A utility to trace the system calls of a program

Edit Package strace

With strace, you can trace the activity of a program. Information
about any system calls the program makes and the signals it receives
and processes can be seen. Child processes can also be tracked.

Refresh
Refresh
Source Files
Filename Size Changed
baselibs.conf 0000000761 761 Bytes
strace-6.12.tar.xz 0002628804 2.51 MB
strace-6.12.tar.xz.asc 0000000801 801 Bytes
strace.changes 0000113704 111 KB
strace.keyring 0000016254 15.9 KB
strace.spec 0000002704 2.64 KB
Latest Revision
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1225014 from Andreas Schwab's avatar Andreas Schwab (Andreas_Schwab) (revision 110)
- Update to strace 6.12
  * Implemented decoding of EPIOCGPARAMS and EPIOCSPARAMS ioctl commands.
  * Implemented decoding of NS_GET_MNTNS_ID, NS_GET_PID_FROM_PIDNS,
    NS_GET_TGID_FROM_PIDNS, NS_GET_PID_IN_PIDNS, NS_GET_TGID_IN_PIDNS,
    NS_MNT_GET_INFO, NS_MNT_GET_NEXT, and NS_MNT_GET_PREV ioctl commands.
  * Implemented decoding of FRA_DSCP netlink attribute.
  * Implemented decoding of IORING_REGISTER_CLOCK and
    IORING_REGISTER_CLONE_BUFFERS opcodes of io_uring_register syscall.
  * Updated decoding of struct landlock_ruleset_attr.
  * Updated lists of AUDIT_*, ETHTOOL_*, F_*, IORING_*, LSM_*, MAP_*, MSG_*,
    NT_*, SCHED_*, SCM_*, SO_*, and V4L2_* constants.
  * Updated lists of ioctl commands from Linux 6.12.
  * Fix the syscall name printed by strace when PTRACE_GET_SYSCALL_INFO
    is in use and a syscall is restarted by a just attached tracee using
    restart_syscall mechanism. (forwarded request 1225012 from Andreas_Schwab)
Comments 0
openSUSE Build Service is sponsored by