Francis Mariano
08/15/2024, 2:34 PMjava.lang.ClassCastException: java.lang.Float cannot be cast to u1.Z
at J1.d.q(Unknown Source:142)
at J1.d.j(Unknown Source:12)
at C4.D.b(Unknown Source:260)
at X5.w.j(Unknown Source:131)
at X5.j.q(Unknown Source:11)
at y5.a.s(Unknown Source:8)
at T5.L.run(Unknown Source:112)
at b6.a.run(Unknown Source:95)
Suppressed: Z5.f: [u0{Cancelling}@513cb02, Dispatchers.Default]
Pablichjenkov
08/15/2024, 3:06 PMChrimaeon
08/15/2024, 3:18 PMChrimaeon
08/15/2024, 3:19 PMPablichjenkov
08/15/2024, 3:20 PMChrimaeon
08/15/2024, 3:20 PMChrimaeon
08/15/2024, 3:22 PMeygraber
08/15/2024, 5:27 PMmapping.txt
file will be generated that holds the mapping of the obfuscated symbols to the original ones.
In your Android SDK directory under cmdline-tools/latest/bin
there is a tool called retrace
that you supply the path to your mapping.txt
and then give it the stacktrace that you want to de-obfuscate.eygraber
08/15/2024, 5:28 PMFrancis Mariano
08/15/2024, 5:37 PM-keepclasseswithmembernames class *
and all works fine now.louiscad
08/17/2024, 12:14 PMChrimaeon
08/17/2024, 12:15 PMlouiscad
08/17/2024, 12:16 PMlouiscad
08/17/2024, 12:17 PM