| Index: tools/android/memdump/memsymbols.py
|
| diff --git a/tools/android/memdump/memsymbols.py b/tools/android/memdump/memsymbols.py
|
| new file mode 100755
|
| index 0000000000000000000000000000000000000000..372196303baef3c9eba40f8d771e603ac71c743e
|
| --- /dev/null
|
| +++ b/tools/android/memdump/memsymbols.py
|
| @@ -0,0 +1,152 @@
|
| +#!/usr/bin/env python
|
| +#
|
| +# Copyright 2013 The Chromium Authors. All rights reserved.
|
| +# Use of this source code is governed by a BSD-style license that can be
|
| +# found in the LICENSE file.
|
| +
|
| +import base64
|
| +import os
|
| +import sys
|
| +import re
|
| +
|
| +from optparse import OptionParser
|
| +
|
| +"""Extracts the list of resident symbols of a library loaded in a process.
|
| +
|
| +This scripts combines the extended output of memdump for a given process
|
| +(obtained through memdump -x PID) and the symbol table of a .so loaded in that
|
| +process (obtained through nm -C lib-with-symbols.so), filtering out only those
|
| +symbols that, at the time of the snapshot, were resident in memory (that are,
|
| +the symbols which start address belongs to a mapped page of the .so which was
|
| +resident at the time of the snapshot).
|
| +The aim is to perform a "code coverage"-like profiling of a binary, intersecting
|
| +run-time information (list of resident pages) and debug symbols.
|
| +"""
|
| +
|
| +_PAGE_SIZE = 4096
|
| +
|
| +
|
| +def _TestBit(word, bit):
|
| + assert(bit >= 0 and bit < 8)
|
| + return not not ((word >> bit) & 1)
|
| +
|
| +
|
| +def _HexAddr(addr):
|
| + return hex(addr)[2:].zfill(8)
|
| +
|
| +
|
| +def _GetResidentPagesSet(memdump_contents, lib_name, verbose):
|
| + """Parses the memdump output and extracts the resident page set for lib_name.
|
| + Args:
|
| + memdump_contents: Array of strings (lines) of a memdump output.
|
| + lib_name: A string containing the name of the library.so to be matched.
|
| + verbose: Print a verbose header for each mapping matched.
|
| +
|
| + Returns:
|
| + A set of resident pages (the key is the page index) for all the
|
| + mappings matching .*lib_name.
|
| + """
|
| + resident_pages = set()
|
| + MAP_RX = re.compile(
|
| + r'^([0-9a-f]+)-([0-9a-f]+) ([\w-]+) ([0-9a-f]+) .* "(.*)" \[(.*)\]$')
|
| + for line in memdump_contents:
|
| + line = line.rstrip('\r\n')
|
| + if line.startswith('[ PID'):
|
| + continue
|
| +
|
| + r = MAP_RX.match(line)
|
| + if not r:
|
| + sys.stderr.write('Skipping %s from %s\n' % (line, memdump_file))
|
| + continue
|
| +
|
| + map_start = int(r.group(1), 16)
|
| + map_end = int(r.group(2), 16)
|
| + prot = r.group(3)
|
| + offset = int(r.group(4), 16)
|
| + assert(offset % _PAGE_SIZE == 0)
|
| + lib = r.group(5)
|
| + enc_bitmap = r.group(6)
|
| +
|
| + if not lib.endswith(lib_name):
|
| + continue
|
| +
|
| + bitmap = base64.b64decode(enc_bitmap)
|
| + map_pages_count = (map_end - map_start + 1) / _PAGE_SIZE
|
| + bitmap_pages_count = len(bitmap) * 8
|
| +
|
| + if verbose:
|
| + print 'Found %s: mapped %d pages in mode %s @ offset %s.' % (
|
| + lib, map_pages_count, prot, _HexAddr(offset))
|
| + print ' Map range in the process VA: [%s - %s]. Len: %s' % (
|
| + _HexAddr(map_start),
|
| + _HexAddr(map_end),
|
| + _HexAddr(map_pages_count * _PAGE_SIZE))
|
| + print ' Corresponding addresses in the binary: [%s - %s]. Len: %s' % (
|
| + _HexAddr(offset),
|
| + _HexAddr(offset + map_end - map_start),
|
| + _HexAddr(map_pages_count * _PAGE_SIZE))
|
| + print ' Bitmap: %d pages' % bitmap_pages_count
|
| + print ''
|
| +
|
| + assert(bitmap_pages_count >= map_pages_count)
|
| + for i in xrange(map_pages_count):
|
| + bitmap_idx = i / 8
|
| + bitmap_off = i % 8
|
| + if (bitmap_idx < len(bitmap) and
|
| + _TestBit(ord(bitmap[bitmap_idx]), bitmap_off)):
|
| + resident_pages.add(offset / _PAGE_SIZE + i)
|
| + return resident_pages
|
| +
|
| +
|
| +def main(argv):
|
| + NM_RX = re.compile(r'^([0-9a-f]+)\s+.*$')
|
| +
|
| + parser = OptionParser()
|
| + parser.add_option("-r", "--reverse",
|
| + action="store_true", dest="reverse", default=False,
|
| + help="Print out non present symbols")
|
| + parser.add_option("-v", "--verbose",
|
| + action="store_true", dest="verbose", default=False,
|
| + help="Print out verbose debug information.")
|
| +
|
| + (options, args) = parser.parse_args()
|
| +
|
| + if len(args) != 3:
|
| + print 'Usage: %s [-v] memdump.file nm.file library.so' % (
|
| + os.path.basename(argv[0]))
|
| + return 1
|
| +
|
| + memdump_file = args[0]
|
| + nm_file = args[1]
|
| + lib_name = args[2]
|
| +
|
| + if memdump_file == '-':
|
| + memdump_contents = sys.stdin.readlines()
|
| + else:
|
| + memdump_contents = open(memdump_file, 'r').readlines()
|
| + resident_pages = _GetResidentPagesSet(memdump_contents,
|
| + lib_name,
|
| + options.verbose)
|
| +
|
| + # Process the nm symbol table, filtering out the resident symbols.
|
| + nm_fh = open(nm_file, 'r')
|
| + for line in nm_fh:
|
| + line = line.rstrip('\r\n')
|
| + # Skip undefined symbols (lines with no address).
|
| + if line.startswith(' '):
|
| + continue
|
| +
|
| + r = NM_RX.match(line)
|
| + if not r:
|
| + sys.stderr.write('Skipping %s from %s\n' % (line, nm_file))
|
| + continue
|
| +
|
| + sym_addr = int(r.group(1), 16)
|
| + sym_page = sym_addr / _PAGE_SIZE
|
| + last_sym_matched = (sym_page in resident_pages)
|
| + if (sym_page in resident_pages) != options.reverse:
|
| + print line
|
| + return 0
|
| +
|
| +if __name__ == '__main__':
|
| + sys.exit(main(sys.argv))
|
|
|