System call tracing and rewriting utility
A framework for observing and playing with the reality of software via system call tracing and rewriting. It's a foundation for building tools to do tracing, sandboxing, and many other things. You could think of it as "strace meets expect."
DocumentationUser tutorial available in HTML format from http://subterfugue.sourceforge.net/tutorial.html
released on 2 December 2001
1 February 2001
Leaders and contributors
Resources and communication
|Developer||VCS Repository Webview||http://sourceforge.net/cvs/?group_id=1951|
|Help||Mailing List Info/Archive||http://lists.sourceforge.net/mailman/listinfo/subterfugue-announce|
|Bug Tracking,Developer,Support||Mailing List Info/Archive||http://lists.sourceforge.net/mailman/listinfo/subterfugue-dev|
|Required to use||Python 1.5.2 or later|
|Required to use||Linux 2.3.99+ with patch or Linux 2.3.99-pre1+ without|
|Required to build||Python (with files for mobile development)|
This entry (in part or in whole) was last reviewed on 27 February 2018.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.