Skip to content

Commit

Permalink
PR 690: Use expected absolute path to llvm-dsymutil #15484
Browse files Browse the repository at this point in the history
 - Use expected absolute path to llvm-dsymutil #15484

Related work items: #15484
  • Loading branch information
Mike Richter committed Mar 16, 2017
2 parents c7f9c67 + c4210ab commit d42dcb9
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion README.md
Expand Up @@ -409,14 +409,16 @@ This will show the symbols from your app. If you do this with an unobfuscated bu

### Reversing obfuscation in crash dumps

*PPiOS-Rename* lets you reverse the process of obfuscation for crash dump files. This is important so you can find the original classes and methods involved in a crash. It does this by using the information from a map file (e.g. `symbols.map`) to modify the crash dump text, replacing the obfuscated symbols with the original names. For example:

ppios-rename --translate-crashdump --symbols-map path/to/symbols_x.y.z.map path/to/crashdump path/to/output

### Reversing obfuscation in dSYMs

It is possible to reverse the process of obfuscation in the dSYMs by using a utility included with [PPiOS-ControlFlow](https://www.preemptive.com/products/ppios). The de-obfuscated dSYMs let you see the original names in automatic crash reporting tools such as HockeyApp, Crashlytics, Fabric, BugSense/Splunk Mint, or Crittercism. It does this by using the information from a map file (e.g. `symbols.map`) to generate a "reverse dSYM" file that has the non-obfuscated symbol names in it. For example:

path/to/ppios-controlflow/bin/llvm-dsymutil -ppios-map=path/to/symbols_x.y.z.map path/to/input.dSYM -o=path/to/output.dSYM
/usr/local/share/preemptive/PPiOS/bin/llvm-dsymutil -ppios-map=path/to/symbols_x.y.z.map path/to/input.dSYM -o=path/to/output.dSYM

>Note: If you do not pass the `-o` argument, the `input.dSYM` will be manipulated by `llvm-dsymutil`.
Expand Down

0 comments on commit d42dcb9

Please sign in to comment.