1# java_deobfuscate.py 2 3A wrapper around ProGuard's ReTrace tool, which: 4 51) Updates the regular expression used to identify stack lines, and 62) Streams its output. 7 8The second point here is what allows you to run: 9 10 adb logcat | build/android/stacktrace/java_deobfuscate.py out/Default/apks/ChromePublic.apk.mapping 11 12And have it actually show output without logcat terminating. 13 14 15## Update Instructions: 16 17 ninja -C out/Release java_deobfuscate_java 18 cp out/Release/lib.java/build/android/stacktrace/java_deobfuscate_java.jar build/android/stacktrace 19 20# stackwalker.py 21 22Extracts Breakpad microdumps from a log file and uses `stackwalker` to symbolize 23them. 24 25 26# crashpad_stackwalker.py 27 28Fetches Crashpad dumps from a given device, walks and symbolizes the stacks. 29