tree: f187a49e3901608d97bf565142ef6ae5a6bd60c1 [path history] [tgz]
  1. BUILD.gn
  2. README.md
  3. crashpad_stackwalker.py
  4. java/
  5. java_deobfuscate.jar
  6. java_deobfuscate.py
  7. java_deobfuscate_test.py
  8. stackwalker.py
build/android/stacktrace/README.md

java_deobfuscate.py

A wrapper around ProGuard's ReTrace tool, which:

  1. Updates the regular expression used to identify stack lines, and
  2. Streams its output.

The second point here is what allows you to run:

adb logcat | build/android/stacktrace/java_deobfuscate.py out/Default/apks/ChromePublic.apk.mapping

And have it actually show output without logcat terminating.

Update Instructions:

ninja -C out/Release java_deobfuscate
cp out/Release/lib.java/build/android/stacktrace/java_deobfuscate.jar build/android/stacktrace

stackwalker.py

Extracts Breakpad microdumps from a log file and uses stackwalker to symbolize them.

crashpad_stackwalker.py

Fetches Crashpad dumps from a given device, walks and symbolizes the stacks.