{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/r-b-build.cdRRBzRT/b1/systemtap_5.3-1_amd64.changes", "source2": "/srv/reproducible-results/rbuild-debian/r-b-build.cdRRBzRT/b2/systemtap_5.3-1_amd64.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -1,11 +1,11 @@\n \n 7d2a1441315e90ca8c0f0c247168b1bd 8776 devel optional systemtap-client_5.3-1_amd64.deb\n c4c5070676f5b509d7d877c72c8da338 642248 devel optional systemtap-common_5.3-1_amd64.deb\n 9b0d6255ae059d3cd22aa732bd57cc1c 23024680 debug optional systemtap-dbgsym_5.3-1_amd64.deb\n- bb0c5c5ce45f3ad09a01bc0d249240c6 2590212 doc optional systemtap-doc_5.3-1_amd64.deb\n+ df66f2528540bdb4f79052233fc324fc 2590356 doc optional systemtap-doc_5.3-1_amd64.deb\n cfcf0068a79884c97d861f189c033795 1285104 debug optional systemtap-runtime-dbgsym_5.3-1_amd64.deb\n 9b5f97318ae3fadd8113260781a510db 160260 devel optional systemtap-runtime_5.3-1_amd64.deb\n 3e16e44ebf5f5bdd1b01ec665bc9e44b 19260 devel optional systemtap-sdt-dev_5.3-1_amd64.deb\n bee3a9e25ee2ebed8b0afe1261964e5f 2137692 debug optional systemtap-server-dbgsym_5.3-1_amd64.deb\n c8b5dfd6e5fa2e0673742d526c0e83e1 173324 devel optional systemtap-server_5.3-1_amd64.deb\n 4917949bbf991fda9fdfaea873f062ca 1651472 devel optional systemtap_5.3-1_amd64.deb\n"}, {"source1": "systemtap-doc_5.3-1_amd64.deb", "source2": "systemtap-doc_5.3-1_amd64.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2025-09-09 10:48:01.000000 debian-binary\n--rw-r--r-- 0 0 0 54380 2025-09-09 10:48:01.000000 control.tar.xz\n--rw-r--r-- 0 0 0 2535640 2025-09-09 10:48:01.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 54392 2025-09-09 10:48:01.000000 control.tar.xz\n+-rw-r--r-- 0 0 0 2535772 2025-09-09 10:48:01.000000 data.tar.xz\n"}, {"source1": "control.tar.xz", "source2": "control.tar.xz", "unified_diff": null, "details": [{"source1": "control.tar", "source2": "control.tar", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "comments": ["Files differ"], "unified_diff": null}]}]}]}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "unified_diff": "@@ -1,41 +1,41 @@\n
probe::ioblock.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock.end
bytes_done
\n- number of bytes transferred\n-
idx
\n- offset into the bio vector array\n-
sector
\n- beginning sector for the entire bio\n+
ioblock.end
name
\n+ name of the probe point\n+
opf
\n+ operations and flags\n+
error
\n+ 0 on success\n
phys_segments
\n number of segments in this bio after physical address coalescing is performed.\n
hw_segments
\n number of segments after physical and DMA remapping hardware coalescing is performed\n-
devname
\n- block device name\n-
error
\n- 0 on success\n-
opf
\n- operations and flags\n+
sector
\n+ beginning sector for the entire bio\n+
size
\n+ total size in bytes\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
bytes_done
\n+ number of bytes transferred\n+
ino
\n+ i-node number of the mapped file\n+
devname
\n+ block device name\n+
idx
\n+ offset into the bio vector array\n
vcnt
\n bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
size
\n- total size in bytes\n
rw
\n binary trace for read/write request\n-
ino
\n- i-node number of the mapped file\n-
name
\n- name of the probe point\n
probe::ioblock.request — \n Fires whenever making a generic block I/O request.\n-
ioblock.request
bdev_contains
\n+
ioblock.request
ino
\n+ i-node number of the mapped file\n+
rw
\n+ binary trace for read/write request\n+
bdev_contains
\n points to the device object which contains the partition (when bio structure represents a partition)\n+
idx
\n+ offset into the bio vector array\n+
devname
\n+ block device name\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
name
\n+ name of the probe point\n+
opf
\n+ operations and flags\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
size
\n+ total size in bytes\n+
sector
\n+ beginning sector for the entire bio\n+
bdev
\n+ target block device\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid \n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
opf
\n- operations and flags\n
phys_segments
\n number of segments in this bio after physical address coalescing is performed\n
hw_segments
\n number of segments after physical and DMA remapping hardware coalescing is performed\n-
devname
\n- block device name\n-
idx
\n- offset into the bio vector array\n-
sector
\n- beginning sector for the entire bio\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
ino
\n- i-node number of the mapped file\n-
name
\n- name of the probe point\n-
bdev
\n- target block device\n-
rw
\n- binary trace for read/write request\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n-
size
\n- total size in bytes\n
probe::ioblock_trace.bounce — \n Fires whenever a buffer bounce is needed for at least one page of a block IO request.\n
ioblock_trace.bounce
opf
\n operations and flags\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
name
\n+ name of the probe point\n+
sector
\n+ beginning sector for the entire bio\n+
size
\n+ total size in bytes\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
devname
\n- device for which a buffer bounce was needed.\n-
sector
\n- beginning sector for the entire bio\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
bytes_done
\n- number of bytes transferred\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
name
\n- name of the probe point\n+
bdev
\n+ target block device\n
ino
\n i-node number of the mapped file\n+
bytes_done
\n+ number of bytes transferred\n
q
\n request queue on which this bio was queued.\n
rw
\n binary trace for read/write request\n-
bdev
\n- target block device\n-
size
\n- total size in bytes\n+
devname
\n+ device for which a buffer bounce was needed.\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n
vcnt
\n bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n
probe::ioblock_trace.end — \n Fires whenever a block I/O transfer is complete.\n
ioblock_trace.end
p_start_sect
\n points to the start sector of the partition structure of the device\n-
bytes_done
\n- number of bytes transferred\n-
sector
\n- beginning sector for the entire bio\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
devname
\n- block device name\n
opf
\n operations and flags\n+
name
\n+ name of the probe point\n+
bdev
\n+ target block device\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n
size
\n total size in bytes\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
rw
\n- binary trace for read/write request\n-
q
\n- request queue on which this bio was queued.\n-
bdev
\n- target block device\n-
name
\n- name of the probe point\n+
sector
\n+ beginning sector for the entire bio\n
ino
\n i-node number of the mapped file\n+
bytes_done
\n+ number of bytes transferred\n+
q
\n+ request queue on which this bio was queued.\n+
rw
\n+ binary trace for read/write request\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
devname
\n+ block device name\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n
probe::ioblock_trace.request — \n Fires just as a generic block I/O request is created for a bio.\n-
ioblock_trace.request
size
\n+
ioblock_trace.request
sector
\n+ beginning sector for the entire bio\n+
size
\n total size in bytes\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n
bdev
\n target block device\n-
rw
\n- binary trace for read/write request\n-
q
\n- request queue on which this bio was queued.\n-
ino
\n- i-node number of the mapped file\n-
name
\n- name of the probe point\n-
bytes_done
\n- number of bytes transferred\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
sector
\n- beginning sector for the entire bio\n-
devname
\n- block device name\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
opf
\n- operations and flags\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
opf
\n+ operations and flags\n+
name
\n+ name of the probe point\n+
q
\n+ request queue on which this bio was queued.\n+
rw
\n+ binary trace for read/write request\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
devname
\n+ block device name\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
ino
\n+ i-node number of the mapped file\n+
bytes_done
\n+ number of bytes transferred\n
probe::ioscheduler.elv_add_request.kp — \n kprobe based probe to indicate that a request was added to the request queue\n-
ioscheduler.elv_add_request.kp
elevator_name
\n- The type of I/O elevator currently enabled\n-
disk_minor
\n- Disk minor number of the request\n-
q
\n+
ioscheduler.elv_add_request.kp
q
\n pointer to request queue\n-
rq_flags
\n- Request flags\n
name
\n Name of the probe point\n+
disk_minor
\n+ Disk minor number of the request\n
disk_major
\n Disk major number of the request\n+
rq_flags
\n+ Request flags\n+
elevator_name
\n+ The type of I/O elevator currently enabled\n
rq
\n Address of the request\n
probe::ioscheduler.elv_add_request.tp — \n tracepoint based probe to indicate a request is added to the request queue.\n-
ioscheduler.elv_add_request.tp
rq_flags
\n+
ioscheduler.elv_add_request.tp
elevator_name
\n+ The type of I/O elevator currently enabled.\n+
rq_flags
\n Request flags.\n+
disk_major
\n+ Disk major no of request.\n
name
\n Name of the probe point\n-
q
\n- Pointer to request queue.\n
disk_minor
\n Disk minor number of request.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n+
q
\n+ Pointer to request queue.\n
rq
\n Address of request.\n-
disk_major
\n- Disk major no of request.\n
probe::ioscheduler.elv_add_request — \n probe to indicate request is added to the request queue.\n-
ioscheduler.elv_add_request
rq_flags
\n- Request flags.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n-
disk_minor
\n- Disk minor number of request.\n-
q
\n+
ioscheduler.elv_add_request
probe::ioscheduler.elv_completed_request — \n Fires when a request is completed\n-
ioscheduler.elv_completed_request
name
\n- Name of the probe point\n+
ioscheduler.elv_completed_request
disk_major
\n+ Disk major number of the request\n
rq_flags
\n Request flags\n-
elevator_name
\n- The type of I/O elevator currently enabled\n
disk_minor
\n Disk minor number of the request\n-
disk_major
\n- Disk major number of the request\n+
name
\n+ Name of the probe point\n+
elevator_name
\n+ The type of I/O elevator currently enabled\n
rq
\n Address of the request\n
probe::ioscheduler.elv_next_request.return — \n Fires when a request retrieval issues a return signal\n-
ioscheduler.elv_next_request.return
rq
\n- Address of the request\n-
disk_major
\n- Disk major number of the request\n+
ioscheduler.elv_next_request.return
probe::ioscheduler_trace.elv_abort_request — \n Fires when a request is aborted.\n-
ioscheduler_trace.elv_abort_request
elevator_name
\n+
ioscheduler_trace.elv_abort_request
rq
\n+ Address of request.\n+
elevator_name
\n The type of I/O elevator currently enabled.\n-
disk_minor
\n- Disk minor number of request.\n
name
\n Name of the probe point\n-
rq_flags
\n- Request flags.\n-
rq
\n- Address of request.\n+
disk_minor
\n+ Disk minor number of request.\n
disk_major
\n Disk major no of request.\n+
rq_flags
\n+ Request flags.\n
probe::ioscheduler_trace.elv_completed_request — \n Fires when a request is\n-
ioscheduler_trace.elv_completed_request
rq
\n- Address of request.\n-
disk_major
\n- Disk major no of request.\n-
elevator_name
\n+
ioscheduler_trace.elv_completed_request
probe::ioscheduler_trace.elv_issue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_issue_request
disk_major
\n+
ioscheduler_trace.elv_issue_request
elevator_name
\n+ The type of I/O elevator currently enabled.\n+
disk_major
\n Disk major no of request.\n-
rq
\n- Address of request.\n-
name
\n- Name of the probe point\n
rq_flags
\n Request flags.\n+
name
\n+ Name of the probe point\n
disk_minor
\n Disk minor number of request.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n+
rq
\n+ Address of request.\n
probe::ioscheduler_trace.elv_requeue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_requeue_request
rq_flags
\n+
ioscheduler_trace.elv_requeue_request
rq
\n+ Address of request.\n+
rq_flags
\n Request flags.\n-
name
\n- Name of the probe point\n+
disk_major
\n+ Disk major no of request.\n
disk_minor
\n Disk minor number of request.\n+
name
\n+ Name of the probe point\n
elevator_name
\n The type of I/O elevator currently enabled.\n-
rq
\n- Address of request.\n-
disk_major
\n- Disk major no of request.\n
probe::ioscheduler_trace.plug — \n Fires when a request queue is plugged;\n-
ioscheduler_trace.plug
probe::ioscheduler_trace.unplug_io — \n Fires when a request queue is unplugged;\n-
ioscheduler_trace.unplug_io
probe::ipmib.FragFails — \n Count datagram fragmented unsuccessfully\n-
ipmib.FragFails
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.FragFails
probe::ipmib.InAddrErrors — \n Count arriving packets with an incorrect address\n-
ipmib.InAddrErrors
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.InAddrErrors
probe::ipmib.InNoRoutes — \n Count an arriving packet with no matching socket\n-
ipmib.InNoRoutes
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.InNoRoutes
probe::ipmib.OutRequests — \n Count a request to send a packet\n-
ipmib.OutRequests
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.OutRequests
probe::ipmib.ReasmReqds — \n Count number of packet fragments reassembly requests\n-
ipmib.ReasmReqds
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.ReasmReqds
probe::irq_handler.entry — \n Execution of interrupt handler starting\n-
irq_handler.entry
irq
\n- irq number\n-
dev_name
\n- name of device\n-
handler
\n- interrupt handler function\n-
thread
\n- thread pointer for threaded interrupts\n+
irq_handler.entry
dev_id
\n+ Cookie to identify device\n
thread_flags
\n Flags related to thread\n-
next_irqaction
\n- pointer to next irqaction for shared interrupts\n+
flags_str
\n+ symbolic string representation of IRQ flags\n
thread_fn
\n interrupt handler function for threaded interrupts\n+
thread
\n+ thread pointer for threaded interrupts\n+
next_irqaction
\n+ pointer to next irqaction for shared interrupts\n+
handler
\n+ interrupt handler function\n+
action
\n+ struct irqaction* for this interrupt num\n
flags
\n Flags for IRQ handler\n
dir
\n pointer to the proc/irq/NN/name entry\n-
action
\n- struct irqaction* for this interrupt num\n-
dev_id
\n- Cookie to identify device\n-
flags_str
\n- symbolic string representation of IRQ flags\n+
dev_name
\n+ name of device\n+
irq
\n+ irq number\n
probe::irq_handler.exit — \n Execution of interrupt handler completed\n-
irq_handler.exit
flags_str
\n- symbolic string representation of IRQ flags\n-
dev_id
\n- Cookie to identify device\n-
action
\n- struct irqaction*\n-
dir
\n- pointer to the proc/irq/NN/name entry\n-
thread_fn
\n+
irq_handler.exit
thread_fn
\n interrupt handler function for threaded interrupts\n
thread_flags
\n Flags related to thread\n+
irq
\n+ interrupt number\n+
dir
\n+ pointer to the proc/irq/NN/name entry\n+
dev_name
\n+ name of device\n+
action
\n+ struct irqaction*\n+
next_irqaction
\n+ pointer to next irqaction for shared interrupts\n
thread
\n thread pointer for threaded interrupts\n+
flags_str
\n+ symbolic string representation of IRQ flags\n
ret
\n return value of the handler\n+
dev_id
\n+ Cookie to identify device\n
flags
\n flags for IRQ handler\n-
next_irqaction
\n- pointer to next irqaction for shared interrupts\n-
dev_name
\n- name of device\n
handler
\n interrupt handler function that was executed\n-
irq
\n- interrupt number\n
probe::kprocess.create — \n Fires whenever a new process or thread is successfully created\n-
kprocess.create
new_pid
\n- The PID of the newly created process\n-
new_tid
\n+
kprocess.create
probe::kprocess.exec_complete — \n Return from exec to a new program\n-
kprocess.exec_complete
errno
\n+
kprocess.exec_complete
name
\n+ Name of the system call (“execve”) (SystemTap v2.5+)\n+
errno
\n The error number resulting from the exec\n-
success
\n- A boolean indicating whether the exec was successful\n
retstr
\n A string representation of errno (SystemTap v2.5+)\n-
name
\n- Name of the system call (“execve”) (SystemTap v2.5+)\n+
success
\n+ A boolean indicating whether the exec was successful\n
probe::kprocess.exec — \n Attempt to exec to a new program\n-
kprocess.exec
filename
\n- The path to the new executable\n-
argstr
\n+
kprocess.exec
argstr
\n A string containing the filename followed by the\n arguments to pass, excluding 0th arg (SystemTap v2.5+)\n+
filename
\n+ The path to the new executable\n
args
\n The arguments to pass to the new executable, including\n the 0th arg (SystemTap v2.5+)\n
name
\n Name of the system call (“execve”) (SystemTap v2.5+)\n
\n The caller of exec.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-kprocess-release.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-kprocess-release.html", "unified_diff": "@@ -1,17 +1,17 @@\n
probe::kprocess.release — \n Process released\n-
kprocess.release
task
\n- A task handle to the process being released\n+
kprocess.release
released_pid
\n+ PID of the process being released\n
pid
\n Same as released_pid
for compatibility (deprecated)\n-
released_pid
\n- PID of the process being released\n
released_tid
\n TID of the task being released\n+
task
\n+ A task handle to the process being released\n
\n The context of the parent, if it wanted notification of this process'\n termination, else the context of the process itself.\n
\n Fires when a process is released from the kernel. This always follows a\n kprocess.exit, though it may be delayed somewhat if the process waits in a\n zombie state.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-linuxmib-DelayedACKs.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-linuxmib-DelayedACKs.html", "unified_diff": "@@ -1,12 +1,12 @@\n
probe::linuxmib.DelayedACKs — \n Count of delayed acks\n-
linuxmib.DelayedACKs
sk
\n- Pointer to the struct sock being acted on\n-
op
\n+
linuxmib.DelayedACKs
probe::linuxmib.ListenDrops — \n Count of times conn request that were dropped\n-
linuxmib.ListenDrops
sk
\n- Pointer to the struct sock being acted on\n-
op
\n+
linuxmib.ListenDrops
probe::netdev.change_mac — \n Called when the netdev_name has the MAC changed\n
netdev.change_mac
probe::netdev.change_mtu — \n Called when the netdev MTU is changed\n-
netdev.change_mtu
probe::netdev.hard_transmit — \n Called when the devices is going to TX (hard)\n-
netdev.hard_transmit
probe::netdev.rx — \n Called when the device is going to receive a packet\n-
netdev.rx
probe::netdev.set_promiscuity — \n Called when the device enters/leaves promiscuity\n-
netdev.set_promiscuity
disable
\n- If the device is leaving promiscuity mode\n-
enable
\n- If the device is entering promiscuity mode\n-
dev_name
\n+
netdev.set_promiscuity
probe::netfilter.arp.forward — \n - Called for each ARP packet to be forwarded\n-
netfilter.arp.forward
length
\n- The length of the packet buffer contents, in bytes\n-
ar_hln
\n- Length of hardware address\n+
netfilter.arp.forward
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
arphdr
\n+ Address of ARP header\n+
ar_pro
\n+ Format of protocol address\n
nf_drop
\n Constant used to signify a 'drop' verdict\n
ar_pln
\n Length of protocol address\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
data_str
\n- A string representing the packet buffer contents\n
ar_hrd
\n Format of hardware address\n+
length
\n+ The length of the packet buffer contents, in bytes\n
ar_op
\n ARP opcode (command)\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
ar_data
\n- Address of ARP packet data region (after the header)\n-
arphdr
\n- Address of ARP header\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n
indev_name
\n Name of network device packet was received on (if known)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
ar_hln
\n+ Length of hardware address\n+
data_str
\n+ A string representing the packet buffer contents\n
outdev_name
\n Name of network device packet will be routed to (if known)\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n+
pf
\n+ Protocol family -- always “arp”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
outdev
\n Address of net_device representing output device, 0 if unknown\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
pf
\n- Protocol family -- always “arp”\n-
ar_pro
\n- Format of protocol address\n
probe::netfilter.arp.in — \n - Called for each incoming ARP packet\n-
netfilter.arp.in
arphdr
\n- Address of ARP header\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
netfilter.arp.in
pf
\n+ Protocol family -- always “arp”\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n
outdev_name
\n Name of network device packet will be routed to (if known)\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
pf
\n- Protocol family -- always “arp”\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
ar_pro
\n- Format of protocol address\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n
ar_hln
\n Length of hardware address\n-
ar_pln
\n- Length of protocol address\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
nf_queue
\n Constant used to signify a 'queue' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
data_str
\n A string representing the packet buffer contents\n-
ar_hrd
\n- Format of hardware address\n-
ar_op
\n- ARP opcode (command)\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n
ar_sha
\n Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
ar_data
\n- Address of ARP packet data region (after the header)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
ar_op
\n+ ARP opcode (command)\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
arphdr
\n+ Address of ARP header\n+
ar_pro
\n+ Format of protocol address\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n+
ar_pln
\n+ Length of protocol address\n+
ar_hrd
\n+ Format of hardware address\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
probe::netfilter.arp.out — \n - Called for each outgoing ARP packet\n-
netfilter.arp.out
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
ar_tip
\n+
netfilter.arp.out
ar_tip
\n Ethernet+IP only (ar_pro==0x800): target IP address\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
arphdr
\n- Address of ARP header\n-
pf
\n- Protocol family -- always “arp”\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n
ar_pro
\n Format of protocol address\n-
data_str
\n- A string representing the packet buffer contents\n-
ar_hrd
\n- Format of hardware address\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
arphdr
\n+ Address of ARP header\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n
ar_pln
\n Length of protocol address\n+
ar_hrd
\n+ Format of hardware address\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
ar_hln
\n- Length of hardware address\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n
length
\n The length of the packet buffer contents, in bytes\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
ar_op
\n+ ARP opcode (command)\n+
ar_hln
\n+ Length of hardware address\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
data_str
\n+ A string representing the packet buffer contents\n
ar_data
\n Address of ARP packet data region (after the header)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
pf
\n+ Protocol family -- always “arp”\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
ar_op
\n- ARP opcode (command)\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n
probe::netfilter.bridge.forward — \n Called on an incoming bridging packet destined for some other computer\n-
netfilter.bridge.forward
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
netfilter.bridge.forward
br_fd
\n+ Forward delay in 1/256 secs\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
br_prid
\n+ Protocol identifier\n+
pf
\n+ Protocol family -- always “bridge”\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_rid
\n+ Identity of root bridge\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
br_mac
\n- Bridge MAC address\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
br_flags
\n BPDU flags\n-
brhdr
\n- Address of bridge header\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n-
br_rid
\n- Identity of root bridge\n-
data_str
\n- A string representing the packet buffer contents\n-
br_vid
\n- Protocol version identifier\n-
br_max
\n- Max age in 1/256 secs\n
br_rmac
\n Root bridge MAC address\n-
br_msg
\n- Message age in 1/256 secs\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_poid
\n- Port identifier\n-
pf
\n- Protocol family -- always “bridge”\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
br_vid
\n+ Protocol version identifier\n
br_htime
\n Hello time in 1/256 secs\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
indev_name
\n Name of network device packet was received on (if known)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
br_bid
\n Identity of bridge\n-
br_prid
\n- Protocol identifier\n-
protocol
\n- Packet protocol\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
br_poid
\n+ Port identifier\n+
data_str
\n+ A string representing the packet buffer contents\n
llcpdu
\n Address of LLC Protocol Data Unit\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_type
\n- BPDU type\n+
protocol
\n+ Packet protocol\n+
brhdr
\n+ Address of bridge header\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
br_fd
\n- Forward delay in 1/256 secs\n+
br_type
\n+ BPDU type\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_max
\n+ Max age in 1/256 secs\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
br_mac
\n+ Bridge MAC address\n
probe::netfilter.bridge.local_in — \n Called on a bridging packet destined for the local computer\n-
netfilter.bridge.local_in
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
data_str
\n- A string representing the packet buffer contents\n-
br_rid
\n- Identity of root bridge\n-
br_vid
\n- Protocol version identifier\n-
br_max
\n- Max age in 1/256 secs\n-
br_rmac
\n- Root bridge MAC address\n-
br_msg
\n- Message age in 1/256 secs\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
netfilter.bridge.local_in
protocol
\n+ Packet protocol\n
length
\n The length of the packet buffer contents, in bytes\n
brhdr
\n Address of bridge header\n-
br_flags
\n- BPDU flags\n-
br_mac
\n- Bridge MAC address\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n
br_type
\n BPDU type\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_max
\n+ Max age in 1/256 secs\n+
br_mac
\n+ Bridge MAC address\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
br_fd
\n Forward delay in 1/256 secs\n-
protocol
\n- Packet protocol\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_bid
\n- Identity of bridge\n
br_prid
\n Protocol identifier\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
br_htime
\n- Hello time in 1/256 secs\n
pf
\n Protocol family -- always “bridge”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
br_rid
\n+ Identity of root bridge\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_rmac
\n+ Root bridge MAC address\n+
br_flags
\n+ BPDU flags\n+
br_htime
\n+ Hello time in 1/256 secs\n+
br_vid
\n+ Protocol version identifier\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n+
br_bid
\n+ Identity of bridge\n
br_poid
\n Port identifier\n+
data_str
\n+ A string representing the packet buffer contents\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n
probe::netfilter.bridge.local_out — \n Called on a bridging packet coming from a local process\n-
netfilter.bridge.local_out
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_cost
\n- Total cost from transmitting bridge to root\n+
netfilter.bridge.local_out
protocol
\n+ Packet protocol\n+
brhdr
\n+ Address of bridge header\n
length
\n The length of the packet buffer contents, in bytes\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
br_type
\n+ BPDU type\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
br_cost
\n+ Total cost from transmitting bridge to root\n
br_max
\n Max age in 1/256 secs\n-
br_vid
\n- Protocol version identifier\n-
data_str
\n- A string representing the packet buffer contents\n-
br_rid
\n- Identity of root bridge\n
br_msg
\n Message age in 1/256 secs\n-
br_rmac
\n- Root bridge MAC address\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n
br_mac
\n Bridge MAC address\n-
br_flags
\n- BPDU flags\n-
brhdr
\n- Address of bridge header\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
br_fd
\n+ Forward delay in 1/256 secs\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
br_prid
\n Protocol identifier\n-
br_bid
\n- Identity of bridge\n-
protocol
\n- Packet protocol\n+
pf
\n+ Protocol family -- always “bridge”\n+
br_rid
\n+ Identity of root bridge\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
br_type
\n- BPDU type\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
br_fd
\n- Forward delay in 1/256 secs\n-
br_poid
\n- Port identifier\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
pf
\n- Protocol family -- always “bridge”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
br_vid
\n+ Protocol version identifier\n
br_htime
\n Hello time in 1/256 secs\n+
br_flags
\n+ BPDU flags\n+
br_rmac
\n+ Root bridge MAC address\n+
br_bid
\n+ Identity of bridge\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
br_poid
\n+ Port identifier\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
data_str
\n+ A string representing the packet buffer contents\n
probe::netfilter.bridge.post_routing — \n - Called before a bridging packet hits the wire\n-
netfilter.bridge.post_routing
length
\n+
netfilter.bridge.post_routing
protocol
\n+ Packet protocol\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
br_type
\n+ BPDU type\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
brhdr
\n+ Address of bridge header\n+
length
\n The length of the packet buffer contents, in bytes\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
br_max
\n+ Max age in 1/256 secs\n+
br_msg
\n+ Message age in 1/256 secs\n
br_cost
\n Total cost from transmitting bridge to root\n
llcproto_stp
\n Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_msg
\n- Message age in 1/256 secs\n-
br_rmac
\n- Root bridge MAC address\n-
br_max
\n- Max age in 1/256 secs\n-
br_vid
\n- Protocol version identifier\n-
data_str
\n- A string representing the packet buffer contents\n-
br_rid
\n- Identity of root bridge\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
br_mac
\n Bridge MAC address\n-
br_flags
\n- BPDU flags\n-
brhdr
\n- Address of bridge header\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n
br_prid
\n Protocol identifier\n-
br_bid
\n- Identity of bridge\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
protocol
\n- Packet protocol\n+
pf
\n+ Protocol family -- always “bridge”\n
br_fd
\n Forward delay in 1/256 secs\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
br_type
\n- BPDU type\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n
outdev_name
\n Name of network device packet will be routed to (if known)\n+
br_vid
\n+ Protocol version identifier\n+
br_htime
\n+ Hello time in 1/256 secs\n+
br_flags
\n+ BPDU flags\n+
br_rmac
\n+ Root bridge MAC address\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_rid
\n+ Identity of root bridge\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
br_poid
\n Port identifier\n+
br_bid
\n+ Identity of bridge\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
pf
\n- Protocol family -- always “bridge”\n-
br_htime
\n- Hello time in 1/256 secs\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
data_str
\n+ A string representing the packet buffer contents\n
probe::netfilter.bridge.pre_routing — \n - Called before a bridging packet is routed\n-
netfilter.bridge.pre_routing
length
\n- The length of the packet buffer contents, in bytes\n+
netfilter.bridge.pre_routing
br_mac
\n+ Bridge MAC address\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
br_cost
\n- Total cost from transmitting bridge to root\n
llcproto_stp
\n Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_msg
\n- Message age in 1/256 secs\n-
br_rmac
\n- Root bridge MAC address\n+
br_cost
\n+ Total cost from transmitting bridge to root\n
br_max
\n Max age in 1/256 secs\n-
br_vid
\n- Protocol version identifier\n-
data_str
\n- A string representing the packet buffer contents\n-
br_rid
\n- Identity of root bridge\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
br_flags
\n- BPDU flags\n-
br_mac
\n- Bridge MAC address\n+
br_msg
\n+ Message age in 1/256 secs\n+
length
\n+ The length of the packet buffer contents, in bytes\n
brhdr
\n Address of bridge header\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
br_prid
\n- Protocol identifier\n+
br_type
\n+ BPDU type\n+
protocol
\n+ Packet protocol\n+
data_str
\n+ A string representing the packet buffer contents\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
br_bid
\n Identity of bridge\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
br_poid
\n+ Port identifier\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
br_rid
\n+ Identity of root bridge\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
protocol
\n- Packet protocol\n+
br_rmac
\n+ Root bridge MAC address\n+
br_flags
\n+ BPDU flags\n+
br_htime
\n+ Hello time in 1/256 secs\n+
br_vid
\n+ Protocol version identifier\n
br_fd
\n Forward delay in 1/256 secs\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
br_type
\n- BPDU type\n
outdev_name
\n Name of network device packet will be routed to (if known)\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_poid
\n- Port identifier\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n
pf
\n Protocol family -- always “bridge”\n-
br_htime
\n- Hello time in 1/256 secs\n+
br_prid
\n+ Protocol identifier\n
probe::netfilter.ip.forward — \n Called on an incoming IP packet addressed to some other computer\n-
netfilter.ip.forward
family
\n- IP address family\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
saddr
\n- A string representing the source IP address\n+
netfilter.ip.forward
protocol
\n+ Packet protocol from driver (ipv4 only)\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n
ipproto_udp
\n Constant used to signify that the packet protocol is UDP\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
iphdr
\n- Address of IP header\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n
nf_accept
\n Constant used to signify an 'accept' verdict\n
rst
\n TCP RST flag (if protocol is TCP; ipv4 only)\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
daddr
\n- A string representing the destination IP address\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n
syn
\n TCP SYN flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
iphdr
\n+ Address of IP header\n+
saddr
\n+ A string representing the source IP address\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
family
\n+ IP address family\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
daddr
\n+ A string representing the destination IP address\n
data_str
\n A string representing the packet buffer contents\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n
probe::netfilter.ip.local_in — \n Called on an incoming IP packet addressed to the local computer\n-
netfilter.ip.local_in
indev_name
\n- Name of network device packet was received on (if known)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n+
netfilter.ip.local_in
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n
protocol
\n Packet protocol from driver (ipv4 only)\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
saddr
\n- A string representing the source IP address\n-
family
\n- IP address family\n-
sport
\n- TCP or UDP source port (ipv4 only)\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n
length
\n The length of the packet buffer contents, in bytes\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
data_str
\n- A string representing the packet buffer contents\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
iphdr
\n- Address of IP header\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
nf_accept
\n Constant used to signify an 'accept' verdict\n
rst
\n TCP RST flag (if protocol is TCP; ipv4 only)\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
saddr
\n+ A string representing the source IP address\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n
dport
\n TCP or UDP destination port (ipv4 only)\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n+
family
\n+ IP address family\n
daddr
\n A string representing the destination IP address\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n+
data_str
\n+ A string representing the packet buffer contents\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
iphdr
\n+ Address of IP header\n
probe::netfilter.ip.local_out — \n Called on an outgoing IP packet\n-
netfilter.ip.local_out
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n+
netfilter.ip.local_out
length
\n+ The length of the packet buffer contents, in bytes\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n
nf_accept
\n Constant used to signify an 'accept' verdict\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
indev
\n Address of net_device representing input device, 0 if unknown\n
iphdr
\n Address of IP header\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
daddr
\n- A string representing the destination IP address\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
data_str
\n+ A string representing the packet buffer contents\n
psh
\n TCP PSH flag (if protocol is TCP; ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n
nf_queue
\n Constant used to signify a 'queue' verdict\n-
data_str
\n- A string representing the packet buffer contents\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
family
\n- IP address family\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
saddr
\n A string representing the source IP address\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
family
\n+ IP address family\n+
daddr
\n+ A string representing the destination IP address\n
probe::netfilter.ip.post_routing — \n Called immediately before an outgoing IP packet leaves the computer\n-
netfilter.ip.post_routing
dport
\n- TCP or UDP destination port (ipv4 only)\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n+
netfilter.ip.post_routing
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n-
daddr
\n- A string representing the destination IP address\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
indev
\n Address of net_device representing input device, 0 if unknown\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
iphdr
\n Address of IP header\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
data_str
\n- A string representing the packet buffer contents\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
nf_queue
\n Constant used to signify a 'queue' verdict\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n
saddr
\n A string representing the source IP address\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
sport
\n TCP or UDP source port (ipv4 only)\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
family
\n IP address family\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
daddr
\n+ A string representing the destination IP address\n+
data_str
\n+ A string representing the packet buffer contents\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n
probe::netfilter.ip.pre_routing — \n Called before an IP packet is routed\n-
netfilter.ip.pre_routing
data_hex
\n+
netfilter.ip.pre_routing
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
saddr
\n- A string representing the source IP address\n-
family
\n- IP address family\n-
sport
\n- TCP or UDP source port (ipv4 only)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
pf
\n- Protocol family - either 'ipv4' or 'ipv6'\n-
length
\n- The length of the packet buffer contents, in bytes\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n
data_str
\n A string representing the packet buffer contents\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
nf_queue
\n Constant used to signify a 'queue' verdict\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
iphdr
\n- Address of IP header\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
saddr
\n+ A string representing the source IP address\n
daddr
\n A string representing the destination IP address\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
family
\n+ IP address family\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
iphdr
\n+ Address of IP header\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
pf
\n+ Protocol family - either 'ipv4' or 'ipv6'\n
probe::nfs.aop.readahead — \n NFS client reading multiple pages\n
nfs.aop.readahead
dev
\n device identifier\n-
file
\n- filp argument\n-
nr_pages
\n- number of pages attempted to read in this execution\n
rsize
\n read size (in bytes)\n-
size
\n- number of pages attempted to read in this execution\n+
file
\n+ filp argument\n
rpages
\n read size (in pages)\n+
nr_pages
\n+ number of pages attempted to read in this execution\n
ino
\n inode number\n+
size
\n+ number of pages attempted to read in this execution\n
probe::nfs.aop.readpage — \n NFS client synchronously reading a page\n-
nfs.aop.readpage
ino
\n- inode number\n-
i_size
\n- file length in bytes\n+
nfs.aop.readpage
size
\n+ number of pages to be read in this execution \n
__page
\n the address of page\n-
size
\n- number of pages to be read in this execution \n-
rsize
\n- read size (in bytes)\n-
i_flag
\n- file flags\n-
sb_flag
\n- super block flags\n+
ino
\n+ inode number\n
page_index
\n offset within mapping, can used a page identifier\n and position identifier in the page frame\n+
sb_flag
\n+ super block flags\n+
i_flag
\n+ file flags\n
file
\n file argument\n+
rsize
\n+ read size (in bytes)\n+
i_size
\n+ file length in bytes\n
dev
\n device identifier\n
probe::nfs.aop.readpages — \n NFS client reading multiple pages\n-
nfs.aop.readpages
dev
\n- device identifier\n+
nfs.aop.readpages
ino
\n+ inode number \n+
size
\n+ number of pages attempted to read in this execution\n
file
\n filp argument\n+
rsize
\n+ read size (in bytes)\n+
dev
\n+ device identifier\n
nr_pages
\n number of pages attempted to read in this execution\n
rpages
\n read size (in pages)\n-
rsize
\n- read size (in bytes)\n-
size
\n- number of pages attempted to read in this execution\n-
ino
\n- inode number \n
probe::nfs.aop.release_page — \n NFS client releasing page\n-
nfs.aop.release_page
ino
\n- inode number\n-
size
\n- release pages\n-
__page
\n- the address of page\n-
dev
\n+
nfs.aop.release_page
probe::nfs.aop.set_page_dirty — \n NFS client marking page as dirty\n-
nfs.aop.set_page_dirty
probe::nfs.aop.write_begin — \n NFS client begin to write data\n-
nfs.aop.write_begin
offset
\n- start address of this write operation \n+
nfs.aop.write_begin
size
\n+ write bytes\n+
to
\n+ end address of this write operation \n+
__page
\n+ the address of page\n+
ino
\n+ inode number \n
page_index
\n offset within mapping, can used a page identifier\n and position identifier in the page frame\n+
offset
\n+ start address of this write operation \n
dev
\n device identifier\n-
ino
\n- inode number \n-
to
\n- end address of this write operation \n-
size
\n- write bytes\n-
__page
\n- the address of page\n
\n Occurs when write operation occurs on nfs. It prepare a page for writing,\n look for a request corresponding to the page. If there\n is one, and it belongs to another file, it flush it out\n before it tries to copy anything into the page. \n Also do the same if it finds a request from an existing\n dropped page\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "comments": ["Ordering differences only"], "unified_diff": "@@ -1,29 +1,29 @@\n
probe::nfs.aop.write_end — \n NFS client complete writing data\n
nfs.aop.write_end
__page
\n the address of page\n+
to
\n+ end address of this write operation\n
size
\n write bytes\n-
i_flag
\n- file flags\n
ino
\n inode number\n-
i_size
\n- file length in bytes\n-
to
\n- end address of this write operation\n+
i_flag
\n+ file flags\n
sb_flag
\n super block flags\n
page_index
\n offset within mapping, can used a page identifier and position identifier in the page frame\n-
dev
\n- device identifier\n
offset
\n start address of this write operation\n+
i_size
\n+ file length in bytes\n+
dev
\n+ device identifier\n
probe::nfs.aop.writepage — \n NFS client writing a mapped page to the NFS server\n-
nfs.aop.writepage
i_state
\n- inode state flags\n+
nfs.aop.writepage
i_flag
\n+ file flags\n+
page_index
\n+ offset within mapping,\n+ can used a page identifier and position identifier in the page frame\n+
sb_flag
\n+ super block flags\n+
dev
\n+ device identifier\n+
i_size
\n+ file length in bytes\n
for_kupdate
\n a flag of writeback_control,\n indicates if it's a kupdate writeback\n-
wsize
\n- write size\n
for_reclaim
\n a flag of writeback_control,\n indicates if it's invoked from the page allocator\n-
sb_flag
\n- super block flags\n-
page_index
\n- offset within mapping,\n- can used a page identifier and position identifier in the page frame\n-
dev
\n- device identifier\n+
i_state
\n+ inode state flags\n+
wsize
\n+ write size\n
ino
\n inode number \n-
i_size
\n- file length in bytes\n-
__page
\n- the address of page\n
size
\n number of pages to be written in this execution\n-
i_flag
\n- file flags\n+
__page
\n+ the address of page\n
probe::nfs.aop.writepages — \n NFS client writing several dirty pages to the NFS server\n-
nfs.aop.writepages
size
\n- number of pages attempted to be written in this execution\n-
ino
\n- inode number\n-
dev
\n+
nfs.aop.writepages
dev
\n device identifier\n
nr_to_write
\n number of pages attempted to be written in this execution\n+
for_kupdate
\n+ a flag of writeback_control,\n+ indicates if it's a kupdate writeback\n
for_reclaim
\n a flag of writeback_control,\n indicates if it's invoked from the page allocator\n
wsize
\n write size\n-
for_kupdate
\n- a flag of writeback_control,\n- indicates if it's a kupdate writeback\n
wpages
\n write size (in pages)\n+
size
\n+ number of pages attempted to be written in this execution\n+
ino
\n+ inode number\n
probe::nfs.fop.aio_read — \n NFS client aio_read file operation\n-
nfs.fop.aio_read
buf
\n- the address of buf in user space\n-
pos
\n- current position of file \n-
file_name
\n- file name\n-
dev
\n- device identifier\n-
cache_valid
\n- cache related bit mask flag\n-
parent_name
\n+
nfs.fop.aio_read
parent_name
\n parent dir name\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n-
count
\n- read bytes\n-
cache_time
\n- when we started read-caching this inode\n+
cache_valid
\n+ cache related bit mask flag\n+
file_name
\n+ file name\n+
buf
\n+ the address of buf in user space\n
ino
\n inode number \n+
pos
\n+ current position of file \n+
cache_time
\n+ when we started read-caching this inode\n+
dev
\n+ device identifier\n+
count
\n+ read bytes\n
probe::nfs.fop.aio_write — \n NFS client aio_write file operation\n-
nfs.fop.aio_write
probe::nfs.fop.flush — \n NFS client flush file operation\n-
nfs.fop.flush
probe::nfs.fop.fsync — \n NFS client fsync operation\n-
nfs.fop.fsync
nfs.fop.llseek
probe::nfs.fop.lock — \n NFS client file lock operation\n-
nfs.fop.lock
cmd
\n- cmd arguments\n-
fl_end
\n- ending offset of locked region\n-
dev
\n+
nfs.fop.lock
dev
\n device identifier\n-
ino
\n- inode number\n+
fl_type
\n+ lock type\n
fl_flag
\n lock flags\n+
cmd
\n+ cmd arguments\n+
ino
\n+ inode number\n+
fl_end
\n+ ending offset of locked region\n
fl_start
\n starting offset of locked region\n
i_mode
\n file type and access rights\n-
fl_type
\n- lock type\n
probe::nfs.fop.mmap — \n NFS client mmap operation\n-
nfs.fop.mmap
cache_time
\n- when we started read-caching this inode\n-
ino
\n- inode number \n-
attrtimeo
\n- how long the cached information is assumed to be valid.\n- We need to revalidate the cached attrs for this inode \n- if jiffies - read_cache_jiffies > attrtimeo.\n+
nfs.fop.mmap
buf
\n+ the address of buf in user space\n
vm_end
\n the first byte after end address within vm_mm\n
file_name
\n file name\n-
buf
\n- the address of buf in user space\n+
ino
\n+ inode number \n+
vm_start
\n+ start address within vm_mm \n+
cache_time
\n+ when we started read-caching this inode\n
parent_name
\n parent dir name\n+
attrtimeo
\n+ how long the cached information is assumed to be valid.\n+ We need to revalidate the cached attrs for this inode \n+ if jiffies - read_cache_jiffies > attrtimeo.\n
cache_valid
\n cache related bit mask flag\n-
dev
\n- device identifier\n-
vm_start
\n- start address within vm_mm \n
vm_flag
\n vm flags\n+
dev
\n+ device identifier\n
probe::nfs.fop.open — \n NFS client file open operation\n-
nfs.fop.open
probe::nfs.fop.read_iter — \n NFS client read_iter file operation\n-
nfs.fop.read_iter
file_name
\n- file name\n-
dev
\n- device identifier\n+
nfs.fop.read_iter
ino
\n+ inode number \n
pos
\n current position of file \n-
ino
\n- inode number \n-
count
\n- read bytes\n
cache_time
\n when we started read-caching this inode\n+
count
\n+ read bytes\n+
dev
\n+ device identifier\n
cache_valid
\n cache related bit mask flag\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n
parent_name
\n parent dir name\n+
file_name
\n+ file name\n
probe::nfs.fop.release — \n NFS client release page operation\n-
nfs.fop.release
probe::nfs.fop.sendfile — \n NFS client send file operation\n-
nfs.fop.sendfile
dev
\n- device identifier\n+
nfs.fop.sendfile
attrtimeo
\n+ how long the cached information is assumed to be valid.\n+ We need to revalidate the cached attrs for this inode\n+ if jiffies - read_cache_jiffies > attrtimeo.\n
cache_valid
\n cache related bit mask flag\n+
count
\n+ read bytes\n+
dev
\n+ device identifier\n
ppos
\n current position of file\n-
attrtimeo
\n- how long the cached information is assumed to be valid.\n- We need to revalidate the cached attrs for this inode\n- if jiffies - read_cache_jiffies > attrtimeo.\n
ino
\n inode number\n-
count
\n- read bytes\n
cache_time
\n when we started read-caching this inode\n
probe::nfs.fop.write_iter — \n NFS client write_iter file operation\n-
nfs.fop.write_iter
probe::nfs.proc.commit_done — \n NFS client response to a commit RPC task\n-
nfs.proc.commit_done
count
\n- number of bytes committed\n-
valid
\n- fattr->valid, indicates which fields are valid \n-
version
\n+
nfs.proc.commit_done
version
\n NFS version\n-
timestamp
\n- V4 timestamp, which is used for lease renewal\n
prot
\n transfer protocol\n
server_ip
\n IP address of server\n+
timestamp
\n+ V4 timestamp, which is used for lease renewal\n
status
\n result of last operation\n+
valid
\n+ fattr->valid, indicates which fields are valid \n+
count
\n+ number of bytes committed\n
probe::nfs.proc.commit_setup — \n NFS client setting up a commit RPC task\n
nfs.proc.commit_setup
count
\n bytes in this commit\n-
version
\n- NFS version\n-
size
\n- bytes in this commit\n
offset
\n the file offset\n-
prot
\n- transfer protocol\n+
bitmask1
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
version
\n+ NFS version\n+
size
\n+ bytes in this commit\n
server_ip
\n IP address of server\n-
bitmask1
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n+
prot
\n+ transfer protocol\n
probe::nfs.proc.commit — \n NFS client committing data on server\n-
nfs.proc.commit
server_ip
\n- IP address of server\n+
nfs.proc.commit
offset
\n+ the file offset\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
offset
\n- the file offset\n-
prot
\n- transfer protocol\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n
version
\n NFS version\n
size
\n read bytes in this execution\n+
server_ip
\n+ IP address of server\n+
prot
\n+ transfer protocol\n
\n All the nfs.proc.commit kernel functions were removed in kernel\n commit 200baa in December 2006, so these probes do not exist on Linux\n 2.6.21 and newer kernels.\n
\n \n Fires when client writes the buffered data to disk.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "unified_diff": "@@ -1,17 +1,17 @@\n
probe::nfs.proc.create — \n NFS client creating file on server\n-
nfs.proc.create
flag
\n- indicates create mode (only for NFSv3 and NFSv4)\n-
version
\n- NFS version (the function is used for all NFS version)\n-
filelen
\n+
nfs.proc.create
filelen
\n length of file name\n-
prot
\n- transfer protocol\n
fh
\n file handle of parent dir\n+
flag
\n+ indicates create mode (only for NFSv3 and NFSv4)\n
filename
\n file name\n+
prot
\n+ transfer protocol\n
server_ip
\n IP address of server\n+
version
\n+ NFS version (the function is used for all NFS version)\n
probe::nfs.proc.lookup — \n NFS client opens/searches a file on server\n-
nfs.proc.lookup
name_len
\n- the length of file name\n-
bitmask0
\n+
nfs.proc.lookup
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
version
\n+ NFS version\n+
name_len
\n+ the length of file name\n+
server_ip
\n+ IP address of server\n
prot
\n transfer protocol\n+
filename
\n+ the name of file which client opens/searches on server\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
server_ip
\n- IP address of server\n-
filename
\n- the name of file which client opens/searches on server\n-
version
\n- NFS version\n
probe::nfs.proc.open — \n NFS client allocates file read/write context information\n-
nfs.proc.open
version
\n+
nfs.proc.open
probe::nfs.proc.read_done — \n NFS client response to a read RPC task\n-
nfs.proc.read_done
version
\n- NFS version\n+
nfs.proc.read_done
probe::nfs.proc.read_setup — \n NFS client setting up a read RPC task\n-
nfs.proc.read_setup
server_ip
\n- IP address of server\n+
nfs.proc.read_setup
probe::nfs.proc.read — \n NFS client synchronously reads file from server\n-
nfs.proc.read
count
\n+
nfs.proc.read
offset
\n+ the file offset\n+
count
\n read bytes in this execution\n+
server_ip
\n+ IP address of server\n+
prot
\n+ transfer protocol\n
version
\n NFS version\n
flags
\n used to set task->tk_flags in rpc_init_task function\n-
prot
\n- transfer protocol\n-
offset
\n- the file offset\n-
server_ip
\n- IP address of server\n
probe::nfs.proc.release — \n NFS client releases file read/write context information\n-
nfs.proc.release
server_ip
\n- IP address of server\n+
nfs.proc.release
probe::nfs.proc.remove — \n NFS client removes a file on server\n-
nfs.proc.remove
filelen
\n- length of file name\n+
nfs.proc.remove
prot
\n+ transfer protocol\n+
server_ip
\n+ IP address of server\n
version
\n NFS version (the function is used for all NFS version)\n-
filename
\n- file name\n+
filelen
\n+ length of file name\n
fh
\n file handle of parent dir\n-
server_ip
\n- IP address of server\n-
prot
\n- transfer protocol\n+
filename
\n+ file name\n
probe::nfs.proc.rename_done — \n NFS client response to a rename RPC task\n-
nfs.proc.rename_done
version
\n+
nfs.proc.rename_done
timestamp
\n+ V4 timestamp, which is used for lease renewal\n+
version
\n NFS version\n-
new_fh
\n- file handle of new parent dir\n+
prot
\n+ transfer protocol\n
server_ip
\n IP address of server\n-
timestamp
\n- V4 timestamp, which is used for lease renewal\n+
new_fh
\n+ file handle of new parent dir\n
old_fh
\n file handle of old parent dir\n-
prot
\n- transfer protocol\n
status
\n result of last operation\n
probe::nfs.proc.rename_setup — \n NFS client setting up a rename RPC task\n-
nfs.proc.rename_setup
fh
\n- file handle of parent dir\n-
server_ip
\n- IP address of server\n+
nfs.proc.rename_setup
probe::nfs.proc.rename — \n NFS client renames a file on server\n-
nfs.proc.rename
version
\n- NFS version (the function is used for all NFS version)\n-
new_fh
\n+
nfs.proc.rename
new_fh
\n file handle of new parent dir\n-
new_name
\n- new file name\n
new_filelen
\n length of new file name\n-
old_name
\n- old file name\n
old_filelen
\n length of old file name\n-
server_ip
\n- IP address of server\n-
prot
\n- transfer protocol\n
old_fh
\n file handle of old parent dir\n+
old_name
\n+ old file name\n+
new_name
\n+ new file name\n+
prot
\n+ transfer protocol\n+
server_ip
\n+ IP address of server\n+
version
\n+ NFS version (the function is used for all NFS version)\n
probe::nfs.proc.write_done — \n NFS client response to a write RPC task\n-
nfs.proc.write_done
status
\n- result of last operation\n-
timestamp
\n+
nfs.proc.write_done
timestamp
\n V4 timestamp, which is used for lease renewal\n-
prot
\n- transfer protocol\n
server_ip
\n IP address of server\n+
prot
\n+ transfer protocol\n+
version
\n+ NFS version\n
count
\n number of bytes written\n
valid
\n fattr->valid, indicates which fields are valid \n-
version
\n- NFS version\n+
status
\n+ result of last operation\n
probe::nfs.proc.write_setup — \n NFS client setting up a write RPC task\n-
nfs.proc.write_setup
how
\n+
nfs.proc.write_setup
offset
\n+ the file offset\n+
count
\n+ bytes written in this execution\n+
version
\n+ NFS version\n+
size
\n+ bytes written in this execution\n+
how
\n used to set args.stable. The stable value could be:\n NFS_UNSTABLE,NFS_DATA_SYNC,NFS_FILE_SYNC\n (in nfs.proc3.write_setup and nfs.proc4.write_setup)\n+
bitmask0
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n
server_ip
\n IP address of server\n-
bitmask1
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem \n
prot
\n transfer protocol\n-
bitmask0
\n+
bitmask1
\n V4 bitmask representing the set of attributes supported\n- on this filesystem\n-
offset
\n- the file offset\n-
version
\n- NFS version\n-
count
\n- bytes written in this execution\n-
size
\n- bytes written in this execution\n+ on this filesystem \n
probe::nfs.proc.write — \n NFS client synchronously writes file to server\n-
nfs.proc.write
version
\n+
nfs.proc.write
offset
\n+ the file offset\n+
version
\n NFS version\n
size
\n read bytes in this execution\n-
bitmask1
\n+
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n
server_ip
\n IP address of server\n-
flags
\n- used to set task->tk_flags in rpc_init_task function\n-
bitmask0
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n
prot
\n transfer protocol\n-
offset
\n- the file offset\n+
bitmask1
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n+
flags
\n+ used to set task->tk_flags in rpc_init_task function\n
probe::nfsd.commit — \n NFS server committing all pending writes to stable storage\n-
nfsd.commit
size
\n- read bytes\n+
nfsd.commit
client_ip
\n+ the ip address of client\n
fh
\n file handle (the first part is the length of the file handle)\n
count
\n read bytes\n-
client_ip
\n- the ip address of client\n-
offset
\n- the offset of file\n
flag
\n indicates whether this execution is a sync operation\n+
size
\n+ read bytes\n+
offset
\n+ the offset of file\n
probe::nfsd.create — \n NFS server creating a file(regular,dir,device,fifo) for client\n
nfsd.create
client_ip
\n the ip address of client\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
type
\n+ file type(regular,dir,device,fifo ...)\n
filelen
\n the length of file name\n-
filename
\n- file name \n
iap_valid
\n Attribute flags\n+
filename
\n+ file name \n
iap_mode
\n file access mode\n-
type
\n- file type(regular,dir,device,fifo ...)\n-
fh
\n- file handle (the first part is the length of the file handle)\n
probe::nfsd.createv3 — \n NFS server creating a regular file or set file attributes for client\n-
nfsd.createv3
verifier
\n- file attributes (atime,mtime,mode). It's used to reset file attributes for CREATE_EXCLUSIVE\n-
truncp
\n- trunp arguments, indicates if the file shouldbe truncate\n-
filename
\n- file name \n-
iap_mode
\n+
nfsd.createv3
iap_mode
\n file access mode\n
iap_valid
\n Attribute flags\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
createmode
\n- create mode .The possible values could be: NFS3_CREATE_EXCLUSIVE, NFS3_CREATE_UNCHECKED, or NFS3_CREATE_GUARDED\n+
filename
\n+ file name \n
filelen
\n the length of file name\n+
createmode
\n+ create mode .The possible values could be: NFS3_CREATE_EXCLUSIVE, NFS3_CREATE_UNCHECKED, or NFS3_CREATE_GUARDED\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
verifier
\n+ file attributes (atime,mtime,mode). It's used to reset file attributes for CREATE_EXCLUSIVE\n
client_ip
\n the ip address of client\n+
truncp
\n+ trunp arguments, indicates if the file shouldbe truncate\n
probe::nfsd.dispatch — \n NFS server receives an operation from client\n-
nfsd.dispatch
probe::nfsd.lookup — \n NFS server opening or searching file for a file for client\n-
nfsd.lookup
fh
\n- file handle of parent dir(the first part is the length of the file handle)\n+
nfsd.lookup
probe::nfsd.open — \n NFS server opening a file for client\n-
nfsd.open
fh
\n- file handle (the first part is the length of the file handle)\n-
type
\n+
nfsd.open
probe::nfsd.proc.commit — \n NFS server performing a commit operation for client\n-
nfsd.proc.commit
uid
\n- requester's user id\n-
version
\n- nfs version\n-
size
\n- read bytes\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
count
\n- read bytes\n-
gid
\n+
nfsd.proc.commit
gid
\n requester's group id\n
proto
\n transfer protocol\n-
offset
\n- the offset of file \n
client_ip
\n the ip address of client\n+
count
\n+ read bytes\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
uid
\n+ requester's user id\n+
offset
\n+ the offset of file \n+
size
\n+ read bytes\n+
version
\n+ nfs version\n
probe::nfsd.proc.create — \n NFS server creating a file for client\n-
nfsd.proc.create
version
\n- nfs version\n-
uid
\n- requester's user id\n-
filename
\n- file name\n+
nfsd.proc.create
proto
\n+ transfer protocol\n+
client_ip
\n+ the ip address of client\n
gid
\n requester's group id\n
fh
\n file handle (the first part is the length of the file handle)\n-
proto
\n- transfer protocol\n-
client_ip
\n- the ip address of client\n
filelen
\n length of file name\n+
filename
\n+ file name\n+
version
\n+ nfs version\n+
uid
\n+ requester's user id\n
probe::nfsd.proc.lookup — \n NFS server opening or searching for a file for client\n-
nfsd.proc.lookup
proto
\n- transfer protocol\n-
filename
\n- file name \n+
nfsd.proc.lookup
uid
\n+ requester's user id\n
version
\n nfs version\n-
uid
\n- requester's user id\n-
filelen
\n- the length of file name\n
fh
\n file handle of parent dir (the first part is the length of the file handle)\n
gid
\n requester's group id\n+
filename
\n+ file name \n+
filelen
\n+ the length of file name\n
client_ip
\n the ip address of client\n+
proto
\n+ transfer protocol\n
probe::nfsd.proc.read — \n NFS server reading file for client\n-
nfsd.proc.read
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n-
vlen
\n+
nfsd.proc.read
vlen
\n read blocks \n+
size
\n+ read bytes\n+
version
\n+ nfs version\n+
uid
\n+ requester's user id\n+
offset
\n+ the offset of file \n
proto
\n transfer protocol\n
client_ip
\n the ip address of client\n-
offset
\n- the offset of file \n-
uid
\n- requester's user id\n-
version
\n- nfs version\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
gid
\n requester's group id\n
fh
\n file handle (the first part is the length of the file handle)\n
count
\n read bytes\n-
size
\n- read bytes\n
probe::nfsd.proc.remove — \n NFS server removing a file for client\n
nfsd.proc.remove
fh
\n file handle (the first part is the length of the file handle)\n
gid
\n requester's group id\n-
filename
\n- file name\n+
proto
\n+ transfer protocol\n+
client_ip
\n+ the ip address of client\n
uid
\n requester's user id\n
version
\n nfs version\n
filelen
\n length of file name\n-
client_ip
\n- the ip address of client\n-
proto
\n- transfer protocol\n+
filename
\n+ file name\n
probe::nfsd.proc.rename — \n NFS Server renaming a file for client\n-
nfsd.proc.rename
filename
\n- old file name \n-
uid
\n+
nfsd.proc.rename
uid
\n requester's user id\n+
filename
\n+ old file name \n
fh
\n file handler of old path\n-
gid
\n- requester's group id\n-
tlen
\n- length of new file name\n
tfh
\n file handler of new path\n-
tname
\n- new file name\n-
flen
\n- length of old file name \n+
tlen
\n+ length of new file name\n
client_ip
\n the ip address of client\n+
flen
\n+ length of old file name \n+
tname
\n+ new file name\n+
gid
\n+ requester's group id\n
probe::nfsd.proc.write — \n NFS server writing data to file for client\n-
nfsd.proc.write
fh
\n- file handle (the first part is the length of the file handle)\n-
count
\n- read bytes\n-
gid
\n- requester's group id\n-
size
\n- read bytes\n+
nfsd.proc.write
vlen
\n+ read blocks \n+
offset
\n+ the offset of file \n
uid
\n requester's user id\n+
size
\n+ read bytes\n
version
\n nfs version\n-
offset
\n- the offset of file \n+
gid
\n+ requester's group id\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
client_ip
\n the ip address of client\n
stable
\n argp->stable\n
proto
\n transfer protocol\n-
vlen
\n- read blocks \n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n+
count
\n+ read bytes\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
probe::nfsd.read — \n NFS server reading data from a file for client\n-
nfsd.read
fh
\n- file handle (the first part is the length of the file handle)\n-
count
\n+
nfsd.read
size
\n read bytes\n-
size
\n- read bytes\n-
vlen
\n- read blocks \n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n
file
\n argument file, indicates if the file has been opened.\n
offset
\n the offset of file \n+
vlen
\n+ read blocks \n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
count
\n+ read bytes\n
client_ip
\n the ip address of client\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
probe::nfsd.rename — \n NFS server renaming a file for client\n-
nfsd.rename
client_ip
\n- the ip address of client\n-
tname
\n- new file name\n-
flen
\n- length of old file name \n-
fh
\n+
nfsd.rename
probe::nfsd.unlink — \n NFS server removing a file or a directory for client\n-
nfsd.unlink
probe::nfsd.write — \n NFS server writing data to a file for client\n-
nfsd.write
size
\n- read bytes\n+
nfsd.write
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n+
client_ip
\n+ the ip address of client\n
count
\n read bytes\n
fh
\n file handle (the first part is the length of the file handle)\n+
vlen
\n+ read blocks \n
offset
\n the offset of file \n-
client_ip
\n- the ip address of client\n
file
\n argument file, indicates if the file has been opened.\n-
vlen
\n- read blocks \n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n+
size
\n+ read bytes\n
probe::scheduler.cpu_off — \n Process is about to stop running on a cpu\n
scheduler.cpu_off
probe::scheduler.cpu_on — \n Process is beginning execution on a cpu\n-
scheduler.cpu_on
name
\n- name of the probe point\n-
idle
\n+
scheduler.cpu_on
probe::scheduler.ctxswitch — \n A context switch is occuring.\n-
scheduler.ctxswitch
next_pid
\n- The PID of the process to be switched in\n-
next_task_name
\n- The name of the process to be switched in\n-
next_priority
\n- The priority of the process to be switched in\n-
name
\n- name of the probe point\n+
scheduler.ctxswitch
nexttsk_state
\n+ the state of the process to be switched in\n+
prev_task_name
\n+ The name of the process to be switched out\n
next_tid
\n The TID of the process to be switched in\t \n-
prevtsk_state
\n- the state of the process to be switched out\n
prev_priority
\n The priority of the process to be switched out\n-
prev_tid
\n- The TID of the process to be switched out\n-
prev_task_name
\n- The name of the process to be switched out\n
prev_pid
\n The PID of the process to be switched out\n-
nexttsk_state
\n- the state of the process to be switched in\n+
next_priority
\n+ The priority of the process to be switched in\n+
next_pid
\n+ The PID of the process to be switched in\n+
prev_tid
\n+ The TID of the process to be switched out\n+
name
\n+ name of the probe point\n+
prevtsk_state
\n+ the state of the process to be switched out\n+
next_task_name
\n+ The name of the process to be switched in\n
probe::scheduler.migrate — \n Task migrating across cpus\n-
scheduler.migrate
probe::scheduler.process_free — \n Scheduler freeing a data structure for a process\n-
scheduler.process_free
probe::scheduler.signal_send — \n Sending a signal\n-
scheduler.signal_send
probe::scheduler.wait_task — \n Waiting on a task to unschedule (become inactive)\n
scheduler.wait_task
probe::scheduler.wakeup_new — \n Newly created task is woken up for the first time\n-
scheduler.wakeup_new
task_state
\n+
scheduler.wakeup_new
name
\n+ name of the probe point\n+
task_tid
\n+ TID of the new task woken up\n+
task_state
\n state of the task woken up\n-
task_cpu
\n- cpu of the task woken up\n
task_priority
\n priority of the new task\n-
task_tid
\n- TID of the new task woken up\n-
name
\n- name of the probe point\n+
task_cpu
\n+ cpu of the task woken up\n
task_pid
\n PID of the new task woken up\n
probe::scheduler.wakeup — \n Task is woken up\n-
scheduler.wakeup
name
\n- name of the probe point\n+
scheduler.wakeup
task_cpu
\n+ cpu of the task being woken up\n
task_pid
\n PID of the task being woken up\n
task_priority
\n priority of the task being woken up\n-
task_tid
\n- tid of the task being woken up\n-
task_cpu
\n- cpu of the task being woken up\n
task_state
\n state of the task being woken up\n+
task_tid
\n+ tid of the task being woken up\n+
name
\n+ name of the probe point\n
probe::scsi.iocompleted — \n SCSI mid-layer running the completion processing for block device I/O requests\n-
scsi.iocompleted
device_state_str
\n- The current state of the device, as a string\n-
goodbytes
\n- The bytes completed\n-
device_state
\n- The current state of the device\n-
req_addr
\n- The current struct request pointer, as a number\n-
channel
\n- The channel number\n+
scsi.iocompleted
lun
\n+ The lun number\n
host_no
\n The host number\n-
data_direction_str
\n- Data direction, as a string\n+
channel
\n+ The channel number\n+
dev_id
\n+ The scsi device id\n
data_direction
\n The data_direction specifies whether this command is from/to\n the device\n-
dev_id
\n- The scsi device id\n-
lun
\n- The lun number\n+
device_state
\n+ The current state of the device\n+
data_direction_str
\n+ Data direction, as a string\n+
device_state_str
\n+ The current state of the device, as a string\n+
goodbytes
\n+ The bytes completed\n+
req_addr
\n+ The current struct request pointer, as a number\n
probe::scsi.iodispatching — \n SCSI mid-layer dispatched low-level SCSI command\n-
scsi.iodispatching
device_state_str
\n- The current state of the device, as a string\n-
request_bufflen
\n- The request buffer length\n-
device_state
\n- The current state of the device\n+
scsi.iodispatching
host_no
\n+ The host number\n
request_buffer
\n The request buffer address\n-
req_addr
\n- The current struct request pointer, as a number\n+
lun
\n+ The lun number\n+
device_state
\n+ The current state of the device\n
channel
\n The channel number\n-
host_no
\n- The host number\n+
dev_id
\n+ The scsi device id\n
data_direction
\n The data_direction specifies whether this command is from/to the device\n 0 (DMA_BIDIRECTIONAL), 1 (DMA_TO_DEVICE),\n 2 (DMA_FROM_DEVICE), 3 (DMA_NONE)\n
data_direction_str
\n Data direction, as a string\n-
dev_id
\n- The scsi device id\n-
lun
\n- The lun number\n+
request_bufflen
\n+ The request buffer length\n+
req_addr
\n+ The current struct request pointer, as a number\n+
device_state_str
\n+ The current state of the device, as a string\n
probe::scsi.iodone — \n SCSI command completed by low level driver and enqueued into the done queue.\n-
scsi.iodone
device_state_str
\n- The current state of the device, as a string\n-
scsi_timer_pending
\n- 1 if a timer is pending on this request\n-
req_addr
\n+
scsi.iodone
req_addr
\n The current struct request pointer, as a number\n+
device_state_str
\n+ The current state of the device, as a string\n+
data_direction_str
\n+ Data direction, as a string\n
device_state
\n The current state of the device\n
channel
\n The channel number\n-
host_no
\n- The host number\n+
scsi_timer_pending
\n+ 1 if a timer is pending on this request\n
dev_id
\n The scsi device id\n-
lun
\n- The lun number\n
data_direction
\n The data_direction specifies whether this command is\n from/to the device.\n-
data_direction_str
\n- Data direction, as a string\n+
host_no
\n+ The host number\n+
lun
\n+ The lun number\n
probe::scsi.ioentry — \n Prepares a SCSI mid-layer request\n-
scsi.ioentry
req_addr
\n- The current struct request pointer, as a number\n+
scsi.ioentry
device_state
\n+ The current state of the device\n+
disk_major
\n+ The major number of the disk (-1 if no information)\n
disk_minor
\n The minor number of the disk (-1 if no information)\n-
device_state
\n- The current state of the device\n
device_state_str
\n The current state of the device, as a string\n-
disk_major
\n- The major number of the disk (-1 if no information)\n+
req_addr
\n+ The current struct request pointer, as a number\n
probe::scsi.ioexecute — \n Create mid-layer SCSI request and wait for the result\n-
scsi.ioexecute
dev_id
\n+
scsi.ioexecute
channel
\n+ The channel number\n+
dev_id
\n The scsi device id\n-
host_no
\n- The host number\n-
request_buffer
\n- The data buffer address\n-
request_bufflen
\n- The data buffer buffer length\n-
lun
\n- The lun number\n
data_direction
\n The data_direction specifies whether this command is\n from/to the device.\n-
data_direction_str
\n- Data direction, as a string\n-
channel
\n- The channel number\n-
retries
\n- Number of times to retry request\n-
device_state
\n- The current state of the device\n
timeout
\n Request timeout in seconds\n+
device_state
\n+ The current state of the device\n+
lun
\n+ The lun number\n+
request_buffer
\n+ The data buffer address\n+
retries
\n+ Number of times to retry request\n+
host_no
\n+ The host number\n
device_state_str
\n The current state of the device, as a string\n+
data_direction_str
\n+ Data direction, as a string\n+
request_bufflen
\n+ The data buffer buffer length\n
probe::scsi.set_state — \n Order SCSI device state change\n-
scsi.set_state
old_state
\n- The current state of the device\n+
scsi.set_state
lun
\n+ The lun number\n
host_no
\n The host number\n-
state_str
\n- The new state of the device, as a string\n-
state
\n- The new state of the device\n
dev_id
\n The scsi device id\n
channel
\n The channel number\n+
old_state
\n+ The current state of the device\n+
state
\n+ The new state of the device\n+
state_str
\n+ The new state of the device, as a string\n
old_state_str
\n The current state of the device, as a string\n-
lun
\n- The lun number\n
probe::signal.check_ignored — \n Checking to see signal is ignored\n-
signal.check_ignored
probe::signal.checkperm.return — \n Check performed on a sent signal completed\n-
signal.checkperm.return
probe::signal.checkperm — \n Check being performed on a sent signal\n-
signal.checkperm
sinfo
\n- The address of the siginfo structure\n+
signal.checkperm
sig_pid
\n+ The PID of the process receiving the signal\n
sig
\n The number of the signal\n-
task
\n- A task handle to the signal recipient\n-
name
\n- Name of the probe point\n-
sig_pid
\n- The PID of the process receiving the signal\n
sig_name
\n A string representation of the signal\n
pid_name
\n Name of the process receiving the signal\n+
sinfo
\n+ The address of the siginfo structure\n
si_code
\n Indicates the signal type\n+
name
\n+ Name of the probe point\n+
task
\n+ A task handle to the signal recipient\n
probe::signal.do_action.return — \n Examining or changing a signal action completed\n-
signal.do_action.return
probe::signal.do_action — \n Examining or changing a signal action\n-
signal.do_action
name
\n- Name of the probe point\n-
sig
\n- The signal to be examined/changed\n+
signal.do_action
sa_mask
\n+ The new mask of the signal\n
sa_handler
\n The new handler of the signal\n-
sigact_addr
\n- The address of the new sigaction\n- struct associated with the signal\n+
sig_name
\n+ A string representation of the signal\n+
sig
\n+ The signal to be examined/changed\n+
name
\n+ Name of the probe point\n
oldsigact_addr
\n The address of the old sigaction\n struct associated with the signal\n-
sig_name
\n- A string representation of the signal\n-
sa_mask
\n- The new mask of the signal\n+
sigact_addr
\n+ The address of the new sigaction\n+ struct associated with the signal\n
probe::signal.flush — \n Flushing all pending signals for a task\n-
signal.flush
pid_name
\n- The name of the process associated with the task\n- performing the flush\n+
signal.flush
name
\n+ Name of the probe point\n+
task
\n+ The task handler of the process performing the flush\n
sig_pid
\n The PID of the process associated with the task\n performing the flush\n-
task
\n- The task handler of the process performing the flush\n-
name
\n- Name of the probe point\n+
pid_name
\n+ The name of the process associated with the task\n+ performing the flush\n
probe::signal.force_segv — \n Forcing send of SIGSEGV\n-
signal.force_segv
probe::signal.handle.return — \n Signal handler invocation completed\n-
signal.handle.return
probe::signal.handle — \n Signal handler being invoked\n-
signal.handle
sig
\n+
signal.handle
regs
\n+ The address of the kernel-mode stack area (deprecated in\n+ SystemTap 2.1)\n+
sig_name
\n+ A string representation of the signal\n+
sig
\n The signal number that invoked the signal handler\n
ka_addr
\n The address of the k_sigaction table\n associated with the signal\n
sinfo
\n The address of the siginfo table\n-
regs
\n- The address of the kernel-mode stack area (deprecated in\n- SystemTap 2.1)\n-
name
\n- Name of the probe point\n
sig_code
\n The si_code value of the siginfo signal\n-
sig_name
\n- A string representation of the signal\n+
name
\n+ Name of the probe point\n+
sig_mode
\n+ Indicates whether the signal was a user-mode or kernel-mode signal\n
oldset_addr
\n The address of the bitmask array of blocked signals\n (deprecated in SystemTap 2.1)\n-
sig_mode
\n- Indicates whether the signal was a user-mode or kernel-mode signal\n
probe::signal.pending.return — \n Examination of pending signal completed\n-
signal.pending.return
probe::signal.pending — \n Examining pending signal\n-
signal.pending
sigset_add
\n+
signal.pending
probe::signal.procmask.return — \n Examining or changing blocked signals completed\n-
signal.procmask.return
probe::signal.send.return — \n Signal being sent to a process completed (deprecated in SystemTap 2.1)\n-
signal.send.return
send2queue
\n- Indicates whether the sent signal was sent to an existing sigqueue\n+
signal.send.return
retstr
\n+ The return value to either __group_send_sig_info, specific_send_sig_info, or send_sigqueue\n
shared
\n Indicates whether the sent signal is shared by the thread group.\n-
retstr
\n- The return value to either __group_send_sig_info, specific_send_sig_info, or send_sigqueue\n
name
\n The name of the function used to send out the signal\n+
send2queue
\n+ Indicates whether the sent signal was sent to an existing sigqueue\n
\n Possible __group_send_sig_info and\n specific_send_sig_info return values are as follows;\n
\n \n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-signal-send-sig-queue-return.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-signal-send-sig-queue-return.html", "unified_diff": "@@ -1,7 +1,7 @@\n
probe::signal.send_sig_queue.return — \n Queuing a signal to a process completed\n-
signal.send_sig_queue.return
probe::signal.send_sig_queue — \n Queuing a signal to a process\n-
signal.send_sig_queue
sig_name
\n- A string representation of the signal\n-
pid_name
\n- Name of the process to which the signal is queued\n+
signal.send_sig_queue
name
\n+ Name of the probe point\n
sigqueue_addr
\n The address of the signal queue\n-
sig
\n- The queued signal\n-
name
\n- Name of the probe point\n+
sig_name
\n+ A string representation of the signal\n
sig_pid
\n The PID of the process to which the signal is queued\n+
sig
\n+ The queued signal\n+
pid_name
\n+ Name of the process to which the signal is queued\n
probe::signal.send — \n Signal being sent to a process\n-
signal.send
pid_name
\n- The name of the signal recipient\n+
signal.send
task
\n+ A task handle to the signal recipient\n+
name
\n+ The name of the function used to send out the signal\n
send2queue
\n Indicates whether the signal is sent to an existing\n sigqueue (deprecated in SystemTap 2.1)\n-
shared
\n- Indicates whether the signal is shared by the thread group\n+
pid_name
\n+ The name of the signal recipient\n
sig_name
\n A string representation of the signal\n-
si_code
\n- Indicates the signal type\n+
sig
\n+ The number of the signal\n
sig_pid
\n The PID of the process receiving the signal\n-
task
\n- A task handle to the signal recipient\n-
name
\n- The name of the function used to send out the signal\n+
shared
\n+ Indicates whether the signal is shared by the thread group\n+
si_code
\n+ Indicates the signal type\n
sinfo
\n The address of siginfo struct\n-
sig
\n- The number of the signal\n
probe::signal.sys_tgkill — \n Sending kill signal to a thread group\n-
signal.sys_tgkill
tgid
\n+
signal.sys_tgkill
task
\n+ A task handle to the signal recipient\n+
tgid
\n The thread group ID of the thread receiving the kill signal\n+
name
\n+ Name of the probe point\n
pid_name
\n The name of the signal recipient\n
sig_name
\n A string representation of the signal\n
sig
\n The specific kill signal sent to the process\n-
name
\n- Name of the probe point\n-
task
\n- A task handle to the signal recipient\n
sig_pid
\n The PID of the thread receiving the kill signal\n
probe::signal.sys_tkill — \n Sending a kill signal to a thread\n-
signal.sys_tkill
sig_name
\n- A string representation of the signal\n-
pid_name
\n- The name of the signal recipient\n-
name
\n+
signal.sys_tkill
name
\n Name of the probe point\n
task
\n A task handle to the signal recipient\n+
pid_name
\n+ The name of the signal recipient\n
sig
\n The specific signal sent to the process\n+
sig_name
\n+ A string representation of the signal\n
sig_pid
\n The PID of the process receiving the kill signal\n
\n The tkill call is analogous to kill(2),\n except that it also allows a process within a specific thread group to\n be targeted. Such processes are targeted through their unique\n thread IDs (TID).\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-signal-syskill.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-signal-syskill.html", "comments": ["Ordering differences only"], "unified_diff": "@@ -1,15 +1,15 @@\n
probe::signal.syskill — \n Sending kill signal to a process\n
signal.syskill
pid_name
\n The name of the signal recipient\n
sig_name
\n A string representation of the signal\n+
sig_pid
\n+ The PID of the process receiving the signal\n+
sig
\n+ The specific signal sent to the process\n
task
\n A task handle to the signal recipient\n
name
\n Name of the probe point\n-
sig
\n- The specific signal sent to the process\n-
sig_pid
\n- The PID of the process receiving the signal\n
probe::signal.wakeup — \n Sleeping process being wakened for signal\n-
signal.wakeup
sig_pid
\n- The PID of the process to wake\n-
resume
\n- Indicates whether to wake up a task in a\n- STOPPED or TRACED state\n-
state_mask
\n+
signal.wakeup
state_mask
\n A string representation indicating the mask\n of task states to wake. Possible values are\n TASK_INTERRUPTIBLE, TASK_STOPPED,\n TASK_TRACED, TASK_WAKEKILL, and TASK_INTERRUPTIBLE.\n+
resume
\n+ Indicates whether to wake up a task in a\n+ STOPPED or TRACED state\n+
sig_pid
\n+ The PID of the process to wake\n
pid_name
\n Name of the process to wake\n
probe::socket.aio_read.return — \n Conclusion of message received via sock_aio_read
\n
socket.aio_read.return
family
\n Protocol family value\n-
flags
\n- Socket flags value\n
type
\n Socket type value\n+
state
\n+ Socket state value\n
name
\n Name of this probe\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n+
flags
\n+ Socket flags value\n
protocol
\n Protocol value\n
size
\n Size of message received (in bytes) or error code if success = 0\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n-
state
\n- Socket state value\n
probe::socket.aio_read — \n Receiving message via sock_aio_read
\n-
socket.aio_read
state
\n+
socket.aio_read
family
\n+ Protocol family value\n+
type
\n+ Socket type value\n+
state
\n Socket state value\n-
size
\n- Message size in bytes\n
name
\n Name of this probe\n-
protocol
\n- Protocol value\n-
type
\n- Socket type value\n-
family
\n- Protocol family value\n
flags
\n Socket flags value\n+
protocol
\n+ Protocol value\n+
size
\n+ Message size in bytes\n
probe::socket.aio_write.return — \n Conclusion of message send via sock_aio_write
\n-
socket.aio_write.return
success
\n- Was receive successful? (1 = yes, 0 = no)\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n-
state
\n- Socket state value\n-
protocol
\n- Protocol value\n-
name
\n+
socket.aio_write.return
name
\n Name of this probe\n-
type
\n- Socket type value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
flags
\n Socket flags value\n+
protocol
\n+ Protocol value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
family
\n Protocol family value\n+
type
\n+ Socket type value\n+
state
\n+ Socket state value\n
probe::socket.aio_write — \n Message send via sock_aio_write
\n-
socket.aio_write
family
\n+
socket.aio_write
state
\n+ Socket state value\n+
type
\n+ Socket type value\n+
family
\n Protocol family value\n+
size
\n+ Message size in bytes\n+
protocol
\n+ Protocol value\n
flags
\n Socket flags value\n-
type
\n- Socket type value\n
name
\n Name of this probe\n-
protocol
\n- Protocol value\n-
state
\n- Socket state value\n-
size
\n- Message size in bytes\n
probe::socket.close — \n Close a socket\n-
socket.close
type
\n- Socket type value\n-
flags
\n+
socket.close
probe::socket.create.return — \n Return from Creation of a socket\n
socket.create.return
family
\n Protocol family value\n-
err
\n- Error code if success == 0\n
type
\n Socket type value\n
requester
\n Requested by user process or the kernel (1 = kernel, 0 = user)\n-
protocol
\n- Protocol value\n
name
\n Name of this probe\n+
err
\n+ Error code if success == 0\n
success
\n Was socket creation successful? (1 = yes, 0 = no)\n+
protocol
\n+ Protocol value\n
probe::socket.create — \n Creation of a socket\n-
socket.create
type
\n+
socket.create
family
\n+ Protocol family value\n+
type
\n Socket type value\n
requester
\n Requested by user process or the kernel (1 = kernel, 0 = user)\n-
family
\n- Protocol family value\n
name
\n Name of this probe\n
protocol
\n Protocol value\n
\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-read-iter-return.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-read-iter-return.html", "unified_diff": "@@ -1,24 +1,24 @@\n
probe::socket.read_iter.return — \n Conclusion of message received via sock_read_iter
\n-
socket.read_iter.return
flags
\n- Socket flags value\n-
family
\n+
socket.read_iter.return
family
\n Protocol family value\n
type
\n Socket type value\n-
protocol
\n- Protocol value\n+
state
\n+ Socket state value\n
name
\n Name of this probe\n
success
\n Was receive successful? (1 = yes, 0 = no)\n+
protocol
\n+ Protocol value\n+
flags
\n+ Socket flags value\n
size
\n Size of message received (in bytes) or error code if success = 0\n-
state
\n- Socket state value\n
probe::socket.read_iter — \n Receiving message via sock_read_iter
\n-
socket.read_iter
type
\n+
socket.read_iter
probe::socket.readv.return — \n Conclusion of receiving a message via sock_readv
\n
socket.readv.return
name
\n Name of this probe\n-
protocol
\n- Protocol value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n+
flags
\n+ Socket flags value\n+
protocol
\n+ Protocol value\n
size
\n Size of message received (in bytes) or error code if success = 0\n-
state
\n- Socket state value\n
family
\n Protocol family value\n-
flags
\n- Socket flags value\n
type
\n Socket type value\n+
state
\n+ Socket state value\n
probe::socket.readv — \n Receiving a message via sock_readv
\n-
socket.readv
state
\n- Socket state value\n+
socket.readv
probe::socket.receive — \n Message received on a socket.\n
socket.receive
type
\n Socket type value\n
family
\n Protocol family value\n-
flags
\n- Socket flags value\n
state
\n Socket state value\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n
name
\n Name of this probe\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n
protocol
\n Protocol value\n+
flags
\n+ Socket flags value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
probe::socket.recvmsg.return — \n Return from Message being received on socket\n-
socket.recvmsg.return
name
\n- Name of this probe\n-
protocol
\n- Protocol value\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n-
state
\n+
socket.recvmsg.return
state
\n Socket state value\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n
family
\n Protocol family value\n-
flags
\n- Socket flags value\n
type
\n Socket type value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
flags
\n+ Socket flags value\n+
protocol
\n+ Protocol value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n+
name
\n+ Name of this probe\n
probe::socket.recvmsg — \n Message being received on socket\n
socket.recvmsg
probe::socket.send — \n Message sent on a socket.\n-
socket.send
flags
\n- Socket flags value\n-
family
\n- Protocol family value\n-
type
\n- Socket type value\n+
socket.send
name
\n+ Name of this probe\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n
protocol
\n Protocol value\n-
name
\n- Name of this probe\n+
flags
\n+ Socket flags value\n
size
\n Size of message sent (in bytes) or error code if success = 0\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n+
type
\n+ Socket type value\n+
family
\n+ Protocol family value\n
state
\n Socket state value\n
probe::socket.sendmsg.return — \n Return from socket.sendmsg.\n-
socket.sendmsg.return
type
\n- Socket type value\n-
family
\n- Protocol family value\n+
socket.sendmsg.return
size
\n+ Size of message sent (in bytes) or error code if success = 0\n+
protocol
\n+ Protocol value\n
flags
\n Socket flags value\n
success
\n Was send successful? (1 = yes, 0 = no)\n-
state
\n- Socket state value\n-
size
\n- Size of message sent (in bytes) or error code if success = 0\n
name
\n Name of this probe\n-
protocol
\n- Protocol value\n+
state
\n+ Socket state value\n+
type
\n+ Socket type value\n+
family
\n+ Protocol family value\n
probe::socket.sendmsg — \n Message is currently being sent on a socket.\n-
socket.sendmsg
flags
\n- Socket flags value\n-
family
\n+
socket.sendmsg
family
\n Protocol family value\n
type
\n Socket type value\n-
protocol
\n- Protocol value\n-
name
\n- Name of this probe\n
state
\n Socket state value\n+
name
\n+ Name of this probe\n+
flags
\n+ Socket flags value\n+
protocol
\n+ Protocol value\n
size
\n Message size in bytes\n
\n Fires at the beginning of sending a message on a socket\n via the sock_sendmsg
function\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-write-iter-return.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-write-iter-return.html", "unified_diff": "@@ -1,24 +1,24 @@\n
probe::socket.write_iter.return — \n Conclusion of message send via sock_write_iter
\n-
socket.write_iter.return
protocol
\n- Protocol value\n-
name
\n- Name of this probe\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n+
socket.write_iter.return
family
\n+ Protocol family value\n+
type
\n+ Socket type value\n
state
\n Socket state value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n+
name
\n+ Name of this probe\n
size
\n Size of message received (in bytes) or error code if success = 0\n
flags
\n Socket flags value\n-
family
\n- Protocol family value\n-
type
\n- Socket type value\n+
protocol
\n+ Protocol value\n
probe::socket.write_iter — \n Message send via sock_write_iter
\n
socket.write_iter
probe::socket.writev.return — \n Conclusion of message sent via socket_writev
\n-
socket.writev.return
type
\n- Socket type value\n-
family
\n- Protocol family value\n+
socket.writev.return
protocol
\n+ Protocol value\n
flags
\n Socket flags value\n-
state
\n- Socket state value\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n
size
\n Size of message sent (in bytes) or error code if success = 0\n
name
\n Name of this probe\n-
protocol
\n- Protocol value\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n+
state
\n+ Socket state value\n+
type
\n+ Socket type value\n+
family
\n+ Protocol family value\n
probe::socket.writev — \n Message sent via socket_writev
\n
socket.writev
type
\n Socket type value\n-
flags
\n- Socket flags value\n
family
\n Protocol family value\n-
size
\n- Message size in bytes\n
state
\n Socket state value\n-
protocol
\n- Protocol value\n
name
\n Name of this probe\n+
size
\n+ Message size in bytes\n+
protocol
\n+ Protocol value\n+
flags
\n+ Socket flags value\n
probe::softirq.entry — \n Execution of handler for a pending softirq starting\n-
softirq.entry
probe::softirq.exit — \n Execution of handler for a pending softirq completed\n-
softirq.exit
probe::stap.cache_add_mod — \n Adding kernel instrumentation module to cache\n-
stap.cache_add_mod
source_path
\n- the path the .ko file is coming from (incl filename)\n-
dest_path
\n+
stap.cache_add_mod
probe::stap.cache_add_nss — \n Add NSS (Network Security Services) information to cache\n-
stap.cache_add_nss
dest_path
\n+
stap.cache_add_nss
probe::stap.cache_get — \n Found item in stap cache\n-
stap.cache_get
module_path
\n- the path of the .ko kernel module file\n-
source_path
\n+
stap.cache_get
probe::stap.system.spawn — \n stap spawned new process\n-
stap.system.spawn
probe::stapio.receive_control_message — \n Received a control message\n-
stapio.receive_control_message
len
\n- the length (in bytes) of the data blob\n+
stapio.receive_control_message
probe::staprun.send_control_message — \n Sending a control message\n-
staprun.send_control_message
type
\n+
staprun.send_control_message
probe::sunrpc.clnt.bind_new_program — \n Bind a new RPC program to an existing client\n-
sunrpc.clnt.bind_new_program
old_progname
\n+
sunrpc.clnt.bind_new_program
servername
\n+ the server machine name\n+
old_progname
\n the name of old RPC program\n-
vers
\n- the version of new RPC program\n-
prog
\n- the number of new RPC program\n+
old_prog
\n+ the number of old RPC program\n
old_vers
\n the version of old RPC program\n+
prog
\n+ the number of new RPC program\n+
vers
\n+ the version of new RPC program\n
progname
\n the name of new RPC program\n-
old_prog
\n- the number of old RPC program\n-
servername
\n- the server machine name\n
probe::sunrpc.clnt.call_async — \n Make an asynchronous RPC call\n-
sunrpc.clnt.call_async
prog
\n+
sunrpc.clnt.call_async
procname
\n+ the procedure name in this RPC call\n+
servername
\n+ the server machine name\n+
prog
\n the RPC program number\n
xid
\n current transmission id\n
port
\n the port number\n-
vers
\n- the RPC program version number\n
proc
\n the procedure number in this RPC call\n+
vers
\n+ the RPC program version number\n+
flags
\n+ flags\n
dead
\n whether this client is abandoned\n-
servername
\n- the server machine name\n-
procname
\n- the procedure name in this RPC call\n
prot
\n the IP protocol number\n
progname
\n the RPC program name\n-
flags
\n- flags\n
probe::sunrpc.clnt.call_sync — \n Make a synchronous RPC call\n-
sunrpc.clnt.call_sync
prot
\n- the IP protocol number\n+
sunrpc.clnt.call_sync
prog
\n+ the RPC program number\n
procname
\n the procedure name in this RPC call\n
servername
\n the server machine name\n-
flags
\n- flags\n+
prot
\n+ the IP protocol number\n
progname
\n the RPC program name\n-
vers
\n- the RPC program version number\n-
prog
\n- the RPC program number\n-
xid
\n- current transmission id\n
port
\n the port number\n+
xid
\n+ current transmission id\n
proc
\n the procedure number in this RPC call\n+
vers
\n+ the RPC program version number\n+
flags
\n+ flags\n
dead
\n whether this client is abandoned\n
probe::sunrpc.clnt.clone_client — \n Clone an RPC client structure\n-
sunrpc.clnt.clone_client
prot
\n- the IP protocol number\n-
authflavor
\n+
sunrpc.clnt.clone_client
authflavor
\n the authentication flavor\n-
vers
\n- the RPC program version number\n
prog
\n the RPC program number\n+
prot
\n+ the IP protocol number\n
progname
\n the RPC program name\n-
servername
\n- the server machine name\n+
vers
\n+ the RPC program version number\n
port
\n the port number\n+
servername
\n+ the server machine name\n
probe::sunrpc.clnt.create_client — \n Create an RPC client\n-
sunrpc.clnt.create_client
prot
\n- the IP protocol number\n-
authflavor
\n- the authentication flavor\n+
sunrpc.clnt.create_client
servername
\n+ the server machine name\n
vers
\n the RPC program version number\n-
prog
\n- the RPC program number\n-
progname
\n- the RPC program name\n-
servername
\n- the server machine name\n
port
\n the port number\n+
progname
\n+ the RPC program name\n+
authflavor
\n+ the authentication flavor\n+
prot
\n+ the IP protocol number\n+
prog
\n+ the RPC program number\n
probe::sunrpc.clnt.restart_call — \n Restart an asynchronous RPC call\n-
sunrpc.clnt.restart_call
tk_pid
\n+
sunrpc.clnt.restart_call
prog
\n+ the RPC program number\n+
tk_runstate
\n+ the task run status\n+
tk_pid
\n the debugging aid of task\n-
tk_priority
\n- the task priority\n
servername
\n the server machine name\n
tk_flags
\n the task flags\n-
prog
\n- the RPC program number\n-
tk_runstate
\n- the task run status\n+
tk_priority
\n+ the task priority\n
xid
\n the transmission id\n
probe::sunrpc.clnt.shutdown_client — \n Shutdown an RPC client\n-
sunrpc.clnt.shutdown_client
progname
\n- the RPC program name\n-
om_ops
\n- the count of operations\n-
om_bytes_sent
\n- the count of bytes out\n-
om_rtt
\n- the RPC RTT jiffies\n-
servername
\n- the server machine name\n-
om_execute
\n- the RPC execution jiffies\n-
prot
\n- the IP protocol number\n+
sunrpc.clnt.shutdown_client
tasks
\n+ the number of references\n
om_queue
\n the jiffies queued for xmit\n
om_ntrans
\n the count of RPC transmissions\n-
authflavor
\n- the authentication flavor\n-
tasks
\n- the number of references\n+
rpccnt
\n+ the count of RPC calls\n+
om_bytes_sent
\n+ the count of bytes out\n+
om_ops
\n+ the count of operations\n
prog
\n the RPC program number\n+
servername
\n+ the server machine name\n+
clones
\n+ the number of clones\n
om_bytes_recv
\n the count of bytes in\n+
progname
\n+ the RPC program name\n+
om_execute
\n+ the RPC execution jiffies\n+
authflavor
\n+ the authentication flavor\n+
prot
\n+ the IP protocol number\n+
om_rtt
\n+ the RPC RTT jiffies\n+
vers
\n+ the RPC program version number\n
port
\n the port number\n-
clones
\n- the number of clones\n-
rpccnt
\n- the count of RPC calls\n
netreconn
\n the count of reconnections\n-
vers
\n- the RPC program version number\n
probe::sunrpc.sched.delay — \n Delay an RPC task\n-
sunrpc.sched.delay
tk_pid
\n- the debugging id of the task\n-
delay
\n- the time delayed\n+
sunrpc.sched.delay
tk_flags
\n+ the flags of the task\n
prot
\n the IP protocol in the RPC call\n
vers
\n the program version in the RPC call\n-
tk_flags
\n- the flags of the task\n-
prog
\n- the program number in the RPC call\n
xid
\n the transmission id in the RPC call\n+
delay
\n+ the time delayed\n+
prog
\n+ the program number in the RPC call\n+
tk_pid
\n+ the debugging id of the task\n
probe::sunrpc.sched.execute — \n Execute the RPC `scheduler'\n-
sunrpc.sched.execute
tk_pid
\n- the debugging id of the task\n-
prot
\n+
sunrpc.sched.execute
prot
\n the IP protocol in the RPC call\n-
vers
\n- the program version in the RPC call\n-
prog
\n- the program number in the RPC call\n
tk_flags
\n the flags of the task\n
xid
\n the transmission id in the RPC call\n+
vers
\n+ the program version in the RPC call\n+
prog
\n+ the program number in the RPC call\n+
tk_pid
\n+ the debugging id of the task\n
probe::sunrpc.sched.new_task — \n Create new task for the specified client\n-
sunrpc.sched.new_task
probe::sunrpc.sched.release_task — \n Release all resources associated with a task\n
sunrpc.sched.release_task
prot
\n the IP protocol in the RPC call\n-
xid
\n- the transmission id in the RPC call\n
tk_flags
\n the flags of the task\n-
prog
\n- the program number in the RPC call\n+
xid
\n+ the transmission id in the RPC call\n
vers
\n the program version in the RPC call\n+
prog
\n+ the program number in the RPC call\n
probe::sunrpc.svc.create — \n Create an RPC service\n-
sunrpc.svc.create
probe::sunrpc.svc.destroy — \n Destroy an RPC service\n
sunrpc.svc.destroy
sv_prog
\n the number of the program\n-
rpcbadauth
\n- the count of requests drooped for authentication failure\n
sv_progname
\n the name of the program\n-
nettcpconn
\n- the count of accepted TCP connections\n
rpcbadfmt
\n the count of requests dropped for bad formats\n-
rpccnt
\n- the count of valid RPC requests\n-
netcnt
\n- the count of received RPC requests\n+
nettcpconn
\n+ the count of accepted TCP connections\n
sv_nrthreads
\n the number of concurrent threads\n+
rpcbadauth
\n+ the count of requests drooped for authentication failure\n+
netcnt
\n+ the count of received RPC requests\n
sv_name
\n the service name\n+
rpccnt
\n+ the count of valid RPC requests\n
probe::sunrpc.svc.drop — \n Drop RPC request\n-
sunrpc.svc.drop
rq_vers
\n+
sunrpc.svc.drop
rq_proc
\n+ the procedure number in the request\n+
rq_vers
\n the program version in the request\n-
sv_name
\n- the service name\n-
rq_xid
\n- the transmission id in the request\n-
peer_ip
\n- the peer address where the request is from\n
rq_prog
\n the program number in the request\n-
rq_proc
\n- the procedure number in the request\n+
rq_xid
\n+ the transmission id in the request\n
rq_prot
\n the IP protocol of the reqeust\n+
sv_name
\n+ the service name\n+
peer_ip
\n+ the peer address where the request is from\n
probe::sunrpc.svc.process — \n Process an RPC request\n-
sunrpc.svc.process
rq_prog
\n- the program number in the request\n-
peer_ip
\n- the peer address where the request is from\n-
rq_prot
\n- the IP protocol of the reqeust\n-
sv_prog
\n+
sunrpc.svc.process
sv_prog
\n the number of the program\n+
rq_xid
\n+ the transmission id in the request\n+
sv_nrthreads
\n+ the number of concurrent threads\n+
rq_vers
\n+ the program version in the request\n
rq_proc
\n the procedure number in the request\n+
rq_prog
\n+ the program number in the request\n+
rq_prot
\n+ the IP protocol of the reqeust\n
sv_name
\n the service name\n-
rq_vers
\n- the program version in the request\n-
sv_nrthreads
\n- the number of concurrent threads\n-
rq_xid
\n- the transmission id in the request\n+
peer_ip
\n+ the peer address where the request is from\n
probe::sunrpc.svc.recv — \n Listen for the next RPC request on any socket\n-
sunrpc.svc.recv
probe::sunrpc.svc.register — \n Register an RPC service with the local portmapper\n-
sunrpc.svc.register
port
\n+
sunrpc.svc.register
probe::sunrpc.svc.send — \n Return reply to RPC client\n-
sunrpc.svc.send
peer_ip
\n- the peer address where the request is from\n-
rq_prog
\n- the program number in the request\n-
rq_proc
\n- the procedure number in the request\n-
rq_prot
\n+
sunrpc.svc.send
rq_prot
\n the IP protocol of the reqeust\n-
rq_vers
\n- the program version in the request\n+
peer_ip
\n+ the peer address where the request is from\n
sv_name
\n the service name\n
rq_xid
\n the transmission id in the request\n+
rq_vers
\n+ the program version in the request\n+
rq_proc
\n+ the procedure number in the request\n+
rq_prog
\n+ the program number in the request\n
probe::syscall_any.return — \n Record exit from a syscall\n-
syscall_any.return
syscall_nr
\n+
syscall_any.return
retval
\n+ return value of the syscall\n+
syscall_nr
\n number of the syscall\n
name
\n name of the syscall\n-
retval
\n- return value of the syscall\n
\n The syscall_any.return probe point is designed to be a low overhead\n that monitors all the syscalls returns via a kernel tracepoint.\n Because of the breadth of syscalls it monitors it provides\n no information about the syscall arguments, argstr string\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-syscall-any.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-syscall-any.html", "unified_diff": "@@ -1,13 +1,13 @@\n
probe::syscall_any — \n Record entry into a syscall\n-
syscall_any
name
\n- name of the syscall\n-
syscall_nr
\n+
syscall_any
\n The syscall_any probe point is designed to be a low overhead\n that monitors all the syscalls entered via a kernel tracepoint.\n Because of the breadth of syscalls it monitors it provides\n no information about the syscall arguments or argstr string\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect.html", "unified_diff": "@@ -1,21 +1,21 @@\n
probe::tcp.disconnect — \n TCP socket disconnection\n-
tcp.disconnect
flags
\n- TCP flags (e.g. FIN, etc) \n+
tcp.disconnect
daddr
\n+ A string representing the destination IP address\n
dport
\n TCP destination port\n+
family
\n+ IP address family\n
name
\n Name of this probe\n-
daddr
\n- A string representing the destination IP address\n
saddr
\n A string representing the source IP address\n-
family
\n- IP address family\n-
sport
\n- TCP source port \n
sock
\n Network socket \n+
sport
\n+ TCP source port \n+
flags
\n+ TCP flags (e.g. FIN, etc) \n
probe::tcp.receive — \n Called when a TCP packet is received\n-
tcp.receive
sport
\n- TCP source port\n-
saddr
\n- A string representing the source IP address\n-
family
\n- IP address family\n+
tcp.receive
syn
\n+ TCP SYN flag\n
iphdr
\n IP header address\n-
psh
\n- TCP PSH flag\n-
daddr
\n- A string representing the destination IP address\n-
fin
\n- TCP FIN flag\n-
dport
\n- TCP destination port\n+
urg
\n+ TCP URG flag\n
protocol
\n Packet protocol from driver\n+
family
\n+ IP address family\n+
daddr
\n+ A string representing the destination IP address\n
ack
\n TCP ACK flag\n+
dport
\n+ TCP destination port\n+
saddr
\n+ A string representing the source IP address\n+
sport
\n+ TCP source port\n+
psh
\n+ TCP PSH flag\n
name
\n Name of the probe point\n-
syn
\n- TCP SYN flag\n-
urg
\n- TCP URG flag\n
rst
\n TCP RST flag\n+
fin
\n+ TCP FIN flag\n
probe::tcp.recvmsg.return — \n Receiving TCP message complete\n
tcp.recvmsg.return
dport
\n TCP destination port\n-
name
\n- Name of this probe\n-
size
\n- Number of bytes received or error code if an error occurred.\n
daddr
\n A string representing the destination IP address\n-
saddr
\n- A string representing the source IP address\n+
size
\n+ Number of bytes received or error code if an error occurred.\n
family
\n IP address family\n+
name
\n+ Name of this probe\n
sport
\n TCP source port \n+
saddr
\n+ A string representing the source IP address\n
probe::tcp.recvmsg — \n Receiving TCP message\n-
tcp.recvmsg
daddr
\n- A string representing the destination IP address\n-
size
\n- Number of bytes to be received \n-
name
\n- Name of this probe\n-
dport
\n- TCP destination port\n+
tcp.recvmsg
saddr
\n+ A string representing the source IP address\n
sock
\n Network socket\n
sport
\n TCP source port \n+
name
\n+ Name of this probe\n
family
\n IP address family\n-
saddr
\n- A string representing the source IP address\n+
size
\n+ Number of bytes to be received \n+
daddr
\n+ A string representing the destination IP address\n+
dport
\n+ TCP destination port\n
probe::tcp.sendmsg — \n Sending a tcp message\n-
tcp.sendmsg
family
\n- IP address family\n-
sock
\n+
tcp.sendmsg
probe::tcp.setsockopt — \n Call to setsockopt
\n-
tcp.setsockopt
family
\n- IP address family\n-
sock
\n- Network socket\n-
optlen
\n+
tcp.setsockopt
optlen
\n Used to access values for setsockopt
\n-
level
\n- The level at which the socket options will be manipulated\n
optstr
\n Resolves optname to a human-readable format\n-
optname
\n- TCP socket options (e.g. TCP_NODELAY, TCP_MAXSEG, etc)\n+
sock
\n+ Network socket\n+
family
\n+ IP address family\n
name
\n Name of this probe\n+
optname
\n+ TCP socket options (e.g. TCP_NODELAY, TCP_MAXSEG, etc)\n+
level
\n+ The level at which the socket options will be manipulated\n
probe::tcpmib.EstabResets — \n Count the reset of a socket\n-
tcpmib.EstabResets
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.EstabResets
probe::tcpmib.PassiveOpens — \n Count the passive creation of a socket\n-
tcpmib.PassiveOpens
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.PassiveOpens
probe::tcpmib.RetransSegs — \n Count the retransmission of a TCP segment\n-
tcpmib.RetransSegs
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.RetransSegs
probe::tty.ioctl — \n called when a ioctl is request to the tty\n-
tty.ioctl
probe::tty.open — \n Called when a tty is opened\n-
tty.open
probe::tty.poll — \n Called when a tty device is being polled\n-
tty.poll
probe::tty.read — \n called when a tty line will be read\n-
tty.read
probe::tty.receive — \n called when a tty receives a message\n-
tty.receive
driver_name
\n- the driver name\n+
tty.receive
id
\n+ the tty id\n
cp
\n the buffer that was received\n-
index
\n- The tty Index\n-
name
\n- the name of the module file\n
count
\n The amount of characters received\n+
name
\n+ the name of the module file\n+
index
\n+ The tty Index\n+
driver_name
\n+ the driver name\n
fp
\n The flag buffer\n-
id
\n- the tty id\n
probe::tty.release — \n Called when the tty is closed\n-
tty.release
probe::tty.resize — \n Called when a terminal resize happens\n-
tty.resize
old_row
\n- the old row value\n-
new_xpixel
\n+
tty.resize
new_xpixel
\n the new xpixel value\n-
old_col
\n- the old col value\n-
new_ypixel
\n- the new ypixel value\n-
old_xpixel
\n- the old xpixel\n
old_ypixel
\n the old ypixel\n
new_col
\n the new col value\n-
new_row
\n- the new row value\n
name
\n the tty name\n+
new_row
\n+ the new row value\n+
old_col
\n+ the old col value\n+
new_ypixel
\n+ the new ypixel value\n+
old_row
\n+ the old row value\n+
old_xpixel
\n+ the old xpixel\n
probe::tty.unregister — \n Called when a tty device is being unregistered\n-
tty.unregister
probe::tty.write — \n write to the tty line\n-
tty.write
driver_name
\n- the driver name\n-
buffer
\n- the buffer that will be written\n-
file_name
\n+
tty.write
probe::udp.disconnect.return — \n UDP has been disconnected successfully\n-
udp.disconnect.return
saddr
\n- A string representing the source IP address\n-
daddr
\n+
udp.disconnect.return
daddr
\n A string representing the destination IP address\n+
saddr
\n+ A string representing the source IP address\n+
family
\n+ IP address family\n
sport
\n UDP source port\n
dport
\n UDP destination port\n-
family
\n- IP address family\n
ret
\n Error code (0: no error) \n
name
\n The name of this probe\n
probe::udp.disconnect — \n Fires when a process requests for a UDP disconnection\n-
udp.disconnect
flags
\n- Flags (e.g. FIN, etc) \n+
udp.disconnect
daddr
\n+ A string representing the destination IP address\n
saddr
\n A string representing the source IP address\n-
daddr
\n- A string representing the destination IP address\n-
sport
\n- UDP source port\n
family
\n IP address family\n
dport
\n UDP destination port\n-
name
\n- The name of this probe\n+
sport
\n+ UDP source port\n
sock
\n Network socket used by the process\n+
name
\n+ The name of this probe\n+
flags
\n+ Flags (e.g. FIN, etc) \n
probe::udp.recvmsg.return — \n Fires whenever an attempt to receive a UDP message received is completed\n-
udp.recvmsg.return
name
\n+
udp.recvmsg.return
size
\n+ Number of bytes received by the process\n+
name
\n The name of this probe\n
sport
\n UDP source port\n
dport
\n UDP destination port\n
family
\n IP address family\n-
saddr
\n- A string representing the source IP address\n
daddr
\n A string representing the destination IP address\n-
size
\n- Number of bytes received by the process\n+
saddr
\n+ A string representing the source IP address\n
probe::udp.recvmsg — \n Fires whenever a UDP message is received\n-
udp.recvmsg
name
\n- The name of this probe\n+
udp.recvmsg
sport
\n+ UDP source port\n+
dport
\n+ UDP destination port\n
sock
\n Network socket used by the process\n+
name
\n+ The name of this probe\n
saddr
\n A string representing the source IP address\n
daddr
\n A string representing the destination IP address\n-
size
\n- Number of bytes received by the process\n-
sport
\n- UDP source port\n-
dport
\n- UDP destination port\n
family
\n IP address family\n+
size
\n+ Number of bytes received by the process\n
probe::udp.sendmsg — \n Fires whenever a process sends a UDP message\n-
udp.sendmsg
sport
\n- UDP source port\n+
udp.sendmsg
size
\n+ Number of bytes sent by the process\n+
daddr
\n+ A string representing the destination IP address\n+
saddr
\n+ A string representing the source IP address\n
family
\n IP address family\n+
sport
\n+ UDP source port\n
dport
\n UDP destination port\n-
saddr
\n- A string representing the source IP address\n-
size
\n- Number of bytes sent by the process\n-
daddr
\n- A string representing the destination IP address\n
sock
\n Network socket used by the process \n
name
\n The name of this probe\n
probe::vm.brk — \n Fires when a brk is requested (i.e. the heap will be resized)\n-
vm.brk
name
\n+
vm.brk
probe::vm.kfree — \n Fires when kfree is requested\n-
vm.kfree
ptr
\n- pointer to the kmemory allocated which is returned by kmalloc\n-
call_site
\n+
vm.kfree
probe::vm.kmalloc_node — \n Fires when kmalloc_node is requested\n-
vm.kmalloc_node
gfp_flags
\n- type of kmemory to allocate\n+
vm.kmalloc_node
call_site
\n+ address of the function caling this kmemory function\n+
ptr
\n+ pointer to the kmemory allocated\n
gfp_flag_name
\n type of kmemory to allocate(in string format)\n-
caller_function
\n- name of the caller function\n
bytes_req
\n requested Bytes\n+
caller_function
\n+ name of the caller function\n
name
\n name of the probe point\n
bytes_alloc
\n allocated Bytes\n-
ptr
\n- pointer to the kmemory allocated\n-
call_site
\n- address of the function caling this kmemory function\n+
gfp_flags
\n+ type of kmemory to allocate\n
probe::vm.kmalloc — \n Fires when kmalloc is requested\n-
vm.kmalloc
gfp_flags
\n- type of kmemory to allocate\n-
gfp_flag_name
\n+
vm.kmalloc
gfp_flag_name
\n type of kmemory to allocate (in String format)\n-
bytes_req
\n- requested Bytes\n-
caller_function
\n- name of the caller function\n-
name
\n- name of the probe point\n-
bytes_alloc
\n- allocated Bytes\n
call_site
\n address of the kmemory function\n
ptr
\n pointer to the kmemory allocated\n+
gfp_flags
\n+ type of kmemory to allocate\n+
bytes_alloc
\n+ allocated Bytes\n+
name
\n+ name of the probe point\n+
caller_function
\n+ name of the caller function\n+
bytes_req
\n+ requested Bytes\n
probe::vm.kmem_cache_alloc_node — \n Fires when kmem_cache_alloc_node is requested\n-
vm.kmem_cache_alloc_node
gfp_flags
\n- type of kmemory to allocate\n-
gfp_flag_name
\n- type of kmemory to allocate(in string format)\n-
call_site
\n+
vm.kmem_cache_alloc_node
call_site
\n address of the function calling this kmemory function\n
ptr
\n pointer to the kmemory allocated\n+
gfp_flag_name
\n+ type of kmemory to allocate(in string format)\n
bytes_alloc
\n allocated Bytes\n+
gfp_flags
\n+ type of kmemory to allocate\n
bytes_req
\n requested Bytes\n
caller_function
\n name of the caller function\n
name
\n name of the probe point\n
probe::vm.kmem_cache_alloc — \n Fires when kmem_cache_alloc is requested\n-
vm.kmem_cache_alloc
ptr
\n- pointer to the kmemory allocated\n-
call_site
\n- address of the function calling this kmemory function.\n-
bytes_alloc
\n- allocated Bytes\n-
bytes_req
\n+
vm.kmem_cache_alloc
bytes_req
\n requested Bytes\n
caller_function
\n name of the caller function.\n
name
\n name of the probe point\n+
bytes_alloc
\n+ allocated Bytes\n
gfp_flags
\n type of kmemory to allocate\n+
call_site
\n+ address of the function calling this kmemory function.\n+
ptr
\n+ pointer to the kmemory allocated\n
gfp_flag_name
\n type of kmemory to allocate(in string format)\n
probe::vm.kmem_cache_free — \n Fires when kmem_cache_free is requested\n-
vm.kmem_cache_free
ptr
\n- Pointer to the kmemory allocated which is returned by kmem_cache\n-
call_site
\n- Address of the function calling this kmemory function\n-
caller_function
\n+
vm.kmem_cache_free
probe::vm.mmap — \n Fires when an mmap is requested\n-
vm.mmap
name
\n- name of the probe point\n-
address
\n+
vm.mmap
probe::vm.munmap — \n Fires when an munmap is requested\n-
vm.munmap
address
\n- the requested address\n-
name
\n+
vm.munmap
probe::vm.oom_kill — \n Fires when a thread is selected for termination by the OOM killer\n-
vm.oom_kill
probe::vm.pagefault — \n Records that a page fault occurred\n-
vm.pagefault
name
\n- name of the probe point\n-
address
\n+
vm.pagefault
probe::vm.write_shared_copy — \n Page copy for shared page write\n-
vm.write_shared_copy
zero
\n- boolean indicating whether it is a zero page\n- (can do a clear instead of a copy)\n+
vm.write_shared_copy
probe::workqueue.create — \n Creating a new workqueue\n-
workqueue.create
probe::workqueue.execute — \n Executing deferred work\n-
workqueue.execute