Created
July 8, 2019 20:30
-
-
Save n8fr8/dbc0da2f992bd1ee42dc4b88f9085e8c to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
019-07-08 16:28:15.450 18456-18486/info.guardianproject.keanuapp E/libc: Access denied finding property "vendor.debug.egl.profiler" | |
2019-07-08 16:28:15.652 18456-18456/info.guardianproject.keanuapp A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x65c in tid 18456 (roject.keanuapp), pid 18456 (roject.keanuapp) | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: Build fingerprint: 'google/sargo/sargo:9/PQ3B.190705.003/5622519:user/release-keys' | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: Revision: 'MP1.0' | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: ABI: 'arm64' | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: pid: 18456, tid: 18456, name: roject.keanuapp >>> info.guardianproject.keanuapp <<< | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x65c | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: Cause: null pointer dereference | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x0 0000000000000000 x1 0000007f0bb40ba8 x2 0000007f0ba00000 x3 0000000000000000 | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x4 0000000000000140 x5 0000007f0a148331 x6 6320746f6e6e6163 x7 202d2074696d6d6f | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x8 4b6b603a0fe9c982 x9 4b6b603a0fe9c982 x10 0000000000000140 x11 0000000000004818 | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x12 7369206e6f697463 x13 0065766974636120 x14 0000007ef9c33000 x15 0000007ef9c33000 | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x16 0000007f94b33be0 x17 0000007f94ac695c x18 000000000000004b x19 0000000000000000 | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x20 0000000000000000 x21 0000007f0bbdf2c0 x22 0000007ef9d87000 x23 0000007efb06d360 | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x24 000000000000000c x25 0000007f998055e0 x26 0000007f13e14ca0 x27 0000007f998055e0 | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x28 0000007fe848a690 x29 0000007fe848a620 | |
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: sp 0000007fe848a5b0 lr 0000007ef9d5959c pc 0000007ef9d5959c | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: backtrace: | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #00 pc 000000000001959c /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/lib/arm64/libiocipher.so (sqlfs_proc_access+164) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #01 pc 0000000000017438 /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/lib/arm64/libiocipher.so | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #02 pc 000000000054ebe0 /system/lib64/libart.so (art_quick_generic_jni_trampoline+144) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #03 pc 0000000000545b88 /system/lib64/libart.so (art_quick_invoke_stub+584) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #04 pc 00000000000cf698 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #05 pc 000000000027a978 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #06 pc 00000000002749b8 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #07 pc 00000000005167a0 /system/lib64/libart.so (MterpInvokeInterface+1392) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #08 pc 0000000000538394 /system/lib64/libart.so (ExecuteMterpImpl+14740) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #09 pc 00000000002e0b24 /dev/ashmem/dalvik-classes11.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes11.dex (deleted) (info.guardianproject.iocipher.File.doAccess+8) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #10 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #11 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #12 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #13 pc 0000000000516b64 /system/lib64/libart.so (MterpInvokeDirect+296) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #14 pc 0000000000538294 /system/lib64/libart.so (ExecuteMterpImpl+14484) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #15 pc 00000000002e0bf0 /dev/ashmem/dalvik-classes11.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes11.dex (deleted) (info.guardianproject.iocipher.File.exists+4) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #16 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #17 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #18 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #19 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #20 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #21 pc 0000000000015762 /dev/ashmem/dalvik-classes6.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes6.dex (deleted) (info.guardianproject.keanu.core.util.SecureMediaStore.deleteLegacy+18) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #22 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #23 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #24 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #25 pc 0000000000516d28 /system/lib64/libart.so (MterpInvokeStatic+204) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #26 pc 0000000000538314 /system/lib64/libart.so (ExecuteMterpImpl+14612) | |
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #27 pc 000000000001596e /dev/ashmem/dalvik-classes6.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes6.dex (deleted) (info.guardianproject.keanu.core.util.SecureMediaStore.init+350) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #28 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #29 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #30 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #31 pc 0000000000516d28 /system/lib64/libart.so (MterpInvokeStatic+204) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #32 pc 0000000000538314 /system/lib64/libart.so (ExecuteMterpImpl+14612) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #33 pc 0000000000075288 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.openEncryptedStores) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #34 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #35 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #36 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #37 pc 0000000000516b64 /system/lib64/libart.so (MterpInvokeDirect+296) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #38 pc 0000000000538294 /system/lib64/libart.so (ExecuteMterpImpl+14484) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #39 pc 00000000000756d8 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onCacheWordOpened+12) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #40 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #41 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #42 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #43 pc 00000000005167a0 /system/lib64/libart.so (MterpInvokeInterface+1392) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #44 pc 0000000000538394 /system/lib64/libart.so (ExecuteMterpImpl+14740) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #45 pc 0000000000006af6 /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.checkCacheWordState+294) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #46 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #47 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #48 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #49 pc 0000000000516b64 /system/lib64/libart.so (MterpInvokeDirect+296) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #50 pc 0000000000538294 /system/lib64/libart.so (ExecuteMterpImpl+14484) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #51 pc 0000000000006ce8 /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.setCachedSecrets+24) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #52 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #53 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #54 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #55 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #56 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #57 pc 0000000000006d2e /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.setPassphrase+46) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #58 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #59 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #60 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #61 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #62 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #63 pc 0000000000075686 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onCacheWordLocked+70) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #64 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #65 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #66 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #67 pc 00000000005167a0 /system/lib64/libart.so (MterpInvokeInterface+1392) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #68 pc 0000000000538394 /system/lib64/libart.so (ExecuteMterpImpl+14740) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #69 pc 0000000000006ac2 /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.checkCacheWordState+242) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #70 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #71 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #72 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #73 pc 0000000000516b64 /system/lib64/libart.so (MterpInvokeDirect+296) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #74 pc 0000000000538294 /system/lib64/libart.so (ExecuteMterpImpl+14484) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #75 pc 0000000000006c7e /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.reattach+14) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #76 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #77 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #78 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #79 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #80 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #81 pc 0000000000075952 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onResume+14) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #82 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #83 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #84 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #85 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #86 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #87 pc 00000000003a8a6a /system/framework/boot-framework.vdex (android.app.Instrumentation.callActivityOnResume+6) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #88 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #89 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #90 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #91 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #92 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #93 pc 00000000003898b6 /system/framework/boot-framework.vdex (android.app.Activity.performResume+50) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #94 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #95 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #96 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #97 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #98 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #99 pc 000000000038122a /system/framework/boot-framework.vdex (android.app.ActivityThread.performResumeActivity+208) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #100 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #101 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #102 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #103 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #104 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #105 pc 0000000000384cbe /system/framework/boot-framework.vdex (android.app.ActivityThread.handleResumeActivity+12) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #106 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #107 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #108 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #109 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #110 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #111 pc 00000000003c7238 /system/framework/boot-framework.vdex (android.app.servertransaction.ResumeActivityItem.execute+24) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #112 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #113 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #114 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #115 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #116 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #117 pc 00000000003c7834 /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.executeLifecycleState+104) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #118 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #119 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #120 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #121 pc 0000000000516b64 /system/lib64/libart.so (MterpInvokeDirect+296) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #122 pc 0000000000538294 /system/lib64/libart.so (ExecuteMterpImpl+14484) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #123 pc 00000000003c7698 /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.execute+74) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #124 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #125 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #126 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #127 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #128 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #129 pc 0000000000380072 /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+78) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #130 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #131 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #132 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #133 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #134 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #135 pc 0000000000ae5952 /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #136 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #137 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #138 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #139 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #140 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #141 pc 0000000000aeca40 /system/framework/boot-framework.vdex (android.os.Looper.loop+404) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #142 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #143 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #144 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #145 pc 0000000000516d28 /system/lib64/libart.so (MterpInvokeStatic+204) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #146 pc 0000000000538314 /system/lib64/libart.so (ExecuteMterpImpl+14612) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #147 pc 0000000000385b62 /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #148 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #149 pc 00000000005064ec /system/lib64/libart.so (artQuickToInterpreterBridge+1032) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #150 pc 000000000054ecfc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #151 pc 0000000000545e4c /system/lib64/libart.so (art_quick_invoke_static_stub+604) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #152 pc 00000000000cf6b8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #153 pc 000000000044f524 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #154 pc 0000000000450f88 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #155 pc 00000000003e255c /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #156 pc 000000000011d6d4 /system/framework/arm64/boot.oat (offset 0x113000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #157 pc 0000000000545b88 /system/lib64/libart.so (art_quick_invoke_stub+584) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #158 pc 00000000000cf698 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #159 pc 000000000027a978 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #160 pc 00000000002749b8 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948) | |
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #161 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #162 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #163 pc 0000000000c0da56 /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #164 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #165 pc 00000000005064ec /system/lib64/libart.so (artQuickToInterpreterBridge+1032) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #166 pc 000000000054ecfc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #167 pc 0000000000beb550 /system/framework/arm64/boot-framework.oat (offset 0x3cd000) (com.android.internal.os.ZygoteInit.main+3088) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #168 pc 0000000000545e4c /system/lib64/libart.so (art_quick_invoke_static_stub+604) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #169 pc 00000000000cf6b8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #170 pc 000000000044f524 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #171 pc 000000000044f17c /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+424) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #172 pc 00000000003594dc /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+768) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #173 pc 00000000000b1ef4 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #174 pc 00000000000b487c /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+756) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #175 pc 000000000000219c /system/bin/app_process64 (main+1200) | |
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #176 pc 00000000000ace6c /system/lib64/libc.so (__libc_init+88) | |
2019-07-08 16:28:16.001 871-871/? E//system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_09 | |
2019-07-08 16:28:16.025 791-791/? E/lowmemorykiller: Error opening /proc/18456/oom_score_adj; errno=2 | |
2019-07-08 16:28:16.335 17647-17678/? E/Finsky: [398] uxd.a(138): Exception reading APK file | |
java.io.FileNotFoundException: File doesn't exist: /data/app/info.guardianproject.keanuapp-IVGfas63y_mMkA9TzEcw0Q==/base.apk | |
at java.util.zip.ZipFile.<init>(ZipFile.java:215) | |
at java.util.zip.ZipFile.<init>(ZipFile.java:152) | |
at java.util.zip.ZipFile.<init>(ZipFile.java:123) | |
at ajzf.<init>(SourceFile:1) | |
at uxd.a(SourceFile:118) | |
at uxd.c(SourceFile:2) | |
at vjl.run(Unknown Source:2) | |
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1167) | |
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:641) | |
at iml.run(Unknown Source:5) | |
at java.lang.Thread.run(Thread.java:764) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment