Searched full:execsnoop (Results 1 – 21 of 21) sorted by relevance
/aosp_15_r20/external/bcc/tools/ |
H A D | execsnoop_example.txt | 1 Demonstrations of execsnoop, the Linux eBPF/bcc version. 4 execsnoop traces new processes. For example, tracing the commands invoked when 7 # ./execsnoop 26 processes, which won't be included in the execsnoop output. 31 # ./execsnoop -x 59 # ./execsnoop -Ttn mount 68 # ./execsnoop.py -l testpkg 84 # ./execsnoop --cgroupmap /sys/fs/bpf/test01 90 # ./execsnoop -U 99 # ./execsnoop -Uu 1000 [all …]
|
H A D | execsnoop.py | 4 # execsnoop Trace new processes via exec() syscalls. 7 # USAGE: execsnoop [-h] [-T] [-t] [-x] [--cgroupmap CGROUPMAP] 53 ./execsnoop # trace all exec() syscalls 54 ./execsnoop -x # include failed exec()s 55 ./execsnoop -T # include time (HH:MM:SS) 56 ./execsnoop -P 181 # only trace new processes whose parent PID is 181 57 ./execsnoop -U # include UID 58 ./execsnoop -u 1000 # only trace UID 1000 59 ./execsnoop -u user # get user UID and trace only them 60 ./execsnoop -t # include timestamps [all …]
|
H A D | exitsnoop.py | 40 The template for this script was Brendan Gregg's execsnoop 41 https://github.com/iovisor/bcc/blob/master/tools/execsnoop.py 49 07-Feb-2016 Brendan Gregg (Netflix) Created execsnoop
|
H A D | syscount_example.txt | 83 might be worth investigating with follow-up tools like opensnoop, execsnoop, 111 investigating with follow-up tools like opensnoop, execsnoop, or
|
/aosp_15_r20/external/bcc/man/man8/ |
H A D | execsnoop.8 | 1 .TH execsnoop 8 "2020-02-20" "USER COMMANDS" 3 execsnoop \- Trace new processes via exec() syscalls. Uses Linux eBPF/bcc. 5 .B execsnoop [\-h] [\-T] [\-t] [\-x] [\-\-cgroupmap CGROUPMAP] [\-\-mntnsmap MAPPATH] 8 execsnoop traces new processes, showing the filename executed and argument 14 exec(), eg, for worker processes, which won't be included in the execsnoop 69 .B execsnoop 73 .B execsnoop \-t 77 .B execsnoop \-U 81 .B execsnoop \-u 1000 85 .B execsnoop \-Uu root [all …]
|
H A D | threadsnoop.8 | 9 a companion to execsnoop(8) which traces execve(2). 60 execsnoop(8)
|
H A D | exitsnoop.8 | 110 execsnoop(8)
|
H A D | opensnoop.8 | 159 execsnoop(8), funccount(1)
|
/aosp_15_r20/external/bcc/libbpf-tools/ |
H A D | execsnoop.c | 1 // Based on execsnoop(8) from BCC by Brendan Gregg and others. 14 #include "execsnoop.h" 15 #include "execsnoop.skel.h" 45 const char *argp_program_version = "execsnoop 0.1"; 51 "USAGE: execsnoop [-h] [-T] [-t] [-x] [-u UID] [-q] [-n NAME] [-l LINE] [-U] [-c CG]\n" 55 " ./execsnoop # trace all exec() syscalls\n" 56 " ./execsnoop -x # include failed exec()s\n" 57 " ./execsnoop -T # include time (HH:MM:SS)\n" 58 " ./execsnoop -U # include UID\n" 59 " ./execsnoop -u 1000 # only trace UID 1000\n" [all …]
|
H A D | .gitignore | 18 /execsnoop
|
H A D | execsnoop.bpf.c | 5 #include "execsnoop.h"
|
H A D | Makefile | 52 execsnoop \
|
/aosp_15_r20/external/bcc/docs/ |
H A D | special_filtering.md | 16 # ./execsnoop --cgroupmap /sys/fs/bpf/test01 85 Execute the `execsnoop` tool filtering only the mount namespaces 89 # tools/execsnoop.py --mntnsmap /sys/fs/bpf/mnt_ns_set 118 You'll see how on the `execsnoop` terminal you started above the call is logged: 121 # tools/execsnoop.py --mntnsmap /sys/fs/bpf/mnt_ns_set
|
H A D | tutorial.md | 5 It is assumed for this tutorial that bcc is already installed, and you can run tools like execsnoop… 30 1. execsnoop 44 #### 1.1 execsnoop 47 # ./execsnoop 56 execsnoop prints one line of output for each new process. Check for short-lived processes. These ca…
|
H A D | reference_guide.md | 365 [code](https://github.com/iovisor/bcc/blob/552658edda09298afdccc8a4b5e17311a2d8a771/tools/execsnoop…
|
/aosp_15_r20/external/bcc/snap/ |
H A D | snapcraft.yaml | 153 execsnoop: 154 command: bcc-wrapper execsnoop
|
/aosp_15_r20/external/bcc/ |
H A D | INSTALL.md | 651 sudo /usr/share/bcc/tools/execsnoop 691 sudo /usr/share/bcc/tools/execsnoop 720 sudo /usr/share/bcc/tools/execsnoop
|
H A D | FAQ.txt | 60 File "./execsnoop", line 20, in <module>
|
H A D | README.md | 112 - tools/[execsnoop](tools/execsnoop.py): Trace new processes via exec() syscalls. [Examples](tools/…
|
/aosp_15_r20/external/bcc/debian/ |
H A D | changelog | 190 * libbpf-tools: cpudist, syscount, execsnoop, vfsstat 214 * cgroupmap based cgroup filtering for opensnoop, execsnoop and bindsnoop.
|
/aosp_15_r20/external/bcc/tests/python/ |
H A D | test_tools_smoke.py | 170 self.run_with_int("execsnoop.py")
|