# java_deobfuscate.py A wrapper around ProGuard's ReTrace tool, which: 1) Updates the regular expression used to identify stack lines, and 2) Streams its output. The second point here is what allows you to run: adb logcat | build/android/stacktrace/java_deobfuscate.py out/Default/apks/ChromePublic.apk.mapping And have it actually show output without logcat terminating. ## Update Instructions: ninja -C out/Release java_deobfuscate cp out/Release/lib.java/build/android/stacktrace/java_deobfuscate.jar build/android/stacktrace # stackwalker.py Extracts Breakpad microdumps from a log file and uses `stackwalker` to symbolize them. # crashpad_stackwalker.py Fetches Crashpad dumps from a given device, walks and symbolizes the stacks.