Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

sotruss(1) [linux man page]

SOTRUSS(1)                                                         User Commands                                                        SOTRUSS(1)

NAME
sotruss - trace shared library calls through PLT SYNOPSIS
sotruss [OPTION...] [--] EXECUTABLE [EXECUTABLE-OPTION...] DESCRIPTION
sotruss is a small wrapper around ld.so that runs the specified executable until it exits. It intercepts and produce a trace of the dynamic library calls which are called by the executed process via the Procedure Linkage Table (PLT). It outputs the caller, the calle and the parameters as each call is executed. OPTIONS
-F, --from FROMLIST Trace calls from objects on FROMLIST. -T, --to TOLIST Trace calls to objects on TOLIST. -e, --exit Also show exits from the function calls. -f, --follow Trace child processes as they are created by currently traced processes as a result of the fork(2) system call. -o, --output FILENAME Write output to FILENAME (or FILENAME. in case -f is also used) instead of standard error. -?, --help Give this help list --usage Give a short usage message --version Print program version AUTHOR
Written by Ulrich Drepper. COPYRIGHT
Copyright (C) 2013 Free Software Foundation, Inc. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICU- LAR PURPOSE. SEE ALSO
ld.so(8). sotruss May 2014 SOTRUSS(1)

Check Out this Related Man Page

whocalls(1)							   User Commands						       whocalls(1)

NAME
whocalls - report on the calls to a specific procedure SYNOPSIS
whocalls [-l wholib] [-s] funcname executable [arguments]... DESCRIPTION
whocalls is a simple example of a utility based on the Link-Auditing functionality of ld.so.1(1) that permits the tracking of a given func- tion call. See the Linker and Libraries Guide for a detailed description of the Link-Auditing mechanism. The executable is run as normal with any associated arguments. Each time the procedure funcname is called, both the arguments to that procedure and a stack trace are dis- played on standard output. OPTIONS
The following options are supported: -l wholib Specifies an alternate who.so Link-Auditing library to use. -s When available, examines and uses the .symtab symbol table for local symbols. This is a little more expensive than using the .dynsym symbol table, but can produce more detailed stack trace information. EXAMPLES
Example 1 Tracking Function Calls The following example tracks the calls to printf() made by a simple helloworld program: example% whocalls printf helloworld printf(0x106e4, 0xef625310, 0xef621ba8) helloworld:main+0x10 helloworld:_start+0x5c Hello World ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWtoo | +-----------------------------+-----------------------------+ SEE ALSO
ld.so.1(1), sotruss(1), attributes(5) Linker and Libraries Guide SunOS 5.11 3 Jul 2007 whocalls(1)
Man Page

6 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

grep Question

I have a file which loads procedure/function into ORACLE.Top of the file contains 3 rows which is FILENAME, FILETYPE AND COMMENTS and then the function/procedure etc. FILENAME: FILETYPE: COMMENTS: <Function/Procedure etc> The Filename,FILETYPE, COMMENTS will be entered by the dba which... (10 Replies)
Discussion started by: yerra
10 Replies

2. Shell Programming and Scripting

easy script

a script, cheer that prints its parameter as shown in the example below. eg: $ cheer U N I X Give me a U! U! Give me a N! N! Give me a I! I! Give me a X! X! #!/bin/sh for letter do echo "Give me a $letter!";echo "$letter!" done this is the code i used for the above script (2 Replies)
Discussion started by: problems
2 Replies

3. AIX

How to intercept sytem calls

I would like to port a small utility from Linux to AIX and, lacking any software development knowledge for AIX, need some help: I have a library called Snoopy. Basically it intercepts the execv() and execve() system calls and logs them to the syslog-facility AUTHPRIV then passes control over to... (1 Reply)
Discussion started by: bakunin
1 Replies

4. Programming

exit in cpp

In a program if we call exit(0), it exits the program and before that it closes all opened stream. In C++, it even does destroys the created objects. Is there any function available, which if called will do some basic clean ups (which includes object destruction) ??? (4 Replies)
Discussion started by: lipun4u
4 Replies

5. Shell Programming and Scripting

A silly question

FILENAME is a variable. Is there really any difference between "$FILENAME.sh" and "$FILENAME".sh ? (5 Replies)
Discussion started by: proactiveaditya
5 Replies

6. UNIX for Advanced & Expert Users

SpinLocks usage example

Give me an example where only the spinlocks can be used and no mutexes. (2 Replies)
Discussion started by: rupeshkp728
2 Replies