| Server IP : 195.134.90.114 / Your IP : 216.73.217.65 Web Server : Apache/2.4.58 System : Linux nepub 6.8.0-88-generic #89-Ubuntu SMP PREEMPT_DYNAMIC Sat Oct 11 01:02:46 UTC 2025 x86_64 User : www-data ( 33) PHP Version : 8.2.30 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : OFF Directory : /usr/share/doc/bpftrace/examples/ |
Upload File : |
Demonstrations of undump.bt, the Linux eBPF/bpftrace version. This example trace the kernel function performing receive AP_UNIX socket packet. Some example output: Terminal 1, UNIX Socket Server: ``` $ nc -lU /var/tmp/unixsocket # receive from Client Hello, world 123abc ``` Terminal 2, UNIX socket Client: ``` $ nc -U /var/tmp/unixsocket # Input some lines Hello, world 123abc ``` Terminal 3, receive tracing: ``` $ sudo ./undump.bt Attaching 3 probes... Dump UNIX socket packages RX. Ctrl-C to end TIME COMM PID SIZE DATA 20:40:11 nc 139071 13 Hello, world\x0a 20:40:14 nc 139071 7 123abc\x0a ^C ```