summaryrefslogtreecommitdiffstats
path: root/tools/find_runtime_symbols
Commit message (Collapse)AuthorAgeFilesLines
* Add a Python library to read /proc on Linux.dmikurube@chromium.org2013-11-294-243/+20
| | | | | | | | | | | | It also moves tools/find_runtime_tools/proc_maps.py into tools/linux/procfs.py. BUG=324194 TEST=tools/linux/tests/procfs_tests.py NOTRY=True Review URL: https://codereview.chromium.org/96443002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@237919 0039d316-1c4b-4281-b951-d872f2087c98
* [dmprof] Fix prepare_symbol_info.py for Androidrmcilroy@chromium.org2013-07-101-2/+2
| | | | | | | | | | | Use binary_path (which is mapped from target->host executable on Android) instead of entry.name when generating file hash. BUG= Review URL: https://chromiumcodereview.appspot.com/18996002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@210864 0039d316-1c4b-4281-b951-d872f2087c98
* Add hash values in preparing symbol information.dmikurube@chromium.org2013-07-101-0/+14
| | | | | | | | | BUG=172837 NOTRY=True Review URL: https://chromiumcodereview.appspot.com/12096034 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@210740 0039d316-1c4b-4281-b951-d872f2087c98
* Estimates a path in host from a corresponding path in Android device.dmikurube@chromium.org2013-05-201-5/+5
| | | | | | | | | | | | | | | For Android, dmprof.py should find symbol information from binaries in the host instead of the Android device because dmprof.py doesn't run on the Android device. They are in different directories. This change estimates a path in the host from a corresponding path in the Android device. BUG=231800 NOTRY=true Review URL: https://chromiumcodereview.appspot.com/15035009 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@201062 0039d316-1c4b-4281-b951-d872f2087c98
* Fake directories of binary files to get symbol information out of target device.dmikurube@chromium.org2013-05-081-6/+16
| | | | | | | | | | BUG=231800 NOTRY=true R=peria@chromium.org Review URL: https://codereview.chromium.org/14846027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@198881 0039d316-1c4b-4281-b951-d872f2087c98
* Analyze history of memory regions which are hooked (normally mmap'ed) and ↵dmikurube@chromium.org2013-04-221-19/+29
| | | | | | | | | | | | | | unhooked in parts. It uses range_dict.py: http://crrev.com/190811 BUG=174304 NOTRY=true Review URL: https://chromiumcodereview.appspot.com/12223130 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@195450 0039d316-1c4b-4281-b951-d872f2087c98
* Breakdown memory usage by source file names in dmprof.dmikurube@chromium.org2013-04-092-69/+90
| | | | | | | | | | | | dmprof has classified memory usage by pattern-matching with function names. It adds another classification by pattern-matching with source file names. BUG=225343 NOTRY=true Review URL: https://chromiumcodereview.appspot.com/13514003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@193022 0039d316-1c4b-4281-b951-d872f2087c98
* Change the format of reduce_debugline.py.dmikurube@chromium.org2013-04-093-148/+60
| | | | | | | | | | | This script was added in http://crrev.com/192004 at first. BUG=225343 NOTRY=true Review URL: https://chromiumcodereview.appspot.com/13470029 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@193001 0039d316-1c4b-4281-b951-d872f2087c98
* Add an option to find source file names from runtime virtual addresses.dmikurube@chromium.org2013-04-031-4/+11
| | | | | | | | | | BUG=225343 NOTRY=true Review URL: https://chromiumcodereview.appspot.com/13525002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@192037 0039d316-1c4b-4281-b951-d872f2087c98
* Add hints to find source file names from runtime virtual addresses.dmikurube@chromium.org2013-04-033-0/+230
| | | | | | | | | | | | | | | | | prepare_symbol_info.py collected symbol and elf mapping information from binaries. This patch adds another set of hints to find source file names from DWARF .debug_line information with readelf. reduce_debugline.py picks up only address ranges from the original readelf output since the original output is too large. See the test how it works. BUG=225343 NOTRY=true Review URL: https://chromiumcodereview.appspot.com/13261014 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@192004 0039d316-1c4b-4281-b951-d872f2087c98
* Add OWNERS in deep_memory_profiler and find_runtime_symbols.dmikurube@chromium.org2013-03-131-0/+1
| | | | | | | | | | BUG=None NOTRY=true Review URL: https://chromiumcodereview.appspot.com/12775006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@187859 0039d316-1c4b-4281-b951-d872f2087c98
* Add a first test for tools/find_runtime_symbols.dmikurube@chromium.org2012-11-216-30/+201
| | | | | | | | | BUG=123749 Review URL: https://chromiumcodereview.appspot.com/11299095 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@169023 0039d316-1c4b-4281-b951-d872f2087c98
* Refactor Deep Memory Profiler's dmprof script.dmikurube@chromium.org2012-10-251-32/+77
| | | | | | | | | BUG=123750 NOTRY=True Review URL: https://chromiumcodereview.appspot.com/11146012 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@164023 0039d316-1c4b-4281-b951-d872f2087c98
* Remove shebang and executable bit from tools/find_runtime_symbols/proc_maps.py.dmikurube@chromium.org2012-09-281-1/+0
| | | | | | | | BUG=none Review URL: https://codereview.chromium.org/10983060 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@159208 0039d316-1c4b-4281-b951-d872f2087c98
* Insert missing shebang, accidentally removed in last revision.csilv@chromium.org2012-09-261-0/+1
| | | | | | TBR=asargent git-svn-id: svn://svn.chromium.org/chrome/trunk/src@158821 0039d316-1c4b-4281-b951-d872f2087c98
* Classify memory usage by allocated type in Deep Memory Profiler.dmikurube@chromium.org2012-09-265-257/+384
| | | | | | | | BUG=123758 Review URL: https://chromiumcodereview.appspot.com/10825075 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@158812 0039d316-1c4b-4281-b951-d872f2087c98
* Load static symbol information lazily with some clean-ups.dmikurube@chromium.org2012-07-303-97/+157
| | | | | | | | | | | | | | | | | | | | It also changes : - dmprof messages, - how to run subprocesses in prepare_symbol_info, - to prepare readelf result in prepare_symbol_info, - to rename procedure_boundaries => static_symbols, - how to parse nm results in static_symbols, - additional --keep option, - to ignore empty files, and - to store addresses in int. BUG=123749 TEST=use dmprof. Review URL: https://chromiumcodereview.appspot.com/10826008 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@148930 0039d316-1c4b-4281-b951-d872f2087c98
* A tool for mapping runtime addresses to symbol names.dmikurube@chromium.org2012-07-216-0/+541
BUG=123763 TEST=compare with pprof --symbols. Review URL: https://chromiumcodereview.appspot.com/10795028 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@147784 0039d316-1c4b-4281-b951-d872f2087c98