This summer, as a part of his GSoC 2016 project, Nahim El Atmani has
implemented[1] a prototype of syscall fault injection. Fault injection is a
testing/debugging technique which tampers the system calls made by a program in
order to check (correctness of) program's behaviour in presence of errors.
Hi,
On Tue, Oct 18, 2016 at 01:42:44PM +0200, Thomas De Schampheleire wrote:
> From: Thomas De Schampheleire
>
> Commit dc427d50d96b15c9a64d7e78d97ce4d194622a63 enabled a number of extra
> warning flags through configure.ac. The configure script will determine
> dynamically if CC supports these
On Thu, Oct 27, 2016 at 01:03:36PM +0800, ChenJingPiao wrote:
> From d8b52c3ac997dff046e1536d692f55cd470f72d8 Mon Sep 17 00:00:00 2001
> From: ChenJingPiao
> Date: Thu, 27 Oct 2016 12:25:33 +0800
> Subject: [PATCH] tests: check decoding of gettid syscall.
As one of many zero argument syscalls, ge
On Thu, Oct 27, 2016 at 01:03:00PM +0800, ChenJingPiao wrote:
> Hi, I am a newbies, this is my first test add in strace,
> if something wrong, please tell me. And is it necessary
> to implement user manage related syscalls on strace -e?
> such as: getuid, setuid, getgid, setgid, getegid, setegid,
>
Hi,
On Wed, Oct 26, 2016 at 10:42:15PM +0530, Saurav Sachidanand wrote:
> Hello strace team,
>
> I'm Saurav Sachidanand, a CS sophomore from India. I'm interested in
> systems programming (with C, Rust), and I have a couple of projects on
> Github (github.com/saurvs). I'd like to begin contributi