On Linux, given an arbitrary binary executable with symbol information in the executable, how can I lookup an instruction pointer address to get the corresponding symbol name?
The binary (and its process) isn't a Go binary, but any arbitrary executable. The stack unwinding has already been done, so I'm presented with a list of instruction pointer addresses (return addresses) which I need to convert to more useful symbol names. I've seen the stdlib's debug/elf package, but I lack the ELF knowledge to press the elf package's knobs in the right order. Any examples of how to use debug/elf, and is it even the right package to use in this case? -- You received this message because you are subscribed to the Google Groups "golang-nuts" group. To unsubscribe from this group and stop receiving emails from it, send an email to golang-nuts+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/golang-nuts/b1140454-fe04-4d90-85a6-24def72803c5n%40googlegroups.com.