[[email protected] ~]# cat user.stp
probe process(@1).function(@2){print_ubacktrace();exit();}
session 1 执行 stap user.stp "./a.out" "fun"
session 2 执行 [[email protected] ~]# ./a.out
session 1中打印显示结果
0x4004f9 : fun+0xb/0x12 [/root/a.out]
0x4004d7 : main+0x3f/0x56 [/root/a.out]
0x346881d9f4 [/lib64/libc-2.5.so+0x1d9f4/0x359000]
时间: 2024-08-08 17:30:57