Downloads & Free Reading Options - Results
Consider The Source by Jerry A Pattengale
Read "Consider The Source" by Jerry A Pattengale through these free online access and download options.
Books Results
Source: The Internet Archive
The internet Archive Search Results
Available books for downloads and borrow from The internet Archive
1Consider The Source Live At Double Door Inn On 2011-01-20
By Consider the Source
01 Keep Your Pimp Hand Strong 02 You Go Squish Now 03 Complex Complex 04 The Great Circuiting 05 No Easy Answer 06 Wandering Bear 07 Vagiant (hand symbol) 08 The H is O 09 Those We Do Not Speak Of 10 Bass solo > Ol' Chomper
“Consider The Source Live At Double Door Inn On 2011-01-20” Metadata:
- Title: ➤ Consider The Source Live At Double Door Inn On 2011-01-20
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: CtS2011-01-20
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 629.65 Mbs, the file-s for this book were downloaded 541 times, the file-s went public at Sun Jan 23 2011.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Double Door Inn On 2011-01-20 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Consider The Source Live At The Donegal Saloon On 2010-10-02
By Consider the Source
Set 1 01 - Keep Your Pimp Hand Strong 02 - The Great Circuiting 03 - Do Not Shrink Me Gypsy 04 - Vagiant (sign language) 05 - How Am I Not Myself 06 - Wandering Bear Set 2 07 - Abdiel 08 - Complex Complex 09 - Tihai for the Straight Guy 10 - Those We Do Not Speak Of 11 - Closer To Home 12 - Ol' Chomper
“Consider The Source Live At The Donegal Saloon On 2010-10-02” Metadata:
- Title: ➤ Consider The Source Live At The Donegal Saloon On 2010-10-02
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: CTS2010-10-02.CTS2010-10-02
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 6482.61 Mbs, the file-s for this book were downloaded 573 times, the file-s went public at Fri Oct 15 2010.
Available formats:
Archive BitTorrent - Columbia Peaks - Essentia Low GZ - Flac - Item Image - Item Tile - JPEG - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 - WAVE -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At The Donegal Saloon On 2010-10-02 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Consider The Source Live At Ardmore Music Hall On 2015-01-22
By Consider the Source
Consider the Source Ardmore Music Hall Ardmore, PA 2015.01.22 LIVE (matrix): Source 1: AKG CK 61 (PAS, DFC, ~7' high, ~15 back) > Naiant Couplings/PFA > Tascam 680 (24/48) Source 2: SBD > macbook > USB HOME: USB > Audacity (tracking, fades, normalize) > xACT (fix SBE/FLAC encoding, ffp) 01. Intro > New World Coat Check 02. Wandering Bear 03. ABDIEL 04. Paranoid Android 05. You Go Squish Now 06. Put Another Rock in that Bag I > 07. Put Another Rock in that Bag IV > 08. Put Another Rock in that Bag ?? > 09. Put Another Rock in that Bag ?? > 10. Put Another Rock in that Bag ?? 11. ?? 12. ?? 13. (|) 14. -encore break- 15. E: ?? 16. E: ??
“Consider The Source Live At Ardmore Music Hall On 2015-01-22” Metadata:
- Title: ➤ Consider The Source Live At Ardmore Music Hall On 2015-01-22
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: ➤ ConsiderTheSource2015-01-22.matrix.CK61.SBD.flac16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 719.04 Mbs, the file-s for this book were downloaded 413 times, the file-s went public at Wed Feb 04 2015.
Available formats:
Archive BitTorrent - Columbia Peaks - Essentia High GZ - Essentia Low GZ - Flac - Item Tile - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Ardmore Music Hall On 2015-01-22 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Consider The Source Live At Disc Jam Music Festival On 2015-06-12
By Consider the Source
Consider The Source Live On 2015-06-12 At Disc Jam Music Festival In Stephentown NY Setlist: 01. Ninjanuity, 02. Put Another Rock In That Bag Part 1, 03. You Go Squish Now, 04. Up ToSo Sy We All, But Not To Exceed...Whoa., 05. So Say We All 1 2 and 3, 06. This Dubious Honor, 07. Complex Complex, 08. A Moment To Compromise. Runtime: 01:28:35 Source: Church Audio CA-11 Card (DIN)>CA-9100 & CA-14 Omni (NOS)>Zoom H4n> HDSD card @ 44.1 kHz/16 bit WAV. Mics 10' up FOB DFC @ SBD. Lineage: Zoom>pc>audacity,adjust gain,mix and render tracks to stereo,adjust gain,fades,track,label>flac16@level8.
“Consider The Source Live At Disc Jam Music Festival On 2015-06-12” Metadata:
- Title: ➤ Consider The Source Live At Disc Jam Music Festival On 2015-06-12
- Author: Consider the Source
“Consider The Source Live At Disc Jam Music Festival On 2015-06-12” Subjects and Themes:
- Subjects: Audience Recording - Jam Band - FOB - DFC - Disc Jam
Edition Identifiers:
- Internet Archive ID: ➤ ConsiderTheSource2015-06-12.tcca-flac16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 639.23 Mbs, the file-s for this book were downloaded 372 times, the file-s went public at Wed Jul 08 2015.
Available formats:
Archive BitTorrent - Columbia Peaks - Essentia High GZ - Essentia Low GZ - Flac - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Disc Jam Music Festival On 2015-06-12 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Consider The Source Live At Rex Theater On 2013-02-06
By Consider the Source
**24-Bit** 01. New World Coat Check 02. (Good Point) Wandering Bear 03. Absence Of A Prominent Tooth 04. The Great Circuiting 05. Up To But Not To Exceed Whoa 06. This Dubious Honor 07. Moisturize The Situation A 'Beats By Bean/Team Pittsburgh' recording!
“Consider The Source Live At Rex Theater On 2013-02-06” Metadata:
- Title: ➤ Consider The Source Live At Rex Theater On 2013-02-06
- Author: Consider the Source
“Consider The Source Live At Rex Theater On 2013-02-06” Subjects and Themes:
- Subjects: Schoeps mk41 - Naiant LittleBox - Sony M10[24-Bit]
Edition Identifiers:
- Internet Archive ID: ➤ considerthesource2013-02-06.mk41.lb.flac24
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 749.77 Mbs, the file-s for this book were downloaded 139 times, the file-s went public at Sun Feb 24 2013.
Available formats:
24bit Flac - Archive BitTorrent - Columbia Peaks - Essentia High GZ - Essentia Low GZ - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Rex Theater On 2013-02-06 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Consider The Source Live At Strangecreek Campout On 2011-05-29
By Consider the Source
Consider The Source 2011-05-29 Strangecreek Campout Greenfield, MA Source 1: ADK A51 > Busman Tmod R4 Source 2: SBD > Busman Vintage Mod R4 Setup: cards, DIN, FOB, DFC, overhead, 12' from stage xfer: R4 > audacity (level/fade) > cdwav > flac taped/transferred/seeded by: Joe Bouchard (SmokinJoe) one set, 83:07 long 01 02 03 04 05 06 07 08 09
“Consider The Source Live At Strangecreek Campout On 2011-05-29” Metadata:
- Title: ➤ Consider The Source Live At Strangecreek Campout On 2011-05-29
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2011-05-29.flac16f
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 595.27 Mbs, the file-s for this book were downloaded 307 times, the file-s went public at Sun Sep 04 2011.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Strangecreek Campout On 2011-05-29 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Consider The Source Live At River Street Jazz Cafe On 2013-05-03
By Consider the Source
Consider The Source River Street Jazz Cafe Plains, PA May 3, 2013 Soundboard + Schoeps MK4V's>KCY250/05I>Grace Deisgn Lunatec V2>Sound Devices 744t SD744t>Nuendo 4 (Mix)>Soundforge Pro 10(Fades,iZotope 64 Bit Sample Rate Conversion,iZotope MBIT+ Bit depth conversion to 16 Bit/44.1khz)>CDWAV(Tracking)>Trader's Little Helper (FLAC)
“Consider The Source Live At River Street Jazz Cafe On 2013-05-03” Metadata:
- Title: ➤ Consider The Source Live At River Street Jazz Cafe On 2013-05-03
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: ➤ cts2013-05-03.schoeps.sbd.flac16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 656.06 Mbs, the file-s for this book were downloaded 595 times, the file-s went public at Sat May 18 2013.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At River Street Jazz Cafe On 2013-05-03 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Consider The Source Live At The Summit, The Queensbury Hotel On 2018-09-29
By Consider the Source
Consider The Source River Street Jazz Cafe Plains, PA May 3, 2013 Soundboard + Schoeps MK4V's>KCY250/05I>Grace Deisgn Lunatec V2>Sound Devices 744t SD744t>Nuendo 4 (Mix)>Soundforge Pro 10(Fades,iZotope 64 Bit Sample Rate Conversion,iZotope MBIT+ Bit depth conversion to 16 Bit/44.1khz)>CDWAV(Tracking)>Trader's Little Helper (FLAC)
“Consider The Source Live At The Summit, The Queensbury Hotel On 2018-09-29” Metadata:
- Title: ➤ Consider The Source Live At The Summit, The Queensbury Hotel On 2018-09-29
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2018-09-29
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 470.75 Mbs, the file-s for this book were downloaded 637 times, the file-s went public at Sun Jan 27 2019.
Available formats:
Archive BitTorrent - Columbia Peaks - Flac - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At The Summit, The Queensbury Hotel On 2018-09-29 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Consider The Source Live At The Big What Festival On 2013-07-04
By Consider the Source
Consider the Source At the Big What? Festival July 4, 2013 Possum Holler Prospect Hill, NC Source: Avenson STO-2 Omni Bar Spaced 18">Tascam DR680 Lineage:Tascam DR680 24bit 48000hz>SD Card>Audacity (Normalize & Down sample)>CDWave>TLH Thank You's to FOH Tony. Support taper friendly bands. Go to their shows and buy their merchandise. Taped and Uploaded by Hypnocracy
“Consider The Source Live At The Big What Festival On 2013-07-04” Metadata:
- Title: ➤ Consider The Source Live At The Big What Festival On 2013-07-04
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2013-07-04.AvensonSTO
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 622.59 Mbs, the file-s for this book were downloaded 582 times, the file-s went public at Mon Jul 08 2013.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At The Big What Festival On 2013-07-04 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Consider The Source Live At Tyrone Farm On 2013-07-21
By Consider the Source
Consider the Source At the Big What? Festival July 4, 2013 Possum Holler Prospect Hill, NC Source: Avenson STO-2 Omni Bar Spaced 18">Tascam DR680 Lineage:Tascam DR680 24bit 48000hz>SD Card>Audacity (Normalize & Down sample)>CDWave>TLH Thank You's to FOH Tony. Support taper friendly bands. Go to their shows and buy their merchandise. Taped and Uploaded by Hypnocracy
“Consider The Source Live At Tyrone Farm On 2013-07-21” Metadata:
- Title: ➤ Consider The Source Live At Tyrone Farm On 2013-07-21
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: ➤ cts2013-07-21.schoeps_mk22mk4sbmix_16bit
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 1210.33 Mbs, the file-s for this book were downloaded 322 times, the file-s went public at Tue Jul 23 2013.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Tyrone Farm On 2013-07-21 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Consider The Source Live At Mad Tea Party Jam On 2014-06-20
By Consider the Source
Consider The Source (Acoustic Workshop Set) Mad Tea Party Jam Hedgesville, WV June 21, 2014 *****24bit fileset, not for CDR***** Duration = 1hr, 06min 01) Intro 02) Track One 03) Banter 04) Track Two 05) Banter 06) Track Three 07) Banter 08) Track Four 09) Banter 10) Track Five 11) Banter 12) Track Six 13) Banter 14) Track Seven 15) Banter 16) Track Eight Source: Schoeps m934b > Schoeps CMMT30 > Schoeps VMS5U > Sound Devices 744t Converstion: CF Card > Audition 3.0 > CDWave > FLAC Recorded and Mastered By: tonedeaf ([email protected])
“Consider The Source Live At Mad Tea Party Jam On 2014-06-20” Metadata:
- Title: ➤ Consider The Source Live At Mad Tea Party Jam On 2014-06-20
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2014-06-20.m934b_24bit
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 835.96 Mbs, the file-s for this book were downloaded 305 times, the file-s went public at Thu Jul 03 2014.
Available formats:
24bit Flac - Archive BitTorrent - Checksums - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Mad Tea Party Jam On 2014-06-20 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Consider The Source Live At Wormtown Music Festival - Camp Kee-Wanee On 2014-09-12
By Consider the Source
Consider The Source September 12, 2014 Wormtown Music Festival Camp KeeWanee Greenfield, MA source: SB > Apogee mini-me + Neumann KM184 > V2 > R-44 transfer: SDHC> USB> Samplitutde 11> cdWave> FLAC taped/transfered by Rob Clarke robclarke.km184 -AT- gmailDOTcom set 1: 01. Moisturize The Situation 02. Ninjanuity 03. ABDIEL 04. Tihai For The Straight Guy 05. Vagiant 06. Keep Your Pimp Hand Strong 07. acoustic changeover/intro. 08. Blackbird
“Consider The Source Live At Wormtown Music Festival - Camp Kee-Wanee On 2014-09-12” Metadata:
- Title: ➤ Consider The Source Live At Wormtown Music Festival - Camp Kee-Wanee On 2014-09-12
- Author: Consider the Source
“Consider The Source Live At Wormtown Music Festival - Camp Kee-Wanee On 2014-09-12” Subjects and Themes:
- Subjects: wormfest 2014 - wormtown 2014
Edition Identifiers:
- Internet Archive ID: cts2014-09-12
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 510.18 Mbs, the file-s for this book were downloaded 302 times, the file-s went public at Tue Sep 16 2014.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Wormtown Music Festival - Camp Kee-Wanee On 2014-09-12 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Consider The Source Live At Globe Hall On 2017-11-10
By Consider the Source
Consider the Source Globe Hall Denver, CO 11/10/2017 Source: AT853 (cardioids, ORTF) > CA9200 (+10 gain) > Zoom F4 (24/48 wav) Location: Stage lip, a couple feet right of center, approximately 5' high Transfer: Audacity (EQ [TDR Nova plugin], amplify, track splits, conversion to flac); mp3tag (file tagging) Support the band: http://considerthesourcemusic.com/source/ Recorded by Lucas Lorenz Note: Because I was right of center, the bass is very prominent. 1. Ninjanuity 2. Many Words of Disapproval 3. This Dubious Honor 4. Closer to Home 5. You Go Squish Now 6. (Good Point) Wandering Bear 7. Absence of a Prominent Tooth 8. I'll Fight for the Imp 9. Keep Your Pimp Hand Strong Encore: 10. Drum solo 11. Blue Steel 12. Moisturize the Situation
“Consider The Source Live At Globe Hall On 2017-11-10” Metadata:
- Title: ➤ Consider The Source Live At Globe Hall On 2017-11-10
- Author: Consider the Source
“Consider The Source Live At Globe Hall On 2017-11-10” Subjects and Themes:
- Subjects: ➤ Consider the Source - Globe Hall - Denver - Audio Technica - AT853 - ORTF - CA9200 - Zoom F4
Edition Identifiers:
- Internet Archive ID: cts2017-11-10.AT853.flac16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 780.64 Mbs, the file-s for this book were downloaded 708 times, the file-s went public at Mon Nov 13 2017.
Available formats:
Archive BitTorrent - Columbia Peaks - Flac - Flac FingerPrint - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Globe Hall On 2017-11-10 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Consider The Source Live At Wormtown Music Festival On 2016-09-16
By Consider the Source
Consider the Source Fri. September 16, 2016 Wormtown Music Festival - Main Stage Camp Kee-Wanee Greenfield, MA source1: dpa 4023 > Lunatec V3 > Edirol R-44 > WAV (24/48k) source2: sbd > Edirol R-44 > WAV (24/48k) transfer: wav > Audacity > wav (24/48k) > xACT > flac8 tape/transfer - corey the groundhog (coreythegroundhogATgmailDOTcom) one set (86:00) 01. intro 02. Aquarians 03. Many Words of Disapproval 04. banter 05. This Dubious Honor 06. You are Obsolete 07. banter 08. Abdiel 09. White People Problems 10. Blue Steel 11. banter 12. A Monument To Compromise (Faux Clarinet) 13. banter 14. Exit Music (For a Film) http://www.considerthesourcemusic.com
“Consider The Source Live At Wormtown Music Festival On 2016-09-16” Metadata:
- Title: ➤ Consider The Source Live At Wormtown Music Festival On 2016-09-16
- Author: Consider the Source
“Consider The Source Live At Wormtown Music Festival On 2016-09-16” Subjects and Themes:
- Subjects: wormtown2016 - wormfest2016
Edition Identifiers:
- Internet Archive ID: ➤ cts2016-09-16.dpa4023-sbd.flac2448
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 1116.15 Mbs, the file-s for this book were downloaded 843 times, the file-s went public at Thu Nov 17 2016.
Available formats:
24bit Flac - Archive BitTorrent - Columbia Peaks - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Wormtown Music Festival On 2016-09-16 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Consider The Source Live At Rex Theater On 2013-02-06
By Consider the Source
01. New World Coat Check 02. (Good Point) Wandering Bear 03. Absence Of A Prominent Tooth 04. The Great Circuiting 05. Up To But Not To Exceed Whoa 06. This Dubious Honor 07. Moisturize The Situation A 'Beats By Bean/Team Pittsburgh' recording!
“Consider The Source Live At Rex Theater On 2013-02-06” Metadata:
- Title: ➤ Consider The Source Live At Rex Theater On 2013-02-06
- Author: Consider the Source
“Consider The Source Live At Rex Theater On 2013-02-06” Subjects and Themes:
- Subjects: Schoeps mk41 - Naiant LittleBox - Sony M10[16-Bit]
Edition Identifiers:
- Internet Archive ID: ➤ considerthesource2013-02-06.mk41.lb.flac16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 426.18 Mbs, the file-s for this book were downloaded 319 times, the file-s went public at Sun Feb 24 2013.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Rex Theater On 2013-02-06 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16The Chromium Logo The Chromium Projects Home Chromium ChromiumOS Quick Links Report Bugs Discuss Other Sites Chromium Blog Google Chrome Extensions Except As Otherwise Noted, The Content Of This Page Is Licensed Under A Creative Commons Attribution 2.5 License, And Examples Are Licensed Under The BSD License. Privacy Edit This Page For Developers > How-Tos > Debugging Chromium On Windows First See Get The Code For Checkout And Build Instructions. Getting Started You Can Use Visual Studio's Built-in Debugger Or WinDBG To Debug Chromium. You Don't Need To Use The IDE To Build In Order To Use The Debugger: Autoninja Is Used To Build Chromium And Most Developers Invoke It From A Command Prompt, And Then Open The IDE For Debugging As Necessary. To Start Debugging An Already-built Executable With Visual Studio Just Launch Visual Studio (2019 Or Higher) And Select File-> Open-> Project/Solution (Ctrl+Shift+O) And Select The Executable Of Interest. This Will Create A Solution With That Executable As The 'project'. You Can Then Launch The Debugger With F5 Or F11 Or From The Debug Menu. If You Right-click On The Executable In Solution Explorer And Select Properties Then You Can Edit Things Such As The Executable Path, Command-line Arguments, And Working Directory. You Can Add Additional Executables To The Solution By Using File-> Add-> Existing Project And Selecting Another Already-built Executable. You Can Select Which One To Debug By Right-clicking On One Of Them In Solution Explorer And Selecting Set As Startup Project. When Your Solution File Is Customized To Your Taste You Can Save It To A Directory Such As Out\solutions. Saving It There Helps Ensure That Relative Paths To Source Files, Printed From Build Commands, Will Correctly Identify The Source Files. The Tools Menu Can Be Used To Add Commands To Do Things Like Invoke Autoninja To Build Chrome, Compile The Selected Source File, Or Other Things. Visual Studio 2017 Is Not Recommended For Debugging Of Chromium - Use A Newer Version For Best Performance And Stability. Symbol_level=2 Is The Default On Windows And Gives Full Debugging Information With Types, Locals, Globals, Function Names, And Source/line Information. Symbol_level=1 Creates Smaller PDBs With Just Function Names, And Source/line Information - Source-level Debugging Is Still Supported (new From June 2019), But Local Variables And Type Information Are Missing. Symbol_level=0 Gives Extremely Limited Debugging Abilities, Mostly Just Viewing Call Stacks When Chromium Crashes. Browsing Source Code If You Use A Solution File Generated By Gn (gn Gen --ide=vs) Then Intellisense May Help You Navigate The Code. If This Doesn't Work Or If You Use A Solution Created As Above Then You May Want To Install VsChromium To Help Navigate The Code, As Well As Using Https://source.chromium.org. Profiles It's A Good Idea To Use A Different Chrome Profile For Your Debugging. If You Are Debugging Google Chrome Branded Builds, Or Use A Chromium Build As Your Primary Browser, The Profiles Can Collide So You Can't Run Both At Once, And Your Stable Browser Might See Profile Versions From The Future (Google Chrome And Chromium Use Different Profile Directories By Default So Won't Collide). Use The Command-line Option: --user-data-dir=C:\tmp\my_debug_profile (replace The Path As Necessary) Using The IDE, Go To The Debugging Tab Of The Properties Of The Chrome Project, And Set The Command Arguments. Chrome Debug Log Enable Chrome Debug Logging To A File By Passing --enable-logging --v=1 Command-line Flags At Startup. Debug Builds Place The Chrome_debug.log File In The Out\Debug Directory. Release Builds Place The File In The Top Level Of The User Data Chromium App Directory, Which Is OS-version-dependent. For More Information, See Logging And User Data Directory Details. Symbol Server If You Are Debugging Official Google Chrome Release Builds, Use The Symbol Server: Https://chromium-browser-symsrv.commondatastorage.googleapis.com In Visual Studio, This Goes In Tools > Options Under Debugging > Symbols. You Should Set Up A Local Cache In A Empty Directory On Your Computer. In Windbg You Can Add This To Your Symbol Server Search Path With The Command Below, Where C:\symbols Is A Local Cache Directory: .sympath+ SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Alternately, You Can Set The _NT_SYMBOL_PATH Environment Variable To Include Both The Microsoft And Google Symbol Servers - VS, Windbg, And Other Tools Should Both Respect This Environment Variable: _NT_SYMBOL_PATH=SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Note That Symbol Servers Will Let The Debuggers Download Both The PE Files (DLLs And EXEs) And The PDB Files. Chrome Often Loads Third Party Libraries And Partial Symbols For Some Of These Are Also Public. For Example: AMD: Https://download.amd.com/dir/bin Nvidia: Https://driver-symbols.nvidia.com/ Intel: Https://software.intel.com/sites/downloads/symbols/ For Example, For Completeness, The Following Symbol Server Environment Variable Will Resolve All Of The Above Sources - But This Is More Than Is Normally Needed: _NT_SYMBOL_PATH=SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com;SRV\*C:\symbols\*https://download.amd.com/dir/bin;SRV\*C:\symbols\*https://driver-symbols.nvidia.com/;SRV\*C:\symbols\*https://software.intel.com/sites/downloads/symbols/ Source Indexing You Should Set Up Source Indexing In Your Debugger (.srcfix In Windbg, Tools-> Options-> Debugging-> General-> Enable Source Server Support In Visual Studio) So That The Correct Source Files Will Automatically Be Downloaded Based On Information In The Downloaded Symbols. Additionally, You Must Have Python In Your Path In Order For The Command That Fetches Source Files To Succeed; Launching The Debugger From The Same Environment As Where You Build Chromium Is An Easy Way To Ensure It's Present. This Is Highly Recommended When Debugging Released Google Chrome Builds Or Looking At Crash Dumps. Having The Correct Version Of The Source Files Automatically Show Up Saves Significant Time So You Should Definitely Set This. Multi-process Issues Chromium Can Be Challenging To Debug Because Of Its Multi-process Architecture. When You Select Run In The Debugger, Only The Main Browser Process Will Be Debugged. The Code That Actually Renders Web Pages (the Renderer) And The Plugins Will Be In Separate Processes That's Not (yet!) Being Debugged. The ProcessExplorer Tool Has A Process Tree View Where You Can See How These Processes Are Related. You Can Also Get The Process IDs Associated With Each Tab From The Chrome Task Manager (right-click On An Empty Area Of The Window Title Bar To Open). Automatically Attach To Child Processes There Are Two Visual Studio Extensions That Enable The Debugger To Automatically Attach To All Chrome Processes, So You Can Debug All Of Chrome At Once. Microsoft's Child Process Debugging Power Tool Is A Standalone Extension For This, And VsChromium Is Another Option That Bundles Many Other Additional Features. In Addition To Installing One Of These Extensions, You Must Run Visual Studio As Administrator, Or It Will Silently Fail To Attach To Some Of Chrome's Child Processes. Single-process Mode One Way To Debug Issues Is To Run Chromium In Single-process Mode. This Will Allow You To See The Entire State Of The Program Without Extra Work (although It Will Still Have Many Threads). To Use Single-process Mode, Add The Command-line Flag --single-process This Approach Isn't Perfect Because Some Problems Won't Manifest Themselves In This Mode And Some Features Don't Work And Worker Threads Are Still Spawned Into New Processes. Manually Attaching To A Child Process You Can Attach To The Running Child Processes With The Debugger. Select Tools > Attach To Process And Click The Chrome.exe Process You Want To Attach To. Before Attaching, Make Sure You Have Selected Only Native Code When Attaching To The Process This Is Done By Clicking Select... In The Attach To Process Window And Only Checking Native. If You Forget This, It May Attempt To Attach In "WebKit" Mode To Debug JavaScript, And You'll Get An Error Message "An Operation Is Not Legal In The Current State." You Can Now Debug The Two Processes As If They Were One. When You Are Debugging Multiple Processes, Open The Debug > Windows > Processes Window To Switch Between Them. Sometimes You Are Debugging Something That Only Happens On Startup, And Want To See The Child Process As Soon As It Starts. Use: --renderer-startup-dialog --no-sandbox You Have To Disable The Sandbox Or The Dialog Box Will Be Prohibited From Showing. When The Dialog Appears, Visit Tools > Attach To Process And Attach To The Process Showing The Renderer Startup Dialog. Now You're Debugging In The Renderer And Can Continue Execution By Pressing OK In The Dialog. Startup Dialogs Also Exist For Other Child Process Types: --gpu-startup-dialog, --ppapi-startup-dialog, --utility-startup-dialog, --plugin-startup-dialog (for NPAPI). For Utilities, You Can Add A Service Type --utility-startup-dialog=data_decoder.mojom.DataDecoderService. You Can Also Try The Vs-chromium Plug-in To Attach To The Right Processes. Semi-automatically Attaching The Debugger To Child Processes The Following Flags Cause Child Processes To Wait For 60 Seconds In A Busy Loop For A Debugger To Attach To The Process. Once Either Condition Is True, It Continues On; No Exception Is Thrown. --wait-for-debugger-children[=filter] The Filter, If Provided, Will Fire Only If It Matches The --type Parameter To The Process. Values Include Renderer, Plugin (for NPAPI), Ppapi, Gpu-process, And Utility. When Using This Option, It May Be Helpful To Limit The Number Of Renderer Processes Spawned, Using: --renderer-process-limit=1 Image File Execution Options Using Image File Execution Options (IFEO) Will Not Work Because CreateProcess() Returns The Handle To The Debugger Process Instead Of The Intended Child Process. There Are Also Issues With The Sandbox. Time Travel Debugging You Can Do Time Travel Debugging Using WinDbg Preview (must Be Installed From The Microsoft Store). This Lets You Execute A Program Forward And Backwards. After Capturing A Trace, You Can Set Breakpoints And Step Through Code As Normal, But Also Provides 'backwards' Commands (g-, T-, P-) So That You Can Go Back And Forth Through The Execution. It Is Especially Useful To Set Data Breakpoints (ba Command) And Reverse Continuing, So You Can See When A Certain Variable Was Last Changed To Its Current Value. Chromium Specifics: The Type Of Injection The Time Travel Tracer Needs To Perform Is Incompatible With The Chromium Sandbox. In Order To Record A Trace, You'll Need To Run With --no-sandbox. Chromium Cannot Run Elevated With Administrator Privileges, So The "Launch Executable (advance)" Option Won't Work, You'll Need To Attach After The Process Has Already Launched Via The Checkbox In The Bottom Right. If You Need To Record Startup-like Things, You'll Have To Use --{browser,gpu,renderer,utility}-startup-dialog, Then Attach (and Hope The Relevant Code Hasn't Executed Before That Point). JsDbg -- Data Structure Visualization You Can Install JsDbg As A Plugin For WinDbg Or Visual Studio. It Interactively Lets You Look At Data Structures (such As The DOM Tree, Accessibility Tree, Layout Object Tree, And Others) In A Web Browser As You Debug. See The JsDbg Site For Some Screen Shots And Usage Examples. This Also Works When Examining Memory Dumps (though Not Minidumps), And Also Works Together With Time Travel Debugging. Visual Studio Hints Debug Visualizers Chrome's Custom Debug Visualizers Should Be Added To The Pdb Files And Automatically Picked Up By Visual Studio. The Definitions Are In //tools/win/DebugVisualizers If You Need To Modify Them (the BUILD.gn File There Has Additional Instructions). Don't Step Into Trivial Functions The Debugger Can Be Configured To Automatically Not Step Into Functions Based On Regular Expression. Edit Default.natstepfilter In The Following Directory: For Visual Studio 2015: C:\Program Files (x86)\Microsoft Visual Studio 14.0\Common7\Packages\Debugger\Visualizers (for All Users) Or %USERPROFILE%\My Documents\Visual Studio 2015\Visualizers (for The Current User Only) For Visual Studio 2017 Pro: C:\Program Files (x86)\Microsoft Visual Studio\2017\Professional\Common7\Packages\Debugger\Visualizers (for All Users) Or %USERPROFILE%\My Documents\Visual Studio 2017\Visualizers (for The Current User Only) Add Regular Expressions Of Functions To Not Step Into. Remember To Regex-escape And XML-escape Them, E.g. < For < And \. For A Literal Dot. Example: Operator New NoStepInto Operator Delete NoStepInto Std::.* NoStepInto WTF::.*Ptr ::.* NoStepInto This File Is Read At Start Of A Debugging Session (F5), So You Don't Need To Restart Visual Studio After Changing It. More Info: Microsoft Email Thread V8 And Chromium V8 Supports Many Command-line Flags That Are Useful For Debugging. V8 Command-line Flags Can Be Set Via The Chromium Command-line Flag --js-flags; For Instance: Chrome.exe --js-flags="--trace_exception --heap_stats" Note That Some V8 Command-line Flags Exist Only In The Debug Build Of V8. For A List Of All V8 Flags Try: Chrome.exe --js-flags="--help" Graphics Debugging GPU Acceleration Of Rendering Can Be More Easily Debugged With Tools. See: Graphics Debugging In Visual Studio 2013 Graphical Debugging With NVIDIA NSight Debugging On Another Machine Sometimes It's Useful To Debug Installation And Execution On A Machine Other Than Your Primary Build Box. To Run The Installer On Said Other Machine, First Build The Mini_installer Target On Your Main Build Machine (e.g., Autoninja -C Out\Debug Mini_installer). Next, On The Debug Machine: Make The Build Machine's Build Volume Available On The Debug Machine Either By Mounting It Locally (e.g., Z:\) Or By Crafting A UNC Path To It (e.g., \\builder\src) Open Up A Command Prompt And Change To A Local Disk Run Src\tools\win\copy-installer.bat In The Remote Checkout By Way Of The Mount (e.g., Z:\PATHTOCHECKOUT\src\...) Or UNC Path (e.g., \\builder\src\...). This Will Copy The Installer, DLLs, And PDBs Into Your Debug Machine's C:\out Or C:\build (depending On If You're Rocking The Component=shared_library Build Or Not) Run C:\out\Debug\mini_installer.exe With The Flags Of Your Choice To Install Chrome. This Can Take Some Time, Especially On A Slow Machine. Watch The Task Manager And Wait Until Mini_installer.exe Exits Before Trying To Launch Chrome (by Way Of The Shortcut(s) Created By The Installer) For Extra Pleasure, Add C:\out\Debug To Your _NT_SYMBOL_PATH Environment Variable Consider Reading The Documentation At The Top Of Copy-installer.bat To See How You Can Run It. It Tries To Be Smart And Copy The Right Things, But You May Need To Be Explicit (e.g., "copy-installer.bat Out Debug"). It Is Safe To Re-run The Script To Copy Only Modified Files (after A Rebuild, For Example). You Can Also Use The Zip Action Of The Isolate Scripts (tools\mb\mb.py) To Package All The Files For A Target Into A Single Zip File, For Example: Python Tools\mb\mb.py Zip Out/Release Base_unittests Base_unittests.zip Finding All Memory Allocations It Is Possible To Use Heap Snapshots To Get Call Stacks On All Outstanding Allocations That Use The OS Heap. This Works Particularly Well If Heap Snapshots Are Started As Soon As The Chrome Browser Process Is Created, But Before It Starts Running. Details Can Be Found In This Batch File. However, With PartitionAlloc Everywhere Most Chromium Allocations No Longer Use The Windows Heap So This Will Only Find A Subset Of Allocations, Mostly From OS DLLs. Find Memory Leaks Note: As With Heap Snapshots The Utility Of UMDH Is Greatly Reduced Now Because PartitionAlloc Everywhere Has Mostly Replaced The Windows Heap. The Windows Heap Manager Has A Really Useful Debug Flag, Where It Can Be Asked To Capture And Store A Stack Trace With Every Allocation. The Tool To Scrape These Stack Traces Out Of Processes Is UMDH, Which Comes With WinDbg. UMDH Is Great. It Will Capture A Snapshot Of The Heap State As Many Times As You Like, And It'll Do It Fairly Quickly. You Then Run It Again Against Either A Single Snapshot, Or A Pair Of Snapshots, At Which Time It'll Symbolize The Stack Traces And Aggregate Usage Up To Unique Stack Traces. Turning On The User Stack Trace Database For Chrome.exe With Gflags.exe Makes It Run Unbearably Slowly; However, Turning On The User Stack Trace Database On For The Browser Alone Is Just Fine. While It's Possible To Turn On The User Stack Database With The "!gflag" Debugging Extension, It's Too Late To Do This By The Time The Initial Debugger Breakpoint Hits. The Only Reasonable Way To Do This Is To Launch GFlags.exe, Enable The User Stack Trace Database (per Image Below), Launch Chrome Under The Debugger. Set A Breakpont When Chrome.dll Loads With "sxe Ld Chrome.dll". Step Up, To Allow Chrome.dll To Initialize. Disable The Stack Trace Database In GFlags.exe. Continue Chrome, Optionally Detaching The Debugger. Image GFlags.exe Settings For User Mode Stack Trace Database. If You Then Ever Suffer A Browser Memory Leak, You Can Snarf A Dump Of The Process With Umdh -p: > Chrome-browser-leak-umdh-dump.txt Which Can Then Typically Be "trivially" Analyzed To Find The Culprit. Miscellaneous Note That By Default Application Verifier Only Works With Non-official Builds Of Chromium. To Use Application Verifier On Official Builds You Need To Add --disable-features=RendererCodeIntegrity To Avoid Sandbox Crashes In Renderer Processes. See Crbug.com/1004989 For Details. See Also This Page. Application Verifier Is A Free Tool From Microsoft (available As Part Of The Windows SDK) That Can Be Used To Flush Out Programming Errors. Starting With M68 Application Verifier Can Be Enabled For Chrome.exe Without Needing To Disable The Sandbox. After Adding Chrome.exe To The List Of Applications To Be Stressed You Need To Expand The List Of Basics Checks And Disable The Leak Checks. You May Also Need To Disable Handles And Locks Checks Depending On Your Graphics Driver And Specific Chrome Version, But The Eventual Goal Is To Have Chrome Run With Handles And Locks Checks Enabled. When Bugs Are Found Chrome Will Trigger A Breakpoint So Running All Chrome Processes Under A Debugger Is Recommended. Chrome Will Run Much More Slowly Because Application Verifier Puts Every Heap Allocation On A Separate Page. Note That With PartitionAlloc Everywhere Most Chromium Allocations Don't Actually Go Through The Windows Heap And Are Therefore Unaffected By Application Verifier. You Can Check The Undocumented 'Cuzz' Checkbox In Application Verifier To Get The Windows Thread Scheduler To Add Some Extra Randomness In Order To Help Expose Race Conditions In Your Code. To Put A Breakpoint On CreateFile(), Add This Break Point: {,,kernel32.dll}_CreateFileW@28 {,,kernel32.dll} Specifies The DLL (context Operator). _ Prefix Means Extern "C". @28 Postfix Means _stdcall With The Stack Pop At The End Of The Function. I.e. The Number Of Arguments In BYTES. You Can Use DebugView From SysInternals Or Sawbuck To View LOG() Messages That Normally Go To Stderr On POSIX.
The Chromium Projects Home Chromium ChromiumOS Quick links Report bugs Discuss Other sites Chromium Blog Google Chrome Extensions Except as otherwise noted , the content of this page is licensed under a Creative Commons Attribution 2.5 license , and examples are licensed under the BSD License . Privacy Edit this page For Developers > How-Tos > Debugging Chromium on Windows First see get the code for checkout and build instructions. Getting started You can use Visual Studio's built-in debugger or WinDBG to debug Chromium. You don't need to use the IDE to build in order to use the debugger: autoninja is used to build Chromium and most developers invoke it from a command prompt, and then open the IDE for debugging as necessary. To start debugging an already-built executable with Visual Studio just launch Visual Studio (2019 or higher) and select File-> Open-> Project/Solution (Ctrl+Shift+O) and select the executable of interest. This will create a solution with that executable as the 'project'. You can then launch the debugger with F5 or F11 or from the Debug menu. If you right-click on the executable in Solution Explorer and select properties then you can edit things such as the executable path, command-line arguments, and working directory. You can add additional executables to the solution by using File-> Add-> Existing Project and selecting another already-built executable. You can select which one to debug by right-clicking on one of them in Solution Explorer and selecting Set as Startup Project. When your solution file is customized to your taste you can save it to a directory such as out\solutions. Saving it there helps ensure that relative paths to source files, printed from build commands, will correctly identify the source files. The Tools menu can be used to add commands to do things like invoke autoninja to build Chrome, compile the selected source file, or other things. Visual Studio 2017 is not recommended for debugging of Chromium - use a newer version for best performance and stability. symbol_level=2 is the default on Windows and gives full debugging information with types, locals, globals, function names, and source/line information. symbol_level=1 creates smaller PDBs with just function names, and source/line information - source-level debugging is still supported (new from June 2019), but local variables and type information are missing. symbol_level=0 gives extremely limited debugging abilities, mostly just viewing call stacks when Chromium crashes. Browsing source code If you use a solution file generated by gn ( gn gen --ide=vs ) then Intellisense may help you navigate the code. If this doesn't work or if you use a solution created as above then you may want to install VsChromium to help navigate the code, as well as using https://source.chromium.org . Profiles It's a good idea to use a different Chrome profile for your debugging. If you are debugging Google Chrome branded builds, or use a Chromium build as your primary browser, the profiles can collide so you can't run both at once, and your stable browser might see profile versions from the future (Google Chrome and Chromium use different profile directories by default so won't collide). Use the command-line option: --user-data-dir =C:\tmp\my_debug_profile (replace the path as necessary) Using the IDE, go to the Debugging tab of the properties of the chrome project, and set the Command Arguments. Chrome debug log Enable Chrome debug logging to a file by passing --enable-logging --v=1 command-line flags at startup. Debug builds place the chrome_debug.log file in the out\Debug directory. Release builds place the file in the top level of the user data Chromium app directory, which is OS-version-dependent. For more information, see logging and user data directory details. Symbol server If you are debugging official Google Chrome release builds, use the symbol server: https://chromium-browser-symsrv.commondatastorage.googleapis.com In Visual Studio, this goes in Tools > Options under Debugging > Symbols . You should set up a local cache in a empty directory on your computer. In windbg you can add this to your symbol server search path with the command below, where C:\symbols is a local cache directory: .sympath+ SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Alternately, You can set the _NT_SYMBOL_PATH environment variable to include both the Microsoft and Google symbol servers - VS, windbg, and other tools should both respect this environment variable: _NT_SYMBOL_PATH =SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols ;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Note that symbol servers will let the debuggers download both the PE files (DLLs and EXEs) and the PDB files. Chrome often loads third party libraries and partial symbols for some of these are also public. For example: AMD : https://download.amd.com/dir/bin Nvidia : https://driver-symbols.nvidia.com/ Intel : https://software.intel.com/sites/downloads/symbols/ For example, for completeness, the following symbol server environment variable will resolve all of the above sources - but this is more than is normally needed: _NT_SYMBOL_PATH=SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com;SRV\*C:\symbols\*https://download.amd.com/dir/bin;SRV\*C:\symbols\*https://driver-symbols.nvidia.com/;SRV\*C:\symbols\*https://software.intel.com/sites/downloads/symbols/ Source indexing You should set up source indexing in your debugger ( .srcfix in windbg, Tools-> Options-> Debugging-> General-> Enable source server support in Visual Studio) so that the correct source files will automatically be downloaded based on information in the downloaded symbols. Additionally, you must have python in your path in order for the command that fetches source files to succeed; launching the debugger from the same environment as where you build Chromium is an easy way to ensure it's present. This is highly recommended when debugging released Google Chrome builds or looking at crash dumps. Having the correct version of the source files automatically show up saves significant time so you should definitely set this. Multi-process issues Chromium can be challenging to debug because of its multi-process architecture . When you select Run in the debugger, only the main browser process will be debugged. The code that actually renders web pages (the Renderer) and the plugins will be in separate processes that's not (yet!) being debugged. The ProcessExplorer tool has a process tree view where you can see how these processes are related. You can also get the process IDs associated with each tab from the Chrome Task Manager (right-click on an empty area of the window title bar to open). Automatically attach to child processes There are two Visual Studio extensions that enable the debugger to automatically attach to all Chrome processes, so you can debug all of Chrome at once. Microsoft's Child Process Debugging Power Tool is a standalone extension for this, and VsChromium is another option that bundles many other additional features. In addition to installing one of these extensions, you must run Visual Studio as Administrator, or it will silently fail to attach to some of Chrome's child processes. Single-process mode One way to debug issues is to run Chromium in single-process mode. This will allow you to see the entire state of the program without extra work (although it will still have many threads). To use single-process mode, add the command-line flag --single-process This approach isn't perfect because some problems won't manifest themselves in this mode and some features don't work and worker threads are still spawned into new processes. Manually attaching to a child process You can attach to the running child processes with the debugger. Select Tools > Attach to Process and click the chrome.exe process you want to attach to. Before attaching, make sure you have selected only Native code when attaching to the process This is done by clicking Select... in the Attach to Process window and only checking Native. If you forget this, it may attempt to attach in "WebKit" mode to debug JavaScript, and you'll get an error message "An operation is not legal in the current state." You can now debug the two processes as if they were one. When you are debugging multiple processes, open the Debug > Windows > Processes window to switch between them. Sometimes you are debugging something that only happens on startup, and want to see the child process as soon as it starts. Use: --renderer-startup-dialog --no-sandbox You have to disable the sandbox or the dialog box will be prohibited from showing. When the dialog appears, visit Tools > Attach to Process and attach to the process showing the Renderer startup dialog. Now you're debugging in the renderer and can continue execution by pressing OK in the dialog. Startup dialogs also exist for other child process types: --gpu-startup-dialog , --ppapi-startup-dialog , --utility-startup-dialog , --plugin-startup-dialog (for NPAPI). For utilities, you can add a service type --utility-startup-dialog=data_decoder.mojom.DataDecoderService . You can also try the vs-chromium plug-in to attach to the right processes. Semi-automatically attaching the debugger to child processes The following flags cause child processes to wait for 60 seconds in a busy loop for a debugger to attach to the process. Once either condition is true, it continues on; no exception is thrown. --wait-for-debugger-children [=filter] The filter, if provided, will fire only if it matches the --type parameter to the process. Values include renderer , plugin (for NPAPI), ppapi , gpu-process , and utility . When using this option, it may be helpful to limit the number of renderer processes spawned, using: --renderer-process-limit = 1 Image File Execution Options Using Image File Execution Options (IFEO) will not work because CreateProcess() returns the handle to the debugger process instead of the intended child process. There are also issues with the sandbox. Time travel debugging You can do time travel debugging using WinDbg Preview (must be installed from the Microsoft Store). This lets you execute a program forward and backwards. After capturing a trace, you can set breakpoints and step through code as normal, but also provides 'backwards' commands (g-, t-, p-) so that you can go back and forth through the execution. It is especially useful to set data breakpoints ( ba command ) and reverse continuing, so you can see when a certain variable was last changed to its current value. Chromium specifics: The type of injection the time travel tracer needs to perform is incompatible with the Chromium sandbox. In order to record a trace, you'll need to run with --no-sandbox . Chromium cannot run elevated with Administrator privileges, so the "Launch executable (advance)" option won't work, you'll need to attach after the process has already launched via the checkbox in the bottom right. If you need to record startup-like things, you'll have to use --{browser,gpu,renderer,utility}-startup-dialog, then attach (and hope the relevant code hasn't executed before that point). JsDbg -- data structure visualization You can install JsDbg as a plugin for WinDbg or Visual Studio . It interactively lets you look at data structures (such as the DOM tree, Accessibility tree, layout object tree, and others) in a web browser as you debug. See the JsDbg site for some screen shots and usage examples. This also works when examining memory dumps (though not minidumps), and also works together with time travel debugging. Visual Studio hints Debug visualizers Chrome's custom debug visualizers should be added to the pdb files and automatically picked up by Visual Studio. The definitions are in //tools/win/DebugVisualizers if you need to modify them (the BUILD.gn file there has additional instructions). Don't step into trivial functions The debugger can be configured to automatically not step into functions based on regular expression. Edit default.natstepfilter in the following directory: For Visual Studio 2015: C:\Program Files (x86)\Microsoft Visual Studio 14.0\Common7\Packages\Debugger\Visualizers (for all users) or %USERPROFILE%\My Documents\Visual Studio 2015\Visualizers (for the current user only) For Visual Studio 2017 Pro: C:\Program Files (x86)\Microsoft Visual Studio\2017\Professional\Common7\Packages\Debugger\Visualizers (for all users) or %USERPROFILE%\My Documents\Visual Studio 2017\Visualizers (for the current user only) Add regular expressions of functions to not step into. Remember to regex-escape and XML-escape them, e.g. < for < and \. for a literal dot. Example: < Function > < Name > operator new </ Name > < Action > NoStepInto </ Action > </ Function > < Function > < Name > operator delete </ Name > < Action > NoStepInto </ Action > </ Function > <!-- Skip everything in std --> < Function > < Name > std::.* </ Name > < Action > NoStepInto </ Action > </ Function > <!-- all methods on WebKit OwnPtr and variants, ... WTF::*Ptr<*>::* --> < Function > < Name > WTF::.*Ptr<.*>::.* </ Name > < Action > NoStepInto </ Action > </ Function > This file is read at start of a debugging session (F5), so you don't need to restart Visual Studio after changing it. More info: Microsoft email thread V8 and Chromium V8 supports many command-line flags that are useful for debugging. V8 command-line flags can be set via the Chromium command-line flag --js-flags; for instance: chrome.exe --js-flags= "--trace_exception --heap_stats" Note that some V8 command-line flags exist only in the debug build of V8. For a list of all V8 flags try: chrome.exe --js-flags= "--help" Graphics debugging GPU Acceleration of rendering can be more easily debugged with tools. See: Graphics Debugging in Visual Studio 2013 Graphical debugging with NVIDIA NSight Debugging on another machine Sometimes it's useful to debug installation and execution on a machine other than your primary build box. To run the installer on said other machine, first build the mini_installer target on your main build machine (e.g., autoninja -C out\Debug mini_installer). Next, on the debug machine: Make the build machine's build volume available on the debug machine either by mounting it locally (e.g., Z:\) or by crafting a UNC path to it (e.g., \\builder\src) Open up a command prompt and change to a local disk Run src\tools\win\ copy-installer.bat in the remote checkout by way of the mount (e.g., Z:\PATHTOCHECKOUT\src\...) or UNC path (e.g., \\builder\src\...). This will copy the installer, DLLs, and PDBs into your debug machine's C:\out or C:\build (depending on if you're rocking the component=shared_library build or not) Run C:\out\Debug\mini_installer.exe with the flags of your choice to install Chrome. This can take some time, especially on a slow machine. Watch the Task Manager and wait until mini_installer.exe exits before trying to launch Chrome (by way of the shortcut(s) created by the installer) For extra pleasure, add C:\out\Debug to your _NT_SYMBOL_PATH environment variable Consider reading the documentation at the top of copy-installer.bat to see how you can run it. It tries to be smart and copy the right things, but you may need to be explicit (e.g., "copy-installer.bat out Debug"). It is safe to re-run the script to copy only modified files (after a rebuild, for example). You can also use the zip action of the isolate scripts (tools\mb\mb.py) to package all the files for a target into a single zip file, for example: python tools\mb\mb.py zip out/Release base_unittests base_unittests. zip Finding all memory allocations It is possible to use Heap Snapshots to get call stacks on all outstanding allocations that use the OS heap. This works particularly well if heap snapshots are started as soon as the Chrome browser process is created, but before it starts running. Details can be found in this batch file . However, with PartitionAlloc Everywhere most Chromium allocations no longer use the Windows heap so this will only find a subset of allocations, mostly from OS DLLs. Find memory leaks Note: as with Heap Snapshots the utility of UMDH is greatly reduced now because PartitionAlloc Everywhere has mostly replaced the Windows heap. The Windows heap manager has a really useful debug flag, where it can be asked to capture and store a stack trace with every allocation. The tool to scrape these stack traces out of processes is UMDH, which comes with WinDbg . UMDH is great. It will capture a snapshot of the heap state as many times as you like, and it'll do it fairly quickly. You then run it again against either a single snapshot, or a pair of snapshots, at which time it'll symbolize the stack traces and aggregate usage up to unique stack traces. Turning on the user stack trace database for chrome.exe with gflags.exe makes it run unbearably slowly; however, turning on the user stack trace database on for the browser alone is just fine. While it's possible to turn on the user stack database with the "!gflag" debugging extension, it's too late to do this by the time the initial debugger breakpoint hits. The only reasonable way to do this is to Launch GFlags.exe, Enable the user stack trace database (per image below), Launch Chrome under the debugger. Set a breakpont when chrome.dll loads with "sxe ld chrome.dll". Step up, to allow Chrome.dll to initialize. Disable the stack trace database in GFlags.exe. Continue chrome, optionally detaching the debugger. GFlags.exe settings for user mode stack trace database. If you then ever suffer a browser memory leak, you can snarf a dump of the process with umdh - p :<my browser pid> > chrome-browser-leak-umdh-dump.txt which can then typically be "trivially" analyzed to find the culprit. Miscellaneous Note that by default Application Verifier only works with non-official builds of Chromium. To use Application Verifier on official builds you need to add --disable-features=RendererCodeIntegrity to avoid sandbox crashes in renderer processes. See crbug.com/1004989 for details. See also this page . Application Verifier is a free tool from Microsoft (available as part of the Windows SDK) that can be used to flush out programming errors. Starting with M68 Application Verifier can be enabled for chrome.exe without needing to disable the sandbox. After adding chrome.exe to the list of applications to be stressed you need to expand the list of Basics checks and disable the Leak checks. You may also need to disable Handles and Locks checks depending on your graphics driver and specific Chrome version, but the eventual goal is to have Chrome run with Handles and Locks checks enabled. When bugs are found Chrome will trigger a breakpoint so running all Chrome processes under a debugger is recommended. Chrome will run much more slowly because Application Verifier puts every heap allocation on a separate page. Note that with PartitionAlloc Everywhere most Chromium allocations don't actually go through the Windows heap and are therefore unaffected by Application Verifier. You can check the undocumented 'Cuzz' checkbox in Application Verifier to get the Windows thread scheduler to add some extra randomness in order to help expose race conditions in your code. To put a breakpoint on CreateFile(), add this break point: {,,kernel32.dll}_CreateFileW@28 {,,kernel32.dll} specifies the DLL (context operator). _ prefix means extern "C". @28 postfix means _stdcall with the stack pop at the end of the function. i.e. the number of arguments in BYTES. You can use DebugView from SysInternals or sawbuck to view LOG() messages that normally go to stderr on POSIX.
“The Chromium Logo The Chromium Projects Home Chromium ChromiumOS Quick Links Report Bugs Discuss Other Sites Chromium Blog Google Chrome Extensions Except As Otherwise Noted, The Content Of This Page Is Licensed Under A Creative Commons Attribution 2.5 License, And Examples Are Licensed Under The BSD License. Privacy Edit This Page For Developers > How-Tos > Debugging Chromium On Windows First See Get The Code For Checkout And Build Instructions. Getting Started You Can Use Visual Studio's Built-in Debugger Or WinDBG To Debug Chromium. You Don't Need To Use The IDE To Build In Order To Use The Debugger: Autoninja Is Used To Build Chromium And Most Developers Invoke It From A Command Prompt, And Then Open The IDE For Debugging As Necessary. To Start Debugging An Already-built Executable With Visual Studio Just Launch Visual Studio (2019 Or Higher) And Select File-> Open-> Project/Solution (Ctrl+Shift+O) And Select The Executable Of Interest. This Will Create A Solution With That Executable As The 'project'. You Can Then Launch The Debugger With F5 Or F11 Or From The Debug Menu. If You Right-click On The Executable In Solution Explorer And Select Properties Then You Can Edit Things Such As The Executable Path, Command-line Arguments, And Working Directory. You Can Add Additional Executables To The Solution By Using File-> Add-> Existing Project And Selecting Another Already-built Executable. You Can Select Which One To Debug By Right-clicking On One Of Them In Solution Explorer And Selecting Set As Startup Project. When Your Solution File Is Customized To Your Taste You Can Save It To A Directory Such As Out\solutions. Saving It There Helps Ensure That Relative Paths To Source Files, Printed From Build Commands, Will Correctly Identify The Source Files. The Tools Menu Can Be Used To Add Commands To Do Things Like Invoke Autoninja To Build Chrome, Compile The Selected Source File, Or Other Things. Visual Studio 2017 Is Not Recommended For Debugging Of Chromium - Use A Newer Version For Best Performance And Stability. Symbol_level=2 Is The Default On Windows And Gives Full Debugging Information With Types, Locals, Globals, Function Names, And Source/line Information. Symbol_level=1 Creates Smaller PDBs With Just Function Names, And Source/line Information - Source-level Debugging Is Still Supported (new From June 2019), But Local Variables And Type Information Are Missing. Symbol_level=0 Gives Extremely Limited Debugging Abilities, Mostly Just Viewing Call Stacks When Chromium Crashes. Browsing Source Code If You Use A Solution File Generated By Gn (gn Gen --ide=vs) Then Intellisense May Help You Navigate The Code. If This Doesn't Work Or If You Use A Solution Created As Above Then You May Want To Install VsChromium To Help Navigate The Code, As Well As Using Https://source.chromium.org. Profiles It's A Good Idea To Use A Different Chrome Profile For Your Debugging. If You Are Debugging Google Chrome Branded Builds, Or Use A Chromium Build As Your Primary Browser, The Profiles Can Collide So You Can't Run Both At Once, And Your Stable Browser Might See Profile Versions From The Future (Google Chrome And Chromium Use Different Profile Directories By Default So Won't Collide). Use The Command-line Option: --user-data-dir=C:\tmp\my_debug_profile (replace The Path As Necessary) Using The IDE, Go To The Debugging Tab Of The Properties Of The Chrome Project, And Set The Command Arguments. Chrome Debug Log Enable Chrome Debug Logging To A File By Passing --enable-logging --v=1 Command-line Flags At Startup. Debug Builds Place The Chrome_debug.log File In The Out\Debug Directory. Release Builds Place The File In The Top Level Of The User Data Chromium App Directory, Which Is OS-version-dependent. For More Information, See Logging And User Data Directory Details. Symbol Server If You Are Debugging Official Google Chrome Release Builds, Use The Symbol Server: Https://chromium-browser-symsrv.commondatastorage.googleapis.com In Visual Studio, This Goes In Tools > Options Under Debugging > Symbols. You Should Set Up A Local Cache In A Empty Directory On Your Computer. In Windbg You Can Add This To Your Symbol Server Search Path With The Command Below, Where C:\symbols Is A Local Cache Directory: .sympath+ SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Alternately, You Can Set The _NT_SYMBOL_PATH Environment Variable To Include Both The Microsoft And Google Symbol Servers - VS, Windbg, And Other Tools Should Both Respect This Environment Variable: _NT_SYMBOL_PATH=SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Note That Symbol Servers Will Let The Debuggers Download Both The PE Files (DLLs And EXEs) And The PDB Files. Chrome Often Loads Third Party Libraries And Partial Symbols For Some Of These Are Also Public. For Example: AMD: Https://download.amd.com/dir/bin Nvidia: Https://driver-symbols.nvidia.com/ Intel: Https://software.intel.com/sites/downloads/symbols/ For Example, For Completeness, The Following Symbol Server Environment Variable Will Resolve All Of The Above Sources - But This Is More Than Is Normally Needed: _NT_SYMBOL_PATH=SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com;SRV\*C:\symbols\*https://download.amd.com/dir/bin;SRV\*C:\symbols\*https://driver-symbols.nvidia.com/;SRV\*C:\symbols\*https://software.intel.com/sites/downloads/symbols/ Source Indexing You Should Set Up Source Indexing In Your Debugger (.srcfix In Windbg, Tools-> Options-> Debugging-> General-> Enable Source Server Support In Visual Studio) So That The Correct Source Files Will Automatically Be Downloaded Based On Information In The Downloaded Symbols. Additionally, You Must Have Python In Your Path In Order For The Command That Fetches Source Files To Succeed; Launching The Debugger From The Same Environment As Where You Build Chromium Is An Easy Way To Ensure It's Present. This Is Highly Recommended When Debugging Released Google Chrome Builds Or Looking At Crash Dumps. Having The Correct Version Of The Source Files Automatically Show Up Saves Significant Time So You Should Definitely Set This. Multi-process Issues Chromium Can Be Challenging To Debug Because Of Its Multi-process Architecture. When You Select Run In The Debugger, Only The Main Browser Process Will Be Debugged. The Code That Actually Renders Web Pages (the Renderer) And The Plugins Will Be In Separate Processes That's Not (yet!) Being Debugged. The ProcessExplorer Tool Has A Process Tree View Where You Can See How These Processes Are Related. You Can Also Get The Process IDs Associated With Each Tab From The Chrome Task Manager (right-click On An Empty Area Of The Window Title Bar To Open). Automatically Attach To Child Processes There Are Two Visual Studio Extensions That Enable The Debugger To Automatically Attach To All Chrome Processes, So You Can Debug All Of Chrome At Once. Microsoft's Child Process Debugging Power Tool Is A Standalone Extension For This, And VsChromium Is Another Option That Bundles Many Other Additional Features. In Addition To Installing One Of These Extensions, You Must Run Visual Studio As Administrator, Or It Will Silently Fail To Attach To Some Of Chrome's Child Processes. Single-process Mode One Way To Debug Issues Is To Run Chromium In Single-process Mode. This Will Allow You To See The Entire State Of The Program Without Extra Work (although It Will Still Have Many Threads). To Use Single-process Mode, Add The Command-line Flag --single-process This Approach Isn't Perfect Because Some Problems Won't Manifest Themselves In This Mode And Some Features Don't Work And Worker Threads Are Still Spawned Into New Processes. Manually Attaching To A Child Process You Can Attach To The Running Child Processes With The Debugger. Select Tools > Attach To Process And Click The Chrome.exe Process You Want To Attach To. Before Attaching, Make Sure You Have Selected Only Native Code When Attaching To The Process This Is Done By Clicking Select... In The Attach To Process Window And Only Checking Native. If You Forget This, It May Attempt To Attach In "WebKit" Mode To Debug JavaScript, And You'll Get An Error Message "An Operation Is Not Legal In The Current State." You Can Now Debug The Two Processes As If They Were One. When You Are Debugging Multiple Processes, Open The Debug > Windows > Processes Window To Switch Between Them. Sometimes You Are Debugging Something That Only Happens On Startup, And Want To See The Child Process As Soon As It Starts. Use: --renderer-startup-dialog --no-sandbox You Have To Disable The Sandbox Or The Dialog Box Will Be Prohibited From Showing. When The Dialog Appears, Visit Tools > Attach To Process And Attach To The Process Showing The Renderer Startup Dialog. Now You're Debugging In The Renderer And Can Continue Execution By Pressing OK In The Dialog. Startup Dialogs Also Exist For Other Child Process Types: --gpu-startup-dialog, --ppapi-startup-dialog, --utility-startup-dialog, --plugin-startup-dialog (for NPAPI). For Utilities, You Can Add A Service Type --utility-startup-dialog=data_decoder.mojom.DataDecoderService. You Can Also Try The Vs-chromium Plug-in To Attach To The Right Processes. Semi-automatically Attaching The Debugger To Child Processes The Following Flags Cause Child Processes To Wait For 60 Seconds In A Busy Loop For A Debugger To Attach To The Process. Once Either Condition Is True, It Continues On; No Exception Is Thrown. --wait-for-debugger-children[=filter] The Filter, If Provided, Will Fire Only If It Matches The --type Parameter To The Process. Values Include Renderer, Plugin (for NPAPI), Ppapi, Gpu-process, And Utility. When Using This Option, It May Be Helpful To Limit The Number Of Renderer Processes Spawned, Using: --renderer-process-limit=1 Image File Execution Options Using Image File Execution Options (IFEO) Will Not Work Because CreateProcess() Returns The Handle To The Debugger Process Instead Of The Intended Child Process. There Are Also Issues With The Sandbox. Time Travel Debugging You Can Do Time Travel Debugging Using WinDbg Preview (must Be Installed From The Microsoft Store). This Lets You Execute A Program Forward And Backwards. After Capturing A Trace, You Can Set Breakpoints And Step Through Code As Normal, But Also Provides 'backwards' Commands (g-, T-, P-) So That You Can Go Back And Forth Through The Execution. It Is Especially Useful To Set Data Breakpoints (ba Command) And Reverse Continuing, So You Can See When A Certain Variable Was Last Changed To Its Current Value. Chromium Specifics: The Type Of Injection The Time Travel Tracer Needs To Perform Is Incompatible With The Chromium Sandbox. In Order To Record A Trace, You'll Need To Run With --no-sandbox. Chromium Cannot Run Elevated With Administrator Privileges, So The "Launch Executable (advance)" Option Won't Work, You'll Need To Attach After The Process Has Already Launched Via The Checkbox In The Bottom Right. If You Need To Record Startup-like Things, You'll Have To Use --{browser,gpu,renderer,utility}-startup-dialog, Then Attach (and Hope The Relevant Code Hasn't Executed Before That Point). JsDbg -- Data Structure Visualization You Can Install JsDbg As A Plugin For WinDbg Or Visual Studio. It Interactively Lets You Look At Data Structures (such As The DOM Tree, Accessibility Tree, Layout Object Tree, And Others) In A Web Browser As You Debug. See The JsDbg Site For Some Screen Shots And Usage Examples. This Also Works When Examining Memory Dumps (though Not Minidumps), And Also Works Together With Time Travel Debugging. Visual Studio Hints Debug Visualizers Chrome's Custom Debug Visualizers Should Be Added To The Pdb Files And Automatically Picked Up By Visual Studio. The Definitions Are In //tools/win/DebugVisualizers If You Need To Modify Them (the BUILD.gn File There Has Additional Instructions). Don't Step Into Trivial Functions The Debugger Can Be Configured To Automatically Not Step Into Functions Based On Regular Expression. Edit Default.natstepfilter In The Following Directory: For Visual Studio 2015: C:\Program Files (x86)\Microsoft Visual Studio 14.0\Common7\Packages\Debugger\Visualizers (for All Users) Or %USERPROFILE%\My Documents\Visual Studio 2015\Visualizers (for The Current User Only) For Visual Studio 2017 Pro: C:\Program Files (x86)\Microsoft Visual Studio\2017\Professional\Common7\Packages\Debugger\Visualizers (for All Users) Or %USERPROFILE%\My Documents\Visual Studio 2017\Visualizers (for The Current User Only) Add Regular Expressions Of Functions To Not Step Into. Remember To Regex-escape And XML-escape Them, E.g. < For < And \. For A Literal Dot. Example: Operator New NoStepInto Operator Delete NoStepInto Std::.* NoStepInto WTF::.*Ptr ::.* NoStepInto This File Is Read At Start Of A Debugging Session (F5), So You Don't Need To Restart Visual Studio After Changing It. More Info: Microsoft Email Thread V8 And Chromium V8 Supports Many Command-line Flags That Are Useful For Debugging. V8 Command-line Flags Can Be Set Via The Chromium Command-line Flag --js-flags; For Instance: Chrome.exe --js-flags="--trace_exception --heap_stats" Note That Some V8 Command-line Flags Exist Only In The Debug Build Of V8. For A List Of All V8 Flags Try: Chrome.exe --js-flags="--help" Graphics Debugging GPU Acceleration Of Rendering Can Be More Easily Debugged With Tools. See: Graphics Debugging In Visual Studio 2013 Graphical Debugging With NVIDIA NSight Debugging On Another Machine Sometimes It's Useful To Debug Installation And Execution On A Machine Other Than Your Primary Build Box. To Run The Installer On Said Other Machine, First Build The Mini_installer Target On Your Main Build Machine (e.g., Autoninja -C Out\Debug Mini_installer). Next, On The Debug Machine: Make The Build Machine's Build Volume Available On The Debug Machine Either By Mounting It Locally (e.g., Z:\) Or By Crafting A UNC Path To It (e.g., \\builder\src) Open Up A Command Prompt And Change To A Local Disk Run Src\tools\win\copy-installer.bat In The Remote Checkout By Way Of The Mount (e.g., Z:\PATHTOCHECKOUT\src\...) Or UNC Path (e.g., \\builder\src\...). This Will Copy The Installer, DLLs, And PDBs Into Your Debug Machine's C:\out Or C:\build (depending On If You're Rocking The Component=shared_library Build Or Not) Run C:\out\Debug\mini_installer.exe With The Flags Of Your Choice To Install Chrome. This Can Take Some Time, Especially On A Slow Machine. Watch The Task Manager And Wait Until Mini_installer.exe Exits Before Trying To Launch Chrome (by Way Of The Shortcut(s) Created By The Installer) For Extra Pleasure, Add C:\out\Debug To Your _NT_SYMBOL_PATH Environment Variable Consider Reading The Documentation At The Top Of Copy-installer.bat To See How You Can Run It. It Tries To Be Smart And Copy The Right Things, But You May Need To Be Explicit (e.g., "copy-installer.bat Out Debug"). It Is Safe To Re-run The Script To Copy Only Modified Files (after A Rebuild, For Example). You Can Also Use The Zip Action Of The Isolate Scripts (tools\mb\mb.py) To Package All The Files For A Target Into A Single Zip File, For Example: Python Tools\mb\mb.py Zip Out/Release Base_unittests Base_unittests.zip Finding All Memory Allocations It Is Possible To Use Heap Snapshots To Get Call Stacks On All Outstanding Allocations That Use The OS Heap. This Works Particularly Well If Heap Snapshots Are Started As Soon As The Chrome Browser Process Is Created, But Before It Starts Running. Details Can Be Found In This Batch File. However, With PartitionAlloc Everywhere Most Chromium Allocations No Longer Use The Windows Heap So This Will Only Find A Subset Of Allocations, Mostly From OS DLLs. Find Memory Leaks Note: As With Heap Snapshots The Utility Of UMDH Is Greatly Reduced Now Because PartitionAlloc Everywhere Has Mostly Replaced The Windows Heap. The Windows Heap Manager Has A Really Useful Debug Flag, Where It Can Be Asked To Capture And Store A Stack Trace With Every Allocation. The Tool To Scrape These Stack Traces Out Of Processes Is UMDH, Which Comes With WinDbg. UMDH Is Great. It Will Capture A Snapshot Of The Heap State As Many Times As You Like, And It'll Do It Fairly Quickly. You Then Run It Again Against Either A Single Snapshot, Or A Pair Of Snapshots, At Which Time It'll Symbolize The Stack Traces And Aggregate Usage Up To Unique Stack Traces. Turning On The User Stack Trace Database For Chrome.exe With Gflags.exe Makes It Run Unbearably Slowly; However, Turning On The User Stack Trace Database On For The Browser Alone Is Just Fine. While It's Possible To Turn On The User Stack Database With The "!gflag" Debugging Extension, It's Too Late To Do This By The Time The Initial Debugger Breakpoint Hits. The Only Reasonable Way To Do This Is To Launch GFlags.exe, Enable The User Stack Trace Database (per Image Below), Launch Chrome Under The Debugger. Set A Breakpont When Chrome.dll Loads With "sxe Ld Chrome.dll". Step Up, To Allow Chrome.dll To Initialize. Disable The Stack Trace Database In GFlags.exe. Continue Chrome, Optionally Detaching The Debugger. Image GFlags.exe Settings For User Mode Stack Trace Database. If You Then Ever Suffer A Browser Memory Leak, You Can Snarf A Dump Of The Process With Umdh -p: > Chrome-browser-leak-umdh-dump.txt Which Can Then Typically Be "trivially" Analyzed To Find The Culprit. Miscellaneous Note That By Default Application Verifier Only Works With Non-official Builds Of Chromium. To Use Application Verifier On Official Builds You Need To Add --disable-features=RendererCodeIntegrity To Avoid Sandbox Crashes In Renderer Processes. See Crbug.com/1004989 For Details. See Also This Page. Application Verifier Is A Free Tool From Microsoft (available As Part Of The Windows SDK) That Can Be Used To Flush Out Programming Errors. Starting With M68 Application Verifier Can Be Enabled For Chrome.exe Without Needing To Disable The Sandbox. After Adding Chrome.exe To The List Of Applications To Be Stressed You Need To Expand The List Of Basics Checks And Disable The Leak Checks. You May Also Need To Disable Handles And Locks Checks Depending On Your Graphics Driver And Specific Chrome Version, But The Eventual Goal Is To Have Chrome Run With Handles And Locks Checks Enabled. When Bugs Are Found Chrome Will Trigger A Breakpoint So Running All Chrome Processes Under A Debugger Is Recommended. Chrome Will Run Much More Slowly Because Application Verifier Puts Every Heap Allocation On A Separate Page. Note That With PartitionAlloc Everywhere Most Chromium Allocations Don't Actually Go Through The Windows Heap And Are Therefore Unaffected By Application Verifier. You Can Check The Undocumented 'Cuzz' Checkbox In Application Verifier To Get The Windows Thread Scheduler To Add Some Extra Randomness In Order To Help Expose Race Conditions In Your Code. To Put A Breakpoint On CreateFile(), Add This Break Point: {,,kernel32.dll}_CreateFileW@28 {,,kernel32.dll} Specifies The DLL (context Operator). _ Prefix Means Extern "C". @28 Postfix Means _stdcall With The Stack Pop At The End Of The Function. I.e. The Number Of Arguments In BYTES. You Can Use DebugView From SysInternals Or Sawbuck To View LOG() Messages That Normally Go To Stderr On POSIX.” Metadata:
- Title: ➤ The Chromium Logo The Chromium Projects Home Chromium ChromiumOS Quick Links Report Bugs Discuss Other Sites Chromium Blog Google Chrome Extensions Except As Otherwise Noted, The Content Of This Page Is Licensed Under A Creative Commons Attribution 2.5 License, And Examples Are Licensed Under The BSD License. Privacy Edit This Page For Developers > How-Tos > Debugging Chromium On Windows First See Get The Code For Checkout And Build Instructions. Getting Started You Can Use Visual Studio's Built-in Debugger Or WinDBG To Debug Chromium. You Don't Need To Use The IDE To Build In Order To Use The Debugger: Autoninja Is Used To Build Chromium And Most Developers Invoke It From A Command Prompt, And Then Open The IDE For Debugging As Necessary. To Start Debugging An Already-built Executable With Visual Studio Just Launch Visual Studio (2019 Or Higher) And Select File-> Open-> Project/Solution (Ctrl+Shift+O) And Select The Executable Of Interest. This Will Create A Solution With That Executable As The 'project'. You Can Then Launch The Debugger With F5 Or F11 Or From The Debug Menu. If You Right-click On The Executable In Solution Explorer And Select Properties Then You Can Edit Things Such As The Executable Path, Command-line Arguments, And Working Directory. You Can Add Additional Executables To The Solution By Using File-> Add-> Existing Project And Selecting Another Already-built Executable. You Can Select Which One To Debug By Right-clicking On One Of Them In Solution Explorer And Selecting Set As Startup Project. When Your Solution File Is Customized To Your Taste You Can Save It To A Directory Such As Out\solutions. Saving It There Helps Ensure That Relative Paths To Source Files, Printed From Build Commands, Will Correctly Identify The Source Files. The Tools Menu Can Be Used To Add Commands To Do Things Like Invoke Autoninja To Build Chrome, Compile The Selected Source File, Or Other Things. Visual Studio 2017 Is Not Recommended For Debugging Of Chromium - Use A Newer Version For Best Performance And Stability. Symbol_level=2 Is The Default On Windows And Gives Full Debugging Information With Types, Locals, Globals, Function Names, And Source/line Information. Symbol_level=1 Creates Smaller PDBs With Just Function Names, And Source/line Information - Source-level Debugging Is Still Supported (new From June 2019), But Local Variables And Type Information Are Missing. Symbol_level=0 Gives Extremely Limited Debugging Abilities, Mostly Just Viewing Call Stacks When Chromium Crashes. Browsing Source Code If You Use A Solution File Generated By Gn (gn Gen --ide=vs) Then Intellisense May Help You Navigate The Code. If This Doesn't Work Or If You Use A Solution Created As Above Then You May Want To Install VsChromium To Help Navigate The Code, As Well As Using Https://source.chromium.org. Profiles It's A Good Idea To Use A Different Chrome Profile For Your Debugging. If You Are Debugging Google Chrome Branded Builds, Or Use A Chromium Build As Your Primary Browser, The Profiles Can Collide So You Can't Run Both At Once, And Your Stable Browser Might See Profile Versions From The Future (Google Chrome And Chromium Use Different Profile Directories By Default So Won't Collide). Use The Command-line Option: --user-data-dir=C:\tmp\my_debug_profile (replace The Path As Necessary) Using The IDE, Go To The Debugging Tab Of The Properties Of The Chrome Project, And Set The Command Arguments. Chrome Debug Log Enable Chrome Debug Logging To A File By Passing --enable-logging --v=1 Command-line Flags At Startup. Debug Builds Place The Chrome_debug.log File In The Out\Debug Directory. Release Builds Place The File In The Top Level Of The User Data Chromium App Directory, Which Is OS-version-dependent. For More Information, See Logging And User Data Directory Details. Symbol Server If You Are Debugging Official Google Chrome Release Builds, Use The Symbol Server: Https://chromium-browser-symsrv.commondatastorage.googleapis.com In Visual Studio, This Goes In Tools > Options Under Debugging > Symbols. You Should Set Up A Local Cache In A Empty Directory On Your Computer. In Windbg You Can Add This To Your Symbol Server Search Path With The Command Below, Where C:\symbols Is A Local Cache Directory: .sympath+ SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Alternately, You Can Set The _NT_SYMBOL_PATH Environment Variable To Include Both The Microsoft And Google Symbol Servers - VS, Windbg, And Other Tools Should Both Respect This Environment Variable: _NT_SYMBOL_PATH=SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Note That Symbol Servers Will Let The Debuggers Download Both The PE Files (DLLs And EXEs) And The PDB Files. Chrome Often Loads Third Party Libraries And Partial Symbols For Some Of These Are Also Public. For Example: AMD: Https://download.amd.com/dir/bin Nvidia: Https://driver-symbols.nvidia.com/ Intel: Https://software.intel.com/sites/downloads/symbols/ For Example, For Completeness, The Following Symbol Server Environment Variable Will Resolve All Of The Above Sources - But This Is More Than Is Normally Needed: _NT_SYMBOL_PATH=SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com;SRV\*C:\symbols\*https://download.amd.com/dir/bin;SRV\*C:\symbols\*https://driver-symbols.nvidia.com/;SRV\*C:\symbols\*https://software.intel.com/sites/downloads/symbols/ Source Indexing You Should Set Up Source Indexing In Your Debugger (.srcfix In Windbg, Tools-> Options-> Debugging-> General-> Enable Source Server Support In Visual Studio) So That The Correct Source Files Will Automatically Be Downloaded Based On Information In The Downloaded Symbols. Additionally, You Must Have Python In Your Path In Order For The Command That Fetches Source Files To Succeed; Launching The Debugger From The Same Environment As Where You Build Chromium Is An Easy Way To Ensure It's Present. This Is Highly Recommended When Debugging Released Google Chrome Builds Or Looking At Crash Dumps. Having The Correct Version Of The Source Files Automatically Show Up Saves Significant Time So You Should Definitely Set This. Multi-process Issues Chromium Can Be Challenging To Debug Because Of Its Multi-process Architecture. When You Select Run In The Debugger, Only The Main Browser Process Will Be Debugged. The Code That Actually Renders Web Pages (the Renderer) And The Plugins Will Be In Separate Processes That's Not (yet!) Being Debugged. The ProcessExplorer Tool Has A Process Tree View Where You Can See How These Processes Are Related. You Can Also Get The Process IDs Associated With Each Tab From The Chrome Task Manager (right-click On An Empty Area Of The Window Title Bar To Open). Automatically Attach To Child Processes There Are Two Visual Studio Extensions That Enable The Debugger To Automatically Attach To All Chrome Processes, So You Can Debug All Of Chrome At Once. Microsoft's Child Process Debugging Power Tool Is A Standalone Extension For This, And VsChromium Is Another Option That Bundles Many Other Additional Features. In Addition To Installing One Of These Extensions, You Must Run Visual Studio As Administrator, Or It Will Silently Fail To Attach To Some Of Chrome's Child Processes. Single-process Mode One Way To Debug Issues Is To Run Chromium In Single-process Mode. This Will Allow You To See The Entire State Of The Program Without Extra Work (although It Will Still Have Many Threads). To Use Single-process Mode, Add The Command-line Flag --single-process This Approach Isn't Perfect Because Some Problems Won't Manifest Themselves In This Mode And Some Features Don't Work And Worker Threads Are Still Spawned Into New Processes. Manually Attaching To A Child Process You Can Attach To The Running Child Processes With The Debugger. Select Tools > Attach To Process And Click The Chrome.exe Process You Want To Attach To. Before Attaching, Make Sure You Have Selected Only Native Code When Attaching To The Process This Is Done By Clicking Select... In The Attach To Process Window And Only Checking Native. If You Forget This, It May Attempt To Attach In "WebKit" Mode To Debug JavaScript, And You'll Get An Error Message "An Operation Is Not Legal In The Current State." You Can Now Debug The Two Processes As If They Were One. When You Are Debugging Multiple Processes, Open The Debug > Windows > Processes Window To Switch Between Them. Sometimes You Are Debugging Something That Only Happens On Startup, And Want To See The Child Process As Soon As It Starts. Use: --renderer-startup-dialog --no-sandbox You Have To Disable The Sandbox Or The Dialog Box Will Be Prohibited From Showing. When The Dialog Appears, Visit Tools > Attach To Process And Attach To The Process Showing The Renderer Startup Dialog. Now You're Debugging In The Renderer And Can Continue Execution By Pressing OK In The Dialog. Startup Dialogs Also Exist For Other Child Process Types: --gpu-startup-dialog, --ppapi-startup-dialog, --utility-startup-dialog, --plugin-startup-dialog (for NPAPI). For Utilities, You Can Add A Service Type --utility-startup-dialog=data_decoder.mojom.DataDecoderService. You Can Also Try The Vs-chromium Plug-in To Attach To The Right Processes. Semi-automatically Attaching The Debugger To Child Processes The Following Flags Cause Child Processes To Wait For 60 Seconds In A Busy Loop For A Debugger To Attach To The Process. Once Either Condition Is True, It Continues On; No Exception Is Thrown. --wait-for-debugger-children[=filter] The Filter, If Provided, Will Fire Only If It Matches The --type Parameter To The Process. Values Include Renderer, Plugin (for NPAPI), Ppapi, Gpu-process, And Utility. When Using This Option, It May Be Helpful To Limit The Number Of Renderer Processes Spawned, Using: --renderer-process-limit=1 Image File Execution Options Using Image File Execution Options (IFEO) Will Not Work Because CreateProcess() Returns The Handle To The Debugger Process Instead Of The Intended Child Process. There Are Also Issues With The Sandbox. Time Travel Debugging You Can Do Time Travel Debugging Using WinDbg Preview (must Be Installed From The Microsoft Store). This Lets You Execute A Program Forward And Backwards. After Capturing A Trace, You Can Set Breakpoints And Step Through Code As Normal, But Also Provides 'backwards' Commands (g-, T-, P-) So That You Can Go Back And Forth Through The Execution. It Is Especially Useful To Set Data Breakpoints (ba Command) And Reverse Continuing, So You Can See When A Certain Variable Was Last Changed To Its Current Value. Chromium Specifics: The Type Of Injection The Time Travel Tracer Needs To Perform Is Incompatible With The Chromium Sandbox. In Order To Record A Trace, You'll Need To Run With --no-sandbox. Chromium Cannot Run Elevated With Administrator Privileges, So The "Launch Executable (advance)" Option Won't Work, You'll Need To Attach After The Process Has Already Launched Via The Checkbox In The Bottom Right. If You Need To Record Startup-like Things, You'll Have To Use --{browser,gpu,renderer,utility}-startup-dialog, Then Attach (and Hope The Relevant Code Hasn't Executed Before That Point). JsDbg -- Data Structure Visualization You Can Install JsDbg As A Plugin For WinDbg Or Visual Studio. It Interactively Lets You Look At Data Structures (such As The DOM Tree, Accessibility Tree, Layout Object Tree, And Others) In A Web Browser As You Debug. See The JsDbg Site For Some Screen Shots And Usage Examples. This Also Works When Examining Memory Dumps (though Not Minidumps), And Also Works Together With Time Travel Debugging. Visual Studio Hints Debug Visualizers Chrome's Custom Debug Visualizers Should Be Added To The Pdb Files And Automatically Picked Up By Visual Studio. The Definitions Are In //tools/win/DebugVisualizers If You Need To Modify Them (the BUILD.gn File There Has Additional Instructions). Don't Step Into Trivial Functions The Debugger Can Be Configured To Automatically Not Step Into Functions Based On Regular Expression. Edit Default.natstepfilter In The Following Directory: For Visual Studio 2015: C:\Program Files (x86)\Microsoft Visual Studio 14.0\Common7\Packages\Debugger\Visualizers (for All Users) Or %USERPROFILE%\My Documents\Visual Studio 2015\Visualizers (for The Current User Only) For Visual Studio 2017 Pro: C:\Program Files (x86)\Microsoft Visual Studio\2017\Professional\Common7\Packages\Debugger\Visualizers (for All Users) Or %USERPROFILE%\My Documents\Visual Studio 2017\Visualizers (for The Current User Only) Add Regular Expressions Of Functions To Not Step Into. Remember To Regex-escape And XML-escape Them, E.g. < For < And \. For A Literal Dot. Example: Operator New NoStepInto Operator Delete NoStepInto Std::.* NoStepInto WTF::.*Ptr ::.* NoStepInto This File Is Read At Start Of A Debugging Session (F5), So You Don't Need To Restart Visual Studio After Changing It. More Info: Microsoft Email Thread V8 And Chromium V8 Supports Many Command-line Flags That Are Useful For Debugging. V8 Command-line Flags Can Be Set Via The Chromium Command-line Flag --js-flags; For Instance: Chrome.exe --js-flags="--trace_exception --heap_stats" Note That Some V8 Command-line Flags Exist Only In The Debug Build Of V8. For A List Of All V8 Flags Try: Chrome.exe --js-flags="--help" Graphics Debugging GPU Acceleration Of Rendering Can Be More Easily Debugged With Tools. See: Graphics Debugging In Visual Studio 2013 Graphical Debugging With NVIDIA NSight Debugging On Another Machine Sometimes It's Useful To Debug Installation And Execution On A Machine Other Than Your Primary Build Box. To Run The Installer On Said Other Machine, First Build The Mini_installer Target On Your Main Build Machine (e.g., Autoninja -C Out\Debug Mini_installer). Next, On The Debug Machine: Make The Build Machine's Build Volume Available On The Debug Machine Either By Mounting It Locally (e.g., Z:\) Or By Crafting A UNC Path To It (e.g., \\builder\src) Open Up A Command Prompt And Change To A Local Disk Run Src\tools\win\copy-installer.bat In The Remote Checkout By Way Of The Mount (e.g., Z:\PATHTOCHECKOUT\src\...) Or UNC Path (e.g., \\builder\src\...). This Will Copy The Installer, DLLs, And PDBs Into Your Debug Machine's C:\out Or C:\build (depending On If You're Rocking The Component=shared_library Build Or Not) Run C:\out\Debug\mini_installer.exe With The Flags Of Your Choice To Install Chrome. This Can Take Some Time, Especially On A Slow Machine. Watch The Task Manager And Wait Until Mini_installer.exe Exits Before Trying To Launch Chrome (by Way Of The Shortcut(s) Created By The Installer) For Extra Pleasure, Add C:\out\Debug To Your _NT_SYMBOL_PATH Environment Variable Consider Reading The Documentation At The Top Of Copy-installer.bat To See How You Can Run It. It Tries To Be Smart And Copy The Right Things, But You May Need To Be Explicit (e.g., "copy-installer.bat Out Debug"). It Is Safe To Re-run The Script To Copy Only Modified Files (after A Rebuild, For Example). You Can Also Use The Zip Action Of The Isolate Scripts (tools\mb\mb.py) To Package All The Files For A Target Into A Single Zip File, For Example: Python Tools\mb\mb.py Zip Out/Release Base_unittests Base_unittests.zip Finding All Memory Allocations It Is Possible To Use Heap Snapshots To Get Call Stacks On All Outstanding Allocations That Use The OS Heap. This Works Particularly Well If Heap Snapshots Are Started As Soon As The Chrome Browser Process Is Created, But Before It Starts Running. Details Can Be Found In This Batch File. However, With PartitionAlloc Everywhere Most Chromium Allocations No Longer Use The Windows Heap So This Will Only Find A Subset Of Allocations, Mostly From OS DLLs. Find Memory Leaks Note: As With Heap Snapshots The Utility Of UMDH Is Greatly Reduced Now Because PartitionAlloc Everywhere Has Mostly Replaced The Windows Heap. The Windows Heap Manager Has A Really Useful Debug Flag, Where It Can Be Asked To Capture And Store A Stack Trace With Every Allocation. The Tool To Scrape These Stack Traces Out Of Processes Is UMDH, Which Comes With WinDbg. UMDH Is Great. It Will Capture A Snapshot Of The Heap State As Many Times As You Like, And It'll Do It Fairly Quickly. You Then Run It Again Against Either A Single Snapshot, Or A Pair Of Snapshots, At Which Time It'll Symbolize The Stack Traces And Aggregate Usage Up To Unique Stack Traces. Turning On The User Stack Trace Database For Chrome.exe With Gflags.exe Makes It Run Unbearably Slowly; However, Turning On The User Stack Trace Database On For The Browser Alone Is Just Fine. While It's Possible To Turn On The User Stack Database With The "!gflag" Debugging Extension, It's Too Late To Do This By The Time The Initial Debugger Breakpoint Hits. The Only Reasonable Way To Do This Is To Launch GFlags.exe, Enable The User Stack Trace Database (per Image Below), Launch Chrome Under The Debugger. Set A Breakpont When Chrome.dll Loads With "sxe Ld Chrome.dll". Step Up, To Allow Chrome.dll To Initialize. Disable The Stack Trace Database In GFlags.exe. Continue Chrome, Optionally Detaching The Debugger. Image GFlags.exe Settings For User Mode Stack Trace Database. If You Then Ever Suffer A Browser Memory Leak, You Can Snarf A Dump Of The Process With Umdh -p: > Chrome-browser-leak-umdh-dump.txt Which Can Then Typically Be "trivially" Analyzed To Find The Culprit. Miscellaneous Note That By Default Application Verifier Only Works With Non-official Builds Of Chromium. To Use Application Verifier On Official Builds You Need To Add --disable-features=RendererCodeIntegrity To Avoid Sandbox Crashes In Renderer Processes. See Crbug.com/1004989 For Details. See Also This Page. Application Verifier Is A Free Tool From Microsoft (available As Part Of The Windows SDK) That Can Be Used To Flush Out Programming Errors. Starting With M68 Application Verifier Can Be Enabled For Chrome.exe Without Needing To Disable The Sandbox. After Adding Chrome.exe To The List Of Applications To Be Stressed You Need To Expand The List Of Basics Checks And Disable The Leak Checks. You May Also Need To Disable Handles And Locks Checks Depending On Your Graphics Driver And Specific Chrome Version, But The Eventual Goal Is To Have Chrome Run With Handles And Locks Checks Enabled. When Bugs Are Found Chrome Will Trigger A Breakpoint So Running All Chrome Processes Under A Debugger Is Recommended. Chrome Will Run Much More Slowly Because Application Verifier Puts Every Heap Allocation On A Separate Page. Note That With PartitionAlloc Everywhere Most Chromium Allocations Don't Actually Go Through The Windows Heap And Are Therefore Unaffected By Application Verifier. You Can Check The Undocumented 'Cuzz' Checkbox In Application Verifier To Get The Windows Thread Scheduler To Add Some Extra Randomness In Order To Help Expose Race Conditions In Your Code. To Put A Breakpoint On CreateFile(), Add This Break Point: {,,kernel32.dll}_CreateFileW@28 {,,kernel32.dll} Specifies The DLL (context Operator). _ Prefix Means Extern "C". @28 Postfix Means _stdcall With The Stack Pop At The End Of The Function. I.e. The Number Of Arguments In BYTES. You Can Use DebugView From SysInternals Or Sawbuck To View LOG() Messages That Normally Go To Stderr On POSIX.
“The Chromium Logo The Chromium Projects Home Chromium ChromiumOS Quick Links Report Bugs Discuss Other Sites Chromium Blog Google Chrome Extensions Except As Otherwise Noted, The Content Of This Page Is Licensed Under A Creative Commons Attribution 2.5 License, And Examples Are Licensed Under The BSD License. Privacy Edit This Page For Developers > How-Tos > Debugging Chromium On Windows First See Get The Code For Checkout And Build Instructions. Getting Started You Can Use Visual Studio's Built-in Debugger Or WinDBG To Debug Chromium. You Don't Need To Use The IDE To Build In Order To Use The Debugger: Autoninja Is Used To Build Chromium And Most Developers Invoke It From A Command Prompt, And Then Open The IDE For Debugging As Necessary. To Start Debugging An Already-built Executable With Visual Studio Just Launch Visual Studio (2019 Or Higher) And Select File-> Open-> Project/Solution (Ctrl+Shift+O) And Select The Executable Of Interest. This Will Create A Solution With That Executable As The 'project'. You Can Then Launch The Debugger With F5 Or F11 Or From The Debug Menu. If You Right-click On The Executable In Solution Explorer And Select Properties Then You Can Edit Things Such As The Executable Path, Command-line Arguments, And Working Directory. You Can Add Additional Executables To The Solution By Using File-> Add-> Existing Project And Selecting Another Already-built Executable. You Can Select Which One To Debug By Right-clicking On One Of Them In Solution Explorer And Selecting Set As Startup Project. When Your Solution File Is Customized To Your Taste You Can Save It To A Directory Such As Out\solutions. Saving It There Helps Ensure That Relative Paths To Source Files, Printed From Build Commands, Will Correctly Identify The Source Files. The Tools Menu Can Be Used To Add Commands To Do Things Like Invoke Autoninja To Build Chrome, Compile The Selected Source File, Or Other Things. Visual Studio 2017 Is Not Recommended For Debugging Of Chromium - Use A Newer Version For Best Performance And Stability. Symbol_level=2 Is The Default On Windows And Gives Full Debugging Information With Types, Locals, Globals, Function Names, And Source/line Information. Symbol_level=1 Creates Smaller PDBs With Just Function Names, And Source/line Information - Source-level Debugging Is Still Supported (new From June 2019), But Local Variables And Type Information Are Missing. Symbol_level=0 Gives Extremely Limited Debugging Abilities, Mostly Just Viewing Call Stacks When Chromium Crashes. Browsing Source Code If You Use A Solution File Generated By Gn (gn Gen --ide=vs) Then Intellisense May Help You Navigate The Code. If This Doesn't Work Or If You Use A Solution Created As Above Then You May Want To Install VsChromium To Help Navigate The Code, As Well As Using Https://source.chromium.org. Profiles It's A Good Idea To Use A Different Chrome Profile For Your Debugging. If You Are Debugging Google Chrome Branded Builds, Or Use A Chromium Build As Your Primary Browser, The Profiles Can Collide So You Can't Run Both At Once, And Your Stable Browser Might See Profile Versions From The Future (Google Chrome And Chromium Use Different Profile Directories By Default So Won't Collide). Use The Command-line Option: --user-data-dir=C:\tmp\my_debug_profile (replace The Path As Necessary) Using The IDE, Go To The Debugging Tab Of The Properties Of The Chrome Project, And Set The Command Arguments. Chrome Debug Log Enable Chrome Debug Logging To A File By Passing --enable-logging --v=1 Command-line Flags At Startup. Debug Builds Place The Chrome_debug.log File In The Out\Debug Directory. Release Builds Place The File In The Top Level Of The User Data Chromium App Directory, Which Is OS-version-dependent. For More Information, See Logging And User Data Directory Details. Symbol Server If You Are Debugging Official Google Chrome Release Builds, Use The Symbol Server: Https://chromium-browser-symsrv.commondatastorage.googleapis.com In Visual Studio, This Goes In Tools > Options Under Debugging > Symbols. You Should Set Up A Local Cache In A Empty Directory On Your Computer. In Windbg You Can Add This To Your Symbol Server Search Path With The Command Below, Where C:\symbols Is A Local Cache Directory: .sympath+ SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Alternately, You Can Set The _NT_SYMBOL_PATH Environment Variable To Include Both The Microsoft And Google Symbol Servers - VS, Windbg, And Other Tools Should Both Respect This Environment Variable: _NT_SYMBOL_PATH=SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Note That Symbol Servers Will Let The Debuggers Download Both The PE Files (DLLs And EXEs) And The PDB Files. Chrome Often Loads Third Party Libraries And Partial Symbols For Some Of These Are Also Public. For Example: AMD: Https://download.amd.com/dir/bin Nvidia: Https://driver-symbols.nvidia.com/ Intel: Https://software.intel.com/sites/downloads/symbols/ For Example, For Completeness, The Following Symbol Server Environment Variable Will Resolve All Of The Above Sources - But This Is More Than Is Normally Needed: _NT_SYMBOL_PATH=SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com;SRV\*C:\symbols\*https://download.amd.com/dir/bin;SRV\*C:\symbols\*https://driver-symbols.nvidia.com/;SRV\*C:\symbols\*https://software.intel.com/sites/downloads/symbols/ Source Indexing You Should Set Up Source Indexing In Your Debugger (.srcfix In Windbg, Tools-> Options-> Debugging-> General-> Enable Source Server Support In Visual Studio) So That The Correct Source Files Will Automatically Be Downloaded Based On Information In The Downloaded Symbols. Additionally, You Must Have Python In Your Path In Order For The Command That Fetches Source Files To Succeed; Launching The Debugger From The Same Environment As Where You Build Chromium Is An Easy Way To Ensure It's Present. This Is Highly Recommended When Debugging Released Google Chrome Builds Or Looking At Crash Dumps. Having The Correct Version Of The Source Files Automatically Show Up Saves Significant Time So You Should Definitely Set This. Multi-process Issues Chromium Can Be Challenging To Debug Because Of Its Multi-process Architecture. When You Select Run In The Debugger, Only The Main Browser Process Will Be Debugged. The Code That Actually Renders Web Pages (the Renderer) And The Plugins Will Be In Separate Processes That's Not (yet!) Being Debugged. The ProcessExplorer Tool Has A Process Tree View Where You Can See How These Processes Are Related. You Can Also Get The Process IDs Associated With Each Tab From The Chrome Task Manager (right-click On An Empty Area Of The Window Title Bar To Open). Automatically Attach To Child Processes There Are Two Visual Studio Extensions That Enable The Debugger To Automatically Attach To All Chrome Processes, So You Can Debug All Of Chrome At Once. Microsoft's Child Process Debugging Power Tool Is A Standalone Extension For This, And VsChromium Is Another Option That Bundles Many Other Additional Features. In Addition To Installing One Of These Extensions, You Must Run Visual Studio As Administrator, Or It Will Silently Fail To Attach To Some Of Chrome's Child Processes. Single-process Mode One Way To Debug Issues Is To Run Chromium In Single-process Mode. This Will Allow You To See The Entire State Of The Program Without Extra Work (although It Will Still Have Many Threads). To Use Single-process Mode, Add The Command-line Flag --single-process This Approach Isn't Perfect Because Some Problems Won't Manifest Themselves In This Mode And Some Features Don't Work And Worker Threads Are Still Spawned Into New Processes. Manually Attaching To A Child Process You Can Attach To The Running Child Processes With The Debugger. Select Tools > Attach To Process And Click The Chrome.exe Process You Want To Attach To. Before Attaching, Make Sure You Have Selected Only Native Code When Attaching To The Process This Is Done By Clicking Select... In The Attach To Process Window And Only Checking Native. If You Forget This, It May Attempt To Attach In "WebKit" Mode To Debug JavaScript, And You'll Get An Error Message "An Operation Is Not Legal In The Current State." You Can Now Debug The Two Processes As If They Were One. When You Are Debugging Multiple Processes, Open The Debug > Windows > Processes Window To Switch Between Them. Sometimes You Are Debugging Something That Only Happens On Startup, And Want To See The Child Process As Soon As It Starts. Use: --renderer-startup-dialog --no-sandbox You Have To Disable The Sandbox Or The Dialog Box Will Be Prohibited From Showing. When The Dialog Appears, Visit Tools > Attach To Process And Attach To The Process Showing The Renderer Startup Dialog. Now You're Debugging In The Renderer And Can Continue Execution By Pressing OK In The Dialog. Startup Dialogs Also Exist For Other Child Process Types: --gpu-startup-dialog, --ppapi-startup-dialog, --utility-startup-dialog, --plugin-startup-dialog (for NPAPI). For Utilities, You Can Add A Service Type --utility-startup-dialog=data_decoder.mojom.DataDecoderService. You Can Also Try The Vs-chromium Plug-in To Attach To The Right Processes. Semi-automatically Attaching The Debugger To Child Processes The Following Flags Cause Child Processes To Wait For 60 Seconds In A Busy Loop For A Debugger To Attach To The Process. Once Either Condition Is True, It Continues On; No Exception Is Thrown. --wait-for-debugger-children[=filter] The Filter, If Provided, Will Fire Only If It Matches The --type Parameter To The Process. Values Include Renderer, Plugin (for NPAPI), Ppapi, Gpu-process, And Utility. When Using This Option, It May Be Helpful To Limit The Number Of Renderer Processes Spawned, Using: --renderer-process-limit=1 Image File Execution Options Using Image File Execution Options (IFEO) Will Not Work Because CreateProcess() Returns The Handle To The Debugger Process Instead Of The Intended Child Process. There Are Also Issues With The Sandbox. Time Travel Debugging You Can Do Time Travel Debugging Using WinDbg Preview (must Be Installed From The Microsoft Store). This Lets You Execute A Program Forward And Backwards. After Capturing A Trace, You Can Set Breakpoints And Step Through Code As Normal, But Also Provides 'backwards' Commands (g-, T-, P-) So That You Can Go Back And Forth Through The Execution. It Is Especially Useful To Set Data Breakpoints (ba Command) And Reverse Continuing, So You Can See When A Certain Variable Was Last Changed To Its Current Value. Chromium Specifics: The Type Of Injection The Time Travel Tracer Needs To Perform Is Incompatible With The Chromium Sandbox. In Order To Record A Trace, You'll Need To Run With --no-sandbox. Chromium Cannot Run Elevated With Administrator Privileges, So The "Launch Executable (advance)" Option Won't Work, You'll Need To Attach After The Process Has Already Launched Via The Checkbox In The Bottom Right. If You Need To Record Startup-like Things, You'll Have To Use --{browser,gpu,renderer,utility}-startup-dialog, Then Attach (and Hope The Relevant Code Hasn't Executed Before That Point). JsDbg -- Data Structure Visualization You Can Install JsDbg As A Plugin For WinDbg Or Visual Studio. It Interactively Lets You Look At Data Structures (such As The DOM Tree, Accessibility Tree, Layout Object Tree, And Others) In A Web Browser As You Debug. See The JsDbg Site For Some Screen Shots And Usage Examples. This Also Works When Examining Memory Dumps (though Not Minidumps), And Also Works Together With Time Travel Debugging. Visual Studio Hints Debug Visualizers Chrome's Custom Debug Visualizers Should Be Added To The Pdb Files And Automatically Picked Up By Visual Studio. The Definitions Are In //tools/win/DebugVisualizers If You Need To Modify Them (the BUILD.gn File There Has Additional Instructions). Don't Step Into Trivial Functions The Debugger Can Be Configured To Automatically Not Step Into Functions Based On Regular Expression. Edit Default.natstepfilter In The Following Directory: For Visual Studio 2015: C:\Program Files (x86)\Microsoft Visual Studio 14.0\Common7\Packages\Debugger\Visualizers (for All Users) Or %USERPROFILE%\My Documents\Visual Studio 2015\Visualizers (for The Current User Only) For Visual Studio 2017 Pro: C:\Program Files (x86)\Microsoft Visual Studio\2017\Professional\Common7\Packages\Debugger\Visualizers (for All Users) Or %USERPROFILE%\My Documents\Visual Studio 2017\Visualizers (for The Current User Only) Add Regular Expressions Of Functions To Not Step Into. Remember To Regex-escape And XML-escape Them, E.g. < For < And \. For A Literal Dot. Example: Operator New NoStepInto Operator Delete NoStepInto Std::.* NoStepInto WTF::.*Ptr ::.* NoStepInto This File Is Read At Start Of A Debugging Session (F5), So You Don't Need To Restart Visual Studio After Changing It. More Info: Microsoft Email Thread V8 And Chromium V8 Supports Many Command-line Flags That Are Useful For Debugging. V8 Command-line Flags Can Be Set Via The Chromium Command-line Flag --js-flags; For Instance: Chrome.exe --js-flags="--trace_exception --heap_stats" Note That Some V8 Command-line Flags Exist Only In The Debug Build Of V8. For A List Of All V8 Flags Try: Chrome.exe --js-flags="--help" Graphics Debugging GPU Acceleration Of Rendering Can Be More Easily Debugged With Tools. See: Graphics Debugging In Visual Studio 2013 Graphical Debugging With NVIDIA NSight Debugging On Another Machine Sometimes It's Useful To Debug Installation And Execution On A Machine Other Than Your Primary Build Box. To Run The Installer On Said Other Machine, First Build The Mini_installer Target On Your Main Build Machine (e.g., Autoninja -C Out\Debug Mini_installer). Next, On The Debug Machine: Make The Build Machine's Build Volume Available On The Debug Machine Either By Mounting It Locally (e.g., Z:\) Or By Crafting A UNC Path To It (e.g., \\builder\src) Open Up A Command Prompt And Change To A Local Disk Run Src\tools\win\copy-installer.bat In The Remote Checkout By Way Of The Mount (e.g., Z:\PATHTOCHECKOUT\src\...) Or UNC Path (e.g., \\builder\src\...). This Will Copy The Installer, DLLs, And PDBs Into Your Debug Machine's C:\out Or C:\build (depending On If You're Rocking The Component=shared_library Build Or Not) Run C:\out\Debug\mini_installer.exe With The Flags Of Your Choice To Install Chrome. This Can Take Some Time, Especially On A Slow Machine. Watch The Task Manager And Wait Until Mini_installer.exe Exits Before Trying To Launch Chrome (by Way Of The Shortcut(s) Created By The Installer) For Extra Pleasure, Add C:\out\Debug To Your _NT_SYMBOL_PATH Environment Variable Consider Reading The Documentation At The Top Of Copy-installer.bat To See How You Can Run It. It Tries To Be Smart And Copy The Right Things, But You May Need To Be Explicit (e.g., "copy-installer.bat Out Debug"). It Is Safe To Re-run The Script To Copy Only Modified Files (after A Rebuild, For Example). You Can Also Use The Zip Action Of The Isolate Scripts (tools\mb\mb.py) To Package All The Files For A Target Into A Single Zip File, For Example: Python Tools\mb\mb.py Zip Out/Release Base_unittests Base_unittests.zip Finding All Memory Allocations It Is Possible To Use Heap Snapshots To Get Call Stacks On All Outstanding Allocations That Use The OS Heap. This Works Particularly Well If Heap Snapshots Are Started As Soon As The Chrome Browser Process Is Created, But Before It Starts Running. Details Can Be Found In This Batch File. However, With PartitionAlloc Everywhere Most Chromium Allocations No Longer Use The Windows Heap So This Will Only Find A Subset Of Allocations, Mostly From OS DLLs. Find Memory Leaks Note: As With Heap Snapshots The Utility Of UMDH Is Greatly Reduced Now Because PartitionAlloc Everywhere Has Mostly Replaced The Windows Heap. The Windows Heap Manager Has A Really Useful Debug Flag, Where It Can Be Asked To Capture And Store A Stack Trace With Every Allocation. The Tool To Scrape These Stack Traces Out Of Processes Is UMDH, Which Comes With WinDbg. UMDH Is Great. It Will Capture A Snapshot Of The Heap State As Many Times As You Like, And It'll Do It Fairly Quickly. You Then Run It Again Against Either A Single Snapshot, Or A Pair Of Snapshots, At Which Time It'll Symbolize The Stack Traces And Aggregate Usage Up To Unique Stack Traces. Turning On The User Stack Trace Database For Chrome.exe With Gflags.exe Makes It Run Unbearably Slowly; However, Turning On The User Stack Trace Database On For The Browser Alone Is Just Fine. While It's Possible To Turn On The User Stack Database With The "!gflag" Debugging Extension, It's Too Late To Do This By The Time The Initial Debugger Breakpoint Hits. The Only Reasonable Way To Do This Is To Launch GFlags.exe, Enable The User Stack Trace Database (per Image Below), Launch Chrome Under The Debugger. Set A Breakpont When Chrome.dll Loads With "sxe Ld Chrome.dll". Step Up, To Allow Chrome.dll To Initialize. Disable The Stack Trace Database In GFlags.exe. Continue Chrome, Optionally Detaching The Debugger. Image GFlags.exe Settings For User Mode Stack Trace Database. If You Then Ever Suffer A Browser Memory Leak, You Can Snarf A Dump Of The Process With Umdh -p: > Chrome-browser-leak-umdh-dump.txt Which Can Then Typically Be "trivially" Analyzed To Find The Culprit. Miscellaneous Note That By Default Application Verifier Only Works With Non-official Builds Of Chromium. To Use Application Verifier On Official Builds You Need To Add --disable-features=RendererCodeIntegrity To Avoid Sandbox Crashes In Renderer Processes. See Crbug.com/1004989 For Details. See Also This Page. Application Verifier Is A Free Tool From Microsoft (available As Part Of The Windows SDK) That Can Be Used To Flush Out Programming Errors. Starting With M68 Application Verifier Can Be Enabled For Chrome.exe Without Needing To Disable The Sandbox. After Adding Chrome.exe To The List Of Applications To Be Stressed You Need To Expand The List Of Basics Checks And Disable The Leak Checks. You May Also Need To Disable Handles And Locks Checks Depending On Your Graphics Driver And Specific Chrome Version, But The Eventual Goal Is To Have Chrome Run With Handles And Locks Checks Enabled. When Bugs Are Found Chrome Will Trigger A Breakpoint So Running All Chrome Processes Under A Debugger Is Recommended. Chrome Will Run Much More Slowly Because Application Verifier Puts Every Heap Allocation On A Separate Page. Note That With PartitionAlloc Everywhere Most Chromium Allocations Don't Actually Go Through The Windows Heap And Are Therefore Unaffected By Application Verifier. You Can Check The Undocumented 'Cuzz' Checkbox In Application Verifier To Get The Windows Thread Scheduler To Add Some Extra Randomness In Order To Help Expose Race Conditions In Your Code. To Put A Breakpoint On CreateFile(), Add This Break Point: {,,kernel32.dll}_CreateFileW@28 {,,kernel32.dll} Specifies The DLL (context Operator). _ Prefix Means Extern "C". @28 Postfix Means _stdcall With The Stack Pop At The End Of The Function. I.e. The Number Of Arguments In BYTES. You Can Use DebugView From SysInternals Or Sawbuck To View LOG() Messages That Normally Go To Stderr On POSIX.” Subjects and Themes:
Edition Identifiers:
- Internet Archive ID: debugging-chromium-on-windows
Downloads Information:
The book is available for download in "texts" format, the size of the file-s is: 0.33 Mbs, the file-s for this book were downloaded 2 times, the file-s went public at Fri Jul 11 2025.
Available formats:
Archive BitTorrent - Metadata - Text -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find The Chromium Logo The Chromium Projects Home Chromium ChromiumOS Quick Links Report Bugs Discuss Other Sites Chromium Blog Google Chrome Extensions Except As Otherwise Noted, The Content Of This Page Is Licensed Under A Creative Commons Attribution 2.5 License, And Examples Are Licensed Under The BSD License. Privacy Edit This Page For Developers > How-Tos > Debugging Chromium On Windows First See Get The Code For Checkout And Build Instructions. Getting Started You Can Use Visual Studio's Built-in Debugger Or WinDBG To Debug Chromium. You Don't Need To Use The IDE To Build In Order To Use The Debugger: Autoninja Is Used To Build Chromium And Most Developers Invoke It From A Command Prompt, And Then Open The IDE For Debugging As Necessary. To Start Debugging An Already-built Executable With Visual Studio Just Launch Visual Studio (2019 Or Higher) And Select File-> Open-> Project/Solution (Ctrl+Shift+O) And Select The Executable Of Interest. This Will Create A Solution With That Executable As The 'project'. You Can Then Launch The Debugger With F5 Or F11 Or From The Debug Menu. If You Right-click On The Executable In Solution Explorer And Select Properties Then You Can Edit Things Such As The Executable Path, Command-line Arguments, And Working Directory. You Can Add Additional Executables To The Solution By Using File-> Add-> Existing Project And Selecting Another Already-built Executable. You Can Select Which One To Debug By Right-clicking On One Of Them In Solution Explorer And Selecting Set As Startup Project. When Your Solution File Is Customized To Your Taste You Can Save It To A Directory Such As Out\solutions. Saving It There Helps Ensure That Relative Paths To Source Files, Printed From Build Commands, Will Correctly Identify The Source Files. The Tools Menu Can Be Used To Add Commands To Do Things Like Invoke Autoninja To Build Chrome, Compile The Selected Source File, Or Other Things. Visual Studio 2017 Is Not Recommended For Debugging Of Chromium - Use A Newer Version For Best Performance And Stability. Symbol_level=2 Is The Default On Windows And Gives Full Debugging Information With Types, Locals, Globals, Function Names, And Source/line Information. Symbol_level=1 Creates Smaller PDBs With Just Function Names, And Source/line Information - Source-level Debugging Is Still Supported (new From June 2019), But Local Variables And Type Information Are Missing. Symbol_level=0 Gives Extremely Limited Debugging Abilities, Mostly Just Viewing Call Stacks When Chromium Crashes. Browsing Source Code If You Use A Solution File Generated By Gn (gn Gen --ide=vs) Then Intellisense May Help You Navigate The Code. If This Doesn't Work Or If You Use A Solution Created As Above Then You May Want To Install VsChromium To Help Navigate The Code, As Well As Using Https://source.chromium.org. Profiles It's A Good Idea To Use A Different Chrome Profile For Your Debugging. If You Are Debugging Google Chrome Branded Builds, Or Use A Chromium Build As Your Primary Browser, The Profiles Can Collide So You Can't Run Both At Once, And Your Stable Browser Might See Profile Versions From The Future (Google Chrome And Chromium Use Different Profile Directories By Default So Won't Collide). Use The Command-line Option: --user-data-dir=C:\tmp\my_debug_profile (replace The Path As Necessary) Using The IDE, Go To The Debugging Tab Of The Properties Of The Chrome Project, And Set The Command Arguments. Chrome Debug Log Enable Chrome Debug Logging To A File By Passing --enable-logging --v=1 Command-line Flags At Startup. Debug Builds Place The Chrome_debug.log File In The Out\Debug Directory. Release Builds Place The File In The Top Level Of The User Data Chromium App Directory, Which Is OS-version-dependent. For More Information, See Logging And User Data Directory Details. Symbol Server If You Are Debugging Official Google Chrome Release Builds, Use The Symbol Server: Https://chromium-browser-symsrv.commondatastorage.googleapis.com In Visual Studio, This Goes In Tools > Options Under Debugging > Symbols. You Should Set Up A Local Cache In A Empty Directory On Your Computer. In Windbg You Can Add This To Your Symbol Server Search Path With The Command Below, Where C:\symbols Is A Local Cache Directory: .sympath+ SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Alternately, You Can Set The _NT_SYMBOL_PATH Environment Variable To Include Both The Microsoft And Google Symbol Servers - VS, Windbg, And Other Tools Should Both Respect This Environment Variable: _NT_SYMBOL_PATH=SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Note That Symbol Servers Will Let The Debuggers Download Both The PE Files (DLLs And EXEs) And The PDB Files. Chrome Often Loads Third Party Libraries And Partial Symbols For Some Of These Are Also Public. For Example: AMD: Https://download.amd.com/dir/bin Nvidia: Https://driver-symbols.nvidia.com/ Intel: Https://software.intel.com/sites/downloads/symbols/ For Example, For Completeness, The Following Symbol Server Environment Variable Will Resolve All Of The Above Sources - But This Is More Than Is Normally Needed: _NT_SYMBOL_PATH=SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com;SRV\*C:\symbols\*https://download.amd.com/dir/bin;SRV\*C:\symbols\*https://driver-symbols.nvidia.com/;SRV\*C:\symbols\*https://software.intel.com/sites/downloads/symbols/ Source Indexing You Should Set Up Source Indexing In Your Debugger (.srcfix In Windbg, Tools-> Options-> Debugging-> General-> Enable Source Server Support In Visual Studio) So That The Correct Source Files Will Automatically Be Downloaded Based On Information In The Downloaded Symbols. Additionally, You Must Have Python In Your Path In Order For The Command That Fetches Source Files To Succeed; Launching The Debugger From The Same Environment As Where You Build Chromium Is An Easy Way To Ensure It's Present. This Is Highly Recommended When Debugging Released Google Chrome Builds Or Looking At Crash Dumps. Having The Correct Version Of The Source Files Automatically Show Up Saves Significant Time So You Should Definitely Set This. Multi-process Issues Chromium Can Be Challenging To Debug Because Of Its Multi-process Architecture. When You Select Run In The Debugger, Only The Main Browser Process Will Be Debugged. The Code That Actually Renders Web Pages (the Renderer) And The Plugins Will Be In Separate Processes That's Not (yet!) Being Debugged. The ProcessExplorer Tool Has A Process Tree View Where You Can See How These Processes Are Related. You Can Also Get The Process IDs Associated With Each Tab From The Chrome Task Manager (right-click On An Empty Area Of The Window Title Bar To Open). Automatically Attach To Child Processes There Are Two Visual Studio Extensions That Enable The Debugger To Automatically Attach To All Chrome Processes, So You Can Debug All Of Chrome At Once. Microsoft's Child Process Debugging Power Tool Is A Standalone Extension For This, And VsChromium Is Another Option That Bundles Many Other Additional Features. In Addition To Installing One Of These Extensions, You Must Run Visual Studio As Administrator, Or It Will Silently Fail To Attach To Some Of Chrome's Child Processes. Single-process Mode One Way To Debug Issues Is To Run Chromium In Single-process Mode. This Will Allow You To See The Entire State Of The Program Without Extra Work (although It Will Still Have Many Threads). To Use Single-process Mode, Add The Command-line Flag --single-process This Approach Isn't Perfect Because Some Problems Won't Manifest Themselves In This Mode And Some Features Don't Work And Worker Threads Are Still Spawned Into New Processes. Manually Attaching To A Child Process You Can Attach To The Running Child Processes With The Debugger. Select Tools > Attach To Process And Click The Chrome.exe Process You Want To Attach To. Before Attaching, Make Sure You Have Selected Only Native Code When Attaching To The Process This Is Done By Clicking Select... In The Attach To Process Window And Only Checking Native. If You Forget This, It May Attempt To Attach In "WebKit" Mode To Debug JavaScript, And You'll Get An Error Message "An Operation Is Not Legal In The Current State." You Can Now Debug The Two Processes As If They Were One. When You Are Debugging Multiple Processes, Open The Debug > Windows > Processes Window To Switch Between Them. Sometimes You Are Debugging Something That Only Happens On Startup, And Want To See The Child Process As Soon As It Starts. Use: --renderer-startup-dialog --no-sandbox You Have To Disable The Sandbox Or The Dialog Box Will Be Prohibited From Showing. When The Dialog Appears, Visit Tools > Attach To Process And Attach To The Process Showing The Renderer Startup Dialog. Now You're Debugging In The Renderer And Can Continue Execution By Pressing OK In The Dialog. Startup Dialogs Also Exist For Other Child Process Types: --gpu-startup-dialog, --ppapi-startup-dialog, --utility-startup-dialog, --plugin-startup-dialog (for NPAPI). For Utilities, You Can Add A Service Type --utility-startup-dialog=data_decoder.mojom.DataDecoderService. You Can Also Try The Vs-chromium Plug-in To Attach To The Right Processes. Semi-automatically Attaching The Debugger To Child Processes The Following Flags Cause Child Processes To Wait For 60 Seconds In A Busy Loop For A Debugger To Attach To The Process. Once Either Condition Is True, It Continues On; No Exception Is Thrown. --wait-for-debugger-children[=filter] The Filter, If Provided, Will Fire Only If It Matches The --type Parameter To The Process. Values Include Renderer, Plugin (for NPAPI), Ppapi, Gpu-process, And Utility. When Using This Option, It May Be Helpful To Limit The Number Of Renderer Processes Spawned, Using: --renderer-process-limit=1 Image File Execution Options Using Image File Execution Options (IFEO) Will Not Work Because CreateProcess() Returns The Handle To The Debugger Process Instead Of The Intended Child Process. There Are Also Issues With The Sandbox. Time Travel Debugging You Can Do Time Travel Debugging Using WinDbg Preview (must Be Installed From The Microsoft Store). This Lets You Execute A Program Forward And Backwards. After Capturing A Trace, You Can Set Breakpoints And Step Through Code As Normal, But Also Provides 'backwards' Commands (g-, T-, P-) So That You Can Go Back And Forth Through The Execution. It Is Especially Useful To Set Data Breakpoints (ba Command) And Reverse Continuing, So You Can See When A Certain Variable Was Last Changed To Its Current Value. Chromium Specifics: The Type Of Injection The Time Travel Tracer Needs To Perform Is Incompatible With The Chromium Sandbox. In Order To Record A Trace, You'll Need To Run With --no-sandbox. Chromium Cannot Run Elevated With Administrator Privileges, So The "Launch Executable (advance)" Option Won't Work, You'll Need To Attach After The Process Has Already Launched Via The Checkbox In The Bottom Right. If You Need To Record Startup-like Things, You'll Have To Use --{browser,gpu,renderer,utility}-startup-dialog, Then Attach (and Hope The Relevant Code Hasn't Executed Before That Point). JsDbg -- Data Structure Visualization You Can Install JsDbg As A Plugin For WinDbg Or Visual Studio. It Interactively Lets You Look At Data Structures (such As The DOM Tree, Accessibility Tree, Layout Object Tree, And Others) In A Web Browser As You Debug. See The JsDbg Site For Some Screen Shots And Usage Examples. This Also Works When Examining Memory Dumps (though Not Minidumps), And Also Works Together With Time Travel Debugging. Visual Studio Hints Debug Visualizers Chrome's Custom Debug Visualizers Should Be Added To The Pdb Files And Automatically Picked Up By Visual Studio. The Definitions Are In //tools/win/DebugVisualizers If You Need To Modify Them (the BUILD.gn File There Has Additional Instructions). Don't Step Into Trivial Functions The Debugger Can Be Configured To Automatically Not Step Into Functions Based On Regular Expression. Edit Default.natstepfilter In The Following Directory: For Visual Studio 2015: C:\Program Files (x86)\Microsoft Visual Studio 14.0\Common7\Packages\Debugger\Visualizers (for All Users) Or %USERPROFILE%\My Documents\Visual Studio 2015\Visualizers (for The Current User Only) For Visual Studio 2017 Pro: C:\Program Files (x86)\Microsoft Visual Studio\2017\Professional\Common7\Packages\Debugger\Visualizers (for All Users) Or %USERPROFILE%\My Documents\Visual Studio 2017\Visualizers (for The Current User Only) Add Regular Expressions Of Functions To Not Step Into. Remember To Regex-escape And XML-escape Them, E.g. < For < And \. For A Literal Dot. Example: Operator New NoStepInto Operator Delete NoStepInto Std::.* NoStepInto WTF::.*Ptr ::.* NoStepInto This File Is Read At Start Of A Debugging Session (F5), So You Don't Need To Restart Visual Studio After Changing It. More Info: Microsoft Email Thread V8 And Chromium V8 Supports Many Command-line Flags That Are Useful For Debugging. V8 Command-line Flags Can Be Set Via The Chromium Command-line Flag --js-flags; For Instance: Chrome.exe --js-flags="--trace_exception --heap_stats" Note That Some V8 Command-line Flags Exist Only In The Debug Build Of V8. For A List Of All V8 Flags Try: Chrome.exe --js-flags="--help" Graphics Debugging GPU Acceleration Of Rendering Can Be More Easily Debugged With Tools. See: Graphics Debugging In Visual Studio 2013 Graphical Debugging With NVIDIA NSight Debugging On Another Machine Sometimes It's Useful To Debug Installation And Execution On A Machine Other Than Your Primary Build Box. To Run The Installer On Said Other Machine, First Build The Mini_installer Target On Your Main Build Machine (e.g., Autoninja -C Out\Debug Mini_installer). Next, On The Debug Machine: Make The Build Machine's Build Volume Available On The Debug Machine Either By Mounting It Locally (e.g., Z:\) Or By Crafting A UNC Path To It (e.g., \\builder\src) Open Up A Command Prompt And Change To A Local Disk Run Src\tools\win\copy-installer.bat In The Remote Checkout By Way Of The Mount (e.g., Z:\PATHTOCHECKOUT\src\...) Or UNC Path (e.g., \\builder\src\...). This Will Copy The Installer, DLLs, And PDBs Into Your Debug Machine's C:\out Or C:\build (depending On If You're Rocking The Component=shared_library Build Or Not) Run C:\out\Debug\mini_installer.exe With The Flags Of Your Choice To Install Chrome. This Can Take Some Time, Especially On A Slow Machine. Watch The Task Manager And Wait Until Mini_installer.exe Exits Before Trying To Launch Chrome (by Way Of The Shortcut(s) Created By The Installer) For Extra Pleasure, Add C:\out\Debug To Your _NT_SYMBOL_PATH Environment Variable Consider Reading The Documentation At The Top Of Copy-installer.bat To See How You Can Run It. It Tries To Be Smart And Copy The Right Things, But You May Need To Be Explicit (e.g., "copy-installer.bat Out Debug"). It Is Safe To Re-run The Script To Copy Only Modified Files (after A Rebuild, For Example). You Can Also Use The Zip Action Of The Isolate Scripts (tools\mb\mb.py) To Package All The Files For A Target Into A Single Zip File, For Example: Python Tools\mb\mb.py Zip Out/Release Base_unittests Base_unittests.zip Finding All Memory Allocations It Is Possible To Use Heap Snapshots To Get Call Stacks On All Outstanding Allocations That Use The OS Heap. This Works Particularly Well If Heap Snapshots Are Started As Soon As The Chrome Browser Process Is Created, But Before It Starts Running. Details Can Be Found In This Batch File. However, With PartitionAlloc Everywhere Most Chromium Allocations No Longer Use The Windows Heap So This Will Only Find A Subset Of Allocations, Mostly From OS DLLs. Find Memory Leaks Note: As With Heap Snapshots The Utility Of UMDH Is Greatly Reduced Now Because PartitionAlloc Everywhere Has Mostly Replaced The Windows Heap. The Windows Heap Manager Has A Really Useful Debug Flag, Where It Can Be Asked To Capture And Store A Stack Trace With Every Allocation. The Tool To Scrape These Stack Traces Out Of Processes Is UMDH, Which Comes With WinDbg. UMDH Is Great. It Will Capture A Snapshot Of The Heap State As Many Times As You Like, And It'll Do It Fairly Quickly. You Then Run It Again Against Either A Single Snapshot, Or A Pair Of Snapshots, At Which Time It'll Symbolize The Stack Traces And Aggregate Usage Up To Unique Stack Traces. Turning On The User Stack Trace Database For Chrome.exe With Gflags.exe Makes It Run Unbearably Slowly; However, Turning On The User Stack Trace Database On For The Browser Alone Is Just Fine. While It's Possible To Turn On The User Stack Database With The "!gflag" Debugging Extension, It's Too Late To Do This By The Time The Initial Debugger Breakpoint Hits. The Only Reasonable Way To Do This Is To Launch GFlags.exe, Enable The User Stack Trace Database (per Image Below), Launch Chrome Under The Debugger. Set A Breakpont When Chrome.dll Loads With "sxe Ld Chrome.dll". Step Up, To Allow Chrome.dll To Initialize. Disable The Stack Trace Database In GFlags.exe. Continue Chrome, Optionally Detaching The Debugger. Image GFlags.exe Settings For User Mode Stack Trace Database. If You Then Ever Suffer A Browser Memory Leak, You Can Snarf A Dump Of The Process With Umdh -p: > Chrome-browser-leak-umdh-dump.txt Which Can Then Typically Be "trivially" Analyzed To Find The Culprit. Miscellaneous Note That By Default Application Verifier Only Works With Non-official Builds Of Chromium. To Use Application Verifier On Official Builds You Need To Add --disable-features=RendererCodeIntegrity To Avoid Sandbox Crashes In Renderer Processes. See Crbug.com/1004989 For Details. See Also This Page. Application Verifier Is A Free Tool From Microsoft (available As Part Of The Windows SDK) That Can Be Used To Flush Out Programming Errors. Starting With M68 Application Verifier Can Be Enabled For Chrome.exe Without Needing To Disable The Sandbox. After Adding Chrome.exe To The List Of Applications To Be Stressed You Need To Expand The List Of Basics Checks And Disable The Leak Checks. You May Also Need To Disable Handles And Locks Checks Depending On Your Graphics Driver And Specific Chrome Version, But The Eventual Goal Is To Have Chrome Run With Handles And Locks Checks Enabled. When Bugs Are Found Chrome Will Trigger A Breakpoint So Running All Chrome Processes Under A Debugger Is Recommended. Chrome Will Run Much More Slowly Because Application Verifier Puts Every Heap Allocation On A Separate Page. Note That With PartitionAlloc Everywhere Most Chromium Allocations Don't Actually Go Through The Windows Heap And Are Therefore Unaffected By Application Verifier. You Can Check The Undocumented 'Cuzz' Checkbox In Application Verifier To Get The Windows Thread Scheduler To Add Some Extra Randomness In Order To Help Expose Race Conditions In Your Code. To Put A Breakpoint On CreateFile(), Add This Break Point: {,,kernel32.dll}_CreateFileW@28 {,,kernel32.dll} Specifies The DLL (context Operator). _ Prefix Means Extern "C". @28 Postfix Means _stdcall With The Stack Pop At The End Of The Function. I.e. The Number Of Arguments In BYTES. You Can Use DebugView From SysInternals Or Sawbuck To View LOG() Messages That Normally Go To Stderr On POSIX. at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Consider The Source Live At Putnam Den On 2015-09-12
By Consider the Source
The Chromium Projects Home Chromium ChromiumOS Quick links Report bugs Discuss Other sites Chromium Blog Google Chrome Extensions Except as otherwise noted , the content of this page is licensed under a Creative Commons Attribution 2.5 license , and examples are licensed under the BSD License . Privacy Edit this page For Developers > How-Tos > Debugging Chromium on Windows First see get the code for checkout and build instructions. Getting started You can use Visual Studio's built-in debugger or WinDBG to debug Chromium. You don't need to use the IDE to build in order to use the debugger: autoninja is used to build Chromium and most developers invoke it from a command prompt, and then open the IDE for debugging as necessary. To start debugging an already-built executable with Visual Studio just launch Visual Studio (2019 or higher) and select File-> Open-> Project/Solution (Ctrl+Shift+O) and select the executable of interest. This will create a solution with that executable as the 'project'. You can then launch the debugger with F5 or F11 or from the Debug menu. If you right-click on the executable in Solution Explorer and select properties then you can edit things such as the executable path, command-line arguments, and working directory. You can add additional executables to the solution by using File-> Add-> Existing Project and selecting another already-built executable. You can select which one to debug by right-clicking on one of them in Solution Explorer and selecting Set as Startup Project. When your solution file is customized to your taste you can save it to a directory such as out\solutions. Saving it there helps ensure that relative paths to source files, printed from build commands, will correctly identify the source files. The Tools menu can be used to add commands to do things like invoke autoninja to build Chrome, compile the selected source file, or other things. Visual Studio 2017 is not recommended for debugging of Chromium - use a newer version for best performance and stability. symbol_level=2 is the default on Windows and gives full debugging information with types, locals, globals, function names, and source/line information. symbol_level=1 creates smaller PDBs with just function names, and source/line information - source-level debugging is still supported (new from June 2019), but local variables and type information are missing. symbol_level=0 gives extremely limited debugging abilities, mostly just viewing call stacks when Chromium crashes. Browsing source code If you use a solution file generated by gn ( gn gen --ide=vs ) then Intellisense may help you navigate the code. If this doesn't work or if you use a solution created as above then you may want to install VsChromium to help navigate the code, as well as using https://source.chromium.org . Profiles It's a good idea to use a different Chrome profile for your debugging. If you are debugging Google Chrome branded builds, or use a Chromium build as your primary browser, the profiles can collide so you can't run both at once, and your stable browser might see profile versions from the future (Google Chrome and Chromium use different profile directories by default so won't collide). Use the command-line option: --user-data-dir =C:\tmp\my_debug_profile (replace the path as necessary) Using the IDE, go to the Debugging tab of the properties of the chrome project, and set the Command Arguments. Chrome debug log Enable Chrome debug logging to a file by passing --enable-logging --v=1 command-line flags at startup. Debug builds place the chrome_debug.log file in the out\Debug directory. Release builds place the file in the top level of the user data Chromium app directory, which is OS-version-dependent. For more information, see logging and user data directory details. Symbol server If you are debugging official Google Chrome release builds, use the symbol server: https://chromium-browser-symsrv.commondatastorage.googleapis.com In Visual Studio, this goes in Tools > Options under Debugging > Symbols . You should set up a local cache in a empty directory on your computer. In windbg you can add this to your symbol server search path with the command below, where C:\symbols is a local cache directory: .sympath+ SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Alternately, You can set the _NT_SYMBOL_PATH environment variable to include both the Microsoft and Google symbol servers - VS, windbg, and other tools should both respect this environment variable: _NT_SYMBOL_PATH =SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols ;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com Note that symbol servers will let the debuggers download both the PE files (DLLs and EXEs) and the PDB files. Chrome often loads third party libraries and partial symbols for some of these are also public. For example: AMD : https://download.amd.com/dir/bin Nvidia : https://driver-symbols.nvidia.com/ Intel : https://software.intel.com/sites/downloads/symbols/ For example, for completeness, the following symbol server environment variable will resolve all of the above sources - but this is more than is normally needed: _NT_SYMBOL_PATH=SRV\*C:\symbols\*https://msdl.microsoft.com/download/symbols;SRV\*C:\symbols\*https://chromium-browser-symsrv.commondatastorage.googleapis.com;SRV\*C:\symbols\*https://download.amd.com/dir/bin;SRV\*C:\symbols\*https://driver-symbols.nvidia.com/;SRV\*C:\symbols\*https://software.intel.com/sites/downloads/symbols/ Source indexing You should set up source indexing in your debugger ( .srcfix in windbg, Tools-> Options-> Debugging-> General-> Enable source server support in Visual Studio) so that the correct source files will automatically be downloaded based on information in the downloaded symbols. Additionally, you must have python in your path in order for the command that fetches source files to succeed; launching the debugger from the same environment as where you build Chromium is an easy way to ensure it's present. This is highly recommended when debugging released Google Chrome builds or looking at crash dumps. Having the correct version of the source files automatically show up saves significant time so you should definitely set this. Multi-process issues Chromium can be challenging to debug because of its multi-process architecture . When you select Run in the debugger, only the main browser process will be debugged. The code that actually renders web pages (the Renderer) and the plugins will be in separate processes that's not (yet!) being debugged. The ProcessExplorer tool has a process tree view where you can see how these processes are related. You can also get the process IDs associated with each tab from the Chrome Task Manager (right-click on an empty area of the window title bar to open). Automatically attach to child processes There are two Visual Studio extensions that enable the debugger to automatically attach to all Chrome processes, so you can debug all of Chrome at once. Microsoft's Child Process Debugging Power Tool is a standalone extension for this, and VsChromium is another option that bundles many other additional features. In addition to installing one of these extensions, you must run Visual Studio as Administrator, or it will silently fail to attach to some of Chrome's child processes. Single-process mode One way to debug issues is to run Chromium in single-process mode. This will allow you to see the entire state of the program without extra work (although it will still have many threads). To use single-process mode, add the command-line flag --single-process This approach isn't perfect because some problems won't manifest themselves in this mode and some features don't work and worker threads are still spawned into new processes. Manually attaching to a child process You can attach to the running child processes with the debugger. Select Tools > Attach to Process and click the chrome.exe process you want to attach to. Before attaching, make sure you have selected only Native code when attaching to the process This is done by clicking Select... in the Attach to Process window and only checking Native. If you forget this, it may attempt to attach in "WebKit" mode to debug JavaScript, and you'll get an error message "An operation is not legal in the current state." You can now debug the two processes as if they were one. When you are debugging multiple processes, open the Debug > Windows > Processes window to switch between them. Sometimes you are debugging something that only happens on startup, and want to see the child process as soon as it starts. Use: --renderer-startup-dialog --no-sandbox You have to disable the sandbox or the dialog box will be prohibited from showing. When the dialog appears, visit Tools > Attach to Process and attach to the process showing the Renderer startup dialog. Now you're debugging in the renderer and can continue execution by pressing OK in the dialog. Startup dialogs also exist for other child process types: --gpu-startup-dialog , --ppapi-startup-dialog , --utility-startup-dialog , --plugin-startup-dialog (for NPAPI). For utilities, you can add a service type --utility-startup-dialog=data_decoder.mojom.DataDecoderService . You can also try the vs-chromium plug-in to attach to the right processes. Semi-automatically attaching the debugger to child processes The following flags cause child processes to wait for 60 seconds in a busy loop for a debugger to attach to the process. Once either condition is true, it continues on; no exception is thrown. --wait-for-debugger-children [=filter] The filter, if provided, will fire only if it matches the --type parameter to the process. Values include renderer , plugin (for NPAPI), ppapi , gpu-process , and utility . When using this option, it may be helpful to limit the number of renderer processes spawned, using: --renderer-process-limit = 1 Image File Execution Options Using Image File Execution Options (IFEO) will not work because CreateProcess() returns the handle to the debugger process instead of the intended child process. There are also issues with the sandbox. Time travel debugging You can do time travel debugging using WinDbg Preview (must be installed from the Microsoft Store). This lets you execute a program forward and backwards. After capturing a trace, you can set breakpoints and step through code as normal, but also provides 'backwards' commands (g-, t-, p-) so that you can go back and forth through the execution. It is especially useful to set data breakpoints ( ba command ) and reverse continuing, so you can see when a certain variable was last changed to its current value. Chromium specifics: The type of injection the time travel tracer needs to perform is incompatible with the Chromium sandbox. In order to record a trace, you'll need to run with --no-sandbox . Chromium cannot run elevated with Administrator privileges, so the "Launch executable (advance)" option won't work, you'll need to attach after the process has already launched via the checkbox in the bottom right. If you need to record startup-like things, you'll have to use --{browser,gpu,renderer,utility}-startup-dialog, then attach (and hope the relevant code hasn't executed before that point). JsDbg -- data structure visualization You can install JsDbg as a plugin for WinDbg or Visual Studio . It interactively lets you look at data structures (such as the DOM tree, Accessibility tree, layout object tree, and others) in a web browser as you debug. See the JsDbg site for some screen shots and usage examples. This also works when examining memory dumps (though not minidumps), and also works together with time travel debugging. Visual Studio hints Debug visualizers Chrome's custom debug visualizers should be added to the pdb files and automatically picked up by Visual Studio. The definitions are in //tools/win/DebugVisualizers if you need to modify them (the BUILD.gn file there has additional instructions). Don't step into trivial functions The debugger can be configured to automatically not step into functions based on regular expression. Edit default.natstepfilter in the following directory: For Visual Studio 2015: C:\Program Files (x86)\Microsoft Visual Studio 14.0\Common7\Packages\Debugger\Visualizers (for all users) or %USERPROFILE%\My Documents\Visual Studio 2015\Visualizers (for the current user only) For Visual Studio 2017 Pro: C:\Program Files (x86)\Microsoft Visual Studio\2017\Professional\Common7\Packages\Debugger\Visualizers (for all users) or %USERPROFILE%\My Documents\Visual Studio 2017\Visualizers (for the current user only) Add regular expressions of functions to not step into. Remember to regex-escape and XML-escape them, e.g. < for < and \. for a literal dot. Example: < Function > < Name > operator new </ Name > < Action > NoStepInto </ Action > </ Function > < Function > < Name > operator delete </ Name > < Action > NoStepInto </ Action > </ Function > <!-- Skip everything in std --> < Function > < Name > std::.* </ Name > < Action > NoStepInto </ Action > </ Function > <!-- all methods on WebKit OwnPtr and variants, ... WTF::*Ptr<*>::* --> < Function > < Name > WTF::.*Ptr<.*>::.* </ Name > < Action > NoStepInto </ Action > </ Function > This file is read at start of a debugging session (F5), so you don't need to restart Visual Studio after changing it. More info: Microsoft email thread V8 and Chromium V8 supports many command-line flags that are useful for debugging. V8 command-line flags can be set via the Chromium command-line flag --js-flags; for instance: chrome.exe --js-flags= "--trace_exception --heap_stats" Note that some V8 command-line flags exist only in the debug build of V8. For a list of all V8 flags try: chrome.exe --js-flags= "--help" Graphics debugging GPU Acceleration of rendering can be more easily debugged with tools. See: Graphics Debugging in Visual Studio 2013 Graphical debugging with NVIDIA NSight Debugging on another machine Sometimes it's useful to debug installation and execution on a machine other than your primary build box. To run the installer on said other machine, first build the mini_installer target on your main build machine (e.g., autoninja -C out\Debug mini_installer). Next, on the debug machine: Make the build machine's build volume available on the debug machine either by mounting it locally (e.g., Z:\) or by crafting a UNC path to it (e.g., \\builder\src) Open up a command prompt and change to a local disk Run src\tools\win\ copy-installer.bat in the remote checkout by way of the mount (e.g., Z:\PATHTOCHECKOUT\src\...) or UNC path (e.g., \\builder\src\...). This will copy the installer, DLLs, and PDBs into your debug machine's C:\out or C:\build (depending on if you're rocking the component=shared_library build or not) Run C:\out\Debug\mini_installer.exe with the flags of your choice to install Chrome. This can take some time, especially on a slow machine. Watch the Task Manager and wait until mini_installer.exe exits before trying to launch Chrome (by way of the shortcut(s) created by the installer) For extra pleasure, add C:\out\Debug to your _NT_SYMBOL_PATH environment variable Consider reading the documentation at the top of copy-installer.bat to see how you can run it. It tries to be smart and copy the right things, but you may need to be explicit (e.g., "copy-installer.bat out Debug"). It is safe to re-run the script to copy only modified files (after a rebuild, for example). You can also use the zip action of the isolate scripts (tools\mb\mb.py) to package all the files for a target into a single zip file, for example: python tools\mb\mb.py zip out/Release base_unittests base_unittests. zip Finding all memory allocations It is possible to use Heap Snapshots to get call stacks on all outstanding allocations that use the OS heap. This works particularly well if heap snapshots are started as soon as the Chrome browser process is created, but before it starts running. Details can be found in this batch file . However, with PartitionAlloc Everywhere most Chromium allocations no longer use the Windows heap so this will only find a subset of allocations, mostly from OS DLLs. Find memory leaks Note: as with Heap Snapshots the utility of UMDH is greatly reduced now because PartitionAlloc Everywhere has mostly replaced the Windows heap. The Windows heap manager has a really useful debug flag, where it can be asked to capture and store a stack trace with every allocation. The tool to scrape these stack traces out of processes is UMDH, which comes with WinDbg . UMDH is great. It will capture a snapshot of the heap state as many times as you like, and it'll do it fairly quickly. You then run it again against either a single snapshot, or a pair of snapshots, at which time it'll symbolize the stack traces and aggregate usage up to unique stack traces. Turning on the user stack trace database for chrome.exe with gflags.exe makes it run unbearably slowly; however, turning on the user stack trace database on for the browser alone is just fine. While it's possible to turn on the user stack database with the "!gflag" debugging extension, it's too late to do this by the time the initial debugger breakpoint hits. The only reasonable way to do this is to Launch GFlags.exe, Enable the user stack trace database (per image below), Launch Chrome under the debugger. Set a breakpont when chrome.dll loads with "sxe ld chrome.dll". Step up, to allow Chrome.dll to initialize. Disable the stack trace database in GFlags.exe. Continue chrome, optionally detaching the debugger. GFlags.exe settings for user mode stack trace database. If you then ever suffer a browser memory leak, you can snarf a dump of the process with umdh - p :<my browser pid> > chrome-browser-leak-umdh-dump.txt which can then typically be "trivially" analyzed to find the culprit. Miscellaneous Note that by default Application Verifier only works with non-official builds of Chromium. To use Application Verifier on official builds you need to add --disable-features=RendererCodeIntegrity to avoid sandbox crashes in renderer processes. See crbug.com/1004989 for details. See also this page . Application Verifier is a free tool from Microsoft (available as part of the Windows SDK) that can be used to flush out programming errors. Starting with M68 Application Verifier can be enabled for chrome.exe without needing to disable the sandbox. After adding chrome.exe to the list of applications to be stressed you need to expand the list of Basics checks and disable the Leak checks. You may also need to disable Handles and Locks checks depending on your graphics driver and specific Chrome version, but the eventual goal is to have Chrome run with Handles and Locks checks enabled. When bugs are found Chrome will trigger a breakpoint so running all Chrome processes under a debugger is recommended. Chrome will run much more slowly because Application Verifier puts every heap allocation on a separate page. Note that with PartitionAlloc Everywhere most Chromium allocations don't actually go through the Windows heap and are therefore unaffected by Application Verifier. You can check the undocumented 'Cuzz' checkbox in Application Verifier to get the Windows thread scheduler to add some extra randomness in order to help expose race conditions in your code. To put a breakpoint on CreateFile(), add this break point: {,,kernel32.dll}_CreateFileW@28 {,,kernel32.dll} specifies the DLL (context operator). _ prefix means extern "C". @28 postfix means _stdcall with the stack pop at the end of the function. i.e. the number of arguments in BYTES. You can use DebugView from SysInternals or sawbuck to view LOG() messages that normally go to stderr on POSIX.
“Consider The Source Live At Putnam Den On 2015-09-12” Metadata:
- Title: ➤ Consider The Source Live At Putnam Den On 2015-09-12
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2015-09-12.flac16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 718.97 Mbs, the file-s for this book were downloaded 296 times, the file-s went public at Fri Sep 18 2015.
Available formats:
Archive BitTorrent - Columbia Peaks - Essentia High GZ - Essentia Low GZ - Flac - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Putnam Den On 2015-09-12 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Consider The Source Live At Wormtown Music Festival - Camp Kee-Wanee On 2016-09-16
By Consider the Source
Consider the Source September 16, 2016 Wormtown Music Festival Camp KeeWanee Greenfield, MA source: SB + Neumann KM184 > V2 > Tascam DR-680 transfer: SDHC> USB> Samplitutde 11> cdWave> FLAC taped/transfered by Rob Clarke robclarke.km184 -AT- gmailDOTcom set 1: 01. Intro jam 02. Aquarians 03. Many Words of Disapproval 04. This Dubious Honor 05. You are Obsolete 06. Abdiel 07. White People Problems 08. Blue Steel 09. A Monument To Compromise (Faux Clarinet) 10. Exit Music (For a Film)
“Consider The Source Live At Wormtown Music Festival - Camp Kee-Wanee On 2016-09-16” Metadata:
- Title: ➤ Consider The Source Live At Wormtown Music Festival - Camp Kee-Wanee On 2016-09-16
- Author: Consider the Source
“Consider The Source Live At Wormtown Music Festival - Camp Kee-Wanee On 2016-09-16” Subjects and Themes:
- Subjects: wormfest 2016 - wormtown 2016
Edition Identifiers:
- Internet Archive ID: cts2016-09-16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 621.63 Mbs, the file-s for this book were downloaded 533 times, the file-s went public at Wed Sep 28 2016.
Available formats:
Archive BitTorrent - Columbia Peaks - Flac - Flac FingerPrint - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Wormtown Music Festival - Camp Kee-Wanee On 2016-09-16 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Consider The Source Live At Deep Ellum Art Co On 2019-11-01
By Consider the Source
Consider the Source - 11/01/19 - Live at Deep Ellum Art Co - Dallas, TX
“Consider The Source Live At Deep Ellum Art Co On 2019-11-01” Metadata:
- Title: ➤ Consider The Source Live At Deep Ellum Art Co On 2019-11-01
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2019-11-01
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 714.03 Mbs, the file-s for this book were downloaded 1040 times, the file-s went public at Sat Nov 02 2019.
Available formats:
Archive BitTorrent - Columbia Peaks - Flac - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Deep Ellum Art Co On 2019-11-01 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Consider The Source - 11/01/2019 Deep Ellum Art Company
By Consider the Source
Consider the Source 11-01-2019 Deep Ellum Art Company - Dallas, TX Set List Intro -> Aquarians Many Words of Disapproval It Is Known They Call Him the Smiling Assassin When You've Loved and Lost Like Frankie Has You've Won a Goat Complex Complex Unfulfilled and Alienated Bass Solo -> This Dubious Honor Enemies of Magik -- Source 1: Sennheiser K6ME64 ORTF > H4N Pro > SD Source 2: H4N Pro Mics 90 > H4N Pro > SD Lineage: SD > Audacity > FLAC Recorded and Transferred by Jojo Sarfo Enterprises
“Consider The Source - 11/01/2019 Deep Ellum Art Company” Metadata:
- Title: ➤ Consider The Source - 11/01/2019 Deep Ellum Art Company
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts20191101
Downloads Information:
The book is available for download in "audio" format, the size of the file-s is: 711.77 Mbs, the file-s for this book were downloaded 102 times, the file-s went public at Tue Nov 19 2019.
Available formats:
Archive BitTorrent - Columbia Peaks - Flac - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source - 11/01/2019 Deep Ellum Art Company at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Consider The Source Live At Bellstock 15 On 2008-07-19
By Consider the Source
Consider the Source 11-01-2019 Deep Ellum Art Company - Dallas, TX Set List Intro -> Aquarians Many Words of Disapproval It Is Known They Call Him the Smiling Assassin When You've Loved and Lost Like Frankie Has You've Won a Goat Complex Complex Unfulfilled and Alienated Bass Solo -> This Dubious Honor Enemies of Magik -- Source 1: Sennheiser K6ME64 ORTF > H4N Pro > SD Source 2: H4N Pro Mics 90 > H4N Pro > SD Lineage: SD > Audacity > FLAC Recorded and Transferred by Jojo Sarfo Enterprises
“Consider The Source Live At Bellstock 15 On 2008-07-19” Metadata:
- Title: ➤ Consider The Source Live At Bellstock 15 On 2008-07-19
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2008-07-19.flac16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 552.97 Mbs, the file-s for this book were downloaded 441 times, the file-s went public at Thu Feb 21 2013.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Bellstock 15 On 2008-07-19 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Consider The Source Live At The Palladium On 2013-12-31
By Consider the Source
*** This is a 24 bit recording, not intended for CD Burning *** Consider the SAource 2013-12-31 The Palladium Worcester, MA DPA 4011 > V3 Digital > R44 (24/96) SDHC Card > Sound Forge Pro 10.0 (Normalize, fades) > CD Wav (tracking) > TLH > Flac (level 8) DIN/ROC (right of FOH)/approx. 7' high Tags added in Foobar2000 Taped and Transferred by Brian V. 01. Abdiel 02. Up To But Not To Exceed Whoa 03. I’ll Fight For The Imp 04. This Dubious Honor 05. The Great Circuiting 06. You Are Disappearing 07. Complex Complex 08. Paranoid Android 09. Keep Your Pimp Hand Strong
“Consider The Source Live At The Palladium On 2013-12-31” Metadata:
- Title: ➤ Consider The Source Live At The Palladium On 2013-12-31
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2013-12-31.dpa4011.flac24
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 1740.03 Mbs, the file-s for this book were downloaded 195 times, the file-s went public at Sat Jan 04 2014.
Available formats:
24bit Flac - Archive BitTorrent - Checksums - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At The Palladium On 2013-12-31 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Consider The Source Live At Rex Theater On 2015-12-03
By Consider the Source
Consider The Source Rex Theater Pittsburgh, PA December 03, 2015 *****24bit fileset, not for CDR***** Duration = 1hr, 28min 01. Track One 02. Track Two 03. Track Three 04. Track Four 05. Track Five 06. Track Six 07. Track Seven 08. Track Eight 09. Track Nine Source: Schoeps mk4 > KCY clone > Zoom F8 Conversion: SD Card > Audition 6.0 > CDWave > FLAC Recorded and Mastered By: tonedeaf ([email protected])
“Consider The Source Live At Rex Theater On 2015-12-03” Metadata:
- Title: ➤ Consider The Source Live At Rex Theater On 2015-12-03
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2015-12-03.mk4_24bit
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 1197.15 Mbs, the file-s for this book were downloaded 280 times, the file-s went public at Sat Dec 05 2015.
Available formats:
24bit Flac - Archive BitTorrent - Checksums - Columbia Peaks - Essentia High GZ - Essentia Low GZ - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Rex Theater On 2015-12-03 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Consider The Source Live At Valentines Music Hall On 2012-05-04
By Consider the Source
Consider The Source Rex Theater Pittsburgh, PA December 03, 2015 *****24bit fileset, not for CDR***** Duration = 1hr, 28min 01. Track One 02. Track Two 03. Track Three 04. Track Four 05. Track Five 06. Track Six 07. Track Seven 08. Track Eight 09. Track Nine Source: Schoeps mk4 > KCY clone > Zoom F8 Conversion: SD Card > Audition 6.0 > CDWave > FLAC Recorded and Mastered By: tonedeaf ([email protected])
“Consider The Source Live At Valentines Music Hall On 2012-05-04” Metadata:
- Title: ➤ Consider The Source Live At Valentines Music Hall On 2012-05-04
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2012-05-04.flac16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 821.91 Mbs, the file-s for this book were downloaded 269 times, the file-s went public at Thu May 17 2012.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Valentines Music Hall On 2012-05-04 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Consider The Source Live At Asylum On 2014-11-20
By Consider the Source
One Set 01 intro jam > 02 ABDIEL 03 banter 04 track04 05 You Go Squish Now 06 Banter 07 Put Another Rock in that Bag I > 08 Put Another Rock in that Bag II > 09 Put Another Rock in that Bag III > 10 Put Another Rock in that Bag IV > 11 Put Another Rock in that Bag V & VI 12 banter 13 bass intro/jam 14 I'll Fight for the Imp 15 outro
“Consider The Source Live At Asylum On 2014-11-20” Metadata:
- Title: ➤ Consider The Source Live At Asylum On 2014-11-20
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: ➤ cts2014-11-20.b6.elam260.akg414.sbd.flac
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 528.76 Mbs, the file-s for this book were downloaded 336 times, the file-s went public at Sat Nov 22 2014.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Asylum On 2014-11-20 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Consider The Source Live At Wild Woods Music & Arts Festivall On 2015-08-14
By Consider the Source
Consider the Source Fri. August 14, 2015 Wild Woods Music & Arts Festival Page Farm Croydon, NH source1: akg 481 > Lunatec V3 > Edirol R-44 > WAV (24/48k) source2: sbd > Edirol R-44 > WAV (24/48k) transfer: wav > Audacity > wav (16/44.1k) > xACT > flac8 tape/transfer - corey the groundhog (china_c_a_tATyahooDOTcom) one set (88:43) 01. 02. 03. banter 04. 05. 06. 07. banter 08. 09. 10. banter 11. The band also played a late night acoustic set which is available here https://archive.org/details/cts2015-08-15.akg481.flac2448 http://considerthesourcemusic.com
“Consider The Source Live At Wild Woods Music & Arts Festivall On 2015-08-14” Metadata:
- Title: ➤ Consider The Source Live At Wild Woods Music & Arts Festivall On 2015-08-14
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: ➤ cts2015-08-14.akg481-sbd.flac2448
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 1217.88 Mbs, the file-s for this book were downloaded 346 times, the file-s went public at Sat Nov 07 2015.
Available formats:
24bit Flac - Archive BitTorrent - Columbia Peaks - Essentia High GZ - Essentia Low GZ - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Wild Woods Music & Arts Festivall On 2015-08-14 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Consider The Source Live At Gathering Of The Vibes On 2013-07-25
By Consider the Source
Disc 1 - One Set 1. Moisturize The Situation 2. Up To But Not To Exceed Whoa 3. The Great Circuiting 4. Tihai For The Straight Guy/Tom Sawyer interlude 5. (|) 6. Paranoid Android 7. Keep Your Pimp Hand Strong 8. You Go Squish Now
“Consider The Source Live At Gathering Of The Vibes On 2013-07-25” Metadata:
- Title: ➤ Consider The Source Live At Gathering Of The Vibes On 2013-07-25
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: ➤ considerthesource2013-07-25.ck61.nbob.v3.flac
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 494.49 Mbs, the file-s for this book were downloaded 788 times, the file-s went public at Sun Aug 04 2013.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Gathering Of The Vibes On 2013-07-25 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Consider The Source @ The Gramophone 3: 19: 14
By The Gramophone
www.considerthesourcemusic.com Gabriel Marin- Guitars John Ferrara- Bass Jeff Mann - Drums and Percussion John Olsen - Lighting Design Recorded live at The Gramophone 3/19/14 Mastered by Ryan Benthall
“Consider The Source @ The Gramophone 3: 19: 14” Metadata:
- Title: ➤ Consider The Source @ The Gramophone 3: 19: 14
- Author: The Gramophone
Edition Identifiers:
- Internet Archive ID: ➤ ConsiderTheSourceTheGramophone31914
Downloads Information:
The book is available for download in "audio" format, the size of the file-s is: 1409.70 Mbs, the file-s for this book were downloaded 53 times, the file-s went public at Tue Mar 25 2014.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - VBR MP3 - WAVE -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source @ The Gramophone 3: 19: 14 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Consider The Source Live At Globe Hall On 2017-11-10
By Consider the Source
Consider the Source Globe Hall Denver, CO 11/10/2017 Source: Core Sound TetraMic > PPAc > Zoom F4 (24/48 wav) Location: Stage lip, a couple feet right of center, approximately 5' high Transfer: Converted to B-format (ACN/SN3D) using VVMic; Decoded to stereo with VVMic (Rotate [Flip Y & Z], Azi 0, Width 73.8, Dir 1.5); Audacity (EQ [TDR Nova plugin], amplify, track splits, conversion to flac); mp3tag (file tagging) Support the band: http://considerthesourcemusic.com/source/ Recorded by Lucas Lorenz Note: Because I was right of center, the bass is very prominent. 1. Ninjanuity 2. Many Words of Disapproval 3. This Dubious Honor 4. Closer to Home 5. You Go Squish Now 6. (Good Point) Wandering Bear 7. Absence of a Prominent Tooth 8. I'll Fight for the Imp 9. Keep Your Pimp Hand Strong Encore: 10. Drum solo 11. Blue Steel 12. Moisturize the Situation
“Consider The Source Live At Globe Hall On 2017-11-10” Metadata:
- Title: ➤ Consider The Source Live At Globe Hall On 2017-11-10
- Author: Consider the Source
“Consider The Source Live At Globe Hall On 2017-11-10” Subjects and Themes:
- Subjects: ➤ Consider the Source - Globe Hall - Denver - TetraMic - Core Sound - Zoom F4
Edition Identifiers:
- Internet Archive ID: cts2017-11-10.TetraMic.flac16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 727.58 Mbs, the file-s for this book were downloaded 591 times, the file-s went public at Sat Nov 18 2017.
Available formats:
Archive BitTorrent - Columbia Peaks - Flac - Flac FingerPrint - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Globe Hall On 2017-11-10 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Consider The Source Live At Disc Jam Music Festival On 2017-06-10
By Consider the Source
Consider the Source Sat/Sun. June 10/11, 2017 Disc Jam Music Festival Stephentown, NY afternoon set (72:21) set started around 2:15pm Saturday afternoon 2017-06-10. source: akg 414 cardioid > Lunatec V2 > Edirol R-44 > WAV (24/48k) transfer: wav > Audacity > wav (24/48k) > xACT > flac8 tape/transfer - corey the groundhog (coreythegroundhogATgmailDOTcom) 11 tracks late night set (157:08) set started around 2:00am Sunday morning 2017-06-11. source: dpa 4023 > Lunatec V3 > Edirol R-44 > WAV (24/48k) transfer: wav > Audacity > wav (24/48k) > xACT > flac8 tape/transfer - corey the groundhog (coreythegroundhogATgmailDOTcom) 29 tracks Gabriel Marin - Guitars John Ferrara - Bass Jeff Mann - Drums http://considerthesourcemusic.com
“Consider The Source Live At Disc Jam Music Festival On 2017-06-10” Metadata:
- Title: ➤ Consider The Source Live At Disc Jam Music Festival On 2017-06-10
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: ➤ considerthesource2017-06-10.akg414-dpa4023.flac2448
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 2944.26 Mbs, the file-s for this book were downloaded 1271 times, the file-s went public at Wed Jan 10 2018.
Available formats:
24bit Flac - Archive BitTorrent - Columbia Peaks - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Disc Jam Music Festival On 2017-06-10 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Consider The Source Live At Wormtowm Music Festival - Camp Kee-Wanee On 2012-09-15
By Consider the Source
one set 01. 02. 03. 04. 05. 06.
“Consider The Source Live At Wormtowm Music Festival - Camp Kee-Wanee On 2012-09-15” Metadata:
- Title: ➤ Consider The Source Live At Wormtowm Music Festival - Camp Kee-Wanee On 2012-09-15
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: ➤ cts2012-09-15.akg391-sbd.flac16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 529.34 Mbs, the file-s for this book were downloaded 155 times, the file-s went public at Fri Oct 19 2012.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Wormtowm Music Festival - Camp Kee-Wanee On 2012-09-15 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Consider The Source Live At Camp Kee-Wanee, StrangeCreek Music Festival On 2016-05-27
By Consider the Source
Consider the Source 2016-05-27 StrangeCreek Music Festival Greenfield, MA Vernville Stage BSC1(cards) + SBD > R44 (24/48) SDHC Card > Audacity (mix) > Sound Forge Pro 2.5 (fades, Normalize, tracking, resample iZotope 64-Bit SRC, dither iZotope MBIT+ Dither) > xAct (Flac level 8, tagging, fix SBE) Stage lip/DIN Taped and Transferred by Brian V. 01. 02. 03. 04. 05. 06. 07. 08. 09. 10.
“Consider The Source Live At Camp Kee-Wanee, StrangeCreek Music Festival On 2016-05-27” Metadata:
- Title: ➤ Consider The Source Live At Camp Kee-Wanee, StrangeCreek Music Festival On 2016-05-27
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2016-05-27.bsc1-sbd.flac16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 647.19 Mbs, the file-s for this book were downloaded 345 times, the file-s went public at Thu Jun 09 2016.
Available formats:
Archive BitTorrent - Columbia Peaks - Flac - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Camp Kee-Wanee, StrangeCreek Music Festival On 2016-05-27 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Consider The Source Live At Shank Hall On 2017-11-16
By Consider the Source
Consider the Source 2017-11-16 - Shank Hall Milwaukee, WI Tracklist: 1. Ninjanuity 2. Many Words of Disapproval 3. Banter 4. This Dubious Honor 5. Closer to Home 6. You Go Squish Now 7. Banter 8. (Good Point) Wandering Bear 9. Absence of a Prominent Tooth 10. Banter 11. Keep Your Pimp Hand Strong 12. Encore Break 13. Drum Solo 14. Blue Steel
“Consider The Source Live At Shank Hall On 2017-11-16” Metadata:
- Title: ➤ Consider The Source Live At Shank Hall On 2017-11-16
- Author: Consider the Source
“Consider The Source Live At Shank Hall On 2017-11-16” Subjects and Themes:
- Subjects: consider the source - milwaukee - shank hall - cts - wisconsin
Edition Identifiers:
- Internet Archive ID: CTS2017-11-16
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 564.08 Mbs, the file-s for this book were downloaded 1132 times, the file-s went public at Sat Nov 18 2017.
Available formats:
Archive BitTorrent - Columbia Peaks - Flac - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Shank Hall On 2017-11-16 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Consider The Source Live At St. Josephs Auditorium The College Of Saint Rose On 2009-11-13
By Consider the Source
01 Moisturize The Situation 02 Abdiel 03 Keep Your Pimp Hand String 04 Vagiant 05 How Am I Not Myself 06 Do Not Shrink Me Gypsy 07 Those We Do Not Speak Of 08 Order Of The Triad 09 Wandering Bear 10 Ol' Chomper
“Consider The Source Live At St. Josephs Auditorium The College Of Saint Rose On 2009-11-13” Metadata:
- Title: ➤ Consider The Source Live At St. Josephs Auditorium The College Of Saint Rose On 2009-11-13
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2009-11-13
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 700.63 Mbs, the file-s for this book were downloaded 632 times, the file-s went public at Sat Nov 21 2009.
Available formats:
Archive BitTorrent - Columbia Peaks - Essentia High GZ - Essentia Low GZ - Flac - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At St. Josephs Auditorium The College Of Saint Rose On 2009-11-13 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Consider The Source Live At Thunderbird Cafe On 2013-04-13
By Consider the Source
**24-Bit** 01. Abdiel 02. Up To But Not To Exceed Whoa 03. Blue Steel 04. Absence Of A Prominent Tooth 05. This Dubious Honor 06. No Touching 07. (Good Point) Wandering Bear 08. Moisturize The Situation 09. ( ) 10. Keep Your Pimp Hand Strong Encore 11. Tranny 12. Coat Check A 'Beats By Bean/Team Pittsburgh' recording!
“Consider The Source Live At Thunderbird Cafe On 2013-04-13” Metadata:
- Title: ➤ Consider The Source Live At Thunderbird Cafe On 2013-04-13
- Author: Consider the Source
“Consider The Source Live At Thunderbird Cafe On 2013-04-13” Subjects and Themes:
- Subjects: Church Audio CA-14c - Church Audio CA-9100 - Sony M10[24-Bit]
Edition Identifiers:
- Internet Archive ID: ➤ cts2013-04-13.ca14c.9100.m10.flac24
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 1418.66 Mbs, the file-s for this book were downloaded 227 times, the file-s went public at Tue Apr 23 2013.
Available formats:
24bit Flac - Archive BitTorrent - Columbia Peaks - Essentia High GZ - Essentia Low GZ - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Thunderbird Cafe On 2013-04-13 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Consider The Source Live At Mad Tea Party Jam On 2014-06-21
By Consider the Source
Consider The Source Mad Tea Party Jam Hedgesville, WV June 21, 2014 Duration = 1hr, 19min 01) Track One 02) Track Two 03) Track Three 04) Track Four 05) Track Five 06) Track Six 07) Track Seven 08) Track Eight Source: Schoeps m934b > Schoeps CMMT30 > Schoeps VMS5U > Sound Devices 744t Converstion: CF Card > Audition 3.0 > CDWave > FLAC Recorded and Mastered By: tonedeaf ([email protected])
“Consider The Source Live At Mad Tea Party Jam On 2014-06-21” Metadata:
- Title: ➤ Consider The Source Live At Mad Tea Party Jam On 2014-06-21
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2014-06-21.m934b_16bit
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 584.22 Mbs, the file-s for this book were downloaded 149 times, the file-s went public at Sun Jun 29 2014.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Mad Tea Party Jam On 2014-06-21 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Consider The Source Live At Mad Tea Party Jam On 2014-06-21
By Consider the Source
Consider The Source Mad Tea Party Jam Hedgesville, WV June 21, 2014 *****24bit fileset, not for CDR***** Duration = 1hr, 19min 01) Track One 02) Track Two 03) Track Three 04) Track Four 05) Track Five 06) Track Six 07) Track Seven 08) Track Eight Source: Schoeps m934b > Schoeps CMMT30 > Schoeps VMS5U > Sound Devices 744t Converstion: CF Card > Audition 3.0 > CDWave > FLAC Recorded and Mastered By: tonedeaf ([email protected])
“Consider The Source Live At Mad Tea Party Jam On 2014-06-21” Metadata:
- Title: ➤ Consider The Source Live At Mad Tea Party Jam On 2014-06-21
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2014-06-21.m934b_24bit
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 1035.14 Mbs, the file-s for this book were downloaded 160 times, the file-s went public at Sun Jun 29 2014.
Available formats:
24bit Flac - Archive BitTorrent - Checksums - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Mad Tea Party Jam On 2014-06-21 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Consider The Source 10/31/2019 Backyard On Bell - Denton, TX
By Jojo Sarfo Enterprises
Consider the Source - 10/31/2019 Backyard on Bell - Denton, TX 1. Intro -> Aquarians 2. Many Words of Disapproval 3. It is Known 4. They Call Him the Smiling Assassin 5. When You've Loved and Lost Like Frankie Has 6. You Won a Goat 7. I'll Fight for the Imp 8. Unfulfilled and Alienated 9. Bass Solo -> This Dubious Honor 10. Enemies of Magick -- Sennheiser K6ME64 -> H4N Pro -> SD Lineage: Source 1 + Source 2 -> H4N Pro -> SD -> FreeAC Recorded and Encoded by Jojo Sarfo Enterprises
“Consider The Source 10/31/2019 Backyard On Bell - Denton, TX” Metadata:
- Title: ➤ Consider The Source 10/31/2019 Backyard On Bell - Denton, TX
- Author: Jojo Sarfo Enterprises
Edition Identifiers:
- Internet Archive ID: cts20191031
Downloads Information:
The book is available for download in "audio" format, the size of the file-s is: 731.13 Mbs, the file-s for this book were downloaded 150 times, the file-s went public at Fri Nov 01 2019.
Available formats:
Archive BitTorrent - Columbia Peaks - Flac - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source 10/31/2019 Backyard On Bell - Denton, TX at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Consider The Source Live At Casual Campout On 2024-05-10
By Consider the Source
Consider the Source May 10th, 2024 Casual Campout Lakeside Retreats Raleigh, NC Source 1: Beyerdynamic CK950's > Sound Devices MixPre-6 II @ 32/48 Source 2: Soundboard Location: FOB Four channel post show matrix. transfer: SDHC> Macbook Air>Audacity>Fission *24bit/48khz fileset* Recorded and transferred by Marty Loving A Team Dirty South Recording Thank You to Ian Buss Audio for the great mix and the soundboard patch 01. Track One 02. Track Two 03. Track Three 04. Track Four 05. Track Five 06. Track Six 07. Track Seven 08. Enemies of Magic
“Consider The Source Live At Casual Campout On 2024-05-10” Metadata:
- Title: ➤ Consider The Source Live At Casual Campout On 2024-05-10
- Author: Consider the Source
“Consider The Source Live At Casual Campout On 2024-05-10” Subjects and Themes:
- Subjects: Live concert - Team Dirty South - Casual Campout 2024
Edition Identifiers:
- Internet Archive ID: cts2024-05-10.ck950mtx
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 946.88 Mbs, the file-s for this book were downloaded 265 times, the file-s went public at Tue May 14 2024.
Available formats:
24bit Flac - Archive BitTorrent - Columbia Peaks - Item Tile - JPEG - JPEG Thumb - Metadata - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Casual Campout On 2024-05-10 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Consider The Source : Finding Reliable Information On The Internet
By Taylor, Paige
Consider the Source May 10th, 2024 Casual Campout Lakeside Retreats Raleigh, NC Source 1: Beyerdynamic CK950's > Sound Devices MixPre-6 II @ 32/48 Source 2: Soundboard Location: FOB Four channel post show matrix. transfer: SDHC> Macbook Air>Audacity>Fission *24bit/48khz fileset* Recorded and transferred by Marty Loving A Team Dirty South Recording Thank You to Ian Buss Audio for the great mix and the soundboard patch 01. Track One 02. Track Two 03. Track Three 04. Track Four 05. Track Five 06. Track Six 07. Track Seven 08. Enemies of Magic
“Consider The Source : Finding Reliable Information On The Internet” Metadata:
- Title: ➤ Consider The Source : Finding Reliable Information On The Internet
- Author: Taylor, Paige
- Language: English
“Consider The Source : Finding Reliable Information On The Internet” Subjects and Themes:
- Subjects: ➤ Internet in education -- Study and teaching - Internet -- Study and teaching - Internet resources -- Evaluation -- Study and teaching - Internet searching -- Study and teaching - Creative activities - Teaching -- Aids and devices - Internet in education - Information literacy
Edition Identifiers:
- Internet Archive ID: considersourcefi0000tayl
Downloads Information:
The book is available for download in "texts" format, the size of the file-s is: 279.79 Mbs, the file-s for this book were downloaded 24 times, the file-s went public at Tue Jun 16 2020.
Available formats:
ACS Encrypted EPUB - ACS Encrypted PDF - Abbyy GZ - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - EPUB - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source : Finding Reliable Information On The Internet at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Consider The Source Live At Some Kind Of Jam On 2015-04-24
By Consider the Source
Consider The Source Some Kind Of Jam Schuylkill Haven, PA 04/24 /2015 Recorded & Mastered By Scott Medeiros Nakamichi CM-300 ( CP-1 ) > SBD > Tascam Dr-680 ( 16/41 ) > SD > Sonar X2 > Adobe Audition > Flac > Traders Little Helper One Set: ( Main Stage ) 01 Intro/Alaap 02 New World Cocek 03 Wandering Bear 04 Stage Banter 05 Abdiel 06 Paranoid Android --> 07 Paranoid Android 08 You Go Squish Now 1 09 Stage Banter 10 Complex Complex 11 Put Another Rock In That Bag Parts I, IV & VI 12 Transported Man 13 I'll Fight for the Imp Consider The Source Are: Gabriel Marin- Guitars John Ferrara- Bass Jeff Mann - Drums and Percussion
“Consider The Source Live At Some Kind Of Jam On 2015-04-24” Metadata:
- Title: ➤ Consider The Source Live At Some Kind Of Jam On 2015-04-24
- Author: Consider the Source
“Consider The Source Live At Some Kind Of Jam On 2015-04-24” Subjects and Themes:
- Subjects: Gabriel Marin - John Ferrara - Jeff Mann
Edition Identifiers:
- Internet Archive ID: ➤ CTS2015-04-24.ConsiderTheSourceSomeKindOfJamMainStageMatrix
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 770.60 Mbs, the file-s for this book were downloaded 1233 times, the file-s went public at Tue May 12 2015.
Available formats:
Archive BitTorrent - Columbia Peaks - Essentia High GZ - Essentia Low GZ - Flac - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Some Kind Of Jam On 2015-04-24 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Consider The Source
By Dawan Muhammad
Tracklist: 1. Gingerbread Boy 2. Over and Over 3. Eronel 4. Chase 5. Everything Happens to Me 6. Ace in the Whole 7. Gumbo 8. Consider the Source 9. Remember to Smile 10. The Art of End
“Consider The Source” Metadata:
- Title: Consider The Source
- Author: Dawan Muhammad
- Language: English
Edition Identifiers:
- Internet Archive ID: ➤ cd_consider-the-source_dawan-muhammad
Downloads Information:
The book is available for download in "audio" format, the size of the file-s is: 595.57 Mbs, the file-s for this book were downloaded 3 times, the file-s went public at Tue Mar 11 2025.
Available formats:
Columbia Peaks - Cue Sheet - DjVuTXT - Djvu XML - Flac - Generic Raw Book Zip - Item Image - Item Tile - Log - M3U - MP3 Sample - Metadata - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - Scandata - Scandata JSON - Single Page Processed JP2 ZIP - Spectrogram - Text PDF - VBR MP3 - chOCR - hOCR -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43NORCAM's Video Of The Day 9/20/12: Consider The Source
By NORCAM
Tracklist: 1. Gingerbread Boy 2. Over and Over 3. Eronel 4. Chase 5. Everything Happens to Me 6. Ace in the Whole 7. Gumbo 8. Consider the Source 9. Remember to Smile 10. The Art of End
“NORCAM's Video Of The Day 9/20/12: Consider The Source” Metadata:
- Title: ➤ NORCAM's Video Of The Day 9/20/12: Consider The Source
- Author: NORCAM
- Language: English
“NORCAM's Video Of The Day 9/20/12: Consider The Source” Subjects and Themes:
- Subjects: ➤ Massachusetts - North Reading - North Reading Cable and Media - NORCAM - Public Access TV - Community Media - PEG - Youtube - Sequence - 2012
Edition Identifiers:
- Internet Archive ID: ➤ NORCAM_s_Video_of_the_Day_9_20_12_-_Consider_the_Source
Downloads Information:
The book is available for download in "movies" format, the size of the file-s is: 127.77 Mbs, the file-s for this book were downloaded 39 times, the file-s went public at Sat Apr 16 2016.
Available formats:
ASR - Animated GIF - Archive BitTorrent - Item Tile - MP3 - Metadata - Ogg Video - PNG - SubRip - Thumbnail - h.264 - h.264 HD -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find NORCAM's Video Of The Day 9/20/12: Consider The Source at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Consider The Source Live At Jack's Roadhouse On 2019-11-02
By Consider the Source
Consider the Source 11-02-2019 Jack's Roadhouse - San Marcos, TX Set List Intro -> Moisturize the Situation Many Words of Disapproval It Is Known They Call Him the Smiling Assassin You've Won a Goat I'll Fight for the Imp Unfulfilled and Alienated Bass Solo -> This Dubious Honor Enemies of Magik -- Sennheiser K6ME64 XY > H4N Pro > SD Lineage: SD > Audacity > FLAC Recorded and Transferred by Jojo Sarfo Enterprises
“Consider The Source Live At Jack's Roadhouse On 2019-11-02” Metadata:
- Title: ➤ Consider The Source Live At Jack's Roadhouse On 2019-11-02
- Author: Consider the Source
“Consider The Source Live At Jack's Roadhouse On 2019-11-02” Subjects and Themes:
- Subjects: Live concert - Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2019-11-02
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 707.48 Mbs, the file-s for this book were downloaded 795 times, the file-s went public at Wed Nov 20 2019.
Available formats:
Archive BitTorrent - Columbia Peaks - Flac - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Jack's Roadhouse On 2019-11-02 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Consider The Source Live At Donegal Saloon On 2011-04-15
By Consider the Source
01 - New World Coat Check 02 - Keep Your Pimp Hand Strong 03 - 04 - Up To But Not To Exceed Woah 05 - Ol' Chomper 06 - You Go Squish Now 07 - (Good Point) Wandering Bear
“Consider The Source Live At Donegal Saloon On 2011-04-15” Metadata:
- Title: ➤ Consider The Source Live At Donegal Saloon On 2011-04-15
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: CTS2011-04-15
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 762.13 Mbs, the file-s for this book were downloaded 392 times, the file-s went public at Sun Jul 17 2011.
Available formats:
24bit Flac - Archive BitTorrent - Columbia Peaks - Item Image - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Donegal Saloon On 2011-04-15 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Consider The Source @ The Gramophone
By The Gramophone
NYC trio Consider the Source defy easy description. If intergalactic beings of pure energy, after initiation into an order of whirling dervishes, built some kind of pan-dimensional booty-shaking engine, powered by psychedelics and abstract math, it’d probably just sound like a CTS tribute band. Drawing from progressive rock, fusion and jazz, with alien sounds soaked in Indian and Middle Eastern styles, CTS blends disparate parts into a striking, utterly original whole. Dubbed “Sci-Fi Middle Eastern Fusion”, the band’s music strikes a rare balance between cerebral and emotional, intellectual and primal. A relentless touring schedule has won the band a fervent following from California to Israel, with fans ranging from jam-band hippies and jazz cats to corpse-painted headbangers and prog geeks. Mixed by Dan Strickland Mastered by Ryan Benthall
“Consider The Source @ The Gramophone” Metadata:
- Title: ➤ Consider The Source @ The Gramophone
- Author: The Gramophone
Edition Identifiers:
- Internet Archive ID: ConsiderTheSourceTheGramophone
Downloads Information:
The book is available for download in "audio" format, the size of the file-s is: 1182.57 Mbs, the file-s for this book were downloaded 250 times, the file-s went public at Wed Mar 19 2014.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - VBR MP3 - WAVE -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source @ The Gramophone at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47Consider The Source
Messege preached Sunday night 9/28/2008 from Ephesians 3 at Bethel Missionary Baptist Church
“Consider The Source” Metadata:
- Title: Consider The Source
“Consider The Source” Subjects and Themes:
- Subjects: Consider - Source - Darrin Waldroup - Bethel Missionary Baptist
Edition Identifiers:
- Internet Archive ID: ConsiderTheSource_726
Downloads Information:
The book is available for download in "audio" format, the size of the file-s is: 25.64 Mbs, the file-s for this book were downloaded 69 times, the file-s went public at Sat Oct 10 2009.
Available formats:
Archive BitTorrent - Item Tile - Metadata - Ogg Vorbis - PNG - VBR M3U - VBR MP3 - VBR ZIP -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Consider The Source Live At Wild Woods Music And Arts Festival, Page Farm, On 2014-08-09
By Consider the Source
Messege preached Sunday night 9/28/2008 from Ephesians 3 at Bethel Missionary Baptist Church
“Consider The Source Live At Wild Woods Music And Arts Festival, Page Farm, On 2014-08-09” Metadata:
- Title: ➤ Consider The Source Live At Wild Woods Music And Arts Festival, Page Farm, On 2014-08-09
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: Consider_the_Source2014-08-09
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 662.09 Mbs, the file-s for this book were downloaded 205 times, the file-s went public at Tue Aug 12 2014.
Available formats:
Archive BitTorrent - Checksums - Flac - Flac FingerPrint - Item Tile - Metadata - Ogg Vorbis - PNG - Text - VBR MP3 - WAVE -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Wild Woods Music And Arts Festival, Page Farm, On 2014-08-09 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Consider The Source Live At Cornerstone On 2017-10-31
By Consider the Source
Halloween at Cornerstone with Vigilis, Cure for Gravity, and Consider the Source. start@10pm 0:00 intro 2:40 5:30 Game of Thrones theme -> 7:20 16:28 Many Words of Disapproval 22:01 John comments 22:49 I'll Fight for the Imp 30:02 39:15 49:24 Jeff comments 51:23 1:02:23 1:09:48 Complex Complex 1:16:47 Gabriel comments 1:17:38 1:24:24 1:31:05 encore break 1:32:34 Encore: Wandering Bear 1:39:30 outro Mics at front of soundboard. Consider The Source: Gabriel Marin - Guitar John Ferrara - Bass Jeff Mann - Drums and percussion
“Consider The Source Live At Cornerstone On 2017-10-31” Metadata:
- Title: ➤ Consider The Source Live At Cornerstone On 2017-10-31
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: ➤ ConsidertheSource2017-10-31.akg483.2496
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 2039.91 Mbs, the file-s for this book were downloaded 545 times, the file-s went public at Wed Nov 01 2017.
Available formats:
24bit Flac - Archive BitTorrent - Columbia Peaks - Item Tile - JPEG - JPEG Thumb - Metadata - Ogg Vorbis - PNG - Spectrogram - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At Cornerstone On 2017-10-31 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Consider The Source Live At The Big What? 2025 On 2025-08-22
By Consider the Source
Consider the Source The Big What 2025 - Shakori Hills - Grove Stage Silk Hope, NC 2025-08-22 Source: Matrix: AKG CK63 (ORTF/FOB)>Nbob Actives>Naiant PFA + SBD> Busman V/T Mod R4 (@ 24bit/48KHz) Lineage: R4>USB>Audacity 3.7.5 (Time synch and 2 track stereo mixdown)>Audition 3.0>CD Wave>.flac24 Taped by joel at jamlivedotorg Transferred by joel at jamlivedotorg 1. Intro 2. Moisturize the Situation 3. Trial By Stone 4. This Is The Way 5. Mouthbreather 6. New World Cocek 7. Tihai For the Straight Guy
“Consider The Source Live At The Big What? 2025 On 2025-08-22” Metadata:
- Title: ➤ Consider The Source Live At The Big What? 2025 On 2025-08-22
- Author: Consider the Source
Edition Identifiers:
- Internet Archive ID: cts2025-08-22.flac24
Downloads Information:
The book is available for download in "etree" format, the size of the file-s is: 797.85 Mbs, the file-s for this book were downloaded 48 times, the file-s went public at Mon Aug 25 2025.
Available formats:
24bit Flac - Archive BitTorrent - Checksums - Columbia Peaks - Flac FingerPrint - Item Tile - JPEG - JPEG Thumb - Metadata - PNG - Spectrogram - Text - VBR MP3 -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Consider The Source Live At The Big What? 2025 On 2025-08-22 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
Source: The Open Library
The Open Library Search Results
Available books for downloads and borrow from The Open Library
1Consider the source
By Jerry A Pattengale

“Consider the source” Metadata:
- Title: Consider the source
- Author: Jerry A Pattengale
- Language: English
- Number of Pages: Median: 126
- Publisher: Barge Canal Press
- Publish Date: 2000
“Consider the source” Subjects and Themes:
- Subjects: Doctrinal Theology - Christian life - Wesleyan authors - Théologie dogmatique
Edition Identifiers:
- The Open Library ID: OL11743223M
- Online Computer Library Center (OCLC) ID: 52616763
- All ISBNs: 0966670817 - 9780966670813
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Consider the source at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
Buy “Consider The Source” online:
Shop for “Consider The Source” on popular online marketplaces.
- Ebay: New and used books.