Nonojbn

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2

Mon Oct 25 13:11:11 GMT+07:00 2021

/storage/emulated/0/crash.txt
101.1 (16142) 1-8-1616349458000-E81E079BF3434703-8996 2-0-315514800000-
604F4A9A0F99D53A-6613244 0-8-1616349458000-124215800CB67E00-1574320 56173257 817
1957ff0435b on Android(ACTIVE_CODENAMES: []; BASE_OS: ; CODENAME: REL;
FIRST_SDK_INT: 28; INCREMENTAL: eng.compil.20210825.161448;
MIN_SUPPORTED_TARGET_SDK_INT: 23; PREVIEW_SDK_FINGERPRINT: REL; PREVIEW_SDK_INT: 0;
RELEASE: 11; RELEASE_OR_CODENAME: 11; RESOURCES_SDK_INT: 30; SDK: 30; SDK_INT: 30;
SECURITY_PATCH: 2021-08-01; BOARD: QC_Reference_Phone; BOOTLOADER: unknown; BRAND:
vivo; CPU_ABI: arm64-v8a; CPU_ABI2: ; DEVICE: 1906; DISPLAY: RP1A.200720.012
release-keys; FINGERPRINT:
vivo/1906/1906:11/RP1A.200720.012/compiler0825161112:user/release-keys; HARDWARE:
qcom; HOST: comsz01078096; ID: RP1A.200720.012; IS_CONTAINER: false; IS_DEBUGGABLE:
false; IS_EMULATOR: false; IS_ENG: false; IS_TREBLE_ENABLED: true; IS_USER: true;
IS_USERDEBUG: false; MANUFACTURER: vivo; MODEL: vivo 2007;
PERMISSIONS_REVIEW_REQUIRED: true; PRODUCT: 1906; RADIO: unknown; SERIAL: kunnnow;
SUPPORTED_32_BIT_ABIS: [armeabi-v7a, armeabi]; SUPPORTED_64_BIT_ABIS: [arm64-v8a];
SUPPORTED_ABIS: [arm64-v8a, armeabi-v7a, armeabi]; TAGS: release-keys; TIME:
1629879072000; TYPE: user; UNKNOWN: unknown; USER: compiler; )
io.va.exposed64
/data/user/0/io.va.exposed64/virtual/data/user/0/com.ckhjzcvhs/files

GG: 101.1 [16142]


Android: 11
SDK: 30
vSpace: io.va.exposed64
Thread: main
java.lang.SecurityException: Given caller package com.ckhjzcvhs is not running in
process ProcessRecord{c4499d5 4670:io.va.exposed64:p0/u0a520}
at android.os.Parcel.createExceptionOrNull(Parcel.java:2387)
at android.os.Parcel.createException(Parcel.java:2371)
at android.os.Parcel.readException(Parcel.java:2354)
at android.os.Parcel.readException(Parcel.java:2296)
at
android.app.IActivityManager$Stub$Proxy.registerReceiverWithFeature(IActivityManage
r.java:6380)
at java.lang.reflect.Method.invoke(Native Method)
at
com.lody.virtual.client.hook.base.MethodInvocationStub$HookInvocationHandler.invoke
(MethodInvocationStub.java:189)
at java.lang.reflect.Proxy.invoke(Proxy.java:1006)
at $Proxy4.registerReceiverWithFeature(Unknown Source)
at android.app.ContextImpl.registerReceiverInternal(ContextImpl.java:1654)
at android.app.ContextImpl.registerReceiver(ContextImpl.java:1605)
at android.app.ContextImpl.registerReceiver(ContextImpl.java:1593)
at android.content.ContextWrapper.registerReceiver(ContextWrapper.java:668)
at android.content.ContextWrapper.registerReceiver(ContextWrapper.java:668)
at android.widget.AbsListView.onAttachedToWindow(AbsListView.java:3206)
at android.fix.ListView.onAttachedToWindow(src:138)
at android.view.View.dispatchAttachedToWindow(View.java:20704)
at android.view.ViewGroup.dispatchAttachedToWindow(ViewGroup.java:3541)
at android.view.ViewGroup.dispatchAttachedToWindow(ViewGroup.java:3548)
at android.view.ViewGroup.dispatchAttachedToWindow(ViewGroup.java:3548)
at android.view.ViewGroup.dispatchAttachedToWindow(ViewGroup.java:3548)
at android.view.ViewGroup.dispatchAttachedToWindow(ViewGroup.java:3548)
at android.view.ViewGroup.dispatchAttachedToWindow(ViewGroup.java:3548)
at android.view.ViewGroup.dispatchAttachedToWindow(ViewGroup.java:3548)
at android.view.ViewGroup.dispatchAttachedToWindow(ViewGroup.java:3548)
at android.view.ViewRootImpl.performTraversals(ViewRootImpl.java:2708)
at android.view.ViewRootImpl.doTraversal(ViewRootImpl.java:2214)
at android.view.ViewRootImpl$TraversalRunnable.run(ViewRootImpl.java:8686)
at android.view.Choreographer$CallbackRecord.run(Choreographer.java:1031)
at android.view.Choreographer.doCallbacks(Choreographer.java:849)
at android.view.Choreographer.doFrame(Choreographer.java:779)
at
android.view.Choreographer$FrameDisplayEventReceiver.run(Choreographer.java:1016)
at android.os.Handler.handleCallback(Handler.java:938)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loop(Looper.java:257)
at android.app.ActivityThread.main(ActivityThread.java:8218)
at java.lang.reflect.Method.invoke(Native Method)
at
com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:626)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1016)

Hash: 1-8-1616349458000-E81E079BF3434703-8996 2-0-315514800000-604F4A9A0F99D53A-


6613244 0-8-1616349458000-124215800CB67E00-1574320 56173257 817 1957ff0435b

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy