代码拉取完成,页面将自动刷新
This script maps runtime addresses to symbol names. It is robust over Address Space Layout Randomization (ASLR) since it uses runtime addresses with runtime mapping information (/proc/.../maps). Like 'pprof --symbols' in gperftools <http://code.google.com/p/gperftools/>. Step 1: Prepare symbol information. It is required to collect symbol information before mapping runtime addresses to symbol names. ./prepare_symbol_info.py /path/to/maps [/another/path/to/symbol_info_dir] The required 'maps' file is /proc/.../maps of the process at runtime. Step 2: Find symbols. ./find_runtime_symbols.py /path/to/symbol_info_dir < addresses.txt 'symbol_info_dir' is the result of the Step 1. The stdin should be a list of hex addresses to map, one per line. The results will be printed to stdout like 'pprof --symbols'.
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。