A utility to trace the system calls of a program
With strace, you can trace the activity of a program. Information
about any system calls the program makes and the signals it receives
and processes can be seen. Child processes can also be tracked.
- Developed at devel:tools
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory/strace && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
baselibs.conf | 0000000761 761 Bytes | |
strace-6.3.tar.xz | 0002382284 2.27 MB | |
strace-6.3.tar.xz.asc | 0000000801 801 Bytes | |
strace.changes | 0000105500 103 KB | |
strace.keyring | 0000016254 15.9 KB | |
strace.spec | 0000002880 2.81 KB |
Revision 99 (latest revision is 105)
Dominique Leuenberger (dimstar_suse)
accepted
request 1085587
from
Andreas Schwab (AndreasSchwab)
(revision 99)
- Update to strace 6.3 * Implemented --trace-fds=set option for filtering only the syscalls that operate on the specified set of file descriptors. * Implemented --decode-fds=signalfd option for decoding of signal masks associated with signalfd file descriptors. * Implemented --syscall-limit option to automatically detach tracees after capturing the specified number of syscalls. * Implemented --argv0 option to set argv[0] of the command being executed. * Implemented decoding of PR_GET_MDWE and PR_SET_MDWE operations of prctl syscall. * Implemented decoding of IP_LOCAL_PORT_RANGE socket option. * Implemented decoding of IFLA_BRPORT_MCAST_N_GROUPS, IFLA_BRPORT_MCAST_MAX_GROUPS, IFLA_GSO_IPV4_MAX_SIZE, IFLA_GRO_IPV4_MAX_SIZE, and TCA_EXT_WARN_MSG netlink attributes. * Updated lists of F_SEAL_*, IFLA_*, IORING_*, MFD_*, NFT_*, TCA_*, and V4L2_PIX_FMT_* constants. * Updated lists of ioctl commands from Linux 6.3. * Fixed --status filtering when -c option is in use. (forwarded request 1085586 from AndreasSchwab)
Comments 0