naiveproxy/build/android/stacktrace
2018-08-11 05:35:24 +00:00
..
java/org/chromium/build Import chromium-68.0.3440.106 2018-08-11 05:35:24 +00:00
BUILD.gn Import chromium-68.0.3440.106 2018-08-11 05:35:24 +00:00
java_deobfuscate_test.py Import chromium-68.0.3440.106 2018-08-11 05:35:24 +00:00
README.md Import chromium-68.0.3440.106 2018-08-11 05:35:24 +00:00
stackwalker.py Import chromium-68.0.3440.106 2018-08-11 05:35:24 +00:00

java_deobfuscate

A wrapper around ProGuard's ReTrace tool, which:

  1. Updates the regular expression used to identify stack lines, and
  2. Streams its output.

The second point here is what allows you to run:

adb logcat | out/Default/bin/java_deobfuscate out/Default/apks/ChromePublic.apk.mapping

And have it actually show output without logcat terminating.

stackwalker.py

Extracts Breakpad microdumps from a log file and uses stackwalker to symbolize them.