chromium/build/android/stacktrace/README.md

# java_deobfuscate.py

A wrapper around ProGuard's ReTrace tool, which:

1) Updates the regular expression used to identify stack lines, and
2) Streams its output.

The second point here is what allows you to run:

    adb logcat | build/android/stacktrace/java_deobfuscate.py out/Default/apks/ChromePublic.apk.mapping

And have it actually show output without logcat terminating.


## Update Instructions:

    ninja -C out/Release java_deobfuscate_java
    cp out/Release/lib.java/build/android/stacktrace/java_deobfuscate_java.jar build/android/stacktrace

# stackwalker.py

Extracts Breakpad microdumps from a log file and uses `stackwalker` to symbolize
them.


# crashpad_stackwalker.py

Fetches Crashpad dumps from a given device, walks and symbolizes the stacks.