OLD | NEW |
(Empty) | |
| 1 This script maps runtime addresses to symbol names. It is robust over |
| 2 Address Space Layout Randomization (ASLR) since it uses runtime addresses with |
| 3 runtime mapping information (/proc/.../maps). |
| 4 Like 'pprof --symbols' in gperftools <http://code.google.com/p/gperftools/>. |
| 5 |
| 6 |
| 7 Step 1: Prepare symbol information. |
| 8 |
| 9 It is required to collect symbol information before mapping runtime addresses |
| 10 to symbol names. |
| 11 |
| 12 ./prepare_symbol_info.py /path/to/maps [/another/path/to/symbol_info_dir] |
| 13 |
| 14 The required 'maps' file is /proc/.../maps of the process at runtime. |
| 15 |
| 16 |
| 17 Step 2: Find symbols. |
| 18 |
| 19 ./find_runtime_symbols.py /path/to/symbol_info_dir < addresses.txt |
| 20 |
| 21 'symbol_info_dir' is the result of the Step 1. |
| 22 The stdin should be a list of hex addresses to map, one per line. |
| 23 |
| 24 The results will be printed to stdout like 'pprof --symbols'. |
OLD | NEW |