|
||
---|---|---|
.. | ||
java/org/chromium/build | ||
BUILD.gn | ||
crashpad_stackwalker.py | ||
java_deobfuscate.jar | ||
java_deobfuscate.py | ||
java_deobfuscate_test.py | ||
README.md | ||
stackwalker.py |
java_deobfuscate.py
A wrapper around ProGuard's ReTrace tool, which:
- Updates the regular expression used to identify stack lines, and
- Streams its output.
The second point here is what allows you to run:
adb logcat | build/android/stacktrace/java_deobfuscate.py out/Default/apks/ChromePublic.apk.mapping
And have it actually show output without logcat terminating.
Update Instructions:
ninja -C out/Release java_deobfuscate
cp out/Release/lib.java/build/android/stacktrace/java_deobfuscate.jar build/android/stacktrace
stackwalker.py
Extracts Breakpad microdumps from a log file and uses stackwalker
to symbolize
them.
crashpad_stackwalker.py
Fetches Crashpad dumps from a given device, walks and symbolizes the stacks.