Apktool icon indicating copy to clipboard operation
Apktool copied to clipboard

[BUG] Recompilation breaks app

Open Luffitys opened this issue 3 years ago • 1 comments

Information

  1. Apktool Version (apktool -version) - latest Actions binary
  2. Operating System (Mac, Linux, Windows) - Windows
  3. APK From? (Playstore, ROM, Other) - gcam ports website, see below

Stacktrace/Logcat

E libprotobuf-native: [libprotobuf ERROR external/protobuf/src/google/protobuf/message_lite.cc:123] Can't parse message of type "sns_flicker_event" because it is missing required fields: (cannot determine missing fields for lite message)
E libprotobuf-native: [libprotobuf ERROR external/protobuf/src/google/protobuf/message_lite.cc:123] Can't parse message of type "sns_flicker_event" because it is missing required fields: (cannot determine missing fields for lite message)
W CAM_A   : OneCamera failed to open, closing lifetime.
W CAM_A   : java.lang.IllegalStateException: Error updating preview surfaceview
W CAM_A   : 	at ewo.a(Unknown Source:175)
W CAM_A   : 	at pfc.f(Unknown Source:29)
W CAM_A   : 	at pfe.run(Unknown Source:483)
W CAM_A   : 	at pgm.DIorozrreOKMQoKk(Unknown Source:0)
W CAM_A   : 	at pgm.execute(Unknown Source:8)
W CAM_A   : 	at pfs.q(Unknown Source:15)
W CAM_A   : 	at pfs.l(Unknown Source:257)
W CAM_A   : 	at pfs.a(Unknown Source:144)
W CAM_A   : 	at pfw.run(Unknown Source:129)
W CAM_A   : 	at bwx.run(Unknown Source:166)
W CAM_A   : 	at android.os.Handler.handleCallback(Unknown Source:2)
W CAM_A   : 	at android.os.Handler.dispatchMessage(Unknown Source:4)
W CAM_A   : 	at android.os.Looper.loopOnce(Unknown Source:176)
W CAM_A   : 	at android.os.Looper.loop(Unknown Source:76)
W CAM_A   : 	at android.app.ActivityThread.main(Unknown Source:138)
W CAM_A   : 	at java.lang.reflect.Method.invoke(Native Method)
W CAM_A   : 	at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(Unknown Source:11)
W CAM_A   : 	at com.android.internal.os.ZygoteInit.main(Unknown Source:309)
W CAM_A   : Caused by: java.lang.NullPointerException
W CAM_A   : 	at jmy.<init>(Unknown Source:1352)
W CAM_A   : 	at hct.get(Unknown Source:1316)
W CAM_A   : 	at pym.get(Unknown Source:49)
W CAM_A   : 	at jne.f(Unknown Source:392)
W CAM_A   : 	at ghn.a(Unknown Source:46)
W CAM_A   : 	at pfu.f(Unknown Source:14)
W CAM_A   : 	at pfw.run(Unknown Source:256)
W CAM_A   : 	... 9 more

Steps to Reproduce

  1. apktool b

Frameworks

If this APK is from an OEM ROM (Samsung, HTC, LG). Please attach framework files (.apks that live in /system/framework or /system/priv-app)

APK

If this APK can be freely shared, please upload/attach a link to it. https://www.celsoazevedo.com/files/android/google-camera/dev-bsg/f/dl93/

Questions to ask before submission

  1. Have you tried apktool d, apktool b without changing anything? - yes
  2. If you are trying to install a modified apk, did you resign it? - yes
  3. Are you using the latest apktool version? - yes

Luffitys avatar Jul 09 '22 00:07 Luffitys

Well not sure, that stacktrace is mostly redacted and the warnings at the top look to be from within AOSP itself. So not sure we yet have a pinpoint to what file in the re-assembly could be malformed.

iBotPeaches avatar Jul 10 '22 11:07 iBotPeaches

Sorry - just going to close. Have no insight into this, so chalking it up as a "magic apk".

➜  2848 apktool d MGC_8.5.300_A10_V1_MGC.apk -f
Picked up _JAVA_OPTIONS: -Dawt.useSystemAAFontSettings=on -Dswing.aatext=true
I: Using Apktool 2.6.2-eb105f-SNAPSHOT on MGC_8.5.300_A10_V1_MGC.apk
I: Loading resource table...
I: Decoding AndroidManifest.xml with resources...
I: Loading resource table from file: /home/ibotpeaches/.local/share/apktool/framework/1.apk
I: Regular manifest package...
I: Decoding file-resources...
I: Decoding values */* XMLs...
I: Baksmaling classes.dex...
I: Baksmaling classes2.dex...
I: Baksmaling classes3.dex...
I: Copying assets and libs...
I: Copying unknown files...
I: Copying original files...
I: Copying META-INF/services directory

iBotPeaches avatar Nov 21 '22 12:11 iBotPeaches