This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[PATCH] - DRAFT - Easy access to IP address in struct sockaddr in syscall.bind probe (for now)


Hi all.

Sometimes, I need to investigate connections to specific IP adresses (or ports, or address family, ...) on my server.
I need to track process trees, uid and other stuff... lot of very badly
written programs are runing on this server.

Then aiming to specific IP adress is something, what I'm not able in
systemtap by hand today. But not tomorrow! :)

What I want to achieve is something like:

probe syscall.bind {
    if (uaddr_ip == "192.168.1.1") {
        //... some actions ...//
    }
}

or better in syscall.connect probe.


Then I decided to write this patch. Patch is only draft now and comments are
very welcome.

Very easy example are attached too.

What is not solved in this patch:
    * Error handling if wrong struct is passed - now it's just return empty ("") string. Maybe throw exception will be better.
    * Expansion to syscall.connect probe.
    * Write tapset shell for new internal functions.


Have nice day.
Robin Hack

Attachment: uaddr_ip.patch
Description: Text document

Attachment: conn.stp
Description: Text document


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]