Associated article: Tracing BSD System Calls
Published source code accompanying the article by Sean Eric Fagan in which he discusses how you can debug a program that doesn't have source or debugging symbols. One way is to watch the system calls it makes. Sean's "truss" utility lets you do exactly this. Also see TRUSS.ZIP.
Tracing BSD System Calls by Sean Eric Fagan Example 1: garth% truss echo "Hello, World" returns 0x0 (0) SYSCALL fstat 0x1 0xefbfd7ec returns 0x0 (0) SYSCALL readlink 0x6cac 0xefbfd7d8 0x3f errno 2 'No such file or directory' SYSCALL __...