| A wrapper around ProGuard's ReTrace tool, which: |
| 1) Updates the regular expression used to identify stack lines, and |
| The second point here is what allows you to run: |
| adb logcat | build/android/stacktrace/java_deobfuscate.py out/Default/apks/ChromePublic.apk.mapping |
| And have it actually show output without logcat terminating. |
| ninja -C out/Release java_deobfuscate |
| cp out/Release/lib.java/build/android/stacktrace/java_deobfuscate.jar build/android/stacktrace |
| Extracts Breakpad microdumps from a log file and uses `stackwalker` to symbolize |
| # crashpad_stackwalker.py |
| Fetches Crashpad dumps from a given device, walks and symbolizes the stacks. |