This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.
Index Nav: | [Date Index] [Subject Index] [Author Index] [Thread Index] | |
---|---|---|
Message Nav: | [Date Prev] [Date Next] | [Thread Prev] [Thread Next] |
Other format: | [Raw text] |
Hi all. Sometimes, I need to investigate connections to specific IP adresses (or ports, or address family, ...) on my server. I need to track process trees, uid and other stuff... lot of very badly written programs are runing on this server. Then aiming to specific IP adress is something, what I'm not able in systemtap by hand today. But not tomorrow! :) What I want to achieve is something like: probe syscall.bind { if (uaddr_ip == "192.168.1.1") { //... some actions ...// } } or better in syscall.connect probe. Then I decided to write this patch. Patch is only draft now and comments are very welcome. Very easy example are attached too. What is not solved in this patch: * Error handling if wrong struct is passed - now it's just return empty ("") string. Maybe throw exception will be better. * Expansion to syscall.connect probe. * Write tapset shell for new internal functions. Have nice day. Robin Hack
Attachment:
uaddr_ip.patch
Description: Text document
Attachment:
conn.stp
Description: Text document
Index Nav: | [Date Index] [Subject Index] [Author Index] [Thread Index] | |
---|---|---|
Message Nav: | [Date Prev] [Date Next] | [Thread Prev] [Thread Next] |