Home | History | Annotate | only in /external/chromium_org/tools/find_runtime_symbols
Up to higher level directory
NameDateSize
find_runtime_symbols.py11-Dec-20136.3K
OWNERS11-Dec-201323
prepare_symbol_info.py11-Dec-20138K
PRESUBMIT.py11-Dec-20131.4K
proc_maps.py11-Dec-20133.6K
README11-Dec-2013822
reduce_debugline.py11-Dec-20131.8K
static_symbols.py11-Dec-20138.8K
tests/11-Dec-2013

README

      1 This script maps runtime addresses to symbol names.  It is robust over
      2 Address Space Layout Randomization (ASLR) since it uses runtime addresses with
      3 runtime mapping information (/proc/.../maps).
      4 Like 'pprof --symbols' in gperftools <http://code.google.com/p/gperftools/>.
      5 
      6 
      7 Step 1: Prepare symbol information.
      8 
      9 It is required to collect symbol information before mapping runtime addresses
     10 to symbol names.
     11 
     12 ./prepare_symbol_info.py /path/to/maps [/another/path/to/symbol_info_dir]
     13 
     14 The required 'maps' file is /proc/.../maps of the process at runtime.
     15 
     16 
     17 Step 2: Find symbols.
     18 
     19 ./find_runtime_symbols.py /path/to/symbol_info_dir < addresses.txt
     20 
     21 'symbol_info_dir' is the result of the Step 1.
     22 The stdin should be a list of hex addresses to map, one per line.
     23 
     24 The results will be printed to stdout like 'pprof --symbols'.
     25