Skip to content

Instantly share code, notes, and snippets.

@n8fr8
Created July 8, 2019 20:30
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save n8fr8/dbc0da2f992bd1ee42dc4b88f9085e8c to your computer and use it in GitHub Desktop.
Save n8fr8/dbc0da2f992bd1ee42dc4b88f9085e8c to your computer and use it in GitHub Desktop.
019-07-08 16:28:15.450 18456-18486/info.guardianproject.keanuapp E/libc: Access denied finding property "vendor.debug.egl.profiler"
2019-07-08 16:28:15.652 18456-18456/info.guardianproject.keanuapp A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x65c in tid 18456 (roject.keanuapp), pid 18456 (roject.keanuapp)
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: Build fingerprint: 'google/sargo/sargo:9/PQ3B.190705.003/5622519:user/release-keys'
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: Revision: 'MP1.0'
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: ABI: 'arm64'
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: pid: 18456, tid: 18456, name: roject.keanuapp >>> info.guardianproject.keanuapp <<<
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x65c
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: Cause: null pointer dereference
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x0 0000000000000000 x1 0000007f0bb40ba8 x2 0000007f0ba00000 x3 0000000000000000
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x4 0000000000000140 x5 0000007f0a148331 x6 6320746f6e6e6163 x7 202d2074696d6d6f
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x8 4b6b603a0fe9c982 x9 4b6b603a0fe9c982 x10 0000000000000140 x11 0000000000004818
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x12 7369206e6f697463 x13 0065766974636120 x14 0000007ef9c33000 x15 0000007ef9c33000
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x16 0000007f94b33be0 x17 0000007f94ac695c x18 000000000000004b x19 0000000000000000
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x20 0000000000000000 x21 0000007f0bbdf2c0 x22 0000007ef9d87000 x23 0000007efb06d360
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x24 000000000000000c x25 0000007f998055e0 x26 0000007f13e14ca0 x27 0000007f998055e0
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: x28 0000007fe848a690 x29 0000007fe848a620
2019-07-08 16:28:15.719 18490-18490/? A/DEBUG: sp 0000007fe848a5b0 lr 0000007ef9d5959c pc 0000007ef9d5959c
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: backtrace:
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #00 pc 000000000001959c /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/lib/arm64/libiocipher.so (sqlfs_proc_access+164)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #01 pc 0000000000017438 /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/lib/arm64/libiocipher.so
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #02 pc 000000000054ebe0 /system/lib64/libart.so (art_quick_generic_jni_trampoline+144)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #03 pc 0000000000545b88 /system/lib64/libart.so (art_quick_invoke_stub+584)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #04 pc 00000000000cf698 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #05 pc 000000000027a978 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #06 pc 00000000002749b8 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #07 pc 00000000005167a0 /system/lib64/libart.so (MterpInvokeInterface+1392)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #08 pc 0000000000538394 /system/lib64/libart.so (ExecuteMterpImpl+14740)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #09 pc 00000000002e0b24 /dev/ashmem/dalvik-classes11.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes11.dex (deleted) (info.guardianproject.iocipher.File.doAccess+8)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #10 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #11 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #12 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #13 pc 0000000000516b64 /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #14 pc 0000000000538294 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #15 pc 00000000002e0bf0 /dev/ashmem/dalvik-classes11.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes11.dex (deleted) (info.guardianproject.iocipher.File.exists+4)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #16 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #17 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #18 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #19 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #20 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #21 pc 0000000000015762 /dev/ashmem/dalvik-classes6.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes6.dex (deleted) (info.guardianproject.keanu.core.util.SecureMediaStore.deleteLegacy+18)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #22 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #23 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #24 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #25 pc 0000000000516d28 /system/lib64/libart.so (MterpInvokeStatic+204)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #26 pc 0000000000538314 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-07-08 16:28:15.893 18490-18490/? A/DEBUG: #27 pc 000000000001596e /dev/ashmem/dalvik-classes6.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes6.dex (deleted) (info.guardianproject.keanu.core.util.SecureMediaStore.init+350)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #28 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #29 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #30 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #31 pc 0000000000516d28 /system/lib64/libart.so (MterpInvokeStatic+204)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #32 pc 0000000000538314 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #33 pc 0000000000075288 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.openEncryptedStores)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #34 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #35 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #36 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #37 pc 0000000000516b64 /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #38 pc 0000000000538294 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #39 pc 00000000000756d8 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onCacheWordOpened+12)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #40 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #41 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #42 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #43 pc 00000000005167a0 /system/lib64/libart.so (MterpInvokeInterface+1392)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #44 pc 0000000000538394 /system/lib64/libart.so (ExecuteMterpImpl+14740)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #45 pc 0000000000006af6 /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.checkCacheWordState+294)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #46 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #47 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #48 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #49 pc 0000000000516b64 /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #50 pc 0000000000538294 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #51 pc 0000000000006ce8 /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.setCachedSecrets+24)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #52 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #53 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #54 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #55 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #56 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #57 pc 0000000000006d2e /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.setPassphrase+46)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #58 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #59 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #60 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #61 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #62 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #63 pc 0000000000075686 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onCacheWordLocked+70)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #64 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #65 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #66 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #67 pc 00000000005167a0 /system/lib64/libart.so (MterpInvokeInterface+1392)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #68 pc 0000000000538394 /system/lib64/libart.so (ExecuteMterpImpl+14740)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #69 pc 0000000000006ac2 /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.checkCacheWordState+242)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #70 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #71 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #72 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #73 pc 0000000000516b64 /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #74 pc 0000000000538294 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #75 pc 0000000000006c7e /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.reattach+14)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #76 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #77 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #78 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #79 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #80 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #81 pc 0000000000075952 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-IjznN7-KUSUP3jPeO29Pbw==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onResume+14)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #82 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #83 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #84 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #85 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #86 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #87 pc 00000000003a8a6a /system/framework/boot-framework.vdex (android.app.Instrumentation.callActivityOnResume+6)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #88 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #89 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #90 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #91 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #92 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #93 pc 00000000003898b6 /system/framework/boot-framework.vdex (android.app.Activity.performResume+50)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #94 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #95 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #96 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #97 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #98 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #99 pc 000000000038122a /system/framework/boot-framework.vdex (android.app.ActivityThread.performResumeActivity+208)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #100 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #101 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #102 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #103 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #104 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #105 pc 0000000000384cbe /system/framework/boot-framework.vdex (android.app.ActivityThread.handleResumeActivity+12)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #106 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #107 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #108 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #109 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #110 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #111 pc 00000000003c7238 /system/framework/boot-framework.vdex (android.app.servertransaction.ResumeActivityItem.execute+24)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #112 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #113 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #114 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #115 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #116 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #117 pc 00000000003c7834 /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.executeLifecycleState+104)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #118 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #119 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #120 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #121 pc 0000000000516b64 /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #122 pc 0000000000538294 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #123 pc 00000000003c7698 /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.execute+74)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #124 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #125 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #126 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #127 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #128 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #129 pc 0000000000380072 /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+78)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #130 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #131 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #132 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #133 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #134 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #135 pc 0000000000ae5952 /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #136 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #137 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #138 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #139 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #140 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #141 pc 0000000000aeca40 /system/framework/boot-framework.vdex (android.os.Looper.loop+404)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #142 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #143 pc 0000000000254098 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #144 pc 000000000027499c /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #145 pc 0000000000516d28 /system/lib64/libart.so (MterpInvokeStatic+204)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #146 pc 0000000000538314 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #147 pc 0000000000385b62 /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #148 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #149 pc 00000000005064ec /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #150 pc 000000000054ecfc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #151 pc 0000000000545e4c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #152 pc 00000000000cf6b8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #153 pc 000000000044f524 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #154 pc 0000000000450f88 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #155 pc 00000000003e255c /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #156 pc 000000000011d6d4 /system/framework/arm64/boot.oat (offset 0x113000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #157 pc 0000000000545b88 /system/lib64/libart.so (art_quick_invoke_stub+584)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #158 pc 00000000000cf698 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #159 pc 000000000027a978 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #160 pc 00000000002749b8 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948)
2019-07-08 16:28:15.894 18490-18490/? A/DEBUG: #161 pc 0000000000515830 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #162 pc 0000000000538194 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #163 pc 0000000000c0da56 /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #164 pc 000000000024e938 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.953976685+488)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #165 pc 00000000005064ec /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #166 pc 000000000054ecfc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #167 pc 0000000000beb550 /system/framework/arm64/boot-framework.oat (offset 0x3cd000) (com.android.internal.os.ZygoteInit.main+3088)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #168 pc 0000000000545e4c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #169 pc 00000000000cf6b8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #170 pc 000000000044f524 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #171 pc 000000000044f17c /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+424)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #172 pc 00000000003594dc /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+768)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #173 pc 00000000000b1ef4 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #174 pc 00000000000b487c /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+756)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #175 pc 000000000000219c /system/bin/app_process64 (main+1200)
2019-07-08 16:28:15.895 18490-18490/? A/DEBUG: #176 pc 00000000000ace6c /system/lib64/libc.so (__libc_init+88)
2019-07-08 16:28:16.001 871-871/? E//system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_09
2019-07-08 16:28:16.025 791-791/? E/lowmemorykiller: Error opening /proc/18456/oom_score_adj; errno=2
2019-07-08 16:28:16.335 17647-17678/? E/Finsky: [398] uxd.a(138): Exception reading APK file
java.io.FileNotFoundException: File doesn't exist: /data/app/info.guardianproject.keanuapp-IVGfas63y_mMkA9TzEcw0Q==/base.apk
at java.util.zip.ZipFile.<init>(ZipFile.java:215)
at java.util.zip.ZipFile.<init>(ZipFile.java:152)
at java.util.zip.ZipFile.<init>(ZipFile.java:123)
at ajzf.<init>(SourceFile:1)
at uxd.a(SourceFile:118)
at uxd.c(SourceFile:2)
at vjl.run(Unknown Source:2)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1167)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:641)
at iml.run(Unknown Source:5)
at java.lang.Thread.run(Thread.java:764)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment