From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-lf1-x132.google.com (mail-lf1-x132.google.com [IPv6:2a00:1450:4864:20::132]) by sourceware.org (Postfix) with ESMTPS id 8EC7A3858D32 for ; Sun, 15 Jan 2023 00:09:23 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 8EC7A3858D32 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-lf1-x132.google.com with SMTP id bp15so38078001lfb.13 for ; Sat, 14 Jan 2023 16:09:23 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:message-id:to:subject:from:date:from:to:cc:subject :date:message-id:reply-to; bh=DJnlVf/xkCS6UsEA+1jybN3q7k19RAgDl/tB0zevl98=; b=SV9GWl+kjhdQnWZY68UzKYGjPXcpV+V03ESxmoCwfaBMj97ggepf7V+sWx0rAToCyi Vvipu/usLSUOYPEf6JYhZQkDkne/7Z7ZL/SCawjnMBqQqS7dTBFjmlzY5iOdK/6N47wG qeYiq6utOpGX0ztG3yopbEetIBTmnuoG2+6ET9BriM0fxl63R7jxNUJfnAQWTgvaNbEG utE0IqdA0XmRJ9O4IH8UOoEpk63VldkLXcHgWsyWrvQF1d2NWMO99b/v5eVu3h4bICRA w4MtuXWRSWwNxO2f21YJkE4Slpt4G50tSpClJqITKCwCBN8qtfuBt1Y75wwFxYBFhCYD 57IQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=mime-version:message-id:to:subject:from:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=DJnlVf/xkCS6UsEA+1jybN3q7k19RAgDl/tB0zevl98=; b=4I+IjrFnOAH5fKIPXxWZGcBLGnYtAz6qKXBtM90Jo4nARDTYqlW4nyDeR80WrGjvjX M+cu+AnlPWcVQH/aeO70Zw5Cj6vHURGmX9+oj7drrM1JFDTDVrVQcdGnik0tnKR6Fwp5 xbw+2+j8VSQPQVNVD+so9WU6pgvE3n6tg5oUV5/hRkbMI2G0w9cPThhryOORof9/xVcw dvoRNUXTGrNIv4pYNJG5cGYXc+aryuMEDaVF31/k7aH6yjIrTmpDEyn7yiYNDsaJm8rN a/n0nBCew5gf7dpLzmu+A6CDa7BYZCBbcBX0pKnHmlSQ9VJP97OAivNd80I0r2bIfsSi Ke5Q== X-Gm-Message-State: AFqh2koYs2bf0+eJUZIM3sqJni4Mt8TG+j3jvjhkPf7L6iv4vhvcq1z/ zG8uT/ge/ZwxEVNBnjGfbFRkHgXVRqmEhDjJ X-Google-Smtp-Source: AMrXdXsc8l71H67eEwhPZWbsIfdrkBWyQDK1IWsEewmzdvi+NPdtRSbh/aa0PQHWxYRIkTY0wVcGmg== X-Received: by 2002:a05:6512:159b:b0:4b7:8291:d4b with SMTP id bp27-20020a056512159b00b004b782910d4bmr28267783lfb.13.1673741361600; Sat, 14 Jan 2023 16:09:21 -0800 (PST) Received: from [192.168.31.70] ([195.19.120.104]) by smtp.gmail.com with ESMTPSA id m2-20020a056512114200b004caf992bba9sm4463196lfg.268.2023.01.14.16.09.20 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 14 Jan 2023 16:09:21 -0800 (PST) Date: Sun, 15 Jan 2023 03:09:25 +0300 From: empty Subject: Stack trace during binary file execution To: gdb@sourceware.org Message-Id: X-Mailer: geary/40.0 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="=-yIuLKMKwhN5p224q96xT" X-Spam-Status: No, score=-1.5 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,HTML_MESSAGE,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: --=-yIuLKMKwhN5p224q96xT Content-Type: text/plain; charset=us-ascii; format=flowed Hello. I apologize for my English, which I do not know =). This text is machine translation. I am interested in the possibility of implementing function call tracing. I found a similar utility - strace, which provides a trace of system calls. But this system call tracing is limited, allowing you to track user functions only indirectly. Therefore, the question is: is it possible to implement such a utility? If possible, are there any restrictions for this? The question is not really about pve, but I don't know where else to get information on this issue (I didn't get an answer on stackoverflow). To study the topic, I studied a little the logic of strace, which works through ptrace, but I'm not quite sure yet. If I am writing in the wrong place, then please correct who I can contact for a little information. --=-yIuLKMKwhN5p224q96xT--