xtrace is a tracing utility similar to truss and strace. It produces a trace of system or arbitrary function calls made by the specified process. Each line of a trace output shows either a system or a user function call details with arguments and return values. It has a few unique features, that does not provided by the other utilities. That features are:

How it works ?
The xtrace behaves similarly to any other utility, when the syscall trace requested. When the function trace requested, it behaves like gdb. Fist, xtrace scans the executable and all dependant libraries, and gets the list of functions from the ELF headers. Then, it puts the breakpoint instruction on the first instruction of specified functions. Therefore, it is possible to set the breakpoint on every function listed in the executable or dependant libraries. It is possible to set a breakpoint on all functions called by the executable. This gives a possibility to look under the hood - for example, see the functions that are called by the dynamic linker.

Supported platforms:

Working on support:

The xtrace project is hosted on SourceForge.net Logo

xtrace is written by Sergey Lyubka

little red fellow
Copyright (c) 2001-2002 devnull
$Id: main.php,v 1.5 2002/05/15 15:36:28 drozd Exp $