{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/r-b-build.B2ajtRSu/b1/systemtap_5.1-4.1_armhf.changes", "source2": "/srv/reproducible-results/rbuild-debian/r-b-build.B2ajtRSu/b2/systemtap_5.1-4.1_armhf.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -1,11 +1,11 @@\n \n 4a176b57f4cbce238596574b79583250 8572 devel optional systemtap-client_5.1-4.1_armhf.deb\n 1bd98572721185b0183c126bd34d76c4 640208 devel optional systemtap-common_5.1-4.1_armhf.deb\n c881ddb53c39041f6145bebd2d10b2f6 21596272 debug optional systemtap-dbgsym_5.1-4.1_armhf.deb\n- 283d8696cda05f44f88b78b5928776c5 2585448 doc optional systemtap-doc_5.1-4.1_armhf.deb\n+ 8e67f874f20e118bc8517e47a5c731e5 2586068 doc optional systemtap-doc_5.1-4.1_armhf.deb\n ac0c8151504558b2d5efde5b350c01bd 1253024 debug optional systemtap-runtime-dbgsym_5.1-4.1_armhf.deb\n 2375b4147bb037acbdd6f7e15aa9db4d 133224 devel optional systemtap-runtime_5.1-4.1_armhf.deb\n 1563052e54f591f8584af8320dc38774 18916 devel optional systemtap-sdt-dev_5.1-4.1_armhf.deb\n 368b82d4ea8b2b1d6ec9b409dc5b569a 1955160 debug optional systemtap-server-dbgsym_5.1-4.1_armhf.deb\n 9ab084dcce7a3df475090ea3d7b5403e 136916 devel optional systemtap-server_5.1-4.1_armhf.deb\n 0cd893c6d7e0a700e508ccd0a8ef2ee1 1341324 devel optional systemtap_5.1-4.1_armhf.deb\n"}, {"source1": "systemtap-doc_5.1-4.1_armhf.deb", "source2": "systemtap-doc_5.1-4.1_armhf.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2025-02-28 20:20:54.000000 debian-binary\n -rw-r--r-- 0 0 0 54220 2025-02-28 20:20:54.000000 control.tar.xz\n--rw-r--r-- 0 0 0 2531036 2025-02-28 20:20:54.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 2531656 2025-02-28 20:20:54.000000 data.tar.xz\n"}, {"source1": "control.tar.xz", "source2": "control.tar.xz", "unified_diff": null, "details": [{"source1": "control.tar", "source2": "control.tar", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "comments": ["Files differ"], "unified_diff": null}]}]}]}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "unified_diff": "@@ -1,41 +1,41 @@\n
probe::ioblock.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock.end
hw_segments
\n- number of segments after physical and DMA remapping hardware coalescing is performed\n-
idx
\n- offset into the bio vector array\n-
size
\n- total size in bytes\n-
vcnt
\n+
ioblock.end
vcnt
\n bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
opf
\n- operations and flags\n+
bytes_done
\n+ number of bytes transferred\n+
name
\n+ name of the probe point\n+
error
\n+ 0 on success\n+
sector
\n+ beginning sector for the entire bio\n+
rw
\n+ binary trace for read/write request\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
devname
\n+ block device name\n+
idx
\n+ offset into the bio vector array\n+
hw_segments
\n+ number of segments after physical and DMA remapping hardware coalescing is performed\n
ino
\n i-node number of the mapped file\n+
size
\n+ total size in bytes\n+
opf
\n+ operations and flags\n
phys_segments
\n number of segments in this bio after physical address coalescing is performed.\n-
sector
\n- beginning sector for the entire bio\n-
name
\n- name of the probe point\n-
bytes_done
\n- number of bytes transferred\n-
devname
\n- block device name\n-
rw
\n- binary trace for read/write request\n-
error
\n- 0 on success\n
probe::ioblock.request — \n Fires whenever making a generic block I/O request.\n-
ioblock.request
devname
\n+
ioblock.request
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
devname
\n block device name\n-
rw
\n- binary trace for read/write request\n-
name
\n- name of the probe point\n-
opf
\n- operations and flags\n+
hw_segments
\n+ number of segments after physical and DMA remapping hardware coalescing is performed\n+
idx
\n+ offset into the bio vector array\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid \n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n
sector
\n beginning sector for the entire bio\n+
rw
\n+ binary trace for read/write request\n
phys_segments
\n number of segments in this bio after physical address coalescing is performed\n+
opf
\n+ operations and flags\n
ino
\n i-node number of the mapped file\n-
bdev
\n- target block device\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
idx
\n- offset into the bio vector array\n
size
\n total size in bytes\n-
hw_segments
\n- number of segments after physical and DMA remapping hardware coalescing is performed\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
name
\n+ name of the probe point\n+
bdev
\n+ target block device\n
probe::ioblock_trace.bounce — \n Fires whenever a buffer bounce is needed for at least one page of a block IO request.\n-
ioblock_trace.bounce
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
size
\n- total size in bytes\n+
ioblock_trace.bounce
bdev
\n+ target block device\n
bytes_done
\n number of bytes transferred\n-
devname
\n- device for which a buffer bounce was needed.\n-
rw
\n- binary trace for read/write request\n-
q
\n- request queue on which this bio was queued.\n
name
\n name of the probe point\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
q
\n+ request queue on which this bio was queued.\n+
size
\n+ total size in bytes\n+
ino
\n+ i-node number of the mapped file\n
opf
\n operations and flags\n+
rw
\n+ binary trace for read/write request\n+
sector
\n+ beginning sector for the entire bio\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
ino
\n- i-node number of the mapped file\n-
bdev
\n- target block device\n-
sector
\n- beginning sector for the entire bio\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
devname
\n+ device for which a buffer bounce was needed.\n
probe::ioblock_trace.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock_trace.end
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
ioblock_trace.end
name
\n+ name of the probe point\n
bdev
\n target block device\n+
bytes_done
\n+ number of bytes transferred\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
opf
\n+ operations and flags\n+
q
\n+ request queue on which this bio was queued.\n
ino
\n i-node number of the mapped file\n+
size
\n+ total size in bytes\n+
devname
\n+ block device name\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n
sector
\n beginning sector for the entire bio\n-
opf
\n- operations and flags\n+
rw
\n+ binary trace for read/write request\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
name
\n- name of the probe point\n-
rw
\n- binary trace for read/write request\n-
q
\n- request queue on which this bio was queued.\n-
devname
\n- block device name\n-
bytes_done
\n- number of bytes transferred\n-
size
\n- total size in bytes\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n
probe::ioblock_trace.request — \n Fires just as a generic block I/O request is created for a bio.\n-
ioblock_trace.request
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
size
\n- total size in bytes\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
name
\n+
ioblock_trace.request
name
\n name of the probe point\n-
devname
\n- block device name\n
bytes_done
\n number of bytes transferred\n-
q
\n- request queue on which this bio was queued.\n-
rw
\n- binary trace for read/write request\n+
bdev
\n+ target block device\n
vcnt
\n bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
opf
\n+ operations and flags\n+
ino
\n+ i-node number of the mapped file\n+
size
\n+ total size in bytes\n+
q
\n+ request queue on which this bio was queued.\n+
devname
\n+ block device name\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
opf
\n- operations and flags\n
sector
\n beginning sector for the entire bio\n-
bdev
\n- target block device\n-
ino
\n- i-node number of the mapped file\n+
rw
\n+ binary trace for read/write request\n
probe::ioscheduler.elv_add_request.kp — \n kprobe based probe to indicate that a request was added to the request queue\n-
ioscheduler.elv_add_request.kp
disk_major
\n- Disk major number of the request\n-
rq
\n- Address of the request\n-
elevator_name
\n- The type of I/O elevator currently enabled\n-
rq_flags
\n+
ioscheduler.elv_add_request.kp
rq_flags
\n Request flags\n
name
\n Name of the probe point\n-
q
\n- pointer to request queue\n+
elevator_name
\n+ The type of I/O elevator currently enabled\n
disk_minor
\n Disk minor number of the request\n+
disk_major
\n+ Disk major number of the request\n+
rq
\n+ Address of the request\n+
q
\n+ pointer to request queue\n
probe::ioscheduler.elv_add_request.tp — \n tracepoint based probe to indicate a request is added to the request queue.\n-
ioscheduler.elv_add_request.tp
elevator_name
\n- The type of I/O elevator currently enabled.\n+
ioscheduler.elv_add_request.tp
disk_major
\n+ Disk major no of request.\n
rq
\n Address of request.\n-
rq_flags
\n- Request flags.\n-
disk_major
\n- Disk major no of request.\n
q
\n Pointer to request queue.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n
disk_minor
\n Disk minor number of request.\n+
rq_flags
\n+ Request flags.\n
name
\n Name of the probe point\n
probe::ioscheduler.elv_add_request — \n probe to indicate request is added to the request queue.\n-
ioscheduler.elv_add_request
disk_minor
\n- Disk minor number of request.\n-
q
\n- Pointer to request queue.\n-
rq_flags
\n- Request flags.\n+
ioscheduler.elv_add_request
probe::ioscheduler.elv_completed_request — \n Fires when a request is completed\n-
ioscheduler.elv_completed_request
disk_major
\n- Disk major number of the request\n+
ioscheduler.elv_completed_request
name
\n+ Name of the probe point\n
rq_flags
\n Request flags\n+
disk_major
\n+ Disk major number of the request\n
rq
\n Address of the request\n-
elevator_name
\n- The type of I/O elevator currently enabled\n-
name
\n- Name of the probe point\n
disk_minor
\n Disk minor number of the request\n+
elevator_name
\n+ The type of I/O elevator currently enabled\n
probe::ioscheduler.elv_next_request.return — \n Fires when a request retrieval issues a return signal\n-
ioscheduler.elv_next_request.return
probe::ioscheduler.elv_next_request — \n Fires when a request is retrieved from the request queue\n-
ioscheduler.elv_next_request
elevator_name
\n- The type of I/O elevator currently enabled\n-
name
\n+
ioscheduler.elv_next_request
probe::ioscheduler_trace.elv_abort_request — \n Fires when a request is aborted.\n
ioscheduler_trace.elv_abort_request
name
\n Name of the probe point\n-
disk_minor
\n- Disk minor number of request.\n-
disk_major
\n- Disk major no of request.\n
rq_flags
\n Request flags.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n+
disk_major
\n+ Disk major no of request.\n
rq
\n Address of request.\n+
disk_minor
\n+ Disk minor number of request.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n
probe::ioscheduler_trace.elv_completed_request — \n Fires when a request is\n-
ioscheduler_trace.elv_completed_request
disk_major
\n- Disk major no of request.\n-
rq_flags
\n+
ioscheduler_trace.elv_completed_request
rq_flags
\n Request flags.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n-
rq
\n- Address of request.\n
name
\n Name of the probe point\n+
disk_major
\n+ Disk major no of request.\n+
rq
\n+ Address of request.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n
disk_minor
\n Disk minor number of request.\n
probe::ioscheduler_trace.elv_issue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_issue_request
disk_major
\n- Disk major no of request.\n-
rq
\n- Address of request.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n+
ioscheduler_trace.elv_issue_request
probe::ioscheduler_trace.elv_requeue_request — \n Fires when a request is\n
ioscheduler_trace.elv_requeue_request
name
\n Name of the probe point\n+
rq_flags
\n+ Request flags.\n
disk_minor
\n Disk minor number of request.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n
disk_major
\n Disk major no of request.\n
rq
\n Address of request.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n-
rq_flags
\n- Request flags.\n
probe::ioscheduler_trace.unplug_io — \n Fires when a request queue is unplugged;\n-
ioscheduler_trace.unplug_io
probe::ioscheduler_trace.unplug_timer — \n Fires when unplug timer associated\n-
ioscheduler_trace.unplug_timer
probe::ipmib.FragFails — \n Count datagram fragmented unsuccessfully\n-
ipmib.FragFails
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.FragFails
probe::ipmib.FragOKs — \n Count datagram fragmented successfully\n-
ipmib.FragOKs
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.FragOKs
probe::ipmib.InNoRoutes — \n Count an arriving packet with no matching socket\n-
ipmib.InNoRoutes
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.InNoRoutes
probe::ipmib.InReceives — \n Count an arriving packet\n-
ipmib.InReceives
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.InReceives
probe::ipmib.InUnknownProtos — \n Count arriving packets with an unbound proto\n-
ipmib.InUnknownProtos
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.InUnknownProtos
probe::ipmib.ReasmReqds — \n Count number of packet fragments reassembly requests\n-
ipmib.ReasmReqds
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.ReasmReqds
probe::ipmib.ReasmTimeout — \n Count Reassembly Timeouts\n-
ipmib.ReasmTimeout
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.ReasmTimeout
probe::irq_handler.entry — \n Execution of interrupt handler starting\n-
irq_handler.entry
action
\n- struct irqaction* for this interrupt num\n-
thread_fn
\n- interrupt handler function for threaded interrupts\n+
irq_handler.entry
flags_str
\n+ symbolic string representation of IRQ flags\n
irq
\n irq number\n-
dev_id
\n- Cookie to identify device\n-
thread
\n- thread pointer for threaded interrupts\n-
flags
\n- Flags for IRQ handler\n
next_irqaction
\n pointer to next irqaction for shared interrupts\n-
dev_name
\n- name of device\n-
handler
\n- interrupt handler function\n+
thread
\n+ thread pointer for threaded interrupts\n+
dev_id
\n+ Cookie to identify device\n
dir
\n pointer to the proc/irq/NN/name entry\n+
dev_name
\n+ name of device\n
thread_flags
\n Flags related to thread\n-
flags_str
\n- symbolic string representation of IRQ flags\n+
handler
\n+ interrupt handler function\n+
thread_fn
\n+ interrupt handler function for threaded interrupts\n+
flags
\n+ Flags for IRQ handler\n+
action
\n+ struct irqaction* for this interrupt num\n
probe::irq_handler.exit — \n Execution of interrupt handler completed\n-
irq_handler.exit
thread
\n- thread pointer for threaded interrupts\n-
dev_id
\n- Cookie to identify device\n+
irq_handler.exit
thread_fn
\n+ interrupt handler function for threaded interrupts\n+
handler
\n+ interrupt handler function that was executed\n+
next_irqaction
\n+ pointer to next irqaction for shared interrupts\n
irq
\n interrupt number\n-
thread_fn
\n- interrupt handler function for threaded interrupts\n-
action
\n- struct irqaction*\n-
ret
\n- return value of the handler\n
flags_str
\n symbolic string representation of IRQ flags\n+
action
\n+ struct irqaction*\n+
flags
\n+ flags for IRQ handler\n
thread_flags
\n Flags related to thread\n-
dir
\n- pointer to the proc/irq/NN/name entry\n-
handler
\n- interrupt handler function that was executed\n
dev_name
\n name of device\n-
next_irqaction
\n- pointer to next irqaction for shared interrupts\n-
flags
\n- flags for IRQ handler\n+
dir
\n+ pointer to the proc/irq/NN/name entry\n+
dev_id
\n+ Cookie to identify device\n+
thread
\n+ thread pointer for threaded interrupts\n+
ret
\n+ return value of the handler\n
probe::kprocess.create — \n Fires whenever a new process or thread is successfully created\n-
kprocess.create
new_tid
\n- The TID of the newly created task\n-
new_pid
\n+
kprocess.create
probe::kprocess.exec_complete — \n Return from exec to a new program\n-
kprocess.exec_complete
retstr
\n- A string representation of errno (SystemTap v2.5+)\n+
kprocess.exec_complete
name
\n+ Name of the system call (“execve”) (SystemTap v2.5+)\n
errno
\n The error number resulting from the exec\n+
retstr
\n+ A string representation of errno (SystemTap v2.5+)\n
success
\n A boolean indicating whether the exec was successful\n-
name
\n- Name of the system call (“execve”) (SystemTap v2.5+)\n
probe::kprocess.exec — \n Attempt to exec to a new program\n-
kprocess.exec
argstr
\n- A string containing the filename followed by the\n- arguments to pass, excluding 0th arg (SystemTap v2.5+)\n-
filename
\n- The path to the new executable\n-
args
\n+
kprocess.exec
args
\n The arguments to pass to the new executable, including\n the 0th arg (SystemTap v2.5+)\n
name
\n Name of the system call (“execve”) (SystemTap v2.5+)\n+
filename
\n+ The path to the new executable\n+
argstr
\n+ A string containing the filename followed by the\n+ arguments to pass, excluding 0th arg (SystemTap v2.5+)\n
probe::kprocess.release — \n Process released\n-
kprocess.release
pid
\n- Same as released_pid
for compatibility (deprecated)\n-
released_tid
\n- TID of the task being released\n+
kprocess.release
released_pid
\n+ PID of the process being released\n
task
\n A task handle to the process being released\n-
released_pid
\n- PID of the process being released\n+
released_tid
\n+ TID of the task being released\n+
pid
\n+ Same as released_pid
for compatibility (deprecated)\n
\n The context of the parent, if it wanted notification of this process'\n termination, else the context of the process itself.\n
\n Fires when a process is released from the kernel. This always follows a\n kprocess.exit, though it may be delayed somewhat if the process waits in a\n zombie state.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-netdev-change-mac.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-netdev-change-mac.html", "unified_diff": "@@ -1,11 +1,11 @@\n
probe::netdev.change_mac — \n Called when the netdev_name has the MAC changed\n-
netdev.change_mac
probe::netdev.change_mtu — \n Called when the netdev MTU is changed\n-
netdev.change_mtu
probe::netdev.hard_transmit — \n Called when the devices is going to TX (hard)\n-
netdev.hard_transmit
probe::netdev.ioctl — \n Called when the device suffers an IOCTL\n-
netdev.ioctl
probe::netdev.rx — \n Called when the device is going to receive a packet\n-
netdev.rx
probe::netdev.set_promiscuity — \n Called when the device enters/leaves promiscuity\n
netdev.set_promiscuity
probe::netdev.transmit — \n Network device transmitting buffer\n-
netdev.transmit
dev_name
\n+
netdev.transmit
length
\n+ The length of the transmit buffer.\n+
dev_name
\n The name of the device. e.g: eth0, ath1.\n-
truesize
\n- The size of the data to be transmitted.\n
protocol
\n The protocol of this packet(defined in include/linux/if_ether.h).\n-
length
\n- The length of the transmit buffer.\n+
truesize
\n+ The size of the data to be transmitted.\n
probe::netfilter.arp.forward — \n - Called for each ARP packet to be forwarded\n-
netfilter.arp.forward
ar_op
\n- ARP opcode (command)\n+
netfilter.arp.forward
ar_hrd
\n+ Format of hardware address\n
ar_data
\n Address of ARP packet data region (after the header)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
ar_pro
\n- Format of protocol address\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
arphdr
\n- Address of ARP header\n-
ar_hrd
\n- Format of hardware address\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n
ar_sha
\n Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
ar_hln
\n- Length of hardware address\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n
data_str
\n A string representing the packet buffer contents\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
indev_name
\n- Name of network device packet was received on (if known)\n
ar_pln
\n Length of protocol address\n+
ar_op
\n+ ARP opcode (command)\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
arphdr
\n+ Address of ARP header\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n
pf
\n Protocol family -- always “arp”\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
ar_pro
\n+ Format of protocol address\n+
ar_hln
\n+ Length of hardware address\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
probe::netfilter.arp.in — \n - Called for each incoming ARP packet\n-
netfilter.arp.in
ar_pln
\n- Length of protocol address\n+
netfilter.arp.in
ar_pro
\n+ Format of protocol address\n+
ar_hln
\n+ Length of hardware address\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
ar_tip
\n Ethernet+IP only (ar_pro==0x800): target IP address\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
ar_hrd
\n+ Format of hardware address\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
pf
\n- Protocol family -- always “arp”\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
ar_hln
\n- Length of hardware address\n
data_str
\n A string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n+
ar_pln
\n+ Length of protocol address\n+
ar_op
\n+ ARP opcode (command)\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
ar_hrd
\n- Format of hardware address\n
arphdr
\n Address of ARP header\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
ar_pro
\n- Format of protocol address\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
ar_op
\n- ARP opcode (command)\n-
ar_data
\n- Address of ARP packet data region (after the header)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n+
pf
\n+ Protocol family -- always “arp”\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
probe::netfilter.arp.out — \n - Called for each outgoing ARP packet\n-
netfilter.arp.out
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
ar_data
\n+
netfilter.arp.out
ar_data
\n Address of ARP packet data region (after the header)\n-
ar_op
\n- ARP opcode (command)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
ar_pro
\n- Format of protocol address\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
ar_hrd
\n+ Format of hardware address\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
ar_hln
\n- Length of hardware address\n
data_str
\n A string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n
ar_pln
\n Length of protocol address\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n+
arphdr
\n+ Address of ARP header\n+
ar_op
\n+ ARP opcode (command)\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
indev_name
\n Name of network device packet was received on (if known)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n
pf
\n Protocol family -- always “arp”\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
ar_hrd
\n- Format of hardware address\n-
arphdr
\n- Address of ARP header\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n
ar_sip
\n Ethernet+IP only (ar_pro==0x800): source IP address\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
ar_hln
\n+ Length of hardware address\n+
ar_pro
\n+ Format of protocol address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
probe::netfilter.bridge.forward — \n Called on an incoming bridging packet destined for some other computer\n-
netfilter.bridge.forward
br_cost
\n- Total cost from transmitting bridge to root\n-
br_max
\n- Max age in 1/256 secs\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
br_type
\n- BPDU type\n+
netfilter.bridge.forward
protocol
\n+ Packet protocol\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
br_htime
\n Hello time in 1/256 secs\n-
br_vid
\n- Protocol version identifier\n-
br_poid
\n- Port identifier\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_rid
\n- Identity of root bridge\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
br_flags
\n- BPDU flags\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_prid
\n- Protocol identifier\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
br_rmac
\n+ Root bridge MAC address\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_fd
\n+ Forward delay in 1/256 secs\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
br_max
\n+ Max age in 1/256 secs\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
brhdr
\n+ Address of bridge header\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
br_msg
\n- Message age in 1/256 secs\n-
protocol
\n- Packet protocol\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
pf
\n+ Protocol family -- always “bridge”\n
llcpdu
\n Address of LLC Protocol Data Unit\n+
br_flags
\n+ BPDU flags\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n
br_bid
\n Identity of bridge\n-
brhdr
\n- Address of bridge header\n+
br_msg
\n+ Message age in 1/256 secs\n
br_mac
\n Bridge MAC address\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
pf
\n- Protocol family -- always “bridge”\n-
br_fd
\n- Forward delay in 1/256 secs\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
data_str
\n- A string representing the packet buffer contents\n+
br_rid
\n+ Identity of root bridge\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
br_vid
\n+ Protocol version identifier\n+
br_type
\n+ BPDU type\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
br_prid
\n+ Protocol identifier\n+
br_cost
\n+ Total cost from transmitting bridge to root\n
nf_queue
\n Constant used to signify a 'queue' verdict\n-
br_rmac
\n- Root bridge MAC address\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
br_poid
\n+ Port identifier\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
outdev_name
\n Name of network device packet will be routed to (if known)\n+
length
\n+ The length of the packet buffer contents, in bytes\n
probe::netfilter.bridge.local_in — \n Called on a bridging packet destined for the local computer\n-
netfilter.bridge.local_in
br_htime
\n- Hello time in 1/256 secs\n-
br_poid
\n- Port identifier\n+
netfilter.bridge.local_in
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_bid
\n+ Identity of bridge\n+
br_mac
\n+ Bridge MAC address\n+
br_msg
\n+ Message age in 1/256 secs\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
br_rid
\n+ Identity of root bridge\n
br_vid
\n Protocol version identifier\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
br_rid
\n- Identity of root bridge\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_flags
\n- BPDU flags\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
br_max
\n- Max age in 1/256 secs\n
br_type
\n BPDU type\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
protocol
\n- Packet protocol\n-
br_msg
\n- Message age in 1/256 secs\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n
br_prid
\n Protocol identifier\n-
brhdr
\n- Address of bridge header\n-
br_mac
\n- Bridge MAC address\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_bid
\n- Identity of bridge\n-
length
\n- The length of the packet buffer contents, in bytes\n-
data_str
\n- A string representing the packet buffer contents\n-
br_rmac
\n- Root bridge MAC address\n
nf_queue
\n Constant used to signify a 'queue' verdict\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
br_poid
\n+ Port identifier\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
outdev_name
\n Name of network device packet will be routed to (if known)\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
protocol
\n+ Packet protocol\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
br_htime
\n+ Hello time in 1/256 secs\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_fd
\n+ Forward delay in 1/256 secs\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n+
br_rmac
\n+ Root bridge MAC address\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
br_max
\n+ Max age in 1/256 secs\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n
pf
\n Protocol family -- always “bridge”\n-
br_fd
\n- Forward delay in 1/256 secs\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
brhdr
\n+ Address of bridge header\n
indev_name
\n Name of network device packet was received on (if known)\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
br_flags
\n+ BPDU flags\n
probe::netfilter.bridge.local_out — \n Called on a bridging packet coming from a local process\n-
netfilter.bridge.local_out
brhdr
\n- Address of bridge header\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_mac
\n- Bridge MAC address\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_bid
\n- Identity of bridge\n-
data_str
\n- A string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
netfilter.bridge.local_out
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
protocol
\n+ Packet protocol\n
br_rmac
\n Root bridge MAC address\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
br_fd
\n Forward delay in 1/256 secs\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
pf
\n- Protocol family -- always “bridge”\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
br_poid
\n- Port identifier\n-
br_vid
\n- Protocol version identifier\n+
data_str
\n+ A string representing the packet buffer contents\n
br_htime
\n Hello time in 1/256 secs\n+
br_max
\n+ Max age in 1/256 secs\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
br_flags
\n BPDU flags\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
br_rid
\n- Identity of root bridge\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
brhdr
\n+ Address of bridge header\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
pf
\n+ Protocol family -- always “bridge”\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_bid
\n+ Identity of bridge\n
llcproto_stp
\n Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_cost
\n- Total cost from transmitting bridge to root\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
br_type
\n BPDU type\n+
br_vid
\n+ Protocol version identifier\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
br_max
\n- Max age in 1/256 secs\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
protocol
\n- Packet protocol\n+
br_rid
\n+ Identity of root bridge\n
br_msg
\n Message age in 1/256 secs\n+
br_mac
\n+ Bridge MAC address\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
br_prid
\n Protocol identifier\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
br_poid
\n+ Port identifier\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
probe::netfilter.bridge.post_routing — \n - Called before a bridging packet hits the wire\n-
netfilter.bridge.post_routing
br_mac
\n- Bridge MAC address\n+
netfilter.bridge.post_routing
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
protocol
\n+ Packet protocol\n+
br_fd
\n+ Forward delay in 1/256 secs\n+
data_str
\n+ A string representing the packet buffer contents\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
br_rmac
\n+ Root bridge MAC address\n+
br_htime
\n+ Hello time in 1/256 secs\n+
br_max
\n+ Max age in 1/256 secs\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
brhdr
\n- Address of bridge header\n-
br_bid
\n- Identity of bridge\n+
br_flags
\n+ BPDU flags\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
llcpdu
\n Address of LLC Protocol Data Unit\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_rmac
\n- Root bridge MAC address\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n-
data_str
\n- A string representing the packet buffer contents\n-
indev_name
\n- Name of network device packet was received on (if known)\n
pf
\n Protocol family -- always “bridge”\n-
br_fd
\n- Forward delay in 1/256 secs\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
br_rid
\n- Identity of root bridge\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
brhdr
\n+ Address of bridge header\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
br_bid
\n+ Identity of bridge\n
llcproto_stp
\n Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_flags
\n- BPDU flags\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_poid
\n- Port identifier\n-
br_vid
\n- Protocol version identifier\n-
br_max
\n- Max age in 1/256 secs\n
br_type
\n BPDU type\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_mac
\n+ Bridge MAC address\n+
br_vid
\n+ Protocol version identifier\n
nf_drop
\n Constant used to signify a 'drop' verdict\n+
br_rid
\n+ Identity of root bridge\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
br_cost
\n Total cost from transmitting bridge to root\n-
protocol
\n- Packet protocol\n-
br_msg
\n- Message age in 1/256 secs\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n
br_prid
\n Protocol identifier\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
br_poid
\n+ Port identifier\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
probe::netfilter.bridge.pre_routing — \n - Called before a bridging packet is routed\n-
netfilter.bridge.pre_routing
brhdr
\n- Address of bridge header\n+
netfilter.bridge.pre_routing
br_rid
\n+ Identity of root bridge\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
br_vid
\n+ Protocol version identifier\n+
br_msg
\n+ Message age in 1/256 secs\n
br_mac
\n Bridge MAC address\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n+
br_type
\n+ BPDU type\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n
br_bid
\n Identity of bridge\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
br_poid
\n+ Port identifier\n
length
\n The length of the packet buffer contents, in bytes\n-
data_str
\n- A string representing the packet buffer contents\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
br_prid
\n+ Protocol identifier\n
nf_queue
\n Constant used to signify a 'queue' verdict\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
br_htime
\n+ Hello time in 1/256 secs\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_fd
\n+ Forward delay in 1/256 secs\n
br_rmac
\n Root bridge MAC address\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
pf
\n- Protocol family -- always “bridge”\n-
br_fd
\n- Forward delay in 1/256 secs\n+
protocol
\n+ Packet protocol\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
pf
\n+ Protocol family -- always “bridge”\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
brhdr
\n+ Address of bridge header\n
indev_name
\n Name of network device packet was received on (if known)\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_poid
\n- Port identifier\n-
br_vid
\n- Protocol version identifier\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_rid
\n- Identity of root bridge\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
br_flags
\n BPDU flags\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
br_cost
\n- Total cost from transmitting bridge to root\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
br_max
\n Max age in 1/256 secs\n-
br_type
\n- BPDU type\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
protocol
\n- Packet protocol\n-
br_msg
\n- Message age in 1/256 secs\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_prid
\n- Protocol identifier\n
probe::netfilter.ip.forward — \n Called on an incoming IP packet addressed to some other computer\n-
netfilter.ip.forward
fin
\n+
netfilter.ip.forward
daddr
\n+ A string representing the destination IP address\n+
iphdr
\n+ Address of IP header\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
family
\n+ IP address family\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
fin
\n TCP FIN flag (if protocol is TCP; ipv4 only)\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n
data_str
\n A string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n-
daddr
\n- A string representing the destination IP address\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n-
iphdr
\n- Address of IP header\n-
family
\n- IP address family\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n
saddr
\n A string representing the source IP address\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n
urg
\n TCP URG flag (if protocol is TCP; ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
probe::netfilter.ip.local_in — \n Called on an incoming IP packet addressed to the local computer\n-
netfilter.ip.local_in
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n+
netfilter.ip.local_in
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
urg
\n TCP URG flag (if protocol is TCP; ipv4 only)\n-
sport
\n- TCP or UDP source port (ipv4 only)\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
indev
\n Address of net_device representing input device, 0 if unknown\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n
dport
\n TCP or UDP destination port (ipv4 only)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n
saddr
\n A string representing the source IP address\n-
family
\n- IP address family\n-
iphdr
\n- Address of IP header\n-
daddr
\n- A string representing the destination IP address\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
data_str
\n- A string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
data_str
\n+ A string representing the packet buffer contents\n
nf_queue
\n Constant used to signify a 'queue' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
family
\n+ IP address family\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
daddr
\n+ A string representing the destination IP address\n+
iphdr
\n+ Address of IP header\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n
probe::netfilter.ip.local_out — \n Called on an outgoing IP packet\n-
netfilter.ip.local_out
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
sport
\n- TCP or UDP source port (ipv4 only)\n+
netfilter.ip.local_out
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
nf_drop
\n Constant used to signify a 'drop' verdict\n+
daddr
\n+ A string representing the destination IP address\n+
iphdr
\n+ Address of IP header\n
rst
\n TCP RST flag (if protocol is TCP; ipv4 only)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
family
\n+ IP address family\n+
length
\n+ The length of the packet buffer contents, in bytes\n
outdev_name
\n Name of network device packet will be routed to (if known)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
nf_queue
\n Constant used to signify a 'queue' verdict\n
data_str
\n A string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n-
daddr
\n- A string representing the destination IP address\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n
saddr
\n A string representing the source IP address\n-
iphdr
\n- Address of IP header\n-
family
\n- IP address family\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n
probe::netfilter.ip.post_routing — \n Called immediately before an outgoing IP packet leaves the computer\n-
netfilter.ip.post_routing
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n+
netfilter.ip.post_routing
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
protocol
\n Packet protocol from driver (ipv4 only)\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
data_str
\n+ A string representing the packet buffer contents\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
saddr
\n+ A string representing the source IP address\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
urg
\n TCP URG flag (if protocol is TCP; ipv4 only)\n-
sport
\n- TCP or UDP source port (ipv4 only)\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
daddr
\n A string representing the destination IP address\n-
saddr
\n- A string representing the source IP address\n
iphdr
\n Address of IP header\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n
family
\n IP address family\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n
fin
\n TCP FIN flag (if protocol is TCP; ipv4 only)\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
nf_queue
\n Constant used to signify a 'queue' verdict\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n
length
\n The length of the packet buffer contents, in bytes\n-
data_str
\n- A string representing the packet buffer contents\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
probe::netfilter.ip.pre_routing — \n Called before an IP packet is routed\n-
netfilter.ip.pre_routing
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n+
netfilter.ip.pre_routing
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n
sport
\n TCP or UDP source port (ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n
family
\n IP address family\n-
iphdr
\n- Address of IP header\n-
saddr
\n- A string representing the source IP address\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n
daddr
\n A string representing the destination IP address\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n+
iphdr
\n+ Address of IP header\n
pf
\n Protocol family - either 'ipv4' or 'ipv6'\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
indev_name
\n Name of network device packet was received on (if known)\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
saddr
\n+ A string representing the source IP address\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n
data_str
\n A string representing the packet buffer contents\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
probe::nfs.aop.readahead — \n NFS client reading multiple pages\n-
nfs.aop.readahead
file
\n- filp argument\n-
rpages
\n- read size (in pages)\n-
nr_pages
\n- number of pages attempted to read in this execution\n-
dev
\n+
nfs.aop.readahead
probe::nfs.aop.readpage — \n NFS client synchronously reading a page\n-
nfs.aop.readpage
file
\n- file argument\n-
sb_flag
\n- super block flags\n-
__page
\n- the address of page\n-
page_index
\n- offset within mapping, can used a page identifier\n- and position identifier in the page frame\n-
size
\n- number of pages to be read in this execution \n+
nfs.aop.readpage
dev
\n+ device identifier\n+
i_flag
\n+ file flags\n
i_size
\n file length in bytes\n+
size
\n+ number of pages to be read in this execution \n+
file
\n+ file argument\n
rsize
\n read size (in bytes)\n-
dev
\n- device identifier\n+
__page
\n+ the address of page\n+
sb_flag
\n+ super block flags\n
ino
\n inode number\n-
i_flag
\n- file flags\n+
page_index
\n+ offset within mapping, can used a page identifier\n+ and position identifier in the page frame\n
probe::nfs.aop.readpages — \n NFS client reading multiple pages\n-
nfs.aop.readpages
ino
\n- inode number \n+
nfs.aop.readpages
rsize
\n+ read size (in bytes)\n
file
\n filp argument\n
rpages
\n read size (in pages)\n+
ino
\n+ inode number \n
nr_pages
\n number of pages attempted to read in this execution\n-
rsize
\n- read size (in bytes)\n-
size
\n- number of pages attempted to read in this execution\n
dev
\n device identifier\n+
size
\n+ number of pages attempted to read in this execution\n
probe::nfs.aop.release_page — \n NFS client releasing page\n-
nfs.aop.release_page
dev
\n- device identifier\n-
size
\n+
nfs.aop.release_page
probe::nfs.aop.write_begin — \n NFS client begin to write data\n-
nfs.aop.write_begin
offset
\n- start address of this write operation \n-
dev
\n- device identifier\n-
to
\n- end address of this write operation \n-
size
\n+
nfs.aop.write_begin
size
\n write bytes\n-
page_index
\n- offset within mapping, can used a page identifier\n- and position identifier in the page frame\n
__page
\n the address of page\n
ino
\n inode number \n+
page_index
\n+ offset within mapping, can used a page identifier\n+ and position identifier in the page frame\n+
offset
\n+ start address of this write operation \n+
to
\n+ end address of this write operation \n+
dev
\n+ device identifier\n
\n Occurs when write operation occurs on nfs. It prepare a page for writing,\n look for a request corresponding to the page. If there\n is one, and it belongs to another file, it flush it out\n before it tries to copy anything into the page. \n Also do the same if it finds a request from an existing\n dropped page\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "unified_diff": "@@ -1,29 +1,29 @@\n
probe::nfs.aop.write_end — \n NFS client complete writing data\n-
nfs.aop.write_end
ino
\n- inode number\n-
i_flag
\n- file flags\n+
nfs.aop.write_end
__page
\n+ the address of page\n
page_index
\n offset within mapping, can used a page identifier and position identifier in the page frame\n-
sb_flag
\n- super block flags\n-
__page
\n- the address of page\n+
ino
\n+ inode number\n
offset
\n start address of this write operation\n
dev
\n device identifier\n+
i_flag
\n+ file flags\n+
to
\n+ end address of this write operation\n+
sb_flag
\n+ super block flags\n
i_size
\n file length in bytes\n
size
\n write bytes\n-
to
\n- end address of this write operation\n
probe::nfs.aop.writepage — \n NFS client writing a mapped page to the NFS server\n-
nfs.aop.writepage
ino
\n- inode number \n-
i_flag
\n- file flags\n-
i_state
\n- inode state flags\n-
for_reclaim
\n- a flag of writeback_control,\n- indicates if it's invoked from the page allocator\n-
sb_flag
\n+
nfs.aop.writepage
sb_flag
\n super block flags\n+
for_kupdate
\n+ a flag of writeback_control,\n+ indicates if it's a kupdate writeback\n+
size
\n+ number of pages to be written in this execution\n+
i_size
\n+ file length in bytes\n
__page
\n the address of page\n
page_index
\n offset within mapping,\n can used a page identifier and position identifier in the page frame\n-
wsize
\n- write size\n-
size
\n- number of pages to be written in this execution\n-
i_size
\n- file length in bytes\n+
ino
\n+ inode number \n+
i_flag
\n+ file flags\n+
i_state
\n+ inode state flags\n
dev
\n device identifier\n-
for_kupdate
\n+
wsize
\n+ write size\n+
for_reclaim
\n a flag of writeback_control,\n- indicates if it's a kupdate writeback\n+ indicates if it's invoked from the page allocator\n
probe::nfs.aop.writepages — \n NFS client writing several dirty pages to the NFS server\n-
nfs.aop.writepages
for_reclaim
\n+
nfs.aop.writepages
ino
\n+ inode number\n+
for_reclaim
\n a flag of writeback_control,\n indicates if it's invoked from the page allocator\n
wpages
\n write size (in pages)\n
nr_to_write
\n number of pages attempted to be written in this execution\n
dev
\n device identifier\n+
wsize
\n+ write size\n
for_kupdate
\n a flag of writeback_control,\n indicates if it's a kupdate writeback\n-
wsize
\n- write size\n
size
\n number of pages attempted to be written in this execution\n-
ino
\n- inode number\n
probe::nfs.fop.aio_read — \n NFS client aio_read file operation\n-
nfs.fop.aio_read
cache_valid
\n- cache related bit mask flag\n-
ino
\n- inode number \n+
nfs.fop.aio_read
parent_name
\n+ parent dir name\n+
file_name
\n+ file name\n
count
\n read bytes\n-
attrtimeo
\n- how long the cached information is assumed to be valid.\n- We need to revalidate the cached attrs for this inode\n- if jiffies - read_cache_jiffies > attrtimeo.\n-
buf
\n- the address of buf in user space\n+
ino
\n+ inode number \n
dev
\n device identifier\n-
parent_name
\n- parent dir name\n+
buf
\n+ the address of buf in user space\n+
cache_valid
\n+ cache related bit mask flag\n
pos
\n current position of file \n-
file_name
\n- file name\n+
attrtimeo
\n+ how long the cached information is assumed to be valid.\n+ We need to revalidate the cached attrs for this inode\n+ if jiffies - read_cache_jiffies > attrtimeo.\n
cache_time
\n when we started read-caching this inode\n
probe::nfs.fop.aio_write — \n NFS client aio_write file operation\n-
nfs.fop.aio_write
probe::nfs.fop.fsync — \n NFS client fsync operation\n-
nfs.fop.fsync
probe::nfs.fop.llseek — \n NFS client llseek operation\n-
nfs.fop.llseek
probe::nfs.fop.lock — \n NFS client file lock operation\n-
nfs.fop.lock
fl_end
\n- ending offset of locked region\n-
cmd
\n+
nfs.fop.lock
cmd
\n cmd arguments\n-
fl_start
\n- starting offset of locked region\n+
fl_end
\n+ ending offset of locked region\n
dev
\n device identifier\n+
ino
\n+ inode number\n
i_mode
\n file type and access rights\n
fl_type
\n lock type\n-
ino
\n- inode number\n+
fl_start
\n+ starting offset of locked region\n
fl_flag
\n lock flags\n
probe::nfs.fop.mmap — \n NFS client mmap operation\n
nfs.fop.mmap
cache_time
\n when we started read-caching this inode\n-
file_name
\n- file name\n-
vm_flag
\n- vm flags\n-
ino
\n- inode number \n-
vm_start
\n- start address within vm_mm \n-
dev
\n- device identifier\n-
buf
\n- the address of buf in user space\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode \n if jiffies - read_cache_jiffies > attrtimeo.\n+
cache_valid
\n+ cache related bit mask flag\n+
vm_start
\n+ start address within vm_mm \n+
buf
\n+ the address of buf in user space\n+
dev
\n+ device identifier\n+
vm_flag
\n+ vm flags\n+
ino
\n+ inode number \n
parent_name
\n parent dir name\n+
file_name
\n+ file name\n
vm_end
\n the first byte after end address within vm_mm\n-
cache_valid
\n- cache related bit mask flag\n
probe::nfs.fop.open — \n NFS client file open operation\n-
nfs.fop.open
probe::nfs.fop.read_iter — \n NFS client read_iter file operation\n-
nfs.fop.read_iter
ino
\n- inode number \n-
count
\n- read bytes\n-
cache_valid
\n- cache related bit mask flag\n-
pos
\n- current position of file \n+
nfs.fop.read_iter
dev
\n+ device identifier\n
cache_time
\n when we started read-caching this inode\n-
file_name
\n- file name\n-
dev
\n- device identifier\n+
pos
\n+ current position of file \n+
cache_valid
\n+ cache related bit mask flag\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n+
count
\n+ read bytes\n
parent_name
\n parent dir name\n+
file_name
\n+ file name\n+
ino
\n+ inode number \n
probe::nfs.fop.release — \n NFS client release page operation\n-
nfs.fop.release
probe::nfs.fop.sendfile — \n NFS client send file operation\n-
nfs.fop.sendfile
dev
\n- device identifier\n+
nfs.fop.sendfile
cache_valid
\n+ cache related bit mask flag\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n-
count
\n- read bytes\n-
cache_valid
\n- cache related bit mask flag\n
cache_time
\n when we started read-caching this inode\n+
dev
\n+ device identifier\n
ino
\n inode number\n+
count
\n+ read bytes\n
ppos
\n current position of file\n
probe::nfs.fop.write_iter — \n NFS client write_iter file operation\n-
nfs.fop.write_iter
probe::nfs.proc.commit_done — \n NFS client response to a commit RPC task\n-
nfs.proc.commit_done
server_ip
\n+
nfs.proc.commit_done
count
\n+ number of bytes committed\n+
valid
\n+ fattr->valid, indicates which fields are valid \n+
server_ip
\n IP address of server\n-
prot
\n- transfer protocol\n+
timestamp
\n+ V4 timestamp, which is used for lease renewal\n
status
\n result of last operation\n
version
\n NFS version\n-
valid
\n- fattr->valid, indicates which fields are valid \n-
count
\n- number of bytes committed\n-
timestamp
\n- V4 timestamp, which is used for lease renewal\n+
prot
\n+ transfer protocol\n
probe::nfs.proc.commit_setup — \n NFS client setting up a commit RPC task\n
nfs.proc.commit_setup
server_ip
\n IP address of server\n-
prot
\n- transfer protocol\n-
count
\n- bytes in this commit\n-
bitmask1
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
version
\n- NFS version\n+
count
\n+ bytes in this commit\n
size
\n bytes in this commit\n+
version
\n+ NFS version\n+
prot
\n+ transfer protocol\n
offset
\n the file offset\n+
bitmask1
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n
probe::nfs.proc.commit — \n NFS client committing data on server\n
nfs.proc.commit
server_ip
\n IP address of server\n-
prot
\n- transfer protocol\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
offset
\n+ the file offset\n+
prot
\n+ transfer protocol\n+
size
\n+ read bytes in this execution\n+
version
\n+ NFS version\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
version
\n- NFS version\n-
size
\n- read bytes in this execution\n-
offset
\n- the file offset\n
\n All the nfs.proc.commit kernel functions were removed in kernel\n commit 200baa in December 2006, so these probes do not exist on Linux\n 2.6.21 and newer kernels.\n
\n \n Fires when client writes the buffered data to disk.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "unified_diff": "@@ -1,17 +1,17 @@\n
probe::nfs.proc.create — \n NFS client creating file on server\n-
nfs.proc.create
server_ip
\n- IP address of server\n-
prot
\n- transfer protocol\n+
nfs.proc.create
flag
\n+ indicates create mode (only for NFSv3 and NFSv4)\n
fh
\n file handle of parent dir\n-
flag
\n- indicates create mode (only for NFSv3 and NFSv4)\n
filename
\n file name\n-
version
\n- NFS version (the function is used for all NFS version)\n+
server_ip
\n+ IP address of server\n
filelen
\n length of file name\n+
prot
\n+ transfer protocol\n+
version
\n+ NFS version (the function is used for all NFS version)\n
probe::nfs.proc.lookup — \n NFS client opens/searches a file on server\n-
nfs.proc.lookup
server_ip
\n- IP address of server\n-
name_len
\n+
nfs.proc.lookup
name_len
\n the length of file name\n+
bitmask0
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n
filename
\n the name of file which client opens/searches on server\n-
prot
\n- transfer protocol\n+
server_ip
\n+ IP address of server\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
bitmask0
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n+
prot
\n+ transfer protocol\n
version
\n NFS version\n
probe::nfs.proc.open — \n NFS client allocates file read/write context information\n
nfs.proc.open
probe::nfs.proc.read_done — \n NFS client response to a read RPC task\n-
nfs.proc.read_done
server_ip
\n- IP address of server\n-
prot
\n+
nfs.proc.read_done
probe::nfs.proc.read_setup — \n NFS client setting up a read RPC task\n
nfs.proc.read_setup
probe::nfs.proc.read — \n NFS client synchronously reads file from server\n
nfs.proc.read
version
\n NFS version\n-
count
\n- read bytes in this execution\n
offset
\n the file offset\n-
server_ip
\n- IP address of server\n
prot
\n transfer protocol\n+
server_ip
\n+ IP address of server\n
flags
\n used to set task->tk_flags in rpc_init_task function\n+
count
\n+ read bytes in this execution\n
probe::nfs.proc.release — \n NFS client releases file read/write context information\n-
nfs.proc.release
mode
\n- file mode\n-
version
\n+
nfs.proc.release
probe::nfs.proc.remove — \n NFS client removes a file on server\n-
nfs.proc.remove
filelen
\n- length of file name\n-
version
\n- NFS version (the function is used for all NFS version)\n+
nfs.proc.remove
fh
\n+ file handle of parent dir\n+
server_ip
\n+ IP address of server\n
filename
\n file name\n-
fh
\n- file handle of parent dir\n
prot
\n transfer protocol\n-
server_ip
\n- IP address of server\n+
filelen
\n+ length of file name\n+
version
\n+ NFS version (the function is used for all NFS version)\n
probe::nfs.proc.rename_done — \n NFS client response to a rename RPC task\n-
nfs.proc.rename_done
prot
\n- transfer protocol\n-
server_ip
\n+
nfs.proc.rename_done
server_ip
\n IP address of server\n+
old_fh
\n+ file handle of old parent dir\n+
version
\n+ NFS version\n+
prot
\n+ transfer protocol\n
timestamp
\n V4 timestamp, which is used for lease renewal\n
new_fh
\n file handle of new parent dir\n-
old_fh
\n- file handle of old parent dir\n
status
\n result of last operation\n-
version
\n- NFS version\n
probe::nfs.proc.rename_setup — \n NFS client setting up a rename RPC task\n-
nfs.proc.rename_setup
version
\n+
nfs.proc.rename_setup
probe::nfs.proc.rename — \n NFS client renames a file on server\n-
nfs.proc.rename
server_ip
\n- IP address of server\n+
nfs.proc.rename
old_fh
\n+ file handle of old parent dir\n
new_name
\n new file name\n+
server_ip
\n+ IP address of server\n+
old_filelen
\n+ length of old file name\n+
new_fh
\n+ file handle of new parent dir\n
old_name
\n old file name\n+
version
\n+ NFS version (the function is used for all NFS version)\n
prot
\n transfer protocol\n
new_filelen
\n length of new file name\n-
version
\n- NFS version (the function is used for all NFS version)\n-
old_filelen
\n- length of old file name\n-
old_fh
\n- file handle of old parent dir\n-
new_fh
\n- file handle of new parent dir\n
probe::nfs.proc.write_done — \n NFS client response to a write RPC task\n-
nfs.proc.write_done
server_ip
\n- IP address of server\n-
prot
\n- transfer protocol\n-
count
\n+
nfs.proc.write_done
count
\n number of bytes written\n
valid
\n fattr->valid, indicates which fields are valid \n-
version
\n- NFS version\n-
status
\n- result of last operation\n+
server_ip
\n+ IP address of server\n
timestamp
\n V4 timestamp, which is used for lease renewal\n+
status
\n+ result of last operation\n+
version
\n+ NFS version\n+
prot
\n+ transfer protocol\n
probe::nfs.proc.write_setup — \n NFS client setting up a write RPC task\n-
nfs.proc.write_setup
server_ip
\n- IP address of server\n-
prot
\n- transfer protocol\n-
how
\n- used to set args.stable. The stable value could be:\n- NFS_UNSTABLE,NFS_DATA_SYNC,NFS_FILE_SYNC\n- (in nfs.proc3.write_setup and nfs.proc4.write_setup)\n-
bitmask0
\n+
nfs.proc.write_setup
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
count
\n+ bytes written in this execution\n+
server_ip
\n+ IP address of server\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem \n-
version
\n- NFS version\n
size
\n bytes written in this execution\n-
count
\n- bytes written in this execution\n+
version
\n+ NFS version\n+
how
\n+ used to set args.stable. The stable value could be:\n+ NFS_UNSTABLE,NFS_DATA_SYNC,NFS_FILE_SYNC\n+ (in nfs.proc3.write_setup and nfs.proc4.write_setup)\n+
prot
\n+ transfer protocol\n
offset
\n the file offset\n
probe::nfs.proc.write — \n NFS client synchronously writes file to server\n-
nfs.proc.write
prot
\n- transfer protocol\n+
nfs.proc.write
server_ip
\n+ IP address of server\n
flags
\n used to set task->tk_flags in rpc_init_task function\n-
server_ip
\n- IP address of server\n-
offset
\n- the file offset\n-
bitmask1
\n+
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
prot
\n+ transfer protocol\n+
offset
\n+ the file offset\n+
version
\n+ NFS version\n
size
\n read bytes in this execution\n-
bitmask0
\n+
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
version
\n- NFS version\n
probe::nfsd.commit — \n NFS server committing all pending writes to stable storage\n-
nfsd.commit
client_ip
\n- the ip address of client\n-
count
\n+
nfsd.commit
size
\n read bytes\n-
fh
\n- file handle (the first part is the length of the file handle)\n
offset
\n the offset of file\n-
size
\n- read bytes\n
flag
\n indicates whether this execution is a sync operation\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
client_ip
\n+ the ip address of client\n+
count
\n+ read bytes\n
probe::nfsd.create — \n NFS server creating a file(regular,dir,device,fifo) for client\n-
nfsd.create
iap_mode
\n+
nfsd.create
filelen
\n+ the length of file name\n+
iap_mode
\n file access mode\n
filename
\n file name \n-
fh
\n- file handle (the first part is the length of the file handle)\n
iap_valid
\n Attribute flags\n-
filelen
\n- the length of file name\n
type
\n file type(regular,dir,device,fifo ...)\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
client_ip
\n the ip address of client\n
probe::nfsd.createv3 — \n NFS server creating a regular file or set file attributes for client\n-
nfsd.createv3
truncp
\n+
nfsd.createv3
iap_valid
\n+ Attribute flags\n+
truncp
\n trunp arguments, indicates if the file shouldbe truncate\n
filename
\n file name \n
verifier
\n file attributes (atime,mtime,mode). It's used to reset file attributes for CREATE_EXCLUSIVE\n+
client_ip
\n+ the ip address of client\n+
fh
\n+ file handle (the first part is the length of the file handle)\n
iap_mode
\n file access mode\n
filelen
\n the length of file name\n-
client_ip
\n- the ip address of client\n
createmode
\n create mode .The possible values could be: NFS3_CREATE_EXCLUSIVE, NFS3_CREATE_UNCHECKED, or NFS3_CREATE_GUARDED\n-
iap_valid
\n- Attribute flags\n-
fh
\n- file handle (the first part is the length of the file handle)\n
probe::nfsd.dispatch — \n NFS server receives an operation from client\n-
nfsd.dispatch
probe::nfsd.lookup — \n NFS server opening or searching file for a file for client\n-
nfsd.lookup
probe::nfsd.open — \n NFS server opening a file for client\n-
nfsd.open
type
\n- type of file (regular file or dir)\n+
nfsd.open
fh
\n+ file handle (the first part is the length of the file handle)\n
client_ip
\n the ip address of client\n-
fh
\n- file handle (the first part is the length of the file handle)\n+
type
\n+ type of file (regular file or dir)\n
access
\n indicates the type of open (read/write/commit/readdir...) \n
probe::nfsd.proc.commit — \n NFS server performing a commit operation for client\n-
nfsd.proc.commit
gid
\n- requester's group id\n-
version
\n- nfs version\n+
nfsd.proc.commit
size
\n+ read bytes\n
uid
\n requester's user id\n-
size
\n- read bytes\n+
proto
\n+ transfer protocol\n
offset
\n the offset of file \n+
gid
\n+ requester's group id\n+
version
\n+ nfs version\n
fh
\n file handle (the first part is the length of the file handle)\n-
proto
\n- transfer protocol\n-
count
\n- read bytes\n
client_ip
\n the ip address of client\n+
count
\n+ read bytes\n
probe::nfsd.proc.create — \n NFS server creating a file for client\n-
nfsd.proc.create
fh
\n+
nfsd.proc.create
version
\n+ nfs version\n+
gid
\n+ requester's group id\n+
filename
\n+ file name\n+
client_ip
\n+ the ip address of client\n+
fh
\n file handle (the first part is the length of the file handle)\n-
proto
\n- transfer protocol\n
filelen
\n length of file name\n-
client_ip
\n- the ip address of client\n-
gid
\n- requester's group id\n-
version
\n- nfs version\n+
proto
\n+ transfer protocol\n
uid
\n requester's user id\n-
filename
\n- file name\n
probe::nfsd.proc.lookup — \n NFS server opening or searching for a file for client\n
nfsd.proc.lookup
filelen
\n the length of file name\n
proto
\n transfer protocol\n-
client_ip
\n- the ip address of client\n-
fh
\n- file handle of parent dir (the first part is the length of the file handle)\n-
version
\n- nfs version\n
uid
\n requester's user id\n-
filename
\n- file name \n
gid
\n requester's group id\n+
filename
\n+ file name \n+
version
\n+ nfs version\n+
client_ip
\n+ the ip address of client\n+
fh
\n+ file handle of parent dir (the first part is the length of the file handle)\n
probe::nfsd.proc.read — \n NFS server reading file for client\n-
nfsd.proc.read
proto
\n- transfer protocol\n+
nfsd.proc.read
fh
\n+ file handle (the first part is the length of the file handle)\n
client_ip
\n the ip address of client\n-
count
\n- read bytes\n
vec
\n struct kvec, includes buf address in kernel address and length of each buffer\n-
vlen
\n- read blocks \n-
size
\n+
count
\n read bytes\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
offset
\n- the offset of file \n+
gid
\n+ requester's group id\n
version
\n nfs version\n+
size
\n+ read bytes\n
uid
\n requester's user id\n-
gid
\n- requester's group id\n+
offset
\n+ the offset of file \n+
proto
\n+ transfer protocol\n+
vlen
\n+ read blocks \n
probe::nfsd.proc.remove — \n NFS server removing a file for client\n-
nfsd.proc.remove
gid
\n+
nfsd.proc.remove
fh
\n+ file handle (the first part is the length of the file handle)\n+
client_ip
\n+ the ip address of client\n+
gid
\n requester's group id\n-
version
\n- nfs version\n
filename
\n file name\n+
version
\n+ nfs version\n+
proto
\n+ transfer protocol\n
uid
\n requester's user id\n-
fh
\n- file handle (the first part is the length of the file handle)\n
filelen
\n length of file name\n-
proto
\n- transfer protocol\n-
client_ip
\n- the ip address of client\n
probe::nfsd.proc.rename — \n NFS Server renaming a file for client\n-
nfsd.proc.rename
gid
\n- requester's group id\n-
tfh
\n- file handler of new path\n+
nfsd.proc.rename
client_ip
\n+ the ip address of client\n+
fh
\n+ file handler of old path\n
tname
\n new file name\n-
flen
\n- length of old file name \n-
uid
\n- requester's user id\n
filename
\n old file name \n+
gid
\n+ requester's group id\n+
uid
\n+ requester's user id\n
tlen
\n length of new file name\n-
fh
\n- file handler of old path\n-
client_ip
\n- the ip address of client\n+
flen
\n+ length of old file name \n+
tfh
\n+ file handler of new path\n
probe::nfsd.proc.write — \n NFS server writing data to file for client\n-
nfsd.proc.write
gid
\n- requester's group id\n+
nfsd.proc.write
vlen
\n+ read blocks \n+
stable
\n+ argp->stable\n+
size
\n+ read bytes\n
uid
\n requester's user id\n-
version
\n- nfs version\n+
proto
\n+ transfer protocol\n
offset
\n the offset of file \n+
gid
\n+ requester's group id\n+
version
\n+ nfs version\n
fh
\n file handle (the first part is the length of the file handle)\n-
size
\n- read bytes\n-
stable
\n- argp->stable\n-
vlen
\n- read blocks \n+
client_ip
\n+ the ip address of client\n
vec
\n struct kvec, includes buf address in kernel address and length of each buffer\n
count
\n read bytes\n-
client_ip
\n- the ip address of client\n-
proto
\n- transfer protocol\n
probe::nfsd.read — \n NFS server reading data from a file for client\n-
nfsd.read
file
\n- argument file, indicates if the file has been opened.\n-
count
\n- read bytes\n-
client_ip
\n- the ip address of client\n-
offset
\n+
nfsd.read
offset
\n the offset of file \n-
fh
\n- file handle (the first part is the length of the file handle)\n
size
\n read bytes\n
vlen
\n read blocks \n+
count
\n+ read bytes\n+
file
\n+ argument file, indicates if the file has been opened.\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
client_ip
\n+ the ip address of client\n
vec
\n struct kvec, includes buf address in kernel address and length of each buffer\n
probe::nfsd.rename — \n NFS server renaming a file for client\n-
nfsd.rename
tname
\n- new file name\n-
tfh
\n- file handler of new path\n+
nfsd.rename
tlen
\n+ length of new file name\n
flen
\n length of old file name \n-
filename
\n- old file name \n-
fh
\n- file handler of old path\n-
tlen
\n- length of new file name\n+
tfh
\n+ file handler of new path\n
client_ip
\n the ip address of client\n+
fh
\n+ file handler of old path\n+
tname
\n+ new file name\n+
filename
\n+ old file name \n
probe::nfsd.unlink — \n NFS server removing a file or a directory for client\n
nfsd.unlink
probe::nfsd.write — \n NFS server writing data to a file for client\n-
nfsd.write
file
\n- argument file, indicates if the file has been opened.\n-
fh
\n- file handle (the first part is the length of the file handle)\n+
nfsd.write
size
\n+ read bytes\n
offset
\n the offset of file \n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n
vlen
\n read blocks \n-
size
\n- read bytes\n
client_ip
\n the ip address of client\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
count
\n read bytes\n+
file
\n+ argument file, indicates if the file has been opened.\n
probe::scheduler.cpu_off — \n Process is about to stop running on a cpu\n-
scheduler.cpu_off
name
\n- name of the probe point\n-
task_next
\n- the process replacing current\n-
task_prev
\n+
scheduler.cpu_off
probe::scheduler.cpu_on — \n Process is beginning execution on a cpu\n-
scheduler.cpu_on
idle
\n- - boolean indicating whether current is the idle process\n-
name
\n+
scheduler.cpu_on
probe::scheduler.ctxswitch — \n A context switch is occuring.\n-
scheduler.ctxswitch
prev_task_name
\n- The name of the process to be switched out\n-
next_pid
\n- The PID of the process to be switched in\n-
nexttsk_state
\n- the state of the process to be switched in\n+
scheduler.ctxswitch
next_priority
\n+ The priority of the process to be switched in\n+
next_task_name
\n+ The name of the process to be switched in\n+
name
\n+ name of the probe point\n+
prevtsk_state
\n+ the state of the process to be switched out\n
next_tid
\n The TID of the process to be switched in\t \n+
prev_pid
\n+ The PID of the process to be switched out\n+
prev_task_name
\n+ The name of the process to be switched out\n
prev_priority
\n The priority of the process to be switched out\n-
next_priority
\n- The priority of the process to be switched in\n-
prevtsk_state
\n- the state of the process to be switched out\n-
name
\n- name of the probe point\n+
next_pid
\n+ The PID of the process to be switched in\n
prev_tid
\n The TID of the process to be switched out\n-
next_task_name
\n- The name of the process to be switched in\n-
prev_pid
\n- The PID of the process to be switched out\n+
nexttsk_state
\n+ the state of the process to be switched in\n
probe::scheduler.kthread_stop.return — \n A kthread is stopped and gets the return value\n-
scheduler.kthread_stop.return
return_value
\n- return value after stopping the thread\n-
name
\n+
scheduler.kthread_stop.return
probe::scheduler.migrate — \n Task migrating across cpus\n-
scheduler.migrate
priority
\n+
scheduler.migrate
name
\n+ name of the probe point\n+
priority
\n priority of the task being migrated\n+
cpu_from
\n+ the original cpu\n
task
\n the process that is being migrated\n-
cpu_to
\n- the destination cpu\n
pid
\n PID of the task being migrated\n-
name
\n- name of the probe point\n-
cpu_from
\n- the original cpu\n+
cpu_to
\n+ the destination cpu\n
probe::scheduler.process_fork — \n Process forked\n-
scheduler.process_fork
probe::scheduler.process_free — \n Scheduler freeing a data structure for a process\n-
scheduler.process_free
probe::scheduler.process_wait — \n Scheduler starting to wait on a process\n-
scheduler.process_wait
probe::scheduler.wait_task — \n Waiting on a task to unschedule (become inactive)\n-
scheduler.wait_task
task_pid
\n- PID of the task the scheduler is waiting on\n-
name
\n+
scheduler.wait_task
probe::scheduler.wakeup_new — \n Newly created task is woken up for the first time\n-
scheduler.wakeup_new
task_pid
\n+
scheduler.wakeup_new
task_state
\n+ state of the task woken up\n+
task_pid
\n PID of the new task woken up\n-
task_tid
\n- TID of the new task woken up\n+
name
\n+ name of the probe point\n
task_cpu
\n cpu of the task woken up\n+
task_tid
\n+ TID of the new task woken up\n
task_priority
\n priority of the new task\n-
task_state
\n- state of the task woken up\n-
name
\n- name of the probe point\n
probe::scheduler.wakeup — \n Task is woken up\n-
scheduler.wakeup
task_cpu
\n- cpu of the task being woken up\n+
scheduler.wakeup
task_tid
\n+ tid of the task being woken up\n
task_priority
\n priority of the task being woken up\n-
task_state
\n- state of the task being woken up\n+
task_cpu
\n+ cpu of the task being woken up\n
name
\n name of the probe point\n
task_pid
\n PID of the task being woken up\n-
task_tid
\n- tid of the task being woken up\n+
task_state
\n+ state of the task being woken up\n
probe::scsi.iocompleted — \n SCSI mid-layer running the completion processing for block device I/O requests\n-
scsi.iocompleted
req_addr
\n+
scsi.iocompleted
data_direction
\n+ The data_direction specifies whether this command is from/to\n+ the device\n+
channel
\n+ The channel number\n+
goodbytes
\n+ The bytes completed\n+
req_addr
\n The current struct request pointer, as a number\n-
device_state_str
\n- The current state of the device, as a string\n+
data_direction_str
\n+ Data direction, as a string\n
lun
\n The lun number\n-
device_state
\n- The current state of the device\n-
data_direction
\n- The data_direction specifies whether this command is from/to\n- the device\n
dev_id
\n The scsi device id\n+
device_state
\n+ The current state of the device\n
host_no
\n The host number\n-
data_direction_str
\n- Data direction, as a string\n-
channel
\n- The channel number\n-
goodbytes
\n- The bytes completed\n+
device_state_str
\n+ The current state of the device, as a string\n
scsi.iodispatching
data_direction
\n The data_direction specifies whether this command is from/to the device\n 0 (DMA_BIDIRECTIONAL), 1 (DMA_TO_DEVICE),\n 2 (DMA_FROM_DEVICE), 3 (DMA_NONE)\n
request_bufflen
\n The request buffer length\n-
dev_id
\n- The scsi device id\n-
device_state_str
\n- The current state of the device, as a string\n+
channel
\n+ The channel number\n
req_addr
\n The current struct request pointer, as a number\n-
device_state
\n- The current state of the device\n-
request_buffer
\n- The request buffer address\n-
lun
\n- The lun number\n
data_direction_str
\n Data direction, as a string\n-
channel
\n- The channel number\n+
lun
\n+ The lun number\n+
dev_id
\n+ The scsi device id\n
host_no
\n The host number\n+
device_state
\n+ The current state of the device\n+
request_buffer
\n+ The request buffer address\n+
device_state_str
\n+ The current state of the device, as a string\n
probe::scsi.iodone — \n SCSI command completed by low level driver and enqueued into the done queue.\n-
scsi.iodone
device_state_str
\n- The current state of the device, as a string\n-
req_addr
\n+
scsi.iodone
req_addr
\n The current struct request pointer, as a number\n-
device_state
\n- The current state of the device\n-
lun
\n- The lun number\n-
data_direction
\n- The data_direction specifies whether this command is\n- from/to the device.\n-
dev_id
\n- The scsi device id\n
data_direction_str
\n Data direction, as a string\n-
host_no
\n- The host number\n
channel
\n The channel number\n+
data_direction
\n+ The data_direction specifies whether this command is\n+ from/to the device.\n+
device_state_str
\n+ The current state of the device, as a string\n
scsi_timer_pending
\n 1 if a timer is pending on this request\n+
device_state
\n+ The current state of the device\n+
host_no
\n+ The host number\n+
lun
\n+ The lun number\n+
dev_id
\n+ The scsi device id\n
probe::scsi.ioentry — \n Prepares a SCSI mid-layer request\n-
scsi.ioentry
device_state_str
\n- The current state of the device, as a string\n-
req_addr
\n- The current struct request pointer, as a number\n+
scsi.ioentry
disk_minor
\n+ The minor number of the disk (-1 if no information)\n
device_state
\n The current state of the device\n-
disk_minor
\n- The minor number of the disk (-1 if no information)\n
disk_major
\n The major number of the disk (-1 if no information)\n+
device_state_str
\n+ The current state of the device, as a string\n+
req_addr
\n+ The current struct request pointer, as a number\n
probe::scsi.ioexecute — \n Create mid-layer SCSI request and wait for the result\n-
scsi.ioexecute
data_direction_str
\n- Data direction, as a string\n-
channel
\n- The channel number\n-
data_direction
\n- The data_direction specifies whether this command is\n- from/to the device.\n-
request_bufflen
\n- The data buffer buffer length\n-
dev_id
\n+
scsi.ioexecute
dev_id
\n The scsi device id\n-
device_state_str
\n- The current state of the device, as a string\n+
lun
\n+ The lun number\n
request_buffer
\n The data buffer address\n
device_state
\n The current state of the device\n-
lun
\n- The lun number\n-
retries
\n- Number of times to retry request\n-
host_no
\n- The host number\n
timeout
\n Request timeout in seconds\n+
data_direction
\n+ The data_direction specifies whether this command is\n+ from/to the device.\n+
host_no
\n+ The host number\n+
device_state_str
\n+ The current state of the device, as a string\n+
channel
\n+ The channel number\n+
request_bufflen
\n+ The data buffer buffer length\n+
data_direction_str
\n+ Data direction, as a string\n+
retries
\n+ Number of times to retry request\n
probe::scsi.set_state — \n Order SCSI device state change\n-
scsi.set_state
host_no
\n- The host number\n-
state
\n- The new state of the device\n+
scsi.set_state
lun
\n+ The lun number\n+
dev_id
\n+ The scsi device id\n
old_state_str
\n The current state of the device, as a string\n
state_str
\n The new state of the device, as a string\n-
channel
\n- The channel number\n+
host_no
\n+ The host number\n
old_state
\n The current state of the device\n-
lun
\n- The lun number\n-
dev_id
\n- The scsi device id\n+
channel
\n+ The channel number\n+
state
\n+ The new state of the device\n
probe::signal.check_ignored — \n Checking to see signal is ignored\n-
signal.check_ignored
probe::signal.checkperm.return — \n Check performed on a sent signal completed\n-
signal.checkperm.return
probe::signal.checkperm — \n Check being performed on a sent signal\n-
signal.checkperm
task
\n- A task handle to the signal recipient\n+
signal.checkperm
sig_name
\n+ A string representation of the signal\n+
si_code
\n+ Indicates the signal type\n+
pid_name
\n+ Name of the process receiving the signal\n
sig
\n The number of the signal\n
sinfo
\n The address of the siginfo structure\n-
sig_pid
\n- The PID of the process receiving the signal\n-
pid_name
\n- Name of the process receiving the signal\n-
sig_name
\n- A string representation of the signal\n-
si_code
\n- Indicates the signal type\n
name
\n Name of the probe point\n+
task
\n+ A task handle to the signal recipient\n+
sig_pid
\n+ The PID of the process receiving the signal\n
probe::signal.do_action — \n Examining or changing a signal action\n-
signal.do_action
sig_name
\n- A string representation of the signal\n-
sig
\n- The signal to be examined/changed\n-
sa_mask
\n+
signal.do_action
sa_mask
\n The new mask of the signal\n-
sa_handler
\n- The new handler of the signal\n
sigact_addr
\n The address of the new sigaction\n struct associated with the signal\n+
sa_handler
\n+ The new handler of the signal\n
name
\n Name of the probe point\n+
sig
\n+ The signal to be examined/changed\n
oldsigact_addr
\n The address of the old sigaction\n struct associated with the signal\n+
sig_name
\n+ A string representation of the signal\n
probe::signal.flush — \n Flushing all pending signals for a task\n-
signal.flush
task
\n- The task handler of the process performing the flush\n-
sig_pid
\n+
signal.flush
sig_pid
\n The PID of the process associated with the task\n performing the flush\n+
name
\n+ Name of the probe point\n+
task
\n+ The task handler of the process performing the flush\n
pid_name
\n The name of the process associated with the task\n performing the flush\n-
name
\n- Name of the probe point\n
probe::signal.force_segv — \n Forcing send of SIGSEGV\n-
signal.force_segv
name
\n- Name of the probe point\n-
sig_name
\n- A string representation of the signal\n-
sig_pid
\n+
signal.force_segv
probe::signal.handle — \n Signal handler being invoked\n-
signal.handle
regs
\n- The address of the kernel-mode stack area (deprecated in\n- SystemTap 2.1)\n-
sig_name
\n- A string representation of the signal\n-
sinfo
\n+
signal.handle
sinfo
\n The address of the siginfo table\n-
sig
\n- The signal number that invoked the signal handler\n
ka_addr
\n The address of the k_sigaction table\n associated with the signal\n-
oldset_addr
\n- The address of the bitmask array of blocked signals\n- (deprecated in SystemTap 2.1)\n+
name
\n+ Name of the probe point\n
sig_mode
\n Indicates whether the signal was a user-mode or kernel-mode signal\n+
sig_name
\n+ A string representation of the signal\n+
regs
\n+ The address of the kernel-mode stack area (deprecated in\n+ SystemTap 2.1)\n
sig_code
\n The si_code value of the siginfo signal\n-
name
\n- Name of the probe point\n+
oldset_addr
\n+ The address of the bitmask array of blocked signals\n+ (deprecated in SystemTap 2.1)\n+
sig
\n+ The signal number that invoked the signal handler\n
probe::signal.pending.return — \n Examination of pending signal completed\n-
signal.pending.return
probe::signal.procmask.return — \n Examining or changing blocked signals completed\n-
signal.procmask.return
probe::signal.procmask — \n Examining or changing blocked signals\n
signal.procmask
sigset_addr
\n The address of the signal set (sigset_t)\n to be implemented\n-
name
\n- Name of the probe point\n
sigset
\n The actual value to be set for sigset_t\n (correct?)\n+
oldsigset_addr
\n+ The old address of the signal set\n+ (sigset_t)\n
how
\n Indicates how to change the blocked signals; possible values are\n SIG_BLOCK=0 (for blocking signals),\n SIG_UNBLOCK=1 (for unblocking signals), and\n SIG_SETMASK=2 for setting the signal mask.\n-
oldsigset_addr
\n- The old address of the signal set\n- (sigset_t)\n+
name
\n+ Name of the probe point\n
probe::signal.send_sig_queue — \n Queuing a signal to a process\n
signal.send_sig_queue
pid_name
\n Name of the process to which the signal is queued\n-
sig_pid
\n- The PID of the process to which the signal is queued\n-
sig_name
\n- A string representation of the signal\n
sig
\n The queued signal\n+
sig_name
\n+ A string representation of the signal\n+
sig_pid
\n+ The PID of the process to which the signal is queued\n
sigqueue_addr
\n The address of the signal queue\n
name
\n Name of the probe point\n
probe::signal.send — \n Signal being sent to a process\n-
signal.send
name
\n- The name of the function used to send out the signal\n-
si_code
\n- Indicates the signal type\n+
signal.send
sig_name
\n+ A string representation of the signal\n
send2queue
\n Indicates whether the signal is sent to an existing\n sigqueue (deprecated in SystemTap 2.1)\n-
sinfo
\n- The address of siginfo struct\n-
sig
\n- The number of the signal\n-
shared
\n- Indicates whether the signal is shared by the thread group\n
pid_name
\n The name of the signal recipient\n-
sig_pid
\n- The PID of the process receiving the signal\n-
sig_name
\n- A string representation of the signal\n+
shared
\n+ Indicates whether the signal is shared by the thread group\n+
si_code
\n+ Indicates the signal type\n+
sig
\n+ The number of the signal\n+
sinfo
\n+ The address of siginfo struct\n
task
\n A task handle to the signal recipient\n+
name
\n+ The name of the function used to send out the signal\n+
sig_pid
\n+ The PID of the process receiving the signal\n
probe::signal.sys_tgkill.return — \n Sending kill signal to a thread group completed\n-
signal.sys_tgkill.return
retstr
\n- The return value to either __group_send_sig_info,\n-
name
\n+
signal.sys_tgkill.return
probe::signal.sys_tgkill — \n Sending kill signal to a thread group\n-
signal.sys_tgkill
name
\n- Name of the probe point\n-
tgid
\n+
signal.sys_tgkill
tgid
\n The thread group ID of the thread receiving the kill signal\n-
sig_name
\n- A string representation of the signal\n-
pid_name
\n- The name of the signal recipient\n
sig_pid
\n The PID of the thread receiving the kill signal\n-
sig
\n- The specific kill signal sent to the process\n+
name
\n+ Name of the probe point\n
task
\n A task handle to the signal recipient\n+
sig
\n+ The specific kill signal sent to the process\n+
pid_name
\n+ The name of the signal recipient\n+
sig_name
\n+ A string representation of the signal\n
probe::signal.sys_tkill — \n Sending a kill signal to a thread\n-
signal.sys_tkill
name
\n- Name of the probe point\n+
signal.sys_tkill
sig_name
\n+ A string representation of the signal\n
sig
\n The specific signal sent to the process\n-
sig_name
\n- A string representation of the signal\n
pid_name
\n The name of the signal recipient\n-
sig_pid
\n- The PID of the process receiving the kill signal\n
task
\n A task handle to the signal recipient\n+
name
\n+ Name of the probe point\n+
sig_pid
\n+ The PID of the process receiving the kill signal\n
probe::signal.syskill — \n Sending kill signal to a process\n-
signal.syskill
sig_pid
\n+
signal.syskill
name
\n+ Name of the probe point\n+
task
\n+ A task handle to the signal recipient\n+
sig_pid
\n The PID of the process receiving the signal\n-
pid_name
\n- The name of the signal recipient\n
sig_name
\n A string representation of the signal\n+
pid_name
\n+ The name of the signal recipient\n
sig
\n The specific signal sent to the process\n-
task
\n- A task handle to the signal recipient\n-
name
\n- Name of the probe point\n
probe::signal.systkill.return — \n Sending kill signal to a thread completed\n-
signal.systkill.return
retstr
\n- The return value to either __group_send_sig_info,\n-
name
\n+
signal.systkill.return
probe::signal.wakeup — \n Sleeping process being wakened for signal\n-
signal.wakeup
state_mask
\n+
signal.wakeup
resume
\n+ Indicates whether to wake up a task in a\n+ STOPPED or TRACED state\n+
sig_pid
\n+ The PID of the process to wake\n+
state_mask
\n A string representation indicating the mask\n of task states to wake. Possible values are\n TASK_INTERRUPTIBLE, TASK_STOPPED,\n TASK_TRACED, TASK_WAKEKILL, and TASK_INTERRUPTIBLE.\n
pid_name
\n Name of the process to wake\n-
sig_pid
\n- The PID of the process to wake\n-
resume
\n- Indicates whether to wake up a task in a\n- STOPPED or TRACED state\n
probe::socket.aio_read.return — \n Conclusion of message received via sock_aio_read
\n-
socket.aio_read.return
state
\n- Socket state value\n+
socket.aio_read.return
flags
\n+ Socket flags value\n
type
\n Socket type value\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n-
name
\n- Name of this probe\n-
family
\n- Protocol family value\n-
flags
\n- Socket flags value\n+
state
\n+ Socket state value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n+
family
\n+ Protocol family value\n+
name
\n+ Name of this probe\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
protocol
\n Protocol value\n
\n Fires at the conclusion of receiving a message on a socket\n via the sock_aio_read
function\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-aio-read.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-aio-read.html", "unified_diff": "@@ -1,22 +1,22 @@\n
probe::socket.aio_read — \n Receiving message via sock_aio_read
\n-
socket.aio_read
state
\n- Socket state value\n+
socket.aio_read
flags
\n+ Socket flags value\n
type
\n Socket type value\n-
size
\n- Message size in bytes\n-
name
\n- Name of this probe\n+
state
\n+ Socket state value\n
family
\n Protocol family value\n+
name
\n+ Name of this probe\n+
size
\n+ Message size in bytes\n
protocol
\n Protocol value\n-
flags
\n- Socket flags value\n
probe::socket.aio_write.return — \n Conclusion of message send via sock_aio_write
\n-
socket.aio_write.return
size
\n- Size of message received (in bytes) or error code if success = 0\n-
state
\n- Socket state value\n+
socket.aio_write.return
flags
\n+ Socket flags value\n
type
\n Socket type value\n-
flags
\n- Socket flags value\n+
state
\n+ Socket state value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
protocol
\n- Protocol value\n-
name
\n- Name of this probe\n
family
\n Protocol family value\n+
name
\n+ Name of this probe\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
protocol
\n+ Protocol value\n
probe::socket.aio_write — \n Message send via sock_aio_write
\n-
socket.aio_write
size
\n+
socket.aio_write
family
\n+ Protocol family value\n+
size
\n Message size in bytes\n-
state
\n- Socket state value\n-
type
\n- Socket type value\n+
name
\n+ Name of this probe\n
protocol
\n Protocol value\n+
type
\n+ Socket type value\n
flags
\n Socket flags value\n-
name
\n- Name of this probe\n-
family
\n- Protocol family value\n+
state
\n+ Socket state value\n
probe::socket.close — \n Close a socket\n-
socket.close
state
\n- Socket state value\n-
type
\n- Socket type value\n-
flags
\n- Socket flags value\n-
protocol
\n- Protocol value\n+
socket.close
probe::socket.create.return — \n Return from Creation of a socket\n
socket.create.return
type
\n Socket type value\n-
protocol
\n- Protocol value\n-
success
\n- Was socket creation successful? (1 = yes, 0 = no)\n
requester
\n Requested by user process or the kernel (1 = kernel, 0 = user)\n-
family
\n- Protocol family value\n
err
\n Error code if success == 0\n+
family
\n+ Protocol family value\n+
success
\n+ Was socket creation successful? (1 = yes, 0 = no)\n
name
\n Name of this probe\n+
protocol
\n+ Protocol value\n
probe::socket.create — \n Creation of a socket\n-
socket.create
type
\n- Socket type value\n-
requester
\n+
socket.create
requester
\n Requested by user process or the kernel (1 = kernel, 0 = user)\n+
type
\n+ Socket type value\n
protocol
\n Protocol value\n
name
\n Name of this probe\n
family
\n Protocol family value\n
\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-read-iter-return.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-read-iter-return.html", "comments": ["Ordering differences only"], "unified_diff": "@@ -1,23 +1,23 @@\n
probe::socket.read_iter.return — \n Conclusion of message received via sock_read_iter
\n
socket.read_iter.return
success
\n Was receive successful? (1 = yes, 0 = no)\n-
flags
\n- Socket flags value\n-
protocol
\n- Protocol value\n-
name
\n- Name of this probe\n
family
\n Protocol family value\n
size
\n Size of message received (in bytes) or error code if success = 0\n+
name
\n+ Name of this probe\n+
protocol
\n+ Protocol value\n
type
\n Socket type value\n+
flags
\n+ Socket flags value\n
state
\n Socket state value\n
\n Fires at the conclusion of receiving a message on a socket\n via the sock_read_iter
function\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-read-iter.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-read-iter.html", "comments": ["Ordering differences only"], "unified_diff": "@@ -1,22 +1,22 @@\n
probe::socket.read_iter — \n Receiving message via sock_read_iter
\n
socket.read_iter
probe::socket.readv.return — \n Conclusion of receiving a message via sock_readv
\n-
socket.readv.return
flags
\n- Socket flags value\n+
socket.readv.return
family
\n+ Protocol family value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
protocol
\n- Protocol value\n-
name
\n- Name of this probe\n-
family
\n- Protocol family value\n
size
\n Size of message received (in bytes) or error code if success = 0\n-
state
\n- Socket state value\n+
name
\n+ Name of this probe\n+
protocol
\n+ Protocol value\n
type
\n Socket type value\n+
flags
\n+ Socket flags value\n+
state
\n+ Socket state value\n
probe::socket.readv — \n Receiving a message via sock_readv
\n-
socket.readv
size
\n+
socket.readv
family
\n+ Protocol family value\n+
protocol
\n+ Protocol value\n+
name
\n+ Name of this probe\n+
size
\n Message size in bytes\n+
flags
\n+ Socket flags value\n
type
\n Socket type value\n
state
\n Socket state value\n-
protocol
\n- Protocol value\n-
flags
\n- Socket flags value\n-
name
\n- Name of this probe\n-
family
\n- Protocol family value\n
probe::socket.receive — \n Message received on a socket.\n-
socket.receive
size
\n- Size of message received (in bytes) or error code if success = 0\n-
state
\n+
socket.receive
state
\n Socket state value\n+
flags
\n+ Socket flags value\n
type
\n Socket type value\n
protocol
\n Protocol value\n-
flags
\n- Socket flags value\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n
name
\n Name of this probe\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n
family
\n Protocol family value\n
probe::socket.recvmsg.return — \n Return from Message being received on socket\n-
socket.recvmsg.return
name
\n+
socket.recvmsg.return
protocol
\n+ Protocol value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n+
name
\n Name of this probe\n
family
\n Protocol family value\n-
protocol
\n- Protocol value\n-
flags
\n- Socket flags value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
type
\n- Socket type value\n
state
\n Socket state value\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n+
type
\n+ Socket type value\n+
flags
\n+ Socket flags value\n
probe::socket.recvmsg — \n Message being received on socket\n-
socket.recvmsg
protocol
\n- Protocol value\n-
flags
\n- Socket flags value\n+
socket.recvmsg
family
\n+ Protocol family value\n
name
\n Name of this probe\n-
family
\n- Protocol family value\n
size
\n Message size in bytes\n+
protocol
\n+ Protocol value\n+
flags
\n+ Socket flags value\n
type
\n Socket type value\n
state
\n Socket state value\n
\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-send.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-send.html", "unified_diff": "@@ -1,21 +1,21 @@\n
probe::socket.send — \n Message sent on a socket.\n-
socket.send
type
\n- Socket type value\n-
state
\n- Socket state value\n+
socket.send
name
\n+ Name of this probe\n
size
\n Size of message sent (in bytes) or error code if success = 0\n-
name
\n- Name of this probe\n-
family
\n- Protocol family value\n
protocol
\n Protocol value\n+
family
\n+ Protocol family value\n
success
\n Was send successful? (1 = yes, 0 = no)\n+
state
\n+ Socket state value\n
flags
\n Socket flags value\n+
type
\n+ Socket type value\n
probe::socket.sendmsg.return — \n Return from socket.sendmsg.\n-
socket.sendmsg.return
size
\n- Size of message sent (in bytes) or error code if success = 0\n+
socket.sendmsg.return
state
\n+ Socket state value\n
type
\n Socket type value\n-
state
\n- Socket state value\n-
protocol
\n- Protocol value\n
flags
\n Socket flags value\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n-
family
\n- Protocol family value\n+
size
\n+ Size of message sent (in bytes) or error code if success = 0\n
name
\n Name of this probe\n+
protocol
\n+ Protocol value\n+
family
\n+ Protocol family value\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n
probe::socket.sendmsg — \n Message is currently being sent on a socket.\n-
socket.sendmsg
state
\n- Socket state value\n-
type
\n+
socket.sendmsg
probe::socket.write_iter.return — \n Conclusion of message send via sock_write_iter
\n-
socket.write_iter.return
family
\n- Protocol family value\n-
name
\n- Name of this probe\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n+
socket.write_iter.return
state
\n+ Socket state value\n
flags
\n Socket flags value\n-
protocol
\n- Protocol value\n-
state
\n- Socket state value\n
type
\n Socket type value\n+
name
\n+ Name of this probe\n
size
\n Size of message received (in bytes) or error code if success = 0\n+
protocol
\n+ Protocol value\n+
family
\n+ Protocol family value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
probe::socket.write_iter — \n Message send via sock_write_iter
\n-
socket.write_iter
size
\n- Message size in bytes\n+
socket.write_iter
state
\n+ Socket state value\n
type
\n Socket type value\n-
state
\n- Socket state value\n-
protocol
\n- Protocol value\n
flags
\n Socket flags value\n-
family
\n- Protocol family value\n+
protocol
\n+ Protocol value\n+
size
\n+ Message size in bytes\n
name
\n Name of this probe\n+
family
\n+ Protocol family value\n
probe::socket.writev.return — \n Conclusion of message sent via socket_writev
\n-
socket.writev.return
state
\n- Socket state value\n-
type
\n- Socket type value\n+
socket.writev.return
protocol
\n+ Protocol value\n
size
\n Size of message sent (in bytes) or error code if success = 0\n
name
\n Name of this probe\n
family
\n Protocol family value\n-
flags
\n- Socket flags value\n
success
\n Was send successful? (1 = yes, 0 = no)\n-
protocol
\n- Protocol value\n+
state
\n+ Socket state value\n+
type
\n+ Socket type value\n+
flags
\n+ Socket flags value\n
probe::socket.writev — \n Message sent via socket_writev
\n-
socket.writev
name
\n+
socket.writev
protocol
\n+ Protocol value\n+
name
\n Name of this probe\n+
size
\n+ Message size in bytes\n
family
\n Protocol family value\n-
protocol
\n- Protocol value\n-
flags
\n- Socket flags value\n
state
\n Socket state value\n+
flags
\n+ Socket flags value\n
type
\n Socket type value\n-
size
\n- Message size in bytes\n
probe::softirq.entry — \n Execution of handler for a pending softirq starting\n-
softirq.entry
probe::softirq.exit — \n Execution of handler for a pending softirq completed\n-
softirq.exit
probe::stap.cache_add_nss — \n Add NSS (Network Security Services) information to cache\n-
stap.cache_add_nss
dest_path
\n+
stap.cache_add_nss
probe::stap.cache_get — \n Found item in stap cache\n-
stap.cache_get
source_path
\n- the path of the .c source file\n-
module_path
\n+
stap.cache_get
probe::stapio.receive_control_message — \n Received a control message\n-
stapio.receive_control_message
len
\n- the length (in bytes) of the data blob\n-
data
\n+
stapio.receive_control_message
probe::staprun.send_control_message — \n Sending a control message\n-
staprun.send_control_message
type
\n- type of message being send; defined in runtime/transport/transport_msgs.h\n+
staprun.send_control_message
probe::sunrpc.clnt.bind_new_program — \n Bind a new RPC program to an existing client\n-
sunrpc.clnt.bind_new_program
servername
\n- the server machine name\n-
old_progname
\n- the name of old RPC program\n-
vers
\n- the version of new RPC program\n+
sunrpc.clnt.bind_new_program
old_prog
\n+ the number of old RPC program\n
old_vers
\n the version of old RPC program\n+
servername
\n+ the server machine name\n
progname
\n the name of new RPC program\n-
old_prog
\n- the number of old RPC program\n+
old_progname
\n+ the name of old RPC program\n
prog
\n the number of new RPC program\n+
vers
\n+ the version of new RPC program\n
probe::sunrpc.clnt.call_async — \n Make an asynchronous RPC call\n-
sunrpc.clnt.call_async
flags
\n+
sunrpc.clnt.call_async
dead
\n+ whether this client is abandoned\n+
servername
\n+ the server machine name\n+
prot
\n+ the IP protocol number\n+
flags
\n flags\n-
vers
\n- the RPC program version number\n+
proc
\n+ the procedure number in this RPC call\n
xid
\n current transmission id\n-
servername
\n- the server machine name\n-
port
\n- the port number\n-
dead
\n- whether this client is abandoned\n
progname
\n the RPC program name\n-
proc
\n- the procedure number in this RPC call\n+
port
\n+ the port number\n
prog
\n the RPC program number\n+
vers
\n+ the RPC program version number\n
procname
\n the procedure name in this RPC call\n-
prot
\n- the IP protocol number\n
probe::sunrpc.clnt.call_sync — \n Make a synchronous RPC call\n-
sunrpc.clnt.call_sync
servername
\n+
sunrpc.clnt.call_sync
proc
\n+ the procedure number in this RPC call\n+
progname
\n+ the RPC program name\n+
xid
\n+ current transmission id\n+
servername
\n the server machine name\n-
port
\n- the port number\n+
dead
\n+ whether this client is abandoned\n
flags
\n flags\n+
prot
\n+ the IP protocol number\n
vers
\n the RPC program version number\n-
xid
\n- current transmission id\n-
progname
\n- the RPC program name\n-
dead
\n- whether this client is abandoned\n-
proc
\n- the procedure number in this RPC call\n
prog
\n the RPC program number\n+
port
\n+ the port number\n
procname
\n the procedure name in this RPC call\n-
prot
\n- the IP protocol number\n
probe::sunrpc.clnt.clone_client — \n Clone an RPC client structure\n-
sunrpc.clnt.clone_client
vers
\n+
sunrpc.clnt.clone_client
servername
\n+ the server machine name\n+
vers
\n the RPC program version number\n-
progname
\n- the RPC program name\n-
prot
\n- the IP protocol number\n+
port
\n+ the port number\n
prog
\n the RPC program number\n-
servername
\n- the server machine name\n
authflavor
\n the authentication flavor\n-
port
\n- the port number\n+
prot
\n+ the IP protocol number\n+
progname
\n+ the RPC program name\n
probe::sunrpc.clnt.create_client — \n Create an RPC client\n
sunrpc.clnt.create_client
progname
\n the RPC program name\n-
vers
\n- the RPC program version number\n
prog
\n the RPC program number\n-
prot
\n- the IP protocol number\n-
servername
\n- the server machine name\n
port
\n the port number\n+
servername
\n+ the server machine name\n+
vers
\n+ the RPC program version number\n+
prot
\n+ the IP protocol number\n
authflavor
\n the authentication flavor\n
probe::sunrpc.clnt.restart_call — \n Restart an asynchronous RPC call\n-
sunrpc.clnt.restart_call
tk_flags
\n- the task flags\n+
sunrpc.clnt.restart_call
tk_priority
\n+ the task priority\n+
tk_pid
\n+ the debugging aid of task\n
servername
\n the server machine name\n
xid
\n the transmission id\n-
tk_priority
\n- the task priority\n-
tk_pid
\n- the debugging aid of task\n-
tk_runstate
\n- the task run status\n+
tk_flags
\n+ the task flags\n
prog
\n the RPC program number\n+
tk_runstate
\n+ the task run status\n
probe::sunrpc.clnt.shutdown_client — \n Shutdown an RPC client\n-
sunrpc.clnt.shutdown_client
port
\n+
sunrpc.clnt.shutdown_client
netreconn
\n+ the count of reconnections\n+
vers
\n+ the RPC program version number\n+
clones
\n+ the number of clones\n+
port
\n the port number\n+
prog
\n+ the RPC program number\n+
rpccnt
\n+ the count of RPC calls\n+
om_ops
\n+ the count of operations\n
om_queue
\n the jiffies queued for xmit\n+
progname
\n+ the RPC program name\n
om_rtt
\n the RPC RTT jiffies\n+
om_execute
\n+ the RPC execution jiffies\n+
tasks
\n+ the number of references\n
servername
\n the server machine name\n-
vers
\n- the RPC program version number\n
om_bytes_recv
\n the count of bytes in\n-
authflavor
\n- the authentication flavor\n-
clones
\n- the number of clones\n-
om_execute
\n- the RPC execution jiffies\n-
om_ops
\n- the count of operations\n+
om_ntrans
\n+ the count of RPC transmissions\n
om_bytes_sent
\n the count of bytes out\n+
authflavor
\n+ the authentication flavor\n
prot
\n the IP protocol number\n-
tasks
\n- the number of references\n-
prog
\n- the RPC program number\n-
rpccnt
\n- the count of RPC calls\n-
netreconn
\n- the count of reconnections\n-
om_ntrans
\n- the count of RPC transmissions\n-
progname
\n- the RPC program name\n
probe::sunrpc.sched.delay — \n Delay an RPC task\n-
sunrpc.sched.delay
tk_flags
\n- the flags of the task\n-
xid
\n- the transmission id in the RPC call\n+
sunrpc.sched.delay
prog
\n+ the program number in the RPC call\n
vers
\n the program version in the RPC call\n-
delay
\n- the time delayed\n
tk_pid
\n the debugging id of the task\n
prot
\n the IP protocol in the RPC call\n-
prog
\n- the program number in the RPC call\n+
delay
\n+ the time delayed\n+
tk_flags
\n+ the flags of the task\n+
xid
\n+ the transmission id in the RPC call\n
probe::sunrpc.sched.execute — \n Execute the RPC `scheduler'\n
sunrpc.sched.execute
tk_flags
\n the flags of the task\n
xid
\n the transmission id in the RPC call\n-
vers
\n- the program version in the RPC call\n
tk_pid
\n the debugging id of the task\n-
prog
\n- the program number in the RPC call\n
prot
\n the IP protocol in the RPC call\n+
vers
\n+ the program version in the RPC call\n+
prog
\n+ the program number in the RPC call\n
probe::sunrpc.sched.new_task — \n Create new task for the specified client\n-
sunrpc.sched.new_task
vers
\n- the program version in the RPC call\n-
xid
\n- the transmission id in the RPC call\n+
sunrpc.sched.new_task
probe::sunrpc.sched.release_task — \n Release all resources associated with a task\n
sunrpc.sched.release_task
probe::sunrpc.svc.create — \n Create an RPC service\n-
sunrpc.svc.create
probe::sunrpc.svc.destroy — \n Destroy an RPC service\n-
sunrpc.svc.destroy
sv_nrthreads
\n- the number of concurrent threads\n-
rpcbadfmt
\n- the count of requests dropped for bad formats\n-
sv_name
\n- the service name\n+
sunrpc.svc.destroy
rpcbadauth
\n+ the count of requests drooped for authentication failure\n
sv_prog
\n the number of the program\n
sv_progname
\n the name of the program\n-
netcnt
\n- the count of received RPC requests\n
rpccnt
\n the count of valid RPC requests\n-
rpcbadauth
\n- the count of requests drooped for authentication failure\n+
sv_nrthreads
\n+ the number of concurrent threads\n
nettcpconn
\n the count of accepted TCP connections\n+
sv_name
\n+ the service name\n+
netcnt
\n+ the count of received RPC requests\n+
rpcbadfmt
\n+ the count of requests dropped for bad formats\n
probe::sunrpc.svc.drop — \n Drop RPC request\n
sunrpc.svc.drop
rq_vers
\n the program version in the request\n-
sv_name
\n- the service name\n
rq_proc
\n the procedure number in the request\n-
rq_prot
\n- the IP protocol of the reqeust\n+
rq_xid
\n+ the transmission id in the request\n
peer_ip
\n the peer address where the request is from\n
rq_prog
\n the program number in the request\n-
rq_xid
\n- the transmission id in the request\n+
rq_prot
\n+ the IP protocol of the reqeust\n+
sv_name
\n+ the service name\n
probe::sunrpc.svc.process — \n Process an RPC request\n-
sunrpc.svc.process
rq_vers
\n- the program version in the request\n+
sunrpc.svc.process
sv_name
\n+ the service name\n
sv_nrthreads
\n the number of concurrent threads\n
rq_prot
\n the IP protocol of the reqeust\n-
rq_proc
\n- the procedure number in the request\n-
sv_name
\n- the service name\n+
rq_prog
\n+ the program number in the request\n+
rq_xid
\n+ the transmission id in the request\n
peer_ip
\n the peer address where the request is from\n+
rq_proc
\n+ the procedure number in the request\n+
rq_vers
\n+ the program version in the request\n
sv_prog
\n the number of the program\n-
rq_xid
\n- the transmission id in the request\n-
rq_prog
\n- the program number in the request\n
probe::sunrpc.svc.recv — \n Listen for the next RPC request on any socket\n
sunrpc.svc.recv
probe::sunrpc.svc.register — \n Register an RPC service with the local portmapper\n
sunrpc.svc.register
probe::sunrpc.svc.send — \n Return reply to RPC client\n-
sunrpc.svc.send
rq_xid
\n- the transmission id in the request\n+
sunrpc.svc.send
sv_name
\n+ the service name\n
rq_prog
\n the program number in the request\n-
peer_ip
\n- the peer address where the request is from\n
rq_prot
\n the IP protocol of the reqeust\n-
rq_proc
\n- the procedure number in the request\n-
sv_name
\n- the service name\n
rq_vers
\n the program version in the request\n+
rq_proc
\n+ the procedure number in the request\n+
rq_xid
\n+ the transmission id in the request\n+
peer_ip
\n+ the peer address where the request is from\n
probe::syscall_any.return — \n Record exit from a syscall\n-
syscall_any.return
syscall_nr
\n- number of the syscall\n-
retval
\n+
syscall_any.return
retval
\n return value of the syscall\n
name
\n name of the syscall\n+
syscall_nr
\n+ number of the syscall\n
\n The syscall_any.return probe point is designed to be a low overhead\n that monitors all the syscalls returns via a kernel tracepoint.\n Because of the breadth of syscalls it monitors it provides\n no information about the syscall arguments, argstr string\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-syscall-any.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-syscall-any.html", "unified_diff": "@@ -1,13 +1,13 @@\n
probe::syscall_any — \n Record entry into a syscall\n-
syscall_any
syscall_nr
\n- number of the syscall\n-
name
\n+
syscall_any
\n The syscall_any probe point is designed to be a low overhead\n that monitors all the syscalls entered via a kernel tracepoint.\n Because of the breadth of syscalls it monitors it provides\n no information about the syscall arguments or argstr string\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect-return.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect-return.html", "unified_diff": "@@ -1,9 +1,9 @@\n
probe::tcp.disconnect.return — \n TCP socket disconnection complete\n-
tcp.disconnect.return
probe::tcp.disconnect — \n TCP socket disconnection\n-
tcp.disconnect
name
\n- Name of this probe\n-
saddr
\n+
tcp.disconnect
saddr
\n A string representing the source IP address\n-
sock
\n- Network socket \n
family
\n IP address family\n+
name
\n+ Name of this probe\n
dport
\n TCP destination port\n-
flags
\n- TCP flags (e.g. FIN, etc) \n
sport
\n TCP source port \n+
flags
\n+ TCP flags (e.g. FIN, etc) \n+
sock
\n+ Network socket \n
daddr
\n A string representing the destination IP address\n
probe::tcp.receive — \n Called when a TCP packet is received\n-
tcp.receive
rst
\n- TCP RST flag\n-
family
\n- IP address family\n-
protocol
\n- Packet protocol from driver\n-
ack
\n+
tcp.receive
ack
\n TCP ACK flag\n
daddr
\n A string representing the destination IP address\n+
name
\n+ Name of the probe point\n+
dport
\n+ TCP destination port\n
sport
\n TCP source port\n-
iphdr
\n- IP header address\n-
urg
\n- TCP URG flag\n+
rst
\n+ TCP RST flag\n
fin
\n TCP FIN flag\n-
dport
\n- TCP destination port\n-
psh
\n- TCP PSH flag\n-
saddr
\n- A string representing the source IP address\n-
name
\n- Name of the probe point\n+
urg
\n+ TCP URG flag\n
syn
\n TCP SYN flag\n+
saddr
\n+ A string representing the source IP address\n+
family
\n+ IP address family\n+
protocol
\n+ Packet protocol from driver\n+
psh
\n+ TCP PSH flag\n+
iphdr
\n+ IP header address\n
probe::tcp.recvmsg.return — \n Receiving TCP message complete\n
tcp.recvmsg.return
dport
\n TCP destination port\n-
family
\n- IP address family\n-
saddr
\n- A string representing the source IP address\n
name
\n Name of this probe\n+
saddr
\n+ A string representing the source IP address\n+
size
\n+ Number of bytes received or error code if an error occurred.\n+
family
\n+ IP address family\n
daddr
\n A string representing the destination IP address\n
sport
\n TCP source port \n-
size
\n- Number of bytes received or error code if an error occurred.\n
probe::tcp.recvmsg — \n Receiving TCP message\n-
tcp.recvmsg
size
\n+
tcp.recvmsg
dport
\n+ TCP destination port\n+
name
\n+ Name of this probe\n+
size
\n Number of bytes to be received \n-
sport
\n- TCP source port \n-
daddr
\n- A string representing the destination IP address\n
saddr
\n A string representing the source IP address\n-
name
\n- Name of this probe\n-
dport
\n- TCP destination port\n-
sock
\n- Network socket\n
family
\n IP address family\n+
daddr
\n+ A string representing the destination IP address\n+
sport
\n+ TCP source port \n+
sock
\n+ Network socket\n
probe::tcp.sendmsg — \n Sending a tcp message\n-
tcp.sendmsg
size
\n+
tcp.sendmsg
probe::tcp.setsockopt — \n Call to setsockopt
\n-
tcp.setsockopt
level
\n- The level at which the socket options will be manipulated\n-
name
\n- Name of this probe\n-
optstr
\n+
tcp.setsockopt
optstr
\n Resolves optname to a human-readable format\n-
family
\n- IP address family\n
optname
\n TCP socket options (e.g. TCP_NODELAY, TCP_MAXSEG, etc)\n
sock
\n Network socket\n
optlen
\n Used to access values for setsockopt
\n+
level
\n+ The level at which the socket options will be manipulated\n+
name
\n+ Name of this probe\n+
family
\n+ IP address family\n
probe::tcpmib.EstabResets — \n Count the reset of a socket\n-
tcpmib.EstabResets
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.EstabResets
probe::tcpmib.OutRsts — \n Count the sending of a reset packet\n-
tcpmib.OutRsts
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.OutRsts
probe::tcpmib.PassiveOpens — \n Count the passive creation of a socket\n-
tcpmib.PassiveOpens
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.PassiveOpens
probe::tty.init — \n Called when a tty is being initalized\n-
tty.init
probe::tty.ioctl — \n called when a ioctl is request to the tty\n-
tty.ioctl
probe::tty.open — \n Called when a tty is opened\n-
tty.open
probe::tty.poll — \n Called when a tty device is being polled\n-
tty.poll
probe::tty.read — \n called when a tty line will be read\n-
tty.read
probe::tty.receive — \n called when a tty receives a message\n-
tty.receive
driver_name
\n- the driver name\n-
index
\n+
tty.receive
index
\n The tty Index\n-
name
\n- the name of the module file\n-
fp
\n- The flag buffer\n-
cp
\n- the buffer that was received\n
id
\n the tty id\n+
fp
\n+ The flag buffer\n
count
\n The amount of characters received\n+
driver_name
\n+ the driver name\n+
name
\n+ the name of the module file\n+
cp
\n+ the buffer that was received\n
probe::tty.register — \n Called when a tty device is registred\n-
tty.register
probe::tty.resize — \n Called when a terminal resize happens\n
tty.resize
new_ypixel
\n the new ypixel value\n-
old_col
\n- the old col value\n-
old_row
\n- the old row value\n-
old_xpixel
\n- the old xpixel\n
name
\n the tty name\n-
new_xpixel
\n- the new xpixel value\n+
old_col
\n+ the old col value\n
new_row
\n the new row value\n-
new_col
\n- the new col value\n+
new_xpixel
\n+ the new xpixel value\n
old_ypixel
\n the old ypixel\n+
new_col
\n+ the new col value\n+
old_row
\n+ the old row value\n+
old_xpixel
\n+ the old xpixel\n
probe::tty.unregister — \n Called when a tty device is being unregistered\n-
tty.unregister
probe::tty.write — \n write to the tty line\n-
tty.write
nr
\n- The amount of characters\n-
file_name
\n- the file name lreated to the tty\n-
buffer
\n+
tty.write
probe::udp.disconnect.return — \n UDP has been disconnected successfully\n-
udp.disconnect.return
family
\n- IP address family\n-
sport
\n+
udp.disconnect.return
sport
\n UDP source port\n-
dport
\n- UDP destination port\n-
name
\n- The name of this probe\n-
ret
\n- Error code (0: no error) \n
daddr
\n A string representing the destination IP address\n+
ret
\n+ Error code (0: no error) \n+
family
\n+ IP address family\n
saddr
\n A string representing the source IP address\n+
name
\n+ The name of this probe\n+
dport
\n+ UDP destination port\n
probe::udp.disconnect — \n Fires when a process requests for a UDP disconnection\n-
udp.disconnect
family
\n- IP address family\n-
daddr
\n- A string representing the destination IP address\n-
saddr
\n- A string representing the source IP address\n+
udp.disconnect
dport
\n+ UDP destination port\n
sock
\n Network socket used by the process\n-
dport
\n- UDP destination port\n+
name
\n+ The name of this probe\n+
saddr
\n+ A string representing the source IP address\n+
daddr
\n+ A string representing the destination IP address\n+
family
\n+ IP address family\n
sport
\n UDP source port\n
flags
\n Flags (e.g. FIN, etc) \n-
name
\n- The name of this probe\n
probe::udp.recvmsg.return — \n Fires whenever an attempt to receive a UDP message received is completed\n-
udp.recvmsg.return
family
\n+
udp.recvmsg.return
size
\n+ Number of bytes received by the process\n+
sport
\n+ UDP source port\n+
family
\n IP address family\n+
daddr
\n+ A string representing the destination IP address\n+
saddr
\n+ A string representing the source IP address\n
name
\n The name of this probe\n
dport
\n UDP destination port\n-
sport
\n- UDP source port\n-
saddr
\n- A string representing the source IP address\n-
daddr
\n- A string representing the destination IP address\n-
size
\n- Number of bytes received by the process\n
probe::udp.recvmsg — \n Fires whenever a UDP message is received\n-
udp.recvmsg
family
\n+
udp.recvmsg
size
\n+ Number of bytes received by the process\n+
sport
\n+ UDP source port\n+
family
\n IP address family\n+
daddr
\n+ A string representing the destination IP address\n+
saddr
\n+ A string representing the source IP address\n+
name
\n+ The name of this probe\n
sock
\n Network socket used by the process\n
dport
\n UDP destination port\n-
sport
\n- UDP source port\n-
name
\n- The name of this probe\n-
saddr
\n- A string representing the source IP address\n-
daddr
\n- A string representing the destination IP address\n-
size
\n- Number of bytes received by the process\n
probe::udp.sendmsg.return — \n Fires whenever an attempt to send a UDP message is completed\n-
udp.sendmsg.return
probe::udp.sendmsg — \n Fires whenever a process sends a UDP message\n-
udp.sendmsg
sport
\n- UDP source port\n-
dport
\n+
udp.sendmsg
dport
\n UDP destination port\n-
name
\n- The name of this probe\n
sock
\n Network socket used by the process \n-
size
\n- Number of bytes sent by the process\n-
daddr
\n- A string representing the destination IP address\n+
name
\n+ The name of this probe\n
saddr
\n A string representing the source IP address\n
family
\n IP address family\n+
daddr
\n+ A string representing the destination IP address\n+
sport
\n+ UDP source port\n+
size
\n+ Number of bytes sent by the process\n
probe::vm.brk — \n Fires when a brk is requested (i.e. the heap will be resized)\n-
vm.brk
address
\n- the requested address\n+
vm.brk
probe::vm.kmalloc_node — \n Fires when kmalloc_node is requested\n-
vm.kmalloc_node
call_site
\n- address of the function caling this kmemory function\n-
ptr
\n- pointer to the kmemory allocated\n+
vm.kmalloc_node
bytes_alloc
\n+ allocated Bytes\n+
name
\n+ name of the probe point\n+
bytes_req
\n+ requested Bytes\n
gfp_flags
\n type of kmemory to allocate\n
caller_function
\n name of the caller function\n+
ptr
\n+ pointer to the kmemory allocated\n
gfp_flag_name
\n type of kmemory to allocate(in string format)\n-
bytes_alloc
\n- allocated Bytes\n-
bytes_req
\n- requested Bytes\n-
name
\n- name of the probe point\n+
call_site
\n+ address of the function caling this kmemory function\n
probe::vm.kmalloc — \n Fires when kmalloc is requested\n-
vm.kmalloc
call_site
\n- address of the kmemory function\n-
ptr
\n- pointer to the kmemory allocated\n-
gfp_flags
\n- type of kmemory to allocate\n-
caller_function
\n+
vm.kmalloc
caller_function
\n name of the caller function\n
gfp_flag_name
\n type of kmemory to allocate (in String format)\n-
bytes_req
\n- requested Bytes\n+
ptr
\n+ pointer to the kmemory allocated\n+
call_site
\n+ address of the kmemory function\n
bytes_alloc
\n allocated Bytes\n
name
\n name of the probe point\n+
bytes_req
\n+ requested Bytes\n+
gfp_flags
\n+ type of kmemory to allocate\n
probe::vm.kmem_cache_alloc_node — \n Fires when kmem_cache_alloc_node is requested\n-
vm.kmem_cache_alloc_node
ptr
\n- pointer to the kmemory allocated\n-
call_site
\n+
vm.kmem_cache_alloc_node
call_site
\n address of the function calling this kmemory function\n+
ptr
\n+ pointer to the kmemory allocated\n+
gfp_flag_name
\n+ type of kmemory to allocate(in string format)\n
caller_function
\n name of the caller function\n
gfp_flags
\n type of kmemory to allocate\n-
bytes_alloc
\n- allocated Bytes\n
bytes_req
\n requested Bytes\n-
gfp_flag_name
\n- type of kmemory to allocate(in string format)\n
name
\n name of the probe point\n+
bytes_alloc
\n+ allocated Bytes\n
probe::vm.kmem_cache_alloc — \n Fires when kmem_cache_alloc is requested\n-
vm.kmem_cache_alloc
gfp_flag_name
\n- type of kmemory to allocate(in string format)\n-
bytes_req
\n- requested Bytes\n-
bytes_alloc
\n- allocated Bytes\n-
name
\n- name of the probe point\n-
call_site
\n+
vm.kmem_cache_alloc
call_site
\n address of the function calling this kmemory function.\n
ptr
\n pointer to the kmemory allocated\n-
gfp_flags
\n- type of kmemory to allocate\n+
gfp_flag_name
\n+ type of kmemory to allocate(in string format)\n
caller_function
\n name of the caller function.\n+
gfp_flags
\n+ type of kmemory to allocate\n+
bytes_req
\n+ requested Bytes\n+
name
\n+ name of the probe point\n+
bytes_alloc
\n+ allocated Bytes\n
probe::vm.kmem_cache_free — \n Fires when kmem_cache_free is requested\n-
vm.kmem_cache_free
ptr
\n- Pointer to the kmemory allocated which is returned by kmem_cache\n-
call_site
\n+
vm.kmem_cache_free
probe::vm.munmap — \n Fires when an munmap is requested\n-
vm.munmap
length
\n- the length of the memory segment \n-
name
\n+
vm.munmap
probe::vm.oom_kill — \n Fires when a thread is selected for termination by the OOM killer\n-
vm.oom_kill
probe::vm.pagefault.return — \n Indicates what type of fault occurred\n-
vm.pagefault.return
probe::vm.pagefault — \n Records that a page fault occurred\n-
vm.pagefault
address
\n- the address of the faulting memory access; i.e. the address that caused the page fault\n-
write_access
\n+
vm.pagefault
probe::vm.write_shared_copy — \n Page copy for shared page write\n-
vm.write_shared_copy
address
\n- The address of the shared write\n+
vm.write_shared_copy
probe::workqueue.execute — \n Executing deferred work\n-
workqueue.execute