Vladimir Kotal wrote:

In order to test my changes in IPsec SA expiration handling I'd like to get a list of processes/connections which experience TCP retransmissions (to see if they belong in the group of processes which transfer the data using the SAs).

Thanks to the MIB probes in ip module this is easy to accomplish for the latter case but I am not able to get a process name out of tcp_t/conn_t/sonode et al. The pid of the process is stashed in conn_t so this is fine but I'd like to get the execname as well. Sadly, the pid2proc mdb dcmd simulated in dtrace cannot be used here, I think.

Any ideas ?

You could use dtrace to trace fork/exec calls and create an array indexed on pid that stashes the execname...

But that presumes that the process is created after you start the dtrace script.

Darren

_______________________________________________
networking-discuss mailing list
[email protected]

Reply via email to