Name | Date | Size | #Lines | LOC | ||
---|---|---|---|---|---|---|
.. | - | - | ||||
java/org/chromium/build/ | H | 25-Apr-2025 | - | 158 | 92 | |
BUILD.gn | H A D | 25-Apr-2025 | 741 | 25 | 20 | |
README.md | H A D | 25-Apr-2025 | 771 | 29 | 15 | |
crashpad_stackwalker.py | H A D | 25-Apr-2025 | 5.9 KiB | 176 | 146 | |
java_deobfuscate.py | H A D | 25-Apr-2025 | 953 | 37 | 23 | |
java_deobfuscate_java.jar | HD | 25-Apr-2025 | 7.5 KiB | |||
java_deobfuscate_test.py | H A D | 25-Apr-2025 | 6.1 KiB | 175 | 144 | |
stackwalker.py | H A D | 25-Apr-2025 | 3.8 KiB | 137 | 103 |
README.md
1# java_deobfuscate.py 2 3A wrapper around ProGuard's ReTrace tool, which: 4 51) Updates the regular expression used to identify stack lines, and 62) Streams its output. 7 8The second point here is what allows you to run: 9 10 adb logcat | build/android/stacktrace/java_deobfuscate.py out/Default/apks/ChromePublic.apk.mapping 11 12And have it actually show output without logcat terminating. 13 14 15## Update Instructions: 16 17 ninja -C out/Release java_deobfuscate_java 18 cp out/Release/lib.java/build/android/stacktrace/java_deobfuscate_java.jar build/android/stacktrace 19 20# stackwalker.py 21 22Extracts Breakpad microdumps from a log file and uses `stackwalker` to symbolize 23them. 24 25 26# crashpad_stackwalker.py 27 28Fetches Crashpad dumps from a given device, walks and symbolizes the stacks. 29