Extract useful information from backtraces


#1

We have a lot of reports from Google Play with this backtrace error:

  #00  pc 00000000006027ca  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #01  pc 0000000000137ca7  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #02  pc 0000000000137d9b  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #03  pc 000000000030ef69  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #04  pc 0000000000313825  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #05  pc 000000000023418d  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #06  pc 00000000002385df  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #07  pc 0000000000238ae7  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #08  pc 0000000000203207  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #09  pc 000000000031d2d5  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #10  pc 000000000048c1fb  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #11  pc 000000000033b681  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #12  pc 000000000033bcf1  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #13  pc 000000000033bd95  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #14  pc 0000000000348d2b  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #15  pc 00000000002ec72d  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #16  pc 000000000032e163  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #17  pc 0000000000333817  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #18  pc 00000000003339c5  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #19  pc 0000000000142209  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #20  pc 00000000000a8b00  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #21  pc 00000000000a4368  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #22  pc 00000000000a4ca8  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #23  pc 00000000000a2760  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #24  pc 000000000022a83f  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #25  pc 0000000000238467  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #26  pc 0000000000238ae7  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #27  pc 0000000000238c1d  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #28  pc 00000000001fe525  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #29  pc 00000000005d3297  /data/app/<my.app.id>-1/lib/arm/libNativeScript.so
  #30  pc 0000000000000098  <unknown>

Is there any useful information to file a ticket based on them in NativeScript ?

If not, is there anything we can do to our app in production in order for those backtraces to become more useful ?


#2

When distributing the android runtime, we take care to strip any extra symbols or debug information from the binary (c++ and v8 code) in order to reduce the runtime package size.

You could build the android-runtime package locally, without stripping that information.

I’d recommend however making a reproducible sample and sending it over.