blob: 58ea94be98961aa3a09bda21b3907150c1ebfec1 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
|
# java_deobfuscate.py
A wrapper around ProGuard's ReTrace tool, which:
1) Updates the regular expression used to identify stack lines, and
2) Streams its output.
The second point here is what allows you to run:
adb logcat | build/android/stacktrace/java_deobfuscate.py out/Default/apks/ChromePublic.apk.mapping
And have it actually show output without logcat terminating.
## Update Instructions:
ninja -C out/Release java_deobfuscate
cp out/Release/lib.java/build/android/stacktrace/java_deobfuscate.jar build/android/stacktrace
# stackwalker.py
Extracts Breakpad microdumps from a log file and uses `stackwalker` to symbolize
them.
# crashpad_stackwalker.py
Fetches Crashpad dumps from a given device, walks and symbolizes the stacks.
|