Home
last modified time | relevance | path

Searched full:opensnoop (Results 1 – 25 of 27) sorted by relevance

12

/external/bcc/man/man8/
Dopensnoop.81 .TH opensnoop 8 "2020-02-20" "USER COMMANDS"
3 opensnoop \- Trace open() syscalls. Uses Linux eBPF/bcc.
5 .B opensnoop.py [\-h] [\-T] [\-U] [\-x] [\-p PID] [\-t TID] [\-u UID]
9 opensnoop traces the open() syscall, showing which processes are attempting
68 .B opensnoop
72 .B opensnoop -d 10
76 .B opensnoop \-T
80 .B opensnoop \-U
84 .B opensnoop \-x
88 .B opensnoop \-p 181
[all …]
Dshmsnoop.874 opensnoop(1)
Dbashreadline.861 opensnoop(8)
Dttysnoop.866 opensnoop(1)
Dspfdsnoop.885 opensnoop(1)
Dfilelife.872 opensnoop(1)
Dkillsnoop.890 opensnoop(8), funccount(8)
Dstatsnoop.891 opensnoop(1)
Dexecsnoop.8149 opensnoop(1)
/external/bcc/tools/
Dopensnoop_example.txt1 Demonstrations of opensnoop, the Linux eBPF/bcc version.
4 opensnoop traces the open() syscall system-wide, and prints various details.
7 # ./opensnoop
46 opensnoop can be useful for discovering configuration and log files, if used
53 ./opensnoop -Tp 1956
70 # ./opensnoop -U
80 # ./opensnoop -Uu 1000
91 # ./opensnoop -x
116 # ./opensnoop -d 2
127 # ./opensnoop -n ed
[all …]
Dopensnoop.py4 # opensnoop Trace open() syscalls.
7 # USAGE: opensnoop [-h] [-T] [-x] [-p PID] [-d DURATION] [-t TID] [-n NAME]
28 ./opensnoop # trace all open() syscalls
29 ./opensnoop -T # include timestamps
30 ./opensnoop -U # include UID
31 ./opensnoop -x # only show failed opens
32 ./opensnoop -p 181 # only trace PID 181
33 ./opensnoop -t 123 # only trace TID 123
34 ./opensnoop -u 1000 # only trace UID 1000
35 ./opensnoop -d 10 # trace for 10 seconds only
[all …]
Dsyscount_example.txt83 might be worth investigating with follow-up tools like opensnoop, execsnoop,
111 investigating with follow-up tools like opensnoop, execsnoop, or
Dstatsnoop_example.txt53 to opensnoop, which shows what files were actually opened.
/external/bcc/libbpf-tools/
Dopensnoop.c5 // Based on opensnoop(8) from BCC by Brendan Gregg and others.
17 #include "opensnoop.h"
18 #include "opensnoop.skel.h"
49 const char *argp_program_version = "opensnoop 0.1";
55 "USAGE: opensnoop [-h] [-T] [-U] [-x] [-p PID] [-t TID] [-u UID] [-d DURATION]\n"
59 " ./opensnoop # trace all open() syscalls\n"
60 " ./opensnoop -T # include timestamps\n"
61 " ./opensnoop -U # include UID\n"
62 " ./opensnoop -x # only show failed opens\n"
63 " ./opensnoop -p 181 # only trace PID 181\n"
[all …]
D.gitignore35 /opensnoop
Dopensnoop.bpf.c6 #include "opensnoop.h"
DMakefile47 opensnoop \
/external/bcc/tools/old/
Dopensnoop.py4 # opensnoop Trace open() syscalls.
7 # USAGE: opensnoop [-h] [-t] [-x] [-p PID]
20 ./opensnoop # trace all open() syscalls
21 ./opensnoop -t # include timestamps
22 ./opensnoop -x # only show failed opens
23 ./opensnoop -p 181 # only trace PID 181
/external/bcc/snap/
DREADME.md27 Now run a bcc tool, for example, to run opensnoop use:
29 sudo bcc.opensnoop
Dsnapcraft.yaml224 opensnoop:
225 command: bcc-wrapper opensnoop
/external/bcc/docs/
Dtutorial.md31 1. opensnoop
62 #### 1.2. opensnoop
65 # ./opensnoop
79 opensnoop prints one line of output for each open() syscall, including details.
81 …y, when they are constantly attempting to read files that do not exist. opensnoop gives you a quic…
Dspecial_filtering.md15 # ./opensnoop --cgroupmap /sys/fs/bpf/test01
/external/bcc/debian/
Dchangelog141 * support kfunc (faster kprobe) for vfsstat, klockstat and opensnoop
154 * cgroupmap based cgroup filtering for opensnoop, execsnoop and bindsnoop.
/external/bcc/
DREADME.md140 - tools/[opensnoop](tools/opensnoop.py): Trace open() syscalls. [Examples](tools/opensnoop_example.…
/external/bcc/tests/python/
Dtest_tools_smoke.py276 self.run_with_int("opensnoop.py")

12