Home
last modified time | relevance | path

Searched full:execsnoop (Results 1 – 10 of 10) sorted by relevance

/external/bcc/man/man8/
Dexecsnoop.81 .TH execsnoop 8 "2016-02-07" "USER COMMANDS"
3 execsnoop \- Trace new processes via exec() syscalls. Uses Linux eBPF/bcc.
5 .B execsnoop [\-h] [\-t] [\-x] [\-n NAME] [\-l LINE]
7 execsnoop traces new processes, showing the filename executed and argument
13 exec(), eg, for worker processes, which won't be included in the execsnoop
49 .B execsnoop
53 .B execsnoop \-t
57 .B execsnoop \-x
61 .B execsnoop \-q
65 .B execsnoop \-n mount
[all …]
/external/bcc/tools/
Dexecsnoop_example.txt1 Demonstrations of execsnoop, the Linux eBPF/bcc version.
4 execsnoop traces new processes. For example, tracing the commands invoked when
7 # ./execsnoop
26 processes, which won't be included in the execsnoop output.
31 # ./execsnoop -x
58 # ./execsnoop -tn mount
67 # ./execsnoop.py -l testpkg
81 # ./execsnoop -h
82 usage: execsnoop [-h] [-t] [-x] [-n NAME] [-l LINE] [--max-args MAX_ARGS]
98 ./execsnoop # trace all exec() syscalls
[all …]
Dexecsnoop.py4 # execsnoop Trace new processes via exec() syscalls.
7 # USAGE: execsnoop [-h] [-t] [-x] [-n NAME]
31 ./execsnoop # trace all exec() syscalls
32 ./execsnoop -x # include failed exec()s
33 ./execsnoop -t # include timestamps
34 ./execsnoop -q # add "quotemarks" around arguments
35 ./execsnoop -n main # only print command lines containing "main"
36 ./execsnoop -l tpkg # only print command where arguments contains "tpkg"
Dsyscount_example.txt83 might be worth investigating with follow-up tools like opensnoop, execsnoop,
111 investigating with follow-up tools like opensnoop, execsnoop, or
/external/bcc/snapcraft/
Dsnapcraft.yaml90 execsnoop:
91 command: wrapper execsnoop
92 aliases: [execsnoop]
/external/bcc/docs/
Dtutorial.md5 It is assumed for this tutorial that bcc is already installed, and you can run tools like execsnoop
30 1. execsnoop
44 #### 1.1 execsnoop
47 # ./execsnoop
56 execsnoop prints one line of output for each new process. Check for short-lived processes. These ca…
/external/bcc/
DFAQ.txt44 File "./execsnoop", line 20, in <module>
DREADME.md106 - tools/[execsnoop](tools/execsnoop.py): Trace new processes via exec() syscalls. [Examples](tools/…
DINSTALL.md386 sudo /usr/share/bcc/tools/execsnoop
/external/bcc/tests/python/
Dtest_tools_smoke.py149 self.run_with_int("execsnoop.py")