Commit Graph

15 Commits

Author SHA1 Message Date
d51d7c4773 libsysprof-analyze: add rsvg/gdk_pixbuf to modules 2023-06-14 15:38:48 -07:00
ed0fefc721 libsysprof-analyze: apply text_offset for elfparser
We need to do what binfile was doing and make the address relative to the
text_offset. We also need to ignore the text offset of the debuglink files
and pass it the text_offset of the original ELF.

This fixes a bunch of symbolization in the callgraph.
2023-05-25 12:54:02 -07:00
839695dcd1 libsysprof-analyze: fix SysprofElf:build-id property 2023-05-22 19:49:27 -07:00
d057f69924 libsysprof-analyze: cleanup nicks a bit 2023-05-21 12:13:16 -07:00
052321db7e libsysprof-analyze: add PolicyKit to subsystems 2023-05-20 17:08:20 -07:00
3df434d950 libsysprof-analyze: resolve symbols in ELF in non-symbol areas
If we get an address that doesn't fall within a symbol, we still want to
generate a valid string/address range for it here so that we can get
nick annotations correct. If we hit the fallback path, we won't get that.
2023-05-20 10:37:53 -07:00
61d5187b09 libsysprof-analyze: fallback in case of debuglink error
If for some reason the debuglink has an issue, we can fallback to looking
at the specific ELF containing the address we wanted to look at.
2023-05-19 16:33:21 -07:00
d7f6e4b922 libsysprof-analyze: add some common tags
It's nice to have various labels on subsystems used on the desktop, so add
some common ones here that are part of the platform.
2023-05-19 16:19:29 -07:00
1833fabd62 libsysprof-analyze: include inode when creating ELF
We want to know the inode of the FD that was mmaped so that we can check
the requested inode when processing the address map from a particular
process.
2023-05-19 15:44:26 -07:00
f1f0261486 libsysprof-analyze: check if ELF matches inode/build-id
We still want to load it into the cache as it could get used by other
symbols/mmap regions, but don't return the ELF if it won't match an inode
or build-id check. Rely on other fallbacks to create fallback symbols
for those use cases.
2023-05-19 15:33:53 -07:00
7885873ba3 libsysprof-analyze: implement various SysprofElf API
This wraps our ElfParser to give us an idiomatic API we can use with
GIO/GTK/etc.
2023-05-19 14:52:49 -07:00
aa829f8665 libsysprof-analyze: load ElfParser for GMappedFile 2023-05-19 10:41:00 -07:00
5c1802d77f libsysprof-analyze: add scaffolding for ELF loading 2023-05-18 15:44:36 -07:00
da58a52bf3 libsysprof-analyze: give access to SysprofElf filename 2023-05-18 13:10:51 -07:00
19c5a21ac0 libsysprof-analyze: give shape to ELF loading APIs
We need to separate a number of concerns here, such as debug-dirs within
the process namespace vs global debug-dirs (external symbols on a developer
workstation vs IoT/Laptop/VM/alternate-device).

That means we need to be able to resolve paths via the mount namespace of
the process as it was seen in the capture file.

Additionally, we need to follow .gnu_debuglink section headers so that we
can associate the version with symbols with the ELF that is loaded from
the processes SysprofAddressLayout.
2023-05-18 12:00:25 -07:00