naiveproxy/build/android/stacktrace
2018-02-02 05:49:39 -05:00
..
java/org/chromium/build Import chromium-64.0.3282.140 2018-02-02 05:49:39 -05:00
BUILD.gn Import chromium-64.0.3282.140 2018-02-02 05:49:39 -05:00
java_deobfuscate_test.py Import chromium-64.0.3282.140 2018-02-02 05:49:39 -05:00
README.md Import chromium-64.0.3282.140 2018-02-02 05:49:39 -05:00
stackwalker.py Import chromium-64.0.3282.140 2018-02-02 05:49:39 -05:00

java_deobfuscate

A wrapper around ProGuard's ReTrace tool, which:

  1. Updates the regular expression used to identify stack lines, and
  2. Streams its output.

The second point here is what allows you to run:

adb logcat | out/Default/bin/java_deobfuscate out/Default/apks/ChromePublic.apk.mapping

And have it actually show output without logcat terminating.

stackwalker.py

Extracts Breakpad microdumps from a log file and uses stackwalker to symbolize them.