Index: tools/win/RetrieveSymbols/ReadMe.txt |
diff --git a/tools/win/RetrieveSymbols/ReadMe.txt b/tools/win/RetrieveSymbols/ReadMe.txt |
new file mode 100644 |
index 0000000000000000000000000000000000000000..fb9c5106fe7d07abb5e27baf6309149c3a617617 |
--- /dev/null |
+++ b/tools/win/RetrieveSymbols/ReadMe.txt |
@@ -0,0 +1,37 @@ |
+This tool is designed to download PE files and symbols from symbol servers. |
+Normally this is done automatically by tools such as windbg but it can be |
+helpful to be able to download these files on demand. |
+ |
+Sample usage: |
+ |
+> rem Add the VS tools to the path, for access to dumpbin |
+> "%vs120comntools%vsvars32.bat" |
+ |
+D:\src\chromium\src\tools\win>dumpbin /headers "c:\Program Files (x86)\Google\Chrome\Application\chrome.exe" | findstr "RSDS date image" |
+ 54E3AECF time date stamp Tue Feb 17 13:12:47 2015 |
+ 400000 image base (00400000 to 004D2FFF) |
+ 0.00 image version |
+ D3000 size of image |
+ 54E3AECF cv 5D 0008DF80 8D380 Format: RSDS, {283A66AE-3EF3-4383-8798-F6617112B1F6}, 1, C:\b\build\slave\win\build\src\out\Release\initialexe\chrome.exe.pdb |
+ |
+> RetrieveSymbols {283A66AE-3EF3-4383-8798-F6617112B1F6}, 1 chrome.exe.pdb |
+Parsing symbol data for a PDB file. |
+Looking for 283A66AE3EF343838798F6617112B1F6 1 chrome.exe.pdb. |
+Found symbol file - placed it in d:\src\symbols\chrome.exe.pdb\283A66AE3EF343838798F6617112B1F61\chrome.exe.pdb. |
+ |
+> RetrieveSymbols 54E3AECF D3000 chrome.exe |
+Parsing symbol data for a PE (.dll or .exe) file. |
+Looking for chrome.exe 54e3aecf d3000. |
+Found symbol file - placed it in d:\src\symbols\chrome.exe\54E3AECFd3000\chrome.exe. |
+ |
+The first invocation of RetrieveSymbols uses the GUID, age, and PDB name from |
+the RSDS line of the dumpbin output -- the extraneous '{', '}', ',' and '-' |
+characters are stripped out. |
+ |
+The second invocation of RetrieveSymbols uses the time date stamp from the |
+first line of the dumpbin output, the "size of image" data, and the |
+executable name. |
+ |
+This information can also be obtained from breakpad reports, from windbg |
+by using "lmv m chrome_elf" and "!lmi chrome_elf.dll", from ETW traces, |
+and from other sources. |