Provided by: bpfcc-tools_0.18.0+ds-2_all bug

NAME

       bindsnoop - Trace bind() system calls.

SYNOPSIS

       bindsnoop.py  [-h]  [-w] [-t] [-p PID] [-P PORT] [-E] [-U] [-u UID] [--count] [--cgroupmap
       MAP] [--mntnsmap MNTNSMAP]

DESCRIPTION

       bindsnoop reports socket options set before the bind call that would  impact  this  system
       call behavior.

REQUIREMENTS

       CONFIG_BPF and bcc.

OPTIONS:

              Show help message and exit:

              -h, --help

              Include timestamp on output:

              -t, --timestamp

              Wider columns (fit IPv6):

              -w, --wide

              Trace this PID only:

              -p PID, --pid PID

              Comma-separated list of ports to trace:

              -P PORT, --port PORT

              Trace cgroups in this BPF map:

              --cgroupmap MAP

              Trace mount namespaces in this BPF map:

              --mntnsmap MNTNSMAP

              Include errors in the output:

              -E, --errors

              Include UID on output:

              -U, --print-uid

              Trace this UID only:

              -u UID, --uid UID

              Count binds per src ip and port:

              --count

EXAMPLES:

              Trace all IPv4 and IPv6 bind()s

              bindsnoop

              Include timestamps

              bindsnoop -t

              Trace PID 181

              bindsnoop -p 181

              Trace port 80

              bindsnoop -P 80

              Trace port 80 and 81

              bindsnoop -P 80,81

              Include UID

              bindsnoop -U

              Trace UID 1000

              bindsnoop -u 1000

              Report bind errors

              bindsnoop -E

              Count bind per src ip

              bindsnoop --count

       Trace  IPv4  and  IPv6  bind system calls and report socket options that would impact bind
       call behavior:

              SOL_IP IP_FREEBIND              F....

              SOL_IP IP_TRANSPARENT           .T...

              SOL_IP IP_BIND_ADDRESS_NO_PORT  ..N..

              SOL_SOCKET SO_REUSEADDR         ...R.

              SOL_SOCKET SO_REUSEPORT         ....r

              SO_BINDTODEVICE interface is reported as "IF" index

SOURCE

       This is from bcc.

              https://github.com/iovisor/bcc

       Also look in the bcc distribution for a companion _examples.txt  file  containing  example
       usage, output, and commentary for this tool.

OS

       Linux

STABILITY

       Unstable - in development.

AUTHOR

       Pavel Dubovitsky

SEE ALSO

       tcpaccept(8)

                                         12 February 2020                            bindsnoop(8)