Hi Milian, On Mon, 2018-10-15 at 22:38 +0200, Milian Wolff wrote: > here's one example of mmap events recorded by perf: > > 0x7fac5ec0b000 to 0x7fac5ed9a000, len = 0x18f000, offset = 0 > > r--p /usr/lib/libstdc++.so.6.0.25 > 0x7fac5ec94000 to 0x7fac5ed8a000, len = 0xf6000, offset = 0x89000 > > ---p /usr/lib/libstdc++.so.6.0.25 > 0x7fac5ec94000 to 0x7fac5ed4c000, len = 0xb8000, offset = 0x89000 > > r-xp /usr/lib/libstdc++.so.6.0.25 > 0x7fac5ed4c000 to 0x7fac5ed89000, len = 0x3d000, offset = 0x141000 > > r--p /usr/lib/libstdc++.so.6.0.25 > 0x7fac5ed8a000 to 0x7fac5ed97000, len = 0xd000, offset = 0x17e000 > > rw-p /usr/lib/libstdc++.so.6.0.25
Could you also post the matching phdr output for the file? eu-readelf -l /usr/lib/libstdc++.so.6.0.25 should show it. That way we can see how the PT_LOAD segments map to the mmap events. Thanks, Mark