This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

probe point "process(PATH).library("/lib64/libc.so.6").function("open") no match ERROR.


I am trying to trace functions in libc .
Do nm /lib64/libc.so.6 |grep open ,  actually there is a weak symbol open,
When I use malloc instead of open in function("open"),  It works ,  in
the handler  the result of probefunc() is __libc_malloc.
__libc_malloc is a T symbol, which is in the CODE segment.

Is there a way  to trace weak symbol  or  to find out  what symbol  do
a weak symbol actually refer to?


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]