S ure to send a shiver down the nerdiest of geek’s spines, the idea of monitoring TCP/IP S packets and connections can be confusing at best. Just scan this article and the output of the eBPF tools, and you realise you need to be familiar with TCP/ IP and its cryptic options in order to understand the provided information. Before diving into the TCP/IP tools, we’ll begin by explaining how to trace eBPF related system calls with the help of the Strace utility.
Let’s use Strace to trace eBPF-related system calls along with their parameters. For example, we can find out the eBPF system calls executed with Opensnoop:
This is a small part of the generated output but you get the idea and the insights of the system calls related to eBPF. Using filtering tools such as Grep can help you locate what you are looking for because Strace produces lots of output.
What we see here is three versions of the BPF system call. The first one using the BPF_MAP_CREATE command, the second one using BPF_MAP_UPDATE_ELEM and the last one using BPF_RAW_TRACEPOINT_OPEN . In LXF297, we discussed eBPF maps and how each map has