On Thursday 07 July 2011, John Reiser wrote: > > I have a binary file what i compile it with -g.So i need to perform a > > set of action in my computer and see behavior of my file, This mean , i > > need to see functions of run when i perform those set of actions, > > This sounds like some kind of profiling. Re-compile and re-link with > "gcc -p" or "gcc -pg". If you cannot re-compile, then perhaps try > "strace -i" or "ltrace -i" which will give you partial information. > You'll need to do some work to process the instruction addresses, > and you might have to perform a short backtrace (either dynamic or > static) to get interesting intformation. > > More generally, write a utility program which reads your original binary > program, then writes a new binary program having each static call: > call subr1 > replaced with an indirection: > call *indir1 > .section indir_section > indir1: .addr subr1 > Then change the contents of location indir1 dynamically at run time: > point it to a logging subroutine for a while, etc. > [This won't track existing indirect calls, but perhaps those can > be ignored for a while.]
valgrind --tool=callgrind --ct-verbose=1 ... Hmm? ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2d-c2 _______________________________________________ Valgrind-users mailing list Valgrind-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/valgrind-users