Dmitry V. Levin 7910ac9638 Treat execveat as an execve family syscall
* syscall.c (trace_syscall_entering): Clear hide_log_until_execve flag
also when SEN_execveat is encountered.
2016-11-26 16:08:10 +00:00
2016-10-05 06:19:41 +00:00
2016-09-08 22:56:25 +00:00
2015-07-20 22:03:07 +00:00
2009-07-08 21:01:21 +00:00
2015-07-20 22:03:07 +00:00
2013-05-17 23:18:55 +00:00
2015-11-25 19:10:56 +00:00
2016-11-16 17:26:58 +00:00
2016-01-08 18:53:27 +00:00
2015-08-28 08:46:23 +00:00
2016-08-15 21:08:56 +00:00
2016-11-13 11:04:49 +00:00
2015-07-20 22:03:07 +00:00
2015-07-20 22:03:07 +00:00
2016-05-30 00:29:14 +00:00
2012-02-25 15:29:21 +01:00
2015-11-22 23:10:12 +00:00
2015-11-22 23:10:12 +00:00
2016-07-22 19:28:06 +00:00
2016-05-29 22:58:56 +00:00
2016-07-18 22:12:45 +00:00
2015-09-16 00:14:55 +00:00
2016-11-16 17:26:58 +00:00
2016-10-29 02:54:02 +03:00
2016-10-31 00:49:28 +03:00
2016-05-25 16:36:37 +00:00
2016-06-21 16:56:21 +00:00
2016-11-20 22:39:29 +00:00
2016-11-16 17:26:58 +00:00
2016-10-05 06:19:41 +00:00
2016-04-07 01:15:58 +00:00
2016-09-08 22:56:25 +00:00
2016-09-08 22:56:25 +00:00
2016-06-18 22:53:25 +00:00
2016-05-07 23:37:53 +00:00
2015-12-07 00:38:38 +00:00
2016-07-26 16:14:50 +00:00
2016-11-11 17:53:44 +00:00
2015-08-28 08:46:23 +00:00

This is strace -- a diagnostic, debugging and instructional userspace utility for Linux. It is used to monitor interactions between processes and the Linux kernel, which include system calls, signal deliveries, and changes of process state. The operation of strace is made possible by the kernel feature known as ptrace.

strace is released under a Berkeley-style license at the request of Paul Kranenburg; see the file COPYING for details.

See the file NEWS for information on what has changed in recent versions.

Please send bug reports and enhancements to the strace mailing list.

Build Status Code Coverage

Description
No description provided
Readme 17 MiB
Languages
C 92.2%
Shell 3.4%
M4 1.4%
Makefile 0.8%
Roff 0.7%
Other 1.5%