De-obfuscate the stack trace using Proguard GUI
Store the Proguard mapping.txt file for each released APK, which will be useful to de-obfuscate crash or exception stack trace.
Steps to retrace :-
1. Go to your SDK location -> Android_SDK\adt-bundle-windows-x86-20131030\sdk\tools\proguard\bin folder
2. Run retrace.bat file , choose "Retrace" option.
3. Add your proper mapping.txt
4. And paste the dumped stack trace , stack trace should be from "at" on each line
5. Proguard will replace all method and class names according to the mapping file.
Comments
Post a Comment