

Ascommand we track the ls utility and redirect any errors to the screen output. For other interesting system calls, see the man 2 syscalls page. So let’s first check what chain does: startstrace, track forked childs (-f) for the open system call (-e open). As we are interested in file access, we want to see only the open syscall. While this provides interesting information, it might actually flood your screen, making it hard to work with. Lots of output after starting a strace on a running process If you run the same command on the CUPS daemon, this would be the output: Just run a command you normally would execute, prepended with the strace utility. Great for tracking required file access, dependencies, and troubleshooting purposes. By tracking the right system call, we can see exactly what files are opened while it happens. The first utility to provide insights in active syscalls, is the strace utility. Think of activities like reserving a memory section, or in this case opening a file from disk. These are specific functions, which perform a low-level system function. The kernel uses system calls, or syscalls for short. In this article, we have a look at a few options to quickly reveal what is occuring in a process, including disk and file activity. As a system administrator or IT auditor, you might want to know at some point what disk activity occurs in a process. Each process has a particular goal, like forking child processes, handling incoming user requests of monitoring other processes.


Processes are the running workforce on a Linux system.
