tree: df79ad316bc6ee7bf9d3e96d07a0c7de18088c20 [path history] [tgz]
  1. java/
  2. BUILD.gn
  3. java_deobfuscate_test.py
  4. README.md
  5. stackwalker.py
build/android/stacktrace/README.md

java_deobfuscate

A wrapper around ProGuard's ReTrace tool, which:

  1. Updates the regular expression used to identify stack lines, and
  2. Streams its output.

The second point here is what allows you to run:

adb logcat | out/Default/bin/java_deobfuscate out/Default/apks/ChromePublic.apk.mapping

And have it actually show output without logcat terminating.

stackwalker.py

Extracts Breakpad microdumps from a log file and uses stackwalker to symbolize them.