/aosp_15_r20/external/bcc/tools/ |
H A D | tcpaccept_example.txt | 1 Demonstrations of tcpaccept, the Linux eBPF/bcc version. 8 # ./tcpaccept 28 # ./tcpaccept -t 39 # ./tcpaccept --cgroupmap /sys/fs/bpf/test01 46 # ./tcpaccept -h 47 usage: tcpaccept.py [-h] [-T] [-t] [-p PID] [-P PORT] [-4 | -6] [--cgroupmap CGROUPMAP] 63 ./tcpaccept # trace all TCP accept()s 64 ./tcpaccept -t # include timestamps 65 ./tcpaccept -P 80,81 # only trace port 80 and 81 66 ./tcpaccept -p 181 # only trace PID 181 [all …]
|
H A D | tcpaccept.py | 4 # tcpaccept Trace TCP accept()s. 7 # USAGE: tcpaccept [-h] [-T] [-t] [-p PID] [-P PORTS] [-4 | -6] 29 ./tcpaccept # trace all TCP accept()s 30 ./tcpaccept -t # include timestamps 31 ./tcpaccept -P 80,81 # only trace port 80 and 81 32 ./tcpaccept -p 181 # only trace PID 181 33 ./tcpaccept --cgroupmap mappath # only trace cgroups in this BPF map 34 ./tcpaccept --mntnsmap mappath # only trace mount namespaces in the map 35 ./tcpaccept -4 # trace IPv4 family 36 ./tcpaccept -6 # trace IPv6 family
|
H A D | bindsnoop.py | 245 // workaround for reading the sk_protocol bitfield (from tcpaccept.py):
|
/aosp_15_r20/external/bcc/man/man8/ |
H A D | tcpaccept.8 | 1 .TH tcpaccept 8 "2020-02-20" "USER COMMANDS" 3 tcpaccept \- Trace TCP passive connections (accept()). Uses Linux eBPF/bcc. 5 .B tcpaccept [\-h] [\-T] [\-t] [\-p PID] [\-P PORTS] [\-4 | \-6] [\-\-cgroupmap MAPPATH] [\-\-mntns… 52 .B tcpaccept 56 .B tcpaccept \-t 60 .B tcpaccept \-P 80,81 64 .B tcpaccept \-p 181 68 .B tcpaccept \-4 72 .B tcpaccept \-6 76 .B tcpaccept \-\-cgroupmap /sys/fs/bpf/test01
|
H A D | tcpdrop.8 | 91 tcplife(8), tcpaccept(8), tcpconnect(8), tcptop(8)
|
H A D | bindsnoop.8 | 149 tcpaccept(8)
|
H A D | tcpretrans.8 | 111 tcpconnect(8), tcpaccept(8)
|
H A D | tcptracer.8 | 124 tcpaccept(8), tcpconnect(8), tcptop(8), tcplife(8)
|
H A D | tcplife.8 | 144 tcpaccept(8), tcpconnect(8), tcptop(8)
|
H A D | tcpconnlat.8 | 133 tcpconnect(8), tcpaccept(8), funccount(8), tcpdump(8)
|
H A D | tcpstates.8 | 145 tcpaccept(8), tcpconnect(8), tcptop(8), tcplife(8)
|
H A D | tcptop.8 | 137 tcpconnect(8), tcpaccept(8)
|
H A D | tcpconnect.8 | 205 tcptracer(8), tcpaccept(8), funccount(8), tcpdump(8)
|
/aosp_15_r20/external/bcc/tools/old/ |
H A D | tcpaccept.py | 4 # tcpaccept Trace TCP accept()s. 7 # USAGE: tcpaccept [-h] [-t] [-p PID] 27 ./tcpaccept # trace all TCP accept()s 28 ./tcpaccept -t # include timestamps 29 ./tcpaccept -p 181 # only trace PID 181
|
/aosp_15_r20/external/bcc/docs/ |
H A D | tutorial.md | 37 1. tcpaccept 197 #### 1.8. tcpaccept 200 # ./tcpaccept 208 tcpaccept prints one line of output for every passive TCP connection (eg, via accept()), with detai…
|
H A D | special_filtering.md | 18 # ./tcpaccept --cgroupmap /sys/fs/bpf/test01
|
H A D | reference_guide.md | 2583 File "./tcpaccept", line 179, in <module>
|
/aosp_15_r20/packages/modules/Virtualization/android/forwarder_host/src/ |
D | forwarder_host.rs | 67 TcpAccept(io::Error), enumerator 94 TcpAccept(e) => write!(f, "failed to accept tcp: {}", e), in fmt() 330 let (tcp_stream, _) = listener.accept().map_err(Error::TcpAccept)?; in create_forwarder_session()
|
/aosp_15_r20/external/bcc/snap/ |
H A D | snapcraft.yaml | 299 tcpaccept: 300 command: bcc-wrapper tcpaccept
|
/aosp_15_r20/external/bcc/ |
H A D | LINKS.md | 47 - 2015-10-31: [tcpconnect and tcpaccept for Linux (bcc)](http://www.brendangregg.com/blog/2015-10-3…
|
H A D | README.md | 160 - tools/[tcpaccept](tools/tcpaccept.py): Trace TCP passive connections (accept()). [Examples](tools…
|
/aosp_15_r20/external/bcc/debian/ |
H A D | changelog | 45 * bcc tool updates for oomkill.py, biolatpcts.py, sslsniff.py, tcpaccept.py, etc.
|
/aosp_15_r20/external/bcc/tests/python/ |
H A D | test_tools_smoke.py | 340 self.run_with_int("tcpaccept.py")
|