On Thursday 07 July 2011, John Reiser wrote:
> > I have a binary file what i compile it with -g.So i need to perform a
> > set of action in my computer and see behavior of my file, This mean , i
> > need to see functions of run when i perform those set of actions,
> 
> This sounds like some kind of profiling.  Re-compile and re-link with
> "gcc -p" or "gcc -pg".  If you cannot re-compile, then perhaps try
> "strace -i" or "ltrace -i" which will give you partial information.
> You'll need to do some work to process the instruction addresses,
> and you might have to perform a short backtrace (either dynamic or
> static) to get interesting intformation.
> 
> More generally, write a utility program which reads your original binary
> program, then writes a new binary program having each static call:
>       call subr1
> replaced with an indirection:
>       call *indir1
>       .section indir_section
>   indir1: .addr subr1
> Then change the contents of location indir1 dynamically at run time:
> point it to a logging subroutine for a while, etc.
> [This won't track existing indirect calls, but perhaps those can
> be ignored for a while.]

valgrind --tool=callgrind --ct-verbose=1 ...

Hmm?




------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
Valgrind-users mailing list
Valgrind-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/valgrind-users

Reply via email to