Mike Kuhnkey
2006-Feb-16 18:44 UTC
[dtrace-discuss] Advance Dtrace Presentation Question:Unsporting apps
Page 43: Gotcha: Unsporting apps Last Bullet: Can still use the pid provider to instrument instructdions in stripped functions by using "-" as the probe function and the address of the instruction as the name: #dtrace -n pid123::-:80704e3 How does one begin to discover the "address"? This message posted from opensolaris.org
Jonathan Adams
2006-Feb-16 21:24 UTC
[dtrace-discuss] Advance Dtrace Presentation Question:Unsporting apps
On Thu, Feb 16, 2006 at 10:44:47AM -0800, Mike Kuhnkey wrote:> Page 43: Gotcha: Unsporting apps > Last Bullet: > Can still use the pid provider to instrument instructdions in stripped functions by using "-" as the probe function and the address of the instruction as the name: > #dtrace -n pid123::-:80704e3 > > How does one begin to discover the "address"?Presumably from a stack trace, or via disassembing one of the (non-static) callers, and computing it from the "call" instruction. Cheers, - jonathan -- Jonathan Adams, Solaris Kernel Development