I got a stacktrace from the crashreporting system and it is obfuscated, like
... Failed resolution of: Lru/test/c/b/a; ...
I have a mapping file.
How to deobfuscate this stacktrace using mapping.txt?
Get deobfuscated crash stacktrace from your app page
Upload your mapping.txt to your app PlayStore page with the following steps:
After doing so, to view your deobfuscated crash stack traces:
You can check this link for more details.
Deobfuscate a piece of stacktrace
To convert the code by yourself use the retrace script (retrace.bat on Windows; retrace.sh on Mac/Linux). It is located in the <sdk-root>/tools/proguard/
directory. The script takes the mapping.txt file and your stack trace, producing a new, readable stack trace. The syntax for using the retrace tool is:
retrace.bat|retrace.sh [-verbose] mapping.txt [<stacktrace_file>]