xref: /aosp_15_r20/external/cronet/build/android/stacktrace/README.md (revision 6777b5387eb2ff775bb5750e3f5d96f37fb7352b)
1# java_deobfuscate.py
2
3A wrapper around ProGuard's ReTrace tool, which:
4
51) Updates the regular expression used to identify stack lines, and
62) Streams its output.
7
8The second point here is what allows you to run:
9
10    adb logcat | build/android/stacktrace/java_deobfuscate.py out/Default/apks/ChromePublic.apk.mapping
11
12And have it actually show output without logcat terminating.
13
14
15## Update Instructions:
16
17    ninja -C out/Release java_deobfuscate_java
18    cp out/Release/lib.java/build/android/stacktrace/java_deobfuscate_java.jar build/android/stacktrace
19
20# stackwalker.py
21
22Extracts Breakpad microdumps from a log file and uses `stackwalker` to symbolize
23them.
24
25
26# crashpad_stackwalker.py
27
28Fetches Crashpad dumps from a given device, walks and symbolizes the stacks.
29