Voir :
lsof -p 33279 ps -efL |grep plop |wc -l ss -tnp |grep plop tcpdump -A -s0 host 192.168.100.5 and port 21 dmesg pmap 33279 strace -r -o trace.log sudo echo hi
Pour voir les E/S sur les FD
peekfd -n -8 -d -c 32167 0 1 2
A debugging utility for Linux, monitors system calls used by a program and all received signals
Voir aussi :
-s strsize Specifies the maximum string size to print (the default is 32). Note that filenames are not considered strings and are always printed in full.
kernel.yama.ptrace_scope = 0: all processes can be debugged, as long as they have same uid. This is the classical way of how ptracing worked.
kernel.yama.ptrace_scope = 1: only a parent process can be debugged.
kernel.yama.ptrace_scope = 2: Only admin can use ptrace, as it required CAP_SYS_PTRACE capability.
kernel.yama.ptrace_scope = 3: No processes may be traced with ptrace. Once set, a reboot is needed to enable ptracing again.
# LANG=C strace -p 1171 strace: attach: ptrace(PTRACE_ATTACH, 1171): Operation not permitted # echo 0 > /proc/sys/kernel/yama/ptrace_scope # LANG=C strace -p 1171
strace -T -tt -f -v -q -s 4096 -o /tmp/nonworking_cp-strace.out <cp command> &> /tmp/nonworking_cp.out strace -fvttTyyx -s 1024 -o /tmp/strace.out <command> &> /tmp/df.out
Voir procenv