blob: 281a5851a6bd6b4bbc1e3de858fd52825a01bce1 [file] [log] [blame]
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001.\" Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
2.\" Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
3.\" Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
4.\" All rights reserved.
5.\"
6.\" Redistribution and use in source and binary forms, with or without
7.\" modification, are permitted provided that the following conditions
8.\" are met:
9.\" 1. Redistributions of source code must retain the above copyright
10.\" notice, this list of conditions and the following disclaimer.
11.\" 2. Redistributions in binary form must reproduce the above copyright
12.\" notice, this list of conditions and the following disclaimer in the
13.\" documentation and/or other materials provided with the distribution.
14.\" 3. The name of the author may not be used to endorse or promote products
15.\" derived from this software without specific prior written permission.
16.\"
17.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27.\"
28.\" $Id$
29.\"
30.de CW
31.sp
32.nf
33.ft CW
34..
35.de CE
Wichert Akkerman8829a551999-06-11 13:18:40 +000036.ft R
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000037.fi
38.sp
39..
40.TH STRACE 1 "96/02/13"
41.SH NAME
42strace \- trace system calls and signals
43.SH SYNOPSIS
44.B strace
45[
46.B \-dffhiqrtttTvxx
47]
48[
49.BI \-a column
50]
51[
52.BI \-e expr
53]
54\&...
55[
56.BI \-o file
57]
58[
59.BI \-p pid
60]
61\&...
62[
63.BI \-s strsize
64]
65[
66.BI \-u username
67]
68[
69.I command
70[
71.I arg
72\&...
73]
74]
75.sp
76.B strace
77.B \-c
78[
79.BI \-e expr
80]
81\&...
82[
83.BI \-O overhead
84]
85[
86.BI \-S sortby
87]
88[
89.I command
90[
91.I arg
92\&...
93]
94]
95.SH DESCRIPTION
96.IX "strace command" "" "\fLstrace\fR command"
97.LP
98In the simplest case
99.B strace
100runs the specified
101.I command
102until it exits.
103It intercepts and records the system calls which are called
104by a process and the signals which are received by a process.
105The name of each system call, its arguments and its return value
106are printed on standard error or to the file specified with the
107.B \-o
108option.
109.LP
110.B strace
Nate Sammonsb4aa1131999-03-31 05:59:04 +0000111is a useful diagnostic, instructional, and debugging tool.
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000112System adminstrators, diagnosticians and trouble-shooters will find
113it invaluable for solving problems with
114programs for which the source is not readily available since
115they do not need to be recompiled in order to trace them.
116Students, hackers and the overly-curious will find that
117a great deal can be learned about a system and its system calls by
118tracing even ordinary programs. And programmers will find that
119since system calls and signals are events that happen at the user/kernel
120interface, a close examination of this boundary is very
121useful for bug isolation, sanity checking and
122attempting to capture race conditions.
123.LP
124Each line in the trace contains the system call name, followed
125by its arguments in parentheses and its return value.
126An example from stracing the command ``cat /dev/null'' is:
127.CW
128open("/dev/null", O_RDONLY) = 3
129.CE
130Errors (typically a return value of \-1) have the errno symbol
131and error string appended.
132.CW
133open("/foo/bar", O_RDONLY) = -1 ENOENT (No such file or directory)
134.CE
135Signals are printed as a signal symbol and a signal string.
136An excerpt from stracing and interrupting the command ``sleep 666'' is:
137.CW
138sigsuspend([] <unfinished ...>
139--- SIGINT (Interrupt) ---
140+++ killed by SIGINT +++
141.CE
142Arguments are printed in symbolic form with a passion.
143This example shows the shell peforming ``>>xyzzy'' output redirection:
144.CW
145open("xyzzy", O_WRONLY|O_APPEND|O_CREAT, 0666) = 3
146.CE
147Here the three argument form of open is decoded by breaking down the
148flag argument into its three bitwise-OR constituents and printing the
149mode value in octal by tradition. Where traditional or native
150usage differs from ANSI or POSIX, the latter forms are preferred.
Wichert Akkerman8829a551999-06-11 13:18:40 +0000151In some cases,
152.B strace
153output has proven to be more readable than the source.
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000154.LP
155Structure pointers are dereferenced and the members are displayed
156as appropriate. In all cases arguments are formatted in the most C-like
157fashion possible.
158For example, the essence of the command ``ls \-l /dev/null'' is captured as:
159.CW
160lstat("/dev/null", {st_mode=S_IFCHR|0666, st_rdev=makedev(1, 3), ...}) = 0
161.CE
162Notice how the `struct stat' argument is dereferenced and how each member is
163displayed symbolically. In particular, observe how the st_mode member
164is carefully decoded into a bitwise-OR of symbolic and numeric values.
165Also notice in this example that the first argument to lstat is an input
166to the system call and the second argument is an output. Since output
Wichert Akkerman8829a551999-06-11 13:18:40 +0000167arguments are not modified if the system call fails, arguments may not
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000168always be dereferenced. For example, retrying the ``ls \-l'' example
169with a non-existent file produces the following line:
170.CW
171lstat("/foo/bar", 0xb004) = -1 ENOENT (No such file or directory)
172.CE
173In this case the porch light is on but nobody is home.
174.LP
175Character pointers are dereferenced and printed as C strings.
176Non-printing characters in strings are normally represented by
177ordinary C escape codes.
178Only the first
179.I strsize
180(32 by default) bytes of strings are printed;
181longer strings have an ellipsis appended following the closing quote.
Wichert Akkerman8829a551999-06-11 13:18:40 +0000182Here is a line from ``ls \-l'' where the
183.B getpwuid
184library routine is reading the password file:
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000185.CW
186read(3, "root::0:0:System Administrator:/"..., 1024) = 422
187.CE
188While structures are annotated using curly braces, simple pointers
189and arrays are printed using square brackets with commas separating
190elements. Here is an example from the command ``id'' on a system with
191supplementary group ids:
192.CW
193getgroups(32, [100, 0]) = 2
194.CE
195On the other hand, bit-sets are also shown using square brackets
196but set elements are separated only by a space. Here is the shell
197preparing to execute an external command:
198.CW
199sigprocmask(SIG_BLOCK, [CHLD TTOU], []) = 0
200.CE
201Here the second argument is a bit-set of two signals, SIGCHLD and SIGTTOU.
202In some cases the bit-set is so full that printing out the unset
203elements is more valuable. In that case, the bit-set is prefixed by
204a tilde like this:
205.CW
206sigprocmask(SIG_UNBLOCK, ~[], NULL) = 0
207.CE
208Here the second argument represents the full set of all signals.
209.SH OPTIONS
210.TP 12
211.TP
212.B \-c
213Count time, calls, and errors for each system call and report a
214summary on program exit.
215.TP
216.B \-d
Wichert Akkerman8829a551999-06-11 13:18:40 +0000217Show some debugging output of
218.B strace
219itself on the standard error.
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000220.TP
221.B \-f
222Trace child processes as they are created by currently traced
Wichert Akkerman8829a551999-06-11 13:18:40 +0000223processes as a result of the
224.BR fork (2)
225system call. The new process is
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000226attached to as soon as its pid is known (through the return value of
Wichert Akkerman8829a551999-06-11 13:18:40 +0000227.BR fork (2)
228in the parent process). This means that such children may run
229uncontrolled for a while (especially in the case of a
230.BR vfork (2)),
231until the parent is scheduled again to complete its
232.RB ( v ) fork (2)
233call.
234If the parent process decides to
235.BR wait (2)
236for a child that is currently
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000237being traced, it is suspended until an appropriate child process either
238terminates or incurs a signal that would cause it to terminate (as
239determined from the child's current signal disposition).
240.TP
241.B \-ff
242If the
243.B \-o
244.I filename
245option is in effect, each processes trace is written to
246.I filename.pid
247where pid is the numeric process id of each process.
248.TP
249.B \-F
Wichert Akkerman8829a551999-06-11 13:18:40 +0000250Attempt to follow
251.BR vfork s.
252(On SunOS 4.x, this is accomplished with
Nate Sammonsccd8f211999-03-29 22:57:54 +0000253some dynamic linking trickery. On Linux, it requires some kernel
Wichert Akkerman8829a551999-06-11 13:18:40 +0000254functionality not yet in the standard kernel.) Otherwise,
255.BR vfork s
256will
Nate Sammonsccd8f211999-03-29 22:57:54 +0000257not be followed even if
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000258.B \-f
259has been given.
260.TP
261.B \-h
262Print the help summary.
263.TP
264.B \-i
265Print the instruction pointer at the time of the system call.
266.TP
267.B \-q
268Suppress messages about attaching, detaching etc. This happens
269automatically when output is redirected to a file and the command
270is run directly instead of attaching.
271.TP
272.B \-r
273Print a relative timestamp upon entry to each system call. This
274records the time difference between the beginning of successive
275system calls.
276.TP
277.B \-t
278Prefix each line of the trace with the time of day.
279.TP
280.B \-tt
281If given twice, the time printed will include the microseconds.
282.TP
283.B \-ttt
284If given thrice, the time printed will include the microseconds
285and the leading portion will be printed as the number
286of seconds since the epoch.
287.TP
288.B \-T
289Show the time spent in system calls. This records the time
290difference between the beginning and the end of each system call.
291.TP
292.B \-v
293Print unabbreviated versions of environment, stat, termios, etc.
294calls. These structures are very common in calls and so the default
295behavior displays a reasonable subset of structure members. Use
296this option to get all of the gory details.
297.TP
298.B \-V
Wichert Akkerman8829a551999-06-11 13:18:40 +0000299Print the version number of
300.BR strace .
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000301.TP
302.B \-x
Wichert Akkerman8829a551999-06-11 13:18:40 +0000303Print all non-ASCII strings in hexadecimal string format.
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000304.TP
305.B \-xx
306Print all strings in hexadecimal string format.
307.TP
308.BI "\-a " column
309Align return values in a secific column (default column 40).
310.TP
311.BI "\-e " expr
312A qualifying expression which modifies which events to trace
313or how to trace them. The format of the expression is:
Wichert Akkerman8829a551999-06-11 13:18:40 +0000314.RS 15
315.IP
316[\fIqualifier\fB=\fR][\fB!\fR]\fIvalue1\fR[\fB,\fIvalue2\fR]...
317.RE
318.IP
319where
320.I qualifier
321is one of
322.BR trace ,
323.BR abbrev ,
324.BR verbose ,
325.BR raw ,
326.BR signal ,
327.BR read ,
328or
329.B write
330and
331.I value
332is a qualifier-dependent symbol or number. The default
333qualifier is
334.BR trace .
335Using an exclamation mark negates the set of values. For example,
336.B \-eopen
337means literally
338.B "\-e trace=open"
339which in turn means trace only the
340.B open
341system call. By contrast,
342.B "\-etrace=!open"
343means to trace every system call except
344.BR open .
345In addition, the special values
346.B all
347and
348.B none
349have the obvious meanings.
350.IP
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000351Note that some shells use the exclamation point for history
Wichert Akkerman8829a551999-06-11 13:18:40 +0000352expansion even inside quoted arguments. If so, you must escape
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000353the exclamation point with a backslash.
354.TP
355.BI "\-e trace=" set
356Trace only the specified set of system calls. The
357.B \-c
358option is useful for determining which system calls might be useful
Wichert Akkerman8829a551999-06-11 13:18:40 +0000359to trace. For example,
360.B trace=open,close,read,write
361means to only
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000362trace those four system calls. Be careful when making inferences
363about the user/kernel boundary if only a subset of system calls
Wichert Akkerman8829a551999-06-11 13:18:40 +0000364are being monitored. The default is
365.BR trace=all .
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000366.TP
367.B "\-e trace=file"
368Trace all system calls which take a file name as an argument. You
369can think of this as an abbreviation for
Wichert Akkerman8829a551999-06-11 13:18:40 +0000370.BR "\-e\ trace=open,stat,chmod,unlink," ...
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000371which is useful to seeing what files the process is referencing.
372Furthermore, using the abbreviation will ensure that you don't
373accidentally forget to include a call like
374.B lstat
375in the list. Betchya woulda forgot that one.
376.TP
377.B "\-e trace=process"
378Trace all system calls which involve process management. This
379is useful for watching the fork, wait, and exec steps of a process.
380.TP
381.B "\-e trace=network"
382Trace all the network related system calls.
383.TP
384.B "\-e trace=signal"
385Trace all signal related system calls.
386.TP
387.B "\-e trace=ipc"
388Trace all IPC related system calls.
389.TP
390.BI "\-e abbrev=" set
391Abbreviate the output from printing each member of large structures.
Wichert Akkerman8829a551999-06-11 13:18:40 +0000392The default is
393.BR abbrev=all .
394The
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000395.B \-v
Wichert Akkerman8829a551999-06-11 13:18:40 +0000396option has the effect of
397.BR abbrev=none .
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000398.TP
399.BI "\-e verbose=" set
400Dereference structures for the specified set of system calls. The
Wichert Akkerman8829a551999-06-11 13:18:40 +0000401default is
402.BR verbose=all .
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000403.TP
404.BI "\-e raw=" set
405Print raw, undecoded arguments for the specifed set of system calls.
406This option has the effect of causing all arguments to be printed
407in hexadecimal. This is mostly useful if you don't trust the
408decoding or you need to know the actual numeric value of an
409argument.
410.TP
411.BI "\-e signal=" set
Wichert Akkerman8829a551999-06-11 13:18:40 +0000412Trace only the specified subset of signals. The default is
413.BR signal=all .
414For example,
415.B signal=!SIGIO
416(or
417.BR signal=!io )
418causes SIGIO signals not to be traced.
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000419.TP
420.BI "\-e read=" set
Wichert Akkerman8829a551999-06-11 13:18:40 +0000421Perform a full hexadecimal and ASCII dump of all the data read from
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000422file descriptors listed in the specified set. For example, to see
423all input activity on file descriptors 3 and 5 use
424.BR "\-e read=3,5" .
Wichert Akkerman8829a551999-06-11 13:18:40 +0000425Note that this is independent from the normal tracing of the
426.BR read (2)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000427system call which is controlled by the option
428.BR "\-e trace=read" .
429.TP
430.BI "\-e write=" set
Wichert Akkerman8829a551999-06-11 13:18:40 +0000431Perform a full hexadecimal and ASCII dump of all the data written to
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000432file descriptors listed in the specified set. For example, to see
433all output activity on file descriptors 3 and 5 use
434.BR "\-e write=3,5" .
Wichert Akkerman8829a551999-06-11 13:18:40 +0000435Note that this is independent from the normal tracing of the
436.BR write (2)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000437system call which is controlled by the option
438.BR "\-e trace=write" .
439.TP
440.BI "\-o " filename
441Write the trace output to the file
442.I filename
443rather than to stderr.
444Use
445.I filename.pid
446if
447.B \-ff
448is used.
449If the argument begins with `|' or with `!' then the rest of the
450argument is treated as a command and all output is piped to it.
451This is convenient for piping the debugging output to a program
452without affecting the redirections of executed programs.
453.TP
454.BI "\-O " overhead
Wichert Akkerman8829a551999-06-11 13:18:40 +0000455Set the overhead for tracing system calls to
456.I overhead
457microseconds.
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000458This is useful for overriding the default heuristic for guessing
459how much time is spent in mere measuring when timing system calls using
460the
461.B \-c
462option. The acuracy of the heuristic can be gauged by timing a given
Wichert Akkerman8829a551999-06-11 13:18:40 +0000463program run without tracing (using
464.BR time (1))
465and comparing the accumulated
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000466system call time to the total produced using
Wichert Akkerman8829a551999-06-11 13:18:40 +0000467.BR \-c .
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000468.TP
469.BI "\-p " pid
470Attach to the process with the process
471.SM ID
472.I pid
473and begin tracing.
474The trace may be terminated
475at any time by a keyboard interrupt signal (\c
476.SM CTRL\s0-C).
477.B strace
478will respond by detaching itself from the traced process(es)
479leaving it (them) to continue running.
480Multiple
481.B \-p
482options can be used to attach to up to 32 processes in addition to
483.I command
484(which is optional if at least one
485.B \-p
486option is given).
487.TP
488.BI "\-s " strsize
489Specify the maximum string size to print (the default is 32). Note
490that filenames are not considered strings and are always printed in
491full.
492.TP
493.BI "\-S " sortby
494Sort the output of the histogram printed by the
495.B \-c
496option by the specified critereon. Legal values are
Wichert Akkerman8829a551999-06-11 13:18:40 +0000497.BR time ,
498.BR calls ,
499.BR name ,
500and
501.B nothing
502(default
503.BR time ).
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000504.TP
505.BI "\-u " username
Wichert Akkerman8829a551999-06-11 13:18:40 +0000506Run command with the user \s-1ID\s0, group \s-2ID\s0, and
507supplementary groups of
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000508.IR username .
509This option is only useful when running as root and enables the
510correct execution of setuid and/or setgid binaries.
511Unless this option is used setuid and setgid programs are executed
512without effective privileges.
513.SH "SETUID INSTALLATION"
514If
515.B strace
516is installed setuid to root then the invoking user will be able to
517attach to and trace processes owned by any user.
518In addition setuid and setgid programs will be executed and traced
519with the correct effective privileges.
520Since only users trusted with full root privileges should be allowed
521to do these things,
522it only makes sense to install
523.B strace
524as setuid to root when the users who can execute it are restricted
525to those users who have this trust.
526For example, it makes sense to install a special version of
Wichert Akkerman8829a551999-06-11 13:18:40 +0000527.B strace
528with mode `rwsr-xr--', user
529.B root
530and group
531.BR trace ,
532where members of the
533.B trace
534group are trusted users.
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000535If you do use this feature, please remember to install
Wichert Akkerman8829a551999-06-11 13:18:40 +0000536a non-setuid version of
537.B strace
538for ordinary lusers to use.
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000539.SH "SEE ALSO"
Wichert Akkerman8829a551999-06-11 13:18:40 +0000540.BR ptrace (2),
541.BR proc (4),
542.BR time (1),
543.BR trace (1),
544.BR truss (1)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000545.SH NOTES
546It is a pity that so much tracing clutter is produced by systems
547employing shared libraries.
548.LP
549It is instructive to think about system call inputs and outputs
550as data-flow across the user/kernel boundary. Because user-space
551and kernel-space are separate and address-protected, it is
552sometimes possible to make deductive inferences about process
553behavior using inputs and outputs as propositions.
554.LP
555In some cases, a system call will differ from the documented behavior
Wichert Akkerman8829a551999-06-11 13:18:40 +0000556or have a different name. For example, on System V-derived systems
557the true
558.BR time (2)
559system call does not take an argument and the
560.B stat
561function is called
562.B xstat
563and takes an extra leading argument. These
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000564discrepancies are normal but idiosyncratic characteristics of the
565system call interface and are accounted for by C library wrapper
566functions.
567.LP
568On some platforms a process that has a system call trace applied
569to it with the
570.B \-p
571option will receive a
572.BR \s-1SIGSTOP\s0 .
573This signal may interrupt a system call that is not restartable.
574This may have an unpredictable effect on the process
575if the process takes no action to restart the system call.
576.SH BUGS
577Programs that use the
578.I setuid
579bit do not have
580effective user
581.SM ID
582privileges while being traced.
583.LP
584A traced process ignores
585.SM SIGSTOP
Nate Sammonsb4aa1131999-03-31 05:59:04 +0000586except on SVR4 platforms.
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000587.LP
588A traced process which tries to block SIGTRAP will be sent a SIGSTOP
589in an attempt to force continuation of tracing.
590.LP
591A traced process runs slowly.
592.LP
593Traced processes which are descended from
594.I command
595may be left running after an interrupt signal (\c
596.SM CTRL\s0-C).
597.LP
598On Linux, exciting as it would be, tracing the init process is forbidden.
599.LP
600The
601.B \-i
602option is weakly supported.
603.SH HISTORY
604.B strace
Wichert Akkerman8829a551999-06-11 13:18:40 +0000605The original
606.B strace
607was written by Paul Kranenburg
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000608for SunOS and was inspired by its trace utility.
Wichert Akkerman8829a551999-06-11 13:18:40 +0000609The SunOS version of
610.B strace
611was ported to Linux and enhanced
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000612by Branko Lankester, who also wrote the Linux kernel support.
Wichert Akkerman8829a551999-06-11 13:18:40 +0000613Even though Paul released
614.B strace
6152.5 in 1992,
616Branko's work was based on Paul's
617.B strace
6181.5 release from 1991.
619In 1993, Rick Sladkey merged
620.B strace
6212.5 for SunOS and the second release of
622.B strace
623for Linux, added many of the features of
624.BR truss (1)
625from SVR4, and produced an
626.B strace
627that worked on both platforms. In 1994 Rick ported
628.B strace
629to SVR4 and Solaris and wrote the
630automatic configuration support. In 1995 he ported
631.B strace
632to Irix
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000633and tired of writing about himself in the third person.
634.SH PROBLEMS
635Problems with
636.B strace
637should be reported to the current
638.B strace
Wichert Akkermanf9d3dcb1999-05-15 00:29:13 +0000639maintainer, Wichert Akkerman, at <wakkerma@debian.org>.