Grant Edwards <[EMAIL PROTECTED]> writes:
> On 2006-05-31, Sergei Organov <[EMAIL PROTECTED]> wrote:
>
>> It seems that sniff on a real tty device could be implemented using the
>> same technique strace uses to intercept and show syscalls, though I'm
>> not aware of any sniffer application that do
On 2006-05-31, Sergei Organov <[EMAIL PROTECTED]> wrote:
> It seems that sniff on a real tty device could be implemented using the
> same technique strace uses to intercept and show syscalls, though I'm
> not aware of any sniffer application that does it.
Using strace you can indeed trace read/wr
Grant Edwards <[EMAIL PROTECTED]> writes:
> On 2006-05-30, TheSeeker <[EMAIL PROTECTED]> wrote:
>
>> Have you looked into slsnif
>> (http://www.dakotacom.net/~ymg/software.html)
>
> FYI, slsnif won't work for any serial program that needs to use
> parity, 7 data bits, or any of the modem control/s
xkenneth wrote:
> Hi,
>
>I'm writing a couple python applications that use the serial port
> (RS-232) quite extensively. Is there any way I can monitor all activity
> on the serial port and have it printed as the transactions occur? I'm
> trying to reverse engineer a microcontroller serial rou
xkenneth wrote:
> Hi,
>
>I'm writing a couple python applications that use the serial port
> (RS-232) quite extensively. Is there any way I can monitor all activity
> on the serial port and have it printed as the transactions occur? I'm
> trying to reverse engineer a microcontroller serial rou
On 2006-05-30, Cameron Laird <[EMAIL PROTECTED]> wrote:
>>If you feel like building a kernel, adding a few printk() calls
>>to either the low-level serial driver or the tty
>>line-discipline layer might do what you want.
> .
> .
> .
In article <[EMAIL PROTECTED]>, I confused matters with:
> .
> .
> .
>!? I hadn't realized there's no such monitor ... What do you
>think of http://wiki.tcl.tk/moni >?
Ugh. Please ignore, all; this was a first draft of
what was
In article <[EMAIL PROTECTED]>,
Grant Edwards <[EMAIL PROTECTED]> wrote:
>On 2006-05-30, xkenneth <[EMAIL PROTECTED]> wrote:
>
>> I'm using linux.
>
>[It's generally considered good practice to quote enough context
>so that your post makes sense to people without access to older
>postings.]
>
>Und
On 2006-05-30, Peter Corlett <[EMAIL PROTECTED]> wrote:
> A dirty hack that might work is to rename /dev/ttyS* off somewhere else and
> replace them with named pipes. Have a process monitor the named pipes and
> relay data back and forth to the actual serial ports while logging it. The
> serial io
On 2006-05-30, TheSeeker <[EMAIL PROTECTED]> wrote:
> Have you looked into slsnif
> (http://www.dakotacom.net/~ymg/software.html)
FYI, slsnif won't work for any serial program that needs to use
parity, 7 data bits, or any of the modem control/status lines.
Since all of the serial applications I
Grant Edwards <[EMAIL PROTECTED]> wrote:
[...]
> Under Linux there isn't really anything. IIRC, many years ago, somebody
> had written a kernel module that inserted itself between application and
> serial port and logged operations, but the last time I tried to find it, I
> was unsuccessful.
A dir
Hi,
Have you looked into slsnif
(http://www.dakotacom.net/~ymg/software.html)
Duane
--
http://mail.python.org/mailman/listinfo/python-list
On 2006-05-30, xkenneth <[EMAIL PROTECTED]> wrote:
> I'm using linux.
[It's generally considered good practice to quote enough context
so that your post makes sense to people without access to older
postings.]
Under Linux there isn't really anything. IIRC, many years ago,
somebody had written a
I'm using linux.
--
http://mail.python.org/mailman/listinfo/python-list
On 2006-05-30, xkenneth <[EMAIL PROTECTED]> wrote:
>I'm writing a couple python applications that use the serial port
> (RS-232) quite extensively. Is there any way I can monitor all activity
> on the serial port and have it printed as the transactions occur? I'm
> trying to reverse engineer a
15 matches
Mail list logo