Apktool
Apktool copied to clipboard
[BUG] Recompilation breaks app
Information
- Apktool Version (
apktool -version) - latest Actions binary - Operating System (Mac, Linux, Windows) - Windows
- APK From? (Playstore, ROM, Other) - gcam ports website, see below
Stacktrace/Logcat
E libprotobuf-native: [libprotobuf ERROR external/protobuf/src/google/protobuf/message_lite.cc:123] Can't parse message of type "sns_flicker_event" because it is missing required fields: (cannot determine missing fields for lite message)
E libprotobuf-native: [libprotobuf ERROR external/protobuf/src/google/protobuf/message_lite.cc:123] Can't parse message of type "sns_flicker_event" because it is missing required fields: (cannot determine missing fields for lite message)
W CAM_A : OneCamera failed to open, closing lifetime.
W CAM_A : java.lang.IllegalStateException: Error updating preview surfaceview
W CAM_A : at ewo.a(Unknown Source:175)
W CAM_A : at pfc.f(Unknown Source:29)
W CAM_A : at pfe.run(Unknown Source:483)
W CAM_A : at pgm.DIorozrreOKMQoKk(Unknown Source:0)
W CAM_A : at pgm.execute(Unknown Source:8)
W CAM_A : at pfs.q(Unknown Source:15)
W CAM_A : at pfs.l(Unknown Source:257)
W CAM_A : at pfs.a(Unknown Source:144)
W CAM_A : at pfw.run(Unknown Source:129)
W CAM_A : at bwx.run(Unknown Source:166)
W CAM_A : at android.os.Handler.handleCallback(Unknown Source:2)
W CAM_A : at android.os.Handler.dispatchMessage(Unknown Source:4)
W CAM_A : at android.os.Looper.loopOnce(Unknown Source:176)
W CAM_A : at android.os.Looper.loop(Unknown Source:76)
W CAM_A : at android.app.ActivityThread.main(Unknown Source:138)
W CAM_A : at java.lang.reflect.Method.invoke(Native Method)
W CAM_A : at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(Unknown Source:11)
W CAM_A : at com.android.internal.os.ZygoteInit.main(Unknown Source:309)
W CAM_A : Caused by: java.lang.NullPointerException
W CAM_A : at jmy.<init>(Unknown Source:1352)
W CAM_A : at hct.get(Unknown Source:1316)
W CAM_A : at pym.get(Unknown Source:49)
W CAM_A : at jne.f(Unknown Source:392)
W CAM_A : at ghn.a(Unknown Source:46)
W CAM_A : at pfu.f(Unknown Source:14)
W CAM_A : at pfw.run(Unknown Source:256)
W CAM_A : ... 9 more
Steps to Reproduce
apktool b
Frameworks
If this APK is from an OEM ROM (Samsung, HTC, LG). Please attach framework files
(.apks that live in /system/framework or /system/priv-app)
APK
If this APK can be freely shared, please upload/attach a link to it. https://www.celsoazevedo.com/files/android/google-camera/dev-bsg/f/dl93/
Questions to ask before submission
- Have you tried
apktool d,apktool bwithout changing anything? - yes - If you are trying to install a modified apk, did you resign it? - yes
- Are you using the latest apktool version? - yes
Well not sure, that stacktrace is mostly redacted and the warnings at the top look to be from within AOSP itself. So not sure we yet have a pinpoint to what file in the re-assembly could be malformed.
Sorry - just going to close. Have no insight into this, so chalking it up as a "magic apk".
➜ 2848 apktool d MGC_8.5.300_A10_V1_MGC.apk -f
Picked up _JAVA_OPTIONS: -Dawt.useSystemAAFontSettings=on -Dswing.aatext=true
I: Using Apktool 2.6.2-eb105f-SNAPSHOT on MGC_8.5.300_A10_V1_MGC.apk
I: Loading resource table...
I: Decoding AndroidManifest.xml with resources...
I: Loading resource table from file: /home/ibotpeaches/.local/share/apktool/framework/1.apk
I: Regular manifest package...
I: Decoding file-resources...
I: Decoding values */* XMLs...
I: Baksmaling classes.dex...
I: Baksmaling classes2.dex...
I: Baksmaling classes3.dex...
I: Copying assets and libs...
I: Copying unknown files...
I: Copying original files...
I: Copying META-INF/services directory