{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/r-b-build.foFFXSWe/b1/systemtap_5.1-4.1_amd64.changes", "source2": "/srv/reproducible-results/rbuild-debian/r-b-build.foFFXSWe/b2/systemtap_5.1-4.1_amd64.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -1,11 +1,11 @@\n \n 26afbcdec4efc45101bfbc46514ac0b5 8572 devel optional systemtap-client_5.1-4.1_amd64.deb\n 54e6af4b2f30d7a30e41830e63a8c459 640208 devel optional systemtap-common_5.1-4.1_amd64.deb\n b09819c75e53f8dca647ff767f7728e9 22005100 debug optional systemtap-dbgsym_5.1-4.1_amd64.deb\n- 49c156176a4663da9508324199044b51 2585596 doc optional systemtap-doc_5.1-4.1_amd64.deb\n+ 3ee5d465c742dcb4d0276e898db73e6b 2586576 doc optional systemtap-doc_5.1-4.1_amd64.deb\n 3d55d31c30b7a366f51dcea08656a4d6 1272296 debug optional systemtap-runtime-dbgsym_5.1-4.1_amd64.deb\n 05cc7166efd17d48ff092035f3876f7e 148996 devel optional systemtap-runtime_5.1-4.1_amd64.deb\n 185f590ae5052767753a639c960edd3f 18916 devel optional systemtap-sdt-dev_5.1-4.1_amd64.deb\n 8793ac636a18ff98f49622170607f905 2086312 debug optional systemtap-server-dbgsym_5.1-4.1_amd64.deb\n 95e0b126f98b5276089f7e9233612534 163352 devel optional systemtap-server_5.1-4.1_amd64.deb\n 430d4e4c6f798ec60748520a69cb61d0 1530100 devel optional systemtap_5.1-4.1_amd64.deb\n"}, {"source1": "systemtap-doc_5.1-4.1_amd64.deb", "source2": "systemtap-doc_5.1-4.1_amd64.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2025-02-28 20:20:54.000000 debian-binary\n--rw-r--r-- 0 0 0 54200 2025-02-28 20:20:54.000000 control.tar.xz\n--rw-r--r-- 0 0 0 2531204 2025-02-28 20:20:54.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 54192 2025-02-28 20:20:54.000000 control.tar.xz\n+-rw-r--r-- 0 0 0 2532192 2025-02-28 20:20:54.000000 data.tar.xz\n"}, {"source1": "control.tar.xz", "source2": "control.tar.xz", "unified_diff": null, "details": [{"source1": "control.tar", "source2": "control.tar", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "comments": ["Files differ"], "unified_diff": null}]}]}]}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "unified_diff": "@@ -1,29 +1,21 @@\n
probe::ioblock.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock.end
error
\n+
ioblock.end
sector
\n+ beginning sector for the entire bio\n+
opf
\n+ operations and flags\n+
devname
\n+ block device name\n+
error
\n 0 on success\n
vcnt
\n bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
bytes_done
\n- number of bytes transferred\n-
idx
\n- offset into the bio vector array\n
rw
\n binary trace for read/write request\n-
devname
\n- block device name\n-
name
\n- name of the probe point\n-
sector
\n- beginning sector for the entire bio\n-
hw_segments
\n- number of segments after physical and DMA remapping hardware coalescing is performed\n-
opf
\n- operations and flags\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n@@ -32,10 +24,18 @@\n BIO_EOPNOTSUPP 7 not supported\n
ino
\n i-node number of the mapped file\n
phys_segments
\n number of segments in this bio after physical address coalescing is performed.\n
size
\n total size in bytes\n+
name
\n+ name of the probe point\n+
idx
\n+ offset into the bio vector array\n+
hw_segments
\n+ number of segments after physical and DMA remapping hardware coalescing is performed\n+
bytes_done
\n+ number of bytes transferred\n
probe::ioblock.request — \n Fires whenever making a generic block I/O request.\n-
ioblock.request
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
idx
\n- offset into the bio vector array\n+
ioblock.request
devname
\n+ block device name\n+
sector
\n+ beginning sector for the entire bio\n+
opf
\n+ operations and flags\n
vcnt
\n bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n-
devname
\n- block device name\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
name
\n- name of the probe point\n-
bdev
\n- target block device\n
rw
\n binary trace for read/write request\n-
opf
\n- operations and flags\n-
sector
\n- beginning sector for the entire bio\n-
hw_segments
\n- number of segments after physical and DMA remapping hardware coalescing is performed\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
ino
\n+ i-node number of the mapped file\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid \n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n
size
\n total size in bytes\n-
ino
\n- i-node number of the mapped file\n
phys_segments
\n number of segments in this bio after physical address coalescing is performed\n+
idx
\n+ offset into the bio vector array\n+
name
\n+ name of the probe point\n+
hw_segments
\n+ number of segments after physical and DMA remapping hardware coalescing is performed\n+
bdev
\n+ target block device\n
probe::ioblock_trace.bounce — \n Fires whenever a buffer bounce is needed for at least one page of a block IO request.\n-
ioblock_trace.bounce
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
bytes_done
\n- number of bytes transferred\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
rw
\n- binary trace for read/write request\n-
bdev
\n- target block device\n-
devname
\n- device for which a buffer bounce was needed.\n+
ioblock_trace.bounce
size
\n+ total size in bytes\n+
ino
\n+ i-node number of the mapped file\n
bdev_contains
\n points to the device object which contains the partition (when bio structure represents a partition)\n-
name
\n- name of the probe point\n-
opf
\n- operations and flags\n-
sector
\n- beginning sector for the entire bio\n+
q
\n+ request queue on which this bio was queued.\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
ino
\n- i-node number of the mapped file\n-
q
\n- request queue on which this bio was queued.\n-
size
\n- total size in bytes\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
bdev
\n+ target block device\n+
bytes_done
\n+ number of bytes transferred\n+
name
\n+ name of the probe point\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
opf
\n+ operations and flags\n+
sector
\n+ beginning sector for the entire bio\n+
devname
\n+ device for which a buffer bounce was needed.\n+
rw
\n+ binary trace for read/write request\n
probe::ioblock_trace.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock_trace.end
name
\n- name of the probe point\n+
ioblock_trace.end
rw
\n+ binary trace for read/write request\n+
sector
\n+ beginning sector for the entire bio\n+
opf
\n+ operations and flags\n
devname
\n block device name\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
bdev
\n- target block device\n-
rw
\n- binary trace for read/write request\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
name
\n+ name of the probe point\n
idx
\n offset into the bio vector array\n phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n
bytes_done
\n number of bytes transferred\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
size
\n- total size in bytes\n+
bdev
\n+ target block device\n
ino
\n i-node number of the mapped file\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n
q
\n request queue on which this bio was queued.\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
opf
\n- operations and flags\n-
sector
\n- beginning sector for the entire bio\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
size
\n+ total size in bytes\n
probe::ioblock_trace.request — \n Fires just as a generic block I/O request is created for a bio.\n-
ioblock_trace.request
vcnt
\n+
ioblock_trace.request
rw
\n+ binary trace for read/write request\n+
vcnt
\n bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n+
devname
\n+ block device name\n+
sector
\n+ beginning sector for the entire bio\n+
opf
\n+ operations and flags\n+
bdev
\n+ target block device\n+
bytes_done
\n+ number of bytes transferred\n
idx
\n offset into the bio vector array\n phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
bytes_done
\n- number of bytes transferred\n-
bdev
\n- target block device\n-
rw
\n- binary trace for read/write request\n
name
\n name of the probe point\n-
devname
\n- block device name\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n+
size
\n+ total size in bytes\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
sector
\n- beginning sector for the entire bio\n-
opf
\n- operations and flags\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n
q
\n request queue on which this bio was queued.\n
ino
\n i-node number of the mapped file\n-
size
\n- total size in bytes\n
probe::ioscheduler.elv_add_request.kp — \n kprobe based probe to indicate that a request was added to the request queue\n-
ioscheduler.elv_add_request.kp
name
\n- Name of the probe point\n-
disk_major
\n- Disk major number of the request\n-
q
\n+
ioscheduler.elv_add_request.kp
q
\n pointer to request queue\n+
rq_flags
\n+ Request flags\n
disk_minor
\n Disk minor number of the request\n+
disk_major
\n+ Disk major number of the request\n+
name
\n+ Name of the probe point\n
rq
\n Address of the request\n-
rq_flags
\n- Request flags\n
elevator_name
\n The type of I/O elevator currently enabled\n
probe::ioscheduler.elv_add_request.tp — \n tracepoint based probe to indicate a request is added to the request queue.\n-
ioscheduler.elv_add_request.tp
disk_major
\n+
ioscheduler.elv_add_request.tp
rq
\n+ Address of request.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n+
disk_major
\n Disk major no of request.\n
name
\n Name of the probe point\n-
q
\n- Pointer to request queue.\n-
rq
\n- Address of request.\n
disk_minor
\n Disk minor number of request.\n+
q
\n+ Pointer to request queue.\n
rq_flags
\n Request flags.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n
probe::ioscheduler.elv_add_request — \n probe to indicate request is added to the request queue.\n-
ioscheduler.elv_add_request
q
\n- Pointer to request queue.\n-
disk_major
\n- Disk major no of request.\n+
ioscheduler.elv_add_request
probe::ioscheduler.elv_completed_request — \n Fires when a request is completed\n-
ioscheduler.elv_completed_request
rq_flags
\n+
ioscheduler.elv_completed_request
disk_minor
\n+ Disk minor number of the request\n+
rq_flags
\n Request flags\n
elevator_name
\n The type of I/O elevator currently enabled\n-
disk_major
\n- Disk major number of the request\n-
name
\n- Name of the probe point\n
rq
\n Address of the request\n-
disk_minor
\n- Disk minor number of the request\n+
name
\n+ Name of the probe point\n+
disk_major
\n+ Disk major number of the request\n
probe::ioscheduler.elv_next_request.return — \n Fires when a request retrieval issues a return signal\n-
ioscheduler.elv_next_request.return
probe::ioscheduler.elv_next_request — \n Fires when a request is retrieved from the request queue\n-
ioscheduler.elv_next_request
probe::ioscheduler_trace.elv_abort_request — \n Fires when a request is aborted.\n-
ioscheduler_trace.elv_abort_request
disk_major
\n+
ioscheduler_trace.elv_abort_request
rq_flags
\n+ Request flags.\n+
disk_minor
\n+ Disk minor number of request.\n+
disk_major
\n Disk major no of request.\n
name
\n Name of the probe point\n-
disk_minor
\n- Disk minor number of request.\n
rq
\n Address of request.\n-
rq_flags
\n- Request flags.\n
elevator_name
\n The type of I/O elevator currently enabled.\n
probe::ioscheduler_trace.elv_completed_request — \n Fires when a request is\n-
ioscheduler_trace.elv_completed_request
name
\n- Name of the probe point\n+
ioscheduler_trace.elv_completed_request
rq
\n+ Address of request.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n
disk_major
\n Disk major no of request.\n-
rq
\n- Address of request.\n-
disk_minor
\n- Disk minor number of request.\n+
name
\n+ Name of the probe point\n
rq_flags
\n Request flags.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n+
disk_minor
\n+ Disk minor number of request.\n
probe::ioscheduler_trace.elv_issue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_issue_request
name
\n- Name of the probe point\n+
ioscheduler_trace.elv_issue_request
rq
\n+ Address of request.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n
disk_major
\n Disk major no of request.\n+
name
\n+ Name of the probe point\n
disk_minor
\n Disk minor number of request.\n-
rq
\n- Address of request.\n
rq_flags
\n Request flags.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n
probe::ioscheduler_trace.elv_requeue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_requeue_request
name
\n+
ioscheduler_trace.elv_requeue_request
rq_flags
\n+ Request flags.\n+
disk_minor
\n+ Disk minor number of request.\n+
name
\n Name of the probe point\n
disk_major
\n Disk major no of request.\n-
disk_minor
\n- Disk minor number of request.\n-
rq
\n- Address of request.\n
elevator_name
\n The type of I/O elevator currently enabled.\n-
rq_flags
\n- Request flags.\n+
rq
\n+ Address of request.\n
probe::ioscheduler_trace.plug — \n Fires when a request queue is plugged;\n-
ioscheduler_trace.plug
probe::ioscheduler_trace.unplug_timer — \n Fires when unplug timer associated\n-
ioscheduler_trace.unplug_timer
probe::ipmib.ForwDatagrams — \n Count forwarded packet\n-
ipmib.ForwDatagrams
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.ForwDatagrams
probe::ipmib.FragOKs — \n Count datagram fragmented successfully\n-
ipmib.FragOKs
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.FragOKs
probe::ipmib.InAddrErrors — \n Count arriving packets with an incorrect address\n-
ipmib.InAddrErrors
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.InAddrErrors
probe::ipmib.InReceives — \n Count an arriving packet\n-
ipmib.InReceives
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.InReceives
probe::ipmib.OutRequests — \n Count a request to send a packet\n-
ipmib.OutRequests
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.OutRequests
probe::irq_handler.entry — \n Execution of interrupt handler starting\n-
irq_handler.entry
dev_id
\n- Cookie to identify device\n-
flags
\n- Flags for IRQ handler\n-
thread
\n- thread pointer for threaded interrupts\n-
dev_name
\n- name of device\n+
irq_handler.entry
thread_fn
\n+ interrupt handler function for threaded interrupts\n+
flags_str
\n+ symbolic string representation of IRQ flags\n+
next_irqaction
\n+ pointer to next irqaction for shared interrupts\n
dir
\n pointer to the proc/irq/NN/name entry\n-
thread_fn
\n- interrupt handler function for threaded interrupts\n+
dev_name
\n+ name of device\n
action
\n struct irqaction* for this interrupt num\n
thread_flags
\n Flags related to thread\n-
next_irqaction
\n- pointer to next irqaction for shared interrupts\n+
thread
\n+ thread pointer for threaded interrupts\n
irq
\n irq number\n-
flags_str
\n- symbolic string representation of IRQ flags\n+
flags
\n+ Flags for IRQ handler\n+
dev_id
\n+ Cookie to identify device\n
handler
\n interrupt handler function\n
probe::irq_handler.exit — \n Execution of interrupt handler completed\n-
irq_handler.exit
dev_id
\n- Cookie to identify device\n-
thread
\n- thread pointer for threaded interrupts\n-
flags
\n- flags for IRQ handler\n-
dev_name
\n- name of device\n-
dir
\n+
irq_handler.exit
dir
\n pointer to the proc/irq/NN/name entry\n-
thread_fn
\n- interrupt handler function for threaded interrupts\n-
action
\n- struct irqaction*\n
next_irqaction
\n pointer to next irqaction for shared interrupts\n-
thread_flags
\n- Flags related to thread\n-
irq
\n- interrupt number\n-
ret
\n- return value of the handler\n
flags_str
\n symbolic string representation of IRQ flags\n+
thread_fn
\n+ interrupt handler function for threaded interrupts\n+
irq
\n+ interrupt number\n
handler
\n interrupt handler function that was executed\n+
dev_id
\n+ Cookie to identify device\n+
flags
\n+ flags for IRQ handler\n+
thread
\n+ thread pointer for threaded interrupts\n+
thread_flags
\n+ Flags related to thread\n+
ret
\n+ return value of the handler\n+
action
\n+ struct irqaction*\n+
dev_name
\n+ name of device\n
probe::kprocess.create — \n Fires whenever a new process or thread is successfully created\n-
kprocess.create
new_tid
\n- The TID of the newly created task\n-
new_pid
\n+
kprocess.create
probe::kprocess.exec_complete — \n Return from exec to a new program\n
kprocess.exec_complete
name
\n Name of the system call (“execve”) (SystemTap v2.5+)\n-
success
\n- A boolean indicating whether the exec was successful\n
errno
\n The error number resulting from the exec\n
retstr
\n A string representation of errno (SystemTap v2.5+)\n+
success
\n+ A boolean indicating whether the exec was successful\n
probe::kprocess.exec — \n Attempt to exec to a new program\n-
kprocess.exec
args
\n+
kprocess.exec
filename
\n+ The path to the new executable\n+
args
\n The arguments to pass to the new executable, including\n the 0th arg (SystemTap v2.5+)\n-
filename
\n- The path to the new executable\n-
name
\n- Name of the system call (“execve”) (SystemTap v2.5+)\n
argstr
\n A string containing the filename followed by the\n arguments to pass, excluding 0th arg (SystemTap v2.5+)\n+
name
\n+ Name of the system call (“execve”) (SystemTap v2.5+)\n
probe::kprocess.release — \n Process released\n-
kprocess.release
released_pid
\n- PID of the process being released\n-
released_tid
\n- TID of the task being released\n-
pid
\n+
kprocess.release
pid
\n Same as released_pid
for compatibility (deprecated)\n
task
\n A task handle to the process being released\n+
released_pid
\n+ PID of the process being released\n+
released_tid
\n+ TID of the task being released\n
\n The context of the parent, if it wanted notification of this process'\n termination, else the context of the process itself.\n
\n Fires when a process is released from the kernel. This always follows a\n kprocess.exit, though it may be delayed somewhat if the process waits in a\n zombie state.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-linuxmib-DelayedACKs.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-linuxmib-DelayedACKs.html", "unified_diff": "@@ -1,12 +1,12 @@\n
probe::linuxmib.DelayedACKs — \n Count of delayed acks\n-
linuxmib.DelayedACKs
sk
\n- Pointer to the struct sock being acted on\n-
op
\n+
linuxmib.DelayedACKs
probe::netdev.change_mac — \n Called when the netdev_name has the MAC changed\n-
netdev.change_mac
probe::netdev.change_mtu — \n Called when the netdev MTU is changed\n-
netdev.change_mtu
probe::netdev.change_rx_flag — \n Called when the device RX flag will be changed\n-
netdev.change_rx_flag
probe::netdev.hard_transmit — \n Called when the devices is going to TX (hard)\n-
netdev.hard_transmit
probe::netdev.receive — \n Data received from network device.\n-
netdev.receive
probe::netdev.rx — \n Called when the device is going to receive a packet\n-
netdev.rx
probe::netdev.set_promiscuity — \n Called when the device enters/leaves promiscuity\n-
netdev.set_promiscuity
probe::netdev.transmit — \n Network device transmitting buffer\n-
netdev.transmit
protocol
\n- The protocol of this packet(defined in include/linux/if_ether.h).\n+
netdev.transmit
probe::netfilter.arp.forward — \n - Called for each ARP packet to be forwarded\n-
netfilter.arp.forward
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
ar_op
\n- ARP opcode (command)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
ar_sip
\n+
netfilter.arp.forward
ar_sip
\n Ethernet+IP only (ar_pro==0x800): source IP address\n-
ar_hrd
\n- Format of hardware address\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
data_str
\n- A string representing the packet buffer contents\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n
ar_pln
\n Length of protocol address\n-
ar_data
\n- Address of ARP packet data region (after the header)\n+
ar_hrd
\n+ Format of hardware address\n
ar_sha
\n Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n-
indev_name
\n- Name of network device packet was received on (if known)\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
pf
\n- Protocol family -- always “arp”\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
arphdr
\n Address of ARP header\n-
ar_hln
\n- Length of hardware address\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
pf
\n+ Protocol family -- always “arp”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
outdev_name
\n Name of network device packet will be routed to (if known)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
ar_op
\n+ ARP opcode (command)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
data_str
\n+ A string representing the packet buffer contents\n
ar_pro
\n Format of protocol address\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
ar_hln
\n+ Length of hardware address\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
probe::netfilter.arp.in — \n - Called for each incoming ARP packet\n-
netfilter.arp.in
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
ar_op
\n- ARP opcode (command)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
ar_pln
\n- Length of protocol address\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
data_str
\n- A string representing the packet buffer contents\n+
netfilter.arp.in
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
ar_hrd
\n- Format of hardware address\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n
ar_hln
\n Length of hardware address\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n
ar_pro
\n Format of protocol address\n-
ar_data
\n- Address of ARP packet data region (after the header)\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
data_str
\n+ A string representing the packet buffer contents\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
ar_op
\n+ ARP opcode (command)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
ar_tip
\n Ethernet+IP only (ar_pro==0x800): target IP address\n
pf
\n Protocol family -- always “arp”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n
arphdr
\n Address of ARP header\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
ar_hrd
\n+ Format of hardware address\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
ar_pln
\n+ Length of protocol address\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n
probe::netfilter.arp.out — \n - Called for each outgoing ARP packet\n-
netfilter.arp.out
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n-
ar_op
\n- ARP opcode (command)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
outdev
\n+
netfilter.arp.out
outdev
\n Address of net_device representing output device, 0 if unknown\n-
ar_pln
\n- Length of protocol address\n-
data_str
\n- A string representing the packet buffer contents\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
ar_hrd
\n Format of hardware address\n+
arphdr
\n+ Address of ARP header\n
ar_sip
\n Ethernet+IP only (ar_pro==0x800): source IP address\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
ar_pln
\n+ Length of protocol address\n
outdev_name
\n Name of network device packet will be routed to (if known)\n-
ar_pro
\n- Format of protocol address\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
ar_hln
\n- Length of hardware address\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n
pf
\n Protocol family -- always “arp”\n-
arphdr
\n- Address of ARP header\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
ar_pro
\n+ Format of protocol address\n+
data_str
\n+ A string representing the packet buffer contents\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
ar_op
\n+ ARP opcode (command)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
ar_data
\n Address of ARP packet data region (after the header)\n
indev_name
\n Name of network device packet was received on (if known)\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
ar_hln
\n+ Length of hardware address\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
probe::netfilter.bridge.forward — \n Called on an incoming bridging packet destined for some other computer\n-
netfilter.bridge.forward
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_poid
\n- Port identifier\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_prid
\n- Protocol identifier\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
br_bid
\n- Identity of bridge\n-
indev_name
\n+
netfilter.bridge.forward
indev_name
\n Name of network device packet was received on (if known)\n
llcproto_stp
\n Constant used to signify Bridge Spanning Tree Protocol packet\n-
pf
\n- Protocol family -- always “bridge”\n-
br_type
\n- BPDU type\n-
data_str
\n- A string representing the packet buffer contents\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
br_rmac
\n- Root bridge MAC address\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_flags
\n- BPDU flags\n-
br_cost
\n- Total cost from transmitting bridge to root\n+
br_vid
\n+ Protocol version identifier\n
nf_accept
\n Constant used to signify an 'accept' verdict\n+
br_prid
\n+ Protocol identifier\n+
br_rmac
\n+ Root bridge MAC address\n+
protocol
\n+ Packet protocol\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_max
\n- Max age in 1/256 secs\n-
br_msg
\n- Message age in 1/256 secs\n+
br_rid
\n+ Identity of root bridge\n
br_mac
\n Bridge MAC address\n-
brhdr
\n- Address of bridge header\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n-
br_vid
\n- Protocol version identifier\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
protocol
\n- Packet protocol\n-
br_rid
\n- Identity of root bridge\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_poid
\n+ Port identifier\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
br_htime
\n+ Hello time in 1/256 secs\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_msg
\n+ Message age in 1/256 secs\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
brhdr
\n+ Address of bridge header\n+
pf
\n+ Protocol family -- always “bridge”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
br_fd
\n Forward delay in 1/256 secs\n+
br_max
\n+ Max age in 1/256 secs\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
br_flags
\n+ BPDU flags\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
br_type
\n+ BPDU type\n+
br_bid
\n+ Identity of bridge\n
probe::netfilter.bridge.local_in — \n Called on a bridging packet destined for the local computer\n-
netfilter.bridge.local_in
nf_stolen
\n+
netfilter.bridge.local_in
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
br_poid
\n+ Port identifier\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
nf_stolen
\n Constant used to signify a 'stolen' verdict\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n
length
\n The length of the packet buffer contents, in bytes\n-
brhdr
\n- Address of bridge header\n-
br_vid
\n- Protocol version identifier\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
br_fd
\n- Forward delay in 1/256 secs\n-
protocol
\n- Packet protocol\n-
br_rid
\n- Identity of root bridge\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_max
\n- Max age in 1/256 secs\n-
br_msg
\n- Message age in 1/256 secs\n
br_mac
\n Bridge MAC address\n-
br_type
\n- BPDU type\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_rmac
\n- Root bridge MAC address\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
data_str
\n- A string representing the packet buffer contents\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
br_flags
\n- BPDU flags\n-
br_cost
\n- Total cost from transmitting bridge to root\n+
br_rid
\n+ Identity of root bridge\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_poid
\n- Port identifier\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n+
br_rmac
\n+ Root bridge MAC address\n+
protocol
\n+ Packet protocol\n
br_prid
\n Protocol identifier\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
br_vid
\n+ Protocol version identifier\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n
indev_name
\n Name of network device packet was received on (if known)\n
br_bid
\n Identity of bridge\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
br_type
\n+ BPDU type\n+
br_flags
\n+ BPDU flags\n+
br_max
\n+ Max age in 1/256 secs\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
br_fd
\n+ Forward delay in 1/256 secs\n
pf
\n Protocol family -- always “bridge”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
brhdr
\n+ Address of bridge header\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_htime
\n+ Hello time in 1/256 secs\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
probe::netfilter.bridge.local_out — \n Called on a bridging packet coming from a local process\n-
netfilter.bridge.local_out
nf_repeat
\n+
netfilter.bridge.local_out
data_str
\n+ A string representing the packet buffer contents\n+
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_prid
\n- Protocol identifier\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n
br_poid
\n Port identifier\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
pf
\n- Protocol family -- always “bridge”\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_bid
\n- Identity of bridge\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
data_str
\n- A string representing the packet buffer contents\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_rmac
\n- Root bridge MAC address\n-
br_type
\n- BPDU type\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
br_flags
\n- BPDU flags\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
br_max
\n- Max age in 1/256 secs\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
br_mac
\n Bridge MAC address\n-
br_msg
\n- Message age in 1/256 secs\n-
br_vid
\n- Protocol version identifier\n-
brhdr
\n- Address of bridge header\n-
length
\n- The length of the packet buffer contents, in bytes\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
length
\n+ The length of the packet buffer contents, in bytes\n
protocol
\n Packet protocol\n+
br_rmac
\n+ Root bridge MAC address\n
br_rid
\n Identity of root bridge\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
br_prid
\n+ Protocol identifier\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
br_vid
\n+ Protocol version identifier\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
br_type
\n+ BPDU type\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
br_max
\n+ Max age in 1/256 secs\n+
br_flags
\n+ BPDU flags\n+
br_bid
\n+ Identity of bridge\n
br_fd
\n Forward delay in 1/256 secs\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
pf
\n+ Protocol family -- always “bridge”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
brhdr
\n+ Address of bridge header\n+
br_msg
\n+ Message age in 1/256 secs\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_htime
\n+ Hello time in 1/256 secs\n
probe::netfilter.bridge.post_routing — \n - Called before a bridging packet hits the wire\n-
netfilter.bridge.post_routing
br_max
\n- Max age in 1/256 secs\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_mac
\n- Bridge MAC address\n-
br_msg
\n- Message age in 1/256 secs\n-
br_vid
\n- Protocol version identifier\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n-
brhdr
\n- Address of bridge header\n-
br_fd
\n- Forward delay in 1/256 secs\n-
br_rid
\n- Identity of root bridge\n-
protocol
\n- Packet protocol\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
br_prid
\n- Protocol identifier\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n+
netfilter.bridge.post_routing
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
pf
\n+ Protocol family -- always “bridge”\n
outdev_name
\n Name of network device packet will be routed to (if known)\n-
br_poid
\n- Port identifier\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
brhdr
\n+ Address of bridge header\n+
br_msg
\n+ Message age in 1/256 secs\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
pf
\n- Protocol family -- always “bridge”\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
br_bid
\n- Identity of bridge\n
br_htime
\n Hello time in 1/256 secs\n-
br_rmac
\n- Root bridge MAC address\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
data_str
\n- A string representing the packet buffer contents\n
br_type
\n BPDU type\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
br_max
\n+ Max age in 1/256 secs\n+
br_flags
\n+ BPDU flags\n+
br_bid
\n+ Identity of bridge\n+
br_fd
\n+ Forward delay in 1/256 secs\n+
protocol
\n+ Packet protocol\n+
br_rmac
\n+ Root bridge MAC address\n+
br_rid
\n+ Identity of root bridge\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
br_prid
\n+ Protocol identifier\n
nf_accept
\n Constant used to signify an 'accept' verdict\n+
br_vid
\n+ Protocol version identifier\n+
data_str
\n+ A string representing the packet buffer contents\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
br_poid
\n+ Port identifier\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
br_mac
\n+ Bridge MAC address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n
br_cost
\n Total cost from transmitting bridge to root\n-
br_flags
\n- BPDU flags\n+
length
\n+ The length of the packet buffer contents, in bytes\n
probe::netfilter.bridge.pre_routing — \n - Called before a bridging packet is routed\n-
netfilter.bridge.pre_routing
br_max
\n+
netfilter.bridge.pre_routing
br_bid
\n+ Identity of bridge\n+
br_max
\n Max age in 1/256 secs\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
br_mac
\n- Bridge MAC address\n-
br_msg
\n- Message age in 1/256 secs\n-
br_vid
\n- Protocol version identifier\n-
brhdr
\n- Address of bridge header\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n-
br_rid
\n- Identity of root bridge\n-
protocol
\n- Packet protocol\n+
br_flags
\n+ BPDU flags\n+
br_type
\n+ BPDU type\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
br_fd
\n Forward delay in 1/256 secs\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_prid
\n- Protocol identifier\n+
brhdr
\n+ Address of bridge header\n
outdev_name
\n Name of network device packet will be routed to (if known)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
pf
\n+ Protocol family -- always “bridge”\n+
br_htime
\n+ Hello time in 1/256 secs\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
br_msg
\n+ Message age in 1/256 secs\n
br_poid
\n Port identifier\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
pf
\n- Protocol family -- always “bridge”\n-
br_bid
\n- Identity of bridge\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
data_str
\n A string representing the packet buffer contents\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
br_rmac
\n- Root bridge MAC address\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_type
\n- BPDU type\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
br_flags
\n- BPDU flags\n+
length
\n+ The length of the packet buffer contents, in bytes\n
br_cost
\n Total cost from transmitting bridge to root\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
br_mac
\n+ Bridge MAC address\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
br_rid
\n+ Identity of root bridge\n+
br_rmac
\n+ Root bridge MAC address\n+
protocol
\n+ Packet protocol\n+
br_vid
\n+ Protocol version identifier\n+
br_prid
\n+ Protocol identifier\n
nf_accept
\n Constant used to signify an 'accept' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n
probe::netfilter.ip.forward — \n Called on an incoming IP packet addressed to some other computer\n
netfilter.ip.forward
nf_accept
\n Constant used to signify an 'accept' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
daddr
\n A string representing the destination IP address\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
saddr
\n- A string representing the source IP address\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
family
\n+ IP address family\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
data_str
\n A string representing the packet buffer contents\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
family
\n- IP address family\n
sport
\n TCP or UDP source port (ipv4 only)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
saddr
\n+ A string representing the source IP address\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
iphdr
\n Address of IP header\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
probe::netfilter.ip.local_in — \n Called on an incoming IP packet addressed to the local computer\n-
netfilter.ip.local_in
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
daddr
\n- A string representing the destination IP address\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
saddr
\n- A string representing the source IP address\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
data_str
\n- A string representing the packet buffer contents\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
netfilter.ip.local_in
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
data_str
\n+ A string representing the packet buffer contents\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
sport
\n- TCP or UDP source port (ipv4 only)\n
family
\n IP address family\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
length
\n The length of the packet buffer contents, in bytes\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n
rst
\n TCP RST flag (if protocol is TCP; ipv4 only)\n+
daddr
\n+ A string representing the destination IP address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
syn
\n TCP SYN flag (if protocol is TCP; ipv4 only)\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
iphdr
\n- Address of IP header\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n+
iphdr
\n+ Address of IP header\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
saddr
\n+ A string representing the source IP address\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
probe::netfilter.ip.local_out — \n Called on an outgoing IP packet\n-
netfilter.ip.local_out
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
iphdr
\n- Address of IP header\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
nf_drop
\n+
netfilter.ip.local_out
nf_drop
\n Constant used to signify a 'drop' verdict\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n
family
\n IP address family\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
daddr
\n+ A string representing the destination IP address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n
psh
\n TCP PSH flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
data_str
\n+ A string representing the packet buffer contents\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
indev_name
\n Name of network device packet was received on (if known)\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
saddr
\n- A string representing the source IP address\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
data_str
\n- A string representing the packet buffer contents\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
daddr
\n- A string representing the destination IP address\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
iphdr
\n+ Address of IP header\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
saddr
\n+ A string representing the source IP address\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
probe::netfilter.ip.post_routing — \n Called immediately before an outgoing IP packet leaves the computer\n-
netfilter.ip.post_routing
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
iphdr
\n- Address of IP header\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
family
\n- IP address family\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
protocol
\n+
netfilter.ip.post_routing
protocol
\n Packet protocol from driver (ipv4 only)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n
indev_name
\n Name of network device packet was received on (if known)\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
data_str
\n+ A string representing the packet buffer contents\n
psh
\n TCP PSH flag (if protocol is TCP; ipv4 only)\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
family
\n+ IP address family\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n
daddr
\n A string representing the destination IP address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
urg
\n TCP URG flag (if protocol is TCP; ipv4 only)\n
saddr
\n A string representing the source IP address\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
data_str
\n- A string representing the packet buffer contents\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
iphdr
\n+ Address of IP header\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n
probe::netfilter.ip.pre_routing — \n Called before an IP packet is routed\n-
netfilter.ip.pre_routing
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
netfilter.ip.pre_routing
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
psh
\n TCP PSH flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
data_str
\n+ A string representing the packet buffer contents\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
daddr
\n+ A string representing the destination IP address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
family
\n+ IP address family\n+
saddr
\n+ A string representing the source IP address\n
pf
\n Protocol family - either 'ipv4' or 'ipv6'\n-
indev_name
\n- Name of network device packet was received on (if known)\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
data_str
\n- A string representing the packet buffer contents\n-
saddr
\n- A string representing the source IP address\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
urg
\n TCP URG flag (if protocol is TCP; ipv4 only)\n-
daddr
\n- A string representing the destination IP address\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n
iphdr
\n Address of IP header\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
family
\n- IP address family\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n
probe::nfs.aop.readahead — \n NFS client reading multiple pages\n-
nfs.aop.readahead
size
\n- number of pages attempted to read in this execution\n-
rpages
\n+
nfs.aop.readahead
rpages
\n read size (in pages)\n-
file
\n- filp argument\n+
size
\n+ number of pages attempted to read in this execution\n
nr_pages
\n number of pages attempted to read in this execution\n
ino
\n inode number\n-
dev
\n- device identifier\n+
file
\n+ filp argument\n
rsize
\n read size (in bytes)\n+
dev
\n+ device identifier\n
probe::nfs.aop.readpage — \n NFS client synchronously reading a page\n-
nfs.aop.readpage
file
\n- file argument\n-
size
\n+
nfs.aop.readpage
size
\n number of pages to be read in this execution \n-
sb_flag
\n- super block flags\n-
ino
\n- inode number\n+
i_flag
\n+ file flags\n+
rsize
\n+ read size (in bytes)\n+
file
\n+ file argument\n
page_index
\n offset within mapping, can used a page identifier\n and position identifier in the page frame\n
dev
\n device identifier\n
i_size
\n file length in bytes\n-
rsize
\n- read size (in bytes)\n-
i_flag
\n- file flags\n
__page
\n the address of page\n+
sb_flag
\n+ super block flags\n+
ino
\n+ inode number\n
probe::nfs.aop.readpages — \n NFS client reading multiple pages\n-
nfs.aop.readpages
dev
\n- device identifier\n-
rsize
\n- read size (in bytes)\n-
ino
\n+
nfs.aop.readpages
ino
\n inode number \n
file
\n filp argument\n+
rsize
\n+ read size (in bytes)\n+
dev
\n+ device identifier\n
nr_pages
\n number of pages attempted to read in this execution\n-
rpages
\n- read size (in pages)\n
size
\n number of pages attempted to read in this execution\n+
rpages
\n+ read size (in pages)\n
probe::nfs.aop.release_page — \n NFS client releasing page\n-
nfs.aop.release_page
__page
\n- the address of page\n-
size
\n+
nfs.aop.release_page
probe::nfs.aop.write_begin — \n NFS client begin to write data\n-
nfs.aop.write_begin
__page
\n- the address of page\n-
ino
\n- inode number \n-
page_index
\n+
nfs.aop.write_begin
page_index
\n offset within mapping, can used a page identifier\n and position identifier in the page frame\n-
size
\n- write bytes\n-
offset
\n- start address of this write operation \n
dev
\n device identifier\n
to
\n end address of this write operation \n+
offset
\n+ start address of this write operation \n+
__page
\n+ the address of page\n+
ino
\n+ inode number \n+
size
\n+ write bytes\n
\n Occurs when write operation occurs on nfs. It prepare a page for writing,\n look for a request corresponding to the page. If there\n is one, and it belongs to another file, it flush it out\n before it tries to copy anything into the page. \n Also do the same if it finds a request from an existing\n dropped page\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "unified_diff": "@@ -1,29 +1,29 @@\n
probe::nfs.aop.write_end — \n NFS client complete writing data\n-
nfs.aop.write_end
to
\n- end address of this write operation\n-
dev
\n- device identifier\n-
page_index
\n- offset within mapping, can used a page identifier and position identifier in the page frame\n-
ino
\n- inode number\n-
offset
\n- start address of this write operation\n-
sb_flag
\n+
nfs.aop.write_end
sb_flag
\n super block flags\n
size
\n write bytes\n+
i_size
\n+ file length in bytes\n
__page
\n the address of page\n+
to
\n+ end address of this write operation\n+
offset
\n+ start address of this write operation\n+
ino
\n+ inode number\n+
dev
\n+ device identifier\n+
page_index
\n+ offset within mapping, can used a page identifier and position identifier in the page frame\n
i_flag
\n file flags\n-
i_size
\n- file length in bytes\n
probe::nfs.aop.writepage — \n NFS client writing a mapped page to the NFS server\n-
nfs.aop.writepage
size
\n- number of pages to be written in this execution\n+
nfs.aop.writepage
for_kupdate
\n+ a flag of writeback_control,\n+ indicates if it's a kupdate writeback\n
sb_flag
\n super block flags\n-
ino
\n- inode number \n-
page_index
\n- offset within mapping,\n- can used a page identifier and position identifier in the page frame\n+
i_state
\n+ inode state flags\n+
wsize
\n+ write size\n+
size
\n+ number of pages to be written in this execution\n
for_reclaim
\n a flag of writeback_control,\n indicates if it's invoked from the page allocator\n+
ino
\n+ inode number \n
i_size
\n file length in bytes\n-
i_flag
\n- file flags\n
__page
\n the address of page\n
dev
\n device identifier\n-
i_state
\n- inode state flags\n-
for_kupdate
\n- a flag of writeback_control,\n- indicates if it's a kupdate writeback\n-
wsize
\n- write size\n+
page_index
\n+ offset within mapping,\n+ can used a page identifier and position identifier in the page frame\n+
i_flag
\n+ file flags\n
probe::nfs.aop.writepages — \n NFS client writing several dirty pages to the NFS server\n
nfs.aop.writepages
ino
\n inode number\n+
nr_to_write
\n+ number of pages attempted to be written in this execution\n+
dev
\n+ device identifier\n
for_reclaim
\n a flag of writeback_control,\n indicates if it's invoked from the page allocator\n-
size
\n- number of pages attempted to be written in this execution\n-
nr_to_write
\n- number of pages attempted to be written in this execution\n
wpages
\n write size (in pages)\n-
wsize
\n- write size\n
for_kupdate
\n a flag of writeback_control,\n indicates if it's a kupdate writeback\n-
dev
\n- device identifier\n+
wsize
\n+ write size\n+
size
\n+ number of pages attempted to be written in this execution\n
probe::nfs.fop.aio_read — \n NFS client aio_read file operation\n-
nfs.fop.aio_read
attrtimeo
\n+
nfs.fop.aio_read
dev
\n+ device identifier\n+
ino
\n+ inode number \n+
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n-
cache_time
\n- when we started read-caching this inode\n
cache_valid
\n cache related bit mask flag\n-
ino
\n- inode number \n-
file_name
\n- file name\n-
dev
\n- device identifier\n
buf
\n the address of buf in user space\n-
pos
\n- current position of file \n-
parent_name
\n- parent dir name\n
count
\n read bytes\n+
cache_time
\n+ when we started read-caching this inode\n+
parent_name
\n+ parent dir name\n+
file_name
\n+ file name\n+
pos
\n+ current position of file \n
probe::nfs.fop.aio_write — \n NFS client aio_write file operation\n-
nfs.fop.aio_write
dev
\n- device identifier\n-
buf
\n- the address of buf in user space\n+
nfs.fop.aio_write
probe::nfs.fop.llseek — \n NFS client llseek operation\n-
nfs.fop.llseek
dev
\n- device identifier\n-
offset
\n- the offset of the file will be repositioned\n-
ino
\n- inode number\n-
whence_str
\n+
nfs.fop.llseek
probe::nfs.fop.lock — \n NFS client file lock operation\n-
nfs.fop.lock
dev
\n- device identifier\n-
i_mode
\n- file type and access rights\n-
fl_start
\n+
nfs.fop.lock
fl_start
\n starting offset of locked region\n+
ino
\n+ inode number\n
fl_flag
\n lock flags\n-
fl_type
\n- lock type\n+
dev
\n+ device identifier\n
cmd
\n cmd arguments\n-
ino
\n- inode number\n+
fl_type
\n+ lock type\n+
i_mode
\n+ file type and access rights\n
fl_end
\n ending offset of locked region\n
probe::nfs.fop.mmap — \n NFS client mmap operation\n-
nfs.fop.mmap
vm_flag
\n- vm flags\n-
vm_start
\n- start address within vm_mm \n-
parent_name
\n- parent dir name\n-
buf
\n+
nfs.fop.mmap
buf
\n the address of buf in user space\n-
dev
\n- device identifier\n-
file_name
\n- file name\n
cache_valid
\n cache related bit mask flag\n+
vm_flag
\n+ vm flags\n+
dev
\n+ device identifier\n+
vm_start
\n+ start address within vm_mm \n
ino
\n inode number \n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode \n if jiffies - read_cache_jiffies > attrtimeo.\n
cache_time
\n when we started read-caching this inode\n+
parent_name
\n+ parent dir name\n+
file_name
\n+ file name\n
vm_end
\n the first byte after end address within vm_mm\n
probe::nfs.fop.open — \n NFS client file open operation\n-
nfs.fop.open
probe::nfs.fop.read_iter — \n NFS client read_iter file operation\n-
nfs.fop.read_iter
parent_name
\n- parent dir name\n+
nfs.fop.read_iter
dev
\n+ device identifier\n+
attrtimeo
\n+ how long the cached information is assumed to be valid.\n+ We need to revalidate the cached attrs for this inode\n+ if jiffies - read_cache_jiffies > attrtimeo.\n+
ino
\n+ inode number \n+
cache_valid
\n+ cache related bit mask flag\n
count
\n read bytes\n+
cache_time
\n+ when we started read-caching this inode\n+
parent_name
\n+ parent dir name\n
pos
\n current position of file \n-
dev
\n- device identifier\n
file_name
\n file name\n-
cache_valid
\n- cache related bit mask flag\n-
ino
\n- inode number \n-
cache_time
\n- when we started read-caching this inode\n-
attrtimeo
\n- how long the cached information is assumed to be valid.\n- We need to revalidate the cached attrs for this inode\n- if jiffies - read_cache_jiffies > attrtimeo.\n
probe::nfs.fop.release — \n NFS client release page operation\n-
nfs.fop.release
probe::nfs.fop.sendfile — \n NFS client send file operation\n-
nfs.fop.sendfile
dev
\n- device identifier\n+
nfs.fop.sendfile
ppos
\n+ current position of file\n+
cache_valid
\n+ cache related bit mask flag\n
count
\n read bytes\n-
ppos
\n- current position of file\n-
cache_time
\n- when we started read-caching this inode\n+
dev
\n+ device identifier\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n
ino
\n inode number\n-
cache_valid
\n- cache related bit mask flag\n+
cache_time
\n+ when we started read-caching this inode\n
probe::nfs.fop.write_iter — \n NFS client write_iter file operation\n-
nfs.fop.write_iter
probe::nfs.proc.commit_done — \n NFS client response to a commit RPC task\n-
nfs.proc.commit_done
prot
\n- transfer protocol\n-
status
\n- result of last operation\n+
nfs.proc.commit_done
count
\n+ number of bytes committed\n
version
\n NFS version\n-
valid
\n- fattr->valid, indicates which fields are valid \n+
status
\n+ result of last operation\n+
prot
\n+ transfer protocol\n
timestamp
\n V4 timestamp, which is used for lease renewal\n
server_ip
\n IP address of server\n-
count
\n- number of bytes committed\n+
valid
\n+ fattr->valid, indicates which fields are valid \n
probe::nfs.proc.commit_setup — \n NFS client setting up a commit RPC task\n-
nfs.proc.commit_setup
offset
\n+
nfs.proc.commit_setup
prot
\n+ transfer protocol\n+
bitmask1
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n+
server_ip
\n+ IP address of server\n+
count
\n+ bytes in this commit\n+
version
\n+ NFS version\n+
offset
\n the file offset\n
size
\n bytes in this commit\n-
count
\n- bytes in this commit\n-
server_ip
\n- IP address of server\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
bitmask1
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n-
version
\n- NFS version\n-
prot
\n- transfer protocol\n
probe::nfs.proc.commit — \n NFS client committing data on server\n-
nfs.proc.commit
size
\n- read bytes in this execution\n-
offset
\n- the file offset\n-
server_ip
\n- IP address of server\n-
bitmask0
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n-
bitmask1
\n+
nfs.proc.commit
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
server_ip
\n+ IP address of server\n
prot
\n transfer protocol\n
version
\n NFS version\n+
offset
\n+ the file offset\n+
size
\n+ read bytes in this execution\n+
bitmask0
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n
\n All the nfs.proc.commit kernel functions were removed in kernel\n commit 200baa in December 2006, so these probes do not exist on Linux\n 2.6.21 and newer kernels.\n
\n \n Fires when client writes the buffered data to disk.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "unified_diff": "@@ -1,17 +1,17 @@\n
probe::nfs.proc.create — \n NFS client creating file on server\n-
nfs.proc.create
flag
\n- indicates create mode (only for NFSv3 and NFSv4)\n-
filelen
\n- length of file name\n-
server_ip
\n- IP address of server\n-
filename
\n+
nfs.proc.create
filename
\n file name\n-
version
\n- NFS version (the function is used for all NFS version)\n
prot
\n transfer protocol\n+
server_ip
\n+ IP address of server\n+
filelen
\n+ length of file name\n+
flag
\n+ indicates create mode (only for NFSv3 and NFSv4)\n
fh
\n file handle of parent dir\n+
version
\n+ NFS version (the function is used for all NFS version)\n
probe::nfs.proc.lookup — \n NFS client opens/searches a file on server\n-
nfs.proc.lookup
prot
\n- transfer protocol\n-
version
\n+
nfs.proc.lookup
version
\n NFS version\n-
server_ip
\n- IP address of server\n-
name_len
\n- the length of file name\n-
bitmask1
\n+
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n
filename
\n the name of file which client opens/searches on server\n-
bitmask0
\n+
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
server_ip
\n+ IP address of server\n+
prot
\n+ transfer protocol\n+
name_len
\n+ the length of file name\n
probe::nfs.proc.open — \n NFS client allocates file read/write context information\n-
nfs.proc.open
flag
\n- file flag\n-
mode
\n- file mode\n-
filename
\n+
nfs.proc.open
probe::nfs.proc.read_done — \n NFS client response to a read RPC task\n-
nfs.proc.read_done
timestamp
\n+
nfs.proc.read_done
probe::nfs.proc.read_setup — \n NFS client setting up a read RPC task\n-
nfs.proc.read_setup
prot
\n- transfer protocol\n-
version
\n+
nfs.proc.read_setup
probe::nfs.proc.read — \n NFS client synchronously reads file from server\n-
nfs.proc.read
flags
\n+
nfs.proc.read
version
\n+ NFS version\n+
offset
\n+ the file offset\n+
flags
\n used to set task->tk_flags in rpc_init_task function\n
count
\n read bytes in this execution\n-
server_ip
\n- IP address of server\n
prot
\n transfer protocol\n-
version
\n- NFS version\n-
offset
\n- the file offset\n+
server_ip
\n+ IP address of server\n
probe::nfs.proc.release — \n NFS client releases file read/write context information\n
nfs.proc.release
probe::nfs.proc.remove — \n NFS client removes a file on server\n-
nfs.proc.remove
filelen
\n- length of file name\n-
filename
\n- file name\n-
server_ip
\n- IP address of server\n+
nfs.proc.remove
probe::nfs.proc.rename_done — \n NFS client response to a rename RPC task\n-
nfs.proc.rename_done
new_fh
\n- file handle of new parent dir\n+
nfs.proc.rename_done
version
\n+ NFS version\n
status
\n result of last operation\n-
version
\n- NFS version\n-
prot
\n- transfer protocol\n+
new_fh
\n+ file handle of new parent dir\n
old_fh
\n file handle of old parent dir\n
timestamp
\n V4 timestamp, which is used for lease renewal\n+
prot
\n+ transfer protocol\n
server_ip
\n IP address of server\n
probe::nfs.proc.rename_setup — \n NFS client setting up a rename RPC task\n
nfs.proc.rename_setup
probe::nfs.proc.rename — \n NFS client renames a file on server\n-
nfs.proc.rename
new_filelen
\n- length of new file name\n-
old_name
\n- old file name\n-
old_fh
\n- file handle of old parent dir\n+
nfs.proc.rename
new_name
\n+ new file name\n+
prot
\n+ transfer protocol\n
server_ip
\n IP address of server\n-
new_fh
\n- file handle of new parent dir\n+
old_name
\n+ old file name\n
old_filelen
\n length of old file name\n-
new_name
\n- new file name\n-
prot
\n- transfer protocol\n+
new_fh
\n+ file handle of new parent dir\n+
old_fh
\n+ file handle of old parent dir\n+
new_filelen
\n+ length of new file name\n
version
\n NFS version (the function is used for all NFS version)\n
probe::nfs.proc.write_done — \n NFS client response to a write RPC task\n-
nfs.proc.write_done
prot
\n+
nfs.proc.write_done
server_ip
\n+ IP address of server\n+
valid
\n+ fattr->valid, indicates which fields are valid \n+
prot
\n transfer protocol\n+
timestamp
\n+ V4 timestamp, which is used for lease renewal\n+
count
\n+ number of bytes written\n
status
\n result of last operation\n
version
\n NFS version\n-
valid
\n- fattr->valid, indicates which fields are valid \n-
server_ip
\n- IP address of server\n-
count
\n- number of bytes written\n-
timestamp
\n- V4 timestamp, which is used for lease renewal\n
probe::nfs.proc.write_setup — \n NFS client setting up a write RPC task\n-
nfs.proc.write_setup
size
\n- bytes written in this execution\n-
offset
\n- the file offset\n-
server_ip
\n- IP address of server\n-
count
\n- bytes written in this execution\n-
bitmask0
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n-
how
\n+
nfs.proc.write_setup
how
\n used to set args.stable. The stable value could be:\n NFS_UNSTABLE,NFS_DATA_SYNC,NFS_FILE_SYNC\n (in nfs.proc3.write_setup and nfs.proc4.write_setup)\n
prot
\n transfer protocol\n-
version
\n- NFS version\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem \n+
server_ip
\n+ IP address of server\n+
count
\n+ bytes written in this execution\n+
offset
\n+ the file offset\n+
version
\n+ NFS version\n+
size
\n+ bytes written in this execution\n+
bitmask0
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n
probe::nfs.proc.write — \n NFS client synchronously writes file to server\n-
nfs.proc.write
bitmask1
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n-
version
\n+
nfs.proc.write
version
\n NFS version\n-
prot
\n- transfer protocol\n+
offset
\n+ the file offset\n+
size
\n+ read bytes in this execution\n+
flags
\n+ used to set task->tk_flags in rpc_init_task function\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
flags
\n- used to set task->tk_flags in rpc_init_task function\n+
bitmask1
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n
server_ip
\n IP address of server\n-
size
\n- read bytes in this execution\n-
offset
\n- the file offset\n+
prot
\n+ transfer protocol\n
probe::nfsd.commit — \n NFS server committing all pending writes to stable storage\n-
nfsd.commit
flag
\n- indicates whether this execution is a sync operation\n-
fh
\n- file handle (the first part is the length of the file handle)\n+
nfsd.commit
probe::nfsd.create — \n NFS server creating a file(regular,dir,device,fifo) for client\n-
nfsd.create
iap_valid
\n- Attribute flags\n-
client_ip
\n- the ip address of client\n-
filelen
\n+
nfsd.create
filelen
\n the length of file name\n-
filename
\n- file name \n-
fh
\n- file handle (the first part is the length of the file handle)\n
type
\n file type(regular,dir,device,fifo ...)\n+
iap_valid
\n+ Attribute flags\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
iap_mode
\n file access mode\n+
client_ip
\n+ the ip address of client\n+
filename
\n+ file name \n
probe::nfsd.createv3 — \n NFS server creating a regular file or set file attributes for client\n-
nfsd.createv3
iap_valid
\n- Attribute flags\n-
verifier
\n+
nfsd.createv3
verifier
\n file attributes (atime,mtime,mode). It's used to reset file attributes for CREATE_EXCLUSIVE\n+
truncp
\n+ trunp arguments, indicates if the file shouldbe truncate\n
client_ip
\n the ip address of client\n-
filelen
\n- the length of file name\n
filename
\n file name \n+
filelen
\n+ the length of file name\n+
iap_valid
\n+ Attribute flags\n
fh
\n file handle (the first part is the length of the file handle)\n
iap_mode
\n file access mode\n-
truncp
\n- trunp arguments, indicates if the file shouldbe truncate\n
createmode
\n create mode .The possible values could be: NFS3_CREATE_EXCLUSIVE, NFS3_CREATE_UNCHECKED, or NFS3_CREATE_GUARDED\n
probe::nfsd.dispatch — \n NFS server receives an operation from client\n-
nfsd.dispatch
probe::nfsd.lookup — \n NFS server opening or searching file for a file for client\n-
nfsd.lookup
fh
\n- file handle of parent dir(the first part is the length of the file handle)\n-
client_ip
\n+
nfsd.lookup
probe::nfsd.open — \n NFS server opening a file for client\n-
nfsd.open
client_ip
\n+
nfsd.open
type
\n+ type of file (regular file or dir)\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
client_ip
\n the ip address of client\n
access
\n indicates the type of open (read/write/commit/readdir...) \n-
fh
\n- file handle (the first part is the length of the file handle)\n-
type
\n- type of file (regular file or dir)\n
probe::nfsd.proc.commit — \n NFS server performing a commit operation for client\n-
nfsd.proc.commit
gid
\n- requester's group id\n-
proto
\n- transfer protocol\n-
count
\n+
nfsd.proc.commit
count
\n read bytes\n-
client_ip
\n- the ip address of client\n-
uid
\n- requester's user id\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
offset
\n the offset of file \n
version
\n nfs version\n+
gid
\n+ requester's group id\n+
uid
\n+ requester's user id\n+
proto
\n+ transfer protocol\n+
client_ip
\n+ the ip address of client\n
size
\n read bytes\n-
fh
\n- file handle (the first part is the length of the file handle)\n
probe::nfsd.proc.create — \n NFS server creating a file for client\n-
nfsd.proc.create
filename
\n- file name\n+
nfsd.proc.create
version
\n+ nfs version\n
gid
\n requester's group id\n-
filelen
\n- length of file name\n+
uid
\n+ requester's user id\n+
filename
\n+ file name\n
client_ip
\n the ip address of client\n
proto
\n transfer protocol\n-
uid
\n- requester's user id\n-
version
\n- nfs version\n
fh
\n file handle (the first part is the length of the file handle)\n+
filelen
\n+ length of file name\n
probe::nfsd.proc.lookup — \n NFS server opening or searching for a file for client\n-
nfsd.proc.lookup
proto
\n- transfer protocol\n-
fh
\n- file handle of parent dir (the first part is the length of the file handle)\n-
client_ip
\n+
nfsd.proc.lookup
client_ip
\n the ip address of client\n-
gid
\n- requester's group id\n+
proto
\n+ transfer protocol\n
filename
\n file name \n
uid
\n requester's user id\n-
filelen
\n- the length of file name\n+
gid
\n+ requester's group id\n
version
\n nfs version\n+
filelen
\n+ the length of file name\n+
fh
\n+ file handle of parent dir (the first part is the length of the file handle)\n
probe::nfsd.proc.read — \n NFS server reading file for client\n-
nfsd.proc.read
size
\n- read bytes\n-
uid
\n- requester's user id\n-
offset
\n- the offset of file \n-
gid
\n+
nfsd.proc.read
gid
\n requester's group id\n
version
\n nfs version\n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n-
client_ip
\n- the ip address of client\n+
size
\n+ read bytes\n
vlen
\n read blocks \n
proto
\n transfer protocol\n+
client_ip
\n+ the ip address of client\n+
uid
\n+ requester's user id\n
fh
\n file handle (the first part is the length of the file handle)\n
count
\n read bytes\n+
offset
\n+ the offset of file \n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
probe::nfsd.proc.remove — \n NFS server removing a file for client\n
nfsd.proc.remove
filelen
\n length of file name\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
version
\n+ nfs version\n
gid
\n requester's group id\n-
filename
\n- file name\n
proto
\n transfer protocol\n
client_ip
\n the ip address of client\n-
version
\n- nfs version\n
uid
\n requester's user id\n-
fh
\n- file handle (the first part is the length of the file handle)\n+
filename
\n+ file name\n
probe::nfsd.proc.rename — \n NFS Server renaming a file for client\n-
nfsd.proc.rename
flen
\n- length of old file name \n-
gid
\n- requester's group id\n-
filename
\n+
nfsd.proc.rename
filename
\n old file name \n-
client_ip
\n- the ip address of client\n-
tlen
\n- length of new file name\n
uid
\n requester's user id\n-
tname
\n- new file name\n+
client_ip
\n+ the ip address of client\n+
gid
\n+ requester's group id\n+
flen
\n+ length of old file name \n
fh
\n file handler of old path\n
tfh
\n file handler of new path\n+
tname
\n+ new file name\n+
tlen
\n+ length of new file name\n
probe::nfsd.proc.write — \n NFS server writing data to file for client\n-
nfsd.proc.write
size
\n- read bytes\n-
stable
\n- argp->stable\n-
version
\n- nfs version\n+
nfsd.proc.write
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
offset
\n the offset of file \n-
uid
\n- requester's user id\n+
count
\n+ read bytes\n
fh
\n file handle (the first part is the length of the file handle)\n-
gid
\n- requester's group id\n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n+
uid
\n+ requester's user id\n
client_ip
\n the ip address of client\n-
count
\n- read bytes\n-
vlen
\n- read blocks \n
proto
\n transfer protocol\n+
vlen
\n+ read blocks \n+
size
\n+ read bytes\n+
version
\n+ nfs version\n+
gid
\n+ requester's group id\n+
stable
\n+ argp->stable\n
probe::nfsd.read — \n NFS server reading data from a file for client\n-
nfsd.read
fh
\n- file handle (the first part is the length of the file handle)\n-
offset
\n- the offset of file \n-
file
\n+
nfsd.read
file
\n argument file, indicates if the file has been opened.\n-
size
\n- read bytes\n
vlen
\n read blocks \n+
size
\n+ read bytes\n+
client_ip
\n+ the ip address of client\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
count
\n read bytes\n+
offset
\n+ the offset of file \n
vec
\n struct kvec, includes buf address in kernel address and length of each buffer\n-
client_ip
\n- the ip address of client\n
probe::nfsd.rename — \n NFS server renaming a file for client\n-
nfsd.rename
tname
\n+
nfsd.rename
client_ip
\n+ the ip address of client\n+
filename
\n+ old file name \n+
tname
\n new file name\n+
tlen
\n+ length of new file name\n
fh
\n file handler of old path\n
tfh
\n file handler of new path\n-
client_ip
\n- the ip address of client\n-
tlen
\n- length of new file name\n
flen
\n length of old file name \n-
filename
\n- old file name \n
probe::nfsd.write — \n NFS server writing data to a file for client\n-
nfsd.write
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n+
nfsd.write
file
\n+ argument file, indicates if the file has been opened.\n
client_ip
\n the ip address of client\n-
count
\n- read bytes\n
vlen
\n read blocks \n-
fh
\n- file handle (the first part is the length of the file handle)\n
size
\n read bytes\n-
file
\n- argument file, indicates if the file has been opened.\n+
count
\n+ read bytes\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
offset
\n the offset of file \n
probe::scheduler.cpu_off — \n Process is about to stop running on a cpu\n-
scheduler.cpu_off
name
\n- name of the probe point\n-
task_prev
\n- the process leaving the cpu (same as current)\n-
task_next
\n+
scheduler.cpu_off
probe::scheduler.cpu_on — \n Process is beginning execution on a cpu\n-
scheduler.cpu_on
idle
\n- - boolean indicating whether current is the idle process\n-
task_prev
\n+
scheduler.cpu_on
probe::scheduler.ctxswitch — \n A context switch is occuring.\n-
scheduler.ctxswitch
nexttsk_state
\n- the state of the process to be switched in\n-
name
\n- name of the probe point\n-
prev_priority
\n- The priority of the process to be switched out\n-
prev_tid
\n+
scheduler.ctxswitch
prev_tid
\n The TID of the process to be switched out\n-
next_task_name
\n- The name of the process to be switched in\n-
next_tid
\n- The TID of the process to be switched in\t \n
next_priority
\n The priority of the process to be switched in\n
prev_task_name
\n The name of the process to be switched out\n
prevtsk_state
\n the state of the process to be switched out\n-
next_pid
\n- The PID of the process to be switched in\n
prev_pid
\n The PID of the process to be switched out\n+
next_tid
\n+ The TID of the process to be switched in\t \n+
prev_priority
\n+ The priority of the process to be switched out\n+
name
\n+ name of the probe point\n+
next_task_name
\n+ The name of the process to be switched in\n+
next_pid
\n+ The PID of the process to be switched in\n+
nexttsk_state
\n+ the state of the process to be switched in\n
probe::scheduler.kthread_stop — \n A thread created by kthread_create is being stopped\n-
scheduler.kthread_stop
probe::scheduler.process_exit — \n Process exiting\n-
scheduler.process_exit
probe::scheduler.process_free — \n Scheduler freeing a data structure for a process\n-
scheduler.process_free
probe::scheduler.process_wait — \n Scheduler starting to wait on a process\n-
scheduler.process_wait
probe::scheduler.signal_send — \n Sending a signal\n-
scheduler.signal_send
probe::scheduler.tick — \n Schedulers internal tick, a processes timeslice accounting is updated\n-
scheduler.tick
idle
\n- boolean indicating whether current is the idle process\n-
name
\n+
scheduler.tick
probe::scheduler.wait_task — \n Waiting on a task to unschedule (become inactive)\n-
scheduler.wait_task
probe::scheduler.wakeup_new — \n Newly created task is woken up for the first time\n-
scheduler.wakeup_new
probe::scheduler.wakeup — \n Task is woken up\n-
scheduler.wakeup
task_pid
\n- PID of the task being woken up\n-
task_cpu
\n- cpu of the task being woken up\n+
scheduler.wakeup
task_priority
\n+ priority of the task being woken up\n
task_state
\n state of the task being woken up\n-
task_priority
\n- priority of the task being woken up\n-
task_tid
\n- tid of the task being woken up\n
name
\n name of the probe point\n+
task_tid
\n+ tid of the task being woken up\n+
task_cpu
\n+ cpu of the task being woken up\n+
task_pid
\n+ PID of the task being woken up\n
probe::scsi.iocompleted — \n SCSI mid-layer running the completion processing for block device I/O requests\n-
scsi.iocompleted
host_no
\n- The host number\n-
goodbytes
\n- The bytes completed\n-
channel
\n- The channel number\n-
data_direction
\n+
scsi.iocompleted
data_direction
\n The data_direction specifies whether this command is from/to\n the device\n-
req_addr
\n- The current struct request pointer, as a number\n-
device_state_str
\n- The current state of the device, as a string\n-
dev_id
\n- The scsi device id\n
device_state
\n The current state of the device\n+
dev_id
\n+ The scsi device id\n+
channel
\n+ The channel number\n+
device_state_str
\n+ The current state of the device, as a string\n+
req_addr
\n+ The current struct request pointer, as a number\n+
host_no
\n+ The host number\n+
goodbytes
\n+ The bytes completed\n
data_direction_str
\n Data direction, as a string\n
lun
\n The lun number\n
probe::scsi.iodispatching — \n SCSI mid-layer dispatched low-level SCSI command\n-
scsi.iodispatching
host_no
\n- The host number\n-
channel
\n+
scsi.iodispatching
channel
\n The channel number\n-
req_addr
\n- The current struct request pointer, as a number\n-
data_direction
\n- The data_direction specifies whether this command is from/to the device\n- 0 (DMA_BIDIRECTIONAL), 1 (DMA_TO_DEVICE),\n- 2 (DMA_FROM_DEVICE), 3 (DMA_NONE)\n+
dev_id
\n+ The scsi device id\n
device_state_str
\n The current state of the device, as a string\n
request_bufflen
\n The request buffer length\n-
dev_id
\n- The scsi device id\n
device_state
\n The current state of the device\n-
data_direction_str
\n- Data direction, as a string\n-
request_buffer
\n- The request buffer address\n+
data_direction
\n+ The data_direction specifies whether this command is from/to the device\n+ 0 (DMA_BIDIRECTIONAL), 1 (DMA_TO_DEVICE),\n+ 2 (DMA_FROM_DEVICE), 3 (DMA_NONE)\n+
host_no
\n+ The host number\n
lun
\n The lun number\n+
request_buffer
\n+ The request buffer address\n+
data_direction_str
\n+ Data direction, as a string\n+
req_addr
\n+ The current struct request pointer, as a number\n
probe::scsi.iodone — \n SCSI command completed by low level driver and enqueued into the done queue.\n-
scsi.iodone
lun
\n- The lun number\n+
scsi.iodone
req_addr
\n+ The current struct request pointer, as a number\n
data_direction_str
\n Data direction, as a string\n-
scsi_timer_pending
\n- 1 if a timer is pending on this request\n-
dev_id
\n- The scsi device id\n+
lun
\n+ The lun number\n+
host_no
\n+ The host number\n
device_state
\n The current state of the device\n
data_direction
\n The data_direction specifies whether this command is\n from/to the device.\n-
req_addr
\n- The current struct request pointer, as a number\n+
scsi_timer_pending
\n+ 1 if a timer is pending on this request\n
device_state_str
\n The current state of the device, as a string\n
channel
\n The channel number\n-
host_no
\n- The host number\n+
dev_id
\n+ The scsi device id\n
probe::scsi.ioentry — \n Prepares a SCSI mid-layer request\n-
scsi.ioentry
disk_minor
\n- The minor number of the disk (-1 if no information)\n-
device_state_str
\n+
scsi.ioentry
device_state_str
\n The current state of the device, as a string\n
disk_major
\n The major number of the disk (-1 if no information)\n
device_state
\n The current state of the device\n+
disk_minor
\n+ The minor number of the disk (-1 if no information)\n
req_addr
\n The current struct request pointer, as a number\n
probe::scsi.ioexecute — \n Create mid-layer SCSI request and wait for the result\n-
scsi.ioexecute
channel
\n- The channel number\n-
host_no
\n- The host number\n-
request_bufflen
\n- The data buffer buffer length\n+
scsi.ioexecute
timeout
\n+ Request timeout in seconds\n+
device_state
\n+ The current state of the device\n
data_direction
\n The data_direction specifies whether this command is\n from/to the device.\n-
device_state_str
\n- The current state of the device, as a string\n
dev_id
\n The scsi device id\n+
channel
\n+ The channel number\n+
request_bufflen
\n+ The data buffer buffer length\n+
device_state_str
\n+ The current state of the device, as a string\n
retries
\n Number of times to retry request\n-
timeout
\n- Request timeout in seconds\n-
device_state
\n- The current state of the device\n-
lun
\n- The lun number\n-
request_buffer
\n- The data buffer address\n+
host_no
\n+ The host number\n
data_direction_str
\n Data direction, as a string\n+
request_buffer
\n+ The data buffer address\n+
lun
\n+ The lun number\n
probe::scsi.set_state — \n Order SCSI device state change\n-
scsi.set_state
lun
\n- The lun number\n+
scsi.set_state
channel
\n+ The channel number\n+
dev_id
\n+ The scsi device id\n
state_str
\n The new state of the device, as a string\n
state
\n The new state of the device\n-
dev_id
\n- The scsi device id\n-
old_state
\n- The current state of the device\n
host_no
\n The host number\n-
channel
\n- The channel number\n+
lun
\n+ The lun number\n
old_state_str
\n The current state of the device, as a string\n+
old_state
\n+ The current state of the device\n
probe::signal.check_ignored.return — \n Check to see signal is ignored completed\n-
signal.check_ignored.return
probe::signal.check_ignored — \n Checking to see signal is ignored\n
signal.check_ignored
probe::signal.checkperm — \n Check being performed on a sent signal\n-
signal.checkperm
si_code
\n- Indicates the signal type\n-
task
\n- A task handle to the signal recipient\n+
signal.checkperm
sig_name
\n+ A string representation of the signal\n
pid_name
\n Name of the process receiving the signal\n
sig
\n The number of the signal\n-
sig_name
\n- A string representation of the signal\n-
sig_pid
\n- The PID of the process receiving the signal\n+
si_code
\n+ Indicates the signal type\n
name
\n Name of the probe point\n+
sig_pid
\n+ The PID of the process receiving the signal\n
sinfo
\n The address of the siginfo structure\n+
task
\n+ A task handle to the signal recipient\n
probe::signal.do_action.return — \n Examining or changing a signal action completed\n-
signal.do_action.return
probe::signal.do_action — \n Examining or changing a signal action\n-
signal.do_action
sig
\n- The signal to be examined/changed\n-
sig_name
\n- A string representation of the signal\n+
signal.do_action
sa_handler
\n+ The new handler of the signal\n
name
\n Name of the probe point\n-
oldsigact_addr
\n- The address of the old sigaction\n+
sigact_addr
\n+ The address of the new sigaction\n struct associated with the signal\n-
sa_handler
\n- The new handler of the signal\n+
sig_name
\n+ A string representation of the signal\n+
sig
\n+ The signal to be examined/changed\n
sa_mask
\n The new mask of the signal\n-
sigact_addr
\n- The address of the new sigaction\n+
oldsigact_addr
\n+ The address of the old sigaction\n struct associated with the signal\n
probe::signal.flush — \n Flushing all pending signals for a task\n-
signal.flush
name
\n- Name of the probe point\n-
sig_pid
\n- The PID of the process associated with the task\n- performing the flush\n-
pid_name
\n+
signal.flush
probe::signal.force_segv — \n Forcing send of SIGSEGV\n-
signal.force_segv
pid_name
\n- Name of the process receiving the signal\n+
signal.force_segv
sig_pid
\n+ The PID of the process receiving the signal\n
name
\n Name of the probe point\n-
sig_pid
\n- The PID of the process receiving the signal\n-
sig_name
\n- A string representation of the signal\n+
pid_name
\n+ Name of the process receiving the signal\n
sig
\n The number of the signal\n+
sig_name
\n+ A string representation of the signal\n
probe::signal.handle — \n Signal handler being invoked\n-
signal.handle
sig_name
\n- A string representation of the signal\n-
sig_code
\n- The si_code value of the siginfo signal\n-
sig
\n- The signal number that invoked the signal handler\n-
sig_mode
\n- Indicates whether the signal was a user-mode or kernel-mode signal\n+
signal.handle
regs
\n+ The address of the kernel-mode stack area (deprecated in\n+ SystemTap 2.1)\n
sinfo
\n The address of the siginfo table\n-
ka_addr
\n- The address of the k_sigaction table\n- associated with the signal\n
name
\n Name of the probe point\n+
sig
\n+ The signal number that invoked the signal handler\n+
sig_code
\n+ The si_code value of the siginfo signal\n
oldset_addr
\n The address of the bitmask array of blocked signals\n (deprecated in SystemTap 2.1)\n-
regs
\n- The address of the kernel-mode stack area (deprecated in\n- SystemTap 2.1)\n+
sig_name
\n+ A string representation of the signal\n+
sig_mode
\n+ Indicates whether the signal was a user-mode or kernel-mode signal\n+
ka_addr
\n+ The address of the k_sigaction table\n+ associated with the signal\n
probe::signal.pending — \n Examining pending signal\n-
signal.pending
sigset_add
\n- The address of the user-space signal set\n- (sigset_t)\n-
name
\n+
signal.pending
probe::signal.procmask.return — \n Examining or changing blocked signals completed\n-
signal.procmask.return
probe::signal.procmask — \n Examining or changing blocked signals\n-
signal.procmask
how
\n+
signal.procmask
sigset
\n+ The actual value to be set for sigset_t\n+ (correct?)\n+
name
\n+ Name of the probe point\n+
how
\n Indicates how to change the blocked signals; possible values are\n SIG_BLOCK=0 (for blocking signals),\n SIG_UNBLOCK=1 (for unblocking signals), and\n SIG_SETMASK=2 for setting the signal mask.\n-
oldsigset_addr
\n- The old address of the signal set\n- (sigset_t)\n-
sigset
\n- The actual value to be set for sigset_t\n- (correct?)\n
sigset_addr
\n The address of the signal set (sigset_t)\n to be implemented\n-
name
\n- Name of the probe point\n+
oldsigset_addr
\n+ The old address of the signal set\n+ (sigset_t)\n
probe::signal.send.return — \n Signal being sent to a process completed (deprecated in SystemTap 2.1)\n-
signal.send.return
send2queue
\n- Indicates whether the sent signal was sent to an existing sigqueue\n+
signal.send.return
retstr
\n+ The return value to either __group_send_sig_info, specific_send_sig_info, or send_sigqueue\n
name
\n The name of the function used to send out the signal\n-
retstr
\n- The return value to either __group_send_sig_info, specific_send_sig_info, or send_sigqueue\n
shared
\n Indicates whether the sent signal is shared by the thread group.\n+
send2queue
\n+ Indicates whether the sent signal was sent to an existing sigqueue\n
\n Possible __group_send_sig_info and\n specific_send_sig_info return values are as follows;\n
\n \n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-signal-send-sig-queue.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-signal-send-sig-queue.html", "unified_diff": "@@ -1,15 +1,15 @@\n
probe::signal.send_sig_queue — \n Queuing a signal to a process\n-
signal.send_sig_queue
sigqueue_addr
\n- The address of the signal queue\n+
signal.send_sig_queue
name
\n+ Name of the probe point\n+
sig_pid
\n+ The PID of the process to which the signal is queued\n
sig_name
\n A string representation of the signal\n
sig
\n The queued signal\n-
name
\n- Name of the probe point\n-
sig_pid
\n- The PID of the process to which the signal is queued\n
pid_name
\n Name of the process to which the signal is queued\n+
sigqueue_addr
\n+ The address of the signal queue\n
probe::signal.send — \n Signal being sent to a process\n-
signal.send
sinfo
\n- The address of siginfo struct\n-
sig_pid
\n- The PID of the process receiving the signal\n-
name
\n- The name of the function used to send out the signal\n-
sig_name
\n- A string representation of the signal\n+
signal.send
si_code
\n+ Indicates the signal type\n
send2queue
\n Indicates whether the signal is sent to an existing\n sigqueue (deprecated in SystemTap 2.1)\n-
sig
\n- The number of the signal\n-
si_code
\n- Indicates the signal type\n-
task
\n- A task handle to the signal recipient\n+
name
\n+ The name of the function used to send out the signal\n
shared
\n Indicates whether the signal is shared by the thread group\n+
sinfo
\n+ The address of siginfo struct\n+
task
\n+ A task handle to the signal recipient\n+
sig_pid
\n+ The PID of the process receiving the signal\n+
sig_name
\n+ A string representation of the signal\n
pid_name
\n The name of the signal recipient\n+
sig
\n+ The number of the signal\n
probe::signal.sys_tgkill.return — \n Sending kill signal to a thread group completed\n-
signal.sys_tgkill.return
retstr
\n- The return value to either __group_send_sig_info,\n-
name
\n+
signal.sys_tgkill.return
probe::signal.sys_tgkill — \n Sending kill signal to a thread group\n-
signal.sys_tgkill
sig_name
\n- A string representation of the signal\n+
signal.sys_tgkill
pid_name
\n+ The name of the signal recipient\n
sig
\n The specific kill signal sent to the process\n+
tgid
\n+ The thread group ID of the thread receiving the kill signal\n+
sig_name
\n+ A string representation of the signal\n
sig_pid
\n The PID of the thread receiving the kill signal\n-
name
\n- Name of the probe point\n
task
\n A task handle to the signal recipient\n-
pid_name
\n- The name of the signal recipient\n-
tgid
\n- The thread group ID of the thread receiving the kill signal\n+
name
\n+ Name of the probe point\n
probe::signal.sys_tkill — \n Sending a kill signal to a thread\n-
signal.sys_tkill
task
\n+
signal.sys_tkill
name
\n+ Name of the probe point\n+
task
\n A task handle to the signal recipient\n-
pid_name
\n- The name of the signal recipient\n+
sig_pid
\n+ The PID of the process receiving the kill signal\n
sig_name
\n A string representation of the signal\n+
pid_name
\n+ The name of the signal recipient\n
sig
\n The specific signal sent to the process\n-
name
\n- Name of the probe point\n-
sig_pid
\n- The PID of the process receiving the kill signal\n
probe::signal.syskill — \n Sending kill signal to a process\n-
signal.syskill
task
\n- A task handle to the signal recipient\n+
signal.syskill
sig
\n+ The specific signal sent to the process\n
pid_name
\n The name of the signal recipient\n+
sig_name
\n+ A string representation of the signal\n+
task
\n+ A task handle to the signal recipient\n
sig_pid
\n The PID of the process receiving the signal\n
name
\n Name of the probe point\n-
sig_name
\n- A string representation of the signal\n-
sig
\n- The specific signal sent to the process\n
probe::signal.systkill.return — \n Sending kill signal to a thread completed\n-
signal.systkill.return
probe::signal.wakeup — \n Sleeping process being wakened for signal\n
signal.wakeup
resume
\n Indicates whether to wake up a task in a\n STOPPED or TRACED state\n-
pid_name
\n- Name of the process to wake\n+
sig_pid
\n+ The PID of the process to wake\n
state_mask
\n A string representation indicating the mask\n of task states to wake. Possible values are\n TASK_INTERRUPTIBLE, TASK_STOPPED,\n TASK_TRACED, TASK_WAKEKILL, and TASK_INTERRUPTIBLE.\n-
sig_pid
\n- The PID of the process to wake\n+
pid_name
\n+ Name of the process to wake\n
probe::socket.aio_read.return — \n Conclusion of message received via sock_aio_read
\n-
socket.aio_read.return
type
\n- Socket type value\n-
flags
\n- Socket flags value\n-
family
\n- Protocol family value\n+
socket.aio_read.return
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
state
\n Socket state value\n-
protocol
\n- Protocol value\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n+
family
\n+ Protocol family value\n+
type
\n+ Socket type value\n
size
\n Size of message received (in bytes) or error code if success = 0\n+
flags
\n+ Socket flags value\n
name
\n Name of this probe\n+
protocol
\n+ Protocol value\n
probe::socket.aio_read — \n Receiving message via sock_aio_read
\n-
socket.aio_read
type
\n- Socket type value\n-
state
\n- Socket state value\n+
socket.aio_read
size
\n+ Message size in bytes\n
flags
\n Socket flags value\n-
family
\n- Protocol family value\n-
protocol
\n- Protocol value\n-
size
\n- Message size in bytes\n
name
\n Name of this probe\n+
protocol
\n+ Protocol value\n+
family
\n+ Protocol family value\n+
state
\n+ Socket state value\n+
type
\n+ Socket type value\n
probe::socket.aio_write.return — \n Conclusion of message send via sock_aio_write
\n-
socket.aio_write.return
size
\n- Size of message received (in bytes) or error code if success = 0\n-
name
\n- Name of this probe\n+
socket.aio_write.return
success
\n+ Was receive successful? (1 = yes, 0 = no)\n+
family
\n+ Protocol family value\n+
state
\n+ Socket state value\n
type
\n Socket type value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
flags
\n Socket flags value\n-
state
\n- Socket state value\n-
family
\n- Protocol family value\n+
name
\n+ Name of this probe\n
protocol
\n Protocol value\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n
probe::socket.aio_write — \n Message send via sock_aio_write
\n-
socket.aio_write
size
\n- Message size in bytes\n-
name
\n+
socket.aio_write
probe::socket.close — \n Close a socket\n-
socket.close
type
\n- Socket type value\n+
socket.close
probe::socket.create.return — \n Return from Creation of a socket\n
socket.create.return
success
\n Was socket creation successful? (1 = yes, 0 = no)\n-
protocol
\n- Protocol value\n-
requester
\n- Requested by user process or the kernel (1 = kernel, 0 = user)\n-
family
\n- Protocol family value\n
type
\n Socket type value\n+
family
\n+ Protocol family value\n+
requester
\n+ Requested by user process or the kernel (1 = kernel, 0 = user)\n
err
\n Error code if success == 0\n
name
\n Name of this probe\n+
protocol
\n+ Protocol value\n
probe::socket.create — \n Creation of a socket\n-
socket.create
family
\n+
socket.create
requester
\n+ Requested by user process or the kernel (1 = kernel, 0 = user)\n+
family
\n Protocol family value\n
type
\n Socket type value\n-
requester
\n- Requested by user process or the kernel (1 = kernel, 0 = user)\n
protocol
\n Protocol value\n
name
\n Name of this probe\n
\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-read-iter-return.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-read-iter-return.html", "comments": ["Ordering differences only"], "unified_diff": "@@ -1,24 +1,24 @@\n
probe::socket.read_iter.return — \n Conclusion of message received via sock_read_iter
\n
socket.read_iter.return
name
\n Name of this probe\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n
protocol
\n Protocol value\n+
flags
\n+ Socket flags value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
family
\n- Protocol family value\n
type
\n Socket type value\n-
flags
\n- Socket flags value\n
state
\n Socket state value\n+
family
\n+ Protocol family value\n
probe::socket.read_iter — \n Receiving message via sock_read_iter
\n-
socket.read_iter
protocol
\n- Protocol value\n-
type
\n- Socket type value\n+
socket.read_iter
probe::socket.readv.return — \n Conclusion of receiving a message via sock_readv
\n-
socket.readv.return
name
\n- Name of this probe\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n-
success
\n+
socket.readv.return
success
\n Was receive successful? (1 = yes, 0 = no)\n-
protocol
\n- Protocol value\n-
type
\n- Socket type value\n
family
\n Protocol family value\n-
flags
\n- Socket flags value\n
state
\n Socket state value\n+
type
\n+ Socket type value\n+
name
\n+ Name of this probe\n+
protocol
\n+ Protocol value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
flags
\n+ Socket flags value\n
probe::socket.readv — \n Receiving a message via sock_readv
\n
socket.readv
type
\n Socket type value\n-
flags
\n- Socket flags value\n
state
\n Socket state value\n
family
\n Protocol family value\n-
protocol
\n- Protocol value\n+
flags
\n+ Socket flags value\n
size
\n Message size in bytes\n+
protocol
\n+ Protocol value\n
name
\n Name of this probe\n
\n Fires at the beginning of receiving a message on a socket\n via the sock_readv
function\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-receive.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-receive.html", "unified_diff": "@@ -1,21 +1,21 @@\n
probe::socket.receive — \n Message received on a socket.\n-
socket.receive
name
\n- Name of this probe\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n-
success
\n+
socket.receive
success
\n Was send successful? (1 = yes, 0 = no)\n-
protocol
\n- Protocol value\n-
type
\n- Socket type value\n-
flags
\n- Socket flags value\n
family
\n Protocol family value\n
state
\n Socket state value\n+
type
\n+ Socket type value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
flags
\n+ Socket flags value\n+
name
\n+ Name of this probe\n+
protocol
\n+ Protocol value\n
probe::socket.recvmsg.return — \n Return from Message being received on socket\n-
socket.recvmsg.return
protocol
\n+
socket.recvmsg.return
name
\n+ Name of this probe\n+
protocol
\n Protocol value\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
flags
\n Socket flags value\n-
type
\n- Socket type value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
state
\n Socket state value\n
family
\n Protocol family value\n-
name
\n- Name of this probe\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n+
type
\n+ Socket type value\n
probe::socket.recvmsg — \n Message being received on socket\n-
socket.recvmsg
size
\n- Message size in bytes\n+
socket.recvmsg
protocol
\n+ Protocol value\n
name
\n Name of this probe\n-
type
\n- Socket type value\n
flags
\n Socket flags value\n-
family
\n- Protocol family value\n+
size
\n+ Message size in bytes\n+
type
\n+ Socket type value\n
state
\n Socket state value\n-
protocol
\n- Protocol value\n+
family
\n+ Protocol family value\n
probe::socket.send — \n Message sent on a socket.\n-
socket.send
state
\n- Socket state value\n+
socket.send
success
\n+ Was send successful? (1 = yes, 0 = no)\n
type
\n Socket type value\n+
state
\n+ Socket state value\n
family
\n Protocol family value\n
flags
\n Socket flags value\n-
protocol
\n- Protocol value\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n
size
\n Size of message sent (in bytes) or error code if success = 0\n
name
\n Name of this probe\n+
protocol
\n+ Protocol value\n
probe::socket.sendmsg.return — \n Return from socket.sendmsg.\n-
socket.sendmsg.return
protocol
\n+
socket.sendmsg.return
name
\n+ Name of this probe\n+
protocol
\n Protocol value\n+
size
\n+ Size of message sent (in bytes) or error code if success = 0\n+
flags
\n+ Socket flags value\n
success
\n Was send successful? (1 = yes, 0 = no)\n-
type
\n- Socket type value\n
family
\n Protocol family value\n-
flags
\n- Socket flags value\n
state
\n Socket state value\n-
name
\n- Name of this probe\n-
size
\n- Size of message sent (in bytes) or error code if success = 0\n+
type
\n+ Socket type value\n
probe::socket.sendmsg — \n Message is currently being sent on a socket.\n-
socket.sendmsg
name
\n- Name of this probe\n-
size
\n+
socket.sendmsg
probe::socket.write_iter.return — \n Conclusion of message send via sock_write_iter
\n-
socket.write_iter.return
success
\n- Was receive successful? (1 = yes, 0 = no)\n+
socket.write_iter.return
flags
\n+ Socket flags value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
name
\n+ Name of this probe\n
protocol
\n Protocol value\n-
flags
\n- Socket flags value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
type
\n Socket type value\n-
state
\n- Socket state value\n
family
\n Protocol family value\n-
name
\n- Name of this probe\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n+
state
\n+ Socket state value\n
probe::socket.write_iter — \n Message send via sock_write_iter
\n
socket.write_iter
protocol
\n Protocol value\n-
state
\n- Socket state value\n-
type
\n- Socket type value\n-
flags
\n- Socket flags value\n-
family
\n- Protocol family value\n
name
\n Name of this probe\n+
flags
\n+ Socket flags value\n
size
\n Message size in bytes\n+
type
\n+ Socket type value\n+
family
\n+ Protocol family value\n+
state
\n+ Socket state value\n
probe::socket.writev.return — \n Conclusion of message sent via socket_writev
\n-
socket.writev.return
size
\n- Size of message sent (in bytes) or error code if success = 0\n-
name
\n+
socket.writev.return
name
\n Name of this probe\n-
type
\n- Socket type value\n+
protocol
\n+ Protocol value\n
flags
\n Socket flags value\n+
size
\n+ Size of message sent (in bytes) or error code if success = 0\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n+
type
\n+ Socket type value\n
family
\n Protocol family value\n
state
\n Socket state value\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n-
protocol
\n- Protocol value\n
probe::socket.writev — \n Message sent via socket_writev
\n-
socket.writev
protocol
\n- Protocol value\n-
flags
\n- Socket flags value\n-
type
\n+
socket.writev
type
\n Socket type value\n-
state
\n- Socket state value\n
family
\n Protocol family value\n+
state
\n+ Socket state value\n
name
\n Name of this probe\n+
protocol
\n+ Protocol value\n+
flags
\n+ Socket flags value\n
size
\n Message size in bytes\n
\n Fires at the beginning of sending a message on a socket\n via the sock_writev
function\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-softirq-entry.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-softirq-entry.html", "unified_diff": "@@ -1,11 +1,11 @@\n
probe::softirq.entry — \n Execution of handler for a pending softirq starting\n-
softirq.entry
probe::softirq.exit — \n Execution of handler for a pending softirq completed\n
softirq.exit
probe::stap.cache_add_mod — \n Adding kernel instrumentation module to cache\n-
stap.cache_add_mod
dest_path
\n- the path the .ko file is going to (incl filename)\n-
source_path
\n+
stap.cache_add_mod
probe::stap.cache_add_src — \n Adding C code translation to cache\n-
stap.cache_add_src
dest_path
\n- the path the .c file is going to (incl filename)\n-
source_path
\n+
stap.cache_add_src
probe::stap.system.spawn — \n stap spawned new process\n-
stap.system.spawn
probe::stapio.receive_control_message — \n Received a control message\n-
stapio.receive_control_message
data
\n- a ptr to a binary blob of data sent as the control message\n-
len
\n+
stapio.receive_control_message
probe::staprun.send_control_message — \n Sending a control message\n
staprun.send_control_message
probe::sunrpc.clnt.bind_new_program — \n Bind a new RPC program to an existing client\n-
sunrpc.clnt.bind_new_program
old_progname
\n+
sunrpc.clnt.bind_new_program
servername
\n+ the server machine name\n+
vers
\n+ the version of new RPC program\n+
old_vers
\n+ the version of old RPC program\n+
old_progname
\n the name of old RPC program\n
old_prog
\n the number of old RPC program\n-
servername
\n- the server machine name\n
progname
\n the name of new RPC program\n
prog
\n the number of new RPC program\n-
old_vers
\n- the version of old RPC program\n-
vers
\n- the version of new RPC program\n
probe::sunrpc.clnt.call_async — \n Make an asynchronous RPC call\n-
sunrpc.clnt.call_async
prog
\n- the RPC program number\n-
xid
\n- current transmission id\n-
flags
\n- flags\n-
prot
\n+
sunrpc.clnt.call_async
prot
\n the IP protocol number\n-
procname
\n- the procedure name in this RPC call\n
port
\n the port number\n-
vers
\n- the RPC program version number\n-
dead
\n- whether this client is abandoned\n-
servername
\n- the server machine name\n
progname
\n the RPC program name\n+
xid
\n+ current transmission id\n+
dead
\n+ whether this client is abandoned\n+
prog
\n+ the RPC program number\n+
procname
\n+ the procedure name in this RPC call\n
proc
\n the procedure number in this RPC call\n+
servername
\n+ the server machine name\n+
flags
\n+ flags\n+
vers
\n+ the RPC program version number\n
probe::sunrpc.clnt.call_sync — \n Make a synchronous RPC call\n-
sunrpc.clnt.call_sync
port
\n- the port number\n+
sunrpc.clnt.call_sync
servername
\n+ the server machine name\n
flags
\n flags\n-
prot
\n- the IP protocol number\n-
procname
\n- the procedure name in this RPC call\n-
xid
\n- current transmission id\n-
prog
\n- the RPC program number\n
vers
\n the RPC program version number\n
dead
\n whether this client is abandoned\n-
proc
\n- the procedure number in this RPC call\n
progname
\n the RPC program name\n-
servername
\n- the server machine name\n+
xid
\n+ current transmission id\n+
port
\n+ the port number\n+
prot
\n+ the IP protocol number\n+
prog
\n+ the RPC program number\n+
procname
\n+ the procedure name in this RPC call\n+
proc
\n+ the procedure number in this RPC call\n
probe::sunrpc.clnt.clone_client — \n Clone an RPC client structure\n-
sunrpc.clnt.clone_client
servername
\n- the server machine name\n-
vers
\n- the RPC program version number\n+
sunrpc.clnt.clone_client
prog
\n+ the RPC program number\n
progname
\n the RPC program name\n-
prot
\n- the IP protocol number\n-
prog
\n- the RPC program number\n
authflavor
\n the authentication flavor\n+
prot
\n+ the IP protocol number\n
port
\n the port number\n+
vers
\n+ the RPC program version number\n+
servername
\n+ the server machine name\n
probe::sunrpc.clnt.create_client — \n Create an RPC client\n-
sunrpc.clnt.create_client
authflavor
\n- the authentication flavor\n+
sunrpc.clnt.create_client
vers
\n+ the RPC program version number\n+
servername
\n+ the server machine name\n+
prog
\n+ the RPC program number\n
port
\n the port number\n
prot
\n the IP protocol number\n-
prog
\n- the RPC program number\n-
vers
\n- the RPC program version number\n+
authflavor
\n+ the authentication flavor\n
progname
\n the RPC program name\n-
servername
\n- the server machine name\n
probe::sunrpc.clnt.restart_call — \n Restart an asynchronous RPC call\n-
sunrpc.clnt.restart_call
servername
\n- the server machine name\n-
tk_priority
\n+
sunrpc.clnt.restart_call
tk_priority
\n the task priority\n-
tk_flags
\n- the task flags\n+
servername
\n+ the server machine name\n
tk_pid
\n the debugging aid of task\n-
tk_runstate
\n- the task run status\n-
prog
\n- the RPC program number\n
xid
\n the transmission id\n+
tk_flags
\n+ the task flags\n+
prog
\n+ the RPC program number\n+
tk_runstate
\n+ the task run status\n
probe::sunrpc.clnt.shutdown_client — \n Shutdown an RPC client\n-
sunrpc.clnt.shutdown_client
progname
\n- the RPC program name\n-
tasks
\n- the number of references\n-
servername
\n- the server machine name\n+
sunrpc.clnt.shutdown_client
prog
\n+ the RPC program number\n
om_rtt
\n the RPC RTT jiffies\n-
om_ops
\n- the count of operations\n+
om_execute
\n+ the RPC execution jiffies\n+
prot
\n+ the IP protocol number\n
om_ntrans
\n the count of RPC transmissions\n-
om_queue
\n- the jiffies queued for xmit\n-
vers
\n- the RPC program version number\n-
netreconn
\n- the count of reconnections\n-
om_bytes_recv
\n- the count of bytes in\n-
om_bytes_sent
\n- the count of bytes out\n
port
\n the port number\n-
clones
\n- the number of clones\n-
om_execute
\n- the RPC execution jiffies\n
authflavor
\n the authentication flavor\n+
progname
\n+ the RPC program name\n
rpccnt
\n the count of RPC calls\n-
prog
\n- the RPC program number\n-
prot
\n- the IP protocol number\n+
om_ops
\n+ the count of operations\n+
clones
\n+ the number of clones\n+
tasks
\n+ the number of references\n+
om_bytes_recv
\n+ the count of bytes in\n+
vers
\n+ the RPC program version number\n+
netreconn
\n+ the count of reconnections\n+
om_bytes_sent
\n+ the count of bytes out\n+
om_queue
\n+ the jiffies queued for xmit\n+
servername
\n+ the server machine name\n
probe::sunrpc.sched.delay — \n Delay an RPC task\n-
sunrpc.sched.delay
tk_flags
\n- the flags of the task\n-
tk_pid
\n- the debugging id of the task\n-
delay
\n+
sunrpc.sched.delay
delay
\n the time delayed\n-
prot
\n- the IP protocol in the RPC call\n
xid
\n the transmission id in the RPC call\n+
prot
\n+ the IP protocol in the RPC call\n+
tk_flags
\n+ the flags of the task\n
prog
\n the program number in the RPC call\n+
tk_pid
\n+ the debugging id of the task\n
vers
\n the program version in the RPC call\n
probe::sunrpc.sched.execute — \n Execute the RPC `scheduler'\n-
sunrpc.sched.execute
tk_flags
\n- the flags of the task\n-
tk_pid
\n+
sunrpc.sched.execute
tk_pid
\n the debugging id of the task\n
vers
\n the program version in the RPC call\n-
prog
\n- the program number in the RPC call\n
xid
\n the transmission id in the RPC call\n
prot
\n the IP protocol in the RPC call\n+
tk_flags
\n+ the flags of the task\n+
prog
\n+ the program number in the RPC call\n
probe::sunrpc.sched.new_task — \n Create new task for the specified client\n-
sunrpc.sched.new_task
tk_flags
\n- the flags of the task\n-
vers
\n+
sunrpc.sched.new_task
vers
\n the program version in the RPC call\n-
prog
\n- the program number in the RPC call\n-
xid
\n- the transmission id in the RPC call\n
prot
\n the IP protocol in the RPC call\n+
xid
\n+ the transmission id in the RPC call\n+
prog
\n+ the program number in the RPC call\n+
tk_flags
\n+ the flags of the task\n
probe::sunrpc.sched.release_task — \n Release all resources associated with a task\n-
sunrpc.sched.release_task
xid
\n- the transmission id in the RPC call\n-
prog
\n+
sunrpc.sched.release_task
probe::sunrpc.svc.create — \n Create an RPC service\n-
sunrpc.svc.create
probe::sunrpc.svc.destroy — \n Destroy an RPC service\n-
sunrpc.svc.destroy
rpcbadauth
\n- the count of requests drooped for authentication failure\n-
sv_nrthreads
\n- the number of concurrent threads\n+
sunrpc.svc.destroy
netcnt
\n+ the count of received RPC requests\n+
nettcpconn
\n+ the count of accepted TCP connections\n
sv_prog
\n the number of the program\n+
sv_nrthreads
\n+ the number of concurrent threads\n+
rpcbadauth
\n+ the count of requests drooped for authentication failure\n
sv_progname
\n the name of the program\n
rpcbadfmt
\n the count of requests dropped for bad formats\n-
netcnt
\n- the count of received RPC requests\n-
sv_name
\n- the service name\n-
nettcpconn
\n- the count of accepted TCP connections\n
rpccnt
\n the count of valid RPC requests\n+
sv_name
\n+ the service name\n
probe::sunrpc.svc.drop — \n Drop RPC request\n-
sunrpc.svc.drop
rq_proc
\n- the procedure number in the request\n-
rq_xid
\n- the transmission id in the request\n-
rq_prog
\n- the program number in the request\n-
rq_prot
\n+
sunrpc.svc.drop
rq_prot
\n the IP protocol of the reqeust\n-
sv_name
\n- the service name\n+
rq_proc
\n+ the procedure number in the request\n
peer_ip
\n the peer address where the request is from\n
rq_vers
\n the program version in the request\n+
sv_name
\n+ the service name\n+
rq_xid
\n+ the transmission id in the request\n+
rq_prog
\n+ the program number in the request\n
probe::sunrpc.svc.process — \n Process an RPC request\n-
sunrpc.svc.process
sv_prog
\n- the number of the program\n-
sv_nrthreads
\n- the number of concurrent threads\n-
rq_vers
\n- the program version in the request\n-
peer_ip
\n- the peer address where the request is from\n-
sv_name
\n+
sunrpc.svc.process
sv_name
\n the service name\n-
rq_proc
\n- the procedure number in the request\n-
rq_xid
\n- the transmission id in the request\n
rq_prog
\n the program number in the request\n+
rq_xid
\n+ the transmission id in the request\n+
sv_nrthreads
\n+ the number of concurrent threads\n+
sv_prog
\n+ the number of the program\n
rq_prot
\n the IP protocol of the reqeust\n+
rq_proc
\n+ the procedure number in the request\n+
peer_ip
\n+ the peer address where the request is from\n+
rq_vers
\n+ the program version in the request\n
probe::sunrpc.svc.recv — \n Listen for the next RPC request on any socket\n-
sunrpc.svc.recv
sv_prog
\n- the number of the program\n-
sv_nrthreads
\n- the number of concurrent threads\n-
timeout
\n+
sunrpc.svc.recv
probe::sunrpc.svc.register — \n Register an RPC service with the local portmapper\n-
sunrpc.svc.register
sv_name
\n+
sunrpc.svc.register
probe::sunrpc.svc.send — \n Return reply to RPC client\n-
sunrpc.svc.send
rq_proc
\n- the procedure number in the request\n-
rq_xid
\n+
sunrpc.svc.send
rq_xid
\n the transmission id in the request\n
rq_prog
\n the program number in the request\n-
rq_prot
\n- the IP protocol of the reqeust\n
sv_name
\n the service name\n
peer_ip
\n the peer address where the request is from\n
rq_vers
\n the program version in the request\n+
rq_prot
\n+ the IP protocol of the reqeust\n+
rq_proc
\n+ the procedure number in the request\n
probe::syscall_any.return — \n Record exit from a syscall\n-
syscall_any.return
syscall_nr
\n+
syscall_any.return
retval
\n+ return value of the syscall\n+
syscall_nr
\n number of the syscall\n
name
\n name of the syscall\n-
retval
\n- return value of the syscall\n
\n The syscall_any.return probe point is designed to be a low overhead\n that monitors all the syscalls returns via a kernel tracepoint.\n Because of the breadth of syscalls it monitors it provides\n no information about the syscall arguments, argstr string\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect-return.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect-return.html", "unified_diff": "@@ -1,9 +1,9 @@\n
probe::tcp.disconnect.return — \n TCP socket disconnection complete\n-
tcp.disconnect.return
probe::tcp.disconnect — \n TCP socket disconnection\n-
tcp.disconnect
daddr
\n- A string representing the destination IP address\n-
sock
\n- Network socket \n+
tcp.disconnect
saddr
\n+ A string representing the source IP address\n
name
\n Name of this probe\n-
family
\n- IP address family\n-
sport
\n- TCP source port \n
flags
\n TCP flags (e.g. FIN, etc) \n+
sport
\n+ TCP source port \n+
sock
\n+ Network socket \n
dport
\n TCP destination port\n-
saddr
\n- A string representing the source IP address\n+
daddr
\n+ A string representing the destination IP address\n+
family
\n+ IP address family\n
probe::tcp.receive — \n Called when a TCP packet is received\n-
tcp.receive
name
\n- Name of the probe point\n-
family
\n- IP address family\n-
sport
\n- TCP source port\n-
ack
\n- TCP ACK flag\n-
dport
\n- TCP destination port\n-
iphdr
\n- IP header address\n-
daddr
\n- A string representing the destination IP address\n+
tcp.receive
urg
\n+ TCP URG flag\n
psh
\n TCP PSH flag\n+
ack
\n+ TCP ACK flag\n
protocol
\n Packet protocol from driver\n+
sport
\n+ TCP source port\n+
name
\n+ Name of the probe point\n+
rst
\n+ TCP RST flag\n+
saddr
\n+ A string representing the source IP address\n
syn
\n TCP SYN flag\n+
family
\n+ IP address family\n+
daddr
\n+ A string representing the destination IP address\n+
dport
\n+ TCP destination port\n
fin
\n TCP FIN flag\n-
urg
\n- TCP URG flag\n-
saddr
\n- A string representing the source IP address\n-
rst
\n- TCP RST flag\n+
iphdr
\n+ IP header address\n
probe::tcp.recvmsg.return — \n Receiving TCP message complete\n-
tcp.recvmsg.return
name
\n- Name of this probe\n+
tcp.recvmsg.return
dport
\n+ TCP destination port\n
family
\n IP address family\n-
daddr
\n- A string representing the destination IP address\n-
sport
\n- TCP source port \n-
dport
\n- TCP destination port\n
size
\n Number of bytes received or error code if an error occurred.\n+
daddr
\n+ A string representing the destination IP address\n+
name
\n+ Name of this probe\n
saddr
\n A string representing the source IP address\n+
sport
\n+ TCP source port \n
probe::tcp.recvmsg — \n Receiving TCP message\n-
tcp.recvmsg
saddr
\n- A string representing the source IP address\n-
size
\n- Number of bytes to be received \n+
tcp.recvmsg
sock
\n+ Network socket\n
dport
\n TCP destination port\n-
sport
\n- TCP source port \n-
sock
\n- Network socket\n+
size
\n+ Number of bytes to be received \n
daddr
\n A string representing the destination IP address\n
family
\n IP address family\n+
saddr
\n+ A string representing the source IP address\n
name
\n Name of this probe\n+
sport
\n+ TCP source port \n
probe::tcp.sendmsg — \n Sending a tcp message\n-
tcp.sendmsg
size
\n- Number of bytes to send \n+
tcp.sendmsg
probe::tcp.setsockopt.return — \n Return from setsockopt
\n-
tcp.setsockopt.return
probe::tcp.setsockopt — \n Call to setsockopt
\n-
tcp.setsockopt
optname
\n+
tcp.setsockopt
level
\n+ The level at which the socket options will be manipulated\n+
name
\n+ Name of this probe\n+
optname
\n TCP socket options (e.g. TCP_NODELAY, TCP_MAXSEG, etc)\n
optstr
\n Resolves optname to a human-readable format\n
optlen
\n Used to access values for setsockopt
\n-
level
\n- The level at which the socket options will be manipulated\n
sock
\n Network socket\n-
name
\n- Name of this probe\n
family
\n IP address family\n
probe::tcpmib.EstabResets — \n Count the reset of a socket\n-
tcpmib.EstabResets
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.EstabResets
probe::tcpmib.OutRsts — \n Count the sending of a reset packet\n-
tcpmib.OutRsts
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.OutRsts
probe::tcpmib.RetransSegs — \n Count the retransmission of a TCP segment\n-
tcpmib.RetransSegs
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.RetransSegs
probe::tty.ioctl — \n called when a ioctl is request to the tty\n-
tty.ioctl
probe::tty.poll — \n Called when a tty device is being polled\n-
tty.poll
probe::tty.read — \n called when a tty line will be read\n-
tty.read
probe::tty.receive — \n called when a tty receives a message\n-
tty.receive
cp
\n- the buffer that was received\n+
tty.receive
name
\n+ the name of the module file\n
driver_name
\n the driver name\n+
count
\n+ The amount of characters received\n
fp
\n The flag buffer\n-
index
\n- The tty Index\n+
cp
\n+ the buffer that was received\n
id
\n the tty id\n-
name
\n- the name of the module file\n-
count
\n- The amount of characters received\n+
index
\n+ The tty Index\n
probe::tty.register — \n Called when a tty device is registred\n-
tty.register
name
\n- the driver .dev_name name\n-
module
\n- the module name\n-
index
\n+
tty.register
probe::tty.release — \n Called when the tty is closed\n-
tty.release
inode_number
\n- the inode number\n-
file_mode
\n- the file mode\n-
file_name
\n+
tty.release
probe::tty.resize — \n Called when a terminal resize happens\n
tty.resize
old_col
\n the old col value\n
new_col
\n the new col value\n-
name
\n- the tty name\n-
old_row
\n- the old row value\n-
new_xpixel
\n- the new xpixel value\n-
new_row
\n- the new row value\n-
old_xpixel
\n- the old xpixel\n
new_ypixel
\n the new ypixel value\n
old_ypixel
\n the old ypixel\n+
new_xpixel
\n+ the new xpixel value\n+
old_xpixel
\n+ the old xpixel\n+
name
\n+ the tty name\n+
new_row
\n+ the new row value\n+
old_row
\n+ the old row value\n
probe::tty.write — \n write to the tty line\n-
tty.write
probe::udp.disconnect.return — \n UDP has been disconnected successfully\n-
udp.disconnect.return
dport
\n- UDP destination port\n-
sport
\n+
udp.disconnect.return
sport
\n UDP source port\n-
name
\n- The name of this probe\n
ret
\n Error code (0: no error) \n
daddr
\n A string representing the destination IP address\n-
saddr
\n- A string representing the source IP address\n
family
\n IP address family\n+
dport
\n+ UDP destination port\n+
name
\n+ The name of this probe\n+
saddr
\n+ A string representing the source IP address\n
probe::udp.disconnect — \n Fires when a process requests for a UDP disconnection\n-
udp.disconnect
family
\n- IP address family\n+
udp.disconnect
dport
\n+ UDP destination port\n+
name
\n+ The name of this probe\n
sock
\n Network socket used by the process\n
saddr
\n A string representing the source IP address\n-
daddr
\n- A string representing the destination IP address\n
flags
\n Flags (e.g. FIN, etc) \n-
dport
\n- UDP destination port\n
sport
\n UDP source port\n-
name
\n- The name of this probe\n+
family
\n+ IP address family\n+
daddr
\n+ A string representing the destination IP address\n
probe::udp.recvmsg.return — \n Fires whenever an attempt to receive a UDP message received is completed\n-
udp.recvmsg.return
family
\n- IP address family\n-
daddr
\n- A string representing the destination IP address\n-
saddr
\n- A string representing the source IP address\n+
udp.recvmsg.return
name
\n+ The name of this probe\n
size
\n Number of bytes received by the process\n-
name
\n- The name of this probe\n-
sport
\n- UDP source port\n
dport
\n UDP destination port\n+
saddr
\n+ A string representing the source IP address\n+
sport
\n+ UDP source port\n+
daddr
\n+ A string representing the destination IP address\n+
family
\n+ IP address family\n
probe::udp.recvmsg — \n Fires whenever a UDP message is received\n-
udp.recvmsg
sock
\n- Network socket used by the process\n+
udp.recvmsg
daddr
\n+ A string representing the destination IP address\n
family
\n IP address family\n-
size
\n- Number of bytes received by the process\n-
daddr
\n- A string representing the destination IP address\n+
sport
\n+ UDP source port\n
saddr
\n A string representing the source IP address\n
dport
\n UDP destination port\n-
sport
\n- UDP source port\n+
size
\n+ Number of bytes received by the process\n
name
\n The name of this probe\n+
sock
\n+ Network socket used by the process\n
probe::udp.sendmsg — \n Fires whenever a process sends a UDP message\n-
udp.sendmsg
family
\n- IP address family\n+
udp.sendmsg
saddr
\n+ A string representing the source IP address\n+
size
\n+ Number of bytes sent by the process\n
sock
\n Network socket used by the process \n-
dport
\n- UDP destination port\n-
sport
\n- UDP source port\n
name
\n The name of this probe\n-
size
\n- Number of bytes sent by the process\n-
saddr
\n- A string representing the source IP address\n+
dport
\n+ UDP destination port\n
daddr
\n A string representing the destination IP address\n+
family
\n+ IP address family\n+
sport
\n+ UDP source port\n
probe::vm.brk — \n Fires when a brk is requested (i.e. the heap will be resized)\n-
vm.brk
address
\n- the requested address\n+
vm.brk
probe::vm.kfree — \n Fires when kfree is requested\n-
vm.kfree
probe::vm.kmalloc_node — \n Fires when kmalloc_node is requested\n-
vm.kmalloc_node
gfp_flag_name
\n- type of kmemory to allocate(in string format)\n-
call_site
\n+
vm.kmalloc_node
call_site
\n address of the function caling this kmemory function\n-
bytes_alloc
\n- allocated Bytes\n-
gfp_flags
\n- type of kmemory to allocate\n+
gfp_flag_name
\n+ type of kmemory to allocate(in string format)\n+
caller_function
\n+ name of the caller function\n
ptr
\n pointer to the kmemory allocated\n-
name
\n- name of the probe point\n+
gfp_flags
\n+ type of kmemory to allocate\n
bytes_req
\n requested Bytes\n-
caller_function
\n- name of the caller function\n+
bytes_alloc
\n+ allocated Bytes\n+
name
\n+ name of the probe point\n
probe::vm.kmalloc — \n Fires when kmalloc is requested\n-
vm.kmalloc
gfp_flag_name
\n- type of kmemory to allocate (in String format)\n+
vm.kmalloc
name
\n+ name of the probe point\n
bytes_alloc
\n allocated Bytes\n+
bytes_req
\n+ requested Bytes\n
gfp_flags
\n type of kmemory to allocate\n-
call_site
\n- address of the kmemory function\n
ptr
\n pointer to the kmemory allocated\n-
name
\n- name of the probe point\n-
bytes_req
\n- requested Bytes\n
caller_function
\n name of the caller function\n+
gfp_flag_name
\n+ type of kmemory to allocate (in String format)\n+
call_site
\n+ address of the kmemory function\n
probe::vm.kmem_cache_alloc_node — \n Fires when kmem_cache_alloc_node is requested\n-
vm.kmem_cache_alloc_node
caller_function
\n+
vm.kmem_cache_alloc_node
call_site
\n+ address of the function calling this kmemory function\n+
gfp_flag_name
\n+ type of kmemory to allocate(in string format)\n+
caller_function
\n name of the caller function\n-
bytes_req
\n- requested Bytes\n-
name
\n- name of the probe point\n
ptr
\n pointer to the kmemory allocated\n-
bytes_alloc
\n- allocated Bytes\n
gfp_flags
\n type of kmemory to allocate\n-
call_site
\n- address of the function calling this kmemory function\n-
gfp_flag_name
\n- type of kmemory to allocate(in string format)\n+
bytes_req
\n+ requested Bytes\n+
bytes_alloc
\n+ allocated Bytes\n+
name
\n+ name of the probe point\n
probe::vm.kmem_cache_alloc — \n Fires when kmem_cache_alloc is requested\n-
vm.kmem_cache_alloc
bytes_req
\n+
vm.kmem_cache_alloc
gfp_flags
\n+ type of kmemory to allocate\n+
bytes_req
\n requested Bytes\n-
caller_function
\n- name of the caller function.\n-
call_site
\n- address of the function calling this kmemory function.\n+
ptr
\n+ pointer to the kmemory allocated\n+
name
\n+ name of the probe point\n
bytes_alloc
\n allocated Bytes\n-
gfp_flags
\n- type of kmemory to allocate\n
gfp_flag_name
\n type of kmemory to allocate(in string format)\n-
name
\n- name of the probe point\n-
ptr
\n- pointer to the kmemory allocated\n+
call_site
\n+ address of the function calling this kmemory function.\n+
caller_function
\n+ name of the caller function.\n
probe::vm.kmem_cache_free — \n Fires when kmem_cache_free is requested\n
vm.kmem_cache_free
caller_function
\n Name of the caller function.\n+
call_site
\n+ Address of the function calling this kmemory function\n
name
\n Name of the probe point\n
ptr
\n Pointer to the kmemory allocated which is returned by kmem_cache\n-
call_site
\n- Address of the function calling this kmemory function\n
probe::vm.write_shared_copy — \n Page copy for shared page write\n
vm.write_shared_copy
probe::workqueue.create — \n Creating a new workqueue\n-
workqueue.create
probe::workqueue.execute — \n Executing deferred work\n-
workqueue.execute