> Look at the code mentioned.  It uses the SecurityManager.getClassContext() to 
> get the current call stack in terms of classes.  Then you walk down the list 
> until you get to the class you want, get its loader and get the bundle.

Looking at it now. I'll see if I can understand how those nice stacktraces are 
generated.



        Igmar
_______________________________________________
OSGi Developer Mail List
[email protected]
https://mail.osgi.org/mailman/listinfo/osgi-dev

Reply via email to