naiveproxy/build/android/stacktrace
2018-12-09 21:59:24 -05:00
..
java/org/chromium/build Import chromium-70.0.3538.110 2018-12-09 21:59:24 -05:00
BUILD.gn Import chromium-70.0.3538.110 2018-12-09 21:59:24 -05:00
java_deobfuscate_test.py Import chromium-70.0.3538.110 2018-12-09 21:59:24 -05:00
README.md Import chromium-70.0.3538.110 2018-12-09 21:59:24 -05:00
stackwalker.py Import chromium-70.0.3538.110 2018-12-09 21:59:24 -05:00

java_deobfuscate

A wrapper around ProGuard's ReTrace tool, which:

  1. Updates the regular expression used to identify stack lines, and
  2. Streams its output.

The second point here is what allows you to run:

adb logcat | out/Default/bin/java_deobfuscate out/Default/apks/ChromePublic.apk.mapping

And have it actually show output without logcat terminating.

stackwalker.py

Extracts Breakpad microdumps from a log file and uses stackwalker to symbolize them.