How do you interpret a deobfuscated Android crash report?

前端 未结 1 1725
执念已碎
执念已碎 2020-12-17 02:22

I downloaded a crash report from my app\'s Google Play admin area, ran it through retrace.sh to deobfuscate the Proguard mapping, and it produced the output bel

1条回答
  •  半阙折子戏
    2020-12-17 03:09

    ProGuard has removed the optional attributes SourceFile and LineNumberTable from the obfuscated application. As a result, the stack traces don't have line numbers, causing some ambiguity. ReTrace prints out a list of possible alternatives for each line of the stack trace.

    You can get stack traces that are easier to interpret by adding the following lines to your proguard-project.txt:

    -renamesourcefileattribute MyApplication
    -keepattributes SourceFile,LineNumberTable
    

    See the ProGuard manual > ReTrace > Usage.

    See the ProGuard manual > Examples > Producing useful stack traces

    0 讨论(0)
提交回复
热议问题