Vladimir Kotal wrote:
In order to test my changes in IPsec SA expiration handling I'd like
to get a list of processes/connections which experience TCP
retransmissions (to see if they belong in the group of processes which
transfer the data using the SAs).
Thanks to the MIB probes in ip module this is easy to accomplish for
the latter case but I am not able to get a process name out of
tcp_t/conn_t/sonode et al. The pid of the process is stashed in conn_t
so this is fine but I'd like to get the execname as well. Sadly, the
pid2proc mdb dcmd simulated in dtrace cannot be used here, I think.
Any ideas ?
You could use dtrace to trace fork/exec calls and create an array
indexed on pid that stashes the execname...
But that presumes that the process is created after you start the dtrace
script.
Darren
_______________________________________________
networking-discuss mailing list
[email protected]