Skip to content

Provide instructions and or capability to de-obfusate obfuscated stacktraces, class and method names #17

@billybong

Description

@billybong

Hi all!

Don't know exactly if this belongs to the JDK Flight Recorder project or JMC and if this should be posted in respective bug trackers or as GitHub issues, so forgive me if this is the wrong place.
Anyhow... We would like to utilize JFR/JMC as a tool to get profiling and logs from our customers, but the problem is that our code is obfuscated for legal reasons. Where would the best place be to put mapping logic for reading jfr files and provide a mapping translation hook?

I can see two possible solutions:

  • Have a separate tool that loads a JFR recording, perform the mappings and serialize back to a separate file in JFR format.
  • Or, inject a hook into the JMC parser that maps during the file loading/parsing step.

Looking at both the OpenJDK FlightRecorder API's and JMC it's not entirely clear to me where the best place to put this would be, but in the end I'd like to be able to use JMC rather than i.e. utilizing the JSON format and writing our own tooling for exposing graphs etc.

Link to SO question:
https://stackoverflow.com/questions/66743358/deobfuscating-stacktraces-and-class-method-names-in-jdk-flight-recorder-files

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions