This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
probe point "process(PATH).library("/lib64/libc.so.6").function("open") no match ERROR.
- From: maliubiao <maliubiao at gmail dot com>
- To: systemtap at sourceware dot org
- Date: Thu, 15 Aug 2013 01:15:41 +0800
- Subject: probe point "process(PATH).library("/lib64/libc.so.6").function("open") no match ERROR.
I am trying to trace functions in libc .
Do nm /lib64/libc.so.6 |grep open , actually there is a weak symbol open,
When I use malloc instead of open in function("open"), It works , in
the handler the result of probefunc() is __libc_malloc.
__libc_malloc is a T symbol, which is in the CODE segment.
Is there a way to trace weak symbol or to find out what symbol do
a weak symbol actually refer to?