I am really curious and interested to know how the pid provider can figure out the symbolic information of the called functions from a stripped program. Could someone help me
demystify the mechanism?

First, stripping a program is the bane of debugging since it deprives the debugger of a bunch of symbolic information. However, even a stripped program
must contain some symbolic information for doing dynamic linker lookups.
For example, if a program calls a function in a library that symbol name
will survive stripping.

Do a nm -D on your program to see that 'dynamic' symbol table.

Adam

--
Adam Leventhal, Fishworks                        http://blogs.sun.com/ahl

_______________________________________________
dtrace-discuss mailing list
dtrace-discuss@opensolaris.org

Reply via email to