blob: bfa537c5ad8b49912da8fbc84c152bd30902482d (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
|
# java_deobfuscate
A wrapper around ProGuard's ReTrace tool, which:
1) Updates the regular expression used to identify stack lines, and
2) Streams its output.
The second point here is what allows you to run:
adb logcat | out/Default/bin/java_deobfuscate out/Default/apks/ChromePublic.apk.mapping
And have it actually show output without logcat terminating.
# stackwalker.py
Extracts Breakpad microdumps from a log file and uses `stackwalker` to symbolize
them.
# crashpad_stackwalker.py
Fetches Crashpad dumps from a given device, walks and symbolizes the stacks.
|