blob: 07d986c5599c59864ebd5008454c0dbd0b287c69 [file] [log] [blame]
// Copyright 2017 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
package org.chromium.build;
import java.io.BufferedReader;
import java.io.File;
import java.io.IOException;
import java.io.InputStreamReader;
import java.io.LineNumberReader;
import java.io.OutputStreamWriter;
import java.io.PrintWriter;
import proguard.retrace.ReTrace;
/**
* A wrapper around ReTrace that:
* 1. Hardcodes a more useful line regular expression
* 2. Disables output buffering
*/
public class FlushingReTrace {
// E.g.: D/ConnectivityService(18029): Message
// E.g.: W/GCM (15158): Message
// E.g.: 09-08 14:22:59.995 18029 18055 I ProcessStatsService: Message
// E.g.: 09-08 14:30:59.145 17731 18020 D MDnsDS : Message
private static final String LOGCAT_PREFIX =
"(?:[VDIWEF]/.*?\\(\\d+\\): |\\d\\d-\\d\\d [0-9:. ]+[VDIWEF] .*?: )?";
// Note: Order of these sub-patterns defines their precedence.
// Note: Deobfuscation of methods without the presense of line numbers basically never works.
// There is a test for these pattern at //build/android/stacktrace/java_deobfuscate_test.py
private static final String LINE_PARSE_REGEX =
// Eagerly match logcat prefix to avoid conflicting with the patterns below.
LOGCAT_PREFIX
+ "(?:"
// Based on default ReTrace regex, but with "at" changed to to allow :
// E.g.: 06-22 13:58:02.895 4674 4674 E THREAD_STATE: bLA.a(PG:173)
// Normal stack trace lines look like:
// \tat org.chromium.chrome.browser.tab.Tab.handleJavaCrash(Tab.java:682)
+ "(?:.*?(?::|\\bat)\\s+%c\\.%m\\s*\\(%s(?::%l)?\\))|"
// E.g.: VFY: unable to resolve new-instance 3810 (LSome/Framework/Class;) in Lfoo/Bar;
+ "(?:.*L%C;.*)|"
// E.g.: END SomeTestClass#someMethod
+ "(?:.*?%c#%m.*?)|"
// E.g.: The member "Foo.bar"
// E.g.: The class "Foobar"
+ "(?:.*?\"%c\\.%m\".*)|"
+ "(?:.*?\"%c\".*)|"
// E.g.: java.lang.RuntimeException: Intentional Java Crash
+ "(?:%c:.*)|"
// All lines that end with a class / class+method:
// E.g.: The class: Foo
// E.g.: INSTRUMENTATION_STATUS: class=Foo
// E.g.: NoClassDefFoundError: SomeFrameworkClass in isTestClass for Foo
// E.g.: Could not find class 'SomeFrameworkClass', referenced from method Foo.bar
// E.g.: Could not find method SomeFrameworkMethod, referenced from method Foo.bar
+ "(?:.*(?:=|:\\s*|\\s+)%c\\.%m)|"
+ "(?:.*(?:=|:\\s*|\\s+)%c)"
+ ")";
private static void usage() {
System.err.println("Usage: echo $OBFUSCATED_CLASS | java_deobfuscate Foo.apk.mapping");
System.err.println("Usage: java_deobfuscate Foo.apk.mapping < foo.log");
System.err.println("Note: Deobfuscation of symbols outside the context of stack "
+ "traces will work only when lines match the regular expression defined "
+ "in FlushingReTrace.java.");
System.err.println("Also: Deobfuscation of method names without associated line "
+ "numbers does not seem to work.");
System.exit(1);
}
public static void main(String[] args) {
if (args.length != 1 || args[0].startsWith("-")) {
usage();
}
File mappingFile = new File(args[0]);
try {
LineNumberReader reader = new LineNumberReader(
new BufferedReader(new InputStreamReader(System.in, "UTF-8")));
// Enabling autoFlush is the main difference from ReTrace.main().
boolean autoFlush = true;
PrintWriter writer =
new PrintWriter(new OutputStreamWriter(System.out, "UTF-8"), autoFlush);
boolean verbose = false;
new ReTrace(LINE_PARSE_REGEX, verbose, mappingFile).retrace(reader, writer);
} catch (IOException ex) {
// Print a verbose stack trace.
ex.printStackTrace();
System.exit(1);
}
System.exit(0);
}
}