I used this attaching to my mud while it was running several times... (ltrace -p mud-pid), and discovered an overwhelming number of calls to random and strncmp... so I tried to filter out the random calls (ltrace -e !random ...) (actually, ltrace -e \!random ...) and got no output... so I tried to view ONLY the random calls (ltrace -e random ...) and noticed that even after I kill -9'd the ltrace, my mud had ceased responding. I suspect that this is caused by ltrace attaching to the process and not being able to properly detach upon a kill -9, but I'm only guessing. User beware. Other than that little problem, I can envision several good uses for this. George, thank you for telling us about it. At 07:33 PM 2/24/99 -0800, you wrote: >If you've used Linux, you probably know about 'strace' to see all of the >kernel system calls a function does. Well, there's a software package for >Linux now that will trace the _C_library_ function calls. Obviously, this >is much handier. > [snip] >Important info: > >"4. Where does it work >--------------------- >At the time of writting, it works only with ELF32 executables. It only >works in Linux, and it only works on i386, m68k, and ARM processors." > >For more information, see: > >ftp://ftp.debian.org/debian/dists/unstable/main/source/utils/ltrace_* +------------------------------------------------------------+ | Ensure that you have read the CircleMUD Mailing List FAQ: | | http://qsilver.queensu.ca/~fletchra/Circle/list-faq.html | +------------------------------------------------------------+
This archive was generated by hypermail 2b30 : 12/15/00 PST