Giter VIP home page Giter VIP logo

iocipher's Introduction

IOCipher: Encrypted Virtual Disk

IOCipher is a virtual encrypted disk for apps without requiring the device to be rooted. It uses a clone of the standard java.io API for working with files. Just password handling & opening the virtual disk are what stand between developers and fully encrypted file storage. It is based on libsqlfs and SQLCipher.

If you are using this in your app, we'd love to hear about it! Please send us an email at [email protected]

Adding to your project

See https://guardianproject.info/code/iocipher

Building

This app relies on OpenSSL libcrypto, sqlcipher, and libsqlfs, which are all "native" C code that needs to be built before working with the Java. First, make sure you have the build prerequisites:

apt-get install tcl libtool automake autoconf gawk libssl-dev

Point the build to where your Android SDK and NDK are installed, either by setting sdk.dir and ndk.dir in your local.properties or setting the environment variables:

export ANDROID_HOME=/opt/android-sdk export ANDROID_NDK_HOME=/opt/android-ndk

With gradle, just run gradle build and it will run all the steps.

Using ant, build everything like this:

git clone https://github.com/guardianproject/IOCipher git submodule update --init --recursive ./setup-ant make -C external/ $ANDROID_NDK_HOME/ndk-build ant clean debug

The official releases are built using ant using a script that fully resets the git repo, then runs the whole build:

./make-release-build

Building Native Bits

If you are using Eclipse with this library, you can have the NDK parts built as part of the Eclipse build process. You just need to set ANDROID_NDK in the "String Substitution" section of your Eclipse's workspace preferences.

Otherwise, you can build the native bits from the Terminal using:

make -C external ndk-build

License

When taken as a whole, this project is under the the LGPLv3 license since it is the only license that is compatible with the licenses of all the components. The source code for this comes from a few different places, so there are a number of licenses for different chunks.

  • Apache 2.0 (Android Internals): Much of the code here is taken from the Android internals, so it has an Apache 2.0 license.

  • OpenSSL License: It is linked to the OpenSSL that is provided with Android, so it should be covered under Android's handling of the advertisement clause.

  • LGPL 2.1 (libsqlfs)

  • BSD-style (sqlcipher)

We believe the LGPLv3 is compatible with all reasonable uses, including proprietary software, but let us know if it provides difficulties for you. For more info on how that works with Java, see:

https://www.gnu.org/licenses/lgpl-java.en.html

Included shared library files

In external/libs are some binary .so files, these are all binaries pulled from other sources so that the C code can have something link against.

libcrypto.so comes from Android emulators. They are included here so that the C code can link against openssl's libcrypto, which Android includes but does not expose in the NDK. If you want to build this library from source, then do this:

git clone https://github.com/guardianproject/openssl-android
cd openssl-android
ndk-build -j4

These shared libraries must not be included in any real app. Android provides /system/lib/libcrypto.so and you should get SQLCipher directly from the source, listed above.

iocipher's People

Contributors

abeluck avatar cferris1000 avatar chrisdearman avatar cketti avatar dicej avatar eighthave avatar enh-google avatar n8fr8 avatar ramblurr avatar vmarko avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

iocipher's Issues

0.5 version crash on older / 32-bit devices

01-24 10:21:38.967 194-194/? A/DEBUG: #00 pc 000156e6 /data/app/app.tantiao-1/lib/arm/libiocipher.so (sqlfs_proc_write+597)
01-24 10:21:38.967 194-194/? A/DEBUG: #1 pc 0000ef41 /data/app/app.tantiao-1/lib/arm/libiocipher.so
01-24 10:21:38.968 194-194/? A/DEBUG: #2 pc 040aa96b /data/app/app.tantiao-1/oat/arm/base.odex (offset 0x289d000) (int info.guardianproject.libcore.io.Posix.pwriteBytes(info.guardianproject.iocipher.FileDescriptor, java.lang.Object, int, int, long, int)+158)
01-24 10:21:38.968 194-194/? A/DEBUG: #3 pc 040add4f /data/app/app.tantiao-1/oat/arm/base.odex (offset 0x289d000) (int info.guardianproject.libcore.io.Posix.write(info.guardianproject.iocipher.FileDescriptor, byte[], int, int, int)+170)
01-24 10:21:38.968 194-194/? A/DEBUG: #4 pc 03c592c3 /data/app/app.tantiao-1/oat/arm/base.odex (offset 0x289d000) (void info.guardianproject.libcore.io.IoBridge.write(info.guardianproject.iocipher.FileDescriptor, byte[], int, int, int)+246)
01-24 10:21:38.968 194-194/? A/DEBUG: #5 pc 03c516e1 /data/app/app.tantiao-1/oat/arm/base.odex (offset 0x289d000) (void info.guardianproject.iocipher.FileOutputStream.write(byte[], int, int)+132)
01-24 10:21:38.968 194-194/? A/DEBUG: #6 pc 739fa66f /data/dalvik-cache/arm/system@[email protected] (offset 0x1ec9000)
Let me know what I can do to help test/debug!

Crash on write

Hi. I'm using the IOCipherExample (with gradle configuration) and, when i'm trying to write (copying the alberti_cipher_disk.png file), i have this crash

Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x242 in tid 22029 (Thread-6), pid 22002 (iocipherexample)

IOCipher virtual disk files need to be upgraded when using newer SQLCipher versions

2019-07-05 10:19:22.257 18977-18977/? A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x334 in tid 18977 (roject.keanuapp), pid 18977 (roject.keanuapp)
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: Build fingerprint: 'google/sargo/sargo:9/PQ3B.190705.003/5622519:user/release-keys'
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: Revision: 'MP1.0'
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: ABI: 'arm'
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: pid: 18977, tid: 18977, name: roject.keanuapp  >>> info.guardianproject.keanuapp <<<
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x334
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: Cause: null pointer dereference
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG:     r0  00000000  r1  000186c8  r2  68c215c4  r3  40000000
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG:     r4  00000000  r5  00000000  r6  e0bffe40  r7  ffe61948
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG:     r8  ffe61990  r9  00000000  r10 ffe61990  r11 e8ae5000
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG:     ip  e8e34d00  sp  ffe61910  lr  e8e0d36b  pc  cbc4ffd4
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG: backtrace:
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #00 pc 0000ffd4  /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/lib/arm/libiocipher.so (sqlfs_proc_access+76)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #01 pc 0000e959  /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/lib/arm/libiocipher.so
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #02 pc 00411a79  /system/lib/libart.so (art_quick_generic_jni_trampoline+40)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #03 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #04 pc 003e6b91  /system/lib/libart.so (art_quick_invoke_stub+224)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #05 pc 000a1015  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #06 pc 001e5ae9  /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+236)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #07 pc 001e05d7  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+814)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #08 pc 003e23bb  /system/lib/libart.so (MterpInvokeInterface+1010)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #09 pc 00400514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #10 pc 002e0b24  /dev/ashmem/dalvik-classes11.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes11.dex (deleted) (info.guardianproject.iocipher.File.doAccess+8)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #11 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #12 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #13 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #14 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #15 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #16 pc 002e0bf0  /dev/ashmem/dalvik-classes11.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes11.dex (deleted) (info.guardianproject.iocipher.File.exists+4)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #17 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #18 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #19 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #20 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #21 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #22 pc 00015762  /dev/ashmem/dalvik-classes6.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes6.dex (deleted) (info.guardianproject.keanu.core.util.SecureMediaStore.deleteLegacy+18)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #23 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #24 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #25 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #26 pc 003e27c7  /system/lib/libart.so (MterpInvokeStatic+130)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #27 pc 00400494  /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #28 pc 0001596e  /dev/ashmem/dalvik-classes6.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes6.dex (deleted) (info.guardianproject.keanu.core.util.SecureMediaStore.init+350)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #29 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #30 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #31 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #32 pc 003e27c7  /system/lib/libart.so (MterpInvokeStatic+130)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #33 pc 00400494  /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #34 pc 00075288  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.openEncryptedStores)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #35 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #36 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #37 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #38 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #39 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #40 pc 000756d8  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onCacheWordOpened+12)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #41 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #42 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #43 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #44 pc 003e23bb  /system/lib/libart.so (MterpInvokeInterface+1010)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #45 pc 00400514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #46 pc 00006af6  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.checkCacheWordState+294)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #47 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #48 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #49 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #50 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #51 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #52 pc 00006ce8  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.setCachedSecrets+24)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #53 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #54 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #55 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #56 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #57 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #58 pc 00006d2e  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.setPassphrase+46)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #59 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #60 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #61 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #62 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #63 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #64 pc 00075686  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onCacheWordLocked+70)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #65 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #66 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #67 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #68 pc 003e23bb  /system/lib/libart.so (MterpInvokeInterface+1010)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #69 pc 00400514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #70 pc 00006ac2  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.checkCacheWordState+242)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #71 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #72 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #73 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #74 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #75 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #76 pc 00006c7e  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.reattach+14)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #77 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #78 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #79 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #80 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #81 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #82 pc 00075952  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onResume+14)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #83 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #84 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #85 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #86 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #87 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #88 pc 003a8a6a  /system/framework/boot-framework.vdex (android.app.Instrumentation.callActivityOnResume+6)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #89 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #90 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #91 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #92 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #93 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #94 pc 003898b6  /system/framework/boot-framework.vdex (android.app.Activity.performResume+50)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #95 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #96 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #97 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #98 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #99 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #100 pc 0038122a  /system/framework/boot-framework.vdex (android.app.ActivityThread.performResumeActivity+208)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #101 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #102 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #103 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #104 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #105 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #106 pc 00384cbe  /system/framework/boot-framework.vdex (android.app.ActivityThread.handleResumeActivity+12)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #107 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #108 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #109 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #110 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #111 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #112 pc 003c7238  /system/framework/boot-framework.vdex (android.app.servertransaction.ResumeActivityItem.execute+24)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #113 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #114 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #115 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #116 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #117 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #118 pc 003c7834  /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.executeLifecycleState+104)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #119 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #120 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #121 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #122 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #123 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #124 pc 003c7698  /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.execute+74)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #125 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #126 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #127 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #128 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #129 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #130 pc 00380072  /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+78)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #131 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #132 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #133 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #134 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #135 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #136 pc 00ae5952  /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #137 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #138 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #139 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #140 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #141 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #142 pc 00aeca40  /system/framework/boot-framework.vdex (android.os.Looper.loop+404)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #143 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #144 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #145 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #146 pc 003e27c7  /system/lib/libart.so (MterpInvokeStatic+130)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #147 pc 00400494  /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #148 pc 00385b62  /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #149 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #150 pc 001c937f  /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #151 pc 003d52d1  /system/lib/libart.so (artQuickToInterpreterBridge+880)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #152 pc 00411aff  /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #153 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #154 pc 003e6c93  /system/lib/libart.so (art_quick_invoke_static_stub+222)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #155 pc 000a1027  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #156 pc 00347ac5  /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #157 pc 00348f15  /system/lib/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned int)+1024)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #158 pc 002fb0c5  /system/lib/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+40)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #159 pc 0011226f  /system/framework/arm/boot.oat (offset 0x10c000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+110)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #160 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #161 pc 003e6b91  /system/lib/libart.so (art_quick_invoke_stub+224)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #162 pc 000a1015  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #163 pc 001e5ae9  /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+236)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #164 pc 001e05d7  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+814)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #165 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #166 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #167 pc 00c0da56  /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #168 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #169 pc 001c937f  /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #170 pc 003d52d1  /system/lib/libart.so (artQuickToInterpreterBridge+880)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #171 pc 00411aff  /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #172 pc 00a10a0d  /system/framework/arm/boot-framework.oat (offset 0x3ab000) (com.android.internal.os.ZygoteInit.main+2836)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #173 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #174 pc 003e6c93  /system/lib/libart.so (art_quick_invoke_static_stub+222)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #175 pc 000a1027  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #176 pc 00347ac5  /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #177 pc 003478ef  /system/lib/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+310)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #178 pc 0028eb11  /system/lib/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+444)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #179 pc 0006cb4b  /system/lib/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+30)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #180 pc 0006eda3  /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+458)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #181 pc 00001989  /system/bin/app_process32 (main+728)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #182 pc 0008afdd  /system/lib/libc.so (__libc_init+48)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #183 pc 0000166f  /system/bin/app_process32 (_start_main+38)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #184 pc 00000306  <anonymous:ec767000>
2019-07-05 10:20:37.218 19575-19575/? A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x334 in tid 19575 (roject.keanuapp), pid 19575 (roject.keanuapp)
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: Build fingerprint: 'google/sargo/sargo:9/PQ3B.190705.003/5622519:user/release-keys'
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: Revision: 'MP1.0'
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: ABI: 'arm'
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: pid: 19575, tid: 19575, name: roject.keanuapp  >>> info.guardianproject.keanuapp <<<
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x334
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: Cause: null pointer dereference
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG:     r0  00000000  r1  000186c8  r2  68c215c4  r3  40000000
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG:     r4  00000000  r5  00000000  r6  ce483980  r7  ffe61948
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG:     r8  ffe61990  r9  00000000  r10 ffe61990  r11 e8ae5000
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG:     ip  e8e34d00  sp  ffe61910  lr  e8e0d36b  pc  cbc55fd4
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG: backtrace:
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #00 pc 0000ffd4  /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/lib/arm/libiocipher.so (sqlfs_proc_access+76)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #01 pc 0000e959  /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/lib/arm/libiocipher.so
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #02 pc 00411a79  /system/lib/libart.so (art_quick_generic_jni_trampoline+40)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #03 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #04 pc 003e6b91  /system/lib/libart.so (art_quick_invoke_stub+224)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #05 pc 000a1015  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #06 pc 001e5ae9  /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+236)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #07 pc 001e05d7  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+814)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #08 pc 003e23bb  /system/lib/libart.so (MterpInvokeInterface+1010)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #09 pc 00400514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #10 pc 002e0b24  /dev/ashmem/dalvik-classes11.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes11.dex (deleted) (info.guardianproject.iocipher.File.doAccess+8)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #11 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #12 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #13 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #14 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #15 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #16 pc 002e0bf0  /dev/ashmem/dalvik-classes11.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes11.dex (deleted) (info.guardianproject.iocipher.File.exists+4)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #17 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #18 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #19 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #20 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #21 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #22 pc 00015762  /dev/ashmem/dalvik-classes6.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes6.dex (deleted) (info.guardianproject.keanu.core.util.SecureMediaStore.deleteLegacy+18)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #23 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #24 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #25 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #26 pc 003e27c7  /system/lib/libart.so (MterpInvokeStatic+130)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #27 pc 00400494  /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #28 pc 0001596e  /dev/ashmem/dalvik-classes6.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes6.dex (deleted) (info.guardianproject.keanu.core.util.SecureMediaStore.init+350)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #29 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #30 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #31 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #32 pc 003e27c7  /system/lib/libart.so (MterpInvokeStatic+130)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #33 pc 00400494  /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #34 pc 00075288  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.openEncryptedStores)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #35 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #36 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #37 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #38 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #39 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #40 pc 000756d8  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onCacheWordOpened+12)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #41 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #42 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #43 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #44 pc 003e23bb  /system/lib/libart.so (MterpInvokeInterface+1010)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #45 pc 00400514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #46 pc 00006af6  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.checkCacheWordState+294)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #47 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #48 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #49 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #50 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #51 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #52 pc 00006ce8  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.setCachedSecrets+24)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #53 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #54 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #55 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #56 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #57 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #58 pc 00006d2e  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.setPassphrase+46)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #59 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #60 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #61 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #62 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #63 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #64 pc 00075686  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onCacheWordLocked+70)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #65 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #66 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #67 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #68 pc 003e23bb  /system/lib/libart.so (MterpInvokeInterface+1010)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #69 pc 00400514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #70 pc 00006ac2  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.checkCacheWordState+242)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #71 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #72 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #73 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #74 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #75 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #76 pc 00006c7e  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.reattach+14)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #77 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #78 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #79 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #80 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #81 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #82 pc 00075952  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onResume+14)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #83 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #84 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #85 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #86 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #87 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #88 pc 003a8a6a  /system/framework/boot-framework.vdex (android.app.Instrumentation.callActivityOnResume+6)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #89 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #90 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #91 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #92 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #93 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #94 pc 003898b6  /system/framework/boot-framework.vdex (android.app.Activity.performResume+50)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #95 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #96 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #97 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #98 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #99 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #100 pc 0038122a  /system/framework/boot-framework.vdex (android.app.ActivityThread.performResumeActivity+208)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #101 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #102 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #103 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #104 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #105 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #106 pc 00384cbe  /system/framework/boot-framework.vdex (android.app.ActivityThread.handleResumeActivity+12)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #107 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #108 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #109 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #110 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #111 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #112 pc 003c7238  /system/framework/boot-framework.vdex (android.app.servertransaction.ResumeActivityItem.execute+24)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #113 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #114 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #115 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #116 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #117 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #118 pc 003c7834  /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.executeLifecycleState+104)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #119 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #120 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #121 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #122 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #123 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #124 pc 003c7698  /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.execute+74)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #125 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #126 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #127 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #128 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #129 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #130 pc 00380072  /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+78)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #131 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #132 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #133 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #134 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #135 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #136 pc 00ae5952  /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #137 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #138 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #139 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #140 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #141 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #142 pc 00aeca40  /system/framework/boot-framework.vdex (android.os.Looper.loop+404)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #143 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #144 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #145 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #146 pc 003e27c7  /system/lib/libart.so (MterpInvokeStatic+130)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #147 pc 00400494  /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #148 pc 00385b62  /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #149 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #150 pc 001c937f  /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #151 pc 003d52d1  /system/lib/libart.so (artQuickToInterpreterBridge+880)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #152 pc 00411aff  /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #153 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #154 pc 003e6c93  /system/lib/libart.so (art_quick_invoke_static_stub+222)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #155 pc 000a1027  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #156 pc 00347ac5  /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #157 pc 00348f15  /system/lib/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned int)+1024)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #158 pc 002fb0c5  /system/lib/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+40)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #159 pc 0011226f  /system/framework/arm/boot.oat (offset 0x10c000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+110)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #160 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #161 pc 003e6b91  /system/lib/libart.so (art_quick_invoke_stub+224)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #162 pc 000a1015  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #163 pc 001e5ae9  /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+236)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #164 pc 001e05d7  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+814)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #165 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #166 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #167 pc 00c0da56  /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #168 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #169 pc 001c937f  /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #170 pc 003d52d1  /system/lib/libart.so (artQuickToInterpreterBridge+880)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #171 pc 00411aff  /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #172 pc 00a10a0d  /system/framework/arm/boot-framework.oat (offset 0x3ab000) (com.android.internal.os.ZygoteInit.main+2836)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #173 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #174 pc 003e6c93  /system/lib/libart.so (art_quick_invoke_static_stub+222)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #175 pc 000a1027  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #176 pc 00347ac5  /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #177 pc 003478ef  /system/lib/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+310)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #178 pc 0028eb11  /system/lib/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+444)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #179 pc 0006cb4b  /system/lib/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+30)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #180 pc 0006eda3  /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+458)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #181 pc 00001989  /system/bin/app_process32 (main+728)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #182 pc 0008afdd  /system/lib/libc.so (__libc_init+48)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #183 pc 0000166f  /system/bin/app_process32 (_start_main+38)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #184 pc 00000306  <anonymous:ec767000>

wrong description in pom file

"NetCipher is a library ..."

<description>NetCipher is a library for Android that provides multiple means to improve network security in mobile applications. It provides best practices TLS settings using the standard Android HTTP methods, HttpURLConnection and Apache HTTP Client, provides simple Tor integration, makes it easy to configure proxies for HTTP connections and `WebView` instances.</description>

How to use in Scala

Hi,

Thank you for your contribution.

My android app is written in Scala language.
How can I use this project for my app to encrypt the cache files?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.