Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Crush with release apk #291

Closed
palmas opened this issue Jul 3, 2020 · 3 comments
Closed

Crush with release apk #291

palmas opened this issue Jul 3, 2020 · 3 comments

Comments

@palmas
Copy link

palmas commented Jul 3, 2020

Hi!
I've got a crush after trying to connect to openTok session in release apk:

--------- beginning of crash
2020-07-03 15:25:14.108 25016-25016/? A/libc: Fatal signal 6 (SIGABRT), code -6 (SI_TKILL) in tid 25016 (ientapp.android), pid 25016 (ientapp.android)
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: Build fingerprint: 'Redmi/begonia_ru/begonia:9/PPR1.180610.011/V11.0.3.0.PGGRUXM:user/release-keys'
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: Revision: '0'
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: ABI: 'arm64'
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: pid: 25016, tid: 25016, name: ientapp.android >>>
<<<
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: x0 0000000000000000 x1 00000000000061b8 x2 0000000000000006 x3 0000000000000008
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: x4 fefeff6e656d4863 x5 fefeff6e656d4863 x6 fefeff6e656d4863 x7 7f7f7f7f7f7f7f7f
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: x8 0000000000000083 x9 0000007eb70f7950 x10 fffffff87ffffbdf x11 0000000000000001
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: x12 0000007fec962f18 x13 ffffffffffffffff x14 ffffffffff000000 x15 ffffffffffffffff
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: x16 0000007eb712f2c0 x17 0000007eb706d508 x18 0000007fec9626da x19 00000000000061b8
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: x20 00000000000061b8 x21 0000000000000083 x22 0000007e139652b0 x23 0000007eb9a095e0
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: x24 0000000000000000 x25 0000007e13b96b30 x26 0000007e13b96b30 x27 0000000000000001
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: x28 0000000000000000 x29 0000007fec963340
2020-07-03 15:25:14.164 25406-25406/? A/DEBUG: sp 0000007fec963300 lr 0000007eb7061b50 pc 0000007eb7061b7c
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: backtrace:
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #00 pc 0000000000021b7c /system/lib64/libc.so (abort+124)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #1 pc 000000000022cd08 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/base.apk (offset 0x187000)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #2 pc 000000000036fbd4 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/base.apk (offset 0x187000)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #3 pc 000000000036fe04 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/base.apk (offset 0x187000)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #4 pc 00000000003706c4 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/base.apk (offset 0x187000)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #5 pc 0000000000370710 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/base.apk (offset 0x187000)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #6 pc 0000000000173694 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/base.apk (offset 0x187000)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #7 pc 00000000000ebd40 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/base.apk (offset 0x187000) (otc_init+44)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #8 pc 00000000000d3128 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/base.apk (offset 0x187000)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #9 pc 00000000000d7120 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/base.apk (offset 0x187000) (Java_com_opentok_android_Utils_init_1otc_1engine+160)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #10 pc 0000000000013158 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/oat/arm64/base.odex (offset 0x12000) (com.opentok.android.Utils.init_otc_engine+232)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #11 pc 000000000055fc4c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #12 pc 00000000000cfd60 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #13 pc 0000000000283de0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #14 pc 000000000027eeb8 /system/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+752)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #15 pc 0000000000531a8c /system/lib64/libart.so (MterpInvokeStaticRange+148)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #16 pc 0000000000552414 /system/lib64/libart.so (ExecuteMterpImpl+15380)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #17 pc 00000000001f45b6 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/oat/arm64/base.vdex (com.opentok.android.Utils.initOtcEngine+10)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #18 pc 00000000002578a8 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2078119297+496)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #19 pc 000000000051f4d0 /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #20 pc 0000000000568afc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #21 pc 000000000055fc4c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #22 pc 00000000000cfd60 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #23 pc 0000000000283de0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #24 pc 000000000027eeb8 /system/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+752)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #25 pc 0000000000531a8c /system/lib64/libart.so (MterpInvokeStaticRange+148)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #26 pc 0000000000552414 /system/lib64/libart.so (ExecuteMterpImpl+15380)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #27 pc 00000000001f0d5e /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/oat/arm64/base.vdex (com.opentok.android.Session.+134)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #28 pc 00000000002578a8 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2078119297+496)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #29 pc 000000000025d428 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #30 pc 000000000027ee9c /system/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+724)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #31 pc 00000000005318ec /system/lib64/libart.so (MterpInvokeDirectRange+244)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #32 pc 0000000000552394 /system/lib64/libart.so (ExecuteMterpImpl+15252)
2020-07-03 15:25:14.394 25406-25406/? A/DEBUG: #33 pc 00000000001f0662 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/oat/arm64/base.vdex (com.opentok.android.Session$Builder.build+50)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #34 pc 00000000002578a8 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2078119297+496)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #35 pc 000000000025d428 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #36 pc 000000000027dd90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #37 pc 0000000000531dc8 /system/lib64/libart.so (MterpInvokeVirtualQuick+584)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #38 pc 0000000000555d14 /system/lib64/libart.so (ExecuteMterpImpl+29972)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #39 pc 0000000000226bac /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/oat/arm64/base.vdex (.ui.CallActivity.b+164)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #40 pc 00000000002578a8 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2078119297+496)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #41 pc 000000000025d428 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #42 pc 000000000027dd90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #43 pc 000000000053027c /system/lib64/libart.so (MterpInvokeStatic+204)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #44 pc 0000000000552114 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #45 pc 0000000000098fd6 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/oat/arm64/base.vdex (.ui.CallActivity$a.a+102)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #46 pc 00000000002578a8 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2078119297+496)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #47 pc 000000000025d428 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #48 pc 000000000027dd90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #49 pc 000000000052fcf0 /system/lib64/libart.so (MterpInvokeInterface+1392)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #50 pc 0000000000552194 /system/lib64/libart.so (ExecuteMterpImpl+14740)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #51 pc 0000000000101946 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/oat/arm64/base.vdex (androidx.lifecycle.LiveData.a+58)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #52 pc 00000000002578a8 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2078119297+496)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #53 pc 000000000025d428 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #54 pc 000000000027dd90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #55 pc 0000000000531dc8 /system/lib64/libart.so (MterpInvokeVirtualQuick+584)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #56 pc 0000000000555d14 /system/lib64/libart.so (ExecuteMterpImpl+29972)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #57 pc 00000000001019b8 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/oat/arm64/base.vdex (androidx.lifecycle.LiveData.b+88)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #58 pc 00000000002578a8 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2078119297+496)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #59 pc 000000000025d428 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #60 pc 000000000027dd90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #61 pc 0000000000531dc8 /system/lib64/libart.so (MterpInvokeVirtualQuick+584)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #62 pc 0000000000555d14 /system/lib64/libart.so (ExecuteMterpImpl+29972)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #63 pc 0000000000101b58 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/oat/arm64/base.vdex (androidx.lifecycle.LiveData.b+28)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #64 pc 00000000002578a8 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2078119297+496)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #65 pc 000000000025d428 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #66 pc 000000000027dd90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #67 pc 0000000000531dc8 /system/lib64/libart.so (MterpInvokeVirtualQuick+584)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #68 pc 0000000000555d14 /system/lib64/libart.so (ExecuteMterpImpl+29972)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #69 pc 0000000000101584 /data/app/-h4CtoIf5LOgdQrJR9v3KGQ==/oat/arm64/base.vdex (androidx.lifecycle.LiveData$a.run+36)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #70 pc 00000000002578a8 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2078119297+496)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #71 pc 000000000051f4d0 /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #72 pc 0000000000568afc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #73 pc 00000000017cbe1c /system/framework/arm64/boot-framework.oat (offset 0xa59000) (android.os.Handler.dispatchMessage+76)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #74 pc 0000000001fc43d8 /system/framework/arm64/boot-framework.oat (offset 0xa59000) (android.os.Looper.loop+1304)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #75 pc 0000000000f4b3a0 /system/framework/arm64/boot-framework.oat (offset 0xa59000) (android.app.ActivityThread.main+720)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #76 pc 000000000055fc4c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #77 pc 00000000000cfd60 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #78 pc 0000000000465278 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #79 pc 0000000000466cd0 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #80 pc 00000000003f5ed0 /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+48)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #81 pc 000000000078f944 /system/framework/arm64/boot.oat (offset 0x2dc000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #82 pc 00000000024bd858 /system/framework/arm64/boot-framework.oat (offset 0xa59000) (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #83 pc 00000000024d6a4c /system/framework/arm64/boot-framework.oat (offset 0xa59000) (com.android.internal.os.ZygoteInit.main+2172)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #84 pc 000000000055fc4c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #85 pc 00000000000cfd60 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #86 pc 0000000000465278 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #87 pc 0000000000464ed0 /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+416)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #88 pc 0000000000368394 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+644)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #89 pc 00000000000b45b8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #90 pc 00000000000b70f8 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+976)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #91 pc 00000000000021ac /system/bin/app_process64 (main+1212)
2020-07-03 15:25:14.395 25406-25406/? A/DEBUG: #92 pc 00000000000af490 /system/lib64/libc.so (__libc_init+88)

Debug version works fine. Please tell how to fix it?
I use the latest apk version - 2.17.0

@robjperez
Copy link
Contributor

Hi,

Can you reproduce the crash with Basic Video Chat?

@rperezcubero
Copy link
Contributor

Going to close this one due to inactivity.

Please reopen if you can gather more details.

@dp85
Copy link

dp85 commented Jul 9, 2022

To fix,I had to add the following to the proguard-rules.pro file:

-keep class com.opentok.android.* { *; }
-keep class com.opentok.android.Session { ; }
-keep class com.opentok.client.
{ ; }
-keep class com.opentok.impl.
{ ; }
-keep class com.opentok.otc.
{ ; }
-keep class org.webrtc.
{ ; }
-keep class org.otwebrtc.
{ ; }
-keep class org.otwebrtc.voiceengine.
{ ; }
-keep class org.otwebrtc.voiceengine.

-keep class org.otwebrtc.WebRtcClassLoader{ ; }
-keep class org.otwebrtc.voiceengine61.
{ ; }
-keep class org.otwebrtc.voiceengine.BuildInfo { ; }
-keep class com.vonage.
{ *; }

-dontwarn com.opentok.*
-keepclassmembers class com.opentok.* { *; }

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants