This is the stack trace when I tried to connect the call.
No pending exception expected: java.lang.ClassNotFoundException: Didn't find class "com.opentok.android.v3.Session$Capabilities" on path: DexPathList[[zip file "/data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/base.apk"],nativeLibraryDirectories=[/data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/lib/arm64, /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/base.apk!/lib/arm64-v8a, /system/lib64]]
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: Build fingerprint: 'xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.3.0.PEIMIXM:user/release-keys'
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: Revision: '0'
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: ABI: 'arm64'
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: pid: 11059, tid: 11059, name: m.example.Cx360 >>> com.example.Cx360 <<<
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: Abort message: 'thread.cc:2165] No pending exception expected: java.lang.ClassNotFoundException: Didn't find class "com.opentok.android.v3.Session$Capabilities" on path: DexPathList[[zip file "/data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/base.apk"],nativeLibraryDirectories=[/data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/lib/arm64, /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/base.apk!/lib/arm64-v8a, /system/lib64]]'
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x0 0000000000000000 x1 0000000000002b33 x2 0000000000000006 x3 0000000000000008
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x4 000024393f4f282a x5 000024393f4f282a x6 000024393f4f282a x7 2a284f3f3924ffff
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x8 0000000000000083 x9 ce7ce6939b3fb02a x10 0000000000000000 x11 fffffffc7ffffbdf
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x12 0000000000000001 x13 ffffffffffffffff x14 ffff000000000000 x15 ffffffffffffffff
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x16 00000079cab4f2b0 x17 00000079caa6ecd0 x18 0000000000000010 x19 0000000000002b33
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x20 0000000000002b33 x21 0000007939d50100 x22 0000000000000058 x23 00000079491a0608
2020-04-06 19:18:15.763 11158-11158/? A/DEBUG: x24 0000000000000058 x25 0000007fc5a07c89 x26 000000000000005b x27 00000079cf61a5e0
2020-04-06 19:18:15.764 11158-11158/? A/DEBUG: x28 00000079cf61a5e0 x29 0000007fc5a07bf0
2020-04-06 19:18:15.764 11158-11158/? A/DEBUG: sp 0000007fc5a07bb0 lr 00000079caa62144 pc 00000079caa6216c
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: backtrace:
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #00 pc 000000000002216c /system/lib64/libc.so (abort+116)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #01 pc 0000000000465684 /system/lib64/libart.so (art::Runtime::Abort(char const*)+1196)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #02 pc 0000000000008ce0 /system/lib64/libbase.so (android::base::LogMessage::~LogMessage()+724)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #03 pc 0000000000495474 /system/lib64/libart.so (art::Thread::AssertNoPendingException() const+1156)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #04 pc 000000000011c8ac /system/lib64/libart.so (art::ClassLinker::FindClass(art::Thread*, char const*, art::Handleart::mirror::ClassLoader)+64)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #05 pc 000000000032a380 /system/lib64/libart.so (art::JNI::FindClass(_JNIEnv*, char const*)+1268)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #06 pc 00000000000c6aa4 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/lib/arm64/libopentok.so (JNI_OnLoad+264)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #07 pc 00000000002e9aac /system/lib64/libart.so (art::JavaVMExt::LoadNativeLibrary(_JNIEnv*, std::__1::basic_string<char, std::__1::char_traits, std::__1::allocator> const&, _jobject*, std::__1::basic_string<char, std::__1::char_traits, std::__1::allocator>)+3192)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #08 pc 0000000000004038 /system/lib64/libopenjdkjvm.so (JVM_NativeLoad+412)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #09 pc 00000000002f4298 /system/framework/arm64/boot-core-oj.oat (offset 0x2dc000) (java.lang.Runtime.nativeLoad [DEDUPED]+200)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #10 pc 00000000002f5cbc /system/framework/arm64/boot-core-oj.oat (offset 0x2dc000) (java.lang.Runtime.loadLibrary0+188)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #11 pc 00000000002fddb0 /system/framework/arm64/boot-core-oj.oat (offset 0x2dc000) (java.lang.System.loadLibrary+96)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #12 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #13 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #14 pc 0000000000280338 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #15 pc 000000000027a34c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #16 pc 00000000005279cc /system/lib64/libart.so (MterpInvokeStatic+204)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #17 pc 0000000000549b14 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #18 pc 00000000000f8cd2 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.v3.k.a.a+42)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #19 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #20 pc 0000000000516d7c /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2020-04-06 19:18:16.128 11158-11158/? A/DEBUG: #21 pc 00000000005604fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #22 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #23 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #24 pc 0000000000280338 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #25 pc 000000000027a34c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #26 pc 00000000005279cc /system/lib64/libart.so (MterpInvokeStatic+204)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #27 pc 0000000000549b14 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #28 pc 00000000000f8724 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.v3.debug.Log.)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #29 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #30 pc 0000000000516d7c /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #31 pc 00000000005604fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #32 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #33 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #34 pc 0000000000128044 /system/lib64/libart.so (art::ClassLinker::InitializeClass(art::Thread*, art::Handleart::mirror::Class, bool, bool)+2196)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #35 pc 00000000001133dc /system/lib64/libart.so (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handleart::mirror::Class, bool, bool)+192)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #36 pc 00000000002803d0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+496)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #37 pc 000000000027a34c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #38 pc 00000000005279cc /system/lib64/libart.so (MterpInvokeStatic+204)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #39 pc 0000000000549b14 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #40 pc 00000000000f84c2 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.v3.debug.c.+30)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #41 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #42 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #43 pc 000000000027a330 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #44 pc 0000000000527808 /system/lib64/libart.so (MterpInvokeDirect+296)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #45 pc 0000000000549a94 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #46 pc 00000000000f8c6c /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.v3.debug.h.a+16)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #47 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #48 pc 0000000000516d7c /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #49 pc 00000000005604fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #50 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #51 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #52 pc 0000000000280338 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #53 pc 000000000027a34c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #54 pc 00000000005279cc /system/lib64/libart.so (MterpInvokeStatic+204)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #55 pc 0000000000549b14 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #56 pc 00000000000f5dac /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.v3.Session.+4)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #57 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #58 pc 0000000000516d7c /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #59 pc 00000000005604fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #60 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #61 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #62 pc 0000000000128044 /system/lib64/libart.so (art::ClassLinker::InitializeClass(art::Thread*, art::Handleart::mirror::Class, bool, bool)+2196)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #63 pc 00000000001133dc /system/lib64/libart.so (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handleart::mirror::Class, bool, bool)+192)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #64 pc 000000000052a50c /system/lib64/libart.so (MterpNewInstance+760)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #65 pc 0000000000547390 /system/lib64/libart.so (ExecuteMterpImpl+4496)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #66 pc 00000000000f540c /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.v3.Session$q.a+4)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #67 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #68 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #69 pc 000000000027a330 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #70 pc 000000000052950c /system/lib64/libart.so (MterpInvokeVirtualQuick+584)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #71 pc 000000000054d714 /system/lib64/libart.so (ExecuteMterpImpl+29972)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #72 pc 00000000000e6b22 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.k.+474)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #73 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #74 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #75 pc 000000000027b450 /system/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+720)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #76 pc 000000000052903c /system/lib64/libart.so (MterpInvokeDirectRange+244)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #77 pc 0000000000549d94 /system/lib64/libart.so (ExecuteMterpImpl+15252)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #78 pc 00000000000e6672 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.opentok.android.k$j.a+50)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #79 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #80 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #81 pc 000000000027a330 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #82 pc 000000000052950c /system/lib64/libart.so (MterpInvokeVirtualQuick+584)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #83 pc 000000000054d714 /system/lib64/libart.so (ExecuteMterpImpl+29972)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #84 pc 00000000000ca408 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.example.Cx360.VideoActivity.b+24)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #85 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #86 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #87 pc 000000000027a330 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #88 pc 0000000000527808 /system/lib64/libart.so (MterpInvokeDirect+296)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #89 pc 0000000000549a94 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #90 pc 00000000000cafbc /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.example.Cx360.VideoActivity.f+204)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #91 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #92 pc 0000000000516d7c /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #93 pc 00000000005604fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #94 pc 0000000000557388 /system/lib64/libart.so (art_quick_invoke_stub+584)
2020-04-06 19:18:16.129 11158-11158/? A/DEBUG: #95 pc 00000000000cfcc8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #96 pc 000000000045dd7c /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #97 pc 000000000045f7d0 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #98 pc 00000000003ef398 /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #99 pc 000000000078eed4 /system/framework/arm64/boot-core-oj.oat (offset 0x2dc000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #100 pc 0000000000557388 /system/lib64/libart.so (art_quick_invoke_stub+584)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #101 pc 00000000000cfcc8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #102 pc 0000000000280338 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #103 pc 000000000027a34c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #104 pc 000000000052950c /system/lib64/libart.so (MterpInvokeVirtualQuick+584)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #105 pc 000000000054d714 /system/lib64/libart.so (ExecuteMterpImpl+29972)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #106 pc 0000000000117140 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (pub.devrel.easypermissions.c.a+140)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #107 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #108 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #109 pc 000000000027a330 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #110 pc 00000000005279cc /system/lib64/libart.so (MterpInvokeStatic+204)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #111 pc 0000000000549b14 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #112 pc 0000000000117000 /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (pub.devrel.easypermissions.c.a+160)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #113 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #114 pc 0000000000259b44 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #115 pc 000000000027a330 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #116 pc 00000000005279cc /system/lib64/libart.so (MterpInvokeStatic+204)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #117 pc 0000000000549b14 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #118 pc 00000000000caaee /data/app/com.example.Cx360-f4jaMT6jcHbZzPQ_0CsPuQ==/oat/arm64/base.vdex (deleted) (com.example.Cx360.VideoActivity.onRequestPermissionsResult+38)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #119 pc 0000000000254050 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #120 pc 0000000000516d7c /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #121 pc 00000000005604fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #122 pc 0000000001612b30 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.Activity.dispatchActivityResult+1520)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #123 pc 0000000000f168c4 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.ActivityThread.deliverResults+404)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #124 pc 0000000000f303d0 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.ActivityThread.handleSendResult+1072)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #125 pc 0000000001649c3c /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.servertransaction.ActivityResultItem.execute+140)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #126 pc 0000000000b16204 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.servertransaction.TransactionExecutor.executeCallbacks+708)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #127 pc 0000000000b15ec8 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.servertransaction.TransactionExecutor.execute+280)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #128 pc 0000000000f11224 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.ActivityThread$H.handleMessage+340)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #129 pc 0000000001798af4 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.os.Handler.dispatchMessage+180)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #130 pc 0000000001f7ae38 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.os.Looper.loop+1304)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #131 pc 0000000000f258d8 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (android.app.ActivityThread.main+664)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #132 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #133 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #134 pc 000000000045dd7c /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #135 pc 000000000045f7d0 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #136 pc 00000000003ef398 /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #137 pc 000000000078eed4 /system/framework/arm64/boot-core-oj.oat (offset 0x2dc000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #138 pc 0000000002479af8 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #139 pc 0000000002485e98 /system/framework/arm64/boot-framework.oat (offset 0xa42000) (com.android.internal.os.ZygoteInit.main+2104)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #140 pc 000000000055764c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #141 pc 00000000000cfce8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #142 pc 000000000045dd7c /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #143 pc 000000000045d9dc /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+424)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #144 pc 0000000000362cd8 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+652)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #145 pc 00000000000b2b74 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #146 pc 00000000000b5710 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+924)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #147 pc 0000000000002528 /system/bin/app_process64 (main+2012)
2020-04-06 19:18:16.130 11158-11158/? A/DEBUG: #148 pc 00000000000c9270 /system/lib64/libc.so (__libc_init+88)
2020-04-06 19:18:16.230 26286-26291/? E/nightwatch-watcher: Failed to read from logcat: Success
2020-04-06 19:18:16.326 11158-11158/? E/crash_dump64: cannot open libmiuindbg.so: No such file or directory
2020-04-06 19:18:16.326 1397-1397/? E//system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_00