Commit Graph

8 Commits

Author SHA1 Message Date
d7f6e4b922 libsysprof-analyze: add some common tags
It's nice to have various labels on subsystems used on the desktop, so add
some common ones here that are part of the platform.
2023-05-19 16:19:29 -07:00
1833fabd62 libsysprof-analyze: include inode when creating ELF
We want to know the inode of the FD that was mmaped so that we can check
the requested inode when processing the address map from a particular
process.
2023-05-19 15:44:26 -07:00
f1f0261486 libsysprof-analyze: check if ELF matches inode/build-id
We still want to load it into the cache as it could get used by other
symbols/mmap regions, but don't return the ELF if it won't match an inode
or build-id check. Rely on other fallbacks to create fallback symbols
for those use cases.
2023-05-19 15:33:53 -07:00
7885873ba3 libsysprof-analyze: implement various SysprofElf API
This wraps our ElfParser to give us an idiomatic API we can use with
GIO/GTK/etc.
2023-05-19 14:52:49 -07:00
aa829f8665 libsysprof-analyze: load ElfParser for GMappedFile 2023-05-19 10:41:00 -07:00
5c1802d77f libsysprof-analyze: add scaffolding for ELF loading 2023-05-18 15:44:36 -07:00
da58a52bf3 libsysprof-analyze: give access to SysprofElf filename 2023-05-18 13:10:51 -07:00
19c5a21ac0 libsysprof-analyze: give shape to ELF loading APIs
We need to separate a number of concerns here, such as debug-dirs within
the process namespace vs global debug-dirs (external symbols on a developer
workstation vs IoT/Laptop/VM/alternate-device).

That means we need to be able to resolve paths via the mount namespace of
the process as it was seen in the capture file.

Additionally, we need to follow .gnu_debuglink section headers so that we
can associate the version with symbols with the ELF that is loaded from
the processes SysprofAddressLayout.
2023-05-18 12:00:25 -07:00