xref: /aosp_15_r20/external/angle/build/android/stacktrace/README.md (revision 8975f5c5ed3d1c378011245431ada316dfb6f244)
1# java_deobfuscate.py
2
3A wrapper around ProGuard's ReTrace tool, which:
4
51) Updates the regular expression used to identify stack lines, and
62) Streams its output.
7
8The second point here is what allows you to run:
9
10    adb logcat | build/android/stacktrace/java_deobfuscate.py out/Default/apks/ChromePublic.apk.mapping
11
12And have it actually show output without logcat terminating.
13
14
15## Update Instructions:
16
17    ninja -C out/Release java_deobfuscate_java
18    cp out/Release/lib.java/build/android/stacktrace/java_deobfuscate_java.jar build/android/stacktrace
19
20# stackwalker.py
21
22Extracts Breakpad microdumps from a log file and uses `stackwalker` to symbolize
23them.
24
25
26# crashpad_stackwalker.py
27
28Fetches Crashpad dumps from a given device, walks and symbolizes the stacks.
29