{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/r-b-build.FuEs0VPC/b1/systemtap_5.1-5_amd64.changes", "source2": "/srv/reproducible-results/rbuild-debian/r-b-build.FuEs0VPC/b2/systemtap_5.1-5_amd64.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -1,11 +1,11 @@\n \n 7fea7b3128732f41cc8bba686d6b4f8b 8620 devel optional systemtap-client_5.1-5_amd64.deb\n 0d7fe381c18e8116e942115ebc215dbb 640188 devel optional systemtap-common_5.1-5_amd64.deb\n 4bfa885ae5d24f3c30ee4b22e0f0eaea 22008548 debug optional systemtap-dbgsym_5.1-5_amd64.deb\n- 3ce2750d6879752d7fc8fe3fdd5d069c 2585472 doc optional systemtap-doc_5.1-5_amd64.deb\n+ 080f0b7f97a0c20ad9b37e66d559e383 2585364 doc optional systemtap-doc_5.1-5_amd64.deb\n 731d177a95cdb6010d7996340a0677c5 1270440 debug optional systemtap-runtime-dbgsym_5.1-5_amd64.deb\n 95b6945d6a7a371c4c7fd35ac964bdbf 149088 devel optional systemtap-runtime_5.1-5_amd64.deb\n 1cb2231c05fc4d247e6639bb546fb96f 18960 devel optional systemtap-sdt-dev_5.1-5_amd64.deb\n 91e605bd185d1d9f53c74f452f9bd72e 2088216 debug optional systemtap-server-dbgsym_5.1-5_amd64.deb\n a6bac800d1a10049bcdcd80e3e6a4974 163212 devel optional systemtap-server_5.1-5_amd64.deb\n b168d6514ebf4599c96985696ad478bc 1530492 devel optional systemtap_5.1-5_amd64.deb\n"}, {"source1": "systemtap-doc_5.1-5_amd64.deb", "source2": "systemtap-doc_5.1-5_amd64.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2025-07-01 13:52:26.000000 debian-binary\n--rw-r--r-- 0 0 0 54184 2025-07-01 13:52:26.000000 control.tar.xz\n--rw-r--r-- 0 0 0 2531096 2025-07-01 13:52:26.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 54200 2025-07-01 13:52:26.000000 control.tar.xz\n+-rw-r--r-- 0 0 0 2530972 2025-07-01 13:52:26.000000 data.tar.xz\n"}, {"source1": "control.tar.xz", "source2": "control.tar.xz", "unified_diff": null, "details": [{"source1": "control.tar", "source2": "control.tar", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "comments": ["Files differ"], "unified_diff": null}]}]}]}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "unified_diff": "@@ -1,41 +1,41 @@\n
probe::ioblock.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock.end
opf
\n- operations and flags\n-
devname
\n- block device name\n-
size
\n- total size in bytes\n-
rw
\n- binary trace for read/write request\n+
ioblock.end
error
\n+ 0 on success\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n
ino
\n i-node number of the mapped file\n+
opf
\n+ operations and flags\n+
phys_segments
\n+ number of segments in this bio after physical address coalescing is performed.\n
name
\n name of the probe point\n-
sector
\n- beginning sector for the entire bio\n
hw_segments
\n number of segments after physical and DMA remapping hardware coalescing is performed\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
phys_segments
\n- number of segments in this bio after physical address coalescing is performed.\n+
size
\n+ total size in bytes\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
rw
\n+ binary trace for read/write request\n
bytes_done
\n number of bytes transferred\n-
error
\n- 0 on success\n
idx
\n offset into the bio vector array\n+
devname
\n+ block device name\n+
sector
\n+ beginning sector for the entire bio\n
probe::ioblock.request — \n Fires whenever making a generic block I/O request.\n-
ioblock.request
rw
\n- binary trace for read/write request\n-
size
\n- total size in bytes\n-
devname
\n- block device name\n-
bdev
\n+
ioblock.request
bdev
\n target block device\n
vcnt
\n bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n-
hw_segments
\n- number of segments after physical and DMA remapping hardware coalescing is performed\n-
sector
\n- beginning sector for the entire bio\n
bdev_contains
\n points to the device object which contains the partition (when bio structure represents a partition)\n-
ino
\n- i-node number of the mapped file\n-
name
\n- name of the probe point\n+
phys_segments
\n+ number of segments in this bio after physical address coalescing is performed\n
opf
\n operations and flags\n+
ino
\n+ i-node number of the mapped file\n
p_start_sect
\n points to the start sector of the partition structure of the device\n+
sector
\n+ beginning sector for the entire bio\n+
devname
\n+ block device name\n+
hw_segments
\n+ number of segments after physical and DMA remapping hardware coalescing is performed\n+
name
\n+ name of the probe point\n
idx
\n offset into the bio vector array\n-
phys_segments
\n- number of segments in this bio after physical address coalescing is performed\n+
rw
\n+ binary trace for read/write request\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid \n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
size
\n+ total size in bytes\n
probe::ioblock_trace.bounce — \n Fires whenever a buffer bounce is needed for at least one page of a block IO request.\n-
ioblock_trace.bounce
name
\n- name of the probe point\n-
bdev_contains
\n+
ioblock_trace.bounce
bdev_contains
\n points to the device object which contains the partition (when bio structure represents a partition)\n+
opf
\n+ operations and flags\n
ino
\n i-node number of the mapped file\n-
q
\n- request queue on which this bio was queued.\n-
sector
\n- beginning sector for the entire bio\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n
bdev
\n target block device\n-
devname
\n- device for which a buffer bounce was needed.\n-
size
\n- total size in bytes\n-
rw
\n- binary trace for read/write request\n-
opf
\n- operations and flags\n-
bytes_done
\n- number of bytes transferred\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n
p_start_sect
\n points to the start sector of the partition structure of the device\n+
sector
\n+ beginning sector for the entire bio\n+
devname
\n+ device for which a buffer bounce was needed.\n
idx
\n offset into the bio vector array\n phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
bytes_done
\n+ number of bytes transferred\n+
rw
\n+ binary trace for read/write request\n+
size
\n+ total size in bytes\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
q
\n+ request queue on which this bio was queued.\n+
name
\n+ name of the probe point\n
probe::ioblock_trace.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock_trace.end
flags
\n+
ioblock_trace.end
devname
\n+ block device name\n+
sector
\n+ beginning sector for the entire bio\n+
name
\n+ name of the probe point\n+
q
\n+ request queue on which this bio was queued.\n+
rw
\n+ binary trace for read/write request\n+
size
\n+ total size in bytes\n+
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n
bytes_done
\n number of bytes transferred\n
idx
\n offset into the bio vector array\n phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
opf
\n- operations and flags\n-
devname
\n- block device name\n-
size
\n- total size in bytes\n-
rw
\n- binary trace for read/write request\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
bdev
\n+ target block device\n
ino
\n i-node number of the mapped file\n+
opf
\n+ operations and flags\n
bdev_contains
\n points to the device object which contains the partition (when bio structure represents a partition)\n-
name
\n- name of the probe point\n-
sector
\n- beginning sector for the entire bio\n-
q
\n- request queue on which this bio was queued.\n-
bdev
\n- target block device\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n
probe::ioblock_trace.request — \n Fires just as a generic block I/O request is created for a bio.\n-
ioblock_trace.request
opf
\n- operations and flags\n-
size
\n- total size in bytes\n-
rw
\n- binary trace for read/write request\n-
devname
\n- block device name\n-
bdev
\n- target block device\n+
ioblock_trace.request
p_start_sect
\n+ points to the start sector of the partition structure of the device\n
vcnt
\n bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n+
bdev
\n+ target block device\n
ino
\n i-node number of the mapped file\n+
opf
\n+ operations and flags\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n
name
\n name of the probe point\n-
sector
\n- beginning sector for the entire bio\n
q
\n request queue on which this bio was queued.\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
size
\n+ total size in bytes\n+
rw
\n+ binary trace for read/write request\n
bytes_done
\n number of bytes transferred\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n
idx
\n offset into the bio vector array\n phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
devname
\n+ block device name\n+
sector
\n+ beginning sector for the entire bio\n
probe::ioscheduler.elv_add_request.kp — \n kprobe based probe to indicate that a request was added to the request queue\n
ioscheduler.elv_add_request.kp
rq
\n Address of the request\n-
elevator_name
\n- The type of I/O elevator currently enabled\n
disk_major
\n Disk major number of the request\n
q
\n pointer to request queue\n-
name
\n- Name of the probe point\n-
disk_minor
\n- Disk minor number of the request\n
rq_flags
\n Request flags\n+
disk_minor
\n+ Disk minor number of the request\n+
name
\n+ Name of the probe point\n+
elevator_name
\n+ The type of I/O elevator currently enabled\n
probe::ioscheduler.elv_add_request.tp — \n tracepoint based probe to indicate a request is added to the request queue.\n-
ioscheduler.elv_add_request.tp
rq_flags
\n+
ioscheduler.elv_add_request.tp
q
\n+ Pointer to request queue.\n+
rq
\n+ Address of request.\n+
disk_major
\n+ Disk major no of request.\n+
rq_flags
\n Request flags.\n
name
\n Name of the probe point\n
disk_minor
\n Disk minor number of request.\n-
disk_major
\n- Disk major no of request.\n-
q
\n- Pointer to request queue.\n-
rq
\n- Address of request.\n
elevator_name
\n The type of I/O elevator currently enabled.\n
probe::ioscheduler.elv_add_request — \n probe to indicate request is added to the request queue.\n-
ioscheduler.elv_add_request
rq_flags
\n- Request flags.\n-
disk_minor
\n- Disk minor number of request.\n-
q
\n+
ioscheduler.elv_add_request
probe::ioscheduler.elv_completed_request — \n Fires when a request is completed\n
ioscheduler.elv_completed_request
probe::ioscheduler.elv_next_request.return — \n Fires when a request retrieval issues a return signal\n-
ioscheduler.elv_next_request.return
disk_major
\n- Disk major number of the request\n-
rq_flags
\n- Request flags\n-
name
\n+
ioscheduler.elv_next_request.return
probe::ioscheduler.elv_next_request — \n Fires when a request is retrieved from the request queue\n-
ioscheduler.elv_next_request
elevator_name
\n- The type of I/O elevator currently enabled\n-
name
\n+
ioscheduler.elv_next_request
probe::ioscheduler_trace.elv_abort_request — \n Fires when a request is aborted.\n
ioscheduler_trace.elv_abort_request
rq_flags
\n Request flags.\n-
disk_minor
\n- Disk minor number of request.\n-
name
\n- Name of the probe point\n
disk_major
\n Disk major no of request.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n
rq
\n Address of request.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n+
disk_minor
\n+ Disk minor number of request.\n+
name
\n+ Name of the probe point\n
probe::ioscheduler_trace.elv_completed_request — \n Fires when a request is\n-
ioscheduler_trace.elv_completed_request
name
\n- Name of the probe point\n-
disk_minor
\n+
ioscheduler_trace.elv_completed_request
disk_minor
\n Disk minor number of request.\n-
rq_flags
\n- Request flags.\n-
rq
\n- Address of request.\n+
name
\n+ Name of the probe point\n
elevator_name
\n The type of I/O elevator currently enabled.\n+
rq
\n+ Address of request.\n
disk_major
\n Disk major no of request.\n+
rq_flags
\n+ Request flags.\n
probe::ioscheduler_trace.elv_issue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_issue_request
disk_major
\n- Disk major no of request.\n+
ioscheduler_trace.elv_issue_request
probe::ioscheduler_trace.elv_requeue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_requeue_request
rq
\n- Address of request.\n-
elevator_name
\n+
ioscheduler_trace.elv_requeue_request
probe::ioscheduler_trace.plug — \n Fires when a request queue is plugged;\n-
ioscheduler_trace.plug
probe::ipmib.ForwDatagrams — \n Count forwarded packet\n-
ipmib.ForwDatagrams
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.ForwDatagrams
probe::ipmib.FragFails — \n Count datagram fragmented unsuccessfully\n-
ipmib.FragFails
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.FragFails
probe::ipmib.FragOKs — \n Count datagram fragmented successfully\n-
ipmib.FragOKs
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.FragOKs
probe::ipmib.InNoRoutes — \n Count an arriving packet with no matching socket\n-
ipmib.InNoRoutes
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.InNoRoutes
probe::ipmib.InReceives — \n Count an arriving packet\n-
ipmib.InReceives
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.InReceives
probe::ipmib.ReasmTimeout — \n Count Reassembly Timeouts\n-
ipmib.ReasmTimeout
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.ReasmTimeout
probe::irq_handler.entry — \n Execution of interrupt handler starting\n-
irq_handler.entry
flags
\n- Flags for IRQ handler\n-
thread_flags
\n- Flags related to thread\n-
dev_name
\n- name of device\n-
action
\n- struct irqaction* for this interrupt num\n+
irq_handler.entry
flags_str
\n+ symbolic string representation of IRQ flags\n
dev_id
\n Cookie to identify device\n+
thread_fn
\n+ interrupt handler function for threaded interrupts\n+
dev_name
\n+ name of device\n+
thread
\n+ thread pointer for threaded interrupts\n+
handler
\n+ interrupt handler function\n+
thread_flags
\n+ Flags related to thread\n
irq
\n irq number\n
next_irqaction
\n pointer to next irqaction for shared interrupts\n-
handler
\n- interrupt handler function\n-
thread_fn
\n- interrupt handler function for threaded interrupts\n+
action
\n+ struct irqaction* for this interrupt num\n+
flags
\n+ Flags for IRQ handler\n
dir
\n pointer to the proc/irq/NN/name entry\n-
thread
\n- thread pointer for threaded interrupts\n-
flags_str
\n- symbolic string representation of IRQ flags\n
probe::irq_handler.exit — \n Execution of interrupt handler completed\n-
irq_handler.exit
action
\n- struct irqaction*\n-
thread_flags
\n- Flags related to thread\n-
thread
\n+
irq_handler.exit
thread
\n thread pointer for threaded interrupts\n
handler
\n interrupt handler function that was executed\n-
next_irqaction
\n- pointer to next irqaction for shared interrupts\n-
dev_id
\n- Cookie to identify device\n-
dev_name
\n- name of device\n-
flags
\n- flags for IRQ handler\n
flags_str
\n symbolic string representation of IRQ flags\n
ret
\n return value of the handler\n+
dev_id
\n+ Cookie to identify device\n+
dev_name
\n+ name of device\n
thread_fn
\n interrupt handler function for threaded interrupts\n-
dir
\n- pointer to the proc/irq/NN/name entry\n+
next_irqaction
\n+ pointer to next irqaction for shared interrupts\n+
action
\n+ struct irqaction*\n
irq
\n interrupt number\n+
thread_flags
\n+ Flags related to thread\n+
flags
\n+ flags for IRQ handler\n+
dir
\n+ pointer to the proc/irq/NN/name entry\n
probe::kprocess.exec_complete — \n Return from exec to a new program\n-
kprocess.exec_complete
success
\n- A boolean indicating whether the exec was successful\n+
kprocess.exec_complete
retstr
\n+ A string representation of errno (SystemTap v2.5+)\n
errno
\n The error number resulting from the exec\n+
success
\n+ A boolean indicating whether the exec was successful\n
name
\n Name of the system call (“execve”) (SystemTap v2.5+)\n-
retstr
\n- A string representation of errno (SystemTap v2.5+)\n
probe::kprocess.exec — \n Attempt to exec to a new program\n
kprocess.exec
argstr
\n A string containing the filename followed by the\n arguments to pass, excluding 0th arg (SystemTap v2.5+)\n+
filename
\n+ The path to the new executable\n
name
\n Name of the system call (“execve”) (SystemTap v2.5+)\n
args
\n The arguments to pass to the new executable, including\n the 0th arg (SystemTap v2.5+)\n-
filename
\n- The path to the new executable\n
probe::kprocess.release — \n Process released\n
kprocess.release
task
\n A task handle to the process being released\n+
released_pid
\n+ PID of the process being released\n
pid
\n Same as released_pid
for compatibility (deprecated)\n
released_tid
\n TID of the task being released\n-
released_pid
\n- PID of the process being released\n
\n The context of the parent, if it wanted notification of this process'\n termination, else the context of the process itself.\n
\n Fires when a process is released from the kernel. This always follows a\n kprocess.exit, though it may be delayed somewhat if the process waits in a\n zombie state.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-linuxmib-ListenDrops.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-linuxmib-ListenDrops.html", "unified_diff": "@@ -1,12 +1,12 @@\n
probe::linuxmib.ListenDrops — \n Count of times conn request that were dropped\n-
linuxmib.ListenDrops
sk
\n- Pointer to the struct sock being acted on\n-
op
\n+
linuxmib.ListenDrops
probe::linuxmib.ListenOverflows — \n Count of times a listen queue overflowed\n-
linuxmib.ListenOverflows
op
\n- Value to be added to the counter (default value of 1)\n-
sk
\n+
linuxmib.ListenOverflows
probe::linuxmib.TCPMemoryPressures — \n Count of times memory pressure was used\n-
linuxmib.TCPMemoryPressures
op
\n- Value to be added to the counter (default value of 1)\n-
sk
\n+
linuxmib.TCPMemoryPressures
probe::netdev.change_mac — \n Called when the netdev_name has the MAC changed\n-
netdev.change_mac
dev_name
\n- The device that will have the MAC changed\n-
old_mac
\n- The current MAC address\n-
new_mac
\n+
netdev.change_mac
probe::netdev.change_rx_flag — \n Called when the device RX flag will be changed\n-
netdev.change_rx_flag
probe::netdev.hard_transmit — \n Called when the devices is going to TX (hard)\n-
netdev.hard_transmit
protocol
\n- The protocol used in the transmission\n-
length
\n- The length of the transmit buffer.\n-
truesize
\n+
netdev.hard_transmit
probe::netdev.receive — \n Data received from network device.\n-
netdev.receive
probe::netdev.rx — \n Called when the device is going to receive a packet\n-
netdev.rx
probe::netdev.set_promiscuity — \n Called when the device enters/leaves promiscuity\n-
netdev.set_promiscuity
dev_name
\n- The device that is entering/leaving promiscuity mode\n-
enable
\n- If the device is entering promiscuity mode\n-
disable
\n+
netdev.set_promiscuity
probe::netdev.transmit — \n Network device transmitting buffer\n-
netdev.transmit
probe::netfilter.arp.forward — \n - Called for each ARP packet to be forwarded\n-
netfilter.arp.forward
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
ar_pln
\n- Length of protocol address\n-
ar_hrd
\n- Format of hardware address\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
netfilter.arp.forward
ar_op
\n+ ARP opcode (command)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
pf
\n Protocol family -- always “arp”\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
length
\n- The length of the packet buffer contents, in bytes\n-
ar_op
\n- ARP opcode (command)\n+
data_str
\n+ A string representing the packet buffer contents\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n
ar_sha
\n Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
length
\n+ The length of the packet buffer contents, in bytes\n
arphdr
\n Address of ARP header\n-
ar_hln
\n- Length of hardware address\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
nf_queue
\n Constant used to signify a 'queue' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
ar_data
\n- Address of ARP packet data region (after the header)\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n
nf_stop
\n Constant used to signify a 'stop' verdict\n+
ar_pln
\n+ Length of protocol address\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
ar_hrd
\n+ Format of hardware address\n
ar_pro
\n Format of protocol address\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
data_str
\n- A string representing the packet buffer contents\n+
ar_hln
\n+ Length of hardware address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
probe::netfilter.arp.in — \n - Called for each incoming ARP packet\n-
netfilter.arp.in
ar_tha
\n+
netfilter.arp.in
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
ar_tha
\n Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
data_str
\n- A string representing the packet buffer contents\n-
ar_pro
\n- Format of protocol address\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
ar_hrd
\n+ Format of hardware address\n+
ar_pln
\n+ Length of protocol address\n
nf_stop
\n Constant used to signify a 'stop' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
ar_pro
\n+ Format of protocol address\n+
ar_hln
\n+ Length of hardware address\n+
data_str
\n+ A string representing the packet buffer contents\n
ar_data
\n Address of ARP packet data region (after the header)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n+
pf
\n+ Protocol family -- always “arp”\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
ar_hln
\n- Length of hardware address\n-
arphdr
\n- Address of ARP header\n
ar_op
\n ARP opcode (command)\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n-
length
\n- The length of the packet buffer contents, in bytes\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
pf
\n- Protocol family -- always “arp”\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
ar_hrd
\n- Format of hardware address\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
ar_pln
\n- Length of protocol address\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
length
\n+ The length of the packet buffer contents, in bytes\n
outdev_name
\n Name of network device packet will be routed to (if known)\n+
arphdr
\n+ Address of ARP header\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n
probe::netfilter.arp.out — \n - Called for each outgoing ARP packet\n-
netfilter.arp.out
data_str
\n- A string representing the packet buffer contents\n+
netfilter.arp.out
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n
ar_tha
\n Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
ar_data
\n- Address of ARP packet data region (after the header)\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
ar_hln
\n+ Length of hardware address\n
ar_pro
\n Format of protocol address\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
ar_hrd
\n+ Format of hardware address\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
ar_pln
\n+ Length of protocol address\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n+
data_str
\n+ A string representing the packet buffer contents\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
pf
\n+ Protocol family -- always “arp”\n
ar_op
\n ARP opcode (command)\n-
length
\n- The length of the packet buffer contents, in bytes\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
arphdr
\n Address of ARP header\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
ar_hln
\n- Length of hardware address\n-
pf
\n- Protocol family -- always “arp”\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
ar_tip
\n Ethernet+IP only (ar_pro==0x800): target IP address\n-
ar_pln
\n- Length of protocol address\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
ar_hrd
\n- Format of hardware address\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n
probe::netfilter.bridge.forward — \n Called on an incoming bridging packet destined for some other computer\n-
netfilter.bridge.forward
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
protocol
\n- Packet protocol\n-
br_type
\n- BPDU type\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
netfilter.bridge.forward
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
br_max
\n+ Max age in 1/256 secs\n+
br_poid
\n+ Port identifier\n+
br_rmac
\n+ Root bridge MAC address\n+
br_vid
\n+ Protocol version identifier\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
data_str
\n- A string representing the packet buffer contents\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
br_htime
\n+ Hello time in 1/256 secs\n+
br_mac
\n+ Bridge MAC address\n+
br_bid
\n+ Identity of bridge\n
brhdr
\n Address of bridge header\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n
indev
\n Address of net_device representing input device, 0 if unknown\n
br_flags
\n BPDU flags\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
pf
\n Protocol family -- always “bridge”\n-
br_rmac
\n- Root bridge MAC address\n-
length
\n- The length of the packet buffer contents, in bytes\n-
br_bid
\n- Identity of bridge\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_msg
\n- Message age in 1/256 secs\n-
br_vid
\n- Protocol version identifier\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
br_poid
\n- Port identifier\n-
br_mac
\n- Bridge MAC address\n-
br_max
\n- Max age in 1/256 secs\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
br_rid
\n+ Identity of root bridge\n
br_fd
\n Forward delay in 1/256 secs\n+
data_str
\n+ A string representing the packet buffer contents\n+
protocol
\n+ Packet protocol\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
outdev_name
\n Name of network device packet will be routed to (if known)\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
br_rid
\n- Identity of root bridge\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n+
br_type
\n+ BPDU type\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n
br_prid
\n Protocol identifier\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
br_msg
\n+ Message age in 1/256 secs\n
probe::netfilter.bridge.local_in — \n Called on a bridging packet destined for the local computer\n-
netfilter.bridge.local_in
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_stop
\n+
netfilter.bridge.local_in
nf_stop
\n Constant used to signify a 'stop' verdict\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_type
\n- BPDU type\n-
protocol
\n- Packet protocol\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
br_htime
\n+ Hello time in 1/256 secs\n+
br_mac
\n+ Bridge MAC address\n
brhdr
\n Address of bridge header\n-
data_str
\n- A string representing the packet buffer contents\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
br_flags
\n- BPDU flags\n-
pf
\n- Protocol family -- always “bridge”\n
br_bid
\n Identity of bridge\n+
br_flags
\n+ BPDU flags\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
nf_queue
\n Constant used to signify a 'queue' verdict\n-
br_rmac
\n- Root bridge MAC address\n-
length
\n- The length of the packet buffer contents, in bytes\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
br_vid
\n- Protocol version identifier\n-
br_msg
\n- Message age in 1/256 secs\n-
br_mac
\n- Bridge MAC address\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
br_max
\n Max age in 1/256 secs\n
br_poid
\n Port identifier\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_fd
\n- Forward delay in 1/256 secs\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
br_rmac
\n+ Root bridge MAC address\n+
br_vid
\n+ Protocol version identifier\n
indev_name
\n Name of network device packet was received on (if known)\n+
protocol
\n+ Packet protocol\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
br_type
\n+ BPDU type\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n
br_prid
\n Protocol identifier\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
br_msg
\n+ Message age in 1/256 secs\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
br_cost
\n Total cost from transmitting bridge to root\n-
br_rid
\n- Identity of root bridge\n+
pf
\n+ Protocol family -- always “bridge”\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
llcpdu
\n Address of LLC Protocol Data Unit\n+
br_rid
\n+ Identity of root bridge\n+
br_fd
\n+ Forward delay in 1/256 secs\n+
data_str
\n+ A string representing the packet buffer contents\n
probe::netfilter.bridge.local_out — \n Called on a bridging packet coming from a local process\n-
netfilter.bridge.local_out
br_rid
\n- Identity of root bridge\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n+
netfilter.bridge.local_out
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
protocol
\n+ Packet protocol\n+
br_msg
\n+ Message age in 1/256 secs\n+
length
\n+ The length of the packet buffer contents, in bytes\n
br_prid
\n Protocol identifier\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_type
\n+ BPDU type\n
outdev_name
\n Name of network device packet will be routed to (if known)\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
pf
\n+ Protocol family -- always “bridge”\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
data_str
\n+ A string representing the packet buffer contents\n
br_fd
\n Forward delay in 1/256 secs\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
br_rid
\n+ Identity of root bridge\n
br_htime
\n Hello time in 1/256 secs\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
br_poid
\n- Port identifier\n-
br_mac
\n- Bridge MAC address\n-
br_max
\n- Max age in 1/256 secs\n-
br_msg
\n- Message age in 1/256 secs\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
br_vid
\n- Protocol version identifier\n-
length
\n- The length of the packet buffer contents, in bytes\n-
br_rmac
\n- Root bridge MAC address\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_bid
\n- Identity of bridge\n-
pf
\n- Protocol family -- always “bridge”\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
indev
\n Address of net_device representing input device, 0 if unknown\n
br_flags
\n BPDU flags\n+
br_bid
\n+ Identity of bridge\n
brhdr
\n Address of bridge header\n-
data_str
\n- A string representing the packet buffer contents\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_type
\n- BPDU type\n-
protocol
\n- Packet protocol\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n+
br_mac
\n+ Bridge MAC address\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
br_vid
\n+ Protocol version identifier\n+
br_rmac
\n+ Root bridge MAC address\n+
br_poid
\n+ Port identifier\n+
br_max
\n+ Max age in 1/256 secs\n
probe::netfilter.bridge.post_routing — \n - Called before a bridging packet hits the wire\n-
netfilter.bridge.post_routing
brhdr
\n- Address of bridge header\n-
data_str
\n- A string representing the packet buffer contents\n+
netfilter.bridge.post_routing
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
llcproto_stp
\n Constant used to signify Bridge Spanning Tree Protocol packet\n
br_type
\n BPDU type\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
br_prid
\n+ Protocol identifier\n+
br_msg
\n+ Message age in 1/256 secs\n
protocol
\n Packet protocol\n
outdev
\n Address of net_device representing output device, 0 if unknown\n+
br_rid
\n+ Identity of root bridge\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_fd
\n+ Forward delay in 1/256 secs\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
br_cost
\n+ Total cost from transmitting bridge to root\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_rmac
\n- Root bridge MAC address\n-
length
\n- The length of the packet buffer contents, in bytes\n+
pf
\n+ Protocol family -- always “bridge”\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
br_mac
\n+ Bridge MAC address\n
br_bid
\n Identity of bridge\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
brhdr
\n+ Address of bridge header\n
br_flags
\n BPDU flags\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
pf
\n- Protocol family -- always “bridge”\n-
br_poid
\n- Port identifier\n-
br_mac
\n- Bridge MAC address\n-
br_max
\n- Max age in 1/256 secs\n-
br_msg
\n- Message age in 1/256 secs\n+
br_htime
\n+ Hello time in 1/256 secs\n
nf_accept
\n Constant used to signify an 'accept' verdict\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_max
\n+ Max age in 1/256 secs\n+
br_rmac
\n+ Root bridge MAC address\n+
br_poid
\n+ Port identifier\n
br_vid
\n Protocol version identifier\n-
br_rid
\n- Identity of root bridge\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_prid
\n- Protocol identifier\n-
br_fd
\n- Forward delay in 1/256 secs\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n
indev_name
\n Name of network device packet was received on (if known)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
br_htime
\n- Hello time in 1/256 secs\n
probe::netfilter.bridge.pre_routing — \n - Called before a bridging packet is routed\n-
netfilter.bridge.pre_routing
br_msg
\n- Message age in 1/256 secs\n+
netfilter.bridge.pre_routing
br_mac
\n+ Bridge MAC address\n+
brhdr
\n+ Address of bridge header\n+
br_bid
\n+ Identity of bridge\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
br_flags
\n+ BPDU flags\n+
br_htime
\n+ Hello time in 1/256 secs\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
br_vid
\n- Protocol version identifier\n-
br_poid
\n- Port identifier\n-
br_mac
\n- Bridge MAC address\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
br_max
\n Max age in 1/256 secs\n-
br_fd
\n- Forward delay in 1/256 secs\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
br_rmac
\n+ Root bridge MAC address\n+
br_poid
\n+ Port identifier\n+
br_vid
\n+ Protocol version identifier\n
indev_name
\n Name of network device packet was received on (if known)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
br_rid
\n- Identity of root bridge\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_prid
\n- Protocol identifier\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
llcproto_stp
\n Constant used to signify Bridge Spanning Tree Protocol packet\n
br_type
\n BPDU type\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
br_prid
\n+ Protocol identifier\n+
br_msg
\n+ Message age in 1/256 secs\n
protocol
\n Packet protocol\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
brhdr
\n- Address of bridge header\n+
br_rid
\n+ Identity of root bridge\n
data_str
\n A string representing the packet buffer contents\n+
br_fd
\n+ Forward delay in 1/256 secs\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
br_flags
\n- BPDU flags\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
pf
\n Protocol family -- always “bridge”\n-
br_rmac
\n- Root bridge MAC address\n-
length
\n- The length of the packet buffer contents, in bytes\n-
br_bid
\n- Identity of bridge\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n
probe::netfilter.ip.forward — \n Called on an incoming IP packet addressed to some other computer\n-
netfilter.ip.forward
sport
\n- TCP or UDP source port (ipv4 only)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n+
netfilter.ip.forward
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n
indev_name
\n Name of network device packet was received on (if known)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
saddr
\n- A string representing the source IP address\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
family
\n- IP address family\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
daddr
\n- A string representing the destination IP address\n-
data_str
\n- A string representing the packet buffer contents\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n
psh
\n TCP PSH flag (if protocol is TCP; ipv4 only)\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n
indev
\n Address of net_device representing input device, 0 if unknown\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
data_str
\n+ A string representing the packet buffer contents\n+
daddr
\n+ A string representing the destination IP address\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
iphdr
\n- Address of IP header\n
length
\n The length of the packet buffer contents, in bytes\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
saddr
\n+ A string representing the source IP address\n+
family
\n+ IP address family\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
iphdr
\n+ Address of IP header\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
probe::netfilter.ip.local_in — \n Called on an incoming IP packet addressed to the local computer\n-
netfilter.ip.local_in
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
netfilter.ip.local_in
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n
indev_name
\n Name of network device packet was received on (if known)\n-
saddr
\n- A string representing the source IP address\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
family
\n- IP address family\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
data_str
\n- A string representing the packet buffer contents\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
daddr
\n A string representing the destination IP address\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
data_str
\n+ A string representing the packet buffer contents\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n
pf
\n Protocol family -- either “ipv4” or “ipv6”\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
length
\n The length of the packet buffer contents, in bytes\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n
iphdr
\n Address of IP header\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
saddr
\n+ A string representing the source IP address\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
family
\n+ IP address family\n
probe::netfilter.ip.local_out — \n Called on an outgoing IP packet\n-
netfilter.ip.local_out
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n+
netfilter.ip.local_out
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
saddr
\n- A string representing the source IP address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
daddr
\n- A string representing the destination IP address\n-
data_str
\n- A string representing the packet buffer contents\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
rst
\n TCP RST flag (if protocol is TCP; ipv4 only)\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
urg
\n TCP URG flag (if protocol is TCP; ipv4 only)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n
protocol
\n Packet protocol from driver (ipv4 only)\n-
family
\n- IP address family\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n
iphdr
\n Address of IP header\n+
family
\n+ IP address family\n+
saddr
\n+ A string representing the source IP address\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n
length
\n The length of the packet buffer contents, in bytes\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
ipproto_udp
\n Constant used to signify that the packet protocol is UDP\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
pf
\n Protocol family -- either “ipv4” or “ipv6”\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
daddr
\n+ A string representing the destination IP address\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
data_str
\n+ A string representing the packet buffer contents\n
probe::netfilter.ip.post_routing — \n Called immediately before an outgoing IP packet leaves the computer\n-
netfilter.ip.post_routing
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n+
netfilter.ip.post_routing
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n
iphdr
\n Address of IP header\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
saddr
\n+ A string representing the source IP address\n+
family
\n+ IP address family\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
dport
\n TCP or UDP destination port (ipv4 only)\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
pf
\n Protocol family -- either “ipv4” or “ipv6”\n
ipproto_udp
\n Constant used to signify that the packet protocol is UDP\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
data_str
\n- A string representing the packet buffer contents\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n
daddr
\n A string representing the destination IP address\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
data_str
\n+ A string representing the packet buffer contents\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
family
\n- IP address family\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
saddr
\n- A string representing the source IP address\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n
indev_name
\n Name of network device packet was received on (if known)\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
sport
\n- TCP or UDP source port (ipv4 only)\n
probe::netfilter.ip.pre_routing — \n Called before an IP packet is routed\n-
netfilter.ip.pre_routing
family
\n- IP address family\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
netfilter.ip.pre_routing
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
urg
\n TCP URG flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
data_str
\n- A string representing the packet buffer contents\n-
daddr
\n- A string representing the destination IP address\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
pf
\n- Protocol family - either 'ipv4' or 'ipv6'\n-
length
\n- The length of the packet buffer contents, in bytes\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
iphdr
\n Address of IP header\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
family
\n+ IP address family\n+
saddr
\n+ A string representing the source IP address\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
fin
\n TCP FIN flag (if protocol is TCP; ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
pf
\n+ Protocol family - either 'ipv4' or 'ipv6'\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
daddr
\n+ A string representing the destination IP address\n
syn
\n TCP SYN flag (if protocol is TCP; ipv4 only)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
saddr
\n- A string representing the source IP address\n+
data_str
\n+ A string representing the packet buffer contents\n
probe::nfs.aop.readahead — \n NFS client reading multiple pages\n-
nfs.aop.readahead
dev
\n- device identifier\n-
nr_pages
\n- number of pages attempted to read in this execution\n-
ino
\n+
nfs.aop.readahead
probe::nfs.aop.readpage — \n NFS client synchronously reading a page\n-
nfs.aop.readpage
rsize
\n- read size (in bytes)\n+
nfs.aop.readpage
__page
\n+ the address of page\n+
ino
\n+ inode number\n+
i_flag
\n+ file flags\n+
file
\n+ file argument\n
sb_flag
\n super block flags\n
size
\n number of pages to be read in this execution \n-
file
\n- file argument\n-
i_size
\n- file length in bytes\n-
__page
\n- the address of page\n
dev
\n device identifier\n+
i_size
\n+ file length in bytes\n+
rsize
\n+ read size (in bytes)\n
page_index
\n offset within mapping, can used a page identifier\n and position identifier in the page frame\n-
i_flag
\n- file flags\n-
ino
\n- inode number\n
probe::nfs.aop.readpages — \n NFS client reading multiple pages\n
nfs.aop.readpages
ino
\n inode number \n-
nr_pages
\n- number of pages attempted to read in this execution\n-
dev
\n- device identifier\n
file
\n filp argument\n+
dev
\n+ device identifier\n
size
\n number of pages attempted to read in this execution\n-
rpages
\n- read size (in pages)\n
rsize
\n read size (in bytes)\n+
rpages
\n+ read size (in pages)\n+
nr_pages
\n+ number of pages attempted to read in this execution\n
probe::nfs.aop.release_page — \n NFS client releasing page\n-
nfs.aop.release_page
dev
\n+
nfs.aop.release_page
probe::nfs.aop.write_begin — \n NFS client begin to write data\n
nfs.aop.write_begin
size
\n write bytes\n-
offset
\n- start address of this write operation \n-
__page
\n- the address of page\n
dev
\n device identifier\n-
to
\n- end address of this write operation \n
page_index
\n offset within mapping, can used a page identifier\n and position identifier in the page frame\n+
offset
\n+ start address of this write operation \n+
to
\n+ end address of this write operation \n+
__page
\n+ the address of page\n
ino
\n inode number \n
\n Occurs when write operation occurs on nfs. It prepare a page for writing,\n look for a request corresponding to the page. If there\n is one, and it belongs to another file, it flush it out\n before it tries to copy anything into the page. \n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "unified_diff": "@@ -1,29 +1,29 @@\n
probe::nfs.aop.write_end — \n NFS client complete writing data\n-
nfs.aop.write_end
size
\n- write bytes\n-
offset
\n- start address of this write operation\n+
nfs.aop.write_end
page_index
\n+ offset within mapping, can used a page identifier and position identifier in the page frame\n
i_size
\n file length in bytes\n-
__page
\n- the address of page\n+
dev
\n+ device identifier\n+
size
\n+ write bytes\n
sb_flag
\n super block flags\n
i_flag
\n file flags\n
ino
\n inode number\n-
dev
\n- device identifier\n+
offset
\n+ start address of this write operation\n
to
\n end address of this write operation\n-
page_index
\n- offset within mapping, can used a page identifier and position identifier in the page frame\n+
__page
\n+ the address of page\n
probe::nfs.aop.writepage — \n NFS client writing a mapped page to the NFS server\n-
nfs.aop.writepage
dev
\n+
nfs.aop.writepage
size
\n+ number of pages to be written in this execution\n+
i_state
\n+ inode state flags\n+
dev
\n device identifier\n
page_index
\n offset within mapping,\n can used a page identifier and position identifier in the page frame\n-
ino
\n- inode number \n-
i_flag
\n- file flags\n-
i_state
\n- inode state flags\n-
wsize
\n- write size\n-
sb_flag
\n- super block flags\n
for_reclaim
\n a flag of writeback_control,\n indicates if it's invoked from the page allocator\n-
size
\n- number of pages to be written in this execution\n
i_size
\n file length in bytes\n+
wsize
\n+ write size\n+
i_flag
\n+ file flags\n
__page
\n the address of page\n+
ino
\n+ inode number \n+
sb_flag
\n+ super block flags\n
for_kupdate
\n a flag of writeback_control,\n indicates if it's a kupdate writeback\n
probe::nfs.aop.writepages — \n NFS client writing several dirty pages to the NFS server\n-
nfs.aop.writepages
nr_to_write
\n- number of pages attempted to be written in this execution\n-
ino
\n+
nfs.aop.writepages
ino
\n inode number\n-
dev
\n- device identifier\n
for_kupdate
\n a flag of writeback_control,\n indicates if it's a kupdate writeback\n-
wpages
\n- write size (in pages)\n+
dev
\n+ device identifier\n
size
\n number of pages attempted to be written in this execution\n+
nr_to_write
\n+ number of pages attempted to be written in this execution\n+
wsize
\n+ write size\n
for_reclaim
\n a flag of writeback_control,\n indicates if it's invoked from the page allocator\n-
wsize
\n- write size\n+
wpages
\n+ write size (in pages)\n
probe::nfs.fop.aio_read — \n NFS client aio_read file operation\n-
nfs.fop.aio_read
buf
\n+
nfs.fop.aio_read
cache_time
\n+ when we started read-caching this inode\n+
file_name
\n+ file name\n+
buf
\n the address of buf in user space\n-
pos
\n- current position of file \n-
dev
\n- device identifier\n-
cache_valid
\n- cache related bit mask flag\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n-
ino
\n- inode number \n+
cache_valid
\n+ cache related bit mask flag\n
count
\n read bytes\n-
file_name
\n- file name\n+
pos
\n+ current position of file \n+
dev
\n+ device identifier\n+
ino
\n+ inode number \n
parent_name
\n parent dir name\n-
cache_time
\n- when we started read-caching this inode\n
probe::nfs.fop.aio_write — \n NFS client aio_write file operation\n-
nfs.fop.aio_write
probe::nfs.fop.flush — \n NFS client flush file operation\n-
nfs.fop.flush
probe::nfs.fop.llseek — \n NFS client llseek operation\n-
nfs.fop.llseek
ino
\n+
nfs.fop.llseek
whence
\n+ the position to seek from\n+
whence_str
\n+ symbolic string representation of the position to seek from\n+
ino
\n inode number\n
dev
\n device identifier\n
offset
\n the offset of the file will be repositioned\n-
whence_str
\n- symbolic string representation of the position to seek from\n-
whence
\n- the position to seek from\n
probe::nfs.fop.lock — \n NFS client file lock operation\n-
nfs.fop.lock
fl_type
\n- lock type\n+
nfs.fop.lock
ino
\n+ inode number\n
fl_end
\n ending offset of locked region\n-
fl_flag
\n- lock flags\n
cmd
\n cmd arguments\n-
i_mode
\n- file type and access rights\n-
ino
\n- inode number\n+
fl_type
\n+ lock type\n+
fl_flag
\n+ lock flags\n
dev
\n device identifier\n
fl_start
\n starting offset of locked region\n+
i_mode
\n+ file type and access rights\n
probe::nfs.fop.mmap — \n NFS client mmap operation\n-
nfs.fop.mmap
ino
\n- inode number \n-
parent_name
\n- parent dir name\n-
vm_start
\n- start address within vm_mm \n-
dev
\n- device identifier\n-
cache_valid
\n- cache related bit mask flag\n-
attrtimeo
\n- how long the cached information is assumed to be valid.\n- We need to revalidate the cached attrs for this inode \n- if jiffies - read_cache_jiffies > attrtimeo.\n+
nfs.fop.mmap
vm_flag
\n+ vm flags\n
vm_end
\n the first byte after end address within vm_mm\n-
file_name
\n- file name\n+
parent_name
\n+ parent dir name\n+
ino
\n+ inode number \n
cache_time
\n when we started read-caching this inode\n+
file_name
\n+ file name\n
buf
\n the address of buf in user space\n-
vm_flag
\n- vm flags\n+
attrtimeo
\n+ how long the cached information is assumed to be valid.\n+ We need to revalidate the cached attrs for this inode \n+ if jiffies - read_cache_jiffies > attrtimeo.\n+
vm_start
\n+ start address within vm_mm \n+
cache_valid
\n+ cache related bit mask flag\n+
dev
\n+ device identifier\n
probe::nfs.fop.open — \n NFS client file open operation\n-
nfs.fop.open
probe::nfs.fop.read_iter — \n NFS client read_iter file operation\n-
nfs.fop.read_iter
dev
\n- device identifier\n+
nfs.fop.read_iter
file_name
\n+ file name\n+
cache_time
\n+ when we started read-caching this inode\n
pos
\n current position of file \n-
cache_valid
\n- cache related bit mask flag\n
count
\n read bytes\n+
cache_valid
\n+ cache related bit mask flag\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n-
ino
\n- inode number \n-
file_name
\n- file name\n
parent_name
\n parent dir name\n-
cache_time
\n- when we started read-caching this inode\n+
ino
\n+ inode number \n+
dev
\n+ device identifier\n
probe::nfs.fop.sendfile — \n NFS client send file operation\n
nfs.fop.sendfile
ino
\n inode number\n-
count
\n- read bytes\n
dev
\n device identifier\n-
cache_valid
\n- cache related bit mask flag\n
ppos
\n current position of file\n+
count
\n+ read bytes\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n+
cache_valid
\n+ cache related bit mask flag\n
cache_time
\n when we started read-caching this inode\n
probe::nfs.fop.write_iter — \n NFS client write_iter file operation\n-
nfs.fop.write_iter
probe::nfs.proc.commit_done — \n NFS client response to a commit RPC task\n-
nfs.proc.commit_done
prot
\n- transfer protocol\n-
server_ip
\n- IP address of server\n+
nfs.proc.commit_done
valid
\n+ fattr->valid, indicates which fields are valid \n
status
\n result of last operation\n
timestamp
\n V4 timestamp, which is used for lease renewal\n-
count
\n- number of bytes committed\n+
server_ip
\n+ IP address of server\n+
prot
\n+ transfer protocol\n
version
\n NFS version\n-
valid
\n- fattr->valid, indicates which fields are valid \n+
count
\n+ number of bytes committed\n
probe::nfs.proc.commit_setup — \n NFS client setting up a commit RPC task\n-
nfs.proc.commit_setup
offset
\n- the file offset\n-
count
\n- bytes in this commit\n-
version
\n- NFS version\n-
bitmask0
\n+
nfs.proc.commit_setup
bitmask0
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n+
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
prot
\n- transfer protocol\n
server_ip
\n IP address of server\n+
offset
\n+ the file offset\n+
prot
\n+ transfer protocol\n
size
\n bytes in this commit\n-
bitmask1
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n+
version
\n+ NFS version\n+
count
\n+ bytes in this commit\n
probe::nfs.proc.commit — \n NFS client committing data on server\n
nfs.proc.commit
prot
\n transfer protocol\n-
server_ip
\n- IP address of server\n
size
\n read bytes in this execution\n+
version
\n+ NFS version\n+
offset
\n+ the file offset\n+
server_ip
\n+ IP address of server\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
offset
\n- the file offset\n-
version
\n- NFS version\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n
\n All the nfs.proc.commit kernel functions were removed in kernel\n commit 200baa in December 2006, so these probes do not exist on Linux\n 2.6.21 and newer kernels.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "unified_diff": "@@ -1,17 +1,17 @@\n
probe::nfs.proc.create — \n NFS client creating file on server\n-
nfs.proc.create
filename
\n- file name\n-
version
\n- NFS version (the function is used for all NFS version)\n+
nfs.proc.create
prot
\n+ transfer protocol\n
filelen
\n length of file name\n+
version
\n+ NFS version (the function is used for all NFS version)\n+
server_ip
\n+ IP address of server\n
flag
\n indicates create mode (only for NFSv3 and NFSv4)\n+
filename
\n+ file name\n
fh
\n file handle of parent dir\n-
server_ip
\n- IP address of server\n-
prot
\n- transfer protocol\n
probe::nfs.proc.lookup — \n NFS client opens/searches a file on server\n
nfs.proc.lookup
prot
\n transfer protocol\n+
version
\n+ NFS version\n+
server_ip
\n+ IP address of server\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
server_ip
\n- IP address of server\n+
filename
\n+ the name of file which client opens/searches on server\n
name_len
\n the length of file name\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
version
\n- NFS version\n-
filename
\n- the name of file which client opens/searches on server\n
probe::nfs.proc.open — \n NFS client allocates file read/write context information\n-
nfs.proc.open
mode
\n- file mode\n-
version
\n- NFS version (the function is used for all NFS version)\n-
filename
\n+
nfs.proc.open
probe::nfs.proc.read_done — \n NFS client response to a read RPC task\n
nfs.proc.read_done
timestamp
\n V4 timestamp, which is used for lease renewal\n+
server_ip
\n+ IP address of server\n+
prot
\n+ transfer protocol\n
count
\n number of bytes read\n-
status
\n- result of last operation\n
version
\n NFS version\n-
prot
\n- transfer protocol\n-
server_ip
\n- IP address of server\n+
status
\n+ result of last operation\n
probe::nfs.proc.read_setup — \n NFS client setting up a read RPC task\n
nfs.proc.read_setup
probe::nfs.proc.read — \n NFS client synchronously reads file from server\n
nfs.proc.read
prot
\n transfer protocol\n-
server_ip
\n- IP address of server\n-
flags
\n- used to set task->tk_flags in rpc_init_task function\n-
version
\n- NFS version\n
count
\n read bytes in this execution\n+
version
\n+ NFS version\n+
flags
\n+ used to set task->tk_flags in rpc_init_task function\n
offset
\n the file offset\n+
server_ip
\n+ IP address of server\n
probe::nfs.proc.release — \n NFS client releases file read/write context information\n
nfs.proc.release
filename
\n file name\n-
version
\n- NFS version (the function is used for all NFS version)\n-
mode
\n- file mode\n-
flag
\n- file flag\n
server_ip
\n IP address of server\n+
flag
\n+ file flag\n+
mode
\n+ file mode\n+
version
\n+ NFS version (the function is used for all NFS version)\n
prot
\n transfer protocol\n
probe::nfs.proc.remove — \n NFS client removes a file on server\n-
nfs.proc.remove
filelen
\n- length of file name\n-
version
\n- NFS version (the function is used for all NFS version)\n-
filename
\n+
nfs.proc.remove
probe::nfs.proc.rename_done — \n NFS client response to a rename RPC task\n
nfs.proc.rename_done
prot
\n transfer protocol\n-
old_fh
\n- file handle of old parent dir\n-
server_ip
\n- IP address of server\n
new_fh
\n file handle of new parent dir\n+
version
\n+ NFS version\n
timestamp
\n V4 timestamp, which is used for lease renewal\n+
server_ip
\n+ IP address of server\n+
old_fh
\n+ file handle of old parent dir\n
status
\n result of last operation\n-
version
\n- NFS version\n
probe::nfs.proc.rename_setup — \n NFS client setting up a rename RPC task\n
nfs.proc.rename_setup
probe::nfs.proc.rename — \n NFS client renames a file on server\n-
nfs.proc.rename
old_name
\n- old file name\n-
server_ip
\n- IP address of server\n-
old_fh
\n+
nfs.proc.rename
old_fh
\n file handle of old parent dir\n-
prot
\n- transfer protocol\n+
old_filelen
\n+ length of old file name\n+
new_name
\n+ new file name\n
new_filelen
\n length of new file name\n+
prot
\n+ transfer protocol\n
version
\n NFS version (the function is used for all NFS version)\n-
new_name
\n- new file name\n
new_fh
\n file handle of new parent dir\n-
old_filelen
\n- length of old file name\n+
old_name
\n+ old file name\n+
server_ip
\n+ IP address of server\n
probe::nfs.proc.write_done — \n NFS client response to a write RPC task\n-
nfs.proc.write_done
prot
\n- transfer protocol\n-
server_ip
\n+
nfs.proc.write_done
server_ip
\n IP address of server\n-
count
\n- number of bytes written\n
timestamp
\n V4 timestamp, which is used for lease renewal\n-
status
\n- result of last operation\n-
valid
\n- fattr->valid, indicates which fields are valid \n+
count
\n+ number of bytes written\n
version
\n NFS version\n+
prot
\n+ transfer protocol\n+
valid
\n+ fattr->valid, indicates which fields are valid \n+
status
\n+ result of last operation\n
probe::nfs.proc.write_setup — \n NFS client setting up a write RPC task\n-
nfs.proc.write_setup
prot
\n- transfer protocol\n-
server_ip
\n+
nfs.proc.write_setup
server_ip
\n IP address of server\n+
offset
\n+ the file offset\n+
prot
\n+ transfer protocol\n
size
\n bytes written in this execution\n-
bitmask1
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem \n+
count
\n+ bytes written in this execution\n
how
\n used to set args.stable. The stable value could be:\n NFS_UNSTABLE,NFS_DATA_SYNC,NFS_FILE_SYNC\n (in nfs.proc3.write_setup and nfs.proc4.write_setup)\n-
offset
\n- the file offset\n-
count
\n- bytes written in this execution\n
version
\n NFS version\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
bitmask1
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem \n
probe::nfs.proc.write — \n NFS client synchronously writes file to server\n-
nfs.proc.write
flags
\n- used to set task->tk_flags in rpc_init_task function\n-
bitmask0
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n+
nfs.proc.write
size
\n+ read bytes in this execution\n+
prot
\n+ transfer protocol\n
version
\n NFS version\n+
flags
\n+ used to set task->tk_flags in rpc_init_task function\n+
server_ip
\n+ IP address of server\n
offset
\n the file offset\n-
prot
\n- transfer protocol\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
size
\n- read bytes in this execution\n-
server_ip
\n- IP address of server\n+
bitmask0
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n
probe::nfsd.commit — \n NFS server committing all pending writes to stable storage\n-
nfsd.commit
offset
\n- the offset of file\n+
nfsd.commit
fh
\n+ file handle (the first part is the length of the file handle)\n
client_ip
\n the ip address of client\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
size
\n- read bytes\n-
count
\n- read bytes\n+
offset
\n+ the offset of file\n
flag
\n indicates whether this execution is a sync operation\n+
count
\n+ read bytes\n+
size
\n+ read bytes\n
probe::nfsd.create — \n NFS server creating a file(regular,dir,device,fifo) for client\n-
nfsd.create
iap_mode
\n- file access mode\n+
nfsd.create
fh
\n+ file handle (the first part is the length of the file handle)\n+
client_ip
\n+ the ip address of client\n+
iap_valid
\n+ Attribute flags\n
filename
\n file name \n-
type
\n- file type(regular,dir,device,fifo ...)\n-
fh
\n- file handle (the first part is the length of the file handle)\n+
iap_mode
\n+ file access mode\n
filelen
\n the length of file name\n-
iap_valid
\n- Attribute flags\n-
client_ip
\n- the ip address of client\n+
type
\n+ file type(regular,dir,device,fifo ...)\n
probe::nfsd.createv3 — \n NFS server creating a regular file or set file attributes for client\n
nfsd.createv3
truncp
\n trunp arguments, indicates if the file shouldbe truncate\n+
iap_mode
\n+ file access mode\n+
filelen
\n+ the length of file name\n
verifier
\n file attributes (atime,mtime,mode). It's used to reset file attributes for CREATE_EXCLUSIVE\n
filename
\n file name \n-
iap_mode
\n- file access mode\n-
iap_valid
\n- Attribute flags\n
client_ip
\n the ip address of client\n-
filelen
\n- the length of file name\n
createmode
\n create mode .The possible values could be: NFS3_CREATE_EXCLUSIVE, NFS3_CREATE_UNCHECKED, or NFS3_CREATE_GUARDED\n
fh
\n file handle (the first part is the length of the file handle)\n+
iap_valid
\n+ Attribute flags\n
probe::nfsd.dispatch — \n NFS server receives an operation from client\n-
nfsd.dispatch
proc
\n- procedure number\n-
version
\n- nfs version\n-
prog
\n- program number\n+
nfsd.dispatch
probe::nfsd.lookup — \n NFS server opening or searching file for a file for client\n-
nfsd.lookup
probe::nfsd.open — \n NFS server opening a file for client\n-
nfsd.open
access
\n+
nfsd.open
fh
\n+ file handle (the first part is the length of the file handle)\n+
client_ip
\n+ the ip address of client\n+
access
\n indicates the type of open (read/write/commit/readdir...) \n
type
\n type of file (regular file or dir)\n-
client_ip
\n- the ip address of client\n-
fh
\n- file handle (the first part is the length of the file handle)\n
probe::nfsd.proc.commit — \n NFS server performing a commit operation for client\n-
nfsd.proc.commit
fh
\n- file handle (the first part is the length of the file handle)\n-
proto
\n- transfer protocol\n-
client_ip
\n- the ip address of client\n+
nfsd.proc.commit
offset
\n+ the offset of file \n
uid
\n requester's user id\n
version
\n nfs version\n-
gid
\n- requester's group id\n-
offset
\n- the offset of file \n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
client_ip
\n+ the ip address of client\n
count
\n read bytes\n+
proto
\n+ transfer protocol\n
size
\n read bytes\n+
gid
\n+ requester's group id\n
probe::nfsd.proc.create — \n NFS server creating a file for client\n
nfsd.proc.create
filelen
\n length of file name\n-
fh
\n- file handle (the first part is the length of the file handle)\n
proto
\n transfer protocol\n+
gid
\n+ requester's group id\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
client_ip
\n the ip address of client\n
uid
\n requester's user id\n
filename
\n file name\n
version
\n nfs version\n-
gid
\n- requester's group id\n
probe::nfsd.proc.lookup — \n NFS server opening or searching for a file for client\n-
nfsd.proc.lookup
version
\n- nfs version\n+
nfsd.proc.lookup
uid
\n+ requester's user id\n+
proto
\n+ transfer protocol\n
filename
\n file name \n-
uid
\n- requester's user id\n
gid
\n requester's group id\n-
proto
\n- transfer protocol\n+
version
\n+ nfs version\n
fh
\n file handle of parent dir (the first part is the length of the file handle)\n-
filelen
\n- the length of file name\n
client_ip
\n the ip address of client\n+
filelen
\n+ the length of file name\n
probe::nfsd.proc.read — \n NFS server reading file for client\n-
nfsd.proc.read
uid
\n- requester's user id\n-
version
\n- nfs version\n-
offset
\n- the offset of file \n-
gid
\n+
nfsd.proc.read
gid
\n requester's group id\n-
fh
\n- file handle (the first part is the length of the file handle)\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n+
count
\n+ read bytes\n
proto
\n transfer protocol\n+
size
\n+ read bytes\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
client_ip
\n the ip address of client\n
vlen
\n read blocks \n-
size
\n- read bytes\n-
count
\n- read bytes\n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n+
version
\n+ nfs version\n+
uid
\n+ requester's user id\n+
offset
\n+ the offset of file \n
probe::nfsd.proc.remove — \n NFS server removing a file for client\n-
nfsd.proc.remove
filename
\n- file name\n-
uid
\n- requester's user id\n-
version
\n- nfs version\n+
nfsd.proc.remove
proto
\n+ transfer protocol\n
gid
\n requester's group id\n
filelen
\n length of file name\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
proto
\n- transfer protocol\n+
uid
\n+ requester's user id\n+
version
\n+ nfs version\n+
filename
\n+ file name\n
client_ip
\n the ip address of client\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
probe::nfsd.proc.rename — \n NFS Server renaming a file for client\n-
nfsd.proc.rename
flen
\n- length of old file name \n+
nfsd.proc.rename
uid
\n+ requester's user id\n
tlen
\n length of new file name\n-
client_ip
\n- the ip address of client\n+
filename
\n+ old file name \n
tname
\n new file name\n-
tfh
\n- file handler of new path\n+
client_ip
\n+ the ip address of client\n
fh
\n file handler of old path\n+
flen
\n+ length of old file name \n
gid
\n requester's group id\n-
uid
\n- requester's user id\n-
filename
\n- old file name \n+
tfh
\n+ file handler of new path\n
probe::nfsd.proc.write — \n NFS server writing data to file for client\n-
nfsd.proc.write
proto
\n+
nfsd.proc.write
count
\n+ read bytes\n+
size
\n+ read bytes\n+
proto
\n transfer protocol\n+
gid
\n+ requester's group id\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
fh
\n file handle (the first part is the length of the file handle)\n-
vlen
\n- read blocks \n
client_ip
\n the ip address of client\n-
version
\n- nfs version\n
stable
\n argp->stable\n-
uid
\n- requester's user id\n
offset
\n the offset of file \n-
gid
\n- requester's group id\n-
count
\n- read bytes\n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n-
size
\n- read bytes\n+
uid
\n+ requester's user id\n+
vlen
\n+ read blocks \n+
version
\n+ nfs version\n
probe::nfsd.read — \n NFS server reading data from a file for client\n-
nfsd.read
offset
\n- the offset of file \n-
vlen
\n- read blocks \n-
client_ip
\n- the ip address of client\n-
file
\n+
nfsd.read
file
\n argument file, indicates if the file has been opened.\n-
fh
\n- file handle (the first part is the length of the file handle)\n+
count
\n+ read bytes\n
size
\n read bytes\n
vec
\n struct kvec, includes buf address in kernel address and length of each buffer\n-
count
\n- read bytes\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
client_ip
\n+ the ip address of client\n+
offset
\n+ the offset of file \n+
vlen
\n+ read blocks \n
probe::nfsd.rename — \n NFS server renaming a file for client\n-
nfsd.rename
tlen
\n- length of new file name\n-
flen
\n- length of old file name \n-
filename
\n- old file name \n+
nfsd.rename
client_ip
\n+ the ip address of client\n+
tname
\n+ new file name\n
fh
\n file handler of old path\n+
filename
\n+ old file name \n+
tlen
\n+ length of new file name\n
tfh
\n file handler of new path\n-
tname
\n- new file name\n-
client_ip
\n- the ip address of client\n+
flen
\n+ length of old file name \n
probe::nfsd.unlink — \n NFS server removing a file or a directory for client\n-
nfsd.unlink
probe::nfsd.write — \n NFS server writing data to a file for client\n-
nfsd.write
vlen
\n+
nfsd.write
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n+
size
\n+ read bytes\n+
count
\n+ read bytes\n+
file
\n+ argument file, indicates if the file has been opened.\n+
vlen
\n read blocks \n+
offset
\n+ the offset of file \n
client_ip
\n the ip address of client\n-
file
\n- argument file, indicates if the file has been opened.\n
fh
\n file handle (the first part is the length of the file handle)\n-
offset
\n- the offset of file \n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n-
count
\n- read bytes\n-
size
\n- read bytes\n
probe::scheduler.cpu_off — \n Process is about to stop running on a cpu\n-
scheduler.cpu_off
name
\n- name of the probe point\n-
task_next
\n- the process replacing current\n-
task_prev
\n+
scheduler.cpu_off
probe::scheduler.cpu_on — \n Process is beginning execution on a cpu\n-
scheduler.cpu_on
idle
\n- - boolean indicating whether current is the idle process\n-
task_prev
\n+
scheduler.cpu_on
probe::scheduler.ctxswitch — \n A context switch is occuring.\n-
scheduler.ctxswitch
prev_tid
\n- The TID of the process to be switched out\n-
prevtsk_state
\n+
scheduler.ctxswitch
prevtsk_state
\n the state of the process to be switched out\n-
name
\n- name of the probe point\n-
prev_priority
\n- The priority of the process to be switched out\n-
next_task_name
\n- The name of the process to be switched in\n-
prev_pid
\n- The PID of the process to be switched out\n-
prev_task_name
\n- The name of the process to be switched out\n
next_pid
\n The PID of the process to be switched in\n
next_tid
\n The TID of the process to be switched in\t \n+
next_task_name
\n+ The name of the process to be switched in\n+
prev_priority
\n+ The priority of the process to be switched out\n+
prev_tid
\n+ The TID of the process to be switched out\n+
prev_pid
\n+ The PID of the process to be switched out\n
nexttsk_state
\n the state of the process to be switched in\n+
prev_task_name
\n+ The name of the process to be switched out\n
next_priority
\n The priority of the process to be switched in\n+
name
\n+ name of the probe point\n
probe::scheduler.migrate — \n Task migrating across cpus\n-
scheduler.migrate
task
\n- the process that is being migrated\n-
priority
\n- priority of the task being migrated\n-
name
\n+
scheduler.migrate
probe::scheduler.process_exit — \n Process exiting\n-
scheduler.process_exit
probe::scheduler.process_free — \n Scheduler freeing a data structure for a process\n
scheduler.process_free
probe::scheduler.process_wait — \n Scheduler starting to wait on a process\n-
scheduler.process_wait
probe::scheduler.wait_task — \n Waiting on a task to unschedule (become inactive)\n-
scheduler.wait_task
probe::scheduler.wakeup_new — \n Newly created task is woken up for the first time\n-
scheduler.wakeup_new
task_state
\n- state of the task woken up\n+
scheduler.wakeup_new
name
\n+ name of the probe point\n
task_cpu
\n cpu of the task woken up\n-
name
\n- name of the probe point\n-
task_pid
\n- PID of the new task woken up\n-
task_tid
\n- TID of the new task woken up\n
task_priority
\n priority of the new task\n+
task_state
\n+ state of the task woken up\n+
task_tid
\n+ TID of the new task woken up\n+
task_pid
\n+ PID of the new task woken up\n
probe::scheduler.wakeup — \n Task is woken up\n-
scheduler.wakeup
task_state
\n- state of the task being woken up\n-
task_cpu
\n- cpu of the task being woken up\n-
task_tid
\n+
scheduler.wakeup
task_tid
\n tid of the task being woken up\n+
task_pid
\n+ PID of the task being woken up\n+
task_state
\n+ state of the task being woken up\n
task_priority
\n priority of the task being woken up\n
name
\n name of the probe point\n-
task_pid
\n- PID of the task being woken up\n+
task_cpu
\n+ cpu of the task being woken up\n
probe::scsi.iocompleted — \n SCSI mid-layer running the completion processing for block device I/O requests\n-
scsi.iocompleted
device_state_str
\n- The current state of the device, as a string\n-
host_no
\n- The host number\n+
scsi.iocompleted
req_addr
\n+ The current struct request pointer, as a number\n+
channel
\n+ The channel number\n
dev_id
\n The scsi device id\n+
device_state_str
\n+ The current state of the device, as a string\n+
lun
\n+ The lun number\n+
device_state
\n+ The current state of the device\n
data_direction_str
\n Data direction, as a string\n-
req_addr
\n- The current struct request pointer, as a number\n
goodbytes
\n The bytes completed\n+
host_no
\n+ The host number\n
data_direction
\n The data_direction specifies whether this command is from/to\n the device\n-
channel
\n- The channel number\n-
device_state
\n- The current state of the device\n-
lun
\n- The lun number\n
probe::scsi.iodispatching — \n SCSI mid-layer dispatched low-level SCSI command\n-
scsi.iodispatching
dev_id
\n- The scsi device id\n-
host_no
\n+
scsi.iodispatching
host_no
\n The host number\n-
device_state_str
\n- The current state of the device, as a string\n-
data_direction_str
\n- Data direction, as a string\n-
req_addr
\n- The current struct request pointer, as a number\n-
channel
\n- The channel number\n
data_direction
\n The data_direction specifies whether this command is from/to the device\n 0 (DMA_BIDIRECTIONAL), 1 (DMA_TO_DEVICE),\n 2 (DMA_FROM_DEVICE), 3 (DMA_NONE)\n
request_buffer
\n The request buffer address\n-
request_bufflen
\n- The request buffer length\n-
lun
\n- The lun number\n+
data_direction_str
\n+ Data direction, as a string\n
device_state
\n The current state of the device\n+
lun
\n+ The lun number\n+
device_state_str
\n+ The current state of the device, as a string\n+
dev_id
\n+ The scsi device id\n+
request_bufflen
\n+ The request buffer length\n+
channel
\n+ The channel number\n+
req_addr
\n+ The current struct request pointer, as a number\n
probe::scsi.iodone — \n SCSI command completed by low level driver and enqueued into the done queue.\n-
scsi.iodone
device_state
\n- The current state of the device\n-
lun
\n- The lun number\n-
data_direction
\n- The data_direction specifies whether this command is\n- from/to the device.\n-
channel
\n+
scsi.iodone
channel
\n The channel number\n
req_addr
\n The current struct request pointer, as a number\n+
dev_id
\n+ The scsi device id\n
data_direction_str
\n Data direction, as a string\n+
lun
\n+ The lun number\n+
device_state_str
\n+ The current state of the device, as a string\n+
device_state
\n+ The current state of the device\n
scsi_timer_pending
\n 1 if a timer is pending on this request\n
host_no
\n The host number\n-
device_state_str
\n- The current state of the device, as a string\n-
dev_id
\n- The scsi device id\n+
data_direction
\n+ The data_direction specifies whether this command is\n+ from/to the device.\n
probe::scsi.ioentry — \n Prepares a SCSI mid-layer request\n-
scsi.ioentry
disk_minor
\n- The minor number of the disk (-1 if no information)\n-
req_addr
\n- The current struct request pointer, as a number\n+
scsi.ioentry
device_state_str
\n+ The current state of the device, as a string\n
device_state
\n The current state of the device\n+
req_addr
\n+ The current struct request pointer, as a number\n
disk_major
\n The major number of the disk (-1 if no information)\n-
device_state_str
\n- The current state of the device, as a string\n+
disk_minor
\n+ The minor number of the disk (-1 if no information)\n
probe::scsi.ioexecute — \n Create mid-layer SCSI request and wait for the result\n-
scsi.ioexecute
device_state
\n- The current state of the device\n-
lun
\n- The lun number\n+
scsi.ioexecute
retries
\n+ Number of times to retry request\n+
data_direction_str
\n+ Data direction, as a string\n
timeout
\n Request timeout in seconds\n-
request_bufflen
\n- The data buffer buffer length\n-
channel
\n- The channel number\n-
retries
\n- Number of times to retry request\n-
request_buffer
\n- The data buffer address\n
data_direction
\n The data_direction specifies whether this command is\n from/to the device.\n-
data_direction_str
\n- Data direction, as a string\n+
dev_id
\n+ The scsi device id\n+
device_state
\n+ The current state of the device\n
device_state_str
\n The current state of the device, as a string\n+
lun
\n+ The lun number\n
host_no
\n The host number\n-
dev_id
\n- The scsi device id\n+
request_buffer
\n+ The data buffer address\n+
channel
\n+ The channel number\n+
request_bufflen
\n+ The data buffer buffer length\n
probe::scsi.set_state — \n Order SCSI device state change\n-
scsi.set_state
lun
\n- The lun number\n+
scsi.set_state
old_state_str
\n+ The current state of the device, as a string\n
channel
\n The channel number\n-
state_str
\n- The new state of the device, as a string\n-
old_state_str
\n- The current state of the device, as a string\n-
state
\n- The new state of the device\n-
dev_id
\n- The scsi device id\n
host_no
\n The host number\n+
lun
\n+ The lun number\n
old_state
\n The current state of the device\n+
dev_id
\n+ The scsi device id\n+
state_str
\n+ The new state of the device, as a string\n+
state
\n+ The new state of the device\n
probe::signal.check_ignored — \n Checking to see signal is ignored\n-
signal.check_ignored
sig_pid
\n- The PID of the process receiving the signal\n-
sig
\n- The number of the signal\n-
sig_name
\n+
signal.check_ignored
probe::signal.checkperm.return — \n Check performed on a sent signal completed\n-
signal.checkperm.return
probe::signal.checkperm — \n Check being performed on a sent signal\n
signal.checkperm
si_code
\n Indicates the signal type\n-
sig_pid
\n- The PID of the process receiving the signal\n-
sig_name
\n- A string representation of the signal\n-
pid_name
\n- Name of the process receiving the signal\n-
task
\n- A task handle to the signal recipient\n
sig
\n The number of the signal\n-
name
\n- Name of the probe point\n+
sig_pid
\n+ The PID of the process receiving the signal\n
sinfo
\n The address of the siginfo structure\n+
name
\n+ Name of the probe point\n+
task
\n+ A task handle to the signal recipient\n+
pid_name
\n+ Name of the process receiving the signal\n+
sig_name
\n+ A string representation of the signal\n
probe::signal.do_action — \n Examining or changing a signal action\n-
signal.do_action
oldsigact_addr
\n- The address of the old sigaction\n- struct associated with the signal\n-
sig_name
\n- A string representation of the signal\n+
signal.do_action
sig
\n+ The signal to be examined/changed\n
sa_mask
\n The new mask of the signal\n-
sig
\n- The signal to be examined/changed\n
sa_handler
\n The new handler of the signal\n
sigact_addr
\n The address of the new sigaction\n struct associated with the signal\n
name
\n Name of the probe point\n+
sig_name
\n+ A string representation of the signal\n+
oldsigact_addr
\n+ The address of the old sigaction\n+ struct associated with the signal\n
probe::signal.flush — \n Flushing all pending signals for a task\n-
signal.flush
task
\n- The task handler of the process performing the flush\n-
pid_name
\n+
signal.flush
probe::signal.handle.return — \n Signal handler invocation completed\n-
signal.handle.return
probe::signal.handle — \n Signal handler being invoked\n-
signal.handle
regs
\n- The address of the kernel-mode stack area (deprecated in\n- SystemTap 2.1)\n-
sig_mode
\n- Indicates whether the signal was a user-mode or kernel-mode signal\n-
ka_addr
\n- The address of the k_sigaction table\n- associated with the signal\n-
oldset_addr
\n+
signal.handle
oldset_addr
\n The address of the bitmask array of blocked signals\n (deprecated in SystemTap 2.1)\n-
name
\n- Name of the probe point\n+
sig_code
\n+ The si_code value of the siginfo signal\n
sinfo
\n The address of the siginfo table\n
sig
\n The signal number that invoked the signal handler\n+
ka_addr
\n+ The address of the k_sigaction table\n+ associated with the signal\n+
sig_mode
\n+ Indicates whether the signal was a user-mode or kernel-mode signal\n
sig_name
\n A string representation of the signal\n-
sig_code
\n- The si_code value of the siginfo signal\n+
regs
\n+ The address of the kernel-mode stack area (deprecated in\n+ SystemTap 2.1)\n+
name
\n+ Name of the probe point\n
probe::signal.pending.return — \n Examination of pending signal completed\n-
signal.pending.return
probe::signal.pending — \n Examining pending signal\n-
signal.pending
sigset_size
\n+
signal.pending
probe::signal.procmask — \n Examining or changing blocked signals\n-
signal.procmask
name
\n- Name of the probe point\n-
how
\n- Indicates how to change the blocked signals; possible values are\n- SIG_BLOCK=0 (for blocking signals),\n- SIG_UNBLOCK=1 (for unblocking signals), and\n- SIG_SETMASK=2 for setting the signal mask.\n-
sigset
\n- The actual value to be set for sigset_t\n- (correct?)\n-
sigset_addr
\n+
signal.procmask
sigset_addr
\n The address of the signal set (sigset_t)\n to be implemented\n
oldsigset_addr
\n The old address of the signal set\n (sigset_t)\n+
sigset
\n+ The actual value to be set for sigset_t\n+ (correct?)\n+
how
\n+ Indicates how to change the blocked signals; possible values are\n+ SIG_BLOCK=0 (for blocking signals),\n+ SIG_UNBLOCK=1 (for unblocking signals), and\n+ SIG_SETMASK=2 for setting the signal mask.\n+
name
\n+ Name of the probe point\n
probe::signal.send.return — \n Signal being sent to a process completed (deprecated in SystemTap 2.1)\n-
signal.send.return
name
\n+
signal.send.return
retstr
\n+ The return value to either __group_send_sig_info, specific_send_sig_info, or send_sigqueue\n+
send2queue
\n+ Indicates whether the sent signal was sent to an existing sigqueue\n+
name
\n The name of the function used to send out the signal\n
shared
\n Indicates whether the sent signal is shared by the thread group.\n-
send2queue
\n- Indicates whether the sent signal was sent to an existing sigqueue\n-
retstr
\n- The return value to either __group_send_sig_info, specific_send_sig_info, or send_sigqueue\n
\n Possible __group_send_sig_info and\n specific_send_sig_info return values are as follows;\n
\n \n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-signal-send-sig-queue-return.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-signal-send-sig-queue-return.html", "unified_diff": "@@ -1,7 +1,7 @@\n
probe::signal.send_sig_queue.return — \n Queuing a signal to a process completed\n-
signal.send_sig_queue.return
probe::signal.send_sig_queue — \n Queuing a signal to a process\n-
signal.send_sig_queue
sig_pid
\n+
signal.send_sig_queue
sig
\n+ The queued signal\n+
sig_pid
\n The PID of the process to which the signal is queued\n
sigqueue_addr
\n The address of the signal queue\n
name
\n Name of the probe point\n-
sig
\n- The queued signal\n-
pid_name
\n- Name of the process to which the signal is queued\n
sig_name
\n A string representation of the signal\n+
pid_name
\n+ Name of the process to which the signal is queued\n
probe::signal.send — \n Signal being sent to a process\n-
signal.send
sig_pid
\n- The PID of the process receiving the signal\n-
si_code
\n+
signal.send
si_code
\n Indicates the signal type\n-
sig
\n- The number of the signal\n-
name
\n- The name of the function used to send out the signal\n
shared
\n Indicates whether the signal is shared by the thread group\n+
sig
\n+ The number of the signal\n
sinfo
\n The address of siginfo struct\n-
pid_name
\n- The name of the signal recipient\n-
sig_name
\n- A string representation of the signal\n+
sig_pid
\n+ The PID of the process receiving the signal\n+
name
\n+ The name of the function used to send out the signal\n
task
\n A task handle to the signal recipient\n+
pid_name
\n+ The name of the signal recipient\n
send2queue
\n Indicates whether the signal is sent to an existing\n sigqueue (deprecated in SystemTap 2.1)\n+
sig_name
\n+ A string representation of the signal\n
probe::signal.sys_tgkill — \n Sending kill signal to a thread group\n-
signal.sys_tgkill
name
\n- Name of the probe point\n-
sig
\n+
signal.sys_tgkill
sig
\n The specific kill signal sent to the process\n+
sig_pid
\n+ The PID of the thread receiving the kill signal\n+
name
\n+ Name of the probe point\n+
tgid
\n+ The thread group ID of the thread receiving the kill signal\n
task
\n A task handle to the signal recipient\n
pid_name
\n The name of the signal recipient\n-
tgid
\n- The thread group ID of the thread receiving the kill signal\n
sig_name
\n A string representation of the signal\n-
sig_pid
\n- The PID of the thread receiving the kill signal\n
probe::signal.sys_tkill — \n Sending a kill signal to a thread\n-
signal.sys_tkill
name
\n- Name of the probe point\n-
sig
\n- The specific signal sent to the process\n+
signal.sys_tkill
sig_name
\n+ A string representation of the signal\n
task
\n A task handle to the signal recipient\n-
sig_name
\n- A string representation of the signal\n
pid_name
\n The name of the signal recipient\n+
name
\n+ Name of the probe point\n
sig_pid
\n The PID of the process receiving the kill signal\n+
sig
\n+ The specific signal sent to the process\n
probe::signal.syskill — \n Sending kill signal to a process\n-
signal.syskill
sig_pid
\n+
signal.syskill
sig
\n+ The specific signal sent to the process\n+
sig_pid
\n The PID of the process receiving the signal\n+
name
\n+ Name of the probe point\n
sig_name
\n A string representation of the signal\n-
pid_name
\n- The name of the signal recipient\n
task
\n A task handle to the signal recipient\n-
sig
\n- The specific signal sent to the process\n-
name
\n- Name of the probe point\n+
pid_name
\n+ The name of the signal recipient\n
probe::signal.systkill.return — \n Sending kill signal to a thread completed\n-
signal.systkill.return
probe::signal.wakeup — \n Sleeping process being wakened for signal\n-
signal.wakeup
sig_pid
\n- The PID of the process to wake\n+
signal.wakeup
pid_name
\n+ Name of the process to wake\n
state_mask
\n A string representation indicating the mask\n of task states to wake. Possible values are\n TASK_INTERRUPTIBLE, TASK_STOPPED,\n TASK_TRACED, TASK_WAKEKILL, and TASK_INTERRUPTIBLE.\n-
pid_name
\n- Name of the process to wake\n
resume
\n Indicates whether to wake up a task in a\n STOPPED or TRACED state\n+
sig_pid
\n+ The PID of the process to wake\n
probe::socket.aio_read.return — \n Conclusion of message received via sock_aio_read
\n-
socket.aio_read.return
state
\n+
socket.aio_read.return
name
\n+ Name of this probe\n+
protocol
\n+ Protocol value\n+
flags
\n+ Socket flags value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
type
\n+ Socket type value\n+
state
\n Socket state value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
type
\n- Socket type value\n-
flags
\n- Socket flags value\n-
protocol
\n- Protocol value\n
family
\n Protocol family value\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n-
name
\n- Name of this probe\n
probe::socket.aio_read — \n Receiving message via sock_aio_read
\n-
socket.aio_read
state
\n+
socket.aio_read
family
\n+ Protocol family value\n+
state
\n Socket state value\n-
flags
\n- Socket flags value\n
type
\n Socket type value\n-
family
\n- Protocol family value\n+
flags
\n+ Socket flags value\n
size
\n Message size in bytes\n-
name
\n- Name of this probe\n
protocol
\n Protocol value\n+
name
\n+ Name of this probe\n
probe::socket.aio_write.return — \n Conclusion of message send via sock_aio_write
\n-
socket.aio_write.return
state
\n- Socket state value\n-
type
\n- Socket type value\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n+
socket.aio_write.return
size
\n+ Size of message received (in bytes) or error code if success = 0\n
flags
\n Socket flags value\n+
name
\n+ Name of this probe\n
protocol
\n Protocol value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
family
\n Protocol family value\n-
name
\n- Name of this probe\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n+
type
\n+ Socket type value\n+
state
\n+ Socket state value\n
probe::socket.aio_write — \n Message send via sock_aio_write
\n-
socket.aio_write
protocol
\n- Protocol value\n-
family
\n- Protocol family value\n+
socket.aio_write
flags
\n+ Socket flags value\n
size
\n Message size in bytes\n
name
\n Name of this probe\n+
protocol
\n+ Protocol value\n+
family
\n+ Protocol family value\n
type
\n Socket type value\n-
flags
\n- Socket flags value\n
state
\n Socket state value\n
\n Fires at the beginning of sending a message on a socket\n via the sock_aio_write
function\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-close.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-close.html", "unified_diff": "@@ -1,19 +1,19 @@\n
probe::socket.close — \n Close a socket\n-
socket.close
family
\n- Protocol family value\n+
socket.close
probe::socket.create.return — \n Return from Creation of a socket\n-
socket.create.return
protocol
\n+
socket.create.return
err
\n+ Error code if success == 0\n+
protocol
\n Protocol value\n
name
\n Name of this probe\n-
family
\n- Protocol family value\n-
success
\n- Was socket creation successful? (1 = yes, 0 = no)\n
type
\n Socket type value\n
requester
\n Requested by user process or the kernel (1 = kernel, 0 = user)\n-
err
\n- Error code if success == 0\n+
family
\n+ Protocol family value\n+
success
\n+ Was socket creation successful? (1 = yes, 0 = no)\n
probe::socket.create — \n Creation of a socket\n
socket.create
probe::socket.read_iter.return — \n Conclusion of message received via sock_read_iter
\n-
socket.read_iter.return
state
\n- Socket state value\n-
type
\n- Socket type value\n+
socket.read_iter.return
family
\n+ Protocol family value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
flags
\n- Socket flags value\n-
protocol
\n- Protocol value\n-
family
\n- Protocol family value\n+
type
\n+ Socket type value\n+
state
\n+ Socket state value\n
size
\n Size of message received (in bytes) or error code if success = 0\n+
flags
\n+ Socket flags value\n
name
\n Name of this probe\n+
protocol
\n+ Protocol value\n
probe::socket.read_iter — \n Receiving message via sock_read_iter
\n-
socket.read_iter
flags
\n- Socket flags value\n-
type
\n- Socket type value\n-
state
\n- Socket state value\n-
name
\n+
socket.read_iter
probe::socket.readv.return — \n Conclusion of receiving a message via sock_readv
\n-
socket.readv.return
protocol
\n- Protocol value\n-
family
\n+
socket.readv.return
family
\n Protocol family value\n-
name
\n- Name of this probe\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n-
type
\n- Socket type value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
flags
\n- Socket flags value\n
state
\n Socket state value\n+
type
\n+ Socket type value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
flags
\n+ Socket flags value\n+
name
\n+ Name of this probe\n+
protocol
\n+ Protocol value\n
probe::socket.readv — \n Receiving a message via sock_readv
\n-
socket.readv
type
\n- Socket type value\n+
socket.readv
size
\n+ Message size in bytes\n
flags
\n Socket flags value\n-
state
\n- Socket state value\n+
name
\n+ Name of this probe\n
protocol
\n Protocol value\n
family
\n Protocol family value\n-
size
\n- Message size in bytes\n-
name
\n- Name of this probe\n+
state
\n+ Socket state value\n+
type
\n+ Socket type value\n
probe::socket.receive — \n Message received on a socket.\n
socket.receive
protocol
\n Protocol value\n-
family
\n- Protocol family value\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n
name
\n Name of this probe\n-
type
\n- Socket type value\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
flags
\n Socket flags value\n+
type
\n+ Socket type value\n
state
\n Socket state value\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n+
family
\n+ Protocol family value\n
probe::socket.recvmsg.return — \n Return from Message being received on socket\n-
socket.recvmsg.return
family
\n+
socket.recvmsg.return
state
\n+ Socket state value\n+
type
\n+ Socket type value\n+
family
\n Protocol family value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
name
\n Name of this probe\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n
protocol
\n Protocol value\n-
state
\n- Socket state value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
flags
\n Socket flags value\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n-
type
\n- Socket type value\n
probe::socket.recvmsg — \n Message being received on socket\n-
socket.recvmsg
size
\n- Message size in bytes\n-
name
\n- Name of this probe\n-
family
\n+
socket.recvmsg
probe::socket.send — \n Message sent on a socket.\n-
socket.send
flags
\n- Socket flags value\n-
success
\n+
socket.send
success
\n Was send successful? (1 = yes, 0 = no)\n+
family
\n+ Protocol family value\n
type
\n Socket type value\n
state
\n Socket state value\n-
family
\n- Protocol family value\n+
flags
\n+ Socket flags value\n
size
\n Size of message sent (in bytes) or error code if success = 0\n
name
\n Name of this probe\n
protocol
\n Protocol value\n
\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-sendmsg-return.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-sendmsg-return.html", "unified_diff": "@@ -1,24 +1,24 @@\n
probe::socket.sendmsg.return — \n Return from socket.sendmsg.\n-
socket.sendmsg.return
flags
\n- Socket flags value\n-
type
\n- Socket type value\n+
socket.sendmsg.return
family
\n+ Protocol family value\n
success
\n Was send successful? (1 = yes, 0 = no)\n
state
\n Socket state value\n-
name
\n- Name of this probe\n+
type
\n+ Socket type value\n+
flags
\n+ Socket flags value\n
size
\n Size of message sent (in bytes) or error code if success = 0\n-
family
\n- Protocol family value\n
protocol
\n Protocol value\n+
name
\n+ Name of this probe\n
probe::socket.sendmsg — \n Message is currently being sent on a socket.\n-
socket.sendmsg
size
\n- Message size in bytes\n-
name
\n+
socket.sendmsg
probe::socket.write_iter.return — \n Conclusion of message send via sock_write_iter
\n-
socket.write_iter.return
size
\n- Size of message received (in bytes) or error code if success = 0\n-
name
\n- Name of this probe\n+
socket.write_iter.return
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
family
\n Protocol family value\n-
protocol
\n- Protocol value\n
state
\n Socket state value\n-
flags
\n- Socket flags value\n
type
\n Socket type value\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n+
flags
\n+ Socket flags value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
protocol
\n+ Protocol value\n+
name
\n+ Name of this probe\n
probe::socket.write_iter — \n Message send via sock_write_iter
\n-
socket.write_iter
state
\n- Socket state value\n-
flags
\n- Socket flags value\n-
type
\n- Socket type value\n+
socket.write_iter
probe::socket.writev.return — \n Conclusion of message sent via socket_writev
\n-
socket.writev.return
protocol
\n- Protocol value\n+
socket.writev.return
success
\n+ Was send successful? (1 = yes, 0 = no)\n
family
\n Protocol family value\n-
size
\n- Size of message sent (in bytes) or error code if success = 0\n-
name
\n- Name of this probe\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n
type
\n Socket type value\n-
flags
\n- Socket flags value\n
state
\n Socket state value\n+
size
\n+ Size of message sent (in bytes) or error code if success = 0\n+
flags
\n+ Socket flags value\n+
protocol
\n+ Protocol value\n+
name
\n+ Name of this probe\n
probe::socket.writev — \n Message sent via socket_writev
\n-
socket.writev
protocol
\n- Protocol value\n-
size
\n- Message size in bytes\n-
name
\n- Name of this probe\n-
family
\n- Protocol family value\n-
state
\n+
socket.writev
probe::softirq.entry — \n Execution of handler for a pending softirq starting\n
softirq.entry
probe::softirq.exit — \n Execution of handler for a pending softirq completed\n-
softirq.exit
probe::stap.cache_add_mod — \n Adding kernel instrumentation module to cache\n-
stap.cache_add_mod
source_path
\n- the path the .ko file is coming from (incl filename)\n-
dest_path
\n+
stap.cache_add_mod
probe::stap.cache_add_nss — \n Add NSS (Network Security Services) information to cache\n-
stap.cache_add_nss
source_path
\n+
stap.cache_add_nss
probe::stap.cache_add_src — \n Adding C code translation to cache\n-
stap.cache_add_src
dest_path
\n- the path the .c file is going to (incl filename)\n-
source_path
\n+
stap.cache_add_src
probe::stap.cache_get — \n Found item in stap cache\n-
stap.cache_get
module_path
\n- the path of the .ko kernel module file\n-
source_path
\n+
stap.cache_get
probe::stapio.receive_control_message — \n Received a control message\n-
stapio.receive_control_message
data
\n- a ptr to a binary blob of data sent as the control message\n-
type
\n+
stapio.receive_control_message
probe::staprun.send_control_message — \n Sending a control message\n-
staprun.send_control_message
data
\n- a ptr to a binary blob of data sent as the control message\n+
staprun.send_control_message
probe::sunrpc.clnt.bind_new_program — \n Bind a new RPC program to an existing client\n-
sunrpc.clnt.bind_new_program
servername
\n- the server machine name\n+
sunrpc.clnt.bind_new_program
vers
\n+ the version of new RPC program\n+
progname
\n+ the name of new RPC program\n
old_prog
\n the number of old RPC program\n+
servername
\n+ the server machine name\n
old_progname
\n the name of old RPC program\n-
progname
\n- the name of new RPC program\n-
old_vers
\n- the version of old RPC program\n
prog
\n the number of new RPC program\n-
vers
\n- the version of new RPC program\n+
old_vers
\n+ the version of old RPC program\n
probe::sunrpc.clnt.call_async — \n Make an asynchronous RPC call\n-
sunrpc.clnt.call_async
port
\n- the port number\n+
sunrpc.clnt.call_async
prot
\n+ the IP protocol number\n+
flags
\n+ flags\n
prog
\n the RPC program number\n-
vers
\n- the RPC program version number\n+
procname
\n+ the procedure name in this RPC call\n
dead
\n whether this client is abandoned\n-
xid
\n- current transmission id\n-
proc
\n- the procedure number in this RPC call\n
servername
\n the server machine name\n-
procname
\n- the procedure name in this RPC call\n-
prot
\n- the IP protocol number\n+
port
\n+ the port number\n
progname
\n the RPC program name\n-
flags
\n- flags\n+
proc
\n+ the procedure number in this RPC call\n+
vers
\n+ the RPC program version number\n+
xid
\n+ current transmission id\n
probe::sunrpc.clnt.call_sync — \n Make a synchronous RPC call\n-
sunrpc.clnt.call_sync
servername
\n- the server machine name\n-
procname
\n- the procedure name in this RPC call\n-
flags
\n- flags\n-
prot
\n- the IP protocol number\n-
progname
\n+
sunrpc.clnt.call_sync
progname
\n the RPC program name\n-
port
\n- the port number\n+
proc
\n+ the procedure number in this RPC call\n
vers
\n the RPC program version number\n-
prog
\n- the RPC program number\n
xid
\n current transmission id\n-
proc
\n- the procedure number in this RPC call\n+
prot
\n+ the IP protocol number\n+
flags
\n+ flags\n+
prog
\n+ the RPC program number\n+
procname
\n+ the procedure name in this RPC call\n
dead
\n whether this client is abandoned\n+
servername
\n+ the server machine name\n+
port
\n+ the port number\n
probe::sunrpc.clnt.clone_client — \n Clone an RPC client structure\n
sunrpc.clnt.clone_client
progname
\n the RPC program name\n-
prot
\n- the IP protocol number\n
authflavor
\n the authentication flavor\n-
vers
\n- the RPC program version number\n-
prog
\n- the RPC program number\n+
prot
\n+ the IP protocol number\n
port
\n the port number\n
servername
\n the server machine name\n+
prog
\n+ the RPC program number\n+
vers
\n+ the RPC program version number\n
probe::sunrpc.clnt.create_client — \n Create an RPC client\n-
sunrpc.clnt.create_client
prog
\n- the RPC program number\n-
vers
\n- the RPC program version number\n-
port
\n- the port number\n-
servername
\n- the server machine name\n+
sunrpc.clnt.create_client
authflavor
\n+ the authentication flavor\n
progname
\n the RPC program name\n
prot
\n the IP protocol number\n-
authflavor
\n- the authentication flavor\n+
port
\n+ the port number\n+
servername
\n+ the server machine name\n+
vers
\n+ the RPC program version number\n+
prog
\n+ the RPC program number\n
probe::sunrpc.clnt.restart_call — \n Restart an asynchronous RPC call\n-
sunrpc.clnt.restart_call
tk_priority
\n- the task priority\n-
xid
\n- the transmission id\n-
tk_pid
\n+
sunrpc.clnt.restart_call
probe::sunrpc.clnt.shutdown_client — \n Shutdown an RPC client\n-
sunrpc.clnt.shutdown_client
authflavor
\n- the authentication flavor\n-
om_ntrans
\n- the count of RPC transmissions\n-
om_rtt
\n+
sunrpc.clnt.shutdown_client
om_rtt
\n the RPC RTT jiffies\n-
clones
\n- the number of clones\n-
port
\n- the port number\n-
prog
\n- the RPC program number\n-
vers
\n- the RPC program version number\n+
om_ops
\n+ the count of operations\n+
authflavor
\n+ the authentication flavor\n+
om_queue
\n+ the jiffies queued for xmit\n
prot
\n the IP protocol number\n+
rpccnt
\n+ the count of RPC calls\n+
port
\n+ the port number\n+
servername
\n+ the server machine name\n
tasks
\n the number of references\n+
prog
\n+ the RPC program number\n
progname
\n the RPC program name\n+
clones
\n+ the number of clones\n+
netreconn
\n+ the count of reconnections\n
om_execute
\n the RPC execution jiffies\n-
rpccnt
\n- the count of RPC calls\n-
om_bytes_sent
\n- the count of bytes out\n
om_bytes_recv
\n the count of bytes in\n-
om_queue
\n- the jiffies queued for xmit\n-
netreconn
\n- the count of reconnections\n-
om_ops
\n- the count of operations\n-
servername
\n- the server machine name\n+
om_bytes_sent
\n+ the count of bytes out\n+
om_ntrans
\n+ the count of RPC transmissions\n+
vers
\n+ the RPC program version number\n
probe::sunrpc.sched.delay — \n Delay an RPC task\n-
sunrpc.sched.delay
xid
\n- the transmission id in the RPC call\n-
delay
\n- the time delayed\n-
vers
\n- the program version in the RPC call\n-
prog
\n- the program number in the RPC call\n+
sunrpc.sched.delay
prot
\n+ the IP protocol in the RPC call\n
tk_pid
\n the debugging id of the task\n-
prot
\n- the IP protocol in the RPC call\n+
prog
\n+ the program number in the RPC call\n
tk_flags
\n the flags of the task\n+
vers
\n+ the program version in the RPC call\n+
xid
\n+ the transmission id in the RPC call\n+
delay
\n+ the time delayed\n
probe::sunrpc.sched.execute — \n Execute the RPC `scheduler'\n-
sunrpc.sched.execute
tk_pid
\n+
sunrpc.sched.execute
prot
\n+ the IP protocol in the RPC call\n+
tk_pid
\n the debugging id of the task\n
prog
\n the program number in the RPC call\n
vers
\n the program version in the RPC call\n-
xid
\n- the transmission id in the RPC call\n
tk_flags
\n the flags of the task\n-
prot
\n- the IP protocol in the RPC call\n+
xid
\n+ the transmission id in the RPC call\n
probe::sunrpc.sched.new_task — \n Create new task for the specified client\n-
sunrpc.sched.new_task
probe::sunrpc.sched.release_task — \n Release all resources associated with a task\n-
sunrpc.sched.release_task
tk_flags
\n- the flags of the task\n-
prot
\n+
sunrpc.sched.release_task
probe::sunrpc.svc.create — \n Create an RPC service\n-
sunrpc.svc.create
probe::sunrpc.svc.destroy — \n Destroy an RPC service\n-
sunrpc.svc.destroy
sv_progname
\n- the name of the program\n-
sv_nrthreads
\n- the number of concurrent threads\n-
sv_name
\n- the service name\n-
nettcpconn
\n+
sunrpc.svc.destroy
nettcpconn
\n the count of accepted TCP connections\n
rpcbadauth
\n the count of requests drooped for authentication failure\n-
rpccnt
\n- the count of valid RPC requests\n-
netcnt
\n- the count of received RPC requests\n
sv_prog
\n the number of the program\n+
sv_nrthreads
\n+ the number of concurrent threads\n
rpcbadfmt
\n the count of requests dropped for bad formats\n+
rpccnt
\n+ the count of valid RPC requests\n+
sv_progname
\n+ the name of the program\n+
netcnt
\n+ the count of received RPC requests\n+
sv_name
\n+ the service name\n
probe::sunrpc.svc.drop — \n Drop RPC request\n-
sunrpc.svc.drop
rq_proc
\n- the procedure number in the request\n-
rq_vers
\n+
sunrpc.svc.drop
rq_vers
\n the program version in the request\n-
sv_name
\n- the service name\n-
rq_xid
\n- the transmission id in the request\n-
rq_prot
\n- the IP protocol of the reqeust\n+
rq_proc
\n+ the procedure number in the request\n
rq_prog
\n the program number in the request\n
peer_ip
\n the peer address where the request is from\n+
rq_prot
\n+ the IP protocol of the reqeust\n+
rq_xid
\n+ the transmission id in the request\n+
sv_name
\n+ the service name\n
probe::sunrpc.svc.process — \n Process an RPC request\n-
sunrpc.svc.process
peer_ip
\n- the peer address where the request is from\n+
sunrpc.svc.process
rq_vers
\n+ the program version in the request\n+
rq_proc
\n+ the procedure number in the request\n+
sv_nrthreads
\n+ the number of concurrent threads\n
sv_prog
\n the number of the program\n
rq_prog
\n the program number in the request\n+
peer_ip
\n+ the peer address where the request is from\n
rq_prot
\n the IP protocol of the reqeust\n
rq_xid
\n the transmission id in the request\n-
rq_proc
\n- the procedure number in the request\n
sv_name
\n the service name\n-
sv_nrthreads
\n- the number of concurrent threads\n-
rq_vers
\n- the program version in the request\n
probe::sunrpc.svc.recv — \n Listen for the next RPC request on any socket\n
sunrpc.svc.recv
probe::sunrpc.svc.register — \n Register an RPC service with the local portmapper\n
sunrpc.svc.register
probe::sunrpc.svc.send — \n Return reply to RPC client\n
sunrpc.svc.send
rq_proc
\n the procedure number in the request\n-
sv_name
\n- the service name\n
rq_vers
\n the program version in the request\n-
rq_prot
\n- the IP protocol of the reqeust\n-
rq_xid
\n- the transmission id in the request\n
rq_prog
\n the program number in the request\n+
rq_prot
\n+ the IP protocol of the reqeust\n
peer_ip
\n the peer address where the request is from\n+
rq_xid
\n+ the transmission id in the request\n+
sv_name
\n+ the service name\n
probe::syscall_any.return — \n Record exit from a syscall\n
syscall_any.return
syscall_nr
\n number of the syscall\n-
name
\n- name of the syscall\n
retval
\n return value of the syscall\n+
name
\n+ name of the syscall\n
\n The syscall_any.return probe point is designed to be a low overhead\n that monitors all the syscalls returns via a kernel tracepoint.\n Because of the breadth of syscalls it monitors it provides\n no information about the syscall arguments, argstr string\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-syscall-any.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-syscall-any.html", "unified_diff": "@@ -1,13 +1,13 @@\n
probe::syscall_any — \n Record entry into a syscall\n-
syscall_any
syscall_nr
\n- number of the syscall\n-
name
\n+
syscall_any
\n The syscall_any probe point is designed to be a low overhead\n that monitors all the syscalls entered via a kernel tracepoint.\n Because of the breadth of syscalls it monitors it provides\n no information about the syscall arguments or argstr string\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect.html", "unified_diff": "@@ -1,21 +1,21 @@\n
probe::tcp.disconnect — \n TCP socket disconnection\n-
tcp.disconnect
sock
\n- Network socket \n-
name
\n- Name of this probe\n+
tcp.disconnect
dport
\n+ TCP destination port\n
sport
\n TCP source port \n
flags
\n TCP flags (e.g. FIN, etc) \n+
name
\n+ Name of this probe\n+
sock
\n+ Network socket \n
saddr
\n A string representing the source IP address\n-
family
\n- IP address family\n
daddr
\n A string representing the destination IP address\n-
dport
\n- TCP destination port\n+
family
\n+ IP address family\n
probe::tcp.receive — \n Called when a TCP packet is received\n-
tcp.receive
fin
\n- TCP FIN flag\n-
psh
\n- TCP PSH flag\n-
name
\n- Name of the probe point\n-
family
\n- IP address family\n-
saddr
\n- A string representing the source IP address\n-
urg
\n- TCP URG flag\n-
dport
\n- TCP destination port\n-
rst
\n- TCP RST flag\n-
sport
\n- TCP source port\n-
daddr
\n+
tcp.receive
daddr
\n A string representing the destination IP address\n+
fin
\n+ TCP FIN flag\n
protocol
\n Packet protocol from driver\n+
urg
\n+ TCP URG flag\n+
iphdr
\n+ IP header address\n
ack
\n TCP ACK flag\n+
sport
\n+ TCP source port\n+
family
\n+ IP address family\n
syn
\n TCP SYN flag\n-
iphdr
\n- IP header address\n+
saddr
\n+ A string representing the source IP address\n+
psh
\n+ TCP PSH flag\n+
name
\n+ Name of the probe point\n+
rst
\n+ TCP RST flag\n+
dport
\n+ TCP destination port\n
probe::tcp.recvmsg.return — \n Receiving TCP message complete\n-
tcp.recvmsg.return
size
\n- Number of bytes received or error code if an error occurred.\n-
name
\n- Name of this probe\n+
tcp.recvmsg.return
dport
\n+ TCP destination port\n
sport
\n TCP source port \n-
family
\n- IP address family\n+
name
\n+ Name of this probe\n
saddr
\n A string representing the source IP address\n+
family
\n+ IP address family\n
daddr
\n A string representing the destination IP address\n-
dport
\n- TCP destination port\n+
size
\n+ Number of bytes received or error code if an error occurred.\n
probe::tcp.recvmsg — \n Receiving TCP message\n-
tcp.recvmsg
size
\n- Number of bytes to be received \n-
sock
\n- Network socket\n-
name
\n- Name of this probe\n+
tcp.recvmsg
dport
\n+ TCP destination port\n
sport
\n TCP source port \n+
name
\n+ Name of this probe\n+
sock
\n+ Network socket\n
saddr
\n A string representing the source IP address\n+
size
\n+ Number of bytes to be received \n
family
\n IP address family\n
daddr
\n A string representing the destination IP address\n-
dport
\n- TCP destination port\n
probe::tcp.sendmsg.return — \n Sending TCP message is done\n-
tcp.sendmsg.return
size
\n- Number of bytes sent or error code if an error occurred. \n-
name
\n+
tcp.sendmsg.return
probe::tcp.sendmsg — \n Sending a tcp message\n-
tcp.sendmsg
family
\n- IP address family\n-
size
\n- Number of bytes to send \n-
sock
\n+
tcp.sendmsg
probe::tcp.setsockopt.return — \n Return from setsockopt
\n-
tcp.setsockopt.return
probe::tcp.setsockopt — \n Call to setsockopt
\n-
tcp.setsockopt
optstr
\n- Resolves optname to a human-readable format\n-
family
\n+
tcp.setsockopt
family
\n IP address family\n
sock
\n Network socket\n-
optlen
\n- Used to access values for setsockopt
\n
optname
\n TCP socket options (e.g. TCP_NODELAY, TCP_MAXSEG, etc)\n+
optstr
\n+ Resolves optname to a human-readable format\n+
optlen
\n+ Used to access values for setsockopt
\n
name
\n Name of this probe\n
level
\n The level at which the socket options will be manipulated\n
probe::tcpmib.ActiveOpens — \n Count an active opening of a socket\n-
tcpmib.ActiveOpens
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.ActiveOpens
probe::tcpmib.CurrEstab — \n Update the count of open sockets\n-
tcpmib.CurrEstab
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.CurrEstab
probe::tcpmib.EstabResets — \n Count the reset of a socket\n-
tcpmib.EstabResets
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.EstabResets
probe::tcpmib.OutRsts — \n Count the sending of a reset packet\n-
tcpmib.OutRsts
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.OutRsts
probe::tcpmib.OutSegs — \n Count the sending of a TCP segment\n-
tcpmib.OutSegs
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.OutSegs
probe::tcpmib.PassiveOpens — \n Count the passive creation of a socket\n-
tcpmib.PassiveOpens
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.PassiveOpens
probe::tty.init — \n Called when a tty is being initalized\n-
tty.init
probe::tty.open — \n Called when a tty is opened\n-
tty.open
probe::tty.read — \n called when a tty line will be read\n-
tty.read
probe::tty.receive — \n called when a tty receives a message\n-
tty.receive
probe::tty.release — \n Called when the tty is closed\n-
tty.release
file_flags
\n- the file flags\n-
inode_number
\n- the inode number\n-
file_mode
\n+
tty.release
probe::tty.resize — \n Called when a terminal resize happens\n-
tty.resize
new_row
\n- the new row value\n-
new_col
\n- the new col value\n-
old_row
\n- the old row value\n+
tty.resize
old_xpixel
\n+ the old xpixel\n
old_col
\n the old col value\n-
new_ypixel
\n- the new ypixel value\n
old_ypixel
\n the old ypixel\n+
old_row
\n+ the old row value\n+
new_row
\n+ the new row value\n+
new_ypixel
\n+ the new ypixel value\n
name
\n the tty name\n
new_xpixel
\n the new xpixel value\n-
old_xpixel
\n- the old xpixel\n+
new_col
\n+ the new col value\n
probe::tty.unregister — \n Called when a tty device is being unregistered\n-
tty.unregister
probe::tty.write — \n write to the tty line\n-
tty.write
probe::udp.disconnect.return — \n UDP has been disconnected successfully\n-
udp.disconnect.return
daddr
\n- A string representing the destination IP address\n-
dport
\n+
udp.disconnect.return
dport
\n UDP destination port\n-
saddr
\n- A string representing the source IP address\n-
sport
\n- UDP source port\n+
family
\n+ IP address family\n
name
\n The name of this probe\n+
sport
\n+ UDP source port\n+
saddr
\n+ A string representing the source IP address\n+
daddr
\n+ A string representing the destination IP address\n
ret
\n Error code (0: no error) \n-
family
\n- IP address family\n
probe::udp.disconnect — \n Fires when a process requests for a UDP disconnection\n-
udp.disconnect
sock
\n- Network socket used by the process\n-
family
\n- IP address family\n+
udp.disconnect
daddr
\n+ A string representing the destination IP address\n+
saddr
\n+ A string representing the source IP address\n
flags
\n Flags (e.g. FIN, etc) \n
name
\n The name of this probe\n
sport
\n UDP source port\n-
saddr
\n- A string representing the source IP address\n
dport
\n UDP destination port\n-
daddr
\n- A string representing the destination IP address\n+
family
\n+ IP address family\n+
sock
\n+ Network socket used by the process\n
probe::udp.recvmsg.return — \n Fires whenever an attempt to receive a UDP message received is completed\n-
udp.recvmsg.return
saddr
\n+
udp.recvmsg.return
daddr
\n+ A string representing the destination IP address\n+
size
\n+ Number of bytes received by the process\n+
saddr
\n A string representing the source IP address\n-
name
\n- The name of this probe\n
sport
\n UDP source port\n+
name
\n+ The name of this probe\n
family
\n IP address family\n-
daddr
\n- A string representing the destination IP address\n
dport
\n UDP destination port\n-
size
\n- Number of bytes received by the process\n
probe::udp.recvmsg — \n Fires whenever a UDP message is received\n-
udp.recvmsg
daddr
\n- A string representing the destination IP address\n-
dport
\n- UDP destination port\n-
size
\n+
udp.recvmsg
size
\n Number of bytes received by the process\n+
daddr
\n+ A string representing the destination IP address\n
saddr
\n A string representing the source IP address\n-
sport
\n- UDP source port\n
name
\n The name of this probe\n-
family
\n- IP address family\n+
sport
\n+ UDP source port\n
sock
\n Network socket used by the process\n+
dport
\n+ UDP destination port\n+
family
\n+ IP address family\n
probe::udp.sendmsg.return — \n Fires whenever an attempt to send a UDP message is completed\n-
udp.sendmsg.return
probe::udp.sendmsg — \n Fires whenever a process sends a UDP message\n-
udp.sendmsg
name
\n- The name of this probe\n-
sport
\n- UDP source port\n-
saddr
\n+
udp.sendmsg
saddr
\n A string representing the source IP address\n+
size
\n+ Number of bytes sent by the process\n+
daddr
\n+ A string representing the destination IP address\n
sock
\n Network socket used by the process \n
family
\n IP address family\n
dport
\n UDP destination port\n-
daddr
\n- A string representing the destination IP address\n-
size
\n- Number of bytes sent by the process\n+
sport
\n+ UDP source port\n+
name
\n+ The name of this probe\n
probe::vm.brk — \n Fires when a brk is requested (i.e. the heap will be resized)\n-
vm.brk
length
\n- the length of the memory segment \n-
address
\n+
vm.brk
probe::vm.kfree — \n Fires when kfree is requested\n-
vm.kfree
probe::vm.kmalloc_node — \n Fires when kmalloc_node is requested\n-
vm.kmalloc_node
ptr
\n- pointer to the kmemory allocated\n-
call_site
\n- address of the function caling this kmemory function\n-
bytes_req
\n+
vm.kmalloc_node
bytes_req
\n requested Bytes\n
caller_function
\n name of the caller function\n
bytes_alloc
\n allocated Bytes\n
name
\n name of the probe point\n-
gfp_flags
\n- type of kmemory to allocate\n+
call_site
\n+ address of the function caling this kmemory function\n
gfp_flag_name
\n type of kmemory to allocate(in string format)\n+
ptr
\n+ pointer to the kmemory allocated\n+
gfp_flags
\n+ type of kmemory to allocate\n
probe::vm.kmalloc — \n Fires when kmalloc is requested\n
vm.kmalloc
bytes_alloc
\n allocated Bytes\n-
gfp_flag_name
\n- type of kmemory to allocate (in String format)\n-
gfp_flags
\n- type of kmemory to allocate\n
name
\n name of the probe point\n-
ptr
\n- pointer to the kmemory allocated\n+
bytes_req
\n+ requested Bytes\n
caller_function
\n name of the caller function\n+
ptr
\n+ pointer to the kmemory allocated\n+
gfp_flags
\n+ type of kmemory to allocate\n
call_site
\n address of the kmemory function\n-
bytes_req
\n- requested Bytes\n+
gfp_flag_name
\n+ type of kmemory to allocate (in String format)\n
probe::vm.kmem_cache_alloc_node — \n Fires when kmem_cache_alloc_node is requested\n-
vm.kmem_cache_alloc_node
bytes_req
\n- requested Bytes\n+
vm.kmem_cache_alloc_node
gfp_flag_name
\n+ type of kmemory to allocate(in string format)\n
call_site
\n address of the function calling this kmemory function\n-
caller_function
\n- name of the caller function\n+
gfp_flags
\n+ type of kmemory to allocate\n
ptr
\n pointer to the kmemory allocated\n+
caller_function
\n+ name of the caller function\n+
bytes_req
\n+ requested Bytes\n
name
\n name of the probe point\n-
gfp_flags
\n- type of kmemory to allocate\n-
gfp_flag_name
\n- type of kmemory to allocate(in string format)\n
bytes_alloc
\n allocated Bytes\n
probe::vm.kmem_cache_alloc — \n Fires when kmem_cache_alloc is requested\n-
vm.kmem_cache_alloc
ptr
\n+
vm.kmem_cache_alloc
call_site
\n+ address of the function calling this kmemory function.\n+
gfp_flag_name
\n+ type of kmemory to allocate(in string format)\n+
ptr
\n pointer to the kmemory allocated\n+
gfp_flags
\n+ type of kmemory to allocate\n
bytes_req
\n requested Bytes\n-
call_site
\n- address of the function calling this kmemory function.\n
caller_function
\n name of the caller function.\n
bytes_alloc
\n allocated Bytes\n-
gfp_flag_name
\n- type of kmemory to allocate(in string format)\n
name
\n name of the probe point\n-
gfp_flags
\n- type of kmemory to allocate\n
probe::vm.kmem_cache_free — \n Fires when kmem_cache_free is requested\n-
vm.kmem_cache_free
ptr
\n- Pointer to the kmemory allocated which is returned by kmem_cache\n+
vm.kmem_cache_free
probe::vm.pagefault.return — \n Indicates what type of fault occurred\n-
vm.pagefault.return
probe::vm.pagefault — \n Records that a page fault occurred\n-
vm.pagefault
write_access
\n+
vm.pagefault
probe::vm.write_shared_copy — \n Page copy for shared page write\n-
vm.write_shared_copy
name
\n- Name of the probe point\n-
address
\n- The address of the shared write\n-
zero
\n+
vm.write_shared_copy
probe::vm.write_shared — \n Attempts at writing to a shared page\n-
vm.write_shared
probe::workqueue.create — \n Creating a new workqueue\n-
workqueue.create