recentpopularlog in


« earlier   
Intercepting and Emulating Linux System Calls with Ptrace « null program
The ptrace(2) (“process trace”) system call is usually associated with debugging. It’s the primary mechanism through which native debuggers monitor debuggees on unix-like systems. It’s also the usual approach for implementing strace — system call trace. With Ptrace, tracers can pause tracees, inspect and set registers and memory, monitor system calls, or even intercept system calls.
ptrace  strace  debugging  linux 
7 weeks ago by euler

Copy this bookmark:

to read