I am really curious and interested to know how the pid provider can
figure out the symbolic
information of the called functions from a stripped program. Could
someone help me
demystify the mechanism?
First, stripping a program is the bane of debugging since it deprives
the
debugger of a bunch of symbolic information. However, even a stripped
program
must contain some symbolic information for doing dynamic linker lookups.
For example, if a program calls a function in a library that symbol name
will survive stripping.
Do a nm -D on your program to see that 'dynamic' symbol table.
Adam
--
Adam Leventhal, Fishworks http://blogs.sun.com/ahl
_______________________________________________
dtrace-discuss mailing list
dtrace-discuss@opensolaris.org