{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/r-b-build.WxJf2IZH/b1/systemtap_5.3-1_arm64.changes", "source2": "/srv/reproducible-results/rbuild-debian/r-b-build.WxJf2IZH/b2/systemtap_5.3-1_arm64.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -1,11 +1,11 @@\n \n d0ea270e08178886eefa25a646e8adc9 8776 devel optional systemtap-client_5.3-1_arm64.deb\n 14360854ff3c38d9a7cce37bebfcd437 642248 devel optional systemtap-common_5.3-1_arm64.deb\n 066fccdea88f8cdfc878fbd310b17db1 22004504 debug optional systemtap-dbgsym_5.3-1_arm64.deb\n- a6eca500f92ddf068c0b59143d3d48b0 2590112 doc optional systemtap-doc_5.3-1_arm64.deb\n+ 6602ddf3133e0dea5c55a6c17a5ad99e 2590536 doc optional systemtap-doc_5.3-1_arm64.deb\n a765161bb7af4a24b290abb5e00ddced 1223332 debug optional systemtap-runtime-dbgsym_5.3-1_arm64.deb\n e8315b4f9bc99db437a791e30311ba7d 132920 devel optional systemtap-runtime_5.3-1_arm64.deb\n 0c0c048fbe7280f6a54a118f2a4a9a6f 19264 devel optional systemtap-sdt-dev_5.3-1_arm64.deb\n cfbf1f62078dbd55df2f7d8fe691887c 1998096 debug optional systemtap-server-dbgsym_5.3-1_arm64.deb\n 758762fe258c3963239b9010692f8a48 141520 devel optional systemtap-server_5.3-1_arm64.deb\n 68e5a0e770ee7c9c75384c2ca957fc23 1352776 devel optional systemtap_5.3-1_arm64.deb\n"}, {"source1": "systemtap-doc_5.3-1_arm64.deb", "source2": "systemtap-doc_5.3-1_arm64.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2025-09-09 10:48:01.000000 debian-binary\n--rw-r--r-- 0 0 0 54352 2025-09-09 10:48:01.000000 control.tar.xz\n--rw-r--r-- 0 0 0 2535568 2025-09-09 10:48:01.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 54412 2025-09-09 10:48:01.000000 control.tar.xz\n+-rw-r--r-- 0 0 0 2535932 2025-09-09 10:48:01.000000 data.tar.xz\n"}, {"source1": "control.tar.xz", "source2": "control.tar.xz", "unified_diff": null, "details": [{"source1": "control.tar", "source2": "control.tar", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "comments": ["Files differ"], "unified_diff": null}]}]}]}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "unified_diff": "@@ -1,41 +1,41 @@\n
probe::ioblock.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock.end
rw
\n- binary trace for read/write request\n+
ioblock.end
idx
\n+ offset into the bio vector array\n+
name
\n+ name of the probe point\n+
error
\n+ 0 on success\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
name
\n- name of the probe point\n+
sector
\n+ beginning sector for the entire bio\n+
size
\n+ total size in bytes\n
phys_segments
\n number of segments in this bio after physical address coalescing is performed.\n-
hw_segments
\n- number of segments after physical and DMA remapping hardware coalescing is performed\n-
opf
\n- operations and flags\n+
rw
\n+ binary trace for read/write request\n
devname
\n block device name\n-
idx
\n- offset into the bio vector array\n-
sector
\n- beginning sector for the entire bio\n+
bytes_done
\n+ number of bytes transferred\n
ino
\n i-node number of the mapped file\n+
opf
\n+ operations and flags\n
vcnt
\n bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
size
\n- total size in bytes\n-
error
\n- 0 on success\n-
bytes_done
\n- number of bytes transferred\n+
hw_segments
\n+ number of segments after physical and DMA remapping hardware coalescing is performed\n
probe::ioblock.request — \n Fires whenever making a generic block I/O request.\n-
ioblock.request
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
name
\n- name of the probe point\n+
ioblock.request
bdev
\n+ target block device\n
phys_segments
\n number of segments in this bio after physical address coalescing is performed\n+
devname
\n+ block device name\n
rw
\n binary trace for read/write request\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
ino
\n+ i-node number of the mapped file\n+
opf
\n+ operations and flags\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
hw_segments
\n+ number of segments after physical and DMA remapping hardware coalescing is performed\n+
idx
\n+ offset into the bio vector array\n+
name
\n+ name of the probe point\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid \n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
sector
\n- beginning sector for the entire bio\n-
ino
\n- i-node number of the mapped file\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n-
hw_segments
\n- number of segments after physical and DMA remapping hardware coalescing is performed\n-
opf
\n- operations and flags\n-
devname
\n- block device name\n
p_start_sect
\n points to the start sector of the partition structure of the device\n-
idx
\n- offset into the bio vector array\n-
bdev
\n- target block device\n+
sector
\n+ beginning sector for the entire bio\n
size
\n total size in bytes\n
probe::ioblock_trace.bounce — \n Fires whenever a buffer bounce is needed for at least one page of a block IO request.\n-
ioblock_trace.bounce
bdev_contains
\n+
ioblock_trace.bounce
bytes_done
\n+ number of bytes transferred\n+
rw
\n+ binary trace for read/write request\n+
devname
\n+ device for which a buffer bounce was needed.\n+
bdev
\n+ target block device\n+
q
\n+ request queue on which this bio was queued.\n+
opf
\n+ operations and flags\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
bdev_contains
\n points to the device object which contains the partition (when bio structure represents a partition)\n+
ino
\n+ i-node number of the mapped file\n
name
\n name of the probe point\n-
rw
\n- binary trace for read/write request\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
sector
\n+ beginning sector for the entire bio\n+
size
\n+ total size in bytes\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
sector
\n- beginning sector for the entire bio\n-
ino
\n- i-node number of the mapped file\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
devname
\n- device for which a buffer bounce was needed.\n-
opf
\n- operations and flags\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
q
\n- request queue on which this bio was queued.\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
bdev
\n- target block device\n-
size
\n- total size in bytes\n-
bytes_done
\n- number of bytes transferred\n
probe::ioblock_trace.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock_trace.end
size
\n- total size in bytes\n-
bdev
\n- target block device\n-
bytes_done
\n- number of bytes transferred\n+
ioblock_trace.end
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
name
\n+ name of the probe point\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
rw
\n- binary trace for read/write request\n-
name
\n- name of the probe point\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
q
\n- request queue on which this bio was queued.\n+
size
\n+ total size in bytes\n+
sector
\n+ beginning sector for the entire bio\n
p_start_sect
\n points to the start sector of the partition structure of the device\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
bdev
\n+ target block device\n+
q
\n+ request queue on which this bio was queued.\n+
bytes_done
\n+ number of bytes transferred\n
devname
\n block device name\n-
opf
\n- operations and flags\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
rw
\n+ binary trace for read/write request\n
ino
\n i-node number of the mapped file\n-
sector
\n- beginning sector for the entire bio\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
opf
\n+ operations and flags\n
probe::ioblock_trace.request — \n Fires just as a generic block I/O request is created for a bio.\n-
ioblock_trace.request
ino
\n- i-node number of the mapped file\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
ioblock_trace.request
name
\n+ name of the probe point\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
size
\n+ total size in bytes\n
sector
\n beginning sector for the entire bio\n-
opf
\n- operations and flags\n-
devname
\n- block device name\n
p_start_sect
\n points to the start sector of the partition structure of the device\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
q
\n- request queue on which this bio was queued.\n-
name
\n- name of the probe point\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
rw
\n- binary trace for read/write request\n
bytes_done
\n number of bytes transferred\n+
rw
\n+ binary trace for read/write request\n+
devname
\n+ block device name\n
bdev
\n target block device\n-
size
\n- total size in bytes\n+
q
\n+ request queue on which this bio was queued.\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
opf
\n+ operations and flags\n+
ino
\n+ i-node number of the mapped file\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n
probe::ioscheduler.elv_add_request.kp — \n kprobe based probe to indicate that a request was added to the request queue\n
ioscheduler.elv_add_request.kp
rq
\n Address of the request\n-
q
\n- pointer to request queue\n-
elevator_name
\n- The type of I/O elevator currently enabled\n-
disk_major
\n- Disk major number of the request\n
disk_minor
\n Disk minor number of the request\n-
name
\n- Name of the probe point\n
rq_flags
\n Request flags\n+
disk_major
\n+ Disk major number of the request\n+
elevator_name
\n+ The type of I/O elevator currently enabled\n+
name
\n+ Name of the probe point\n+
q
\n+ pointer to request queue\n
probe::ioscheduler.elv_add_request.tp — \n tracepoint based probe to indicate a request is added to the request queue.\n-
ioscheduler.elv_add_request.tp
disk_major
\n+
ioscheduler.elv_add_request.tp
name
\n+ Name of the probe point\n+
q
\n+ Pointer to request queue.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n+
disk_major
\n Disk major no of request.\n
disk_minor
\n Disk minor number of request.\n-
name
\n- Name of the probe point\n
rq_flags
\n Request flags.\n
rq
\n Address of request.\n-
q
\n- Pointer to request queue.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n
probe::ioscheduler.elv_add_request — \n probe to indicate request is added to the request queue.\n-
ioscheduler.elv_add_request
q
\n- Pointer to request queue.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n+
ioscheduler.elv_add_request
disk_minor
\n+ Disk minor number of request.\n+
rq_flags
\n+ Request flags.\n
rq
\n Address of request.\n-
disk_minor
\n- Disk minor number of request.\n+
q
\n+ Pointer to request queue.\n
disk_major
\n Disk major no of request.\n-
rq_flags
\n- Request flags.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n
probe::ioscheduler.elv_completed_request — \n Fires when a request is completed\n-
ioscheduler.elv_completed_request
disk_minor
\n- Disk minor number of the request\n+
ioscheduler.elv_completed_request
name
\n+ Name of the probe point\n+
elevator_name
\n+ The type of I/O elevator currently enabled\n
disk_major
\n Disk major number of the request\n-
name
\n- Name of the probe point\n
rq_flags
\n Request flags\n-
elevator_name
\n- The type of I/O elevator currently enabled\n+
disk_minor
\n+ Disk minor number of the request\n
rq
\n Address of the request\n
probe::ioscheduler.elv_next_request.return — \n Fires when a request retrieval issues a return signal\n
ioscheduler.elv_next_request.return
probe::ioscheduler_trace.elv_abort_request — \n Fires when a request is aborted.\n-
ioscheduler_trace.elv_abort_request
rq_flags
\n- Request flags.\n-
name
\n+
ioscheduler_trace.elv_abort_request
name
\n Name of the probe point\n
disk_major
\n Disk major no of request.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n
disk_minor
\n Disk minor number of request.\n+
rq_flags
\n+ Request flags.\n
rq
\n Address of request.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n
probe::ioscheduler_trace.elv_completed_request — \n Fires when a request is\n-
ioscheduler_trace.elv_completed_request
elevator_name
\n- The type of I/O elevator currently enabled.\n-
rq
\n+
ioscheduler_trace.elv_completed_request
probe::ioscheduler_trace.elv_issue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_issue_request
disk_major
\n+
ioscheduler_trace.elv_issue_request
elevator_name
\n+ The type of I/O elevator currently enabled.\n+
disk_major
\n Disk major no of request.\n-
disk_minor
\n- Disk minor number of request.\n-
rq_flags
\n- Request flags.\n
name
\n Name of the probe point\n
rq
\n Address of request.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n+
disk_minor
\n+ Disk minor number of request.\n+
rq_flags
\n+ Request flags.\n
probe::ioscheduler_trace.elv_requeue_request — \n Fires when a request is\n
ioscheduler_trace.elv_requeue_request
rq
\n Address of request.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n-
disk_major
\n- Disk major no of request.\n+
rq_flags
\n+ Request flags.\n
disk_minor
\n Disk minor number of request.\n+
disk_major
\n+ Disk major no of request.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n
name
\n Name of the probe point\n-
rq_flags
\n- Request flags.\n
probe::ioscheduler_trace.plug — \n Fires when a request queue is plugged;\n-
ioscheduler_trace.plug
probe::ipmib.ForwDatagrams — \n Count forwarded packet\n-
ipmib.ForwDatagrams
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.ForwDatagrams
probe::ipmib.FragFails — \n Count datagram fragmented unsuccessfully\n-
ipmib.FragFails
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.FragFails
probe::ipmib.InDiscards — \n Count discarded inbound packets\n-
ipmib.InDiscards
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.InDiscards
probe::ipmib.InReceives — \n Count an arriving packet\n-
ipmib.InReceives
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.InReceives
probe::ipmib.InUnknownProtos — \n Count arriving packets with an unbound proto\n-
ipmib.InUnknownProtos
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.InUnknownProtos
probe::ipmib.OutRequests — \n Count a request to send a packet\n-
ipmib.OutRequests
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.OutRequests
probe::ipmib.ReasmTimeout — \n Count Reassembly Timeouts\n-
ipmib.ReasmTimeout
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.ReasmTimeout
probe::irq_handler.entry — \n Execution of interrupt handler starting\n-
irq_handler.entry
dir
\n+
irq_handler.entry
handler
\n+ interrupt handler function\n+
dev_id
\n+ Cookie to identify device\n+
action
\n+ struct irqaction* for this interrupt num\n+
next_irqaction
\n+ pointer to next irqaction for shared interrupts\n+
dir
\n pointer to the proc/irq/NN/name entry\n
flags
\n Flags for IRQ handler\n+
irq
\n+ irq number\n+
thread_flags
\n+ Flags related to thread\n
thread_fn
\n interrupt handler function for threaded interrupts\n
thread
\n thread pointer for threaded interrupts\n-
thread_flags
\n- Flags related to thread\n-
handler
\n- interrupt handler function\n-
irq
\n- irq number\n-
action
\n- struct irqaction* for this interrupt num\n-
dev_id
\n- Cookie to identify device\n-
next_irqaction
\n- pointer to next irqaction for shared interrupts\n-
flags_str
\n- symbolic string representation of IRQ flags\n
dev_name
\n name of device\n+
flags_str
\n+ symbolic string representation of IRQ flags\n
probe::irq_handler.exit — \n Execution of interrupt handler completed\n-
irq_handler.exit
flags
\n- flags for IRQ handler\n-
thread
\n- thread pointer for threaded interrupts\n-
action
\n+
irq_handler.exit
action
\n struct irqaction*\n+
dir
\n+ pointer to the proc/irq/NN/name entry\n+
next_irqaction
\n+ pointer to next irqaction for shared interrupts\n+
ret
\n+ return value of the handler\n
handler
\n interrupt handler function that was executed\n+
dev_id
\n+ Cookie to identify device\n+
thread
\n+ thread pointer for threaded interrupts\n+
thread_fn
\n+ interrupt handler function for threaded interrupts\n
flags_str
\n symbolic string representation of IRQ flags\n-
ret
\n- return value of the handler\n
dev_name
\n name of device\n-
dir
\n- pointer to the proc/irq/NN/name entry\n-
thread_fn
\n- interrupt handler function for threaded interrupts\n+
flags
\n+ flags for IRQ handler\n
thread_flags
\n Flags related to thread\n
irq
\n interrupt number\n-
next_irqaction
\n- pointer to next irqaction for shared interrupts\n-
dev_id
\n- Cookie to identify device\n
probe::kprocess.exec_complete — \n Return from exec to a new program\n-
kprocess.exec_complete
errno
\n+
kprocess.exec_complete
name
\n+ Name of the system call (“execve”) (SystemTap v2.5+)\n+
success
\n+ A boolean indicating whether the exec was successful\n+
errno
\n The error number resulting from the exec\n
retstr
\n A string representation of errno (SystemTap v2.5+)\n-
success
\n- A boolean indicating whether the exec was successful\n-
name
\n- Name of the system call (“execve”) (SystemTap v2.5+)\n
probe::kprocess.exec — \n Attempt to exec to a new program\n-
kprocess.exec
name
\n- Name of the system call (“execve”) (SystemTap v2.5+)\n-
args
\n+
kprocess.exec
args
\n The arguments to pass to the new executable, including\n the 0th arg (SystemTap v2.5+)\n-
filename
\n- The path to the new executable\n
argstr
\n A string containing the filename followed by the\n arguments to pass, excluding 0th arg (SystemTap v2.5+)\n+
name
\n+ Name of the system call (“execve”) (SystemTap v2.5+)\n+
filename
\n+ The path to the new executable\n
probe::kprocess.release — \n Process released\n-
kprocess.release
pid
\n- Same as released_pid
for compatibility (deprecated)\n-
released_tid
\n+
kprocess.release
released_tid
\n TID of the task being released\n-
task
\n- A task handle to the process being released\n
released_pid
\n PID of the process being released\n+
pid
\n+ Same as released_pid
for compatibility (deprecated)\n+
task
\n+ A task handle to the process being released\n
\n The context of the parent, if it wanted notification of this process'\n termination, else the context of the process itself.\n
\n Fires when a process is released from the kernel. This always follows a\n kprocess.exit, though it may be delayed somewhat if the process waits in a\n zombie state.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-linuxmib-ListenOverflows.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-linuxmib-ListenOverflows.html", "unified_diff": "@@ -1,12 +1,12 @@\n
probe::linuxmib.ListenOverflows — \n Count of times a listen queue overflowed\n-
linuxmib.ListenOverflows
op
\n- Value to be added to the counter (default value of 1)\n-
sk
\n+
linuxmib.ListenOverflows
probe::netdev.change_mac — \n Called when the netdev_name has the MAC changed\n-
netdev.change_mac
probe::netdev.change_mtu — \n Called when the netdev MTU is changed\n-
netdev.change_mtu
probe::netdev.hard_transmit — \n Called when the devices is going to TX (hard)\n
netdev.hard_transmit
protocol
\n The protocol used in the transmission\n-
dev_name
\n- The device scheduled to transmit\n-
truesize
\n- The size of the data to be transmitted.\n
length
\n The length of the transmit buffer.\n+
truesize
\n+ The size of the data to be transmitted.\n+
dev_name
\n+ The device scheduled to transmit\n
probe::netdev.ioctl — \n Called when the device suffers an IOCTL\n-
netdev.ioctl
probe::netdev.receive — \n Data received from network device.\n-
netdev.receive
probe::netdev.set_promiscuity — \n Called when the device enters/leaves promiscuity\n
netdev.set_promiscuity
dev_name
\n The device that is entering/leaving promiscuity mode\n-
enable
\n- If the device is entering promiscuity mode\n-
inc
\n- Count the number of promiscuity openers\n
disable
\n If the device is leaving promiscuity mode\n+
inc
\n+ Count the number of promiscuity openers\n+
enable
\n+ If the device is entering promiscuity mode\n
probe::netdev.transmit — \n Network device transmitting buffer\n-
netdev.transmit
truesize
\n- The size of the data to be transmitted.\n-
dev_name
\n- The name of the device. e.g: eth0, ath1.\n-
length
\n+
netdev.transmit
probe::netfilter.arp.forward — \n - Called for each ARP packet to be forwarded\n
netfilter.arp.forward
data_str
\n A string representing the packet buffer contents\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
ar_hrd
\n- Format of hardware address\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
ar_op
\n ARP opcode (command)\n-
pf
\n- Protocol family -- always “arp”\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
ar_pln
\n- Length of protocol address\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
ar_data
\n- Address of ARP packet data region (after the header)\n-
arphdr
\n- Address of ARP header\n
length
\n The length of the packet buffer contents, in bytes\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
ar_hln
\n- Length of hardware address\n+
arphdr
\n+ Address of ARP header\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
ar_pro
\n Format of protocol address\n+
ar_pln
\n+ Length of protocol address\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
ar_hln
\n+ Length of hardware address\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
ar_data
\n+ Address of ARP packet data region (after the header)\n+
ar_hrd
\n+ Format of hardware address\n
indev
\n Address of net_device representing input device, 0 if unknown\n+
pf
\n+ Protocol family -- always “arp”\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
probe::netfilter.arp.in — \n - Called for each incoming ARP packet\n-
netfilter.arp.in
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
ar_hln
\n- Length of hardware address\n-
ar_pro
\n- Format of protocol address\n-
indev
\n+
netfilter.arp.in
indev
\n Address of net_device representing input device, 0 if unknown\n-
arphdr
\n- Address of ARP header\n-
length
\n- The length of the packet buffer contents, in bytes\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
ar_data
\n- Address of ARP packet data region (after the header)\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
pf
\n+ Protocol family -- always “arp”\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n+
ar_hrd
\n+ Format of hardware address\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n
ar_pln
\n Length of protocol address\n+
ar_hln
\n+ Length of hardware address\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
ar_pro
\n+ Format of protocol address\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
pf
\n- Protocol family -- always “arp”\n+
length
\n+ The length of the packet buffer contents, in bytes\n
ar_op
\n ARP opcode (command)\n-
ar_hrd
\n- Format of hardware address\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
arphdr
\n+ Address of ARP header\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
data_str
\n- A string representing the packet buffer contents\n
nf_queue
\n Constant used to signify a 'queue' verdict\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n+
data_str
\n+ A string representing the packet buffer contents\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
probe::netfilter.arp.out — \n - Called for each outgoing ARP packet\n-
netfilter.arp.out
arphdr
\n- Address of ARP header\n-
length
\n- The length of the packet buffer contents, in bytes\n-
ar_hln
\n- Length of hardware address\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
ar_pro
\n- Format of protocol address\n+
netfilter.arp.out
ar_data
\n+ Address of ARP packet data region (after the header)\n+
ar_hrd
\n+ Format of hardware address\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
ar_data
\n- Address of ARP packet data region (after the header)\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
ar_op
\n- ARP opcode (command)\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
pf
\n Protocol family -- always “arp”\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
ar_pln
\n- Length of protocol address\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
ar_hrd
\n- Format of hardware address\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
ar_pro
\n+ Format of protocol address\n+
ar_hln
\n+ Length of hardware address\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
ar_sha
\n Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n-
indev_name
\n- Name of network device packet was received on (if known)\n+
ar_pln
\n+ Length of protocol address\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n
nf_queue
\n Constant used to signify a 'queue' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
arphdr
\n+ Address of ARP header\n+
ar_op
\n+ ARP opcode (command)\n+
length
\n+ The length of the packet buffer contents, in bytes\n
data_str
\n A string representing the packet buffer contents\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n
probe::netfilter.bridge.forward — \n Called on an incoming bridging packet destined for some other computer\n-
netfilter.bridge.forward
br_poid
\n- Port identifier\n-
brhdr
\n- Address of bridge header\n-
br_max
\n- Max age in 1/256 secs\n-
br_flags
\n- BPDU flags\n-
br_type
\n- BPDU type\n-
br_vid
\n- Protocol version identifier\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
netfilter.bridge.forward
br_msg
\n+ Message age in 1/256 secs\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
br_htime
\n- Hello time in 1/256 secs\n-
length
\n- The length of the packet buffer contents, in bytes\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
llcpdu
\n Address of LLC Protocol Data Unit\n-
br_rmac
\n- Root bridge MAC address\n+
br_max
\n+ Max age in 1/256 secs\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
pf
\n+ Protocol family -- always “bridge”\n
br_mac
\n Bridge MAC address\n-
br_prid
\n- Protocol identifier\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
br_rid
\n- Identity of root bridge\n-
br_msg
\n- Message age in 1/256 secs\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_vid
\n+ Protocol version identifier\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
br_fd
\n- Forward delay in 1/256 secs\n-
data_str
\n- A string representing the packet buffer contents\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
br_poid
\n+ Port identifier\n
br_bid
\n Identity of bridge\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
pf
\n- Protocol family -- always “bridge”\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
protocol
\n Packet protocol\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
br_type
\n+ BPDU type\n+
br_flags
\n+ BPDU flags\n+
br_prid
\n+ Protocol identifier\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
br_htime
\n+ Hello time in 1/256 secs\n+
brhdr
\n+ Address of bridge header\n+
br_rmac
\n+ Root bridge MAC address\n+
br_rid
\n+ Identity of root bridge\n
outdev
\n Address of net_device representing output device, 0 if unknown\n+
br_fd
\n+ Forward delay in 1/256 secs\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
probe::netfilter.bridge.local_in — \n Called on a bridging packet destined for the local computer\n-
netfilter.bridge.local_in
br_fd
\n- Forward delay in 1/256 secs\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_bid
\n+
netfilter.bridge.local_in
br_bid
\n Identity of bridge\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
data_str
\n A string representing the packet buffer contents\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n
protocol
\n Packet protocol\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
pf
\n- Protocol family -- always “bridge”\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
br_prid
\n+ Protocol identifier\n+
br_cost
\n+ Total cost from transmitting bridge to root\n
br_type
\n BPDU type\n-
br_vid
\n- Protocol version identifier\n-
br_poid
\n- Port identifier\n-
br_max
\n- Max age in 1/256 secs\n
br_flags
\n BPDU flags\n+
length
\n+ The length of the packet buffer contents, in bytes\n
brhdr
\n Address of bridge header\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_prid
\n- Protocol identifier\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n
br_rmac
\n Root bridge MAC address\n-
br_mac
\n- Bridge MAC address\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
br_htime
\n+ Hello time in 1/256 secs\n
br_rid
\n Identity of root bridge\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
br_fd
\n+ Forward delay in 1/256 secs\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
br_msg
\n Message age in 1/256 secs\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
br_max
\n+ Max age in 1/256 secs\n+
br_mac
\n+ Bridge MAC address\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
br_htime
\n- Hello time in 1/256 secs\n-
length
\n- The length of the packet buffer contents, in bytes\n+
pf
\n+ Protocol family -- always “bridge”\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_vid
\n+ Protocol version identifier\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_poid
\n+ Port identifier\n
probe::netfilter.bridge.local_out — \n Called on a bridging packet coming from a local process\n-
netfilter.bridge.local_out
br_vid
\n- Protocol version identifier\n-
br_type
\n- BPDU type\n+
netfilter.bridge.local_out
br_msg
\n+ Message age in 1/256 secs\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
br_max
\n Max age in 1/256 secs\n-
br_flags
\n- BPDU flags\n-
brhdr
\n- Address of bridge header\n-
br_poid
\n- Port identifier\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
br_msg
\n- Message age in 1/256 secs\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_vid
\n+ Protocol version identifier\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
pf
\n+ Protocol family -- always “bridge”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
br_mac
\n+ Bridge MAC address\n+
br_poid
\n+ Port identifier\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
br_rid
\n- Identity of root bridge\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
br_bid
\n+ Identity of bridge\n+
br_type
\n+ BPDU type\n+
br_flags
\n+ BPDU flags\n+
br_cost
\n+ Total cost from transmitting bridge to root\n
br_prid
\n Protocol identifier\n-
br_mac
\n- Bridge MAC address\n-
br_rmac
\n- Root bridge MAC address\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
protocol
\n+ Packet protocol\n+
data_str
\n+ A string representing the packet buffer contents\n
br_htime
\n Hello time in 1/256 secs\n+
br_rmac
\n+ Root bridge MAC address\n+
brhdr
\n+ Address of bridge header\n
length
\n The length of the packet buffer contents, in bytes\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_bid
\n- Identity of bridge\n-
data_str
\n- A string representing the packet buffer contents\n
br_fd
\n Forward delay in 1/256 secs\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
br_cost
\n- Total cost from transmitting bridge to root\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
br_rid
\n+ Identity of root bridge\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
protocol
\n- Packet protocol\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
pf
\n- Protocol family -- always “bridge”\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n
probe::netfilter.bridge.post_routing — \n - Called before a bridging packet hits the wire\n-
netfilter.bridge.post_routing
data_hex
\n+
netfilter.bridge.post_routing
br_max
\n+ Max age in 1/256 secs\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
pf
\n- Protocol family -- always “bridge”\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
protocol
\n- Packet protocol\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_poid
\n+ Port identifier\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
outdev_name
\n Name of network device packet will be routed to (if known)\n-
br_cost
\n- Total cost from transmitting bridge to root\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_vid
\n+ Protocol version identifier\n+
br_mac
\n+ Bridge MAC address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
indev_name
\n Name of network device packet was received on (if known)\n+
pf
\n+ Protocol family -- always “bridge”\n+
br_prid
\n+ Protocol identifier\n+
br_flags
\n+ BPDU flags\n+
br_type
\n+ BPDU type\n+
br_cost
\n+ Total cost from transmitting bridge to root\n
data_str
\n A string representing the packet buffer contents\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
protocol
\n+ Packet protocol\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
br_bid
\n Identity of bridge\n
nf_queue
\n Constant used to signify a 'queue' verdict\n
br_fd
\n Forward delay in 1/256 secs\n-
br_htime
\n- Hello time in 1/256 secs\n-
length
\n- The length of the packet buffer contents, in bytes\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_msg
\n- Message age in 1/256 secs\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
br_rid
\n Identity of root bridge\n
br_rmac
\n Root bridge MAC address\n-
br_mac
\n- Bridge MAC address\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
br_prid
\n- Protocol identifier\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_max
\n- Max age in 1/256 secs\n
brhdr
\n Address of bridge header\n-
br_flags
\n- BPDU flags\n-
br_poid
\n- Port identifier\n-
br_vid
\n- Protocol version identifier\n-
br_type
\n- BPDU type\n+
br_htime
\n+ Hello time in 1/256 secs\n+
length
\n+ The length of the packet buffer contents, in bytes\n
probe::netfilter.bridge.pre_routing — \n - Called before a bridging packet is routed\n-
netfilter.bridge.pre_routing
br_max
\n+
netfilter.bridge.pre_routing
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
br_max
\n Max age in 1/256 secs\n-
brhdr
\n- Address of bridge header\n-
br_flags
\n- BPDU flags\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
br_msg
\n+ Message age in 1/256 secs\n
br_poid
\n Port identifier\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n
br_vid
\n Protocol version identifier\n-
br_type
\n- BPDU type\n-
length
\n- The length of the packet buffer contents, in bytes\n-
br_htime
\n- Hello time in 1/256 secs\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
br_rid
\n- Identity of root bridge\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
br_msg
\n- Message age in 1/256 secs\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
br_mac
\n Bridge MAC address\n-
br_rmac
\n- Root bridge MAC address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
pf
\n+ Protocol family -- always “bridge”\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
br_prid
\n Protocol identifier\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n
br_cost
\n Total cost from transmitting bridge to root\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
br_fd
\n- Forward delay in 1/256 secs\n+
br_flags
\n+ BPDU flags\n+
br_type
\n+ BPDU type\n
data_str
\n A string representing the packet buffer contents\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_bid
\n- Identity of bridge\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
pf
\n- Protocol family -- always “bridge”\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n
protocol
\n Packet protocol\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
br_bid
\n+ Identity of bridge\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
br_fd
\n+ Forward delay in 1/256 secs\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
br_rid
\n+ Identity of root bridge\n+
brhdr
\n+ Address of bridge header\n+
br_rmac
\n+ Root bridge MAC address\n+
br_htime
\n+ Hello time in 1/256 secs\n+
length
\n+ The length of the packet buffer contents, in bytes\n
probe::netfilter.ip.forward — \n Called on an incoming IP packet addressed to some other computer\n-
netfilter.ip.forward
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
daddr
\n- A string representing the destination IP address\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n+
netfilter.ip.forward
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
sport
\n- TCP or UDP source port (ipv4 only)\n
rst
\n TCP RST flag (if protocol is TCP; ipv4 only)\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
length
\n- The length of the packet buffer contents, in bytes\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
data_str
\n A string representing the packet buffer contents\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n
nf_queue
\n Constant used to signify a 'queue' verdict\n
iphdr
\n Address of IP header\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
family
\n- IP address family\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
family
\n+ IP address family\n
pf
\n Protocol family -- either “ipv4” or “ipv6”\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
saddr
\n A string representing the source IP address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
daddr
\n+ A string representing the destination IP address\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n
probe::netfilter.ip.local_in — \n Called on an incoming IP packet addressed to the local computer\n-
netfilter.ip.local_in
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
sport
\n- TCP or UDP source port (ipv4 only)\n+
netfilter.ip.local_in
daddr
\n+ A string representing the destination IP address\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
daddr
\n- A string representing the destination IP address\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
saddr
\n+ A string representing the source IP address\n
indev_name
\n Name of network device packet was received on (if known)\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
data_str
\n- A string representing the packet buffer contents\n-
iphdr
\n- Address of IP header\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n
pf
\n Protocol family -- either “ipv4” or “ipv6”\n+
family
\n+ IP address family\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
saddr
\n- A string representing the source IP address\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
length
\n+ The length of the packet buffer contents, in bytes\n
fin
\n TCP FIN flag (if protocol is TCP; ipv4 only)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
family
\n- IP address family\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n
outdev
\n Address of net_device representing output device, 0 if unknown\n+
iphdr
\n+ Address of IP header\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
data_str
\n+ A string representing the packet buffer contents\n
protocol
\n Packet protocol from driver (ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
probe::netfilter.ip.local_out — \n Called on an outgoing IP packet\n-
netfilter.ip.local_out
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
data_str
\n- A string representing the packet buffer contents\n+
netfilter.ip.local_out
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
iphdr
\n Address of IP header\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n
fin
\n TCP FIN flag (if protocol is TCP; ipv4 only)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
family
\n- IP address family\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
saddr
\n- A string representing the source IP address\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n
urg
\n TCP URG flag (if protocol is TCP; ipv4 only)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n+
data_str
\n+ A string representing the packet buffer contents\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
daddr
\n- A string representing the destination IP address\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n
rst
\n TCP RST flag (if protocol is TCP; ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
sport
\n TCP or UDP source port (ipv4 only)\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
daddr
\n+ A string representing the destination IP address\n
indev
\n Address of net_device representing input device, 0 if unknown\n+
saddr
\n+ A string representing the source IP address\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
family
\n+ IP address family\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
probe::netfilter.ip.post_routing — \n Called immediately before an outgoing IP packet leaves the computer\n-
netfilter.ip.post_routing
length
\n- The length of the packet buffer contents, in bytes\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
netfilter.ip.post_routing
family
\n+ IP address family\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
daddr
\n A string representing the destination IP address\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
saddr
\n A string representing the source IP address\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
family
\n- IP address family\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
ipproto_udp
\n Constant used to signify that the packet protocol is UDP\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
length
\n+ The length of the packet buffer contents, in bytes\n
fin
\n TCP FIN flag (if protocol is TCP; ipv4 only)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
data_str
\n- A string representing the packet buffer contents\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n
nf_queue
\n Constant used to signify a 'queue' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
iphdr
\n Address of IP header\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
data_str
\n+ A string representing the packet buffer contents\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
probe::netfilter.ip.pre_routing — \n Called before an IP packet is routed\n-
netfilter.ip.pre_routing
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
iphdr
\n- Address of IP header\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
data_str
\n- A string representing the packet buffer contents\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
netfilter.ip.pre_routing
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n
fin
\n TCP FIN flag (if protocol is TCP; ipv4 only)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
family
\n- IP address family\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
iphdr
\n+ Address of IP header\n
outdev
\n Address of net_device representing output device, 0 if unknown\n
nf_accept
\n Constant used to signify an 'accept' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
data_str
\n+ A string representing the packet buffer contents\n+
family
\n+ IP address family\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
saddr
\n A string representing the source IP address\n
pf
\n Protocol family - either 'ipv4' or 'ipv6'\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
daddr
\n A string representing the destination IP address\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
sport
\n TCP or UDP source port (ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
probe::nfs.aop.readahead — \n NFS client reading multiple pages\n-
nfs.aop.readahead
nr_pages
\n+
nfs.aop.readahead
size
\n number of pages attempted to read in this execution\n+
ino
\n+ inode number\n
rpages
\n read size (in pages)\n-
rsize
\n- read size (in bytes)\n
file
\n filp argument\n
dev
\n device identifier\n-
ino
\n- inode number\n-
size
\n+
rsize
\n+ read size (in bytes)\n+
nr_pages
\n number of pages attempted to read in this execution\n
probe::nfs.aop.readpage — \n NFS client synchronously reading a page\n-
nfs.aop.readpage
file
\n- file argument\n-
__page
\n- the address of page\n-
dev
\n- device identifier\n-
size
\n- number of pages to be read in this execution \n+
nfs.aop.readpage
rsize
\n+ read size (in bytes)\n
i_flag
\n file flags\n-
ino
\n- inode number\n+
page_index
\n+ offset within mapping, can used a page identifier\n+ and position identifier in the page frame\n+
dev
\n+ device identifier\n
i_size
\n file length in bytes\n+
ino
\n+ inode number\n+
__page
\n+ the address of page\n+
file
\n+ file argument\n+
size
\n+ number of pages to be read in this execution \n
sb_flag
\n super block flags\n-
page_index
\n- offset within mapping, can used a page identifier\n- and position identifier in the page frame\n-
rsize
\n- read size (in bytes)\n
probe::nfs.aop.readpages — \n NFS client reading multiple pages\n-
nfs.aop.readpages
rpages
\n- read size (in pages)\n-
nr_pages
\n+
nfs.aop.readpages
size
\n number of pages attempted to read in this execution\n-
rsize
\n- read size (in bytes)\n-
dev
\n- device identifier\n-
file
\n- filp argument\n
ino
\n inode number \n-
size
\n+
rpages
\n+ read size (in pages)\n+
file
\n+ filp argument\n+
dev
\n+ device identifier\n+
rsize
\n+ read size (in bytes)\n+
nr_pages
\n number of pages attempted to read in this execution\n
probe::nfs.aop.release_page — \n NFS client releasing page\n-
nfs.aop.release_page
ino
\n- inode number\n-
page_index
\n+
nfs.aop.release_page
probe::nfs.aop.set_page_dirty — \n NFS client marking page as dirty\n-
nfs.aop.set_page_dirty
probe::nfs.aop.write_begin — \n NFS client begin to write data\n-
nfs.aop.write_begin
ino
\n- inode number \n-
offset
\n- start address of this write operation \n-
to
\n- end address of this write operation \n+
nfs.aop.write_begin
dev
\n+ device identifier\n+
__page
\n+ the address of page\n
page_index
\n offset within mapping, can used a page identifier\n and position identifier in the page frame\n
size
\n write bytes\n-
dev
\n- device identifier\n-
__page
\n- the address of page\n+
offset
\n+ start address of this write operation \n+
ino
\n+ inode number \n+
to
\n+ end address of this write operation \n
\n Occurs when write operation occurs on nfs. It prepare a page for writing,\n look for a request corresponding to the page. If there\n is one, and it belongs to another file, it flush it out\n before it tries to copy anything into the page. \n Also do the same if it finds a request from an existing\n dropped page\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "unified_diff": "@@ -1,29 +1,29 @@\n
probe::nfs.aop.write_end — \n NFS client complete writing data\n-
nfs.aop.write_end
__page
\n- the address of page\n-
dev
\n- device identifier\n-
i_size
\n- file length in bytes\n-
size
\n- write bytes\n-
offset
\n- start address of this write operation\n-
page_index
\n+
nfs.aop.write_end
page_index
\n offset within mapping, can used a page identifier and position identifier in the page frame\n
to
\n end address of this write operation\n-
sb_flag
\n- super block flags\n
ino
\n inode number\n+
offset
\n+ start address of this write operation\n+
size
\n+ write bytes\n
i_flag
\n file flags\n+
dev
\n+ device identifier\n+
__page
\n+ the address of page\n+
i_size
\n+ file length in bytes\n+
sb_flag
\n+ super block flags\n
probe::nfs.aop.writepage — \n NFS client writing a mapped page to the NFS server\n-
nfs.aop.writepage
wsize
\n+
nfs.aop.writepage
sb_flag
\n+ super block flags\n+
i_size
\n+ file length in bytes\n+
i_state
\n+ inode state flags\n+
__page
\n+ the address of page\n+
wsize
\n write size\n+
dev
\n+ device identifier\n+
for_reclaim
\n+ a flag of writeback_control,\n+ indicates if it's invoked from the page allocator\n
i_flag
\n file flags\n-
ino
\n- inode number \n
for_kupdate
\n a flag of writeback_control,\n indicates if it's a kupdate writeback\n-
for_reclaim
\n- a flag of writeback_control,\n- indicates if it's invoked from the page allocator\n-
__page
\n- the address of page\n-
dev
\n- device identifier\n
size
\n number of pages to be written in this execution\n-
i_size
\n- file length in bytes\n-
sb_flag
\n- super block flags\n+
ino
\n+ inode number \n
page_index
\n offset within mapping,\n can used a page identifier and position identifier in the page frame\n-
i_state
\n- inode state flags\n
probe::nfs.aop.writepages — \n NFS client writing several dirty pages to the NFS server\n-
nfs.aop.writepages
nr_to_write
\n- number of pages attempted to be written in this execution\n-
wsize
\n- write size\n-
ino
\n+
nfs.aop.writepages
ino
\n inode number\n+
wpages
\n+ write size (in pages)\n+
size
\n+ number of pages attempted to be written in this execution\n
for_kupdate
\n a flag of writeback_control,\n indicates if it's a kupdate writeback\n-
for_reclaim
\n- a flag of writeback_control,\n- indicates if it's invoked from the page allocator\n
dev
\n device identifier\n-
size
\n+
nr_to_write
\n number of pages attempted to be written in this execution\n-
wpages
\n- write size (in pages)\n+
wsize
\n+ write size\n+
for_reclaim
\n+ a flag of writeback_control,\n+ indicates if it's invoked from the page allocator\n
probe::nfs.fop.aio_read — \n NFS client aio_read file operation\n-
nfs.fop.aio_read
parent_name
\n- parent dir name\n-
buf
\n- the address of buf in user space\n-
pos
\n+
nfs.fop.aio_read
pos
\n current position of file \n-
dev
\n- device identifier\n+
cache_valid
\n+ cache related bit mask flag\n
cache_time
\n when we started read-caching this inode\n+
dev
\n+ device identifier\n+
buf
\n+ the address of buf in user space\n+
count
\n+ read bytes\n
ino
\n inode number \n+
parent_name
\n+ parent dir name\n+
file_name
\n+ file name\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n-
cache_valid
\n- cache related bit mask flag\n-
count
\n- read bytes\n-
file_name
\n- file name\n
probe::nfs.fop.aio_write — \n NFS client aio_write file operation\n-
nfs.fop.aio_write
probe::nfs.fop.flush — \n NFS client flush file operation\n-
nfs.fop.flush
probe::nfs.fop.fsync — \n NFS client fsync operation\n-
nfs.fop.fsync
nfs.fop.llseek
probe::nfs.fop.lock — \n NFS client file lock operation\n-
nfs.fop.lock
ino
\n- inode number\n-
dev
\n+
nfs.fop.lock
dev
\n device identifier\n-
fl_flag
\n- lock flags\n+
fl_end
\n+ ending offset of locked region\n
cmd
\n cmd arguments\n
fl_type
\n lock type\n-
fl_end
\n- ending offset of locked region\n+
ino
\n+ inode number\n
fl_start
\n starting offset of locked region\n
i_mode
\n file type and access rights\n+
fl_flag
\n+ lock flags\n
probe::nfs.fop.mmap — \n NFS client mmap operation\n-
nfs.fop.mmap
dev
\n- device identifier\n-
parent_name
\n- parent dir name\n-
buf
\n- the address of buf in user space\n-
vm_flag
\n+
nfs.fop.mmap
vm_flag
\n vm flags\n+
cache_valid
\n+ cache related bit mask flag\n
cache_time
\n when we started read-caching this inode\n-
ino
\n- inode number \n-
vm_end
\n- the first byte after end address within vm_mm\n
vm_start
\n start address within vm_mm \n+
dev
\n+ device identifier\n+
buf
\n+ the address of buf in user space\n+
vm_end
\n+ the first byte after end address within vm_mm\n+
ino
\n+ inode number \n+
parent_name
\n+ parent dir name\n+
file_name
\n+ file name\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode \n if jiffies - read_cache_jiffies > attrtimeo.\n-
cache_valid
\n- cache related bit mask flag\n-
file_name
\n- file name\n
probe::nfs.fop.open — \n NFS client file open operation\n-
nfs.fop.open
probe::nfs.fop.read_iter — \n NFS client read_iter file operation\n-
nfs.fop.read_iter
attrtimeo
\n- how long the cached information is assumed to be valid.\n- We need to revalidate the cached attrs for this inode\n- if jiffies - read_cache_jiffies > attrtimeo.\n+
nfs.fop.read_iter
dev
\n+ device identifier\n+
pos
\n+ current position of file \n+
cache_time
\n+ when we started read-caching this inode\n
cache_valid
\n cache related bit mask flag\n+
parent_name
\n+ parent dir name\n
file_name
\n file name\n+
attrtimeo
\n+ how long the cached information is assumed to be valid.\n+ We need to revalidate the cached attrs for this inode\n+ if jiffies - read_cache_jiffies > attrtimeo.\n
count
\n read bytes\n-
parent_name
\n- parent dir name\n-
dev
\n- device identifier\n-
pos
\n- current position of file \n
ino
\n inode number \n-
cache_time
\n- when we started read-caching this inode\n
probe::nfs.fop.release — \n NFS client release page operation\n-
nfs.fop.release
probe::nfs.fop.sendfile — \n NFS client send file operation\n-
nfs.fop.sendfile
cache_time
\n- when we started read-caching this inode\n-
ino
\n+
nfs.fop.sendfile
ino
\n inode number\n-
dev
\n- device identifier\n-
ppos
\n- current position of file\n
count
\n read bytes\n-
cache_valid
\n- cache related bit mask flag\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n+
cache_valid
\n+ cache related bit mask flag\n+
cache_time
\n+ when we started read-caching this inode\n+
ppos
\n+ current position of file\n+
dev
\n+ device identifier\n
probe::nfs.fop.write_iter — \n NFS client write_iter file operation\n-
nfs.fop.write_iter
probe::nfs.proc.commit_done — \n NFS client response to a commit RPC task\n-
nfs.proc.commit_done
server_ip
\n- IP address of server\n-
timestamp
\n+
nfs.proc.commit_done
timestamp
\n V4 timestamp, which is used for lease renewal\n-
count
\n- number of bytes committed\n-
prot
\n- transfer protocol\n-
version
\n- NFS version\n
status
\n result of last operation\n
valid
\n fattr->valid, indicates which fields are valid \n+
version
\n+ NFS version\n+
count
\n+ number of bytes committed\n+
server_ip
\n+ IP address of server\n+
prot
\n+ transfer protocol\n
probe::nfs.proc.commit_setup — \n NFS client setting up a commit RPC task\n-
nfs.proc.commit_setup
bitmask1
\n+
nfs.proc.commit_setup
offset
\n+ the file offset\n+
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n
prot
\n transfer protocol\n+
server_ip
\n+ IP address of server\n
version
\n NFS version\n-
count
\n+
size
\n bytes in this commit\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
size
\n+
count
\n bytes in this commit\n-
offset
\n- the file offset\n-
server_ip
\n- IP address of server\n
probe::nfs.proc.commit — \n NFS client committing data on server\n-
nfs.proc.commit
version
\n- NFS version\n+
nfs.proc.commit
server_ip
\n+ IP address of server\n
prot
\n transfer protocol\n-
bitmask1
\n+
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n
size
\n read bytes in this execution\n-
bitmask0
\n+
version
\n+ NFS version\n+
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
server_ip
\n- IP address of server\n
offset
\n the file offset\n
\n All the nfs.proc.commit kernel functions were removed in kernel\n commit 200baa in December 2006, so these probes do not exist on Linux\n 2.6.21 and newer kernels.\n
\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "unified_diff": "@@ -1,17 +1,17 @@\n
probe::nfs.proc.create — \n NFS client creating file on server\n-
nfs.proc.create
flag
\n+
nfs.proc.create
filelen
\n+ length of file name\n+
flag
\n indicates create mode (only for NFSv3 and NFSv4)\n-
server_ip
\n- IP address of server\n
fh
\n file handle of parent dir\n+
prot
\n+ transfer protocol\n
filename
\n file name\n+
server_ip
\n+ IP address of server\n
version
\n NFS version (the function is used for all NFS version)\n-
prot
\n- transfer protocol\n-
filelen
\n- length of file name\n
probe::nfs.proc.lookup — \n NFS client opens/searches a file on server\n-
nfs.proc.lookup
prot
\n+
nfs.proc.lookup
server_ip
\n+ IP address of server\n+
filename
\n+ the name of file which client opens/searches on server\n+
prot
\n transfer protocol\n-
bitmask1
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n
version
\n NFS version\n-
name_len
\n- the length of file name\n-
server_ip
\n- IP address of server\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
filename
\n- the name of file which client opens/searches on server\n+
bitmask1
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n+
name_len
\n+ the length of file name\n
probe::nfs.proc.open — \n NFS client allocates file read/write context information\n
nfs.proc.open
probe::nfs.proc.read_done — \n NFS client response to a read RPC task\n-
nfs.proc.read_done
prot
\n+
nfs.proc.read_done
probe::nfs.proc.read_setup — \n NFS client setting up a read RPC task\n-
nfs.proc.read_setup
size
\n- read bytes in this execution\n+
nfs.proc.read_setup
probe::nfs.proc.read — \n NFS client synchronously reads file from server\n-
nfs.proc.read
prot
\n- transfer protocol\n-
version
\n+
nfs.proc.read
probe::nfs.proc.release — \n NFS client releases file read/write context information\n-
nfs.proc.release
mode
\n- file mode\n-
filename
\n- file name\n+
nfs.proc.release
probe::nfs.proc.remove — \n NFS client removes a file on server\n-
nfs.proc.remove
probe::nfs.proc.rename_done — \n NFS client response to a rename RPC task\n-
nfs.proc.rename_done
timestamp
\n+
nfs.proc.rename_done
status
\n+ result of last operation\n+
timestamp
\n V4 timestamp, which is used for lease renewal\n-
server_ip
\n- IP address of server\n
new_fh
\n file handle of new parent dir\n
prot
\n transfer protocol\n+
server_ip
\n+ IP address of server\n
version
\n NFS version\n
old_fh
\n file handle of old parent dir\n-
status
\n- result of last operation\n
probe::nfs.proc.rename_setup — \n NFS client setting up a rename RPC task\n-
nfs.proc.rename_setup
fh
\n- file handle of parent dir\n-
server_ip
\n- IP address of server\n+
nfs.proc.rename_setup
probe::nfs.proc.rename — \n NFS client renames a file on server\n-
nfs.proc.rename
server_ip
\n- IP address of server\n-
new_name
\n- new file name\n-
old_filelen
\n+
nfs.proc.rename
old_filelen
\n length of old file name\n-
new_fh
\n- file handle of new parent dir\n-
version
\n- NFS version (the function is used for all NFS version)\n
prot
\n transfer protocol\n-
old_name
\n- old file name\n-
new_filelen
\n- length of new file name\n+
server_ip
\n+ IP address of server\n+
version
\n+ NFS version (the function is used for all NFS version)\n
old_fh
\n file handle of old parent dir\n+
new_name
\n+ new file name\n+
new_filelen
\n+ length of new file name\n+
old_name
\n+ old file name\n+
new_fh
\n+ file handle of new parent dir\n
probe::nfs.proc.write_done — \n NFS client response to a write RPC task\n-
nfs.proc.write_done
timestamp
\n- V4 timestamp, which is used for lease renewal\n+
nfs.proc.write_done
prot
\n+ transfer protocol\n
server_ip
\n IP address of server\n
count
\n number of bytes written\n-
prot
\n- transfer protocol\n
version
\n NFS version\n
valid
\n fattr->valid, indicates which fields are valid \n
status
\n result of last operation\n+
timestamp
\n+ V4 timestamp, which is used for lease renewal\n
probe::nfs.proc.write_setup — \n NFS client setting up a write RPC task\n-
nfs.proc.write_setup
version
\n- NFS version\n-
how
\n- used to set args.stable. The stable value could be:\n- NFS_UNSTABLE,NFS_DATA_SYNC,NFS_FILE_SYNC\n- (in nfs.proc3.write_setup and nfs.proc4.write_setup)\n+
nfs.proc.write_setup
offset
\n+ the file offset\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem \n
prot
\n transfer protocol\n-
offset
\n- the file offset\n
server_ip
\n IP address of server\n+
version
\n+ NFS version\n+
how
\n+ used to set args.stable. The stable value could be:\n+ NFS_UNSTABLE,NFS_DATA_SYNC,NFS_FILE_SYNC\n+ (in nfs.proc3.write_setup and nfs.proc4.write_setup)\n
size
\n bytes written in this execution\n-
count
\n- bytes written in this execution\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
count
\n+ bytes written in this execution\n
probe::nfs.proc.write — \n NFS client synchronously writes file to server\n-
nfs.proc.write
offset
\n- the file offset\n-
server_ip
\n+
nfs.proc.write
server_ip
\n IP address of server\n-
flags
\n- used to set task->tk_flags in rpc_init_task function\n+
prot
\n+ transfer protocol\n
size
\n read bytes in this execution\n+
version
\n+ NFS version\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
version
\n- NFS version\n-
prot
\n- transfer protocol\n+
flags
\n+ used to set task->tk_flags in rpc_init_task function\n+
offset
\n+ the file offset\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n
\n All the nfs.proc.write kernel functions were removed in kernel commit\n 200baa in December 2006, so these probes do not exist on Linux\n 2.6.21 and newer kernels.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfsd-commit.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfsd-commit.html", "unified_diff": "@@ -1,15 +1,15 @@\n
probe::nfsd.commit — \n NFS server committing all pending writes to stable storage\n-
nfsd.commit
size
\n+
nfsd.commit
count
\n read bytes\n
offset
\n the offset of file\n-
count
\n+
client_ip
\n+ the ip address of client\n+
size
\n read bytes\n-
flag
\n- indicates whether this execution is a sync operation\n
fh
\n file handle (the first part is the length of the file handle)\n-
client_ip
\n- the ip address of client\n+
flag
\n+ indicates whether this execution is a sync operation\n
probe::nfsd.create — \n NFS server creating a file(regular,dir,device,fifo) for client\n
nfsd.create
type
\n file type(regular,dir,device,fifo ...)\n+
iap_mode
\n+ file access mode\n
filename
\n file name \n
client_ip
\n the ip address of client\n-
filelen
\n- the length of file name\n-
fh
\n- file handle (the first part is the length of the file handle)\n
iap_valid
\n Attribute flags\n-
iap_mode
\n- file access mode\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
filelen
\n+ the length of file name\n
probe::nfsd.createv3 — \n NFS server creating a regular file or set file attributes for client\n
nfsd.createv3
fh
\n file handle (the first part is the length of the file handle)\n
iap_valid
\n Attribute flags\n+
filelen
\n+ the length of file name\n
truncp
\n trunp arguments, indicates if the file shouldbe truncate\n
client_ip
\n the ip address of client\n-
filelen
\n- the length of file name\n
filename
\n file name \n-
verifier
\n- file attributes (atime,mtime,mode). It's used to reset file attributes for CREATE_EXCLUSIVE\n
createmode
\n create mode .The possible values could be: NFS3_CREATE_EXCLUSIVE, NFS3_CREATE_UNCHECKED, or NFS3_CREATE_GUARDED\n
iap_mode
\n file access mode\n+
verifier
\n+ file attributes (atime,mtime,mode). It's used to reset file attributes for CREATE_EXCLUSIVE\n
probe::nfsd.dispatch — \n NFS server receives an operation from client\n-
nfsd.dispatch
probe::nfsd.open — \n NFS server opening a file for client\n-
nfsd.open
access
\n- indicates the type of open (read/write/commit/readdir...) \n-
type
\n+
nfsd.open
probe::nfsd.proc.commit — \n NFS server performing a commit operation for client\n-
nfsd.proc.commit
uid
\n- requester's user id\n-
size
\n- read bytes\n+
nfsd.proc.commit
gid
\n+ requester's group id\n+
version
\n+ nfs version\n
offset
\n the offset of file \n
count
\n read bytes\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
gid
\n- requester's group id\n-
version
\n- nfs version\n
client_ip
\n the ip address of client\n
proto
\n transfer protocol\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
size
\n+ read bytes\n+
uid
\n+ requester's user id\n
probe::nfsd.proc.create — \n NFS server creating a file for client\n-
nfsd.proc.create
uid
\n- requester's user id\n+
nfsd.proc.create
version
\n+ nfs version\n
gid
\n requester's group id\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
version
\n- nfs version\n+
uid
\n+ requester's user id\n
filelen
\n length of file name\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
client_ip
\n the ip address of client\n
filename
\n file name\n
proto
\n transfer protocol\n
probe::nfsd.proc.lookup — \n NFS server opening or searching for a file for client\n-
nfsd.proc.lookup
client_ip
\n+
nfsd.proc.lookup
gid
\n+ requester's group id\n+
proto
\n+ transfer protocol\n+
filename
\n+ file name \n+
client_ip
\n the ip address of client\n
filelen
\n the length of file name\n+
uid
\n+ requester's user id\n
version
\n nfs version\n
fh
\n file handle of parent dir (the first part is the length of the file handle)\n-
uid
\n- requester's user id\n-
gid
\n- requester's group id\n-
proto
\n- transfer protocol\n-
filename
\n- file name \n
probe::nfsd.proc.read — \n NFS server reading file for client\n-
nfsd.proc.read
vlen
\n- read blocks \n+
nfsd.proc.read
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n+
client_ip
\n+ the ip address of client\n
proto
\n transfer protocol\n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n
gid
\n requester's group id\n-
uid
\n- requester's user id\n
fh
\n file handle (the first part is the length of the file handle)\n-
size
\n- read bytes\n
version
\n nfs version\n-
client_ip
\n- the ip address of client\n+
size
\n+ read bytes\n
offset
\n the offset of file \n
count
\n read bytes\n+
uid
\n+ requester's user id\n+
vlen
\n+ read blocks \n
probe::nfsd.proc.remove — \n NFS server removing a file for client\n-
nfsd.proc.remove
client_ip
\n- the ip address of client\n-
filelen
\n- length of file name\n+
nfsd.proc.remove
gid
\n+ requester's group id\n
version
\n nfs version\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
gid
\n- requester's group id\n-
proto
\n- transfer protocol\n+
client_ip
\n+ the ip address of client\n
filename
\n file name\n+
proto
\n+ transfer protocol\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
uid
\n requester's user id\n+
filelen
\n+ length of file name\n
probe::nfsd.proc.rename — \n NFS Server renaming a file for client\n-
nfsd.proc.rename
flen
\n+
nfsd.proc.rename
client_ip
\n+ the ip address of client\n+
filename
\n+ old file name \n+
flen
\n length of old file name \n-
tname
\n- new file name\n
uid
\n requester's user id\n-
tlen
\n- length of new file name\n-
tfh
\n- file handler of new path\n-
client_ip
\n- the ip address of client\n
fh
\n file handler of old path\n+
tlen
\n+ length of new file name\n
gid
\n requester's group id\n-
filename
\n- old file name \n+
tfh
\n+ file handler of new path\n+
tname
\n+ new file name\n
probe::nfsd.proc.write — \n NFS server writing data to file for client\n-
nfsd.proc.write
client_ip
\n- the ip address of client\n-
version
\n+
nfsd.proc.write
version
\n nfs version\n
stable
\n argp->stable\n-
gid
\n- requester's group id\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
proto
\n- transfer protocol\n-
vlen
\n- read blocks \n
count
\n read bytes\n
offset
\n the offset of file \n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n+
gid
\n+ requester's group id\n
size
\n read bytes\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
uid
\n requester's user id\n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n+
vlen
\n+ read blocks \n+
proto
\n+ transfer protocol\n+
client_ip
\n+ the ip address of client\n
probe::nfsd.read — \n NFS server reading data from a file for client\n
nfsd.read
offset
\n the offset of file \n
count
\n read bytes\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
file
\n argument file, indicates if the file has been opened.\n
size
\n read bytes\n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n
fh
\n file handle (the first part is the length of the file handle)\n-
client_ip
\n- the ip address of client\n
vlen
\n read blocks \n+
client_ip
\n+ the ip address of client\n
probe::nfsd.rename — \n NFS server renaming a file for client\n-
nfsd.rename
tlen
\n- length of new file name\n+
nfsd.rename
tfh
\n+ file handler of new path\n
tname
\n new file name\n
flen
\n length of old file name \n+
fh
\n+ file handler of old path\n+
tlen
\n+ length of new file name\n
filename
\n old file name \n
client_ip
\n the ip address of client\n-
tfh
\n- file handler of new path\n-
fh
\n- file handler of old path\n
probe::nfsd.unlink — \n NFS server removing a file or a directory for client\n
nfsd.unlink
type
\n file type (file or dir)\n-
filename
\n- file name \n-
client_ip
\n- the ip address of client\n-
filelen
\n- the length of file name\n
fh
\n file handle (the first part is the length of the file handle)\n+
filelen
\n+ the length of file name\n+
client_ip
\n+ the ip address of client\n+
filename
\n+ file name \n
probe::nfsd.write — \n NFS server writing data to a file for client\n-
nfsd.write
vec
\n+
nfsd.write
file
\n+ argument file, indicates if the file has been opened.\n+
vec
\n struct kvec, includes buf address in kernel address and length of each buffer\n-
offset
\n- the offset of file \n
count
\n read bytes\n-
size
\n- read bytes\n-
file
\n- argument file, indicates if the file has been opened.\n-
vlen
\n- read blocks \n+
offset
\n+ the offset of file \n
client_ip
\n the ip address of client\n+
vlen
\n+ read blocks \n+
size
\n+ read bytes\n
fh
\n file handle (the first part is the length of the file handle)\n
probe::scheduler.cpu_off — \n Process is about to stop running on a cpu\n-
scheduler.cpu_off
name
\n- name of the probe point\n+
scheduler.cpu_off
probe::scheduler.cpu_on — \n Process is beginning execution on a cpu\n-
scheduler.cpu_on
name
\n+
scheduler.cpu_on
probe::scheduler.ctxswitch — \n A context switch is occuring.\n-
scheduler.ctxswitch
prevtsk_state
\n- the state of the process to be switched out\n+
scheduler.ctxswitch
nexttsk_state
\n+ the state of the process to be switched in\n
prev_task_name
\n The name of the process to be switched out\n-
next_task_name
\n- The name of the process to be switched in\n-
name
\n- name of the probe point\n-
nexttsk_state
\n- the state of the process to be switched in\n
prev_priority
\n The priority of the process to be switched out\n
next_pid
\n The PID of the process to be switched in\n
next_tid
\n The TID of the process to be switched in\t \n-
prev_tid
\n- The TID of the process to be switched out\n-
prev_pid
\n- The PID of the process to be switched out\n
next_priority
\n The priority of the process to be switched in\n+
prev_pid
\n+ The PID of the process to be switched out\n+
name
\n+ name of the probe point\n+
prevtsk_state
\n+ the state of the process to be switched out\n+
next_task_name
\n+ The name of the process to be switched in\n+
prev_tid
\n+ The TID of the process to be switched out\n
probe::scheduler.kthread_stop — \n A thread created by kthread_create is being stopped\n-
scheduler.kthread_stop
probe::scheduler.migrate — \n Task migrating across cpus\n-
scheduler.migrate
pid
\n- PID of the task being migrated\n-
priority
\n- priority of the task being migrated\n-
task
\n- the process that is being migrated\n-
cpu_to
\n+
scheduler.migrate
probe::scheduler.process_exit — \n Process exiting\n-
scheduler.process_exit
probe::scheduler.process_fork — \n Process forked\n-
scheduler.process_fork
probe::scheduler.process_free — \n Scheduler freeing a data structure for a process\n-
scheduler.process_free
probe::scheduler.tick — \n Schedulers internal tick, a processes timeslice accounting is updated\n-
scheduler.tick
idle
\n- boolean indicating whether current is the idle process\n-
name
\n+
scheduler.tick
probe::scheduler.wait_task — \n Waiting on a task to unschedule (become inactive)\n-
scheduler.wait_task
probe::scheduler.wakeup_new — \n Newly created task is woken up for the first time\n-
scheduler.wakeup_new
name
\n- name of the probe point\n-
task_cpu
\n- cpu of the task woken up\n-
task_state
\n+
scheduler.wakeup_new
probe::scheduler.wakeup — \n Task is woken up\n-
scheduler.wakeup
task_state
\n- state of the task being woken up\n-
task_cpu
\n- cpu of the task being woken up\n+
scheduler.wakeup
task_priority
\n+ priority of the task being woken up\n
name
\n name of the probe point\n-
task_priority
\n- priority of the task being woken up\n+
task_state
\n+ state of the task being woken up\n
task_pid
\n PID of the task being woken up\n+
task_cpu
\n+ cpu of the task being woken up\n
task_tid
\n tid of the task being woken up\n
probe::scsi.iocompleted — \n SCSI mid-layer running the completion processing for block device I/O requests\n-
scsi.iocompleted
data_direction
\n- The data_direction specifies whether this command is from/to\n- the device\n-
host_no
\n- The host number\n+
scsi.iocompleted
req_addr
\n+ The current struct request pointer, as a number\n
device_state_str
\n The current state of the device, as a string\n-
device_state
\n- The current state of the device\n-
dev_id
\n- The scsi device id\n-
lun
\n- The lun number\n
channel
\n The channel number\n+
host_no
\n+ The host number\n+
data_direction
\n+ The data_direction specifies whether this command is from/to\n+ the device\n
data_direction_str
\n Data direction, as a string\n-
req_addr
\n- The current struct request pointer, as a number\n+
lun
\n+ The lun number\n+
dev_id
\n+ The scsi device id\n+
device_state
\n+ The current state of the device\n
goodbytes
\n The bytes completed\n
probe::scsi.iodispatching — \n SCSI mid-layer dispatched low-level SCSI command\n
scsi.iodispatching
device_state
\n The current state of the device\n+
request_buffer
\n+ The request buffer address\n+
dev_id
\n+ The scsi device id\n+
data_direction_str
\n+ Data direction, as a string\n+
lun
\n+ The lun number\n+
channel
\n+ The channel number\n
device_state_str
\n The current state of the device, as a string\n
host_no
\n The host number\n
data_direction
\n The data_direction specifies whether this command is from/to the device\n 0 (DMA_BIDIRECTIONAL), 1 (DMA_TO_DEVICE),\n 2 (DMA_FROM_DEVICE), 3 (DMA_NONE)\n-
request_buffer
\n- The request buffer address\n
request_bufflen
\n The request buffer length\n
req_addr
\n The current struct request pointer, as a number\n-
dev_id
\n- The scsi device id\n-
lun
\n- The lun number\n-
channel
\n- The channel number\n-
data_direction_str
\n- Data direction, as a string\n
probe::scsi.iodone — \n SCSI command completed by low level driver and enqueued into the done queue.\n-
scsi.iodone
data_direction_str
\n- Data direction, as a string\n-
dev_id
\n- The scsi device id\n-
lun
\n- The lun number\n-
channel
\n+
scsi.iodone
channel
\n The channel number\n-
req_addr
\n- The current struct request pointer, as a number\n-
scsi_timer_pending
\n- 1 if a timer is pending on this request\n+
device_state_str
\n+ The current state of the device, as a string\n+
host_no
\n+ The host number\n
data_direction
\n The data_direction specifies whether this command is\n from/to the device.\n-
host_no
\n- The host number\n-
device_state_str
\n- The current state of the device, as a string\n+
scsi_timer_pending
\n+ 1 if a timer is pending on this request\n+
req_addr
\n+ The current struct request pointer, as a number\n
device_state
\n The current state of the device\n+
dev_id
\n+ The scsi device id\n+
data_direction_str
\n+ Data direction, as a string\n+
lun
\n+ The lun number\n
probe::scsi.ioentry — \n Prepares a SCSI mid-layer request\n-
scsi.ioentry
device_state
\n- The current state of the device\n-
disk_major
\n+
scsi.ioentry
disk_major
\n The major number of the disk (-1 if no information)\n+
req_addr
\n+ The current struct request pointer, as a number\n
disk_minor
\n The minor number of the disk (-1 if no information)\n+
device_state
\n+ The current state of the device\n
device_state_str
\n The current state of the device, as a string\n-
req_addr
\n- The current struct request pointer, as a number\n
probe::scsi.ioexecute — \n Create mid-layer SCSI request and wait for the result\n-
scsi.ioexecute
timeout
\n- Request timeout in seconds\n-
data_direction_str
\n- Data direction, as a string\n+
scsi.ioexecute
retries
\n+ Number of times to retry request\n
dev_id
\n The scsi device id\n-
channel
\n- The channel number\n-
lun
\n- The lun number\n+
timeout
\n+ Request timeout in seconds\n
request_bufflen
\n The data buffer buffer length\n+
channel
\n+ The channel number\n+
device_state_str
\n+ The current state of the device, as a string\n
data_direction
\n The data_direction specifies whether this command is\n from/to the device.\n-
request_buffer
\n- The data buffer address\n-
retries
\n- Number of times to retry request\n-
device_state
\n- The current state of the device\n-
device_state_str
\n- The current state of the device, as a string\n
host_no
\n The host number\n+
device_state
\n+ The current state of the device\n+
request_buffer
\n+ The data buffer address\n+
data_direction_str
\n+ Data direction, as a string\n+
lun
\n+ The lun number\n
probe::scsi.set_state — \n Order SCSI device state change\n-
scsi.set_state
old_state_str
\n- The current state of the device, as a string\n+
scsi.set_state
channel
\n+ The channel number\n
host_no
\n The host number\n+
dev_id
\n+ The scsi device id\n
state
\n The new state of the device\n
old_state
\n The current state of the device\n-
channel
\n- The channel number\n-
dev_id
\n- The scsi device id\n+
old_state_str
\n+ The current state of the device, as a string\n
lun
\n The lun number\n
state_str
\n The new state of the device, as a string\n
probe::signal.check_ignored.return — \n Check to see signal is ignored completed\n-
signal.check_ignored.return
probe::signal.check_ignored — \n Checking to see signal is ignored\n-
signal.check_ignored
probe::signal.checkperm.return — \n Check performed on a sent signal completed\n-
signal.checkperm.return
probe::signal.checkperm — \n Check being performed on a sent signal\n-
signal.checkperm
name
\n- Name of the probe point\n+
signal.checkperm
pid_name
\n+ Name of the process receiving the signal\n
si_code
\n Indicates the signal type\n-
pid_name
\n- Name of the process receiving the signal\n+
task
\n+ A task handle to the signal recipient\n
sinfo
\n The address of the siginfo structure\n
sig
\n The number of the signal\n+
name
\n+ Name of the probe point\n
sig_name
\n A string representation of the signal\n-
task
\n- A task handle to the signal recipient\n
sig_pid
\n The PID of the process receiving the signal\n
probe::signal.do_action.return — \n Examining or changing a signal action completed\n-
signal.do_action.return
probe::signal.do_action — \n Examining or changing a signal action\n-
signal.do_action
sa_handler
\n+
signal.do_action
oldsigact_addr
\n+ The address of the old sigaction\n+ struct associated with the signal\n+
sa_handler
\n The new handler of the signal\n
sig
\n The signal to be examined/changed\n
sigact_addr
\n The address of the new sigaction\n struct associated with the signal\n+
name
\n+ Name of the probe point\n
sig_name
\n A string representation of the signal\n
sa_mask
\n The new mask of the signal\n-
name
\n- Name of the probe point\n-
oldsigact_addr
\n- The address of the old sigaction\n- struct associated with the signal\n
probe::signal.flush — \n Flushing all pending signals for a task\n-
signal.flush
pid_name
\n+
signal.flush
name
\n+ Name of the probe point\n+
sig_pid
\n+ The PID of the process associated with the task\n+ performing the flush\n+
pid_name
\n The name of the process associated with the task\n performing the flush\n
task
\n The task handler of the process performing the flush\n-
sig_pid
\n- The PID of the process associated with the task\n- performing the flush\n-
name
\n- Name of the probe point\n
probe::signal.force_segv.return — \n Forcing send of SIGSEGV complete\n-
signal.force_segv.return
probe::signal.handle — \n Signal handler being invoked\n-
signal.handle
ka_addr
\n- The address of the k_sigaction table\n- associated with the signal\n+
signal.handle
sig_code
\n+ The si_code value of the siginfo signal\n
oldset_addr
\n The address of the bitmask array of blocked signals\n (deprecated in SystemTap 2.1)\n-
sig_code
\n- The si_code value of the siginfo signal\n+
ka_addr
\n+ The address of the k_sigaction table\n+ associated with the signal\n+
sinfo
\n+ The address of the siginfo table\n
sig
\n The signal number that invoked the signal handler\n+
regs
\n+ The address of the kernel-mode stack area (deprecated in\n+ SystemTap 2.1)\n+
name
\n+ Name of the probe point\n
sig_name
\n A string representation of the signal\n-
sinfo
\n- The address of the siginfo table\n
sig_mode
\n Indicates whether the signal was a user-mode or kernel-mode signal\n-
name
\n- Name of the probe point\n-
regs
\n- The address of the kernel-mode stack area (deprecated in\n- SystemTap 2.1)\n
probe::signal.pending.return — \n Examination of pending signal completed\n-
signal.pending.return
probe::signal.pending — \n Examining pending signal\n-
signal.pending
sigset_add
\n- The address of the user-space signal set\n- (sigset_t)\n+
signal.pending
probe::signal.procmask.return — \n Examining or changing blocked signals completed\n-
signal.procmask.return
probe::signal.procmask — \n Examining or changing blocked signals\n-
signal.procmask
name
\n- Name of the probe point\n-
sigset
\n+
signal.procmask
sigset
\n The actual value to be set for sigset_t\n (correct?)\n
oldsigset_addr
\n The old address of the signal set\n (sigset_t)\n+
name
\n+ Name of the probe point\n
how
\n Indicates how to change the blocked signals; possible values are\n SIG_BLOCK=0 (for blocking signals),\n SIG_UNBLOCK=1 (for unblocking signals), and\n SIG_SETMASK=2 for setting the signal mask.\n
sigset_addr
\n The address of the signal set (sigset_t)\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-signal-send-sig-queue.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-signal-send-sig-queue.html", "unified_diff": "@@ -1,15 +1,15 @@\n
probe::signal.send_sig_queue — \n Queuing a signal to a process\n-
signal.send_sig_queue
sigqueue_addr
\n- The address of the signal queue\n-
sig_pid
\n- The PID of the process to which the signal is queued\n+
signal.send_sig_queue
sig
\n+ The queued signal\n+
name
\n+ Name of the probe point\n
sig_name
\n A string representation of the signal\n-
sig
\n- The queued signal\n+
sig_pid
\n+ The PID of the process to which the signal is queued\n
pid_name
\n Name of the process to which the signal is queued\n-
name
\n- Name of the probe point\n+
sigqueue_addr
\n+ The address of the signal queue\n
probe::signal.send — \n Signal being sent to a process\n-
signal.send
shared
\n+
signal.send
sig_name
\n+ A string representation of the signal\n+
sig_pid
\n+ The PID of the process receiving the signal\n+
sig
\n+ The number of the signal\n+
shared
\n Indicates whether the signal is shared by the thread group\n-
si_code
\n- Indicates the signal type\n
name
\n The name of the function used to send out the signal\n+
sinfo
\n+ The address of siginfo struct\n
task
\n A task handle to the signal recipient\n-
sig_pid
\n- The PID of the process receiving the signal\n
pid_name
\n The name of the signal recipient\n-
sinfo
\n- The address of siginfo struct\n
send2queue
\n Indicates whether the signal is sent to an existing\n sigqueue (deprecated in SystemTap 2.1)\n-
sig
\n- The number of the signal\n-
sig_name
\n- A string representation of the signal\n+
si_code
\n+ Indicates the signal type\n
probe::signal.sys_tgkill — \n Sending kill signal to a thread group\n-
signal.sys_tgkill
name
\n+
signal.sys_tgkill
sig
\n+ The specific kill signal sent to the process\n+
name
\n Name of the probe point\n-
tgid
\n- The thread group ID of the thread receiving the kill signal\n+
sig_name
\n+ A string representation of the signal\n
sig_pid
\n The PID of the thread receiving the kill signal\n-
task
\n- A task handle to the signal recipient\n
pid_name
\n The name of the signal recipient\n-
sig
\n- The specific kill signal sent to the process\n-
sig_name
\n- A string representation of the signal\n+
tgid
\n+ The thread group ID of the thread receiving the kill signal\n+
task
\n+ A task handle to the signal recipient\n
probe::signal.sys_tkill — \n Sending a kill signal to a thread\n-
signal.sys_tkill
pid_name
\n- The name of the signal recipient\n-
sig
\n- The specific signal sent to the process\n-
sig_name
\n+
signal.sys_tkill
sig_name
\n A string representation of the signal\n-
task
\n- A task handle to the signal recipient\n
sig_pid
\n The PID of the process receiving the kill signal\n+
sig
\n+ The specific signal sent to the process\n
name
\n Name of the probe point\n+
task
\n+ A task handle to the signal recipient\n+
pid_name
\n+ The name of the signal recipient\n
probe::signal.syskill — \n Sending kill signal to a process\n-
signal.syskill
name
\n- Name of the probe point\n-
pid_name
\n+
signal.syskill
pid_name
\n The name of the signal recipient\n-
sig_name
\n- A string representation of the signal\n+
task
\n+ A task handle to the signal recipient\n
sig
\n The specific signal sent to the process\n+
name
\n+ Name of the probe point\n+
sig_name
\n+ A string representation of the signal\n
sig_pid
\n The PID of the process receiving the signal\n-
task
\n- A task handle to the signal recipient\n
probe::signal.wakeup — \n Sleeping process being wakened for signal\n-
signal.wakeup
pid_name
\n- Name of the process to wake\n-
sig_pid
\n- The PID of the process to wake\n-
resume
\n+
signal.wakeup
resume
\n Indicates whether to wake up a task in a\n STOPPED or TRACED state\n+
sig_pid
\n+ The PID of the process to wake\n
state_mask
\n A string representation indicating the mask\n of task states to wake. Possible values are\n TASK_INTERRUPTIBLE, TASK_STOPPED,\n TASK_TRACED, TASK_WAKEKILL, and TASK_INTERRUPTIBLE.\n+
pid_name
\n+ Name of the process to wake\n
probe::socket.aio_read.return — \n Conclusion of message received via sock_aio_read
\n-
socket.aio_read.return
type
\n+
socket.aio_read.return
flags
\n+ Socket flags value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n+
type
\n Socket type value\n-
state
\n- Socket state value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
protocol
\n Protocol value\n
family
\n Protocol family value\n+
state
\n+ Socket state value\n
name
\n Name of this probe\n-
flags
\n- Socket flags value\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n
probe::socket.aio_read — \n Receiving message via sock_aio_read
\n-
socket.aio_read
size
\n- Message size in bytes\n+
socket.aio_read
family
\n+ Protocol family value\n+
state
\n+ Socket state value\n
name
\n Name of this probe\n-
flags
\n- Socket flags value\n
type
\n Socket type value\n-
family
\n- Protocol family value\n-
state
\n- Socket state value\n+
flags
\n+ Socket flags value\n
protocol
\n Protocol value\n+
size
\n+ Message size in bytes\n
probe::socket.aio_write.return — \n Conclusion of message send via sock_aio_write
\n-
socket.aio_write.return
size
\n- Size of message received (in bytes) or error code if success = 0\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n-
flags
\n- Socket flags value\n-
name
\n+
socket.aio_write.return
name
\n Name of this probe\n
state
\n Socket state value\n-
protocol
\n- Protocol value\n
family
\n Protocol family value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
protocol
\n+ Protocol value\n+
flags
\n+ Socket flags value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
type
\n Socket type value\n
\n Fires at the conclusion of sending a message on a socket\n via the sock_aio_write
function\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-aio-write.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-aio-write.html", "unified_diff": "@@ -1,22 +1,22 @@\n
probe::socket.aio_write — \n Message send via sock_aio_write
\n-
socket.aio_write
type
\n+
socket.aio_write
size
\n+ Message size in bytes\n+
protocol
\n+ Protocol value\n+
flags
\n+ Socket flags value\n+
type
\n Socket type value\n+
name
\n+ Name of this probe\n
state
\n Socket state value\n
family
\n Protocol family value\n-
protocol
\n- Protocol value\n-
size
\n- Message size in bytes\n-
name
\n- Name of this probe\n-
flags
\n- Socket flags value\n
probe::socket.close — \n Close a socket\n-
socket.close
state
\n- Socket state value\n-
family
\n+
socket.close
probe::socket.create.return — \n Return from Creation of a socket\n
socket.create.return
name
\n Name of this probe\n-
requester
\n- Requested by user process or the kernel (1 = kernel, 0 = user)\n
err
\n Error code if success == 0\n-
success
\n- Was socket creation successful? (1 = yes, 0 = no)\n
family
\n Protocol family value\n
protocol
\n Protocol value\n
type
\n Socket type value\n+
requester
\n+ Requested by user process or the kernel (1 = kernel, 0 = user)\n+
success
\n+ Was socket creation successful? (1 = yes, 0 = no)\n
probe::socket.create — \n Creation of a socket\n-
socket.create
name
\n- Name of this probe\n-
requester
\n- Requested by user process or the kernel (1 = kernel, 0 = user)\n+
socket.create
probe::socket.read_iter.return — \n Conclusion of message received via sock_read_iter
\n-
socket.read_iter.return
name
\n- Name of this probe\n-
flags
\n- Socket flags value\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n+
socket.read_iter.return
protocol
\n+ Protocol value\n
size
\n Size of message received (in bytes) or error code if success = 0\n
type
\n Socket type value\n-
state
\n- Socket state value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n+
flags
\n+ Socket flags value\n+
name
\n+ Name of this probe\n
family
\n Protocol family value\n-
protocol
\n- Protocol value\n+
state
\n+ Socket state value\n
probe::socket.read_iter — \n Receiving message via sock_read_iter
\n-
socket.read_iter
type
\n- Socket type value\n-
state
\n+
socket.read_iter
state
\n Socket state value\n
family
\n Protocol family value\n-
protocol
\n- Protocol value\n
name
\n Name of this probe\n+
type
\n+ Socket type value\n
flags
\n Socket flags value\n+
protocol
\n+ Protocol value\n
size
\n Message size in bytes\n
\n Fires at the beginning of receiving a message on a socket\n via the sock_read_iter
function\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-readv-return.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-readv-return.html", "unified_diff": "@@ -1,24 +1,24 @@\n
probe::socket.readv.return — \n Conclusion of receiving a message via sock_readv
\n-
socket.readv.return
flags
\n- Socket flags value\n+
socket.readv.return
state
\n+ Socket state value\n+
family
\n+ Protocol family value\n
name
\n Name of this probe\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n+
flags
\n+ Socket flags value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
family
\n- Protocol family value\n-
state
\n- Socket state value\n-
protocol
\n- Protocol value\n
type
\n Socket type value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
protocol
\n+ Protocol value\n
probe::socket.readv — \n Receiving a message via sock_readv
\n-
socket.readv
type
\n- Socket type value\n-
state
\n- Socket state value\n-
family
\n- Protocol family value\n-
protocol
\n+
socket.readv
probe::socket.receive — \n Message received on a socket.\n-
socket.receive
flags
\n+
socket.receive
type
\n+ Socket type value\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n+
flags
\n Socket flags value\n-
name
\n- Name of this probe\n+
protocol
\n+ Protocol value\n
size
\n Size of message received (in bytes) or error code if success = 0\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n
state
\n Socket state value\n
family
\n Protocol family value\n-
protocol
\n- Protocol value\n-
type
\n- Socket type value\n+
name
\n+ Name of this probe\n
probe::socket.recvmsg.return — \n Return from Message being received on socket\n-
socket.recvmsg.return
type
\n- Socket type value\n+
socket.recvmsg.return
family
\n+ Protocol family value\n
state
\n Socket state value\n-
family
\n- Protocol family value\n-
protocol
\n- Protocol value\n
name
\n Name of this probe\n-
flags
\n- Socket flags value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n+
flags
\n+ Socket flags value\n+
type
\n+ Socket type value\n
size
\n Size of message received (in bytes) or error code if success = 0\n+
protocol
\n+ Protocol value\n
probe::socket.recvmsg — \n Message being received on socket\n-
socket.recvmsg
type
\n- Socket type value\n-
protocol
\n- Protocol value\n-
state
\n- Socket state value\n+
socket.recvmsg
name
\n+ Name of this probe\n
family
\n Protocol family value\n+
state
\n+ Socket state value\n+
protocol
\n+ Protocol value\n
size
\n Message size in bytes\n-
name
\n- Name of this probe\n+
type
\n+ Socket type value\n
flags
\n Socket flags value\n
\n Fires at the beginning of receiving a message on a socket\n via the sock_recvmsg
function\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-send.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-send.html", "unified_diff": "@@ -1,21 +1,21 @@\n
probe::socket.send — \n Message sent on a socket.\n-
socket.send
type
\n- Socket type value\n+
socket.send
family
\n+ Protocol family value\n
state
\n Socket state value\n-
protocol
\n- Protocol value\n-
family
\n- Protocol family value\n
name
\n Name of this probe\n
flags
\n Socket flags value\n
success
\n Was send successful? (1 = yes, 0 = no)\n+
type
\n+ Socket type value\n
size
\n Size of message sent (in bytes) or error code if success = 0\n+
protocol
\n+ Protocol value\n
probe::socket.sendmsg.return — \n Return from socket.sendmsg.\n-
socket.sendmsg.return
flags
\n- Socket flags value\n-
name
\n- Name of this probe\n-
size
\n+
socket.sendmsg.return
size
\n Size of message sent (in bytes) or error code if success = 0\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n
protocol
\n Protocol value\n-
state
\n- Socket state value\n-
family
\n- Protocol family value\n+
flags
\n+ Socket flags value\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n
type
\n Socket type value\n+
name
\n+ Name of this probe\n+
family
\n+ Protocol family value\n+
state
\n+ Socket state value\n
probe::socket.sendmsg — \n Message is currently being sent on a socket.\n-
socket.sendmsg
name
\n+
socket.sendmsg
state
\n+ Socket state value\n+
family
\n+ Protocol family value\n+
name
\n Name of this probe\n
flags
\n Socket flags value\n-
size
\n- Message size in bytes\n
type
\n Socket type value\n-
state
\n- Socket state value\n+
size
\n+ Message size in bytes\n
protocol
\n Protocol value\n-
family
\n- Protocol family value\n
probe::socket.write_iter.return — \n Conclusion of message send via sock_write_iter
\n
socket.write_iter.return
type
\n Socket type value\n-
family
\n- Protocol family value\n-
state
\n- Socket state value\n-
protocol
\n- Protocol value\n-
name
\n- Name of this probe\n-
flags
\n- Socket flags value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n+
flags
\n+ Socket flags value\n+
protocol
\n+ Protocol value\n
size
\n Size of message received (in bytes) or error code if success = 0\n+
state
\n+ Socket state value\n+
family
\n+ Protocol family value\n+
name
\n+ Name of this probe\n
probe::socket.write_iter — \n Message send via sock_write_iter
\n-
socket.write_iter
type
\n- Socket type value\n-
family
\n+
socket.write_iter
probe::socket.writev.return — \n Conclusion of message sent via socket_writev
\n-
socket.writev.return
size
\n- Size of message sent (in bytes) or error code if success = 0\n-
success
\n+
socket.writev.return
success
\n Was send successful? (1 = yes, 0 = no)\n
flags
\n Socket flags value\n-
name
\n- Name of this probe\n+
type
\n+ Socket type value\n+
size
\n+ Size of message sent (in bytes) or error code if success = 0\n+
protocol
\n+ Protocol value\n
state
\n Socket state value\n
family
\n Protocol family value\n-
protocol
\n- Protocol value\n-
type
\n- Socket type value\n+
name
\n+ Name of this probe\n
probe::socket.writev — \n Message sent via socket_writev
\n-
socket.writev
state
\n- Socket state value\n-
protocol
\n- Protocol value\n-
family
\n+
socket.writev
probe::softirq.entry — \n Execution of handler for a pending softirq starting\n-
softirq.entry
probe::softirq.exit — \n Execution of handler for a pending softirq completed\n-
softirq.exit
probe::stap.cache_add_mod — \n Adding kernel instrumentation module to cache\n-
stap.cache_add_mod
source_path
\n- the path the .ko file is coming from (incl filename)\n-
dest_path
\n+
stap.cache_add_mod
probe::stap.cache_add_nss — \n Add NSS (Network Security Services) information to cache\n-
stap.cache_add_nss
source_path
\n+
stap.cache_add_nss
probe::stap.cache_add_src — \n Adding C code translation to cache\n-
stap.cache_add_src
dest_path
\n- the path the .c file is going to (incl filename)\n-
source_path
\n+
stap.cache_add_src
probe::stapio.receive_control_message — \n Received a control message\n
stapio.receive_control_message
probe::sunrpc.clnt.bind_new_program — \n Bind a new RPC program to an existing client\n-
sunrpc.clnt.bind_new_program
servername
\n+
sunrpc.clnt.bind_new_program
prog
\n+ the number of new RPC program\n+
old_prog
\n+ the number of old RPC program\n+
servername
\n the server machine name\n-
progname
\n- the name of new RPC program\n
old_vers
\n the version of old RPC program\n+
progname
\n+ the name of new RPC program\n
vers
\n the version of new RPC program\n
old_progname
\n the name of old RPC program\n-
old_prog
\n- the number of old RPC program\n-
prog
\n- the number of new RPC program\n
probe::sunrpc.clnt.call_async — \n Make an asynchronous RPC call\n-
sunrpc.clnt.call_async
flags
\n- flags\n+
sunrpc.clnt.call_async
servername
\n+ the server machine name\n+
vers
\n+ the RPC program version number\n+
progname
\n+ the RPC program name\n
procname
\n the procedure name in this RPC call\n-
prog
\n- the RPC program number\n+
xid
\n+ current transmission id\n
prot
\n the IP protocol number\n-
servername
\n- the server machine name\n+
flags
\n+ flags\n
proc
\n the procedure number in this RPC call\n-
progname
\n- the RPC program name\n-
vers
\n- the RPC program version number\n+
prog
\n+ the RPC program number\n
port
\n the port number\n-
xid
\n- current transmission id\n
dead
\n whether this client is abandoned\n
probe::sunrpc.clnt.call_sync — \n Make a synchronous RPC call\n-
sunrpc.clnt.call_sync
prot
\n- the IP protocol number\n-
servername
\n- the server machine name\n-
proc
\n- the procedure number in this RPC call\n+
sunrpc.clnt.call_sync
procname
\n+ the procedure name in this RPC call\n
progname
\n the RPC program name\n
vers
\n the RPC program version number\n+
servername
\n+ the server machine name\n+
flags
\n+ flags\n+
prot
\n+ the IP protocol number\n
xid
\n current transmission id\n-
port
\n- the port number\n
dead
\n whether this client is abandoned\n-
flags
\n- flags\n-
procname
\n- the procedure name in this RPC call\n+
port
\n+ the port number\n
prog
\n the RPC program number\n+
proc
\n+ the procedure number in this RPC call\n
probe::sunrpc.clnt.clone_client — \n Clone an RPC client structure\n-
sunrpc.clnt.clone_client
vers
\n- the RPC program version number\n-
port
\n- the port number\n+
sunrpc.clnt.clone_client
servername
\n+ the server machine name\n
prog
\n the RPC program number\n-
authflavor
\n- the authentication flavor\n-
prot
\n- the IP protocol number\n-
servername
\n- the server machine name\n+
port
\n+ the port number\n+
vers
\n+ the RPC program version number\n
progname
\n the RPC program name\n+
prot
\n+ the IP protocol number\n+
authflavor
\n+ the authentication flavor\n
probe::sunrpc.clnt.create_client — \n Create an RPC client\n-
sunrpc.clnt.create_client
prog
\n- the RPC program number\n-
port
\n- the port number\n-
vers
\n- the RPC program version number\n+
sunrpc.clnt.create_client
authflavor
\n+ the authentication flavor\n+
prot
\n+ the IP protocol number\n
progname
\n the RPC program name\n+
vers
\n+ the RPC program version number\n
servername
\n the server machine name\n-
prot
\n- the IP protocol number\n-
authflavor
\n- the authentication flavor\n+
port
\n+ the port number\n+
prog
\n+ the RPC program number\n
probe::sunrpc.clnt.restart_call — \n Restart an asynchronous RPC call\n-
sunrpc.clnt.restart_call
tk_priority
\n- the task priority\n-
tk_flags
\n- the task flags\n+
sunrpc.clnt.restart_call
tk_pid
\n+ the debugging aid of task\n
prog
\n the RPC program number\n-
servername
\n- the server machine name\n-
tk_runstate
\n- the task run status\n-
tk_pid
\n- the debugging aid of task\n
xid
\n the transmission id\n+
tk_priority
\n+ the task priority\n+
tk_runstate
\n+ the task run status\n+
servername
\n+ the server machine name\n+
tk_flags
\n+ the task flags\n
probe::sunrpc.clnt.shutdown_client — \n Shutdown an RPC client\n-
sunrpc.clnt.shutdown_client
prog
\n- the RPC program number\n-
om_ops
\n- the count of operations\n-
om_bytes_sent
\n- the count of bytes out\n-
om_ntrans
\n+
sunrpc.clnt.shutdown_client
om_ntrans
\n the count of RPC transmissions\n-
om_queue
\n- the jiffies queued for xmit\n-
authflavor
\n- the authentication flavor\n-
om_bytes_recv
\n- the count of bytes in\n-
port
\n- the port number\n
rpccnt
\n the count of RPC calls\n-
vers
\n- the RPC program version number\n-
clones
\n- the number of clones\n+
port
\n+ the port number\n+
prog
\n+ the RPC program number\n
tasks
\n the number of references\n-
om_rtt
\n- the RPC RTT jiffies\n-
servername
\n- the server machine name\n-
progname
\n- the RPC program name\n
om_execute
\n the RPC execution jiffies\n+
om_queue
\n+ the jiffies queued for xmit\n
netreconn
\n the count of reconnections\n+
om_ops
\n+ the count of operations\n
prot
\n the IP protocol number\n+
clones
\n+ the number of clones\n+
om_bytes_sent
\n+ the count of bytes out\n+
authflavor
\n+ the authentication flavor\n+
servername
\n+ the server machine name\n+
om_rtt
\n+ the RPC RTT jiffies\n+
om_bytes_recv
\n+ the count of bytes in\n+
progname
\n+ the RPC program name\n+
vers
\n+ the RPC program version number\n
probe::sunrpc.sched.delay — \n Delay an RPC task\n-
sunrpc.sched.delay
prot
\n- the IP protocol in the RPC call\n-
tk_pid
\n+
sunrpc.sched.delay
tk_pid
\n the debugging id of the task\n-
vers
\n- the program version in the RPC call\n+
prog
\n+ the program number in the RPC call\n
xid
\n the transmission id in the RPC call\n-
delay
\n- the time delayed\n+
prot
\n+ the IP protocol in the RPC call\n+
vers
\n+ the program version in the RPC call\n
tk_flags
\n the flags of the task\n-
prog
\n- the program number in the RPC call\n+
delay
\n+ the time delayed\n
probe::sunrpc.sched.execute — \n Execute the RPC `scheduler'\n-
sunrpc.sched.execute
prot
\n+
sunrpc.sched.execute
xid
\n+ the transmission id in the RPC call\n+
prot
\n the IP protocol in the RPC call\n-
tk_pid
\n- the debugging id of the task\n+
tk_flags
\n+ the flags of the task\n
vers
\n the program version in the RPC call\n-
xid
\n- the transmission id in the RPC call\n+
tk_pid
\n+ the debugging id of the task\n
prog
\n the program number in the RPC call\n-
tk_flags
\n- the flags of the task\n
probe::sunrpc.sched.new_task — \n Create new task for the specified client\n
sunrpc.sched.new_task
prog
\n the program number in the RPC call\n+
vers
\n+ the program version in the RPC call\n
tk_flags
\n the flags of the task\n-
prot
\n- the IP protocol in the RPC call\n
xid
\n the transmission id in the RPC call\n-
vers
\n- the program version in the RPC call\n+
prot
\n+ the IP protocol in the RPC call\n
probe::sunrpc.sched.release_task — \n Release all resources associated with a task\n-
sunrpc.sched.release_task
prot
\n- the IP protocol in the RPC call\n+
sunrpc.sched.release_task
probe::sunrpc.svc.create — \n Create an RPC service\n-
sunrpc.svc.create
probe::sunrpc.svc.destroy — \n Destroy an RPC service\n-
sunrpc.svc.destroy
rpcbadfmt
\n- the count of requests dropped for bad formats\n-
netcnt
\n- the count of received RPC requests\n+
sunrpc.svc.destroy
sv_nrthreads
\n+ the number of concurrent threads\n
rpccnt
\n the count of valid RPC requests\n-
nettcpconn
\n- the count of accepted TCP connections\n-
sv_progname
\n- the name of the program\n-
sv_nrthreads
\n- the number of concurrent threads\n-
sv_prog
\n- the number of the program\n
rpcbadauth
\n the count of requests drooped for authentication failure\n+
sv_progname
\n+ the name of the program\n+
rpcbadfmt
\n+ the count of requests dropped for bad formats\n
sv_name
\n the service name\n+
sv_prog
\n+ the number of the program\n+
netcnt
\n+ the count of received RPC requests\n+
nettcpconn
\n+ the count of accepted TCP connections\n
probe::sunrpc.svc.drop — \n Drop RPC request\n
sunrpc.svc.drop
peer_ip
\n the peer address where the request is from\n
rq_proc
\n the procedure number in the request\n-
rq_prog
\n- the program number in the request\n-
rq_vers
\n- the program version in the request\n-
rq_prot
\n- the IP protocol of the reqeust\n
rq_xid
\n the transmission id in the request\n+
rq_prot
\n+ the IP protocol of the reqeust\n+
rq_prog
\n+ the program number in the request\n
sv_name
\n the service name\n+
rq_vers
\n+ the program version in the request\n
probe::sunrpc.svc.process — \n Process an RPC request\n-
sunrpc.svc.process
peer_ip
\n- the peer address where the request is from\n+
sunrpc.svc.process
rq_vers
\n+ the program version in the request\n+
sv_prog
\n+ the number of the program\n
rq_prog
\n the program number in the request\n+
sv_name
\n+ the service name\n
rq_proc
\n the procedure number in the request\n
rq_xid
\n the transmission id in the request\n
rq_prot
\n the IP protocol of the reqeust\n-
sv_prog
\n- the number of the program\n-
rq_vers
\n- the program version in the request\n-
sv_name
\n- the service name\n
sv_nrthreads
\n the number of concurrent threads\n+
peer_ip
\n+ the peer address where the request is from\n
probe::sunrpc.svc.recv — \n Listen for the next RPC request on any socket\n
sunrpc.svc.recv
probe::sunrpc.svc.register — \n Register an RPC service with the local portmapper\n-
sunrpc.svc.register
sv_name
\n- the service name\n-
prog
\n+
sunrpc.svc.register
probe::sunrpc.svc.send — \n Return reply to RPC client\n-
sunrpc.svc.send
rq_proc
\n+
sunrpc.svc.send
rq_xid
\n+ the transmission id in the request\n+
rq_proc
\n the procedure number in the request\n-
rq_prog
\n- the program number in the request\n+
rq_prot
\n+ the IP protocol of the reqeust\n
peer_ip
\n the peer address where the request is from\n-
sv_name
\n- the service name\n-
rq_xid
\n- the transmission id in the request\n
rq_vers
\n the program version in the request\n-
rq_prot
\n- the IP protocol of the reqeust\n+
rq_prog
\n+ the program number in the request\n+
sv_name
\n+ the service name\n
probe::syscall_any.return — \n Record exit from a syscall\n
syscall_any.return
name
\n name of the syscall\n-
retval
\n- return value of the syscall\n
syscall_nr
\n number of the syscall\n+
retval
\n+ return value of the syscall\n
\n The syscall_any.return probe point is designed to be a low overhead\n that monitors all the syscalls returns via a kernel tracepoint.\n Because of the breadth of syscalls it monitors it provides\n no information about the syscall arguments, argstr string\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect-return.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect-return.html", "unified_diff": "@@ -1,9 +1,9 @@\n
probe::tcp.disconnect.return — \n TCP socket disconnection complete\n-
tcp.disconnect.return
probe::tcp.disconnect — \n TCP socket disconnection\n-
tcp.disconnect
saddr
\n+
tcp.disconnect
dport
\n+ TCP destination port\n+
saddr
\n A string representing the source IP address\n+
sock
\n+ Network socket \n+
name
\n+ Name of this probe\n
flags
\n TCP flags (e.g. FIN, etc) \n+
sport
\n+ TCP source port \n
daddr
\n A string representing the destination IP address\n
family
\n IP address family\n-
dport
\n- TCP destination port\n-
name
\n- Name of this probe\n-
sock
\n- Network socket \n-
sport
\n- TCP source port \n
probe::tcp.receive — \n Called when a TCP packet is received\n-
tcp.receive
rst
\n- TCP RST flag\n+
tcp.receive
dport
\n+ TCP destination port\n+
fin
\n+ TCP FIN flag\n+
ack
\n+ TCP ACK flag\n+
psh
\n+ TCP PSH flag\n+
family
\n+ IP address family\n+
protocol
\n+ Packet protocol from driver\n
syn
\n TCP SYN flag\n+
sport
\n+ TCP source port\n+
saddr
\n+ A string representing the source IP address\n
iphdr
\n IP header address\n-
name
\n- Name of the probe point\n-
family
\n- IP address family\n
urg
\n TCP URG flag\n-
saddr
\n- A string representing the source IP address\n+
name
\n+ Name of the probe point\n
daddr
\n A string representing the destination IP address\n-
fin
\n- TCP FIN flag\n-
psh
\n- TCP PSH flag\n-
ack
\n- TCP ACK flag\n-
dport
\n- TCP destination port\n-
sport
\n- TCP source port\n-
protocol
\n- Packet protocol from driver\n+
rst
\n+ TCP RST flag\n
probe::tcp.recvmsg.return — \n Receiving TCP message complete\n-
tcp.recvmsg.return
sport
\n- TCP source port \n+
tcp.recvmsg.return
dport
\n+ TCP destination port\n+
saddr
\n+ A string representing the source IP address\n
size
\n Number of bytes received or error code if an error occurred.\n-
dport
\n- TCP destination port\n+
sport
\n+ TCP source port \n
family
\n IP address family\n-
name
\n- Name of this probe\n
daddr
\n A string representing the destination IP address\n-
saddr
\n- A string representing the source IP address\n+
name
\n+ Name of this probe\n
probe::tcp.recvmsg — \n Receiving TCP message\n-
tcp.recvmsg
family
\n+
tcp.recvmsg
daddr
\n+ A string representing the destination IP address\n+
family
\n IP address family\n-
dport
\n- TCP destination port\n-
sock
\n- Network socket\n-
name
\n- Name of this probe\n-
sport
\n- TCP source port \n
size
\n Number of bytes to be received \n+
sport
\n+ TCP source port \n+
name
\n+ Name of this probe\n+
sock
\n+ Network socket\n
saddr
\n A string representing the source IP address\n-
daddr
\n- A string representing the destination IP address\n+
dport
\n+ TCP destination port\n
probe::tcp.sendmsg.return — \n Sending TCP message is done\n-
tcp.sendmsg.return
name
\n- Name of this probe\n-
size
\n+
tcp.sendmsg.return
probe::tcp.sendmsg — \n Sending a tcp message\n-
tcp.sendmsg
size
\n- Number of bytes to send \n+
tcp.sendmsg
probe::tcp.setsockopt.return — \n Return from setsockopt
\n-
tcp.setsockopt.return
probe::tcp.setsockopt — \n Call to setsockopt
\n-
tcp.setsockopt
optname
\n+
tcp.setsockopt
sock
\n+ Network socket\n+
optname
\n TCP socket options (e.g. TCP_NODELAY, TCP_MAXSEG, etc)\n+
level
\n+ The level at which the socket options will be manipulated\n
optlen
\n Used to access values for setsockopt
\n+
optstr
\n+ Resolves optname to a human-readable format\n
family
\n IP address family\n
name
\n Name of this probe\n-
sock
\n- Network socket\n-
level
\n- The level at which the socket options will be manipulated\n-
optstr
\n- Resolves optname to a human-readable format\n
probe::tcpmib.ActiveOpens — \n Count an active opening of a socket\n-
tcpmib.ActiveOpens
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.ActiveOpens
probe::tcpmib.CurrEstab — \n Update the count of open sockets\n-
tcpmib.CurrEstab
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.CurrEstab
probe::tcpmib.InSegs — \n Count an incoming tcp segment\n-
tcpmib.InSegs
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.InSegs
probe::tcpmib.OutSegs — \n Count the sending of a TCP segment\n-
tcpmib.OutSegs
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.OutSegs
probe::tty.init — \n Called when a tty is being initalized\n-
tty.init
probe::tty.ioctl — \n called when a ioctl is request to the tty\n-
tty.ioctl
probe::tty.open — \n Called when a tty is opened\n-
tty.open
probe::tty.poll — \n Called when a tty device is being polled\n-
tty.poll
probe::tty.receive — \n called when a tty receives a message\n
tty.receive
driver_name
\n the driver name\n-
fp
\n- The flag buffer\n-
count
\n- The amount of characters received\n-
index
\n- The tty Index\n
id
\n the tty id\n
name
\n the name of the module file\n+
index
\n+ The tty Index\n+
count
\n+ The amount of characters received\n+
fp
\n+ The flag buffer\n
cp
\n the buffer that was received\n
probe::tty.register — \n Called when a tty device is registred\n-
tty.register
probe::tty.release — \n Called when the tty is closed\n-
tty.release
inode_number
\n- the inode number\n-
inode_flags
\n- the inode flags\n-
inode_state
\n+
tty.release
probe::tty.resize — \n Called when a terminal resize happens\n-
tty.resize
old_col
\n- the old col value\n+
tty.resize
name
\n+ the tty name\n+
old_xpixel
\n+ the old xpixel\n+
old_ypixel
\n+ the old ypixel\n+
new_row
\n+ the new row value\n+
new_col
\n+ the new col value\n
new_xpixel
\n the new xpixel value\n+
old_col
\n+ the old col value\n
new_ypixel
\n the new ypixel value\n-
name
\n- the tty name\n
old_row
\n the old row value\n-
old_xpixel
\n- the old xpixel\n-
new_col
\n- the new col value\n-
new_row
\n- the new row value\n-
old_ypixel
\n- the old ypixel\n
probe::tty.unregister — \n Called when a tty device is being unregistered\n-
tty.unregister
probe::tty.write — \n write to the tty line\n-
tty.write
probe::udp.disconnect.return — \n UDP has been disconnected successfully\n-
udp.disconnect.return
saddr
\n+
udp.disconnect.return
sport
\n+ UDP source port\n+
ret
\n+ Error code (0: no error) \n+
saddr
\n A string representing the source IP address\n+
dport
\n+ UDP destination port\n
daddr
\n A string representing the destination IP address\n-
ret
\n- Error code (0: no error) \n-
sport
\n- UDP source port\n
name
\n The name of this probe\n-
dport
\n- UDP destination port\n
family
\n IP address family\n
probe::udp.disconnect — \n Fires when a process requests for a UDP disconnection\n
udp.disconnect
flags
\n Flags (e.g. FIN, etc) \n-
daddr
\n- A string representing the destination IP address\n
saddr
\n A string representing the source IP address\n-
dport
\n- UDP destination port\n-
family
\n- IP address family\n
sock
\n Network socket used by the process\n-
name
\n- The name of this probe\n
sport
\n UDP source port\n+
name
\n+ The name of this probe\n+
family
\n+ IP address family\n+
daddr
\n+ A string representing the destination IP address\n+
dport
\n+ UDP destination port\n
probe::udp.recvmsg.return — \n Fires whenever an attempt to receive a UDP message received is completed\n-
udp.recvmsg.return
daddr
\n- A string representing the destination IP address\n-
saddr
\n- A string representing the source IP address\n-
dport
\n+
udp.recvmsg.return
dport
\n UDP destination port\n-
family
\n- IP address family\n-
size
\n- Number of bytes received by the process\n
name
\n The name of this probe\n+
family
\n+ IP address family\n+
daddr
\n+ A string representing the destination IP address\n
sport
\n UDP source port\n+
size
\n+ Number of bytes received by the process\n+
saddr
\n+ A string representing the source IP address\n
probe::udp.recvmsg — \n Fires whenever a UDP message is received\n
udp.recvmsg
saddr
\n A string representing the source IP address\n-
daddr
\n- A string representing the destination IP address\n+
sock
\n+ Network socket used by the process\n+
sport
\n+ UDP source port\n
size
\n Number of bytes received by the process\n
name
\n The name of this probe\n-
sport
\n- UDP source port\n
family
\n IP address family\n+
daddr
\n+ A string representing the destination IP address\n
dport
\n UDP destination port\n-
sock
\n- Network socket used by the process\n
probe::udp.sendmsg.return — \n Fires whenever an attempt to send a UDP message is completed\n-
udp.sendmsg.return
probe::udp.sendmsg — \n Fires whenever a process sends a UDP message\n
udp.sendmsg
size
\n Number of bytes sent by the process\n
sport
\n UDP source port\n-
name
\n- The name of this probe\n-
family
\n- IP address family\n-
dport
\n- UDP destination port\n
sock
\n Network socket used by the process \n
saddr
\n A string representing the source IP address\n+
dport
\n+ UDP destination port\n
daddr
\n A string representing the destination IP address\n+
family
\n+ IP address family\n+
name
\n+ The name of this probe\n
probe::vm.brk — \n Fires when a brk is requested (i.e. the heap will be resized)\n-
vm.brk
name
\n- name of the probe point\n-
address
\n+
vm.brk
probe::vm.kmalloc_node — \n Fires when kmalloc_node is requested\n-
vm.kmalloc_node
name
\n- name of the probe point\n-
caller_function
\n- name of the caller function\n-
bytes_alloc
\n- allocated Bytes\n-
call_site
\n+
vm.kmalloc_node
call_site
\n address of the function caling this kmemory function\n
gfp_flags
\n type of kmemory to allocate\n-
bytes_req
\n- requested Bytes\n
gfp_flag_name
\n type of kmemory to allocate(in string format)\n
ptr
\n pointer to the kmemory allocated\n+
name
\n+ name of the probe point\n+
bytes_alloc
\n+ allocated Bytes\n+
bytes_req
\n+ requested Bytes\n+
caller_function
\n+ name of the caller function\n
probe::vm.kmalloc — \n Fires when kmalloc is requested\n-
vm.kmalloc
ptr
\n- pointer to the kmemory allocated\n+
vm.kmalloc
call_site
\n+ address of the kmemory function\n+
gfp_flags
\n+ type of kmemory to allocate\n
gfp_flag_name
\n type of kmemory to allocate (in String format)\n+
ptr
\n+ pointer to the kmemory allocated\n+
name
\n+ name of the probe point\n+
caller_function
\n+ name of the caller function\n
bytes_req
\n requested Bytes\n-
gfp_flags
\n- type of kmemory to allocate\n
bytes_alloc
\n allocated Bytes\n-
caller_function
\n- name of the caller function\n-
call_site
\n- address of the kmemory function\n-
name
\n- name of the probe point\n
probe::vm.kmem_cache_alloc_node — \n Fires when kmem_cache_alloc_node is requested\n-
vm.kmem_cache_alloc_node
bytes_req
\n- requested Bytes\n+
vm.kmem_cache_alloc_node
gfp_flags
\n+ type of kmemory to allocate\n
gfp_flag_name
\n type of kmemory to allocate(in string format)\n-
ptr
\n- pointer to the kmemory allocated\n+
call_site
\n+ address of the function calling this kmemory function\n
name
\n name of the probe point\n
bytes_alloc
\n allocated Bytes\n+
bytes_req
\n+ requested Bytes\n
caller_function
\n name of the caller function\n-
call_site
\n- address of the function calling this kmemory function\n-
gfp_flags
\n- type of kmemory to allocate\n+
ptr
\n+ pointer to the kmemory allocated\n
probe::vm.kmem_cache_alloc — \n Fires when kmem_cache_alloc is requested\n-
vm.kmem_cache_alloc
gfp_flags
\n+
vm.kmem_cache_alloc
gfp_flag_name
\n+ type of kmemory to allocate(in string format)\n+
gfp_flags
\n type of kmemory to allocate\n-
name
\n- name of the probe point\n+
call_site
\n+ address of the function calling this kmemory function.\n
bytes_alloc
\n allocated Bytes\n+
bytes_req
\n+ requested Bytes\n
caller_function
\n name of the caller function.\n-
call_site
\n- address of the function calling this kmemory function.\n+
name
\n+ name of the probe point\n
ptr
\n pointer to the kmemory allocated\n-
bytes_req
\n- requested Bytes\n-
gfp_flag_name
\n- type of kmemory to allocate(in string format)\n
probe::vm.kmem_cache_free — \n Fires when kmem_cache_free is requested\n-
vm.kmem_cache_free
probe::vm.mmap — \n Fires when an mmap is requested\n-
vm.mmap
length
\n- the length of the memory segment \n-
address
\n+
vm.mmap
probe::vm.munmap — \n Fires when an munmap is requested\n-
vm.munmap
name
\n+
vm.munmap
probe::vm.pagefault — \n Records that a page fault occurred\n-
vm.pagefault
address
\n- the address of the faulting memory access; i.e. the address that caused the page fault\n-
name
\n- name of the probe point\n-
write_access
\n+
vm.pagefault
probe::vm.write_shared_copy — \n Page copy for shared page write\n-
vm.write_shared_copy
zero
\n+
vm.write_shared_copy
address
\n+ The address of the shared write\n+
zero
\n boolean indicating whether it is a zero page\n (can do a clear instead of a copy)\n-
address
\n- The address of the shared write\n
name
\n Name of the probe point\n
\n Fires when a write to a shared page requires a page copy. This is\n always preceded by a vm.write_shared.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-workqueue-create.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-workqueue-create.html", "unified_diff": "@@ -1,7 +1,7 @@\n
probe::workqueue.create — \n Creating a new workqueue\n-
workqueue.create
probe::workqueue.execute — \n Executing deferred work\n-
workqueue.execute