On Linux, given an arbitrary binary executable with symbol information in 
the executable, how can I lookup an instruction pointer address to get the 
corresponding symbol name?

The binary (and its process) isn't a Go binary, but any arbitrary 
executable. The stack unwinding has already been done, so I'm presented 
with a list of instruction pointer addresses (return addresses) which I 
need to convert to more useful symbol names.

I've seen the stdlib's debug/elf package, but I lack the ELF knowledge to 
press the elf package's knobs in the right order. Any examples of how to 
use debug/elf, and is it even the right package to use in this case?

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/golang-nuts/b1140454-fe04-4d90-85a6-24def72803c5n%40googlegroups.com.

Reply via email to