Eugene Syromyatnikov 39f61ef513 bpf: decode BPF_PROG_QUERY command
BPF_PROG_QUERY was introduced in Linux commit v4.15-rc1~84^2~558^2~6.

* xlat/bpf_commands.in (BPF_PROG_QUERY): New constant.
* xlat/bpf_query_flags.in: New file.
* bpf.c: Include it.
(DECL_BPF_CMD_DECODER): Add priv argument for passing tcb private data.
(BEGIN_BPF_CMD_DECODER(BPF_PROG_QUERY)): New function.
(SYS_FUNC(bpf)) <bpf_cmd_decoders>: Add BPF_PROG_QUERY entry.
(SYS_FUNC(bpf)): Fetch buf on entering and exiting, pass buf on exiting,
retrieve private data on exiting, pass it to decoder as well, explicitly
rework rc handling logic for size argument printing.
* bpf_attr.h (struct BPF_PROG_QUERY_struct): New structure declaration.
(BPF_PROG_QUERY_struct_size, expected_BPF_PROG_QUERY_struct_size): New
macro.
* tests/bpf.c: Add checks for BPF_PROG_QUERY command.
2018-04-10 03:38:10 +00:00
2018-04-04 20:32:42 +00:00
2018-04-05 01:40:00 +00:00
2018-04-05 01:40:00 +00:00
2017-06-17 22:54:08 +00:00
2018-04-10 03:38:10 +00:00
2018-04-10 03:38:10 +00:00
2018-01-07 03:11:21 +00:00
2015-07-20 22:03:07 +00:00
2018-02-13 22:00:00 +00:00
2018-03-28 04:29:22 +00:00
2018-02-13 22:00:00 +00:00
2017-05-22 17:33:51 +00:00
2018-04-05 01:40:00 +00:00
2018-04-10 03:38:10 +00:00
2017-07-08 01:49:00 +00:00
2017-07-08 01:49:00 +00:00
2018-04-10 03:38:10 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2009-07-08 21:01:21 +00:00
2015-07-20 22:03:07 +00:00
2018-02-15 11:07:03 +00:00
2018-02-13 22:00:00 +00:00
2017-07-24 12:10:54 +00:00
2017-07-24 12:10:54 +00:00
2018-04-05 01:40:00 +00:00
2017-12-14 00:05:04 +00:00
2015-08-28 08:46:23 +00:00
2017-05-22 17:33:51 +00:00
2018-04-05 01:40:00 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-09-05 10:09:10 +02:00
2017-05-22 17:33:51 +00:00
2017-09-05 10:09:10 +02:00
2018-02-13 22:00:00 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-09-05 10:09:10 +02:00
2017-05-22 17:33:51 +00:00
2018-04-05 01:40:00 +00:00
2017-05-22 17:33:51 +00:00
2017-09-05 10:09:10 +02:00
2017-03-05 16:29:41 +00:00
2017-06-17 22:54:08 +00:00
2018-04-05 01:40:00 +00:00
2017-06-17 22:54:08 +00:00
2015-11-22 23:10:12 +00:00
2018-02-13 22:00:00 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-09-17 12:04:11 +00:00
2017-06-17 22:54:08 +00:00
2018-03-29 16:00:18 +00:00
2017-05-22 17:33:51 +00:00
2018-04-05 01:40:00 +00:00
2018-04-05 01:40:00 +00:00
2018-04-05 01:40:00 +00:00
2018-04-01 13:14:15 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2018-02-26 23:22:24 +00:00
2018-02-13 22:00:00 +00:00
2017-05-22 17:33:51 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2018-04-05 01:40:00 +00:00
2015-09-16 00:14:55 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2018-04-05 01:40:00 +00:00
2018-04-05 12:13:14 +00:00
2018-04-05 01:40:00 +00:00
2016-12-27 23:32:44 +00:00
2017-06-17 22:54:08 +00:00
2017-05-22 17:33:51 +00:00
2018-02-13 22:00:00 +00:00
2017-06-17 22:54:08 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2016-12-26 10:43:35 +00:00
2018-03-15 14:24:22 +00:00
2018-04-05 01:40:00 +00:00
2017-07-09 18:43:34 +00:00
2017-07-24 12:10:54 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2018-02-13 22:00:00 +00:00
2016-08-08 09:54:01 +00:00
2017-05-22 17:33:51 +00:00
2018-04-05 01:40:00 +00:00
2018-04-05 01:40:00 +00:00
2018-04-05 01:40:00 +00:00
2017-05-22 17:33:51 +00:00
2018-03-16 00:55:58 +00:00
2018-02-21 23:03:27 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2018-04-05 01:40:00 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2018-04-05 01:40:00 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2016-08-08 09:54:01 +00:00
2018-02-13 22:00:00 +00:00
2017-05-22 17:33:51 +00:00
2018-02-11 00:26:09 +00:00
2018-04-05 01:40:00 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2018-04-04 12:24:19 +00:00
2017-06-17 22:54:08 +00:00
2018-04-05 01:40:00 +00:00
2017-12-03 19:53:48 +01:00
2018-02-13 22:00:00 +00:00
2018-02-13 22:00:00 +00:00
2016-12-01 00:05:09 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-06-17 22:54:08 +00:00
2018-02-10 01:33:49 +00:00
2018-02-10 01:33:49 +00:00
2017-05-22 17:33:51 +00:00
2017-05-22 17:33:51 +00:00
2017-07-24 12:10:54 +00:00
2018-04-05 01:40:00 +00:00
2018-04-05 01:40:00 +00:00
2018-04-05 01:40:00 +00:00
2017-12-23 02:53:54 +00:00
2018-04-05 01:40:00 +00:00
2015-12-07 00:38:38 +00:00
2017-09-05 10:09:10 +02:00
2018-04-05 01:40:00 +00:00
2017-01-20 18:30:11 +00:00
2017-05-22 17:33:51 +00:00
2018-02-13 22:00:00 +00:00
2018-04-01 13:14:15 +00:00
2016-08-08 09:54:01 +00:00

strace - the linux syscall tracer

This is strace -- a diagnostic, debugging and instructional userspace utility with a traditional command-line interface for Linux. It is used to monitor and tamper with interactions between processes and the Linux kernel, which include system calls, signal deliveries, and changes of process state. The operation of strace is made possible by the kernel feature known as ptrace.

strace is released under a Berkeley-style license at the request of Paul Kranenburg; see the file COPYING for details.

See the file NEWS for information on what has changed in recent versions.

Please read the file INSTALL-git for installation instructions.

The user discussion and development of strace take place on the strace mailing list -- everyone is welcome to post bug reports, feature requests, comments and patches to strace-devel@lists.strace.io. The mailing list archives are available at https://lists.strace.io/pipermail/strace-devel/ and other archival sites.

The GIT repository of strace is available at GitHub and GitLab.

The latest binary strace packages are available in many repositories, including OBS, Fedora rawhide, and Sisyphus.

Build Status Code Coverage

Description
No description provided
Readme 17 MiB
Languages
C 92.2%
Shell 3.4%
M4 1.4%
Makefile 0.8%
Roff 0.7%
Other 1.5%