guardianproject / IOCipher

make non-root mountable encrypted disk shares
GNU Lesser General Public License v3.0
139 stars 44 forks source link

IOCipher virtual disk files need to be upgraded when using newer SQLCipher versions #10

Closed n8fr8 closed 5 years ago

n8fr8 commented 5 years ago
2019-07-05 10:19:22.257 18977-18977/? A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x334 in tid 18977 (roject.keanuapp), pid 18977 (roject.keanuapp)
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: Build fingerprint: 'google/sargo/sargo:9/PQ3B.190705.003/5622519:user/release-keys'
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: Revision: 'MP1.0'
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: ABI: 'arm'
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: pid: 18977, tid: 18977, name: roject.keanuapp  >>> info.guardianproject.keanuapp <<<
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x334
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG: Cause: null pointer dereference
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG:     r0  00000000  r1  000186c8  r2  68c215c4  r3  40000000
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG:     r4  00000000  r5  00000000  r6  e0bffe40  r7  ffe61948
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG:     r8  ffe61990  r9  00000000  r10 ffe61990  r11 e8ae5000
2019-07-05 10:19:22.333 19026-19026/? A/DEBUG:     ip  e8e34d00  sp  ffe61910  lr  e8e0d36b  pc  cbc4ffd4
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG: backtrace:
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #00 pc 0000ffd4  /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/lib/arm/libiocipher.so (sqlfs_proc_access+76)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #01 pc 0000e959  /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/lib/arm/libiocipher.so
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #02 pc 00411a79  /system/lib/libart.so (art_quick_generic_jni_trampoline+40)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #03 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #04 pc 003e6b91  /system/lib/libart.so (art_quick_invoke_stub+224)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #05 pc 000a1015  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #06 pc 001e5ae9  /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+236)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #07 pc 001e05d7  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+814)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #08 pc 003e23bb  /system/lib/libart.so (MterpInvokeInterface+1010)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #09 pc 00400514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #10 pc 002e0b24  /dev/ashmem/dalvik-classes11.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes11.dex (deleted) (info.guardianproject.iocipher.File.doAccess+8)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #11 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #12 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #13 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #14 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #15 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #16 pc 002e0bf0  /dev/ashmem/dalvik-classes11.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes11.dex (deleted) (info.guardianproject.iocipher.File.exists+4)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #17 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #18 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #19 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #20 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #21 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #22 pc 00015762  /dev/ashmem/dalvik-classes6.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes6.dex (deleted) (info.guardianproject.keanu.core.util.SecureMediaStore.deleteLegacy+18)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #23 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #24 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #25 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #26 pc 003e27c7  /system/lib/libart.so (MterpInvokeStatic+130)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #27 pc 00400494  /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #28 pc 0001596e  /dev/ashmem/dalvik-classes6.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes6.dex (deleted) (info.guardianproject.keanu.core.util.SecureMediaStore.init+350)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #29 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #30 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #31 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #32 pc 003e27c7  /system/lib/libart.so (MterpInvokeStatic+130)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #33 pc 00400494  /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #34 pc 00075288  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.openEncryptedStores)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #35 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #36 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #37 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #38 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #39 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #40 pc 000756d8  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onCacheWordOpened+12)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #41 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #42 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #43 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #44 pc 003e23bb  /system/lib/libart.so (MterpInvokeInterface+1010)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #45 pc 00400514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #46 pc 00006af6  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.checkCacheWordState+294)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #47 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #48 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #49 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #50 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #51 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #52 pc 00006ce8  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.setCachedSecrets+24)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #53 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #54 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #55 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #56 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #57 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #58 pc 00006d2e  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.setPassphrase+46)
2019-07-05 10:19:22.565 19026-19026/? A/DEBUG:     #59 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #60 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #61 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #62 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #63 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #64 pc 00075686  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onCacheWordLocked+70)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #65 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #66 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #67 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #68 pc 003e23bb  /system/lib/libart.so (MterpInvokeInterface+1010)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #69 pc 00400514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #70 pc 00006ac2  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.checkCacheWordState+242)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #71 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #72 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #73 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #74 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #75 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #76 pc 00006c7e  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.reattach+14)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #77 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #78 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #79 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #80 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #81 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #82 pc 00075952  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onResume+14)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #83 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #84 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #85 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #86 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #87 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #88 pc 003a8a6a  /system/framework/boot-framework.vdex (android.app.Instrumentation.callActivityOnResume+6)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #89 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #90 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #91 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #92 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #93 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #94 pc 003898b6  /system/framework/boot-framework.vdex (android.app.Activity.performResume+50)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #95 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #96 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #97 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #98 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #99 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #100 pc 0038122a  /system/framework/boot-framework.vdex (android.app.ActivityThread.performResumeActivity+208)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #101 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #102 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #103 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #104 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #105 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #106 pc 00384cbe  /system/framework/boot-framework.vdex (android.app.ActivityThread.handleResumeActivity+12)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #107 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #108 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #109 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #110 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #111 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #112 pc 003c7238  /system/framework/boot-framework.vdex (android.app.servertransaction.ResumeActivityItem.execute+24)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #113 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #114 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #115 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #116 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #117 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #118 pc 003c7834  /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.executeLifecycleState+104)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #119 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #120 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #121 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #122 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #123 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #124 pc 003c7698  /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.execute+74)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #125 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #126 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #127 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #128 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #129 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #130 pc 00380072  /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+78)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #131 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #132 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #133 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #134 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #135 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #136 pc 00ae5952  /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #137 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #138 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #139 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #140 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #141 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #142 pc 00aeca40  /system/framework/boot-framework.vdex (android.os.Looper.loop+404)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #143 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #144 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #145 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #146 pc 003e27c7  /system/lib/libart.so (MterpInvokeStatic+130)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #147 pc 00400494  /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #148 pc 00385b62  /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #149 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #150 pc 001c937f  /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #151 pc 003d52d1  /system/lib/libart.so (artQuickToInterpreterBridge+880)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #152 pc 00411aff  /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #153 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #154 pc 003e6c93  /system/lib/libart.so (art_quick_invoke_static_stub+222)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #155 pc 000a1027  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #156 pc 00347ac5  /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #157 pc 00348f15  /system/lib/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned int)+1024)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #158 pc 002fb0c5  /system/lib/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+40)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #159 pc 0011226f  /system/framework/arm/boot.oat (offset 0x10c000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+110)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #160 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #161 pc 003e6b91  /system/lib/libart.so (art_quick_invoke_stub+224)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #162 pc 000a1015  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #163 pc 001e5ae9  /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+236)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #164 pc 001e05d7  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+814)
2019-07-05 10:19:22.566 19026-19026/? A/DEBUG:     #165 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #166 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #167 pc 00c0da56  /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #168 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #169 pc 001c937f  /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #170 pc 003d52d1  /system/lib/libart.so (artQuickToInterpreterBridge+880)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #171 pc 00411aff  /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #172 pc 00a10a0d  /system/framework/arm/boot-framework.oat (offset 0x3ab000) (com.android.internal.os.ZygoteInit.main+2836)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #173 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #174 pc 003e6c93  /system/lib/libart.so (art_quick_invoke_static_stub+222)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #175 pc 000a1027  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #176 pc 00347ac5  /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #177 pc 003478ef  /system/lib/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+310)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #178 pc 0028eb11  /system/lib/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+444)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #179 pc 0006cb4b  /system/lib/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+30)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #180 pc 0006eda3  /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+458)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #181 pc 00001989  /system/bin/app_process32 (main+728)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #182 pc 0008afdd  /system/lib/libc.so (__libc_init+48)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #183 pc 0000166f  /system/bin/app_process32 (_start_main+38)
2019-07-05 10:19:22.567 19026-19026/? A/DEBUG:     #184 pc 00000306  <anonymous:ec767000>
2019-07-05 10:20:37.218 19575-19575/? A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x334 in tid 19575 (roject.keanuapp), pid 19575 (roject.keanuapp)
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: Build fingerprint: 'google/sargo/sargo:9/PQ3B.190705.003/5622519:user/release-keys'
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: Revision: 'MP1.0'
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: ABI: 'arm'
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: pid: 19575, tid: 19575, name: roject.keanuapp  >>> info.guardianproject.keanuapp <<<
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x334
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG: Cause: null pointer dereference
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG:     r0  00000000  r1  000186c8  r2  68c215c4  r3  40000000
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG:     r4  00000000  r5  00000000  r6  ce483980  r7  ffe61948
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG:     r8  ffe61990  r9  00000000  r10 ffe61990  r11 e8ae5000
2019-07-05 10:20:37.289 19597-19597/? A/DEBUG:     ip  e8e34d00  sp  ffe61910  lr  e8e0d36b  pc  cbc55fd4
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG: backtrace:
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #00 pc 0000ffd4  /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/lib/arm/libiocipher.so (sqlfs_proc_access+76)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #01 pc 0000e959  /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/lib/arm/libiocipher.so
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #02 pc 00411a79  /system/lib/libart.so (art_quick_generic_jni_trampoline+40)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #03 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #04 pc 003e6b91  /system/lib/libart.so (art_quick_invoke_stub+224)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #05 pc 000a1015  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #06 pc 001e5ae9  /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+236)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #07 pc 001e05d7  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+814)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #08 pc 003e23bb  /system/lib/libart.so (MterpInvokeInterface+1010)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #09 pc 00400514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #10 pc 002e0b24  /dev/ashmem/dalvik-classes11.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes11.dex (deleted) (info.guardianproject.iocipher.File.doAccess+8)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #11 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #12 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #13 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #14 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #15 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #16 pc 002e0bf0  /dev/ashmem/dalvik-classes11.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes11.dex (deleted) (info.guardianproject.iocipher.File.exists+4)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #17 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #18 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #19 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #20 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #21 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #22 pc 00015762  /dev/ashmem/dalvik-classes6.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes6.dex (deleted) (info.guardianproject.keanu.core.util.SecureMediaStore.deleteLegacy+18)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #23 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #24 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #25 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #26 pc 003e27c7  /system/lib/libart.so (MterpInvokeStatic+130)
2019-07-05 10:20:37.569 19597-19597/? A/DEBUG:     #27 pc 00400494  /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #28 pc 0001596e  /dev/ashmem/dalvik-classes6.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes6.dex (deleted) (info.guardianproject.keanu.core.util.SecureMediaStore.init+350)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #29 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #30 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #31 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #32 pc 003e27c7  /system/lib/libart.so (MterpInvokeStatic+130)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #33 pc 00400494  /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #34 pc 00075288  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.openEncryptedStores)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #35 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #36 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #37 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #38 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #39 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #40 pc 000756d8  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onCacheWordOpened+12)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #41 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #42 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #43 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #44 pc 003e23bb  /system/lib/libart.so (MterpInvokeInterface+1010)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #45 pc 00400514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #46 pc 00006af6  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.checkCacheWordState+294)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #47 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #48 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #49 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #50 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #51 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #52 pc 00006ce8  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.setCachedSecrets+24)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #53 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #54 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #55 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #56 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #57 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #58 pc 00006d2e  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.setPassphrase+46)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #59 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #60 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #61 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #62 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #63 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #64 pc 00075686  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onCacheWordLocked+70)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #65 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #66 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #67 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #68 pc 003e23bb  /system/lib/libart.so (MterpInvokeInterface+1010)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #69 pc 00400514  /system/lib/libart.so (ExecuteMterpImpl+14740)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #70 pc 00006ac2  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.checkCacheWordState+242)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #71 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #72 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #73 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #74 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #75 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #76 pc 00006c7e  /dev/ashmem/dalvik-classes8.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk!classes8.dex (deleted) (info.guardianproject.keanu.core.cacheword.CacheWordHandler.reattach+14)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #77 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #78 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #79 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #80 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #81 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #82 pc 00075952  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/info.guardianproject.keanuapp-5JJl2ZlSY18XZJl1gSH70A==/base.apk (deleted) (info.guardianproject.keanuapp.RouterActivity.onResume+14)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #83 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #84 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #85 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #86 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #87 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #88 pc 003a8a6a  /system/framework/boot-framework.vdex (android.app.Instrumentation.callActivityOnResume+6)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #89 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #90 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #91 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #92 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #93 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #94 pc 003898b6  /system/framework/boot-framework.vdex (android.app.Activity.performResume+50)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #95 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #96 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #97 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #98 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #99 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #100 pc 0038122a  /system/framework/boot-framework.vdex (android.app.ActivityThread.performResumeActivity+208)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #101 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #102 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #103 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #104 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #105 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #106 pc 00384cbe  /system/framework/boot-framework.vdex (android.app.ActivityThread.handleResumeActivity+12)
2019-07-05 10:20:37.570 19597-19597/? A/DEBUG:     #107 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #108 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #109 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #110 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #111 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #112 pc 003c7238  /system/framework/boot-framework.vdex (android.app.servertransaction.ResumeActivityItem.execute+24)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #113 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #114 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #115 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #116 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #117 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #118 pc 003c7834  /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.executeLifecycleState+104)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #119 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #120 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #121 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #122 pc 003e2679  /system/lib/libart.so (MterpInvokeDirect+196)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #123 pc 00400414  /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #124 pc 003c7698  /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.execute+74)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #125 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #126 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #127 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #128 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #129 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #130 pc 00380072  /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+78)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #131 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #132 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #133 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #134 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #135 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #136 pc 00ae5952  /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #137 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #138 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #139 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #140 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #141 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #142 pc 00aeca40  /system/framework/boot-framework.vdex (android.os.Looper.loop+404)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #143 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #144 pc 001c9439  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #145 pc 001e05bf  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #146 pc 003e27c7  /system/lib/libart.so (MterpInvokeStatic+130)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #147 pc 00400494  /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #148 pc 00385b62  /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #149 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #150 pc 001c937f  /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #151 pc 003d52d1  /system/lib/libart.so (artQuickToInterpreterBridge+880)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #152 pc 00411aff  /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #153 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #154 pc 003e6c93  /system/lib/libart.so (art_quick_invoke_static_stub+222)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #155 pc 000a1027  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #156 pc 00347ac5  /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #157 pc 00348f15  /system/lib/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned int)+1024)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #158 pc 002fb0c5  /system/lib/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+40)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #159 pc 0011226f  /system/framework/arm/boot.oat (offset 0x10c000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+110)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #160 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #161 pc 003e6b91  /system/lib/libart.so (art_quick_invoke_stub+224)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #162 pc 000a1015  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #163 pc 001e5ae9  /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+236)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #164 pc 001e05d7  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+814)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #165 pc 003e17eb  /system/lib/libart.so (MterpInvokeVirtual+442)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #166 pc 00400314  /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #167 pc 00c0da56  /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #168 pc 001c4d53  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1260696089+378)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #169 pc 001c937f  /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #170 pc 003d52d1  /system/lib/libart.so (artQuickToInterpreterBridge+880)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #171 pc 00411aff  /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #172 pc 00a10a0d  /system/framework/arm/boot-framework.oat (offset 0x3ab000) (com.android.internal.os.ZygoteInit.main+2836)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #173 pc 0040d575  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #174 pc 003e6c93  /system/lib/libart.so (art_quick_invoke_static_stub+222)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #175 pc 000a1027  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #176 pc 00347ac5  /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #177 pc 003478ef  /system/lib/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+310)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #178 pc 0028eb11  /system/lib/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+444)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #179 pc 0006cb4b  /system/lib/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+30)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #180 pc 0006eda3  /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+458)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #181 pc 00001989  /system/bin/app_process32 (main+728)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #182 pc 0008afdd  /system/lib/libc.so (__libc_init+48)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #183 pc 0000166f  /system/bin/app_process32 (_start_main+38)
2019-07-05 10:20:37.571 19597-19597/? A/DEBUG:     #184 pc 00000306  <anonymous:ec767000>
eighthave commented 5 years ago

Ok, so maybe the 32-bit crashes I saw were not an anomoly. Have you tried running it on a 64-bit device or emulator? Which device is that crash dump from?

https://lists.mayfirst.org/pipermail/guardian-dev/2019-July/005511.html

eighthave commented 5 years ago

try the 0.5 official release I just made

n8fr8 commented 5 years ago

crash still happening on 0.5 release: https://gist.github.com/n8fr8/dbc0da2f992bd1ee42dc4b88f9085e8c

n8fr8 commented 5 years ago

I am using the non-standalone build with SQLCipher 4.2 btw

n8fr8 commented 5 years ago

Given that keanu is probably the most complex project to test with, I can try on a smaller sample project shortly too!

eighthave commented 5 years ago

Can you point me to your branch in Keanu so I can see the details?

eighthave commented 5 years ago

FYI, your crash seems to be a "null pointer exception" which is different than the crashes I was seeing during testing on 32-bit.

eighthave commented 5 years ago

Also, this crash log that started this issue is a 32-bit build (ABI: 'arm') while the gist crash dump is 64-bit (ABI: 'arm64').

n8fr8 commented 5 years ago

Yes, I had it set before to be an armeabi-v7a only build, since i need to do that for the old 32bit only builds. Some other third party libraries we use have 64-bit libs, and it causes an error to mix libraries with partial and full 64 bit support.

Like I said, Keanu is probably the most complicated environment to test this in, but if you want it, then it is here: https://gitlab.com/keanuapp/keanuapp-android

eighthave commented 5 years ago

did you push your branch with NetCipher 0.5 somewhere ? What's a simpler app to try?

n8fr8 commented 5 years ago

I didn't but I can.

Maybe this on: https://github.com/n8fr8/CameraCipher ?

n8fr8 commented 5 years ago

(though that doesn't test the SQLCipher + IOCipher interaction)

eighthave commented 5 years ago

So I built CameraCipher with this gradle config:

dependencies {
    implementation 'com.android.support:support-v4:21.0.3'
    implementation 'info.guardianproject.iocipher:IOCipher:0.5@aar'
    implementation 'net.zetetic:android-database-sqlcipher:4.2.0@aar'
    implementation 'info.guardianproject.cacheword:cachewordlib:0.1.1'
    implementation files('libs/jcodec.jar')
}

And on the first run, I got an null pointer exception like you first reported. But then after that, I wasn't able to reproduce it and everything seems to work fine. I can take pictures, lock the app, restart it, unlock it, browse the gallery, etc. This is running in a 64-bit _x8664 emulator.

n8fr8 commented 5 years ago

I noticed that while you updated the libsqlcipher.so files to sqlcipher 4.2, the external sqlcipher submodule is sitll pointing at a release from 3 years ago. Is that intentional?

eighthave commented 5 years ago

As far as I remember, the sqlcipher submodule is only there to provide the headers since the binaries come from Maven Central. Since it worked, I guessed that the public API hasn't changed for IOCipher's needs, so I didn't bother to update it.