0% found this document useful (0 votes)
165 views2 pages

Crash

The log file contains details of a crash on an Android device running version 9. The crash occurred when launching the MainActivity of the com.gmcbix app. It threw a SecurityException because the app package does not belong to the current user ID. The stack trace provides details of the error occurring when checking the calling package and enforcing setting permissions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
165 views2 pages

Crash

The log file contains details of a crash on an Android device running version 9. The crash occurred when launching the MainActivity of the com.gmcbix app. It threw a SecurityException because the app package does not belong to the current user ID. The stack trace provides details of the error occurring when checking the calling package and enforcing setting permissions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

Sat Aug 21 17:29:31 GMT+08:00 2021

/storage/emulated/0/crash.txt
101.1 (16142) 1-8-1616345858000-E81E079BF3434703-8996 2-0-315511200000-
604F4A9A0F99D53A-6613244 0-8-1616345858000-124215800CB67E00-1574320 56173257 817
1957ff0435b on Android(ACTIVE_CODENAMES: []; BASE_OS:
OPPO/CPH1923/OP486C:9/PPR1.180610.011/2021020000:user/release-keys; CODENAME: REL;
FIRST_SDK_INT: 28; INCREMENTAL: 1620291608; MIN_SUPPORTED_TARGET_SDK_INT: 17;
PREVIEW_SDK_INT: 0; RELEASE: 9; RESOURCES_SDK_INT: 28; SDK: 28; SDK_INT: 28;
SECURITY_PATCH: 2021-05-05; BOARD: oppo6762_18540; BOOTLOADER: unknown; BRAND:
OPPO; CPU_ABI: armeabi-v7a; CPU_ABI2: armeabi; DEVICE: OP486C; DISPLAY:
CPH1923EX_11_A.40; FINGERPRINT:
OPPO/CPH1923/OP486C:9/PPR1.180610.011/2021030000:user/release-keys; HARDWARE:
mt6765; HOST: ubuntu-142-22; ID: PPR1.180610.011; IS_CONTAINER: false;
IS_DEBUGGABLE: false; IS_EMULATOR: false; IS_ENG: false; IS_TREBLE_ENABLED: true;
IS_USER: true; IS_USERDEBUG: false; MANUFACTURER: OPPO; MODEL: CPH1923;
PERMISSIONS_REVIEW_REQUIRED: false; PRODUCT: CPH1923; RADIO: unknown; SERIAL:
ENDQZLOSKRKSJM4R; SUPPORTED_32_BIT_ABIS: [armeabi-v7a, armeabi];
SUPPORTED_64_BIT_ABIS: [arm64-v8a]; SUPPORTED_ABIS: [arm64-v8a, armeabi-v7a,
armeabi]; TAGS: release-keys; TIME: 1620291608000; TYPE: user; UNKNOWN: unknown;
USER: root; )
su
/data/user/0/io.va.exposed/virtual/data/user/0/com.gmcbix/files

GG: 101.1 [16142]


Android: 9
SDK: 28
vSpace: su
Thread: main
java.lang.RuntimeException: Unable to start activity
ComponentInfo{com.gmcbix/com.gmcbix.MainActivity}: java.lang.SecurityException:
Package com.gmcbix does not belong to 10345
at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:3201)
at android.app.ActivityThread.handleLaunchActivity(ActivityThread.java:3338)
at
android.app.TransactionHandlerProxy.handleLaunchActivity(TransactionHandlerProxy.ja
va:170)
at
android.app.TransactionHandlerProxy.handleLaunchActivity(TransactionHandlerProxy.ja
va:152)
at
android.app.servertransaction.LaunchActivityItem.execute(LaunchActivityItem.java:78
)
at
android.app.servertransaction.TransactionExecutor.executeCallbacks(TransactionExecu
tor.java:113)
at
android.app.servertransaction.TransactionExecutor.execute(TransactionExecutor.java:
71)
at android.app.ActivityThread$H.handleMessage(ActivityThread.java:2029)
at android.os.Handler.dispatchMessage(Handler.java:106)
at android.os.Looper.loop(Looper.java:233)
at android.app.ActivityThread.main(ActivityThread.java:7212)
at java.lang.reflect.Method.invoke(Native Method)
at
com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:499)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:965)
Caused by: java.lang.SecurityException: Package com.gmcbix does not belong to 10345
at android.os.Parcel.createException(Parcel.java:1966)
at android.os.Parcel.readException(Parcel.java:1934)
at
android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:183)
at
android.database.DatabaseUtils.readExceptionFromParcel(DatabaseUtils.java:135)
at android.content.ContentProviderProxy.call(ContentProviderNative.java:651)
at
android.provider.Settings$NameValueCache.getStringForUser(Settings.java:2113)
at android.provider.Settings$Global.getStringForUser(Settings.java:12360)
at android.provider.Settings$Global.getString(Settings.java:12349)
at android.provider.Settings$Global.getInt(Settings.java:12528)
at com.android.internal.policy.PhoneWindow.<init>(PhoneWindow.java:359)
at android.app.Activity.attach(Activity.java:7270)
at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:3144)
... 13 more
Caused by: android.os.RemoteException: Remote stack trace:
at android.app.AppOpsManager.checkPackage(AppOpsManager.java:2418)
at
android.content.ContentProvider.getCallingPackage(ContentProvider.java:834)
at
com.android.providers.settings.SettingsProvider.getCallingApplicationInfoOrThrow(Se
ttingsProvider.java:1985)
at
com.android.providers.settings.SettingsProvider.enforceSettingReadable(SettingsProv
ider.java:1964)
at
com.android.providers.settings.SettingsProvider.getGlobalSetting(SettingsProvider.j
ava:1051)

Hash: 1-8-1616345858000-E81E079BF3434703-8996 2-0-315511200000-604F4A9A0F99D53A-


6613244 0-8-1616345858000-124215800CB67E00-1574320 56173257 817 1957ff0435b

You might also like