Fetch the repository succeeded.
Demonstrations of undump.py, the Linux eBPF/bcc version.
This example trace the kernel function performing receive AP_UNIX socket
packet. Some example output:
Terminal 1, UNIX Socket Server:
```
$ nc -lU /var/tmp/dsocket
# receive from Client
Hello, World
abcdefg
```
Terminal 2, UNIX socket Client:
```
$ nc -U /var/tmp/dsocket
# Input some lines
Hello, World
abcdefg
```
Terminal 3, receive tracing:
```
$ sudo python undump.py -p 49264
Tracing PID=49264 UNIX socket packets ... Hit Ctrl-C to end
# Here print bytes of receive
PID 49264 Recv 13 bytes
48 65 6c 6c 6f 2c 20 57 6f 72 6c 64 0a
PID 49264 Recv 8 bytes
61 62 63 64 65 66 67 0a
```
This output shows two packet received by PID 49264(nc -lU /var/tmp/dsocket),
`Hello, World` will be parsed as `48 65 6c 6c 6f 2c 20 57 6f 72 6c 64 0a`, the
`0a` is `Enter`. `abcdefg` will be parsed as `61 62 63 64 65 66 67 0a`.
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。