A utility to trace the system calls of a program
With strace, you can trace the activity of a program. Information
about any system calls the program makes and the signals it receives
and processes can be seen. Child processes can also be tracked.
- Developed at devel:tools
- Sources inherited from project openSUSE:Factory
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory:zSystems/strace && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
baselibs.conf | 0000000761 761 Bytes | |
strace-5.18.tar.xz | 0002307412 2.2 MB | |
strace-5.18.tar.xz.asc | 0000000801 801 Bytes | |
strace.changes | 0000101642 99.3 KB | |
strace.keyring | 0000016254 15.9 KB | |
strace.spec | 0000002881 2.81 KB |
Revision 94 (latest revision is 106)
Dominique Leuenberger (dimstar_suse)
accepted
request 983690
from
Andreas Schwab (AndreasSchwab)
(revision 94)
- Update to strace 5.18 * Improvements * Added an interface of raising des Strausses awareness. * Added --tips option to print strace tips, tricks, and tweaks at the end of the tracing session. * Enhanced decoding of bpf and io_uring_register syscalls. * Implemented decoding of COUNTER_*, RTC_PARAM_GET, and RTC_PARAM_SET ioctl commands. * Updated lists of BPF_*, BR_*, BTRFS_*, IFA_*, IFLA_*, IORING_*, KEY_*, KVM_*, MADV_*, and UFFD_* constants. * Updated lists of ioctl commands from Linux 5.18. * Bug fixes * Fixed printing of the updated value of union bpf_attr.next_id on the exiting of bpf(BPF_*_GET_NEXT_ID) calls. - tests-ptrace.patch: Dropped (forwarded request 983689 from AndreasSchwab)
Comments 0