* Stack trace during binary file execution
@ 2023-01-15 0:09 empty
0 siblings, 0 replies; only message in thread
From: empty @ 2023-01-15 0:09 UTC (permalink / raw)
To: gdb
[-- Attachment #1: Type: text/plain, Size: 832 bytes --]
Hello. I apologize for my English, which I do not know =). This text is
machine translation.
I am interested in the possibility of implementing function call
tracing. I found a similar utility - strace, which provides a trace of
system calls. But this system call tracing is limited, allowing you to
track user functions only indirectly. Therefore, the question is: is it
possible to implement such a utility? If possible, are there any
restrictions for this?
The question is not really about pve, but I don't know where else to
get information on this issue (I didn't get an answer on stackoverflow).
To study the topic, I studied a little the logic of strace, which works
through ptrace, but I'm not quite sure yet.
If I am writing in the wrong place, then please correct who I can
contact for a little information.
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2023-01-15 0:09 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-01-15 0:09 Stack trace during binary file execution empty
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).