unplugged-system/external/cronet/build/android/stacktrace
2025-10-06 13:59:42 +00:00
..
java/org/chromium/build Initial commit: AOSP 14 with modifications for Unplugged OS 2025-10-06 13:59:42 +00:00
BUILD.gn Initial commit: AOSP 14 with modifications for Unplugged OS 2025-10-06 13:59:42 +00:00
crashpad_stackwalker.py Initial commit: AOSP 14 with modifications for Unplugged OS 2025-10-06 13:59:42 +00:00
java_deobfuscate_java.jar Initial commit: AOSP 14 with modifications for Unplugged OS 2025-10-06 13:59:42 +00:00
java_deobfuscate_test.py Initial commit: AOSP 14 with modifications for Unplugged OS 2025-10-06 13:59:42 +00:00
java_deobfuscate.py Initial commit: AOSP 14 with modifications for Unplugged OS 2025-10-06 13:59:42 +00:00
README.md Initial commit: AOSP 14 with modifications for Unplugged OS 2025-10-06 13:59:42 +00:00
stackwalker.py Initial commit: AOSP 14 with modifications for Unplugged OS 2025-10-06 13:59:42 +00:00

java_deobfuscate.py

A wrapper around ProGuard's ReTrace tool, which:

  1. Updates the regular expression used to identify stack lines, and
  2. Streams its output.

The second point here is what allows you to run:

adb logcat | build/android/stacktrace/java_deobfuscate.py out/Default/apks/ChromePublic.apk.mapping

And have it actually show output without logcat terminating.

Update Instructions:

ninja -C out/Release java_deobfuscate_java
cp out/Release/lib.java/build/android/stacktrace/java_deobfuscate_java.jar build/android/stacktrace

stackwalker.py

Extracts Breakpad microdumps from a log file and uses stackwalker to symbolize them.

crashpad_stackwalker.py

Fetches Crashpad dumps from a given device, walks and symbolizes the stacks.