Conversation
|
Here are my quick notes:
Thanks |
…ocesses. it demonstrates usage of kprobes/kretprobes to trace syscall and perf buffer to handle events. compiled binary should be executed without any arguments.
I have made the suggested changes. |
Sorry, but I couldn't find the purpose, necessity, value, and usage instructions. |
As you mentioned, i added it in my latest commit message. I will add it in my PR comment too. |
Just to clarify, I wasn’t asking to create a separate new commit just to add the purpose and other details. |
Adding a cpp version of execsnoop in examples.
Execsnoop: a utility that traces newly executed processes.
It demonstrates how to use kprobes/kretprobes to trace system calls and how to process the captured events using a perf buffer through BCC’s C++ API.
Usage:
Compile code:
clang++ execsnoop.cc -o execsnoop -lbccExecution:
./execsnoopOutput: