public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* probe point "process(PATH).library("/lib64/libc.so.6").function("open") no match ERROR.
@ 2013-08-14 17:15 maliubiao
  2013-08-18  0:05 ` Frank Ch. Eigler
  0 siblings, 1 reply; 2+ messages in thread
From: maliubiao @ 2013-08-14 17:15 UTC (permalink / raw)
  To: systemtap

I am trying to trace functions in libc .
Do nm /lib64/libc.so.6 |grep open ,  actually there is a weak symbol open,
When I use malloc instead of open in function("open"),  It works ,  in
the handler  the result of probefunc() is __libc_malloc.
__libc_malloc is a T symbol, which is in the CODE segment.

Is there a way  to trace weak symbol  or  to find out  what symbol  do
a weak symbol actually refer to?

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2013-08-18  0:05 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2013-08-14 17:15 probe point "process(PATH).library("/lib64/libc.so.6").function("open") no match ERROR maliubiao
2013-08-18  0:05 ` Frank Ch. Eigler

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).