X-Git-Url: http://git.osdn.net/view?a=blobdiff_plain;f=simpleperf%2Fread_elf.h;h=a6c73c3c04b2cc145b823efebd8d791e900dfd74;hb=20e3c1bc9429230b7379db3747fd0c918f76af27;hp=cfb13be39d5d867feb2ee789e1bf5b921002a2aa;hpb=6ccb30917e16d709c269e75c5d1ab85e34eb52e1;p=android-x86%2Fsystem-extras.git diff --git a/simpleperf/read_elf.h b/simpleperf/read_elf.h index cfb13be3..a6c73c3c 100644 --- a/simpleperf/read_elf.h +++ b/simpleperf/read_elf.h @@ -23,6 +23,8 @@ bool GetBuildIdFromNoteFile(const std::string& filename, BuildId* build_id); bool GetBuildIdFromElfFile(const std::string& filename, BuildId* build_id); +bool GetBuildIdFromEmbeddedElfFile(const std::string& filename, uint64_t file_offset, + uint32_t file_size, BuildId* build_id); // The symbol prefix used to indicate that the symbol belongs to android linker. static const std::string linker_prefix = "__dl_"; @@ -34,17 +36,27 @@ struct ElfFileSymbol { bool is_label; bool is_in_text_section; std::string name; + + ElfFileSymbol() : vaddr(0), len(0), is_func(false), is_label(false), is_in_text_section(false) { + } }; bool ParseSymbolsFromElfFile(const std::string& filename, const BuildId& expected_build_id, std::function callback); +bool ParseSymbolsFromEmbeddedElfFile(const std::string& filename, uint64_t file_offset, + uint32_t file_size, const BuildId& expected_build_id, + std::function callback); bool ReadMinExecutableVirtualAddressFromElfFile(const std::string& filename, const BuildId& expected_build_id, uint64_t* min_addr); +bool ReadSectionFromElfFile(const std::string& filename, const std::string& section_name, + std::string* content); + // Expose the following functions for unit tests. bool IsArmMappingSymbol(const char* name); +bool IsValidElfFile(int fd); bool IsValidElfPath(const std::string& filename); #endif // SIMPLE_PERF_READ_ELF_H_