1tcpdrop(8) System Manager's Manual tcpdrop(8)
2
3
4
6 tcpdrop - Trace kernel-based TCP packet drops with details. Uses Linux
7 eBPF/bcc.
8
10 tcpdrop [-h]
11
13 This tool traces TCP packets or segments that were dropped by the ker‐
14 nel, and shows details from the IP and TCP headers, the socket state,
15 and the kernel stack trace. This is useful for debugging cases of high
16 kernel drops, which can cause timer-based retransmits and performance
17 issues.
18
19 This tool works using dynamic tracing of the tcp_drop() kernel func‐
20 tion, which requires a recent kernel version.
21
22 Since this uses BPF, only the root user can use this tool.
23
25 CONFIG_BPF and bcc.
26
28 -h Print usage message. tcpdrop
29
31 TIME Time of the drop, in HH:MM:SS format.
32
33 PID Process ID that was on-CPU during the drop. This may be unre‐
34 lated, as drops can occur on the receive interrupt and be unre‐
35 lated to the PID that was interrupted.
36
37 IP IP address family (4 or 6)
38
39 SADDR Source IP address.
40
41 SPORT Source TCP port.
42
43 DADDR Destination IP address.
44
45 DPORT Destionation TCP port.
46
47 STATE TCP session state ("ESTABLISHED", etc).
48
49 FLAGS TCP flags ("SYN", etc).
50
52 This traces the kernel tcp_drop() function, which should be low fre‐
53 quency, and therefore the overhead of this tool should be negligible.
54
55 As always, test and understand this tools overhead for your types of
56 workloads before production use.
57
59 This is from bcc.
60
61 https://github.com/iovisor/bcc
62
63 Also look in the bcc distribution for a companion _examples.txt file
64 containing example usage, output, and commentary for this tool.
65
67 Linux
68
70 Unstable - in development.
71
73 Brendan Gregg
74
76 tcplife(8), tcpaccept(8), tcpconnect(8), tcptop(8)
77
78
79
80USER COMMANDS 2018-05-30 tcpdrop(8)