNoPendingException() const+1156) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #04 pc 000000000011c8ac /system/lib64/libart.so (art::ClassLinker::FindClass(art::Thread*, char const*, art::Handleart::mirror::ClassLoader)+64) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #05 pc 000000000032a380 /system/lib64/libart.so (art::JNI::FindClass(_JNIEnv*, char const*)+1268) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #06 pc 00000000000c6aa4 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/lib/arm64/libopentok.so (JNI_OnLoad+264) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #07 pc 00000000002e9aac /system/lib64/libart.so (art::JavaVMExt::LoadNativeLibrary(_JNIEnv*, std::__1::basic_string<char, std::__1::char_traits, std::__1::allocator> const&, _jobject*, std::__1::basic_string<char, std::__1::char_traits, std::__1::allocator>)+3192) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #08 pc 0000000000004038 /system/lib64/libopenjdkjvm.so (JVM_NativeLoad+412) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #09 pc 00000000002f4298 /system/framework/arm64/boot-core-oj.oat (offset 0x2dc000) (java.lang.Runtime.nativeLoad [DEDUPED]+200) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #10 pc 00000000002f5cbc /system/framework/arm64/boot-core-oj.oat (offset 0x2dc000) (java.lang.Runtime.loadLibrary0+188) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #11 pc 00000000002fddb0 /system/framework/arm64/boot-core-oj.oat (offset 0x2dc000) (java.lang.System.loadLibrary+96) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #12 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #13 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int*, unsigned int, art::JValue*, char const*)+232) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #14 pc 0000000000280338 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #15 pc 000000000027a34c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #16 pc 00000000005279cc /system/lib64/libart.so (MterpInvokeStatic+204) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #17 pc 0000000000549b14 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #18 pc 00000000000f8cd2 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.v3.k.a.a+42) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #19 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #20 pc 0000000000516d7c /system/lib64/libart.so (artQuickToInterpreterBridge+1020) 2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #21 pc 00000000005604fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #22 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #23 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #24 pc 0000000000280338 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #25 pc 000000000027a34c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #26 pc 00000000005279cc /system/lib64/libart.so (MterpInvokeStatic+204) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #27 pc 0000000000549b14 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #28 pc 00000000000f8724 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.v3.debug.Log.) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #29 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #30 pc 0000000000516d7c /system/lib64/libart.so (artQuickToInterpreterBridge+1020) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #31 pc 00000000005604fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #32 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #33 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #34 pc 0000000000128044 /system/lib64/libart.so (art::ClassLinker::InitializeClass(art::Thread*, art::Handleart::mirror::Class, bool, bool)+2196) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #35 pc 00000000001133dc /system/lib64/libart.so (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handleart::mirror::Class, bool, bool)+192) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #36 pc 00000000002803d0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+496) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #37 pc 000000000027a34c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #38 pc 00000000005279cc /system/lib64/libart.so (MterpInvokeStatic+204) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #39 pc 0000000000549b14 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #40 pc 00000000000f84c2 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.v3.debug.c.+30) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #41 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #42 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #43 pc 000000000027a330 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #44 pc 0000000000527808 /system/lib64/libart.so (MterpInvokeDirect+296) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #45 pc 0000000000549a94 /system/lib64/libart.so (ExecuteMterpImpl+14484) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #46 pc 00000000000f8c6c /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.v3.debug.h.a+16) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #47 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #48 pc 0000000000516d7c /system/lib64/libart.so (artQuickToInterpreterBridge+1020) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #49 pc 00000000005604fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #50 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #51 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #52 pc 0000000000280338 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #53 pc 000000000027a34c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #54 pc 00000000005279cc /system/lib64/libart.so (MterpInvokeStatic+204) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #55 pc 0000000000549b14 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #56 pc 00000000000f5dac /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.v3.Session.+4) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #57 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #58 pc 0000000000516d7c /system/lib64/libart.so (artQuickToInterpreterBridge+1020) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #59 pc 00000000005604fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #60 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #61 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #62 pc 0000000000128044 /system/lib64/libart.so (art::ClassLinker::InitializeClass(art::Thread*, art::Handleart::mirror::Class, bool, bool)+2196) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #63 pc 00000000001133dc /system/lib64/libart.so (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handleart::mirror::Class, bool, bool)+192) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #64 pc 000000000052a50c /system/lib64/libart.so (MterpNewInstance+760) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #65 pc 0000000000547390 /system/lib64/libart.so (ExecuteMterpImpl+4496) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #66 pc 00000000000f540c /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.v3.Session$q.a+4) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #67 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #68 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #69 pc 000000000027a330 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #70 pc 000000000052950c /system/lib64/libart.so (MterpInvokeVirtualQuick+584) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #71 pc 000000000054d714 /system/lib64/libart.so (ExecuteMterpImpl+29972) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #72 pc 00000000000e6b22 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.k.+474) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #73 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #74 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #75 pc 000000000027b450 /system/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+720) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #76 pc 000000000052903c /system/lib64/libart.so (MterpInvokeDirectRange+244) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #77 pc 0000000000549d94 /system/lib64/libart.so (ExecuteMterpImpl+15252) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #78 pc 00000000000e6672 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.k$j.a+50) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #79 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #80 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #81 pc 000000000027a330 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #82 pc 000000000052950c /system/lib64/libart.so (MterpInvokeVirtualQuick+584) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #83 pc 000000000054d714 /system/lib64/libart.so (ExecuteMterpImpl+29972) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #84 pc 00000000000ca408 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.example.Cx360.VideoActivity.b+24) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #85 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #86 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #87 pc 000000000027a330 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #88 pc 0000000000527808 /system/lib64/libart.so (MterpInvokeDirect+296) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #89 pc 0000000000549a94 /system/lib64/libart.so (ExecuteMterpImpl+14484) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #90 pc 00000000000cafbc /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.example.Cx360.VideoActivity.f+204) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #91 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #92 pc 0000000000516d7c /system/lib64/libart.so (artQuickToInterpreterBridge+1020) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #93 pc 00000000005604fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #94 pc 0000000000557388 /system/lib64/libart.so (art_quick_invoke_stub+584) 2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #95 pc 00000000000cfcc8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #96 pc 000000000045dd7c /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #97 pc 000000000045f7d0 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #98 pc 00000000003ef398 /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #99 pc 000000000078eed4 /system/framework/arm64/boot-core-oj.oat (offset 0x2dc000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #100 pc 0000000000557388 /system/lib64/libart.so (art_quick_invoke_stub+584) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #101 pc 00000000000cfcc8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #102 pc 0000000000280338 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #103 pc 000000000027a34c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #104 pc 000000000052950c /system/lib64/libart.so (MterpInvokeVirtualQuick+584) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #105 pc 000000000054d714 /system/lib64/libart.so (ExecuteMterpImpl+29972) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #106 pc 0000000000117140 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (pub.devrel.easypermissions.c.a+140) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #107 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #108 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #109 pc 000000000027a330 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #110 pc 00000000005279cc /system/lib64/libart.so (MterpInvokeStatic+204) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #111 pc 0000000000549b14 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #112 pc 0000000000117000 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (pub.devrel.easypermissions.c.a+160) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #113 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #114 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #115 pc 000000000027a330 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #116 pc 00000000005279cc /system/lib64/libart.so (MterpInvokeStatic+204) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #117 pc 0000000000549b14 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #118 pc 00000000000caaee /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.example.Cx360.VideoActivity.onRequestPermissionsResult+38) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #119 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #120 pc 0000000000516d7c /system/lib64/libart.so (artQuickToInterpreterBridge+1020) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #121 pc 00000000005604fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #122 pc 0000000001612b30 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.Activity.dispatchActivityResult+1520) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #123 pc 0000000000f168c4 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.ActivityThread.deliverResults+404) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #124 pc 0000000000f303d0 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.ActivityThread.handleSendResult+1072) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #125 pc 0000000001649c3c /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.servertransaction.ActivityResultItem.execute+140) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #126 pc 0000000000b16204 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.servertransaction.TransactionExecutor.executeCallbacks+708) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #127 pc 0000000000b15ec8 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.servertransaction.TransactionExecutor.execute+280) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #128 pc 0000000000f11224 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.ActivityThread$H.handleMessage+340) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #129 pc 0000000001798af4 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.os.Handler.dispatchMessage+180) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #130 pc 0000000001f7ae38 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.os.Looper.loop+1304) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #131 pc 0000000000f258d8 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.ActivityThread.main+664) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #132 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #133 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #134 pc 000000000045dd7c /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #135 pc 000000000045f7d0 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #136 pc 00000000003ef398 /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #137 pc 000000000078eed4 /system/framework/arm64/boot-core-oj.oat (offset 0x2dc000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #138 pc 0000000002479af8 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #139 pc 0000000002485e98 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (com.android.internal.os.ZygoteInit.main+2104) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #140 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #141 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #142 pc 000000000045dd7c /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #143 pc 000000000045d9dc /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+424) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #144 pc 0000000000362cd8 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+652) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #145 pc 00000000000b2b74 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #146 pc 00000000000b5710 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+924) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #147 pc 0000000000002528 /system/bin/app_process64 (main+2012) 2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #148 pc 00000000000c9270 /system/lib64/libc.so (__libc_init+88) 2020-04-06 19:18:16.230 26286-26291/? E/nightwatch-watcher: Failed to read from logcat: Success 2020-04-06 19:18:16.326 11158-11158/? E/crash_dump64: cannot open libmiuindbg.so: No such file or directory 2020-04-06 19:18:16.326 1397-1397/? E//system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_00

harshit-prog avatar Apr 06 '20 13:04 harshit-prog

@harshit-prog have you made any progress? When I ran flutchat I was able to get authenticated and get a session connected. But then it aborted. Here's my log: https://docs.google.com/document/d/1m93qsmG56KA_aGOlc16G_-_Kz1cwI8fxO9ZeHqBWVfg/edit?usp=sharing

Line 229 - Account authenticated with Tokbox Line 273 - Session connected

I briefly saw an image but just for a few seconds before it crashed.

I've also been looking at AgoraRtcEngine. Let me know if you see any good solutions. Thanks.

gicountsNIP avatar May 07 '20 11:05 gicountsNIP

@harshit-prog have you made any progress? When I ran flutchat I was able to get authenticated and get a session connected. But then it aborted. Here's my log: https://docs.google.com/document/d/1m93qsmG56KA_aGOlc16G_-_Kz1cwI8fxO9ZeHqBWVfg/edit?usp=sharing

Line 229 - Account authenticated with Tokbox Line 273 - Session connected

I briefly saw an image but just for a few seconds before it crashed.

I've also been looking at AgoraRtcEngine. Let me know if you see any good solutions. Thanks.

Just try this command to creating build "flutter build apk --no-shrink" I got the success using this.

harshit-prog avatar May 07 '20 12:05 harshit-prog

Thanks for the tip, it still failed. The app opens, press the Start Video Call button, permissions are requested, the thumbnail camera image is rendered in the bottom right corner then it crashes.

gicountsNIP avatar May 07 '20 15:05 gicountsNIP