Hi.
I needed a tool to trace system calls blocked by seccomp filter of given
process.
It turned out that neither strace nor ltrace has such functionality.
Ltrace seemed to be simpler to modify :)
So I've added cooperation with seccomp to ltrace and enhanced summary a
little.
If you are
Adam Malinowski a.malinow...@partner.samsung.com writes:
Seccomp is kernel tool which can filter system calls and perform
OK, thanks for that.
So what i did with ltrace? I added new setting to ptrace which enables
seccomp events, also I added seccomp events handling and added
I imagine
Hi.
What happened from version 0.5.3 (Ubuntu) with printing strings in
syscalls arguments?
0.5.3 is ancient, ltrace really ought to be rebased to 0.7 (where this
works per my testing). One thing worth checking would be whether ltrace
sees /etc/ltrace.conf (stracing ltrace is a way to see