EXTRACE(1) | General Commands Manual | EXTRACE(1) |
extrace
— trace
exec() calls system-wide
extrace |
[-deflqtu ] [-o
file] [-p
pid | cmd ...] |
extrace
traces all program executions
occurring on a system.
The options are as follows:
-d
-e
-
’
if unreadable.-f
-l
argv[0]
is shown.-q
-t
-u
-o
file-p
pidBy default, all exec(3) calls are traced globally.
The extrace
utility exits 0 on
success, and >0 if an error occurs.
Check these prerequisites if you see this error:
binding sk_nl error: Operation not permitted
extrace
requires special permissions to
run, either root or the Linux CAP_NET_ADMIN
capability.
extrace
only works on Linux kernels with
the kernel options
CONFIG_CONNECTOR=y CONFIG_PROC_EVENTS=y
Leah Neukirchen <leah@vuxu.org>
May contain traces of code from Guillaume Thouvenin, Matt Helsley, and Sebastian Krahmer.
While process tracing is exact, looking up all information is inherently sensitive to race conditions. In doubt, you can only trust the PID was written correctly.
extrace
is licensed under the terms of the
GPLv2.
June 19, 2018 | Debian |