ReadMe.txt 1.8 KB

12345678910111213141516171819202122232425262728293031323334353637
  1. This tool is designed to download PE files and symbols from symbol servers.
  2. Normally this is done automatically by tools such as windbg but it can be
  3. helpful to be able to download these files on demand.
  4. Sample usage:
  5. > rem Add the VS tools to the path, for access to dumpbin
  6. > "%vs120comntools%vsvars32.bat"
  7. D:\src\chromium\src\tools\win>dumpbin /headers "c:\Program Files (x86)\Google\Chrome\Application\chrome.exe" | findstr "RSDS date image"
  8. 54E3AECF time date stamp Tue Feb 17 13:12:47 2015
  9. 400000 image base (00400000 to 004D2FFF)
  10. 0.00 image version
  11. D3000 size of image
  12. 54E3AECF cv 5D 0008DF80 8D380 Format: RSDS, {283A66AE-3EF3-4383-8798-F6617112B1F6}, 1, C:\b\build\slave\win\build\src\out\Release\initialexe\chrome.exe.pdb
  13. > RetrieveSymbols {283A66AE-3EF3-4383-8798-F6617112B1F6}, 1 chrome.exe.pdb
  14. Parsing symbol data for a PDB file.
  15. Looking for 283A66AE3EF343838798F6617112B1F6 1 chrome.exe.pdb.
  16. Found symbol file - placed it in d:\src\symbols\chrome.exe.pdb\283A66AE3EF343838798F6617112B1F61\chrome.exe.pdb.
  17. > RetrieveSymbols 54E3AECF D3000 chrome.exe
  18. Parsing symbol data for a PE (.dll or .exe) file.
  19. Looking for chrome.exe 54e3aecf d3000.
  20. Found symbol file - placed it in d:\src\symbols\chrome.exe\54E3AECFd3000\chrome.exe.
  21. The first invocation of RetrieveSymbols uses the GUID, age, and PDB name from
  22. the RSDS line of the dumpbin output -- the extraneous '{', '}', ',' and '-'
  23. characters are stripped out.
  24. The second invocation of RetrieveSymbols uses the time date stamp from the
  25. first line of the dumpbin output, the "size of image" data, and the
  26. executable name.
  27. This information can also be obtained from breakpad reports, from windbg
  28. by using "lmv m chrome_elf" and "!lmi chrome_elf.dll", from ETW traces,
  29. and from other sources.