Having looked at this, the documentation for proguard on the Android developer site demonstrates how to decode the stack trace, but it does not indicate how to get the stack trace.
http://developer.android.com/guide/developing/tools/proguard.html (see Decoding Stack Obfuscation Tracks)
I tried using a logcat dump like this: -
E/AndroidRuntime(14584): FATAL EXCEPTION: main E/AndroidRuntime(14584): java.lang.ExceptionInInitializerError E/AndroidRuntime(14584): at com.aabadg.<init>(Unknown Source) E/AndroidRuntime(14584): at com.aabaqa(Unknown Source) E/AndroidRuntime(14584): at com.aabaya(Unknown Source) E/AndroidRuntime(14584): at com.aabaya(Unknown Source) E/AndroidRuntime(14584): at com.aabaaq.get(Unknown Source) E/AndroidRuntime(14584): at com.aabcp.a(Unknown Source) E/AndroidRuntime(14584): at com.aabai.c(Unknown Source) E/AndroidRuntime(14584): at com.aabbg.a(Unknown Source) E/AndroidRuntime(14584): at com.aaaoa(Unknown Source) E/AndroidRuntime(14584): at com.aabee.a(Unknown Source) E/AndroidRuntime(14584): at com.aabag.a(Unknown Source) E/AndroidRuntime(14584): at com.aabcb.a(Unknown Source)
Unfortunately, this will not work, but it works if I remove E / AndroidRuntime (14584) from the beginning of every line in which it works:
FATAL EXCEPTION: main java.lang.ExceptionInInitializerError at com.aabadg.<init>(Unknown Source) at com.aabaqa(Unknown Source) at com.aabaya(Unknown Source) at com.aabaya(Unknown Source) at com.aabaaq.get(Unknown Source) at com.aabcp.a(Unknown Source) at com.aabai.c(Unknown Source) at com.aabbg.a(Unknown Source) at com.aaaoa(Unknown Source) at com.aabee.a(Unknown Source) at com.aabag.a(Unknown Source) at com.aabcb.a(Unknown Source)
Since the documentation states that you need a stack trace file, and there seems to be no indication of getting the correct stack trace file from the device.
The only way I've seen this is to provide a special exception handler and write the stack trace to the SD card.
Ian warwick
source share