bcc-spfdsnoop - Man Page
Trace FDs passed through unix sockets. Uses Linux eBPF/bcc.
Synopsis
sofdsnoop [-h] [-T] [-p PID] [-t TID] [-n NAME] [-d DURATION]
Description
sofdsnoop traces FDs passed through unix sockets
Every file descriptor that is passed via unix sockets os displayed on separate line together with process info (TID/COMM columns), ACTION details (SEND/RECV), file descriptor number (FD) and its translation to file if available (NAME).
Since this uses BPF, only the root user can use this tool.
Requirements
CONFIG_BPF and bcc.
Options
- -h
Print usage message.
- -T
Include a timestamp column.
- -p PID
Trace this process ID only (filtered in-kernel).
- -t TID
Trace this thread ID only (filtered in-kernel).
- -d DURATION
Total duration of trace in seconds.
- -n NAME
Only print command lines matching this command name (regex)
Examples
Fields
- TIME(s)
Time of SEDN/RECV actions, in seconds.
- ACTION
Operation on the fd SEND/RECV.
- TID
Process TID
- COMM
Parent process/command name.
- SOCKET
The socket carrier.
- FD
file descriptor number
- NAME
file name for SEND lines
Source
This is from bcc.
https://github.com/iovisor/bcc
Also look in the bcc distribution for a companion _examples.txt file containing example usage, output, and commentary for this tool.
OS
Linux
Stability
Unstable - in development.
Author
Jiri Olsa
See Also
opensnoop(1)