{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/tmp.DbGXcMlJU9/b1/systemtap_4.5-1_amd64.changes", "source2": "/srv/reproducible-results/rbuild-debian/tmp.DbGXcMlJU9/b2/systemtap_4.5-1_amd64.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -1,11 +1,11 @@\n \n 5fabefe6ad126143f537e82faa8e77e5 21536 devel optional systemtap-client_4.5-1_amd64.deb\n 455a63b3d8b111a931241473d70294d5 673936 devel optional systemtap-common_4.5-1_amd64.deb\n ab1edf758a5584558e4732db5733996f 19727760 debug optional systemtap-dbgsym_4.5-1_amd64.deb\n- 8a5c789bae646c68a9f4fb2e2e5cdc0d 2578848 doc optional systemtap-doc_4.5-1_amd64.deb\n+ 407c14bb9c7183a136af4647d1f267ee 2578140 doc optional systemtap-doc_4.5-1_amd64.deb\n 5ec61a6fbd605418bc7badc35890c8f3 1116256 debug optional systemtap-runtime-dbgsym_4.5-1_amd64.deb\n c676c86a44da690a2f6d232fead4771a 141856 devel optional systemtap-runtime_4.5-1_amd64.deb\n 402d239e56286a2cdba4589ea8fff936 31128 devel optional systemtap-sdt-dev_4.5-1_amd64.deb\n f7db2f8ddeb8c3f42074d0e985c556dd 1836880 debug optional systemtap-server-dbgsym_4.5-1_amd64.deb\n 33aaf970faaba4e427786d74214affe1 161184 devel optional systemtap-server_4.5-1_amd64.deb\n b3966551d0e0c64843f62f3be4cdfba7 1303732 devel optional systemtap_4.5-1_amd64.deb\n"}, {"source1": "systemtap-doc_4.5-1_amd64.deb", "source2": "systemtap-doc_4.5-1_amd64.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2021-05-21 12:57:59.000000 debian-binary\n--rw-r--r-- 0 0 0 53604 2021-05-21 12:57:59.000000 control.tar.xz\n--rw-r--r-- 0 0 0 2525052 2021-05-21 12:57:59.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 53608 2021-05-21 12:57:59.000000 control.tar.xz\n+-rw-r--r-- 0 0 0 2524340 2021-05-21 12:57:59.000000 data.tar.xz\n"}, {"source1": "control.tar.xz", "source2": "control.tar.xz", "unified_diff": null, "details": [{"source1": "control.tar", "source2": "control.tar", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "comments": ["Files differ"], "unified_diff": null}]}]}]}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -331,15 +331,15 @@\n -rw-r--r-- 0 root (0) root (0) 2677 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-isinstr.html\n -rw-r--r-- 0 root (0) root (0) 2423 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-jiffies.html\n -rw-r--r-- 0 root (0) root (0) 3233 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-add-array-numeric-metric.html\n -rw-r--r-- 0 root (0) root (0) 3099 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-add-array-string-metric.html\n -rw-r--r-- 0 root (0) root (0) 2841 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-add-array.html\n -rw-r--r-- 0 root (0) root (0) 2982 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-add-numeric-metric.html\n -rw-r--r-- 0 root (0) root (0) 2753 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-add-string-metric.html\n--rw-r--r-- 0 root (0) root (0) 2913 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-data.html\n+-rw-r--r-- 0 root (0) root (0) 2979 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-data.html\n -rw-r--r-- 0 root (0) root (0) 3366 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-output-array-numeric-value.html\n -rw-r--r-- 0 root (0) root (0) 3378 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-output-array-string-value.html\n -rw-r--r-- 0 root (0) root (0) 2497 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-output-data-end.html\n -rw-r--r-- 0 root (0) root (0) 2475 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-output-data-start.html\n -rw-r--r-- 0 root (0) root (0) 2922 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-output-numeric-value.html\n -rw-r--r-- 0 root (0) root (0) 2851 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-output-string-value.html\n -rw-r--r-- 0 root (0) root (0) 2787 2021-05-21 12:57:59.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-set-prefix.html\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "unified_diff": "@@ -1,41 +1,41 @@\n
probe::ioblock.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock.end
ino
\n+
ioblock.end
flags
\n+ see below\n+ BIO_UPTODATE 0 ok after I/O completion\n+ BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n+ BIO_EOF 2 out-out-bounds error\n+ BIO_SEG_VALID 3 nr_hw_seg valid\n+ BIO_CLONED 4 doesn't own data\n+ BIO_BOUNCED 5 bio is a bounce bio\n+ BIO_USER_MAPPED 6 contains user pages\n+ BIO_EOPNOTSUPP 7 not supported\n+
bytes_done
\n+ number of bytes transferred\n+
error
\n+ 0 on success\n+
ino
\n i-node number of the mapped file\n+
sector
\n+ beginning sector for the entire bio\n+
name
\n+ name of the probe point\n
opf
\n operations and flags\n-
error
\n- 0 on success\n
vcnt
\n bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
hw_segments
\n- number of segments after physical and DMA remapping hardware coalescing is performed\n-
sector
\n- beginning sector for the entire bio\n+
size
\n+ total size in bytes\n
devname
\n block device name\n+
phys_segments
\n+ number of segments in this bio after physical address coalescing is performed.\n
idx
\n offset into the bio vector array\n-
bytes_done
\n- number of bytes transferred\n-
size
\n- total size in bytes\n-
name
\n- name of the probe point\n
rw
\n binary trace for read/write request\n-
phys_segments
\n- number of segments in this bio after physical address coalescing is performed.\n-
flags
\n- see below\n- BIO_UPTODATE 0 ok after I/O completion\n- BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n- BIO_EOF 2 out-out-bounds error\n- BIO_SEG_VALID 3 nr_hw_seg valid\n- BIO_CLONED 4 doesn't own data\n- BIO_BOUNCED 5 bio is a bounce bio\n- BIO_USER_MAPPED 6 contains user pages\n- BIO_EOPNOTSUPP 7 not supported\n+
hw_segments
\n+ number of segments after physical and DMA remapping hardware coalescing is performed\n
probe::ioblock.request — \n Fires whenever making a generic block I/O request.\n-
ioblock.request
bdev
\n+
ioblock.request
rw
\n+ binary trace for read/write request\n+
bdev
\n target block device\n+
idx
\n+ offset into the bio vector array\n+
phys_segments
\n+ number of segments in this bio after physical address coalescing is performed\n+
devname
\n+ block device name\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
size
\n+ total size in bytes\n+
hw_segments
\n+ number of segments after physical and DMA remapping hardware coalescing is performed\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid \n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
phys_segments
\n- number of segments in this bio after physical address coalescing is performed\n-
rw
\n- binary trace for read/write request\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
devname
\n- block device name\n-
size
\n- total size in bytes\n-
name
\n- name of the probe point\n-
idx
\n- offset into the bio vector array\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n-
sector
\n- beginning sector for the entire bio\n-
hw_segments
\n- number of segments after physical and DMA remapping hardware coalescing is performed\n
ino
\n i-node number of the mapped file\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n
opf
\n operations and flags\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
name
\n+ name of the probe point\n+
sector
\n+ beginning sector for the entire bio\n
probe::ioblock_trace.bounce — \n Fires whenever a buffer bounce is needed for at least one page of a block IO request.\n-
ioblock_trace.bounce
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
opf
\n- operations and flags\n-
ino
\n- i-node number of the mapped file\n-
sector
\n- beginning sector for the entire bio\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
name
\n- name of the probe point\n+
ioblock_trace.bounce
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n
size
\n total size in bytes\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
devname
\n+ device for which a buffer bounce was needed.\n
idx
\n offset into the bio vector array\n phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
q
\n+ request queue on which this bio was queued.\n+
bdev
\n+ target block device\n+
rw
\n+ binary trace for read/write request\n+
name
\n+ name of the probe point\n+
sector
\n+ beginning sector for the entire bio\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
opf
\n+ operations and flags\n+
ino
\n+ i-node number of the mapped file\n
bytes_done
\n number of bytes transferred\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
devname
\n- device for which a buffer bounce was needed.\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
rw
\n- binary trace for read/write request\n-
q
\n- request queue on which this bio was queued.\n-
bdev
\n- target block device\n
probe::ioblock_trace.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock_trace.end
opf
\n- operations and flags\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
ino
\n- i-node number of the mapped file\n+
ioblock_trace.end
name
\n+ name of the probe point\n
sector
\n beginning sector for the entire bio\n+
opf
\n+ operations and flags\n
vcnt
\n bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
bytes_done
\n- number of bytes transferred\n-
name
\n- name of the probe point\n-
size
\n- total size in bytes\n-
devname
\n- block device name\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
q
\n- request queue on which this bio was queued.\n-
rw
\n- binary trace for read/write request\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
ino
\n+ i-node number of the mapped file\n+
bytes_done
\n+ number of bytes transferred\n
bdev
\n target block device\n+
q
\n+ request queue on which this bio was queued.\n+
rw
\n+ binary trace for read/write request\n+
size
\n+ total size in bytes\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
devname
\n+ block device name\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n
probe::ioblock_trace.request — \n Fires just as a generic block I/O request is created for a bio.\n-
ioblock_trace.request
opf
\n- operations and flags\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
ino
\n- i-node number of the mapped file\n-
sector
\n- beginning sector for the entire bio\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
bytes_done
\n- number of bytes transferred\n-
name
\n- name of the probe point\n-
size
\n- total size in bytes\n-
devname
\n- block device name\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
rw
\n- binary trace for read/write request\n-
q
\n- request queue on which this bio was queued.\n-
flags
\n+
ioblock_trace.request
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
bytes_done
\n+ number of bytes transferred\n+
ino
\n+ i-node number of the mapped file\n+
opf
\n+ operations and flags\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
sector
\n+ beginning sector for the entire bio\n+
name
\n+ name of the probe point\n+
rw
\n+ binary trace for read/write request\n
bdev
\n target block device\n+
q
\n+ request queue on which this bio was queued.\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
devname
\n+ block device name\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
size
\n+ total size in bytes\n
probe::ioscheduler.elv_add_request.kp — \n kprobe based probe to indicate that a request was added to the request queue\n-
ioscheduler.elv_add_request.kp
rq
\n- Address of the request\n+
ioscheduler.elv_add_request.kp
elevator_name
\n+ The type of I/O elevator currently enabled\n+
disk_minor
\n+ Disk minor number of the request\n
name
\n Name of the probe point\n-
q
\n- pointer to request queue\n+
rq
\n+ Address of the request\n
disk_major
\n Disk major number of the request\n-
disk_minor
\n- Disk minor number of the request\n+
q
\n+ pointer to request queue\n
rq_flags
\n Request flags\n-
elevator_name
\n- The type of I/O elevator currently enabled\n
probe::ioscheduler.elv_add_request.tp — \n tracepoint based probe to indicate a request is added to the request queue.\n-
ioscheduler.elv_add_request.tp
q
\n- Pointer to request queue.\n-
disk_major
\n- Disk major no of request.\n-
disk_minor
\n+
ioscheduler.elv_add_request.tp
disk_minor
\n Disk minor number of request.\n-
rq_flags
\n- Request flags.\n
elevator_name
\n The type of I/O elevator currently enabled.\n
name
\n Name of the probe point\n+
disk_major
\n+ Disk major no of request.\n
rq
\n Address of request.\n+
rq_flags
\n+ Request flags.\n+
q
\n+ Pointer to request queue.\n
probe::ioscheduler.elv_add_request — \n probe to indicate request is added to the request queue.\n-
ioscheduler.elv_add_request
rq
\n+
ioscheduler.elv_add_request
elevator_name
\n+ The type of I/O elevator currently enabled.\n+
disk_minor
\n+ Disk minor number of request.\n+
rq
\n Address of request.\n
disk_major
\n Disk major no of request.\n
q
\n Pointer to request queue.\n-
disk_minor
\n- Disk minor number of request.\n
rq_flags
\n Request flags.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n
probe::ioscheduler.elv_completed_request — \n Fires when a request is completed\n-
ioscheduler.elv_completed_request
rq
\n+
ioscheduler.elv_completed_request
rq_flags
\n+ Request flags\n+
disk_major
\n+ Disk major number of the request\n+
rq
\n Address of the request\n-
elevator_name
\n- The type of I/O elevator currently enabled\n
name
\n Name of the probe point\n-
rq_flags
\n- Request flags\n
disk_minor
\n Disk minor number of the request\n-
disk_major
\n- Disk major number of the request\n+
elevator_name
\n+ The type of I/O elevator currently enabled\n
probe::ioscheduler.elv_next_request.return — \n Fires when a request retrieval issues a return signal\n
ioscheduler.elv_next_request.return
probe::ioscheduler_trace.elv_abort_request — \n Fires when a request is aborted.\n-
ioscheduler_trace.elv_abort_request
elevator_name
\n+
ioscheduler_trace.elv_abort_request
name
\n+ Name of the probe point\n+
disk_minor
\n+ Disk minor number of request.\n+
elevator_name
\n The type of I/O elevator currently enabled.\n
rq_flags
\n Request flags.\n-
disk_minor
\n- Disk minor number of request.\n
disk_major
\n Disk major no of request.\n-
name
\n- Name of the probe point\n
rq
\n Address of request.\n
probe::ioscheduler_trace.elv_completed_request — \n Fires when a request is\n-
ioscheduler_trace.elv_completed_request
rq
\n- Address of request.\n-
name
\n+
ioscheduler_trace.elv_completed_request
probe::ioscheduler_trace.elv_issue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_issue_request
name
\n- Name of the probe point\n+
ioscheduler_trace.elv_issue_request
rq_flags
\n+ Request flags.\n
rq
\n Address of request.\n+
disk_major
\n+ Disk major no of request.\n+
name
\n+ Name of the probe point\n
elevator_name
\n The type of I/O elevator currently enabled.\n-
rq_flags
\n- Request flags.\n
disk_minor
\n Disk minor number of request.\n-
disk_major
\n- Disk major no of request.\n
probe::ioscheduler_trace.elv_requeue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_requeue_request
elevator_name
\n- The type of I/O elevator currently enabled.\n+
ioscheduler_trace.elv_requeue_request
rq
\n+ Address of request.\n+
disk_major
\n+ Disk major no of request.\n
rq_flags
\n Request flags.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n
disk_minor
\n Disk minor number of request.\n-
disk_major
\n- Disk major no of request.\n-
rq
\n- Address of request.\n
name
\n Name of the probe point\n
probe::ioscheduler_trace.plug — \n Fires when a request queue is plugged;\n-
ioscheduler_trace.plug
probe::ioscheduler_trace.unplug_io — \n Fires when a request queue is unplugged;\n-
ioscheduler_trace.unplug_io
probe::ioscheduler_trace.unplug_timer — \n Fires when unplug timer associated\n-
ioscheduler_trace.unplug_timer
probe::ipmib.ForwDatagrams — \n Count forwarded packet\n-
ipmib.ForwDatagrams
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.ForwDatagrams
probe::ipmib.FragFails — \n Count datagram fragmented unsuccessfully\n-
ipmib.FragFails
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.FragFails
probe::ipmib.FragOKs — \n Count datagram fragmented successfully\n-
ipmib.FragOKs
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.FragOKs
probe::ipmib.InDiscards — \n Count discarded inbound packets\n-
ipmib.InDiscards
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.InDiscards
probe::ipmib.InReceives — \n Count an arriving packet\n-
ipmib.InReceives
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.InReceives
probe::ipmib.InUnknownProtos — \n Count arriving packets with an unbound proto\n-
ipmib.InUnknownProtos
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.InUnknownProtos
probe::ipmib.ReasmReqds — \n Count number of packet fragments reassembly requests\n-
ipmib.ReasmReqds
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.ReasmReqds
probe::irq_handler.entry — \n Execution of interrupt handler starting\n-
irq_handler.entry
dev_id
\n- Cookie to identify device\n-
flags_str
\n- symbolic string representation of IRQ flags\n+
irq_handler.entry
action
\n+ struct irqaction* for this interrupt num\n+
handler
\n+ interrupt handler function\n
dir
\n pointer to the proc/irq/NN/name entry\n
flags
\n Flags for IRQ handler\n-
thread_flags
\n- Flags related to thread\n-
handler
\n- interrupt handler function\n-
thread
\n- thread pointer for threaded interrupts\n-
dev_name
\n- name of device\n-
next_irqaction
\n- pointer to next irqaction for shared interrupts\n
irq
\n irq number\n-
action
\n- struct irqaction* for this interrupt num\n+
dev_id
\n+ Cookie to identify device\n
thread_fn
\n interrupt handler function for threaded interrupts\n+
dev_name
\n+ name of device\n+
flags_str
\n+ symbolic string representation of IRQ flags\n+
thread
\n+ thread pointer for threaded interrupts\n+
next_irqaction
\n+ pointer to next irqaction for shared interrupts\n+
thread_flags
\n+ Flags related to thread\n
probe::irq_handler.exit — \n Execution of interrupt handler completed\n
irq_handler.exit
flags_str
\n symbolic string representation of IRQ flags\n-
flags
\n- flags for IRQ handler\n-
dir
\n- pointer to the proc/irq/NN/name entry\n-
ret
\n- return value of the handler\n-
thread_flags
\n- Flags related to thread\n-
dev_id
\n- Cookie to identify device\n-
action
\n- struct irqaction*\n
thread_fn
\n interrupt handler function for threaded interrupts\n-
handler
\n- interrupt handler function that was executed\n-
thread
\n- thread pointer for threaded interrupts\n-
next_irqaction
\n- pointer to next irqaction for shared interrupts\n
dev_name
\n name of device\n+
thread_flags
\n+ Flags related to thread\n+
next_irqaction
\n+ pointer to next irqaction for shared interrupts\n+
thread
\n+ thread pointer for threaded interrupts\n+
handler
\n+ interrupt handler function that was executed\n+
action
\n+ struct irqaction*\n
irq
\n interrupt number\n+
ret
\n+ return value of the handler\n+
dev_id
\n+ Cookie to identify device\n+
dir
\n+ pointer to the proc/irq/NN/name entry\n+
flags
\n+ flags for IRQ handler\n
probe::json_data — \n Fires whenever JSON data is wanted by a reader.\n
json_data
\n This probe fires when the JSON data is about to be read. This\n probe must gather up data and then call the following macros to\n- output the data in JSON format. First, @json_output_data_start
\n+ output the data in JSON format. First, json_output_data_start
()\n must be called. That call is followed by one or more of the\n following (one call for each data item):\n- @json_output_string_value
, @json_output_numeric_value
,\n- @json_output_array_string_value
, and\n- @json_output_array_numeric_value
. Finally @json_output_data_end
\n+ json_output_string_value
(), json_output_numeric_value
(),\n+ json_output_array_string_value
(), and\n+ json_output_array_numeric_value
(). Finally json_output_data_end
()\n must be called. \n
probe::kprocess.exec_complete — \n Return from exec to a new program\n-
kprocess.exec_complete
errno
\n- The error number resulting from the exec\n+
kprocess.exec_complete
retstr
\n+ A string representation of errno (SystemTap v2.5+)\n
name
\n Name of the system call (“execve”) (SystemTap v2.5+)\n-
retstr
\n- A string representation of errno (SystemTap v2.5+)\n
success
\n A boolean indicating whether the exec was successful\n+
errno
\n+ The error number resulting from the exec\n
probe::kprocess.exec — \n Attempt to exec to a new program\n-
kprocess.exec
filename
\n- The path to the new executable\n+
kprocess.exec
argstr
\n+ A string containing the filename followed by the\n+ arguments to pass, excluding 0th arg (SystemTap v2.5+)\n+
name
\n+ Name of the system call (“execve”) (SystemTap v2.5+)\n
args
\n The arguments to pass to the new executable, including\n the 0th arg (SystemTap v2.5+)\n-
name
\n- Name of the system call (“execve”) (SystemTap v2.5+)\n-
argstr
\n- A string containing the filename followed by the\n- arguments to pass, excluding 0th arg (SystemTap v2.5+)\n+
filename
\n+ The path to the new executable\n
probe::kprocess.release — \n Process released\n-
kprocess.release
pid
\n- Same as released_pid
for compatibility (deprecated)\n-
task
\n+
kprocess.release
task
\n A task handle to the process being released\n-
released_tid
\n- TID of the task being released\n+
pid
\n+ Same as released_pid
for compatibility (deprecated)\n
released_pid
\n PID of the process being released\n+
released_tid
\n+ TID of the task being released\n
\n The context of the parent, if it wanted notification of this process'\n termination, else the context of the process itself.\n
\n Fires when a process is released from the kernel. This always follows a\n kprocess.exit, though it may be delayed somewhat if the process waits in a\n zombie state.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-linuxmib-ListenOverflows.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-linuxmib-ListenOverflows.html", "unified_diff": "@@ -1,12 +1,12 @@\n
probe::linuxmib.ListenOverflows — \n Count of times a listen queue overflowed\n-
linuxmib.ListenOverflows
sk
\n- Pointer to the struct sock being acted on\n-
op
\n+
linuxmib.ListenOverflows
probe::linuxmib.TCPMemoryPressures — \n Count of times memory pressure was used\n-
linuxmib.TCPMemoryPressures
op
\n- Value to be added to the counter (default value of 1)\n-
sk
\n+
linuxmib.TCPMemoryPressures
probe::netdev.change_mac — \n Called when the netdev_name has the MAC changed\n-
netdev.change_mac
probe::netdev.change_rx_flag — \n Called when the device RX flag will be changed\n-
netdev.change_rx_flag
probe::netdev.hard_transmit — \n Called when the devices is going to TX (hard)\n-
netdev.hard_transmit
truesize
\n- The size of the data to be transmitted.\n-
dev_name
\n+
netdev.hard_transmit
probe::netdev.ioctl — \n Called when the device suffers an IOCTL\n-
netdev.ioctl
probe::netdev.receive — \n Data received from network device.\n-
netdev.receive
probe::netdev.set_promiscuity — \n Called when the device enters/leaves promiscuity\n-
netdev.set_promiscuity
disable
\n- If the device is leaving promiscuity mode\n-
enable
\n+
netdev.set_promiscuity
probe::netdev.transmit — \n Network device transmitting buffer\n-
netdev.transmit
length
\n+
netdev.transmit
protocol
\n+ The protocol of this packet(defined in include/linux/if_ether.h).\n+
truesize
\n+ The size of the data to be transmitted.\n+
length
\n The length of the transmit buffer.\n
dev_name
\n The name of the device. e.g: eth0, ath1.\n-
truesize
\n- The size of the data to be transmitted.\n-
protocol
\n- The protocol of this packet(defined in include/linux/if_ether.h).\n
probe::netfilter.arp.forward — \n - Called for each ARP packet to be forwarded\n-
netfilter.arp.forward
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
ar_pln
\n- Length of protocol address\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
arphdr
\n- Address of ARP header\n-
pf
\n- Protocol family -- always “arp”\n-
indev_name
\n+
netfilter.arp.forward
indev_name
\n Name of network device packet was received on (if known)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
ar_hrd
\n- Format of hardware address\n-
data_str
\n- A string representing the packet buffer contents\n
ar_tip
\n Ethernet+IP only (ar_pro==0x800): target IP address\n+
pf
\n+ Protocol family -- always “arp”\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
ar_hln
\n Length of hardware address\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
ar_op
\n+ ARP opcode (command)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
ar_pro
\n- Format of protocol address\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
ar_pln
\n+ Length of protocol address\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
arphdr
\n+ Address of ARP header\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n
ar_sha
\n Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
length
\n+ The length of the packet buffer contents, in bytes\n+
ar_pro
\n+ Format of protocol address\n+
ar_hrd
\n+ Format of hardware address\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
ar_data
\n Address of ARP packet data region (after the header)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
ar_op
\n- ARP opcode (command)\n+
data_str
\n+ A string representing the packet buffer contents\n
probe::netfilter.arp.in — \n - Called for each incoming ARP packet\n-
netfilter.arp.in
ar_pro
\n+
netfilter.arp.in
data_str
\n+ A string representing the packet buffer contents\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n+
ar_hrd
\n+ Format of hardware address\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
ar_pro
\n Format of protocol address\n
ar_sha
\n Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
ar_data
\n- Address of ARP packet data region (after the header)\n-
ar_op
\n- ARP opcode (command)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
ar_hln
\n- Length of hardware address\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
ar_hrd
\n- Format of hardware address\n+
arphdr
\n+ Address of ARP header\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
data_str
\n- A string representing the packet buffer contents\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
length
\n- The length of the packet buffer contents, in bytes\n
ar_pln
\n Length of protocol address\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
arphdr
\n- Address of ARP header\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
ar_op
\n+ ARP opcode (command)\n+
ar_hln
\n+ Length of hardware address\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
pf
\n Protocol family -- always “arp”\n
indev_name
\n Name of network device packet was received on (if known)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n
probe::netfilter.arp.out — \n - Called for each outgoing ARP packet\n-
netfilter.arp.out
nf_repeat
\n+
netfilter.arp.out
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
pf
\n+ Protocol family -- always “arp”\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
ar_op
\n+ ARP opcode (command)\n+
ar_hln
\n+ Length of hardware address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n
arphdr
\n Address of ARP header\n-
pf
\n- Protocol family -- always “arp”\n-
indev_name
\n- Name of network device packet was received on (if known)\n
ar_pln
\n Length of protocol address\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
data_str
\n- A string representing the packet buffer contents\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n
ar_hrd
\n Format of hardware address\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
ar_op
\n- ARP opcode (command)\n
ar_pro
\n Format of protocol address\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
data_str
\n+ A string representing the packet buffer contents\n
ar_data
\n Address of ARP packet data region (after the header)\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n-
ar_hln
\n- Length of hardware address\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
probe::netfilter.bridge.forward — \n Called on an incoming bridging packet destined for some other computer\n-
netfilter.bridge.forward
pf
\n- Protocol family -- always “bridge”\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
netfilter.bridge.forward
br_msg
\n+ Message age in 1/256 secs\n
br_vid
\n Protocol version identifier\n-
br_poid
\n- Port identifier\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_msg
\n- Message age in 1/256 secs\n-
br_rid
\n- Identity of root bridge\n-
br_mac
\n- Bridge MAC address\n-
length
\n- The length of the packet buffer contents, in bytes\n-
br_rmac
\n- Root bridge MAC address\n-
br_type
\n- BPDU type\n
br_fd
\n Forward delay in 1/256 secs\n+
br_prid
\n+ Protocol identifier\n+
data_str
\n+ A string representing the packet buffer contents\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
br_rmac
\n+ Root bridge MAC address\n
br_htime
\n Hello time in 1/256 secs\n+
length
\n+ The length of the packet buffer contents, in bytes\n
llcproto_stp
\n Constant used to signify Bridge Spanning Tree Protocol packet\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
br_max
\n- Max age in 1/256 secs\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_flags
\n- BPDU flags\n-
brhdr
\n- Address of bridge header\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n+
br_poid
\n+ Port identifier\n+
br_rid
\n+ Identity of root bridge\n
llcpdu
\n Address of LLC Protocol Data Unit\n
br_bid
\n Identity of bridge\n-
br_prid
\n- Protocol identifier\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
brhdr
\n+ Address of bridge header\n
br_cost
\n Total cost from transmitting bridge to root\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
br_mac
\n+ Bridge MAC address\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
protocol
\n Packet protocol\n-
data_str
\n- A string representing the packet buffer contents\n+
br_type
\n+ BPDU type\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
pf
\n+ Protocol family -- always “bridge”\n+
br_flags
\n+ BPDU flags\n+
br_max
\n+ Max age in 1/256 secs\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
probe::netfilter.bridge.local_in — \n Called on a bridging packet destined for the local computer\n-
netfilter.bridge.local_in
length
\n+
netfilter.bridge.local_in
br_htime
\n+ Hello time in 1/256 secs\n+
br_poid
\n+ Port identifier\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
length
\n The length of the packet buffer contents, in bytes\n-
br_mac
\n- Bridge MAC address\n
br_rid
\n Identity of root bridge\n-
br_msg
\n- Message age in 1/256 secs\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_poid
\n- Port identifier\n-
br_vid
\n- Protocol version identifier\n-
pf
\n- Protocol family -- always “bridge”\n-
indev_name
\n- Name of network device packet was received on (if known)\n
brhdr
\n Address of bridge header\n-
br_flags
\n- BPDU flags\n-
br_max
\n- Max age in 1/256 secs\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
br_fd
\n- Forward delay in 1/256 secs\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_type
\n- BPDU type\n-
br_rmac
\n- Root bridge MAC address\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
br_prid
\n- Protocol identifier\n
br_bid
\n Identity of bridge\n
llcpdu
\n Address of LLC Protocol Data Unit\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
br_vid
\n+ Protocol version identifier\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_fd
\n+ Forward delay in 1/256 secs\n
data_str
\n A string representing the packet buffer contents\n-
protocol
\n- Packet protocol\n+
br_prid
\n+ Protocol identifier\n+
br_rmac
\n+ Root bridge MAC address\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
outdev_name
\n Name of network device packet will be routed to (if known)\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
br_max
\n+ Max age in 1/256 secs\n+
br_flags
\n+ BPDU flags\n+
pf
\n+ Protocol family -- always “bridge”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
br_cost
\n Total cost from transmitting bridge to root\n+
protocol
\n+ Packet protocol\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
br_mac
\n+ Bridge MAC address\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
br_type
\n+ BPDU type\n
probe::netfilter.bridge.local_out — \n Called on a bridging packet coming from a local process\n-
netfilter.bridge.local_out
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
netfilter.bridge.local_out
br_max
\n+ Max age in 1/256 secs\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
pf
\n+ Protocol family -- always “bridge”\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
data_str
\n- A string representing the packet buffer contents\n-
protocol
\n- Packet protocol\n+
br_flags
\n+ BPDU flags\n
outdev_name
\n Name of network device packet will be routed to (if known)\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
br_prid
\n- Protocol identifier\n-
br_bid
\n- Identity of bridge\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
brhdr
\n- Address of bridge header\n-
br_flags
\n- BPDU flags\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_max
\n- Max age in 1/256 secs\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
protocol
\n+ Packet protocol\n+
br_mac
\n+ Bridge MAC address\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
br_fd
\n- Forward delay in 1/256 secs\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_rmac
\n- Root bridge MAC address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
br_cost
\n+ Total cost from transmitting bridge to root\n
br_type
\n BPDU type\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n
length
\n The length of the packet buffer contents, in bytes\n-
br_mac
\n- Bridge MAC address\n-
br_rid
\n- Identity of root bridge\n-
br_msg
\n- Message age in 1/256 secs\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n
br_poid
\n Port identifier\n+
br_htime
\n+ Hello time in 1/256 secs\n+
brhdr
\n+ Address of bridge header\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
br_bid
\n+ Identity of bridge\n+
br_rid
\n+ Identity of root bridge\n+
br_fd
\n+ Forward delay in 1/256 secs\n
br_vid
\n Protocol version identifier\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
pf
\n- Protocol family -- always “bridge”\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_rmac
\n+ Root bridge MAC address\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
br_prid
\n+ Protocol identifier\n+
data_str
\n+ A string representing the packet buffer contents\n
probe::netfilter.bridge.post_routing — \n - Called before a bridging packet hits the wire\n-
netfilter.bridge.post_routing
indev_name
\n- Name of network device packet was received on (if known)\n-
pf
\n- Protocol family -- always “bridge”\n-
br_vid
\n- Protocol version identifier\n+
netfilter.bridge.post_routing
br_rid
\n+ Identity of root bridge\n+
br_bid
\n+ Identity of bridge\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
brhdr
\n+ Address of bridge header\n+
br_htime
\n+ Hello time in 1/256 secs\n
br_poid
\n Port identifier\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_rid
\n- Identity of root bridge\n-
br_msg
\n- Message age in 1/256 secs\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n
length
\n The length of the packet buffer contents, in bytes\n-
br_mac
\n- Bridge MAC address\n-
br_type
\n- BPDU type\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_prid
\n+ Protocol identifier\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
br_rmac
\n Root bridge MAC address\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_vid
\n+ Protocol version identifier\n
br_fd
\n Forward delay in 1/256 secs\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_htime
\n- Hello time in 1/256 secs\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
br_flags
\n BPDU flags\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
pf
\n+ Protocol family -- always “bridge”\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
br_max
\n Max age in 1/256 secs\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
brhdr
\n- Address of bridge header\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_prid
\n- Protocol identifier\n-
br_bid
\n- Identity of bridge\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
br_type
\n+ BPDU type\n
br_cost
\n Total cost from transmitting bridge to root\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
br_mac
\n+ Bridge MAC address\n
protocol
\n Packet protocol\n-
data_str
\n- A string representing the packet buffer contents\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n
nf_accept
\n Constant used to signify an 'accept' verdict\n
probe::netfilter.bridge.pre_routing — \n - Called before a bridging packet is routed\n-
netfilter.bridge.pre_routing
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_bid
\n- Identity of bridge\n-
br_prid
\n- Protocol identifier\n-
data_str
\n- A string representing the packet buffer contents\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
netfilter.bridge.pre_routing
br_type
\n+ BPDU type\n
br_cost
\n Total cost from transmitting bridge to root\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
protocol
\n- Packet protocol\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
br_mac
\n Bridge MAC address\n-
length
\n- The length of the packet buffer contents, in bytes\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
pf
\n- Protocol family -- always “bridge”\n-
br_vid
\n- Protocol version identifier\n-
br_poid
\n- Port identifier\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
protocol
\n+ Packet protocol\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
br_msg
\n- Message age in 1/256 secs\n-
br_rid
\n- Identity of root bridge\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_max
\n- Max age in 1/256 secs\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
br_flags
\n BPDU flags\n-
brhdr
\n- Address of bridge header\n-
br_type
\n- BPDU type\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
pf
\n+ Protocol family -- always “bridge”\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
br_max
\n+ Max age in 1/256 secs\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_prid
\n+ Protocol identifier\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
br_rmac
\n Root bridge MAC address\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_vid
\n+ Protocol version identifier\n
br_fd
\n Forward delay in 1/256 secs\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_rid
\n+ Identity of root bridge\n+
br_bid
\n+ Identity of bridge\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
brhdr
\n+ Address of bridge header\n
br_htime
\n Hello time in 1/256 secs\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
br_poid
\n+ Port identifier\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n
probe::netfilter.ip.forward — \n Called on an incoming IP packet addressed to some other computer\n-
netfilter.ip.forward
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
family
\n- IP address family\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
data_str
\n- A string representing the packet buffer contents\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n+
netfilter.ip.forward
iphdr
\n+ Address of IP header\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
daddr
\n+ A string representing the destination IP address\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
saddr
\n A string representing the source IP address\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
family
\n+ IP address family\n
sport
\n TCP or UDP source port (ipv4 only)\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
iphdr
\n- Address of IP header\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
daddr
\n- A string representing the destination IP address\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n
length
\n The length of the packet buffer contents, in bytes\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
data_str
\n+ A string representing the packet buffer contents\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n
probe::netfilter.ip.local_in — \n Called on an incoming IP packet addressed to the local computer\n-
netfilter.ip.local_in
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
iphdr
\n- Address of IP header\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
netfilter.ip.local_in
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
daddr
\n A string representing the destination IP address\n-
length
\n- The length of the packet buffer contents, in bytes\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
pf
\n Protocol family -- either “ipv4” or “ipv6”\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
data_str
\n- A string representing the packet buffer contents\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
family
\n- IP address family\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
sport
\n- TCP or UDP source port (ipv4 only)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
nf_drop
\n Constant used to signify a 'drop' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
iphdr
\n+ Address of IP header\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n+
family
\n+ IP address family\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n
saddr
\n A string representing the source IP address\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
data_str
\n+ A string representing the packet buffer contents\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
probe::netfilter.ip.local_out — \n Called on an outgoing IP packet\n-
netfilter.ip.local_out
protocol
\n- Packet protocol from driver (ipv4 only)\n-
family
\n- IP address family\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n+
netfilter.ip.local_out
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n
data_str
\n A string representing the packet buffer contents\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
saddr
\n- A string representing the source IP address\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
iphdr
\n Address of IP header\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
daddr
\n+ A string representing the destination IP address\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
urg
\n TCP URG flag (if protocol is TCP; ipv4 only)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n+
saddr
\n+ A string representing the source IP address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
family
\n+ IP address family\n
psh
\n TCP PSH flag (if protocol is TCP; ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
daddr
\n- A string representing the destination IP address\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n
probe::netfilter.ip.post_routing — \n Called immediately before an outgoing IP packet leaves the computer\n-
netfilter.ip.post_routing
dport
\n- TCP or UDP destination port (ipv4 only)\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
daddr
\n- A string representing the destination IP address\n-
ipproto_tcp
\n+
netfilter.ip.post_routing
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n
length
\n The length of the packet buffer contents, in bytes\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
iphdr
\n- Address of IP header\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
data_str
\n+ A string representing the packet buffer contents\n
syn
\n TCP SYN flag (if protocol is TCP; ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n
nf_queue
\n Constant used to signify a 'queue' verdict\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
outdev
\n Address of net_device representing output device, 0 if unknown\n+
iphdr
\n+ Address of IP header\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
daddr
\n+ A string representing the destination IP address\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n
saddr
\n A string representing the source IP address\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n
sport
\n TCP or UDP source port (ipv4 only)\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
family
\n- IP address family\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
data_str
\n- A string representing the packet buffer contents\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
family
\n+ IP address family\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
probe::netfilter.ip.pre_routing — \n Called before an IP packet is routed\n-
netfilter.ip.pre_routing
iphdr
\n- Address of IP header\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n+
netfilter.ip.pre_routing
data_str
\n+ A string representing the packet buffer contents\n
nf_queue
\n Constant used to signify a 'queue' verdict\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n
urg
\n TCP URG flag (if protocol is TCP; ipv4 only)\n-
pf
\n- Protocol family - either 'ipv4' or 'ipv6'\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
saddr
\n+ A string representing the source IP address\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
family
\n+ IP address family\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
dport
\n TCP or UDP destination port (ipv4 only)\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
daddr
\n- A string representing the destination IP address\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
family
\n- IP address family\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
iphdr
\n+ Address of IP header\n
outdev_name
\n Name of network device packet will be routed to (if known)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
data_str
\n- A string representing the packet buffer contents\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
saddr
\n- A string representing the source IP address\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
pf
\n+ Protocol family - either 'ipv4' or 'ipv6'\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
daddr
\n+ A string representing the destination IP address\n
probe::nfs.aop.readpage — \n NFS client synchronously reading a page\n-
nfs.aop.readpage
rsize
\n- read size (in bytes)\n-
i_size
\n- file length in bytes\n-
size
\n- number of pages to be read in this execution \n-
file
\n- file argument\n+
nfs.aop.readpage
page_index
\n+ offset within mapping, can used a page identifier\n+ and position identifier in the page frame\n
i_flag
\n file flags\n+
file
\n+ file argument\n
ino
\n inode number\n-
__page
\n- the address of page\n-
page_index
\n- offset within mapping, can used a page identifier\n- and position identifier in the page frame\n-
dev
\n- device identifier\n+
rsize
\n+ read size (in bytes)\n
sb_flag
\n super block flags\n+
dev
\n+ device identifier\n+
i_size
\n+ file length in bytes\n+
__page
\n+ the address of page\n+
size
\n+ number of pages to be read in this execution \n
probe::nfs.aop.readpages — \n NFS client reading multiple pages\n-
nfs.aop.readpages
ino
\n- inode number \n-
dev
\n- device identifier\n-
nr_pages
\n+
nfs.aop.readpages
size
\n number of pages attempted to read in this execution\n
rpages
\n read size (in pages)\n+
dev
\n+ device identifier\n
rsize
\n read size (in bytes)\n-
size
\n- number of pages attempted to read in this execution\n+
ino
\n+ inode number \n
file
\n filp argument\n+
nr_pages
\n+ number of pages attempted to read in this execution\n
probe::nfs.aop.release_page — \n NFS client releasing page\n
nfs.aop.release_page
probe::nfs.aop.write_begin — \n NFS client begin to write data\n-
nfs.aop.write_begin
__page
\n- the address of page\n+
nfs.aop.write_begin
ino
\n+ inode number \n+
to
\n+ end address of this write operation \n
page_index
\n offset within mapping, can used a page identifier\n and position identifier in the page frame\n-
dev
\n- device identifier\n
offset
\n start address of this write operation \n-
ino
\n- inode number \n
size
\n write bytes\n-
to
\n- end address of this write operation \n+
__page
\n+ the address of page\n+
dev
\n+ device identifier\n
\n Occurs when write operation occurs on nfs. It prepare a page for writing,\n look for a request corresponding to the page. If there\n is one, and it belongs to another file, it flush it out\n before it tries to copy anything into the page. \n Also do the same if it finds a request from an existing\n dropped page\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "unified_diff": "@@ -1,29 +1,29 @@\n
probe::nfs.aop.write_end — \n NFS client complete writing data\n-
nfs.aop.write_end
size
\n+
nfs.aop.write_end
__page
\n+ the address of page\n+
size
\n write bytes\n+
offset
\n+ start address of this write operation\n+
dev
\n+ device identifier\n
i_size
\n file length in bytes\n-
to
\n- end address of this write operation\n-
i_flag
\n- file flags\n+
sb_flag
\n+ super block flags\n
ino
\n inode number\n-
__page
\n- the address of page\n
page_index
\n offset within mapping, can used a page identifier and position identifier in the page frame\n-
dev
\n- device identifier\n-
offset
\n- start address of this write operation\n-
sb_flag
\n- super block flags\n+
i_flag
\n+ file flags\n+
to
\n+ end address of this write operation\n
probe::nfs.aop.writepage — \n NFS client writing a mapped page to the NFS server\n-
nfs.aop.writepage
for_kupdate
\n+
nfs.aop.writepage
size
\n+ number of pages to be written in this execution\n+
for_kupdate
\n a flag of writeback_control,\n indicates if it's a kupdate writeback\n-
ino
\n- inode number \n-
dev
\n- device identifier\n-
sb_flag
\n- super block flags\n
__page
\n the address of page\n-
page_index
\n- offset within mapping,\n- can used a page identifier and position identifier in the page frame\n+
sb_flag
\n+ super block flags\n+
i_size
\n+ file length in bytes\n
wsize
\n write size\n-
i_state
\n- inode state flags\n+
dev
\n+ device identifier\n+
ino
\n+ inode number \n
for_reclaim
\n a flag of writeback_control,\n indicates if it's invoked from the page allocator\n+
i_state
\n+ inode state flags\n
i_flag
\n file flags\n-
i_size
\n- file length in bytes\n-
size
\n- number of pages to be written in this execution\n+
page_index
\n+ offset within mapping,\n+ can used a page identifier and position identifier in the page frame\n
probe::nfs.aop.writepages — \n NFS client writing several dirty pages to the NFS server\n-
nfs.aop.writepages
wsize
\n- write size\n+
nfs.aop.writepages
nr_to_write
\n+ number of pages attempted to be written in this execution\n
dev
\n device identifier\n-
wpages
\n- write size (in pages)\n-
ino
\n- inode number\n+
wsize
\n+ write size\n
for_kupdate
\n a flag of writeback_control,\n indicates if it's a kupdate writeback\n
size
\n number of pages attempted to be written in this execution\n-
nr_to_write
\n- number of pages attempted to be written in this execution\n
for_reclaim
\n a flag of writeback_control,\n indicates if it's invoked from the page allocator\n+
ino
\n+ inode number\n+
wpages
\n+ write size (in pages)\n
probe::nfs.fop.aio_read — \n NFS client aio_read file operation\n-
nfs.fop.aio_read
parent_name
\n- parent dir name\n+
nfs.fop.aio_read
pos
\n+ current position of file \n+
dev
\n+ device identifier\n+
cache_valid
\n+ cache related bit mask flag\n+
cache_time
\n+ when we started read-caching this inode\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n
file_name
\n file name\n-
dev
\n- device identifier\n-
count
\n- read bytes\n-
cache_valid
\n- cache related bit mask flag\n-
buf
\n- the address of buf in user space\n
ino
\n inode number \n-
pos
\n- current position of file \n-
cache_time
\n- when we started read-caching this inode\n+
buf
\n+ the address of buf in user space\n+
count
\n+ read bytes\n+
parent_name
\n+ parent dir name\n
probe::nfs.fop.aio_write — \n NFS client aio_write file operation\n-
nfs.fop.aio_write
probe::nfs.fop.flush — \n NFS client flush file operation\n-
nfs.fop.flush
probe::nfs.fop.llseek — \n NFS client llseek operation\n-
nfs.fop.llseek
whence
\n+
nfs.fop.llseek
dev
\n+ device identifier\n+
whence_str
\n+ symbolic string representation of the position to seek from\n+
whence
\n the position to seek from\n
ino
\n inode number\n-
dev
\n- device identifier\n
offset
\n the offset of the file will be repositioned\n-
whence_str
\n- symbolic string representation of the position to seek from\n
probe::nfs.fop.lock — \n NFS client file lock operation\n-
nfs.fop.lock
fl_type
\n- lock type\n+
nfs.fop.lock
fl_end
\n+ ending offset of locked region\n
cmd
\n cmd arguments\n+
fl_type
\n+ lock type\n+
dev
\n+ device identifier\n
i_mode
\n file type and access rights\n
ino
\n inode number\n
fl_start
\n starting offset of locked region\n
fl_flag
\n lock flags\n-
dev
\n- device identifier\n-
fl_end
\n- ending offset of locked region\n
probe::nfs.fop.mmap — \n NFS client mmap operation\n-
nfs.fop.mmap
vm_start
\n- start address within vm_mm \n+
nfs.fop.mmap
vm_end
\n+ the first byte after end address within vm_mm\n
cache_time
\n when we started read-caching this inode\n-
vm_flag
\n- vm flags\n+
attrtimeo
\n+ how long the cached information is assumed to be valid.\n+ We need to revalidate the cached attrs for this inode \n+ if jiffies - read_cache_jiffies > attrtimeo.\n
file_name
\n file name\n-
vm_end
\n- the first byte after end address within vm_mm\n
buf
\n the address of buf in user space\n
ino
\n inode number \n-
attrtimeo
\n- how long the cached information is assumed to be valid.\n- We need to revalidate the cached attrs for this inode \n- if jiffies - read_cache_jiffies > attrtimeo.\n-
parent_name
\n- parent dir name\n
dev
\n device identifier\n
cache_valid
\n cache related bit mask flag\n+
vm_flag
\n+ vm flags\n+
parent_name
\n+ parent dir name\n+
vm_start
\n+ start address within vm_mm \n
probe::nfs.fop.open — \n NFS client file open operation\n-
nfs.fop.open
probe::nfs.fop.read_iter — \n NFS client read_iter file operation\n-
nfs.fop.read_iter
count
\n- read bytes\n-
dev
\n- device identifier\n+
nfs.fop.read_iter
cache_valid
\n+ cache related bit mask flag\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n-
parent_name
\n- parent dir name\n+
cache_time
\n+ when we started read-caching this inode\n+
count
\n+ read bytes\n
file_name
\n file name\n-
cache_valid
\n- cache related bit mask flag\n
ino
\n inode number \n+
parent_name
\n+ parent dir name\n+
dev
\n+ device identifier\n
pos
\n current position of file \n-
cache_time
\n- when we started read-caching this inode\n
probe::nfs.fop.release — \n NFS client release page operation\n-
nfs.fop.release
probe::nfs.fop.sendfile — \n NFS client send file operation\n-
nfs.fop.sendfile
ppos
\n- current position of file\n+
nfs.fop.sendfile
count
\n+ read bytes\n+
ino
\n+ inode number\n
cache_time
\n when we started read-caching this inode\n-
dev
\n- device identifier\n-
count
\n- read bytes\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n+
ppos
\n+ current position of file\n
cache_valid
\n cache related bit mask flag\n-
ino
\n- inode number\n+
dev
\n+ device identifier\n
probe::nfs.fop.write_iter — \n NFS client write_iter file operation\n
nfs.fop.write_iter
probe::nfs.proc.commit_done — \n NFS client response to a commit RPC task\n-
nfs.proc.commit_done
valid
\n+
nfs.proc.commit_done
status
\n+ result of last operation\n+
prot
\n+ transfer protocol\n+
timestamp
\n+ V4 timestamp, which is used for lease renewal\n+
valid
\n fattr->valid, indicates which fields are valid \n
version
\n NFS version\n-
prot
\n- transfer protocol\n-
status
\n- result of last operation\n-
count
\n- number of bytes committed\n
server_ip
\n IP address of server\n-
timestamp
\n- V4 timestamp, which is used for lease renewal\n+
count
\n+ number of bytes committed\n
probe::nfs.proc.commit_setup — \n NFS client setting up a commit RPC task\n-
nfs.proc.commit_setup
version
\n- NFS version\n-
bitmask1
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n-
prot
\n- transfer protocol\n+
nfs.proc.commit_setup
count
\n+ bytes in this commit\n
offset
\n the file offset\n-
size
\n- bytes in this commit\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
count
\n- bytes in this commit\n+
version
\n+ NFS version\n
server_ip
\n IP address of server\n+
size
\n+ bytes in this commit\n+
bitmask1
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n+
prot
\n+ transfer protocol\n
probe::nfs.proc.commit — \n NFS client committing data on server\n-
nfs.proc.commit
size
\n- read bytes in this execution\n-
server_ip
\n- IP address of server\n-
bitmask0
\n+
nfs.proc.commit
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
version
\n- NFS version\n
offset
\n the file offset\n+
size
\n+ read bytes in this execution\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n
prot
\n transfer protocol\n+
server_ip
\n+ IP address of server\n+
version
\n+ NFS version\n
\n All the nfs.proc.commit kernel functions were removed in kernel\n commit 200baa in December 2006, so these probes do not exist on Linux\n 2.6.21 and newer kernels.\n
\n \n Fires when client writes the buffered data to disk.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "comments": ["Ordering differences only"], "unified_diff": "@@ -1,17 +1,17 @@\n
probe::nfs.proc.create — \n NFS client creating file on server\n
nfs.proc.create
server_ip
\n IP address of server\n-
flag
\n- indicates create mode (only for NFSv3 and NFSv4)\n-
fh
\n- file handle of parent dir\n-
filename
\n- file name\n
version
\n NFS version (the function is used for all NFS version)\n-
filelen
\n- length of file name\n
prot
\n transfer protocol\n+
fh
\n+ file handle of parent dir\n+
filelen
\n+ length of file name\n+
filename
\n+ file name\n+
flag
\n+ indicates create mode (only for NFSv3 and NFSv4)\n
probe::nfs.proc.lookup — \n NFS client opens/searches a file on server\n-
nfs.proc.lookup
bitmask0
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n-
server_ip
\n- IP address of server\n-
name_len
\n- the length of file name\n-
bitmask1
\n+
nfs.proc.lookup
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n
prot
\n transfer protocol\n+
server_ip
\n+ IP address of server\n
version
\n NFS version\n+
bitmask0
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n+
name_len
\n+ the length of file name\n
filename
\n the name of file which client opens/searches on server\n
probe::nfs.proc.open — \n NFS client allocates file read/write context information\n
nfs.proc.open
probe::nfs.proc.read_done — \n NFS client response to a read RPC task\n-
nfs.proc.read_done
version
\n- NFS version\n+
nfs.proc.read_done
timestamp
\n+ V4 timestamp, which is used for lease renewal\n
prot
\n transfer protocol\n+
status
\n+ result of last operation\n
server_ip
\n IP address of server\n+
version
\n+ NFS version\n
count
\n number of bytes read\n-
status
\n- result of last operation\n-
timestamp
\n- V4 timestamp, which is used for lease renewal\n
probe::nfs.proc.read_setup — \n NFS client setting up a read RPC task\n-
nfs.proc.read_setup
count
\n- read bytes in this execution\n-
server_ip
\n- IP address of server\n-
size
\n+
nfs.proc.read_setup
probe::nfs.proc.read — \n NFS client synchronously reads file from server\n
nfs.proc.read
count
\n read bytes in this execution\n+
offset
\n+ the file offset\n
server_ip
\n IP address of server\n-
flags
\n- used to set task->tk_flags in rpc_init_task function\n
version
\n NFS version\n+
flags
\n+ used to set task->tk_flags in rpc_init_task function\n
prot
\n transfer protocol\n-
offset
\n- the file offset\n
probe::nfs.proc.release — \n NFS client releases file read/write context information\n-
nfs.proc.release
server_ip
\n- IP address of server\n-
flag
\n+
nfs.proc.release
probe::nfs.proc.remove — \n NFS client removes a file on server\n-
nfs.proc.remove
probe::nfs.proc.rename_done — \n NFS client response to a rename RPC task\n-
nfs.proc.rename_done
old_fh
\n- file handle of old parent dir\n-
prot
\n- transfer protocol\n-
version
\n+
nfs.proc.rename_done
version
\n NFS version\n-
timestamp
\n- V4 timestamp, which is used for lease renewal\n-
new_fh
\n- file handle of new parent dir\n
server_ip
\n IP address of server\n+
timestamp
\n+ V4 timestamp, which is used for lease renewal\n
status
\n result of last operation\n+
old_fh
\n+ file handle of old parent dir\n+
prot
\n+ transfer protocol\n+
new_fh
\n+ file handle of new parent dir\n
probe::nfs.proc.rename_setup — \n NFS client setting up a rename RPC task\n-
nfs.proc.rename_setup
server_ip
\n- IP address of server\n-
prot
\n+
nfs.proc.rename_setup
probe::nfs.proc.rename — \n NFS client renames a file on server\n-
nfs.proc.rename
version
\n- NFS version (the function is used for all NFS version)\n+
nfs.proc.rename
new_fh
\n+ file handle of new parent dir\n
old_filelen
\n length of old file name\n-
prot
\n- transfer protocol\n-
old_fh
\n- file handle of old parent dir\n-
new_name
\n- new file name\n-
new_fh
\n- file handle of new parent dir\n-
server_ip
\n- IP address of server\n
old_name
\n old file name\n+
old_fh
\n+ file handle of old parent dir\n+
prot
\n+ transfer protocol\n
new_filelen
\n length of new file name\n+
server_ip
\n+ IP address of server\n+
new_name
\n+ new file name\n+
version
\n+ NFS version (the function is used for all NFS version)\n
probe::nfs.proc.write_done — \n NFS client response to a write RPC task\n-
nfs.proc.write_done
prot
\n- transfer protocol\n-
valid
\n+
nfs.proc.write_done
valid
\n fattr->valid, indicates which fields are valid \n
version
\n NFS version\n-
count
\n- number of bytes written\n
server_ip
\n IP address of server\n
status
\n result of last operation\n+
prot
\n+ transfer protocol\n
timestamp
\n V4 timestamp, which is used for lease renewal\n+
count
\n+ number of bytes written\n
probe::nfs.proc.write_setup — \n NFS client setting up a write RPC task\n-
nfs.proc.write_setup
bitmask0
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n-
count
\n- bytes written in this execution\n-
server_ip
\n- IP address of server\n-
size
\n+
nfs.proc.write_setup
size
\n bytes written in this execution\n-
how
\n- used to set args.stable. The stable value could be:\n- NFS_UNSTABLE,NFS_DATA_SYNC,NFS_FILE_SYNC\n- (in nfs.proc3.write_setup and nfs.proc4.write_setup)\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem \n-
offset
\n- the file offset\n
prot
\n transfer protocol\n+
how
\n+ used to set args.stable. The stable value could be:\n+ NFS_UNSTABLE,NFS_DATA_SYNC,NFS_FILE_SYNC\n+ (in nfs.proc3.write_setup and nfs.proc4.write_setup)\n
version
\n NFS version\n+
server_ip
\n+ IP address of server\n+
offset
\n+ the file offset\n+
bitmask0
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n+
count
\n+ bytes written in this execution\n
probe::nfs.proc.write — \n NFS client synchronously writes file to server\n-
nfs.proc.write
bitmask1
\n+
nfs.proc.write
offset
\n+ the file offset\n+
bitmask0
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n+
size
\n+ read bytes in this execution\n+
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
offset
\n- the file offset\n
prot
\n transfer protocol\n-
version
\n- NFS version\n
flags
\n used to set task->tk_flags in rpc_init_task function\n-
bitmask0
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n+
version
\n+ NFS version\n
server_ip
\n IP address of server\n-
size
\n- read bytes in this execution\n
probe::nfsd.commit — \n NFS server committing all pending writes to stable storage\n
nfsd.commit
size
\n read bytes\n
flag
\n indicates whether this execution is a sync operation\n-
count
\n- read bytes\n
offset
\n the offset of file\n-
client_ip
\n- the ip address of client\n+
count
\n+ read bytes\n
fh
\n file handle (the first part is the length of the file handle)\n+
client_ip
\n+ the ip address of client\n
probe::nfsd.create — \n NFS server creating a file(regular,dir,device,fifo) for client\n
nfsd.create
fh
\n file handle (the first part is the length of the file handle)\n-
type
\n- file type(regular,dir,device,fifo ...)\n-
client_ip
\n- the ip address of client\n
filename
\n file name \n-
iap_mode
\n- file access mode\n+
client_ip
\n+ the ip address of client\n
iap_valid
\n Attribute flags\n+
type
\n+ file type(regular,dir,device,fifo ...)\n+
iap_mode
\n+ file access mode\n
filelen
\n the length of file name\n
probe::nfsd.createv3 — \n NFS server creating a regular file or set file attributes for client\n-
nfsd.createv3
fh
\n- file handle (the first part is the length of the file handle)\n+
nfsd.createv3
iap_valid
\n+ Attribute flags\n
client_ip
\n the ip address of client\n
filename
\n file name \n-
truncp
\n- trunp arguments, indicates if the file shouldbe truncate\n-
iap_mode
\n- file access mode\n-
createmode
\n- create mode .The possible values could be: NFS3_CREATE_EXCLUSIVE, NFS3_CREATE_UNCHECKED, or NFS3_CREATE_GUARDED\n-
iap_valid
\n- Attribute flags\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
verifier
\n file attributes (atime,mtime,mode). It's used to reset file attributes for CREATE_EXCLUSIVE\n
filelen
\n the length of file name\n+
iap_mode
\n+ file access mode\n+
createmode
\n+ create mode .The possible values could be: NFS3_CREATE_EXCLUSIVE, NFS3_CREATE_UNCHECKED, or NFS3_CREATE_GUARDED\n+
truncp
\n+ trunp arguments, indicates if the file shouldbe truncate\n
probe::nfsd.dispatch — \n NFS server receives an operation from client\n-
nfsd.dispatch
probe::nfsd.lookup — \n NFS server opening or searching file for a file for client\n
nfsd.lookup
probe::nfsd.open — \n NFS server opening a file for client\n-
nfsd.open
probe::nfsd.proc.commit — \n NFS server performing a commit operation for client\n-
nfsd.proc.commit
uid
\n- requester's user id\n-
version
\n- nfs version\n-
fh
\n+
nfsd.proc.commit
fh
\n file handle (the first part is the length of the file handle)\n-
client_ip
\n- the ip address of client\n+
proto
\n+ transfer protocol\n
count
\n read bytes\n+
client_ip
\n+ the ip address of client\n
gid
\n requester's group id\n
size
\n read bytes\n-
proto
\n- transfer protocol\n+
version
\n+ nfs version\n
offset
\n the offset of file \n+
uid
\n+ requester's user id\n
probe::nfsd.proc.create — \n NFS server creating a file for client\n-
nfsd.proc.create
uid
\n- requester's user id\n+
nfsd.proc.create
proto
\n+ transfer protocol\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
filename
\n file name\n
client_ip
\n the ip address of client\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
version
\n- nfs version\n
gid
\n requester's group id\n+
uid
\n+ requester's user id\n
filelen
\n length of file name\n-
proto
\n- transfer protocol\n+
version
\n+ nfs version\n
probe::nfsd.proc.lookup — \n NFS server opening or searching for a file for client\n-
nfsd.proc.lookup
filelen
\n- the length of file name\n-
filename
\n+
nfsd.proc.lookup
filename
\n file name \n-
uid
\n- requester's user id\n-
gid
\n- requester's group id\n-
version
\n- nfs version\n
fh
\n file handle of parent dir (the first part is the length of the file handle)\n+
version
\n+ nfs version\n+
gid
\n+ requester's group id\n+
filelen
\n+ the length of file name\n
proto
\n transfer protocol\n
client_ip
\n the ip address of client\n+
uid
\n+ requester's user id\n
probe::nfsd.proc.read — \n NFS server reading file for client\n-
nfsd.proc.read
offset
\n- the offset of file \n-
proto
\n- transfer protocol\n-
gid
\n- requester's group id\n-
size
\n- read bytes\n-
count
\n- read bytes\n-
client_ip
\n- the ip address of client\n+
nfsd.proc.read
vlen
\n+ read blocks \n
version
\n nfs version\n-
fh
\n- file handle (the first part is the length of the file handle)\n
vec
\n struct kvec, includes buf address in kernel address and length of each buffer\n
uid
\n requester's user id\n-
vlen
\n- read blocks \n+
offset
\n+ the offset of file \n+
client_ip
\n+ the ip address of client\n+
size
\n+ read bytes\n+
gid
\n+ requester's group id\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
count
\n+ read bytes\n+
proto
\n+ transfer protocol\n
probe::nfsd.proc.remove — \n NFS server removing a file for client\n-
nfsd.proc.remove
proto
\n- transfer protocol\n+
nfsd.proc.remove
version
\n+ nfs version\n
filelen
\n length of file name\n+
uid
\n+ requester's user id\n
gid
\n requester's group id\n-
version
\n- nfs version\n-
fh
\n- file handle (the first part is the length of the file handle)\n
client_ip
\n the ip address of client\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
filename
\n file name\n-
uid
\n- requester's user id\n+
proto
\n+ transfer protocol\n
probe::nfsd.proc.rename — \n NFS Server renaming a file for client\n-
nfsd.proc.rename
client_ip
\n+
nfsd.proc.rename
tname
\n+ new file name\n+
client_ip
\n the ip address of client\n-
tlen
\n- length of new file name\n-
fh
\n- file handler of old path\n
tfh
\n file handler of new path\n-
uid
\n- requester's user id\n
flen
\n length of old file name \n+
fh
\n+ file handler of old path\n
filename
\n old file name \n+
uid
\n+ requester's user id\n+
tlen
\n+ length of new file name\n
gid
\n requester's group id\n-
tname
\n- new file name\n
probe::nfsd.proc.write — \n NFS server writing data to file for client\n-
nfsd.proc.write
offset
\n+
nfsd.proc.write
stable
\n+ argp->stable\n+
uid
\n+ requester's user id\n+
offset
\n the offset of file \n-
proto
\n- transfer protocol\n-
gid
\n- requester's group id\n+
version
\n+ nfs version\n+
vlen
\n+ read blocks \n
size
\n read bytes\n-
stable
\n- argp->stable\n-
count
\n- read bytes\n+
gid
\n+ requester's group id\n
client_ip
\n the ip address of client\n
vec
\n struct kvec, includes buf address in kernel address and length of each buffer\n+
count
\n+ read bytes\n+
proto
\n+ transfer protocol\n
fh
\n file handle (the first part is the length of the file handle)\n-
version
\n- nfs version\n-
uid
\n- requester's user id\n-
vlen
\n- read blocks \n
probe::nfsd.read — \n NFS server reading data from a file for client\n-
nfsd.read
client_ip
\n- the ip address of client\n+
nfsd.read
count
\n+ read bytes\n
fh
\n file handle (the first part is the length of the file handle)\n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n
file
\n argument file, indicates if the file has been opened.\n-
vlen
\n- read blocks \n-
offset
\n- the offset of file \n+
client_ip
\n+ the ip address of client\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
size
\n read bytes\n-
count
\n- read bytes\n+
offset
\n+ the offset of file \n+
vlen
\n+ read blocks \n
probe::nfsd.rename — \n NFS server renaming a file for client\n-
nfsd.rename
client_ip
\n- the ip address of client\n-
tlen
\n- length of new file name\n-
fh
\n- file handler of old path\n+
nfsd.rename
probe::nfsd.unlink — \n NFS server removing a file or a directory for client\n-
nfsd.unlink
probe::nfsd.write — \n NFS server writing data to a file for client\n-
nfsd.write
client_ip
\n- the ip address of client\n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
file
\n- argument file, indicates if the file has been opened.\n+
nfsd.write
size
\n+ read bytes\n
vlen
\n read blocks \n
offset
\n the offset of file \n-
size
\n- read bytes\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
count
\n read bytes\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n+
file
\n+ argument file, indicates if the file has been opened.\n+
client_ip
\n+ the ip address of client\n
probe::scheduler.cpu_off — \n Process is about to stop running on a cpu\n-
scheduler.cpu_off
idle
\n+
scheduler.cpu_off
task_next
\n+ the process replacing current\n+
idle
\n boolean indicating whether current is the idle process\n-
task_prev
\n- the process leaving the cpu (same as current)\n
name
\n name of the probe point\n-
task_next
\n- the process replacing current\n+
task_prev
\n+ the process leaving the cpu (same as current)\n
probe::scheduler.cpu_on — \n Process is beginning execution on a cpu\n-
scheduler.cpu_on
task_prev
\n+
scheduler.cpu_on
probe::scheduler.ctxswitch — \n A context switch is occuring.\n
scheduler.ctxswitch
prev_tid
\n The TID of the process to be switched out\n-
prev_priority
\n- The priority of the process to be switched out\n-
prevtsk_state
\n- the state of the process to be switched out\n-
next_task_name
\n- The name of the process to be switched in\n
name
\n name of the probe point\n
prev_pid
\n The PID of the process to be switched out\n-
next_tid
\n- The TID of the process to be switched in\t \n+
prevtsk_state
\n+ the state of the process to be switched out\n+
nexttsk_state
\n+ the state of the process to be switched in\n
next_pid
\n The PID of the process to be switched in\n+
next_tid
\n+ The TID of the process to be switched in\t \n+
next_task_name
\n+ The name of the process to be switched in\n
next_priority
\n The priority of the process to be switched in\n
prev_task_name
\n The name of the process to be switched out\n-
nexttsk_state
\n- the state of the process to be switched in\n+
prev_priority
\n+ The priority of the process to be switched out\n
probe::scheduler.kthread_stop.return — \n A kthread is stopped and gets the return value\n-
scheduler.kthread_stop.return
return_value
\n- return value after stopping the thread\n-
name
\n+
scheduler.kthread_stop.return
probe::scheduler.kthread_stop — \n A thread created by kthread_create is being stopped\n-
scheduler.kthread_stop
thread_pid
\n- PID of the thread being stopped\n-
thread_priority
\n+
scheduler.kthread_stop
probe::scheduler.migrate — \n Task migrating across cpus\n-
scheduler.migrate
cpu_to
\n+
scheduler.migrate
priority
\n+ priority of the task being migrated\n+
cpu_to
\n the destination cpu\n+
pid
\n+ PID of the task being migrated\n
cpu_from
\n the original cpu\n-
task
\n- the process that is being migrated\n
name
\n name of the probe point\n-
priority
\n- priority of the task being migrated\n-
pid
\n- PID of the task being migrated\n+
task
\n+ the process that is being migrated\n
probe::scheduler.process_exit — \n Process exiting\n-
scheduler.process_exit
probe::scheduler.process_free — \n Scheduler freeing a data structure for a process\n-
scheduler.process_free
probe::scheduler.process_wait — \n Scheduler starting to wait on a process\n-
scheduler.process_wait
probe::scheduler.signal_send — \n Sending a signal\n-
scheduler.signal_send
probe::scheduler.tick — \n Schedulers internal tick, a processes timeslice accounting is updated\n-
scheduler.tick
name
\n- name of the probe point\n-
idle
\n+
scheduler.tick
probe::scheduler.wait_task — \n Waiting on a task to unschedule (become inactive)\n-
scheduler.wait_task
probe::scheduler.wakeup_new — \n Newly created task is woken up for the first time\n-
scheduler.wakeup_new
task_cpu
\n- cpu of the task woken up\n-
task_state
\n- state of the task woken up\n+
scheduler.wakeup_new
task_tid
\n+ TID of the new task woken up\n+
task_pid
\n+ PID of the new task woken up\n
name
\n name of the probe point\n-
task_tid
\n- TID of the new task woken up\n+
task_state
\n+ state of the task woken up\n
task_priority
\n priority of the new task\n-
task_pid
\n- PID of the new task woken up\n+
task_cpu
\n+ cpu of the task woken up\n
probe::scheduler.wakeup — \n Task is woken up\n-
scheduler.wakeup
task_cpu
\n- cpu of the task being woken up\n-
task_state
\n+
scheduler.wakeup
task_state
\n state of the task being woken up\n-
name
\n- name of the probe point\n+
task_cpu
\n+ cpu of the task being woken up\n
task_priority
\n priority of the task being woken up\n
task_pid
\n PID of the task being woken up\n
task_tid
\n tid of the task being woken up\n+
name
\n+ name of the probe point\n
probe::scsi.iocompleted — \n SCSI mid-layer running the completion processing for block device I/O requests\n-
scsi.iocompleted
dev_id
\n- The scsi device id\n-
device_state
\n+
scsi.iocompleted
device_state
\n The current state of the device\n+
host_no
\n+ The host number\n+
device_state_str
\n+ The current state of the device, as a string\n+
dev_id
\n+ The scsi device id\n
req_addr
\n The current struct request pointer, as a number\n
data_direction_str
\n Data direction, as a string\n-
host_no
\n- The host number\n-
channel
\n- The channel number\n
data_direction
\n The data_direction specifies whether this command is from/to\n the device\n-
device_state_str
\n- The current state of the device, as a string\n-
lun
\n- The lun number\n+
channel
\n+ The channel number\n
goodbytes
\n The bytes completed\n+
lun
\n+ The lun number\n
probe::scsi.iodispatching — \n SCSI mid-layer dispatched low-level SCSI command\n-
scsi.iodispatching
data_direction
\n+
scsi.iodispatching
request_bufflen
\n+ The request buffer length\n+
request_buffer
\n+ The request buffer address\n+
data_direction
\n The data_direction specifies whether this command is from/to the device\n 0 (DMA_BIDIRECTIONAL), 1 (DMA_TO_DEVICE),\n 2 (DMA_FROM_DEVICE), 3 (DMA_NONE)\n
lun
\n The lun number\n-
device_state_str
\n- The current state of the device, as a string\n-
request_buffer
\n- The request buffer address\n-
req_addr
\n- The current struct request pointer, as a number\n-
device_state
\n- The current state of the device\n-
dev_id
\n- The scsi device id\n-
request_bufflen
\n- The request buffer length\n
channel
\n The channel number\n
data_direction_str
\n Data direction, as a string\n+
device_state
\n+ The current state of the device\n
host_no
\n The host number\n+
dev_id
\n+ The scsi device id\n+
req_addr
\n+ The current struct request pointer, as a number\n+
device_state_str
\n+ The current state of the device, as a string\n
probe::scsi.iodone — \n SCSI command completed by low level driver and enqueued into the done queue.\n-
scsi.iodone
channel
\n+
scsi.iodone
data_direction_str
\n+ Data direction, as a string\n+
lun
\n+ The lun number\n+
scsi_timer_pending
\n+ 1 if a timer is pending on this request\n+
channel
\n The channel number\n+
data_direction
\n+ The data_direction specifies whether this command is\n+ from/to the device.\n
host_no
\n The host number\n-
data_direction_str
\n- Data direction, as a string\n-
req_addr
\n- The current struct request pointer, as a number\n
device_state
\n The current state of the device\n-
dev_id
\n- The scsi device id\n-
scsi_timer_pending
\n- 1 if a timer is pending on this request\n-
lun
\n- The lun number\n
device_state_str
\n The current state of the device, as a string\n-
data_direction
\n- The data_direction specifies whether this command is\n- from/to the device.\n+
req_addr
\n+ The current struct request pointer, as a number\n+
dev_id
\n+ The scsi device id\n
probe::scsi.ioentry — \n Prepares a SCSI mid-layer request\n
scsi.ioentry
device_state_str
\n The current state of the device, as a string\n-
disk_major
\n- The major number of the disk (-1 if no information)\n
disk_minor
\n The minor number of the disk (-1 if no information)\n+
disk_major
\n+ The major number of the disk (-1 if no information)\n
device_state
\n The current state of the device\n
req_addr
\n The current struct request pointer, as a number\n
probe::scsi.ioexecute — \n Create mid-layer SCSI request and wait for the result\n-
scsi.ioexecute
timeout
\n+
scsi.ioexecute
device_state
\n+ The current state of the device\n+
host_no
\n+ The host number\n+
timeout
\n Request timeout in seconds\n-
data_direction
\n- The data_direction specifies whether this command is\n- from/to the device.\n
retries
\n Number of times to retry request\n-
lun
\n- The lun number\n-
device_state_str
\n- The current state of the device, as a string\n-
request_buffer
\n- The data buffer address\n-
device_state
\n- The current state of the device\n
dev_id
\n The scsi device id\n+
device_state_str
\n+ The current state of the device, as a string\n
request_bufflen
\n The data buffer buffer length\n+
request_buffer
\n+ The data buffer address\n+
data_direction
\n+ The data_direction specifies whether this command is\n+ from/to the device.\n+
lun
\n+ The lun number\n
channel
\n The channel number\n-
host_no
\n- The host number\n
data_direction_str
\n Data direction, as a string\n
probe::scsi.set_state — \n Order SCSI device state change\n-
scsi.set_state
host_no
\n- The host number\n-
channel
\n- The channel number\n-
dev_id
\n+
scsi.set_state
dev_id
\n The scsi device id\n
old_state
\n The current state of the device\n-
lun
\n- The lun number\n+
host_no
\n+ The host number\n+
old_state_str
\n+ The current state of the device, as a string\n
state
\n The new state of the device\n
state_str
\n The new state of the device, as a string\n-
old_state_str
\n- The current state of the device, as a string\n+
lun
\n+ The lun number\n+
channel
\n+ The channel number\n
probe::signal.check_ignored.return — \n Check to see signal is ignored completed\n-
signal.check_ignored.return
probe::signal.check_ignored — \n Checking to see signal is ignored\n-
signal.check_ignored
probe::signal.checkperm — \n Check being performed on a sent signal\n-
signal.checkperm
sig_name
\n- A string representation of the signal\n+
signal.checkperm
sinfo
\n+ The address of the siginfo structure\n+
si_code
\n+ Indicates the signal type\n
name
\n Name of the probe point\n-
sig_pid
\n- The PID of the process receiving the signal\n
task
\n A task handle to the signal recipient\n-
si_code
\n- Indicates the signal type\n-
pid_name
\n- Name of the process receiving the signal\n
sig
\n The number of the signal\n-
sinfo
\n- The address of the siginfo structure\n+
pid_name
\n+ Name of the process receiving the signal\n+
sig_name
\n+ A string representation of the signal\n+
sig_pid
\n+ The PID of the process receiving the signal\n
probe::signal.do_action.return — \n Examining or changing a signal action completed\n-
signal.do_action.return
probe::signal.do_action — \n Examining or changing a signal action\n-
signal.do_action
oldsigact_addr
\n- The address of the old sigaction\n- struct associated with the signal\n-
sa_handler
\n+
signal.do_action
sa_handler
\n The new handler of the signal\n-
sig
\n- The signal to be examined/changed\n-
sig_name
\n- A string representation of the signal\n-
name
\n- Name of the probe point\n
sigact_addr
\n The address of the new sigaction\n struct associated with the signal\n+
oldsigact_addr
\n+ The address of the old sigaction\n+ struct associated with the signal\n
sa_mask
\n The new mask of the signal\n+
name
\n+ Name of the probe point\n+
sig
\n+ The signal to be examined/changed\n+
sig_name
\n+ A string representation of the signal\n
probe::signal.flush — \n Flushing all pending signals for a task\n-
signal.flush
task
\n- The task handler of the process performing the flush\n-
pid_name
\n+
signal.flush
probe::signal.force_segv.return — \n Forcing send of SIGSEGV complete\n-
signal.force_segv.return
probe::signal.force_segv — \n Forcing send of SIGSEGV\n-
signal.force_segv
probe::signal.handle — \n Signal handler being invoked\n-
signal.handle
sig_mode
\n- Indicates whether the signal was a user-mode or kernel-mode signal\n-
ka_addr
\n- The address of the k_sigaction table\n- associated with the signal\n-
regs
\n- The address of the kernel-mode stack area (deprecated in\n- SystemTap 2.1)\n-
name
\n- Name of the probe point\n-
sig_name
\n- A string representation of the signal\n+
signal.handle
oldset_addr
\n+ The address of the bitmask array of blocked signals\n+ (deprecated in SystemTap 2.1)\n
sig_code
\n The si_code value of the siginfo signal\n+
name
\n+ Name of the probe point\n
sinfo
\n The address of the siginfo table\n+
sig_name
\n+ A string representation of the signal\n+
ka_addr
\n+ The address of the k_sigaction table\n+ associated with the signal\n
sig
\n The signal number that invoked the signal handler\n-
oldset_addr
\n- The address of the bitmask array of blocked signals\n- (deprecated in SystemTap 2.1)\n+
sig_mode
\n+ Indicates whether the signal was a user-mode or kernel-mode signal\n+
regs
\n+ The address of the kernel-mode stack area (deprecated in\n+ SystemTap 2.1)\n
probe::signal.pending — \n Examining pending signal\n-
signal.pending
sigset_add
\n- The address of the user-space signal set\n- (sigset_t)\n-
sigset_size
\n+
signal.pending
probe::signal.procmask — \n Examining or changing blocked signals\n-
signal.procmask
oldsigset_addr
\n- The old address of the signal set\n- (sigset_t)\n-
sigset
\n+
signal.procmask
sigset
\n The actual value to be set for sigset_t\n (correct?)\n+
name
\n+ Name of the probe point\n
sigset_addr
\n The address of the signal set (sigset_t)\n to be implemented\n+
oldsigset_addr
\n+ The old address of the signal set\n+ (sigset_t)\n
how
\n Indicates how to change the blocked signals; possible values are\n SIG_BLOCK=0 (for blocking signals),\n SIG_UNBLOCK=1 (for unblocking signals), and\n SIG_SETMASK=2 for setting the signal mask.\n-
name
\n- Name of the probe point\n
probe::signal.send.return — \n Signal being sent to a process completed (deprecated in SystemTap 2.1)\n
signal.send.return
retstr
\n The return value to either __group_send_sig_info, specific_send_sig_info, or send_sigqueue\n
send2queue
\n Indicates whether the sent signal was sent to an existing sigqueue\n-
name
\n- The name of the function used to send out the signal\n
shared
\n Indicates whether the sent signal is shared by the thread group.\n+
name
\n+ The name of the function used to send out the signal\n
\n Possible __group_send_sig_info and\n specific_send_sig_info return values are as follows;\n
\n \n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-signal-send-sig-queue.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-signal-send-sig-queue.html", "unified_diff": "@@ -1,15 +1,15 @@\n
probe::signal.send_sig_queue — \n Queuing a signal to a process\n-
signal.send_sig_queue
sig_name
\n- A string representation of the signal\n-
name
\n- Name of the probe point\n+
signal.send_sig_queue
sig
\n+ The queued signal\n+
pid_name
\n+ Name of the process to which the signal is queued\n
sig_pid
\n The PID of the process to which the signal is queued\n+
sig_name
\n+ A string representation of the signal\n
sigqueue_addr
\n The address of the signal queue\n-
sig
\n- The queued signal\n-
pid_name
\n- Name of the process to which the signal is queued\n+
name
\n+ Name of the probe point\n
probe::signal.send — \n Signal being sent to a process\n-
signal.send
shared
\n+
signal.send
si_code
\n+ Indicates the signal type\n+
sinfo
\n+ The address of siginfo struct\n+
shared
\n Indicates whether the signal is shared by the thread group\n-
sig_name
\n- A string representation of the signal\n
name
\n The name of the function used to send out the signal\n-
sig_pid
\n- The PID of the process receiving the signal\n-
task
\n- A task handle to the signal recipient\n-
si_code
\n- Indicates the signal type\n
send2queue
\n Indicates whether the signal is sent to an existing\n sigqueue (deprecated in SystemTap 2.1)\n+
task
\n+ A task handle to the signal recipient\n
sig
\n The number of the signal\n
pid_name
\n The name of the signal recipient\n-
sinfo
\n- The address of siginfo struct\n+
sig_pid
\n+ The PID of the process receiving the signal\n+
sig_name
\n+ A string representation of the signal\n
probe::signal.sys_tgkill.return — \n Sending kill signal to a thread group completed\n-
signal.sys_tgkill.return
probe::signal.sys_tgkill — \n Sending kill signal to a thread group\n-
signal.sys_tgkill
sig_pid
\n- The PID of the thread receiving the kill signal\n-
name
\n+
signal.sys_tgkill
name
\n Name of the probe point\n-
sig_name
\n- A string representation of the signal\n-
sig
\n- The specific kill signal sent to the process\n-
pid_name
\n- The name of the signal recipient\n
tgid
\n The thread group ID of the thread receiving the kill signal\n
task
\n A task handle to the signal recipient\n+
sig
\n+ The specific kill signal sent to the process\n+
pid_name
\n+ The name of the signal recipient\n+
sig_name
\n+ A string representation of the signal\n+
sig_pid
\n+ The PID of the thread receiving the kill signal\n
probe::signal.sys_tkill — \n Sending a kill signal to a thread\n-
signal.sys_tkill
task
\n- A task handle to the signal recipient\n-
sig
\n- The specific signal sent to the process\n-
pid_name
\n- The name of the signal recipient\n+
signal.sys_tkill
sig_name
\n+ A string representation of the signal\n
sig_pid
\n The PID of the process receiving the kill signal\n-
sig_name
\n- A string representation of the signal\n+
pid_name
\n+ The name of the signal recipient\n+
sig
\n+ The specific signal sent to the process\n+
task
\n+ A task handle to the signal recipient\n
name
\n Name of the probe point\n
\n The tkill call is analogous to kill(2),\n except that it also allows a process within a specific thread group to\n be targeted. Such processes are targeted through their unique\n thread IDs (TID).\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-signal-syskill.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-signal-syskill.html", "unified_diff": "@@ -1,15 +1,15 @@\n
probe::signal.syskill — \n Sending kill signal to a process\n-
signal.syskill
sig_pid
\n+
signal.syskill
sig
\n+ The specific signal sent to the process\n+
sig_pid
\n The PID of the process receiving the signal\n
sig_name
\n A string representation of the signal\n-
name
\n- Name of the probe point\n-
sig
\n- The specific signal sent to the process\n
pid_name
\n The name of the signal recipient\n
task
\n A task handle to the signal recipient\n+
name
\n+ Name of the probe point\n
probe::signal.wakeup — \n Sleeping process being wakened for signal\n-
signal.wakeup
state_mask
\n+
signal.wakeup
resume
\n+ Indicates whether to wake up a task in a\n+ STOPPED or TRACED state\n+
state_mask
\n A string representation indicating the mask\n of task states to wake. Possible values are\n TASK_INTERRUPTIBLE, TASK_STOPPED,\n TASK_TRACED, TASK_WAKEKILL, and TASK_INTERRUPTIBLE.\n-
resume
\n- Indicates whether to wake up a task in a\n- STOPPED or TRACED state\n-
pid_name
\n- Name of the process to wake\n
sig_pid
\n The PID of the process to wake\n+
pid_name
\n+ Name of the process to wake\n
probe::socket.aio_read.return — \n Conclusion of message received via sock_aio_read
\n-
socket.aio_read.return
type
\n- Socket type value\n-
flags
\n- Socket flags value\n-
state
\n- Socket state value\n+
socket.aio_read.return
protocol
\n+ Protocol value\n+
name
\n+ Name of this probe\n
size
\n Size of message received (in bytes) or error code if success = 0\n-
protocol
\n- Protocol value\n+
state
\n+ Socket state value\n+
type
\n+ Socket type value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
name
\n- Name of this probe\n
family
\n Protocol family value\n+
flags
\n+ Socket flags value\n
probe::socket.aio_read — \n Receiving message via sock_aio_read
\n
socket.aio_read
size
\n Message size in bytes\n
protocol
\n Protocol value\n-
type
\n- Socket type value\n-
state
\n- Socket state value\n-
flags
\n- Socket flags value\n
name
\n Name of this probe\n+
type
\n+ Socket type value\n
family
\n Protocol family value\n+
flags
\n+ Socket flags value\n+
state
\n+ Socket state value\n
probe::socket.aio_write.return — \n Conclusion of message send via sock_aio_write
\n-
socket.aio_write.return
type
\n- Socket type value\n+
socket.aio_write.return
state
\n+ Socket state value\n
flags
\n Socket flags value\n-
state
\n- Socket state value\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n-
protocol
\n- Protocol value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
name
\n- Name of this probe\n+
type
\n+ Socket type value\n
family
\n Protocol family value\n+
protocol
\n+ Protocol value\n+
name
\n+ Name of this probe\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
probe::socket.aio_write — \n Message send via sock_aio_write
\n-
socket.aio_write
family
\n- Protocol family value\n-
name
\n- Name of this probe\n-
size
\n- Message size in bytes\n-
protocol
\n- Protocol value\n-
flags
\n+
socket.aio_write
probe::socket.close — \n Close a socket\n-
socket.close
type
\n- Socket type value\n-
flags
\n- Socket flags value\n-
state
\n- Socket state value\n-
protocol
\n+
socket.close
probe::socket.create.return — \n Return from Creation of a socket\n-
socket.create.return
type
\n- Socket type value\n-
err
\n- Error code if success == 0\n-
protocol
\n+
socket.create.return
protocol
\n Protocol value\n+
name
\n+ Name of this probe\n
requester
\n Requested by user process or the kernel (1 = kernel, 0 = user)\n
success
\n Was socket creation successful? (1 = yes, 0 = no)\n+
type
\n+ Socket type value\n+
err
\n+ Error code if success == 0\n
family
\n Protocol family value\n-
name
\n- Name of this probe\n
probe::socket.create — \n Creation of a socket\n-
socket.create
protocol
\n+
socket.create
probe::socket.read_iter.return — \n Conclusion of message received via sock_read_iter
\n-
socket.read_iter.return
family
\n- Protocol family value\n-
name
\n+
socket.read_iter.return
name
\n Name of this probe\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n
protocol
\n Protocol value\n
size
\n Size of message received (in bytes) or error code if success = 0\n-
type
\n- Socket type value\n
state
\n Socket state value\n
flags
\n Socket flags value\n+
family
\n+ Protocol family value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n+
type
\n+ Socket type value\n
probe::socket.read_iter — \n Receiving message via sock_read_iter
\n-
socket.read_iter
family
\n+
socket.read_iter
state
\n+ Socket state value\n+
flags
\n+ Socket flags value\n+
family
\n Protocol family value\n+
type
\n+ Socket type value\n
name
\n Name of this probe\n
protocol
\n Protocol value\n
size
\n Message size in bytes\n-
flags
\n- Socket flags value\n-
type
\n- Socket type value\n-
state
\n- Socket state value\n
probe::socket.readv.return — \n Conclusion of receiving a message via sock_readv
\n
socket.readv.return
flags
\n Socket flags value\n+
family
\n+ Protocol family value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
type
\n Socket type value\n
state
\n Socket state value\n-
protocol
\n- Protocol value\n
size
\n Size of message received (in bytes) or error code if success = 0\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n-
family
\n- Protocol family value\n
name
\n Name of this probe\n+
protocol
\n+ Protocol value\n
probe::socket.readv — \n Receiving a message via sock_readv
\n-
socket.readv
type
\n- Socket type value\n-
flags
\n- Socket flags value\n-
state
\n- Socket state value\n+
socket.readv
probe::socket.receive — \n Message received on a socket.\n
socket.receive
size
\n Size of message received (in bytes) or error code if success = 0\n+
name
\n+ Name of this probe\n
protocol
\n Protocol value\n-
state
\n- Socket state value\n-
type
\n- Socket type value\n
flags
\n Socket flags value\n-
name
\n- Name of this probe\n
family
\n Protocol family value\n
success
\n Was send successful? (1 = yes, 0 = no)\n+
type
\n+ Socket type value\n+
state
\n+ Socket state value\n
probe::socket.recvmsg.return — \n Return from Message being received on socket\n-
socket.recvmsg.return
protocol
\n- Protocol value\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n-
type
\n+
socket.recvmsg.return
type
\n Socket type value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n+
family
\n+ Protocol family value\n
flags
\n Socket flags value\n
state
\n Socket state value\n-
family
\n- Protocol family value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
protocol
\n+ Protocol value\n
name
\n Name of this probe\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n
probe::socket.recvmsg — \n Message being received on socket\n-
socket.recvmsg
name
\n- Name of this probe\n-
family
\n- Protocol family value\n-
protocol
\n+
socket.recvmsg
probe::socket.send — \n Message sent on a socket.\n-
socket.send
success
\n- Was send successful? (1 = yes, 0 = no)\n+
socket.send
flags
\n+ Socket flags value\n
family
\n Protocol family value\n-
name
\n- Name of this probe\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n
type
\n Socket type value\n
state
\n Socket state value\n-
flags
\n- Socket flags value\n
size
\n Size of message sent (in bytes) or error code if success = 0\n+
name
\n+ Name of this probe\n
protocol
\n Protocol value\n
probe::socket.sendmsg.return — \n Return from socket.sendmsg.\n-
socket.sendmsg.return
name
\n- Name of this probe\n-
family
\n- Protocol family value\n+
socket.sendmsg.return
type
\n+ Socket type value\n
success
\n Was send successful? (1 = yes, 0 = no)\n-
protocol
\n- Protocol value\n-
size
\n- Size of message sent (in bytes) or error code if success = 0\n+
family
\n+ Protocol family value\n
flags
\n Socket flags value\n-
type
\n- Socket type value\n
state
\n Socket state value\n+
size
\n+ Size of message sent (in bytes) or error code if success = 0\n+
protocol
\n+ Protocol value\n+
name
\n+ Name of this probe\n
probe::socket.sendmsg — \n Message is currently being sent on a socket.\n-
socket.sendmsg
name
\n+
socket.sendmsg
size
\n+ Message size in bytes\n+
name
\n Name of this probe\n+
protocol
\n+ Protocol value\n
family
\n Protocol family value\n
type
\n Socket type value\n-
state
\n- Socket state value\n
flags
\n Socket flags value\n-
size
\n- Message size in bytes\n-
protocol
\n- Protocol value\n+
state
\n+ Socket state value\n
probe::socket.write_iter.return — \n Conclusion of message send via sock_write_iter
\n-
socket.write_iter.return
success
\n- Was receive successful? (1 = yes, 0 = no)\n+
socket.write_iter.return
flags
\n+ Socket flags value\n
family
\n Protocol family value\n-
name
\n- Name of this probe\n-
flags
\n- Socket flags value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
type
\n Socket type value\n
state
\n Socket state value\n
size
\n Size of message received (in bytes) or error code if success = 0\n+
name
\n+ Name of this probe\n
protocol
\n Protocol value\n
\n Fires at the conclusion of sending a message on a socket\n via the sock_write_iter
function\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-write-iter.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-write-iter.html", "unified_diff": "@@ -1,22 +1,22 @@\n
probe::socket.write_iter — \n Message send via sock_write_iter
\n-
socket.write_iter
state
\n- Socket state value\n-
type
\n- Socket type value\n-
flags
\n- Socket flags value\n-
size
\n+
socket.write_iter
probe::socket.writev.return — \n Conclusion of message sent via socket_writev
\n-
socket.writev.return
size
\n- Size of message sent (in bytes) or error code if success = 0\n-
protocol
\n- Protocol value\n-
state
\n+
socket.writev.return
state
\n Socket state value\n-
type
\n- Socket type value\n
flags
\n Socket flags value\n-
name
\n- Name of this probe\n
family
\n Protocol family value\n
success
\n Was send successful? (1 = yes, 0 = no)\n+
type
\n+ Socket type value\n+
name
\n+ Name of this probe\n+
protocol
\n+ Protocol value\n+
size
\n+ Size of message sent (in bytes) or error code if success = 0\n
probe::socket.writev — \n Message sent via socket_writev
\n-
socket.writev
type
\n- Socket type value\n-
flags
\n- Socket flags value\n-
state
\n- Socket state value\n-
size
\n+
socket.writev
probe::softirq.entry — \n Execution of handler for a pending softirq starting\n
softirq.entry
probe::softirq.exit — \n Execution of handler for a pending softirq completed\n
softirq.exit
probe::stap.cache_add_src — \n Adding C code translation to cache\n-
stap.cache_add_src
source_path
\n- the path the .c file is coming from (incl filename)\n-
dest_path
\n+
stap.cache_add_src
probe::stap.cache_get — \n Found item in stap cache\n-
stap.cache_get
module_path
\n- the path of the .ko kernel module file\n-
source_path
\n+
stap.cache_get
probe::staprun.send_control_message — \n Sending a control message\n-
staprun.send_control_message
type
\n+
staprun.send_control_message
probe::sunrpc.clnt.bind_new_program — \n Bind a new RPC program to an existing client\n-
sunrpc.clnt.bind_new_program
old_prog
\n- the number of old RPC program\n-
vers
\n- the version of new RPC program\n-
prog
\n- the number of new RPC program\n-
servername
\n+
sunrpc.clnt.bind_new_program
servername
\n the server machine name\n-
progname
\n- the name of new RPC program\n
old_vers
\n the version of old RPC program\n
old_progname
\n the name of old RPC program\n+
prog
\n+ the number of new RPC program\n+
vers
\n+ the version of new RPC program\n+
old_prog
\n+ the number of old RPC program\n+
progname
\n+ the name of new RPC program\n
probe::sunrpc.clnt.call_async — \n Make an asynchronous RPC call\n-
sunrpc.clnt.call_async
flags
\n+
sunrpc.clnt.call_async
prog
\n+ the RPC program number\n+
flags
\n flags\n-
dead
\n- whether this client is abandoned\n
servername
\n the server machine name\n-
procname
\n- the procedure name in this RPC call\n-
xid
\n- current transmission id\n-
vers
\n- the RPC program version number\n-
prog
\n- the RPC program number\n-
prot
\n- the IP protocol number\n
proc
\n the procedure number in this RPC call\n
progname
\n the RPC program name\n+
prot
\n+ the IP protocol number\n+
vers
\n+ the RPC program version number\n
port
\n the port number\n+
procname
\n+ the procedure name in this RPC call\n+
xid
\n+ current transmission id\n+
dead
\n+ whether this client is abandoned\n
probe::sunrpc.clnt.call_sync — \n Make a synchronous RPC call\n-
sunrpc.clnt.call_sync
dead
\n+
sunrpc.clnt.call_sync
prot
\n+ the IP protocol number\n+
progname
\n+ the RPC program name\n+
dead
\n whether this client is abandoned\n-
flags
\n- flags\n+
xid
\n+ current transmission id\n
procname
\n the procedure name in this RPC call\n-
servername
\n- the server machine name\n+
port
\n+ the port number\n
vers
\n the RPC program version number\n-
xid
\n- current transmission id\n
prog
\n the RPC program number\n
proc
\n the procedure number in this RPC call\n-
prot
\n- the IP protocol number\n-
progname
\n- the RPC program name\n-
port
\n- the port number\n+
servername
\n+ the server machine name\n+
flags
\n+ flags\n
probe::sunrpc.clnt.clone_client — \n Clone an RPC client structure\n
sunrpc.clnt.clone_client
servername
\n the server machine name\n-
authflavor
\n- the authentication flavor\n-
prot
\n- the IP protocol number\n-
prog
\n- the RPC program number\n-
port
\n- the port number\n
vers
\n the RPC program version number\n+
port
\n+ the port number\n+
prog
\n+ the RPC program number\n
progname
\n the RPC program name\n+
prot
\n+ the IP protocol number\n+
authflavor
\n+ the authentication flavor\n
probe::sunrpc.clnt.create_client — \n Create an RPC client\n-
sunrpc.clnt.create_client
prot
\n- the IP protocol number\n-
authflavor
\n- the authentication flavor\n-
servername
\n+
sunrpc.clnt.create_client
servername
\n the server machine name\n-
vers
\n- the RPC program version number\n-
progname
\n- the RPC program name\n
port
\n the port number\n+
vers
\n+ the RPC program version number\n+
prot
\n+ the IP protocol number\n
prog
\n the RPC program number\n+
progname
\n+ the RPC program name\n+
authflavor
\n+ the authentication flavor\n
probe::sunrpc.clnt.restart_call — \n Restart an asynchronous RPC call\n-
sunrpc.clnt.restart_call
servername
\n- the server machine name\n+
sunrpc.clnt.restart_call
xid
\n+ the transmission id\n
tk_flags
\n the task flags\n+
tk_pid
\n+ the debugging aid of task\n
prog
\n the RPC program number\n
tk_priority
\n the task priority\n
tk_runstate
\n the task run status\n-
xid
\n- the transmission id\n-
tk_pid
\n- the debugging aid of task\n+
servername
\n+ the server machine name\n
probe::sunrpc.clnt.shutdown_client — \n Shutdown an RPC client\n-
sunrpc.clnt.shutdown_client
netreconn
\n- the count of reconnections\n-
om_ops
\n- the count of operations\n-
rpccnt
\n- the count of RPC calls\n-
prog
\n- the RPC program number\n-
vers
\n- the RPC program version number\n-
om_queue
\n- the jiffies queued for xmit\n+
sunrpc.clnt.shutdown_client
prot
\n+ the IP protocol number\n
clones
\n the number of clones\n-
servername
\n- the server machine name\n-
om_bytes_sent
\n- the count of bytes out\n-
tasks
\n- the number of references\n-
port
\n- the port number\n-
om_ntrans
\n- the count of RPC transmissions\n
progname
\n the RPC program name\n+
om_queue
\n+ the jiffies queued for xmit\n
authflavor
\n the authentication flavor\n+
tasks
\n+ the number of references\n+
netreconn
\n+ the count of reconnections\n
om_rtt
\n the RPC RTT jiffies\n-
prot
\n- the IP protocol number\n-
om_bytes_recv
\n- the count of bytes in\n+
port
\n+ the port number\n+
vers
\n+ the RPC program version number\n+
om_ntrans
\n+ the count of RPC transmissions\n+
prog
\n+ the RPC program number\n
om_execute
\n the RPC execution jiffies\n+
rpccnt
\n+ the count of RPC calls\n+
om_bytes_sent
\n+ the count of bytes out\n+
om_bytes_recv
\n+ the count of bytes in\n+
om_ops
\n+ the count of operations\n+
servername
\n+ the server machine name\n
probe::sunrpc.sched.delay — \n Delay an RPC task\n-
sunrpc.sched.delay
prog
\n- the program number in the RPC call\n-
vers
\n- the program version in the RPC call\n-
xid
\n- the transmission id in the RPC call\n+
sunrpc.sched.delay
tk_pid
\n+ the debugging id of the task\n
tk_flags
\n the flags of the task\n-
delay
\n- the time delayed\n-
tk_pid
\n- the debugging id of the task\n+
xid
\n+ the transmission id in the RPC call\n+
vers
\n+ the program version in the RPC call\n
prot
\n the IP protocol in the RPC call\n+
delay
\n+ the time delayed\n+
prog
\n+ the program number in the RPC call\n
probe::sunrpc.sched.execute — \n Execute the RPC `scheduler'\n-
sunrpc.sched.execute
tk_pid
\n+
sunrpc.sched.execute
prog
\n+ the program number in the RPC call\n+
vers
\n+ the program version in the RPC call\n+
tk_pid
\n the debugging id of the task\n-
prot
\n- the IP protocol in the RPC call\n
tk_flags
\n the flags of the task\n-
prog
\n- the program number in the RPC call\n
xid
\n the transmission id in the RPC call\n-
vers
\n- the program version in the RPC call\n+
prot
\n+ the IP protocol in the RPC call\n
probe::sunrpc.sched.new_task — \n Create new task for the specified client\n-
sunrpc.sched.new_task
prot
\n- the IP protocol in the RPC call\n-
tk_flags
\n- the flags of the task\n+
sunrpc.sched.new_task
probe::sunrpc.sched.release_task — \n Release all resources associated with a task\n
sunrpc.sched.release_task
prog
\n the program number in the RPC call\n+
prot
\n+ the IP protocol in the RPC call\n
vers
\n the program version in the RPC call\n-
xid
\n- the transmission id in the RPC call\n
tk_flags
\n the flags of the task\n-
prot
\n- the IP protocol in the RPC call\n+
xid
\n+ the transmission id in the RPC call\n
probe::sunrpc.svc.destroy — \n Destroy an RPC service\n-
sunrpc.svc.destroy
sv_nrthreads
\n- the number of concurrent threads\n-
sv_progname
\n- the name of the program\n+
sunrpc.svc.destroy
rpcbadfmt
\n+ the count of requests dropped for bad formats\n
rpcbadauth
\n the count of requests drooped for authentication failure\n+
rpccnt
\n+ the count of valid RPC requests\n+
sv_nrthreads
\n+ the number of concurrent threads\n
nettcpconn
\n the count of accepted TCP connections\n-
rpcbadfmt
\n- the count of requests dropped for bad formats\n+
sv_progname
\n+ the name of the program\n
netcnt
\n the count of received RPC requests\n
sv_name
\n the service name\n
sv_prog
\n the number of the program\n-
rpccnt
\n- the count of valid RPC requests\n
probe::sunrpc.svc.drop — \n Drop RPC request\n-
sunrpc.svc.drop
peer_ip
\n+
sunrpc.svc.drop
rq_vers
\n+ the program version in the request\n+
peer_ip
\n the peer address where the request is from\n-
rq_prog
\n- the program number in the request\n-
sv_name
\n- the service name\n+
rq_xid
\n+ the transmission id in the request\n
rq_proc
\n the procedure number in the request\n-
rq_vers
\n- the program version in the request\n+
rq_prog
\n+ the program number in the request\n
rq_prot
\n the IP protocol of the reqeust\n-
rq_xid
\n- the transmission id in the request\n+
sv_name
\n+ the service name\n
probe::sunrpc.svc.process — \n Process an RPC request\n-
sunrpc.svc.process
sv_nrthreads
\n- the number of concurrent threads\n-
rq_prog
\n- the program number in the request\n-
peer_ip
\n+
sunrpc.svc.process
peer_ip
\n the peer address where the request is from\n-
rq_proc
\n- the procedure number in the request\n
rq_vers
\n the program version in the request\n+
sv_nrthreads
\n+ the number of concurrent threads\n+
rq_xid
\n+ the transmission id in the request\n+
rq_proc
\n+ the procedure number in the request\n
sv_name
\n the service name\n
rq_prot
\n the IP protocol of the reqeust\n-
rq_xid
\n- the transmission id in the request\n
sv_prog
\n the number of the program\n+
rq_prog
\n+ the program number in the request\n
probe::sunrpc.svc.recv — \n Listen for the next RPC request on any socket\n-
sunrpc.svc.recv
sv_prog
\n- the number of the program\n-
timeout
\n- the timeout of waiting for data\n+
sunrpc.svc.recv
probe::sunrpc.svc.register — \n Register an RPC service with the local portmapper\n-
sunrpc.svc.register
prog
\n- the number of the program\n-
sv_name
\n- the service name\n-
progname
\n+
sunrpc.svc.register
probe::sunrpc.svc.send — \n Return reply to RPC client\n-
sunrpc.svc.send
peer_ip
\n- the peer address where the request is from\n+
sunrpc.svc.send
rq_proc
\n+ the procedure number in the request\n
rq_prog
\n the program number in the request\n
rq_prot
\n the IP protocol of the reqeust\n-
rq_xid
\n- the transmission id in the request\n
sv_name
\n the service name\n-
rq_proc
\n- the procedure number in the request\n
rq_vers
\n the program version in the request\n+
peer_ip
\n+ the peer address where the request is from\n+
rq_xid
\n+ the transmission id in the request\n
probe::syscall_any.return — \n Record exit from a syscall\n-
syscall_any.return
name
\n- name of the syscall\n-
retval
\n+
syscall_any.return
retval
\n return value of the syscall\n+
name
\n+ name of the syscall\n
syscall_nr
\n number of the syscall\n
\n The syscall_any.return probe point is designed to be a low overhead\n that monitors all the syscalls returns via a kernel tracepoint.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-syscall-any.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-syscall-any.html", "unified_diff": "@@ -1,13 +1,13 @@\n
probe::syscall_any — \n Record entry into a syscall\n-
syscall_any
name
\n- name of the syscall\n-
syscall_nr
\n+
syscall_any
\n The syscall_any probe point is designed to be a low overhead\n that monitors all the syscalls entered via a kernel tracepoint.\n Because of the breadth of syscalls it monitors it provides\n no information about the syscall arguments or argstr string\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect.html", "unified_diff": "@@ -1,21 +1,21 @@\n
probe::tcp.disconnect — \n TCP socket disconnection\n-
tcp.disconnect
sport
\n+
tcp.disconnect
dport
\n+ TCP destination port\n+
sport
\n TCP source port \n-
daddr
\n- A string representing the destination IP address\n
flags
\n TCP flags (e.g. FIN, etc) \n-
name
\n- Name of this probe\n
family
\n IP address family\n+
name
\n+ Name of this probe\n
sock
\n Network socket \n+
daddr
\n+ A string representing the destination IP address\n
saddr
\n A string representing the source IP address\n-
dport
\n- TCP destination port\n
probe::tcp.receive — \n Called when a TCP packet is received\n-
tcp.receive
iphdr
\n- IP header address\n-
protocol
\n- Packet protocol from driver\n+
tcp.receive
psh
\n+ TCP PSH flag\n+
urg
\n+ TCP URG flag\n
saddr
\n A string representing the source IP address\n
daddr
\n A string representing the destination IP address\n-
urg
\n- TCP URG flag\n
ack
\n TCP ACK flag\n-
rst
\n- TCP RST flag\n-
psh
\n- TCP PSH flag\n+
fin
\n+ TCP FIN flag\n
syn
\n TCP SYN flag\n-
dport
\n- TCP destination port\n+
iphdr
\n+ IP header address\n
sport
\n TCP source port\n-
name
\n- Name of the probe point\n+
dport
\n+ TCP destination port\n+
rst
\n+ TCP RST flag\n
family
\n IP address family\n-
fin
\n- TCP FIN flag\n+
name
\n+ Name of the probe point\n+
protocol
\n+ Packet protocol from driver\n
probe::tcp.recvmsg.return — \n Receiving TCP message complete\n-
tcp.recvmsg.return
daddr
\n- A string representing the destination IP address\n-
sport
\n- TCP source port \n+
tcp.recvmsg.return
family
\n+ IP address family\n
name
\n Name of this probe\n-
family
\n- IP address family\n-
dport
\n- TCP destination port\n+
daddr
\n+ A string representing the destination IP address\n
saddr
\n A string representing the source IP address\n
size
\n Number of bytes received or error code if an error occurred.\n+
dport
\n+ TCP destination port\n+
sport
\n+ TCP source port \n
probe::tcp.recvmsg — \n Receiving TCP message\n-
tcp.recvmsg
sock
\n- Network socket\n+
tcp.recvmsg
dport
\n+ TCP destination port\n
size
\n Number of bytes to be received \n-
saddr
\n- A string representing the source IP address\n-
dport
\n- TCP destination port\n
sport
\n TCP source port \n-
daddr
\n- A string representing the destination IP address\n-
name
\n- Name of this probe\n
family
\n IP address family\n+
name
\n+ Name of this probe\n+
sock
\n+ Network socket\n+
daddr
\n+ A string representing the destination IP address\n+
saddr
\n+ A string representing the source IP address\n
probe::tcp.sendmsg.return — \n Sending TCP message is done\n-
tcp.sendmsg.return
size
\n- Number of bytes sent or error code if an error occurred. \n-
name
\n+
tcp.sendmsg.return
probe::tcp.sendmsg — \n Sending a tcp message\n-
tcp.sendmsg
size
\n- Number of bytes to send \n-
sock
\n- Network socket \n-
name
\n+
tcp.sendmsg
probe::tcp.setsockopt — \n Call to setsockopt
\n-
tcp.setsockopt
sock
\n+
tcp.setsockopt
optstr
\n+ Resolves optname to a human-readable format\n+
sock
\n Network socket\n-
optname
\n- TCP socket options (e.g. TCP_NODELAY, TCP_MAXSEG, etc)\n
name
\n Name of this probe\n
family
\n IP address family\n-
optlen
\n- Used to access values for setsockopt
\n+
optname
\n+ TCP socket options (e.g. TCP_NODELAY, TCP_MAXSEG, etc)\n
level
\n The level at which the socket options will be manipulated\n-
optstr
\n- Resolves optname to a human-readable format\n+
optlen
\n+ Used to access values for setsockopt
\n
probe::tcpmib.EstabResets — \n Count the reset of a socket\n-
tcpmib.EstabResets
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.EstabResets
probe::tcpmib.InSegs — \n Count an incoming tcp segment\n-
tcpmib.InSegs
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.InSegs
probe::tcpmib.OutSegs — \n Count the sending of a TCP segment\n-
tcpmib.OutSegs
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.OutSegs
probe::tcpmib.PassiveOpens — \n Count the passive creation of a socket\n-
tcpmib.PassiveOpens
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.PassiveOpens
probe::tcpmib.RetransSegs — \n Count the retransmission of a TCP segment\n-
tcpmib.RetransSegs
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.RetransSegs
probe::tty.init — \n Called when a tty is being initalized\n-
tty.init
probe::tty.ioctl — \n called when a ioctl is request to the tty\n-
tty.ioctl
probe::tty.open — \n Called when a tty is opened\n-
tty.open
probe::tty.read — \n called when a tty line will be read\n-
tty.read
probe::tty.receive — \n called when a tty receives a message\n-
tty.receive
driver_name
\n- the driver name\n+
tty.receive
index
\n+ The tty Index\n+
id
\n+ the tty id\n+
cp
\n+ the buffer that was received\n
fp
\n The flag buffer\n-
index
\n- The tty Index\n
name
\n the name of the module file\n-
id
\n- the tty id\n
count
\n The amount of characters received\n-
cp
\n- the buffer that was received\n+
driver_name
\n+ the driver name\n
probe::tty.release — \n Called when the tty is closed\n-
tty.release
probe::tty.resize — \n Called when a terminal resize happens\n-
tty.resize
new_xpixel
\n- the new xpixel value\n-
new_col
\n- the new col value\n-
old_xpixel
\n- the old xpixel\n-
old_col
\n- the old col value\n-
name
\n- the tty name\n+
tty.resize
old_ypixel
\n+ the old ypixel\n
old_row
\n the old row value\n-
old_ypixel
\n- the old ypixel\n+
old_col
\n+ the old col value\n+
new_col
\n+ the new col value\n
new_row
\n the new row value\n
new_ypixel
\n the new ypixel value\n+
new_xpixel
\n+ the new xpixel value\n+
name
\n+ the tty name\n+
old_xpixel
\n+ the old xpixel\n
probe::tty.write — \n write to the tty line\n-
tty.write
probe::udp.disconnect.return — \n UDP has been disconnected successfully\n-
udp.disconnect.return
saddr
\n- A string representing the source IP address\n+
udp.disconnect.return
name
\n+ The name of this probe\n
dport
\n UDP destination port\n-
daddr
\n- A string representing the destination IP address\n
sport
\n UDP source port\n+
saddr
\n+ A string representing the source IP address\n
ret
\n Error code (0: no error) \n-
name
\n- The name of this probe\n
family
\n IP address family\n+
daddr
\n+ A string representing the destination IP address\n
probe::udp.disconnect — \n Fires when a process requests for a UDP disconnection\n-
udp.disconnect
flags
\n- Flags (e.g. FIN, etc) \n-
name
\n+
udp.disconnect
name
\n The name of this probe\n-
family
\n- IP address family\n-
sock
\n- Network socket used by the process\n
dport
\n UDP destination port\n-
saddr
\n- A string representing the source IP address\n
sport
\n UDP source port\n+
flags
\n+ Flags (e.g. FIN, etc) \n+
saddr
\n+ A string representing the source IP address\n+
family
\n+ IP address family\n
daddr
\n A string representing the destination IP address\n+
sock
\n+ Network socket used by the process\n
probe::udp.recvmsg.return — \n Fires whenever an attempt to receive a UDP message received is completed\n-
udp.recvmsg.return
dport
\n- UDP destination port\n-
saddr
\n+
udp.recvmsg.return
saddr
\n A string representing the source IP address\n-
size
\n- Number of bytes received by the process\n-
sport
\n- UDP source port\n
daddr
\n A string representing the destination IP address\n-
name
\n- The name of this probe\n
family
\n IP address family\n+
size
\n+ Number of bytes received by the process\n+
dport
\n+ UDP destination port\n+
name
\n+ The name of this probe\n+
sport
\n+ UDP source port\n
probe::udp.recvmsg — \n Fires whenever a UDP message is received\n
udp.recvmsg
name
\n The name of this probe\n-
family
\n- IP address family\n
dport
\n UDP destination port\n-
sock
\n- Network socket used by the process\n+
sport
\n+ UDP source port\n
saddr
\n A string representing the source IP address\n
size
\n Number of bytes received by the process\n-
sport
\n- UDP source port\n+
family
\n+ IP address family\n
daddr
\n A string representing the destination IP address\n+
sock
\n+ Network socket used by the process\n
probe::udp.sendmsg.return — \n Fires whenever an attempt to send a UDP message is completed\n-
udp.sendmsg.return
probe::udp.sendmsg — \n Fires whenever a process sends a UDP message\n-
udp.sendmsg
name
\n- The name of this probe\n+
udp.sendmsg
saddr
\n+ A string representing the source IP address\n+
daddr
\n+ A string representing the destination IP address\n+
sock
\n+ Network socket used by the process \n+
size
\n+ Number of bytes sent by the process\n
family
\n IP address family\n+
name
\n+ The name of this probe\n
dport
\n UDP destination port\n-
sock
\n- Network socket used by the process \n-
saddr
\n- A string representing the source IP address\n
sport
\n UDP source port\n-
size
\n- Number of bytes sent by the process\n-
daddr
\n- A string representing the destination IP address\n
probe::vm.brk — \n Fires when a brk is requested (i.e. the heap will be resized)\n-
vm.brk
name
\n- name of the probe point\n-
address
\n+
vm.brk
probe::vm.kfree — \n Fires when kfree is requested\n-
vm.kfree
probe::vm.kmalloc_node — \n Fires when kmalloc_node is requested\n-
vm.kmalloc_node
gfp_flags
\n- type of kmemory to allocate\n-
caller_function
\n+
vm.kmalloc_node
caller_function
\n name of the caller function\n
name
\n name of the probe point\n-
call_site
\n- address of the function caling this kmemory function\n
gfp_flag_name
\n type of kmemory to allocate(in string format)\n
ptr
\n pointer to the kmemory allocated\n-
bytes_req
\n- requested Bytes\n
bytes_alloc
\n allocated Bytes\n+
bytes_req
\n+ requested Bytes\n+
gfp_flags
\n+ type of kmemory to allocate\n+
call_site
\n+ address of the function caling this kmemory function\n
probe::vm.kmalloc — \n Fires when kmalloc is requested\n-
vm.kmalloc
name
\n- name of the probe point\n-
gfp_flag_name
\n+
vm.kmalloc
gfp_flag_name
\n type of kmemory to allocate (in String format)\n-
call_site
\n- address of the kmemory function\n+
ptr
\n+ pointer to the kmemory allocated\n
bytes_alloc
\n allocated Bytes\n
bytes_req
\n requested Bytes\n-
ptr
\n- pointer to the kmemory allocated\n+
call_site
\n+ address of the kmemory function\n
gfp_flags
\n type of kmemory to allocate\n
caller_function
\n name of the caller function\n+
name
\n+ name of the probe point\n
probe::vm.kmem_cache_alloc_node — \n Fires when kmem_cache_alloc_node is requested\n
vm.kmem_cache_alloc_node
name
\n name of the probe point\n-
ptr
\n- pointer to the kmemory allocated\n+
caller_function
\n+ name of the caller function\n+
call_site
\n+ address of the function calling this kmemory function\n+
gfp_flags
\n+ type of kmemory to allocate\n
bytes_req
\n requested Bytes\n+
ptr
\n+ pointer to the kmemory allocated\n
bytes_alloc
\n allocated Bytes\n-
call_site
\n- address of the function calling this kmemory function\n
gfp_flag_name
\n type of kmemory to allocate(in string format)\n-
caller_function
\n- name of the caller function\n-
gfp_flags
\n- type of kmemory to allocate\n
probe::vm.kmem_cache_alloc — \n Fires when kmem_cache_alloc is requested\n
vm.kmem_cache_alloc
name
\n name of the probe point\n+
caller_function
\n+ name of the caller function.\n
call_site
\n address of the function calling this kmemory function.\n+
gfp_flags
\n+ type of kmemory to allocate\n
gfp_flag_name
\n type of kmemory to allocate(in string format)\n
ptr
\n pointer to the kmemory allocated\n
bytes_req
\n requested Bytes\n
bytes_alloc
\n allocated Bytes\n-
gfp_flags
\n- type of kmemory to allocate\n-
caller_function
\n- name of the caller function.\n
probe::vm.kmem_cache_free — \n Fires when kmem_cache_free is requested\n
vm.kmem_cache_free
caller_function
\n Name of the caller function.\n-
call_site
\n- Address of the function calling this kmemory function\n-
ptr
\n- Pointer to the kmemory allocated which is returned by kmem_cache\n
name
\n Name of the probe point\n+
ptr
\n+ Pointer to the kmemory allocated which is returned by kmem_cache\n+
call_site
\n+ Address of the function calling this kmemory function\n
probe::vm.munmap — \n Fires when an munmap is requested\n-
vm.munmap
name
\n- name of the probe point\n+
vm.munmap
probe::vm.pagefault — \n Records that a page fault occurred\n-
vm.pagefault
address
\n+
vm.pagefault
write_access
\n+ indicates whether this was a write or read access; 1 indicates a write, \n+ while 0 indicates a read\n+
address
\n the address of the faulting memory access; i.e. the address that caused the page fault\n
name
\n name of the probe point\n-
write_access
\n- indicates whether this was a write or read access; 1 indicates a write, \n- while 0 indicates a read\n
probe::vm.write_shared — \n Attempts at writing to a shared page\n-
vm.write_shared
probe::workqueue.execute — \n Executing deferred work\n-
workqueue.execute