{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/r-b-build.cuPgqX2m/b1/systemtap_5.1-4.1_i386.changes", "source2": "/srv/reproducible-results/rbuild-debian/r-b-build.cuPgqX2m/b2/systemtap_5.1-4.1_i386.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -1,11 +1,11 @@\n \n fcaaec11343d06ff616bfa88662eabd2 8572 devel optional systemtap-client_5.1-4.1_i386.deb\n 0cf970cde52f6e728a684ce71c23617d 640204 devel optional systemtap-common_5.1-4.1_i386.deb\n 2f69855dd3aa57c1a42a717e927b6a1c 21406692 debug optional systemtap-dbgsym_5.1-4.1_i386.deb\n- 0795bc72f2758053cecf0c884f043170 2585724 doc optional systemtap-doc_5.1-4.1_i386.deb\n+ 84b4fd83a0cb30265a38bb2b5474ecac 2585768 doc optional systemtap-doc_5.1-4.1_i386.deb\n 7576ad82a02ae998125f0a0a49675001 1213084 debug optional systemtap-runtime-dbgsym_5.1-4.1_i386.deb\n 20a741abb039ea7d9f0ab3b931d2d88d 151732 devel optional systemtap-runtime_5.1-4.1_i386.deb\n e6f7c12f5c60d1e9089e3c33d7c48571 18916 devel optional systemtap-sdt-dev_5.1-4.1_i386.deb\n 28461eedb1fab598cd0649a434b29ec2 2012964 debug optional systemtap-server-dbgsym_5.1-4.1_i386.deb\n 2e6238b753a1c10129a985f812dca196 169648 devel optional systemtap-server_5.1-4.1_i386.deb\n d7a8e2aa60300578ef26709775d1d473 1651988 devel optional systemtap_5.1-4.1_i386.deb\n"}, {"source1": "systemtap-doc_5.1-4.1_i386.deb", "source2": "systemtap-doc_5.1-4.1_i386.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2025-02-28 20:20:54.000000 debian-binary\n--rw-r--r-- 0 0 0 54208 2025-02-28 20:20:54.000000 control.tar.xz\n--rw-r--r-- 0 0 0 2531324 2025-02-28 20:20:54.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 54224 2025-02-28 20:20:54.000000 control.tar.xz\n+-rw-r--r-- 0 0 0 2531352 2025-02-28 20:20:54.000000 data.tar.xz\n"}, {"source1": "control.tar.xz", "source2": "control.tar.xz", "unified_diff": null, "details": [{"source1": "control.tar", "source2": "control.tar", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "comments": ["Files differ"], "unified_diff": null}]}]}]}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -334,15 +334,15 @@\n -rw-r--r-- 0 root (0) root (0) 2677 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-isinstr.html\n -rw-r--r-- 0 root (0) root (0) 2423 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-jiffies.html\n -rw-r--r-- 0 root (0) root (0) 3233 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-add-array-numeric-metric.html\n -rw-r--r-- 0 root (0) root (0) 3099 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-add-array-string-metric.html\n -rw-r--r-- 0 root (0) root (0) 2841 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-add-array.html\n -rw-r--r-- 0 root (0) root (0) 2982 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-add-numeric-metric.html\n -rw-r--r-- 0 root (0) root (0) 2753 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-add-string-metric.html\n--rw-r--r-- 0 root (0) root (0) 2979 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-data.html\n+-rw-r--r-- 0 root (0) root (0) 2913 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-data.html\n -rw-r--r-- 0 root (0) root (0) 3366 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-output-array-numeric-value.html\n -rw-r--r-- 0 root (0) root (0) 3378 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-output-array-string-value.html\n -rw-r--r-- 0 root (0) root (0) 2497 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-output-data-end.html\n -rw-r--r-- 0 root (0) root (0) 2475 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-output-data-start.html\n -rw-r--r-- 0 root (0) root (0) 2922 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-output-numeric-value.html\n -rw-r--r-- 0 root (0) root (0) 2851 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-output-string-value.html\n -rw-r--r-- 0 root (0) root (0) 2787 2025-02-28 20:20:54.000000 ./usr/share/doc/systemtap-doc/tapsets/API-json-set-prefix.html\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "unified_diff": "@@ -1,41 +1,41 @@\n
probe::ioblock.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock.end
vcnt
\n+
ioblock.end
rw
\n+ binary trace for read/write request\n+
ino
\n+ i-node number of the mapped file\n+
vcnt
\n bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
hw_segments
\n+ number of segments after physical and DMA remapping hardware coalescing is performed\n+
error
\n+ 0 on success\n+
bytes_done
\n+ number of bytes transferred\n+
idx
\n+ offset into the bio vector array\n+
size
\n+ total size in bytes\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
sector
\n+ beginning sector for the entire bio\n
devname
\n block device name\n-
error
\n- 0 on success\n-
ino
\n- i-node number of the mapped file\n-
name
\n- name of the probe point\n-
size
\n- total size in bytes\n-
rw
\n- binary trace for read/write request\n-
opf
\n- operations and flags\n-
bytes_done
\n- number of bytes transferred\n
phys_segments
\n number of segments in this bio after physical address coalescing is performed.\n-
sector
\n- beginning sector for the entire bio\n-
idx
\n- offset into the bio vector array\n-
hw_segments
\n- number of segments after physical and DMA remapping hardware coalescing is performed\n+
opf
\n+ operations and flags\n+
name
\n+ name of the probe point\n
probe::ioblock.request — \n Fires whenever making a generic block I/O request.\n-
ioblock.request
bdev
\n- target block device\n+
ioblock.request
phys_segments
\n+ number of segments in this bio after physical address coalescing is performed\n+
sector
\n+ beginning sector for the entire bio\n
devname
\n block device name\n+
name
\n+ name of the probe point\n+
opf
\n+ operations and flags\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
hw_segments
\n+ number of segments after physical and DMA remapping hardware coalescing is performed\n+
rw
\n+ binary trace for read/write request\n
ino
\n i-node number of the mapped file\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
bdev
\n+ target block device\n+
idx
\n+ offset into the bio vector array\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
size
\n+ total size in bytes\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid \n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n-
idx
\n- offset into the bio vector array\n-
hw_segments
\n- number of segments after physical and DMA remapping hardware coalescing is performed\n-
phys_segments
\n- number of segments in this bio after physical address coalescing is performed\n-
sector
\n- beginning sector for the entire bio\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
size
\n- total size in bytes\n-
name
\n- name of the probe point\n-
opf
\n- operations and flags\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
rw
\n- binary trace for read/write request\n
probe::ioblock_trace.bounce — \n Fires whenever a buffer bounce is needed for at least one page of a block IO request.\n-
ioblock_trace.bounce
rw
\n- binary trace for read/write request\n-
opf
\n- operations and flags\n-
bytes_done
\n- number of bytes transferred\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
name
\n- name of the probe point\n-
size
\n- total size in bytes\n+
ioblock_trace.bounce
ino
\n+ i-node number of the mapped file\n
bdev_contains
\n points to the device object which contains the partition (when bio structure represents a partition)\n-
sector
\n- beginning sector for the entire bio\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
rw
\n+ binary trace for read/write request\n
vcnt
\n bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
bytes_done
\n+ number of bytes transferred\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
size
\n+ total size in bytes\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n
bdev
\n target block device\n
devname
\n device for which a buffer bounce was needed.\n+
sector
\n+ beginning sector for the entire bio\n+
opf
\n+ operations and flags\n
q
\n request queue on which this bio was queued.\n-
ino
\n- i-node number of the mapped file\n+
name
\n+ name of the probe point\n
probe::ioblock_trace.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock_trace.end
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
ioblock_trace.end
opf
\n+ operations and flags\n+
name
\n+ name of the probe point\n+
q
\n+ request queue on which this bio was queued.\n+
sector
\n+ beginning sector for the entire bio\n+
devname
\n+ block device name\n+
bytes_done
\n+ number of bytes transferred\n+
bdev
\n+ target block device\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
size
\n+ total size in bytes\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
bdev
\n- target block device\n-
devname
\n- block device name\n-
q
\n- request queue on which this bio was queued.\n-
ino
\n- i-node number of the mapped file\n-
name
\n- name of the probe point\n-
size
\n- total size in bytes\n
rw
\n binary trace for read/write request\n-
bytes_done
\n- number of bytes transferred\n-
opf
\n- operations and flags\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
sector
\n- beginning sector for the entire bio\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
ino
\n+ i-node number of the mapped file\n
bdev_contains
\n points to the device object which contains the partition (when bio structure represents a partition)\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n
probe::ioblock_trace.request — \n Fires just as a generic block I/O request is created for a bio.\n-
ioblock_trace.request
ino
\n+
ioblock_trace.request
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
ino
\n i-node number of the mapped file\n-
devname
\n- block device name\n-
bdev
\n- target block device\n-
q
\n- request queue on which this bio was queued.\n+
rw
\n+ binary trace for read/write request\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n+
bdev
\n+ target block device\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n
idx
\n offset into the bio vector array\n phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
sector
\n- beginning sector for the entire bio\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
bytes_done
\n- number of bytes transferred\n-
opf
\n- operations and flags\n-
rw
\n- binary trace for read/write request\n
size
\n total size in bytes\n+
bytes_done
\n+ number of bytes transferred\n+
devname
\n+ block device name\n+
sector
\n+ beginning sector for the entire bio\n+
q
\n+ request queue on which this bio was queued.\n
name
\n name of the probe point\n+
opf
\n+ operations and flags\n
probe::ioscheduler.elv_add_request.kp — \n kprobe based probe to indicate that a request was added to the request queue\n-
ioscheduler.elv_add_request.kp
disk_major
\n+
ioscheduler.elv_add_request.kp
elevator_name
\n+ The type of I/O elevator currently enabled\n+
disk_major
\n Disk major number of the request\n-
rq
\n- Address of the request\n+
q
\n+ pointer to request queue\n
disk_minor
\n Disk minor number of the request\n-
name
\n- Name of the probe point\n
rq_flags
\n Request flags\n-
q
\n- pointer to request queue\n-
elevator_name
\n- The type of I/O elevator currently enabled\n+
rq
\n+ Address of the request\n+
name
\n+ Name of the probe point\n
probe::ioscheduler.elv_add_request.tp — \n tracepoint based probe to indicate a request is added to the request queue.\n-
ioscheduler.elv_add_request.tp
q
\n- Pointer to request queue.\n-
name
\n- Name of the probe point\n-
rq_flags
\n- Request flags.\n+
ioscheduler.elv_add_request.tp
disk_major
\n+ Disk major no of request.\n
elevator_name
\n The type of I/O elevator currently enabled.\n-
disk_major
\n- Disk major no of request.\n+
rq_flags
\n+ Request flags.\n+
name
\n+ Name of the probe point\n
rq
\n Address of request.\n+
q
\n+ Pointer to request queue.\n
disk_minor
\n Disk minor number of request.\n
probe::ioscheduler.elv_add_request — \n probe to indicate request is added to the request queue.\n-
ioscheduler.elv_add_request
disk_minor
\n+
ioscheduler.elv_add_request
elevator_name
\n+ The type of I/O elevator currently enabled.\n+
disk_major
\n+ Disk major no of request.\n+
q
\n+ Pointer to request queue.\n+
disk_minor
\n Disk minor number of request.\n
rq
\n Address of request.\n-
disk_major
\n- Disk major no of request.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n
rq_flags
\n Request flags.\n-
q
\n- Pointer to request queue.\n
probe::ioscheduler.elv_completed_request — \n Fires when a request is completed\n
ioscheduler.elv_completed_request
disk_minor
\n Disk minor number of the request\n-
rq
\n- Address of the request\n-
disk_major
\n- Disk major number of the request\n
elevator_name
\n The type of I/O elevator currently enabled\n
name
\n Name of the probe point\n+
rq
\n+ Address of the request\n+
disk_major
\n+ Disk major number of the request\n
rq_flags
\n Request flags\n
probe::ioscheduler.elv_next_request.return — \n Fires when a request retrieval issues a return signal\n-
ioscheduler.elv_next_request.return
probe::ioscheduler.elv_next_request — \n Fires when a request is retrieved from the request queue\n-
ioscheduler.elv_next_request
elevator_name
\n- The type of I/O elevator currently enabled\n-
name
\n+
ioscheduler.elv_next_request
probe::ioscheduler_trace.elv_abort_request — \n Fires when a request is aborted.\n
ioscheduler_trace.elv_abort_request
name
\n Name of the probe point\n-
rq_flags
\n- Request flags.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n-
disk_major
\n- Disk major no of request.\n
rq
\n Address of request.\n+
rq_flags
\n+ Request flags.\n
disk_minor
\n Disk minor number of request.\n+
disk_major
\n+ Disk major no of request.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n
probe::ioscheduler_trace.elv_completed_request — \n Fires when a request is\n-
ioscheduler_trace.elv_completed_request
disk_major
\n- Disk major no of request.\n-
disk_minor
\n- Disk minor number of request.\n+
ioscheduler_trace.elv_completed_request
probe::ioscheduler_trace.elv_issue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_issue_request
disk_major
\n+
ioscheduler_trace.elv_issue_request
elevator_name
\n+ The type of I/O elevator currently enabled.\n+
disk_major
\n Disk major no of request.\n
disk_minor
\n Disk minor number of request.\n-
rq
\n- Address of request.\n-
name
\n- Name of the probe point\n
rq_flags
\n Request flags.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n+
name
\n+ Name of the probe point\n+
rq
\n+ Address of request.\n
probe::ioscheduler_trace.elv_requeue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_requeue_request
rq_flags
\n- Request flags.\n-
name
\n- Name of the probe point\n+
ioscheduler_trace.elv_requeue_request
probe::ioscheduler_trace.plug — \n Fires when a request queue is plugged;\n-
ioscheduler_trace.plug
probe::ipmib.ForwDatagrams — \n Count forwarded packet\n-
ipmib.ForwDatagrams
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.ForwDatagrams
probe::ipmib.FragFails — \n Count datagram fragmented unsuccessfully\n-
ipmib.FragFails
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.FragFails
probe::ipmib.InAddrErrors — \n Count arriving packets with an incorrect address\n-
ipmib.InAddrErrors
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.InAddrErrors
probe::ipmib.InNoRoutes — \n Count an arriving packet with no matching socket\n-
ipmib.InNoRoutes
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.InNoRoutes
probe::ipmib.InUnknownProtos — \n Count arriving packets with an unbound proto\n-
ipmib.InUnknownProtos
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.InUnknownProtos
probe::ipmib.ReasmTimeout — \n Count Reassembly Timeouts\n-
ipmib.ReasmTimeout
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.ReasmTimeout
probe::irq_handler.entry — \n Execution of interrupt handler starting\n-
irq_handler.entry
thread_flags
\n- Flags related to thread\n-
irq
\n- irq number\n-
thread
\n- thread pointer for threaded interrupts\n+
irq_handler.entry
dev_id
\n+ Cookie to identify device\n
flags
\n Flags for IRQ handler\n-
dev_id
\n- Cookie to identify device\n-
dir
\n- pointer to the proc/irq/NN/name entry\n-
thread_fn
\n- interrupt handler function for threaded interrupts\n+
handler
\n+ interrupt handler function\n+
next_irqaction
\n+ pointer to next irqaction for shared interrupts\n
flags_str
\n symbolic string representation of IRQ flags\n
dev_name
\n name of device\n-
handler
\n- interrupt handler function\n
action
\n struct irqaction* for this interrupt num\n-
next_irqaction
\n- pointer to next irqaction for shared interrupts\n+
thread_flags
\n+ Flags related to thread\n+
irq
\n+ irq number\n+
thread_fn
\n+ interrupt handler function for threaded interrupts\n+
dir
\n+ pointer to the proc/irq/NN/name entry\n+
thread
\n+ thread pointer for threaded interrupts\n
probe::irq_handler.exit — \n Execution of interrupt handler completed\n-
irq_handler.exit
next_irqaction
\n- pointer to next irqaction for shared interrupts\n-
action
\n- struct irqaction*\n-
handler
\n- interrupt handler function that was executed\n-
dev_name
\n- name of device\n-
ret
\n- return value of the handler\n+
irq_handler.exit
thread
\n+ thread pointer for threaded interrupts\n
thread_fn
\n interrupt handler function for threaded interrupts\n-
flags_str
\n- symbolic string representation of IRQ flags\n-
flags
\n- flags for IRQ handler\n-
thread
\n- thread pointer for threaded interrupts\n
dir
\n pointer to the proc/irq/NN/name entry\n-
dev_id
\n- Cookie to identify device\n
irq
\n interrupt number\n
thread_flags
\n Flags related to thread\n+
flags_str
\n+ symbolic string representation of IRQ flags\n+
dev_name
\n+ name of device\n+
action
\n+ struct irqaction*\n+
ret
\n+ return value of the handler\n+
next_irqaction
\n+ pointer to next irqaction for shared interrupts\n+
dev_id
\n+ Cookie to identify device\n+
handler
\n+ interrupt handler function that was executed\n+
flags
\n+ flags for IRQ handler\n
probe::json_data — \n Fires whenever JSON data is wanted by a reader.\n
json_data
\n This probe fires when the JSON data is about to be read. This\n probe must gather up data and then call the following macros to\n- output the data in JSON format. First, json_output_data_start
()\n+ output the data in JSON format. First, @json_output_data_start
\n must be called. That call is followed by one or more of the\n following (one call for each data item):\n- json_output_string_value
(), json_output_numeric_value
(),\n- json_output_array_string_value
(), and\n- json_output_array_numeric_value
(). Finally json_output_data_end
()\n+ @json_output_string_value
, @json_output_numeric_value
,\n+ @json_output_array_string_value
, and\n+ @json_output_array_numeric_value
. Finally @json_output_data_end
\n must be called. \n
probe::kprocess.create — \n Fires whenever a new process or thread is successfully created\n-
kprocess.create
new_tid
\n- The TID of the newly created task\n-
new_pid
\n+
kprocess.create
probe::kprocess.exec_complete — \n Return from exec to a new program\n
kprocess.exec_complete
retstr
\n A string representation of errno (SystemTap v2.5+)\n-
errno
\n- The error number resulting from the exec\n
success
\n A boolean indicating whether the exec was successful\n+
errno
\n+ The error number resulting from the exec\n
name
\n Name of the system call (“execve”) (SystemTap v2.5+)\n
\n On success, the context of the new executable.\n On failure, remains in the context of the caller.\n
\n Fires at the completion of an exec call. Aliased to the\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-kprocess-exec.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-kprocess-exec.html", "comments": ["Ordering differences only"], "unified_diff": "@@ -1,18 +1,18 @@\n
probe::kprocess.exec — \n Attempt to exec to a new program\n
kprocess.exec
filename
\n The path to the new executable\n+
name
\n+ Name of the system call (“execve”) (SystemTap v2.5+)\n
argstr
\n A string containing the filename followed by the\n arguments to pass, excluding 0th arg (SystemTap v2.5+)\n
args
\n The arguments to pass to the new executable, including\n the 0th arg (SystemTap v2.5+)\n-
name
\n- Name of the system call (“execve”) (SystemTap v2.5+)\n
probe::kprocess.release — \n Process released\n
kprocess.release
pid
\n Same as released_pid
for compatibility (deprecated)\n-
task
\n- A task handle to the process being released\n
released_tid
\n TID of the task being released\n
released_pid
\n PID of the process being released\n+
task
\n+ A task handle to the process being released\n
\n The context of the parent, if it wanted notification of this process'\n termination, else the context of the process itself.\n
\n Fires when a process is released from the kernel. This always follows a\n kprocess.exit, though it may be delayed somewhat if the process waits in a\n zombie state.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-linuxmib-ListenDrops.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-linuxmib-ListenDrops.html", "unified_diff": "@@ -1,12 +1,12 @@\n
probe::linuxmib.ListenDrops — \n Count of times conn request that were dropped\n-
linuxmib.ListenDrops
sk
\n- Pointer to the struct sock being acted on\n-
op
\n+
linuxmib.ListenDrops
probe::netdev.change_mac — \n Called when the netdev_name has the MAC changed\n-
netdev.change_mac
probe::netdev.change_rx_flag — \n Called when the device RX flag will be changed\n-
netdev.change_rx_flag
probe::netdev.hard_transmit — \n Called when the devices is going to TX (hard)\n
netdev.hard_transmit
length
\n The length of the transmit buffer.\n-
dev_name
\n- The device scheduled to transmit\n-
protocol
\n- The protocol used in the transmission\n
truesize
\n The size of the data to be transmitted.\n+
protocol
\n+ The protocol used in the transmission\n+
dev_name
\n+ The device scheduled to transmit\n
probe::netdev.ioctl — \n Called when the device suffers an IOCTL\n-
netdev.ioctl
probe::netdev.receive — \n Data received from network device.\n-
netdev.receive
probe::netdev.set_promiscuity — \n Called when the device enters/leaves promiscuity\n-
netdev.set_promiscuity
probe::netdev.transmit — \n Network device transmitting buffer\n-
netdev.transmit
probe::netfilter.arp.forward — \n - Called for each ARP packet to be forwarded\n-
netfilter.arp.forward
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
pf
\n- Protocol family -- always “arp”\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
nf_repeat
\n+
netfilter.arp.forward
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
ar_pro
\n- Format of protocol address\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
ar_data
\n- Address of ARP packet data region (after the header)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
arphdr
\n- Address of ARP header\n
ar_sip
\n Ethernet+IP only (ar_pro==0x800): source IP address\n-
data_str
\n- A string representing the packet buffer contents\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n
nf_queue
\n Constant used to signify a 'queue' verdict\n-
ar_op
\n- ARP opcode (command)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
ar_pln
\n- Length of protocol address\n
ar_tha
\n Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
ar_pln
\n+ Length of protocol address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
data_str
\n+ A string representing the packet buffer contents\n+
length
\n+ The length of the packet buffer contents, in bytes\n
ar_sha
\n Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
ar_hrd
\n+ Format of hardware address\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
indev
\n Address of net_device representing input device, 0 if unknown\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
arphdr
\n+ Address of ARP header\n+
ar_pro
\n+ Format of protocol address\n+
pf
\n+ Protocol family -- always “arp”\n
ar_hln
\n Length of hardware address\n-
ar_hrd
\n- Format of hardware address\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
ar_op
\n+ ARP opcode (command)\n
probe::netfilter.arp.in — \n - Called for each incoming ARP packet\n-
netfilter.arp.in
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
data_str
\n- A string representing the packet buffer contents\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
netfilter.arp.in
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
pf
\n+ Protocol family -- always “arp”\n+
arphdr
\n+ Address of ARP header\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
ar_op
\n- ARP opcode (command)\n-
ar_pln
\n- Length of protocol address\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
ar_pro
\n+ Format of protocol address\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n
ar_hln
\n Length of hardware address\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
ar_op
\n+ ARP opcode (command)\n
ar_hrd
\n Format of hardware address\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
ar_data
\n+ Address of ARP packet data region (after the header)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n
nf_accept
\n Constant used to signify an 'accept' verdict\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
pf
\n- Protocol family -- always “arp”\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
ar_pln
\n+ Length of protocol address\n+
data_str
\n+ A string representing the packet buffer contents\n+
length
\n+ The length of the packet buffer contents, in bytes\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
ar_pro
\n- Format of protocol address\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
arphdr
\n- Address of ARP header\n-
ar_data
\n- Address of ARP packet data region (after the header)\n-
length
\n- The length of the packet buffer contents, in bytes\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
probe::netfilter.arp.out — \n - Called for each outgoing ARP packet\n-
netfilter.arp.out
pf
\n- Protocol family -- always “arp”\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
ar_pro
\n- Format of protocol address\n-
outdev
\n+
netfilter.arp.out
outdev
\n Address of net_device representing output device, 0 if unknown\n-
arphdr
\n- Address of ARP header\n-
ar_data
\n- Address of ARP packet data region (after the header)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n
ar_sip
\n Ethernet+IP only (ar_pro==0x800): source IP address\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
ar_pln
\n+ Length of protocol address\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
data_str
\n A string representing the packet buffer contents\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n+
length
\n+ The length of the packet buffer contents, in bytes\n
ar_tha
\n Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n
ar_sha
\n Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
ar_hrd
\n+ Format of hardware address\n+
ar_hln
\n+ Length of hardware address\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n
ar_op
\n ARP opcode (command)\n-
ar_pln
\n- Length of protocol address\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
ar_hln
\n- Length of hardware address\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
ar_hrd
\n- Format of hardware address\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
arphdr
\n+ Address of ARP header\n+
ar_pro
\n+ Format of protocol address\n+
pf
\n+ Protocol family -- always “arp”\n
probe::netfilter.bridge.forward — \n Called on an incoming bridging packet destined for some other computer\n-
netfilter.bridge.forward
indev_name
\n+
netfilter.bridge.forward
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
br_rid
\n+ Identity of root bridge\n+
indev_name
\n Name of network device packet was received on (if known)\n-
br_fd
\n- Forward delay in 1/256 secs\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
br_max
\n- Max age in 1/256 secs\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
br_mac
\n- Bridge MAC address\n-
protocol
\n- Packet protocol\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
br_msg
\n- Message age in 1/256 secs\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
br_prid
\n Protocol identifier\n-
br_rid
\n- Identity of root bridge\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
br_rmac
\n+ Root bridge MAC address\n+
br_bid
\n+ Identity of bridge\n
nf_queue
\n Constant used to signify a 'queue' verdict\n-
br_flags
\n- BPDU flags\n-
br_poid
\n- Port identifier\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_vid
\n- Protocol version identifier\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
data_str
\n- A string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n-
brhdr
\n- Address of bridge header\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_bid
\n- Identity of bridge\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_max
\n+ Max age in 1/256 secs\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
br_type
\n BPDU type\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
br_flags
\n+ BPDU flags\n+
data_str
\n+ A string representing the packet buffer contents\n
br_htime
\n Hello time in 1/256 secs\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
br_rmac
\n- Root bridge MAC address\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
br_vid
\n+ Protocol version identifier\n+
br_poid
\n+ Port identifier\n+
protocol
\n+ Packet protocol\n+
br_fd
\n+ Forward delay in 1/256 secs\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
pf
\n Protocol family -- always “bridge”\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_mac
\n+ Bridge MAC address\n+
brhdr
\n+ Address of bridge header\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
probe::netfilter.bridge.local_in — \n Called on a bridging packet destined for the local computer\n-
netfilter.bridge.local_in
br_rid
\n- Identity of root bridge\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
netfilter.bridge.local_in
br_mac
\n+ Bridge MAC address\n+
brhdr
\n+ Address of bridge header\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
br_msg
\n- Message age in 1/256 secs\n-
br_prid
\n- Protocol identifier\n-
data_str
\n- A string representing the packet buffer contents\n+
pf
\n+ Protocol family -- always “bridge”\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
br_fd
\n+ Forward delay in 1/256 secs\n
br_poid
\n Port identifier\n+
protocol
\n+ Packet protocol\n+
br_vid
\n+ Protocol version identifier\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_htime
\n+ Hello time in 1/256 secs\n
br_flags
\n BPDU flags\n
llcpdu
\n Address of LLC Protocol Data Unit\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_vid
\n- Protocol version identifier\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
br_cost
\n- Total cost from transmitting bridge to root\n+
br_type
\n+ BPDU type\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
br_max
\n Max age in 1/256 secs\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
br_fd
\n- Forward delay in 1/256 secs\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
br_mac
\n- Bridge MAC address\n-
protocol
\n- Packet protocol\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
br_bid
\n Identity of bridge\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
br_prid
\n+ Protocol identifier\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
br_msg
\n+ Message age in 1/256 secs\n
br_rmac
\n Root bridge MAC address\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
pf
\n- Protocol family -- always “bridge”\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_type
\n- BPDU type\n-
length
\n- The length of the packet buffer contents, in bytes\n-
brhdr
\n- Address of bridge header\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n+
br_rid
\n+ Identity of root bridge\n
probe::netfilter.bridge.local_out — \n Called on a bridging packet coming from a local process\n-
netfilter.bridge.local_out
outdev
\n+
netfilter.bridge.local_out
br_rmac
\n+ Root bridge MAC address\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
br_prid
\n+ Protocol identifier\n+
outdev
\n Address of net_device representing output device, 0 if unknown\n-
brhdr
\n- Address of bridge header\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_bid
\n+ Identity of bridge\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
br_rid
\n+ Identity of root bridge\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n
length
\n The length of the packet buffer contents, in bytes\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_flags
\n+ BPDU flags\n
br_htime
\n Hello time in 1/256 secs\n-
br_type
\n- BPDU type\n-
pf
\n- Protocol family -- always “bridge”\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_max
\n+ Max age in 1/256 secs\n
llcproto_stp
\n Constant used to signify Bridge Spanning Tree Protocol packet\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
br_rmac
\n- Root bridge MAC address\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
br_bid
\n- Identity of bridge\n+
br_type
\n+ BPDU type\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
br_poid
\n+ Port identifier\n
protocol
\n Packet protocol\n-
br_mac
\n- Bridge MAC address\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n
br_fd
\n Forward delay in 1/256 secs\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
br_max
\n- Max age in 1/256 secs\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n
br_vid
\n Protocol version identifier\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_poid
\n- Port identifier\n-
br_flags
\n- BPDU flags\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
data_str
\n- A string representing the packet buffer contents\n-
br_prid
\n- Protocol identifier\n-
br_msg
\n- Message age in 1/256 secs\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
brhdr
\n+ Address of bridge header\n+
br_mac
\n+ Bridge MAC address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
pf
\n+ Protocol family -- always “bridge”\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_rid
\n- Identity of root bridge\n
probe::netfilter.bridge.post_routing — \n - Called before a bridging packet hits the wire\n-
netfilter.bridge.post_routing
length
\n- The length of the packet buffer contents, in bytes\n-
brhdr
\n- Address of bridge header\n+
netfilter.bridge.post_routing
br_rmac
\n+ Root bridge MAC address\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
br_msg
\n+ Message age in 1/256 secs\n
outdev
\n Address of net_device representing output device, 0 if unknown\n+
br_prid
\n+ Protocol identifier\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
br_bid
\n Identity of bridge\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_type
\n- BPDU type\n-
br_rmac
\n- Root bridge MAC address\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
br_rid
\n+ Identity of root bridge\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
pf
\n- Protocol family -- always “bridge”\n
indev_name
\n Name of network device packet was received on (if known)\n-
br_fd
\n- Forward delay in 1/256 secs\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
br_cost
\n- Total cost from transmitting bridge to root\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_htime
\n+ Hello time in 1/256 secs\n+
br_flags
\n+ BPDU flags\n+
length
\n+ The length of the packet buffer contents, in bytes\n
br_max
\n Max age in 1/256 secs\n-
br_mac
\n- Bridge MAC address\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_type
\n+ BPDU type\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
protocol
\n Packet protocol\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
br_msg
\n- Message age in 1/256 secs\n-
br_prid
\n- Protocol identifier\n-
br_rid
\n- Identity of root bridge\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
br_flags
\n- BPDU flags\n
br_poid
\n Port identifier\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n+
br_fd
\n+ Forward delay in 1/256 secs\n
br_vid
\n Protocol version identifier\n-
data_str
\n- A string representing the packet buffer contents\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
brhdr
\n+ Address of bridge header\n+
br_mac
\n+ Bridge MAC address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
pf
\n+ Protocol family -- always “bridge”\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
probe::netfilter.bridge.pre_routing — \n - Called before a bridging packet is routed\n-
netfilter.bridge.pre_routing
br_rid
\n- Identity of root bridge\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
netfilter.bridge.pre_routing
br_prid
\n+ Protocol identifier\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
br_msg
\n Message age in 1/256 secs\n-
br_prid
\n- Protocol identifier\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
br_rmac
\n+ Root bridge MAC address\n+
br_bid
\n+ Identity of bridge\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
br_rid
\n+ Identity of root bridge\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n
data_str
\n A string representing the packet buffer contents\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_poid
\n- Port identifier\n
br_flags
\n BPDU flags\n-
br_vid
\n- Protocol version identifier\n+
br_htime
\n+ Hello time in 1/256 secs\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n
br_max
\n Max age in 1/256 secs\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
br_type
\n+ BPDU type\n+
br_poid
\n+ Port identifier\n+
protocol
\n+ Packet protocol\n
br_fd
\n Forward delay in 1/256 secs\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
br_vid
\n+ Protocol version identifier\n
br_mac
\n Bridge MAC address\n-
protocol
\n- Packet protocol\n-
br_bid
\n- Identity of bridge\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
br_rmac
\n- Root bridge MAC address\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
brhdr
\n+ Address of bridge header\n
outdev_name
\n Name of network device packet will be routed to (if known)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
pf
\n Protocol family -- always “bridge”\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n-
br_htime
\n- Hello time in 1/256 secs\n-
br_type
\n- BPDU type\n-
length
\n- The length of the packet buffer contents, in bytes\n-
brhdr
\n- Address of bridge header\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n
probe::netfilter.ip.forward — \n Called on an incoming IP packet addressed to some other computer\n-
netfilter.ip.forward
daddr
\n- A string representing the destination IP address\n+
netfilter.ip.forward
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
family
\n IP address family\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n
length
\n The length of the packet buffer contents, in bytes\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
iphdr
\n- Address of IP header\n+
data_str
\n+ A string representing the packet buffer contents\n
ipproto_udp
\n Constant used to signify that the packet protocol is UDP\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n
sport
\n TCP or UDP source port (ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n
protocol
\n Packet protocol from driver (ipv4 only)\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n
dport
\n TCP or UDP destination port (ipv4 only)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
saddr
\n- A string representing the source IP address\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
data_str
\n- A string representing the packet buffer contents\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
fin
\n TCP FIN flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
iphdr
\n+ Address of IP header\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
daddr
\n+ A string representing the destination IP address\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
saddr
\n+ A string representing the source IP address\n
probe::netfilter.ip.local_in — \n Called on an incoming IP packet addressed to the local computer\n-
netfilter.ip.local_in
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n+
netfilter.ip.local_in
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
sport
\n TCP or UDP source port (ipv4 only)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
iphdr
\n- Address of IP header\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
family
\n- IP address family\n-
daddr
\n- A string representing the destination IP address\n-
length
\n- The length of the packet buffer contents, in bytes\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
data_str
\n- A string representing the packet buffer contents\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
iphdr
\n+ Address of IP header\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
saddr
\n- A string representing the source IP address\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n
indev
\n Address of net_device representing input device, 0 if unknown\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
saddr
\n+ A string representing the source IP address\n+
daddr
\n+ A string representing the destination IP address\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
indev_name
\n Name of network device packet was received on (if known)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
nf_accept
\n Constant used to signify an 'accept' verdict\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n
psh
\n TCP PSH flag (if protocol is TCP; ipv4 only)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
family
\n+ IP address family\n+
data_str
\n+ A string representing the packet buffer contents\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
probe::netfilter.ip.local_out — \n Called on an outgoing IP packet\n-
netfilter.ip.local_out
protocol
\n- Packet protocol from driver (ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
data_str
\n- A string representing the packet buffer contents\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n+
netfilter.ip.local_out
daddr
\n+ A string representing the destination IP address\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
saddr
\n A string representing the source IP address\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
iphdr
\n+ Address of IP header\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
daddr
\n- A string representing the destination IP address\n-
family
\n- IP address family\n-
length
\n- The length of the packet buffer contents, in bytes\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n
sport
\n TCP or UDP source port (ipv4 only)\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
ipproto_udp
\n Constant used to signify that the packet protocol is UDP\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
family
\n+ IP address family\n+
data_str
\n+ A string representing the packet buffer contents\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
iphdr
\n- Address of IP header\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
probe::netfilter.ip.post_routing — \n Called immediately before an outgoing IP packet leaves the computer\n-
netfilter.ip.post_routing
iphdr
\n- Address of IP header\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
sport
\n- TCP or UDP source port (ipv4 only)\n+
netfilter.ip.post_routing
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
indev_name
\n+ Name of network device packet was received on (if known)\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
data_str
\n+ A string representing the packet buffer contents\n+
family
\n+ IP address family\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n
rst
\n TCP RST flag (if protocol is TCP; ipv4 only)\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n-
length
\n- The length of the packet buffer contents, in bytes\n-
family
\n- IP address family\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
saddr
\n+ A string representing the source IP address\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
daddr
\n A string representing the destination IP address\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
saddr
\n- A string representing the source IP address\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n+
iphdr
\n+ Address of IP header\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n-
data_str
\n- A string representing the packet buffer contents\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
indev
\n Address of net_device representing input device, 0 if unknown\n
probe::netfilter.ip.pre_routing — \n Called before an IP packet is routed\n-
netfilter.ip.pre_routing
iphdr
\n- Address of IP header\n+
netfilter.ip.pre_routing
indev_name
\n+ Name of network device packet was received on (if known)\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
pf
\n- Protocol family - either 'ipv4' or 'ipv6'\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
data_str
\n+ A string representing the packet buffer contents\n+
family
\n+ IP address family\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n
ipproto_udp
\n Constant used to signify that the packet protocol is UDP\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n-
daddr
\n- A string representing the destination IP address\n-
family
\n- IP address family\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
saddr
\n- A string representing the source IP address\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
iphdr
\n+ Address of IP header\n+
pf
\n+ Protocol family - either 'ipv4' or 'ipv6'\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n
fin
\n TCP FIN flag (if protocol is TCP; ipv4 only)\n-
data_str
\n- A string representing the packet buffer contents\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n+
saddr
\n+ A string representing the source IP address\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
daddr
\n+ A string representing the destination IP address\n
probe::nfs.aop.readahead — \n NFS client reading multiple pages\n-
nfs.aop.readahead
rsize
\n- read size (in bytes)\n-
file
\n- filp argument\n+
nfs.aop.readahead
nr_pages
\n+ number of pages attempted to read in this execution\n
size
\n number of pages attempted to read in this execution\n
rpages
\n read size (in pages)\n-
dev
\n- device identifier\n-
nr_pages
\n- number of pages attempted to read in this execution\n
ino
\n inode number\n+
file
\n+ filp argument\n+
dev
\n+ device identifier\n+
rsize
\n+ read size (in bytes)\n
probe::nfs.aop.readpage — \n NFS client synchronously reading a page\n-
nfs.aop.readpage
dev
\n- device identifier\n+
nfs.aop.readpage
i_size
\n+ file length in bytes\n+
sb_flag
\n+ super block flags\n
size
\n number of pages to be read in this execution \n-
i_size
\n- file length in bytes\n-
file
\n- file argument\n+
dev
\n+ device identifier\n
rsize
\n read size (in bytes)\n-
sb_flag
\n- super block flags\n-
ino
\n- inode number\n-
page_index
\n- offset within mapping, can used a page identifier\n- and position identifier in the page frame\n
i_flag
\n file flags\n
__page
\n the address of page\n+
page_index
\n+ offset within mapping, can used a page identifier\n+ and position identifier in the page frame\n+
ino
\n+ inode number\n+
file
\n+ file argument\n
probe::nfs.aop.readpages — \n NFS client reading multiple pages\n-
nfs.aop.readpages
rsize
\n- read size (in bytes)\n-
file
\n- filp argument\n-
size
\n+
nfs.aop.readpages
size
\n number of pages attempted to read in this execution\n-
rpages
\n- read size (in pages)\n-
dev
\n- device identifier\n
nr_pages
\n number of pages attempted to read in this execution\n+
rpages
\n+ read size (in pages)\n+
file
\n+ filp argument\n
ino
\n inode number \n+
dev
\n+ device identifier\n+
rsize
\n+ read size (in bytes)\n
probe::nfs.aop.release_page — \n NFS client releasing page\n-
nfs.aop.release_page
__page
\n- the address of page\n-
size
\n- release pages\n+
nfs.aop.release_page
probe::nfs.aop.set_page_dirty — \n NFS client marking page as dirty\n-
nfs.aop.set_page_dirty
probe::nfs.aop.write_begin — \n NFS client begin to write data\n-
nfs.aop.write_begin
to
\n- end address of this write operation \n+
nfs.aop.write_begin
ino
\n+ inode number \n+
page_index
\n+ offset within mapping, can used a page identifier\n+ and position identifier in the page frame\n
__page
\n the address of page\n+
dev
\n+ device identifier\n
size
\n write bytes\n-
page_index
\n- offset within mapping, can used a page identifier\n- and position identifier in the page frame\n-
ino
\n- inode number \n+
to
\n+ end address of this write operation \n
offset
\n start address of this write operation \n-
dev
\n- device identifier\n
\n Occurs when write operation occurs on nfs. It prepare a page for writing,\n look for a request corresponding to the page. If there\n is one, and it belongs to another file, it flush it out\n before it tries to copy anything into the page. \n Also do the same if it finds a request from an existing\n dropped page\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "unified_diff": "@@ -1,27 +1,27 @@\n
probe::nfs.aop.write_end — \n NFS client complete writing data\n-
nfs.aop.write_end
i_size
\n- file length in bytes\n+
nfs.aop.write_end
i_flag
\n+ file flags\n
dev
\n device identifier\n-
offset
\n- start address of this write operation\n-
i_flag
\n- file flags\n-
ino
\n- inode number\n
page_index
\n offset within mapping, can used a page identifier and position identifier in the page frame\n-
size
\n- write bytes\n+
ino
\n+ inode number\n
__page
\n the address of page\n+
offset
\n+ start address of this write operation\n+
size
\n+ write bytes\n
sb_flag
\n super block flags\n+
i_size
\n+ file length in bytes\n
to
\n end address of this write operation\n
\n Fires when do a write operation on nfs,\n often after prepare_write\n
\n \n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-writepage.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-writepage.html", "unified_diff": "@@ -1,33 +1,33 @@\n
probe::nfs.aop.writepage — \n NFS client writing a mapped page to the NFS server\n-
nfs.aop.writepage
i_state
\n- inode state flags\n+
nfs.aop.writepage
for_reclaim
\n+ a flag of writeback_control,\n+ indicates if it's invoked from the page allocator\n+
dev
\n+ device identifier\n+
i_flag
\n+ file flags\n+
__page
\n+ the address of page\n+
wsize
\n+ write size\n
page_index
\n offset within mapping,\n can used a page identifier and position identifier in the page frame\n
ino
\n inode number \n-
i_flag
\n- file flags\n+
i_state
\n+ inode state flags\n
for_kupdate
\n a flag of writeback_control,\n indicates if it's a kupdate writeback\n-
i_size
\n- file length in bytes\n-
dev
\n- device identifier\n-
for_reclaim
\n- a flag of writeback_control,\n- indicates if it's invoked from the page allocator\n-
__page
\n- the address of page\n-
wsize
\n- write size\n-
sb_flag
\n- super block flags\n
size
\n number of pages to be written in this execution\n+
sb_flag
\n+ super block flags\n+
i_size
\n+ file length in bytes\n
probe::nfs.aop.writepages — \n NFS client writing several dirty pages to the NFS server\n-
nfs.aop.writepages
wsize
\n- write size\n-
wpages
\n- write size (in pages)\n-
nr_to_write
\n- number of pages attempted to be written in this execution\n-
for_reclaim
\n+
nfs.aop.writepages
for_reclaim
\n a flag of writeback_control,\n indicates if it's invoked from the page allocator\n-
size
\n+
nr_to_write
\n number of pages attempted to be written in this execution\n-
ino
\n- inode number\n
dev
\n device identifier\n+
wsize
\n+ write size\n+
ino
\n+ inode number\n+
wpages
\n+ write size (in pages)\n
for_kupdate
\n a flag of writeback_control,\n indicates if it's a kupdate writeback\n+
size
\n+ number of pages attempted to be written in this execution\n
probe::nfs.fop.aio_read — \n NFS client aio_read file operation\n-
nfs.fop.aio_read
ino
\n- inode number \n-
buf
\n- the address of buf in user space\n+
nfs.fop.aio_read
pos
\n+ current position of file \n
cache_time
\n when we started read-caching this inode\n-
count
\n- read bytes\n+
dev
\n+ device identifier\n
cache_valid
\n cache related bit mask flag\n
file_name
\n file name\n-
pos
\n- current position of file \n-
dev
\n- device identifier\n+
buf
\n+ the address of buf in user space\n
parent_name
\n parent dir name\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n+
count
\n+ read bytes\n+
ino
\n+ inode number \n
probe::nfs.fop.aio_write — \n NFS client aio_write file operation\n-
nfs.fop.aio_write
parent_name
\n- parent dir name\n-
pos
\n- offset of the file \n-
dev
\n- device identifier\n-
buf
\n- the address of buf in user space\n-
count
\n+
nfs.fop.aio_write
probe::nfs.fop.flush — \n NFS client flush file operation\n-
nfs.fop.flush
probe::nfs.fop.fsync — \n NFS client fsync operation\n-
nfs.fop.fsync
probe::nfs.fop.lock — \n NFS client file lock operation\n-
nfs.fop.lock
cmd
\n+
nfs.fop.lock
fl_end
\n+ ending offset of locked region\n+
fl_flag
\n+ lock flags\n+
cmd
\n cmd arguments\n-
ino
\n- inode number\n
fl_start
\n starting offset of locked region\n-
dev
\n- device identifier\n-
i_mode
\n- file type and access rights\n-
fl_flag
\n- lock flags\n-
fl_end
\n- ending offset of locked region\n
fl_type
\n lock type\n+
i_mode
\n+ file type and access rights\n+
dev
\n+ device identifier\n+
ino
\n+ inode number\n
probe::nfs.fop.mmap — \n NFS client mmap operation\n-
nfs.fop.mmap
vm_end
\n+
nfs.fop.mmap
parent_name
\n+ parent dir name\n+
attrtimeo
\n+ how long the cached information is assumed to be valid.\n+ We need to revalidate the cached attrs for this inode \n+ if jiffies - read_cache_jiffies > attrtimeo.\n+
cache_valid
\n+ cache related bit mask flag\n+
file_name
\n+ file name\n+
buf
\n+ the address of buf in user space\n+
vm_end
\n the first byte after end address within vm_mm\n+
vm_flag
\n+ vm flags\n
ino
\n inode number \n-
buf
\n- the address of buf in user space\n-
file_name
\n- file name\n
cache_time
\n when we started read-caching this inode\n-
cache_valid
\n- cache related bit mask flag\n-
vm_flag
\n- vm flags\n-
dev
\n- device identifier\n
vm_start
\n start address within vm_mm \n-
parent_name
\n- parent dir name\n-
attrtimeo
\n- how long the cached information is assumed to be valid.\n- We need to revalidate the cached attrs for this inode \n- if jiffies - read_cache_jiffies > attrtimeo.\n+
dev
\n+ device identifier\n
probe::nfs.fop.open — \n NFS client file open operation\n-
nfs.fop.open
probe::nfs.fop.read_iter — \n NFS client read_iter file operation\n-
nfs.fop.read_iter
cache_time
\n- when we started read-caching this inode\n-
count
\n- read bytes\n-
cache_valid
\n+
nfs.fop.read_iter
cache_valid
\n cache related bit mask flag\n-
file_name
\n- file name\n-
ino
\n- inode number \n-
attrtimeo
\n- how long the cached information is assumed to be valid.\n- We need to revalidate the cached attrs for this inode\n- if jiffies - read_cache_jiffies > attrtimeo.\n-
dev
\n- device identifier\n
pos
\n current position of file \n+
cache_time
\n+ when we started read-caching this inode\n+
dev
\n+ device identifier\n
parent_name
\n parent dir name\n+
attrtimeo
\n+ how long the cached information is assumed to be valid.\n+ We need to revalidate the cached attrs for this inode\n+ if jiffies - read_cache_jiffies > attrtimeo.\n+
count
\n+ read bytes\n+
ino
\n+ inode number \n+
file_name
\n+ file name\n
probe::nfs.fop.release — \n NFS client release page operation\n-
nfs.fop.release
probe::nfs.fop.sendfile — \n NFS client send file operation\n-
nfs.fop.sendfile
attrtimeo
\n+
nfs.fop.sendfile
cache_valid
\n+ cache related bit mask flag\n+
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n
dev
\n device identifier\n-
cache_valid
\n- cache related bit mask flag\n
cache_time
\n when we started read-caching this inode\n-
count
\n- read bytes\n
ppos
\n current position of file\n
ino
\n inode number\n+
count
\n+ read bytes\n
probe::nfs.fop.write_iter — \n NFS client write_iter file operation\n-
nfs.fop.write_iter
probe::nfs.proc.commit_done — \n NFS client response to a commit RPC task\n
nfs.proc.commit_done
version
\n NFS version\n-
server_ip
\n- IP address of server\n-
count
\n- number of bytes committed\n
valid
\n fattr->valid, indicates which fields are valid \n-
prot
\n- transfer protocol\n-
timestamp
\n- V4 timestamp, which is used for lease renewal\n
status
\n result of last operation\n+
timestamp
\n+ V4 timestamp, which is used for lease renewal\n+
prot
\n+ transfer protocol\n+
count
\n+ number of bytes committed\n+
server_ip
\n+ IP address of server\n
probe::nfs.proc.commit_setup — \n NFS client setting up a commit RPC task\n-
nfs.proc.commit_setup
size
\n+
nfs.proc.commit_setup
count
\n bytes in this commit\n+
prot
\n+ transfer protocol\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
prot
\n- transfer protocol\n+
server_ip
\n+ IP address of server\n
offset
\n the file offset\n-
count
\n+
size
\n bytes in this commit\n-
server_ip
\n- IP address of server\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n
version
\n NFS version\n
\n The commit_setup function is used to setup a commit RPC task.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-commit.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-commit.html", "unified_diff": "@@ -1,25 +1,25 @@\n
probe::nfs.proc.commit — \n NFS client committing data on server\n-
nfs.proc.commit
prot
\n- transfer protocol\n+
nfs.proc.commit
size
\n+ read bytes in this execution\n
offset
\n the file offset\n-
server_ip
\n- IP address of server\n+
version
\n+ NFS version\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
version
\n- NFS version\n-
size
\n- read bytes in this execution\n+
prot
\n+ transfer protocol\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
server_ip
\n+ IP address of server\n
\n All the nfs.proc.commit kernel functions were removed in kernel\n commit 200baa in December 2006, so these probes do not exist on Linux\n 2.6.21 and newer kernels.\n
\n \n Fires when client writes the buffered data to disk.\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "unified_diff": "@@ -1,17 +1,17 @@\n
probe::nfs.proc.create — \n NFS client creating file on server\n-
nfs.proc.create
fh
\n- file handle of parent dir\n-
flag
\n- indicates create mode (only for NFSv3 and NFSv4)\n-
prot
\n- transfer protocol\n-
server_ip
\n+
nfs.proc.create
probe::nfs.proc.lookup — \n NFS client opens/searches a file on server\n-
nfs.proc.lookup
bitmask0
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n-
name_len
\n- the length of file name\n-
version
\n- NFS version\n-
server_ip
\n+
nfs.proc.lookup
server_ip
\n IP address of server\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
version
\n+ NFS version\n+
name_len
\n+ the length of file name\n
filename
\n the name of file which client opens/searches on server\n
prot
\n transfer protocol\n+
bitmask0
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n
probe::nfs.proc.open — \n NFS client allocates file read/write context information\n-
nfs.proc.open
version
\n- NFS version (the function is used for all NFS version)\n-
mode
\n+
nfs.proc.open
probe::nfs.proc.read_done — \n NFS client response to a read RPC task\n-
nfs.proc.read_done
server_ip
\n- IP address of server\n+
nfs.proc.read_done
probe::nfs.proc.read_setup — \n NFS client setting up a read RPC task\n-
nfs.proc.read_setup
size
\n- read bytes in this execution\n-
count
\n- read bytes in this execution\n-
offset
\n- the file offset \n+
nfs.proc.read_setup
probe::nfs.proc.read — \n NFS client synchronously reads file from server\n-
nfs.proc.read
prot
\n- transfer protocol\n-
count
\n- read bytes in this execution\n-
offset
\n- the file offset\n+
nfs.proc.read
probe::nfs.proc.release — \n NFS client releases file read/write context information\n-
nfs.proc.release
flag
\n- file flag\n+
nfs.proc.release
server_ip
\n+ IP address of server\n+
prot
\n+ transfer protocol\n
filename
\n file name\n-
server_ip
\n- IP address of server\n-
version
\n- NFS version (the function is used for all NFS version)\n
mode
\n file mode\n-
prot
\n- transfer protocol\n+
version
\n+ NFS version (the function is used for all NFS version)\n+
flag
\n+ file flag\n
probe::nfs.proc.remove — \n NFS client removes a file on server\n-
nfs.proc.remove
probe::nfs.proc.rename_done — \n NFS client response to a rename RPC task\n-
nfs.proc.rename_done
status
\n- result of last operation\n+
nfs.proc.rename_done
old_fh
\n+ file handle of old parent dir\n
timestamp
\n V4 timestamp, which is used for lease renewal\n
prot
\n transfer protocol\n-
old_fh
\n- file handle of old parent dir\n-
new_fh
\n- file handle of new parent dir\n
server_ip
\n IP address of server\n+
new_fh
\n+ file handle of new parent dir\n
version
\n NFS version\n+
status
\n+ result of last operation\n
probe::nfs.proc.rename_setup — \n NFS client setting up a rename RPC task\n-
nfs.proc.rename_setup
prot
\n- transfer protocol\n-
version
\n- NFS version\n-
server_ip
\n+
nfs.proc.rename_setup
probe::nfs.proc.rename — \n NFS client renames a file on server\n-
nfs.proc.rename
prot
\n- transfer protocol\n-
old_fh
\n- file handle of old parent dir\n+
nfs.proc.rename
new_filelen
\n+ length of new file name\n
new_fh
\n file handle of new parent dir\n
server_ip
\n IP address of server\n-
version
\n- NFS version (the function is used for all NFS version)\n-
new_filelen
\n- length of new file name\n+
old_fh
\n+ file handle of old parent dir\n+
prot
\n+ transfer protocol\n
old_filelen
\n length of old file name\n
new_name
\n new file name\n+
version
\n+ NFS version (the function is used for all NFS version)\n
old_name
\n old file name\n
probe::nfs.proc.write_done — \n NFS client response to a write RPC task\n
nfs.proc.write_done
status
\n result of last operation\n-
timestamp
\n- V4 timestamp, which is used for lease renewal\n-
prot
\n- transfer protocol\n-
count
\n- number of bytes written\n
valid
\n fattr->valid, indicates which fields are valid \n-
server_ip
\n- IP address of server\n
version
\n NFS version\n+
server_ip
\n+ IP address of server\n+
count
\n+ number of bytes written\n+
prot
\n+ transfer protocol\n+
timestamp
\n+ V4 timestamp, which is used for lease renewal\n
probe::nfs.proc.write_setup — \n NFS client setting up a write RPC task\n-
nfs.proc.write_setup
version
\n+
nfs.proc.write_setup
offset
\n+ the file offset\n+
size
\n+ bytes written in this execution\n+
version
\n NFS version\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem \n-
server_ip
\n- IP address of server\n-
offset
\n- the file offset\n-
how
\n- used to set args.stable. The stable value could be:\n- NFS_UNSTABLE,NFS_DATA_SYNC,NFS_FILE_SYNC\n- (in nfs.proc3.write_setup and nfs.proc4.write_setup)\n-
count
\n- bytes written in this execution\n-
prot
\n- transfer protocol\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
size
\n+
prot
\n+ transfer protocol\n+
count
\n bytes written in this execution\n+
how
\n+ used to set args.stable. The stable value could be:\n+ NFS_UNSTABLE,NFS_DATA_SYNC,NFS_FILE_SYNC\n+ (in nfs.proc3.write_setup and nfs.proc4.write_setup)\n+
server_ip
\n+ IP address of server\n
probe::nfs.proc.write — \n NFS client synchronously writes file to server\n-
nfs.proc.write
flags
\n- used to set task->tk_flags in rpc_init_task function\n-
bitmask0
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n+
nfs.proc.write
offset
\n+ the file offset\n
size
\n read bytes in this execution\n-
offset
\n- the file offset\n-
prot
\n- transfer protocol\n
version
\n NFS version\n-
server_ip
\n- IP address of server\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
prot
\n+ transfer protocol\n+
bitmask0
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n+
server_ip
\n+ IP address of server\n+
flags
\n+ used to set task->tk_flags in rpc_init_task function\n
probe::nfsd.commit — \n NFS server committing all pending writes to stable storage\n-
nfsd.commit
probe::nfsd.create — \n NFS server creating a file(regular,dir,device,fifo) for client\n
nfsd.create
iap_valid
\n Attribute flags\n-
filelen
\n- the length of file name\n-
type
\n- file type(regular,dir,device,fifo ...)\n
client_ip
\n the ip address of client\n+
type
\n+ file type(regular,dir,device,fifo ...)\n+
filelen
\n+ the length of file name\n
filename
\n file name \n
iap_mode
\n file access mode\n
fh
\n file handle (the first part is the length of the file handle)\n
\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfsd-createv3.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfsd-createv3.html", "unified_diff": "@@ -1,24 +1,24 @@\n
probe::nfsd.createv3 — \n NFS server creating a regular file or set file attributes for client\n-
nfsd.createv3
iap_mode
\n- file access mode\n-
filename
\n- file name \n+
nfsd.createv3
filelen
\n+ the length of file name\n
iap_valid
\n Attribute flags\n-
verifier
\n- file attributes (atime,mtime,mode). It's used to reset file attributes for CREATE_EXCLUSIVE\n-
createmode
\n- create mode .The possible values could be: NFS3_CREATE_EXCLUSIVE, NFS3_CREATE_UNCHECKED, or NFS3_CREATE_GUARDED\n
client_ip
\n the ip address of client\n-
truncp
\n- trunp arguments, indicates if the file shouldbe truncate\n-
filelen
\n- the length of file name\n
fh
\n file handle (the first part is the length of the file handle)\n+
createmode
\n+ create mode .The possible values could be: NFS3_CREATE_EXCLUSIVE, NFS3_CREATE_UNCHECKED, or NFS3_CREATE_GUARDED\n+
truncp
\n+ trunp arguments, indicates if the file shouldbe truncate\n+
verifier
\n+ file attributes (atime,mtime,mode). It's used to reset file attributes for CREATE_EXCLUSIVE\n+
filename
\n+ file name \n+
iap_mode
\n+ file access mode\n
probe::nfsd.dispatch — \n NFS server receives an operation from client\n-
nfsd.dispatch
probe::nfsd.lookup — \n NFS server opening or searching file for a file for client\n-
nfsd.lookup
fh
\n- file handle of parent dir(the first part is the length of the file handle)\n-
filename
\n+
nfsd.lookup
probe::nfsd.open — \n NFS server opening a file for client\n
nfsd.open
type
\n type of file (regular file or dir)\n
client_ip
\n the ip address of client\n-
fh
\n- file handle (the first part is the length of the file handle)\n
access
\n indicates the type of open (read/write/commit/readdir...) \n+
fh
\n+ file handle (the first part is the length of the file handle)\n
probe::nfsd.proc.commit — \n NFS server performing a commit operation for client\n-
nfsd.proc.commit
offset
\n+
nfsd.proc.commit
proto
\n+ transfer protocol\n+
offset
\n the offset of file \n-
uid
\n- requester's user id\n+
version
\n+ nfs version\n
count
\n read bytes\n-
proto
\n- transfer protocol\n+
uid
\n+ requester's user id\n+
client_ip
\n+ the ip address of client\n
fh
\n file handle (the first part is the length of the file handle)\n-
gid
\n- requester's group id\n-
version
\n- nfs version\n
size
\n read bytes\n-
client_ip
\n- the ip address of client\n+
gid
\n+ requester's group id\n
probe::nfsd.proc.create — \n NFS server creating a file for client\n-
nfsd.proc.create
filelen
\n- length of file name\n-
client_ip
\n- the ip address of client\n-
filename
\n+
nfsd.proc.create
filename
\n file name\n-
version
\n- nfs version\n-
proto
\n- transfer protocol\n-
gid
\n- requester's group id\n
fh
\n file handle (the first part is the length of the file handle)\n+
gid
\n+ requester's group id\n
uid
\n requester's user id\n+
client_ip
\n+ the ip address of client\n+
proto
\n+ transfer protocol\n+
filelen
\n+ length of file name\n+
version
\n+ nfs version\n
probe::nfsd.proc.lookup — \n NFS server opening or searching for a file for client\n-
nfsd.proc.lookup
uid
\n- requester's user id\n-
filename
\n+
nfsd.proc.lookup
filename
\n file name \n-
version
\n- nfs version\n-
gid
\n- requester's group id\n
fh
\n file handle of parent dir (the first part is the length of the file handle)\n-
filelen
\n- the length of file name\n-
proto
\n- transfer protocol\n+
gid
\n+ requester's group id\n+
uid
\n+ requester's user id\n
client_ip
\n the ip address of client\n+
proto
\n+ transfer protocol\n+
version
\n+ nfs version\n+
filelen
\n+ the length of file name\n
probe::nfsd.proc.read — \n NFS server reading file for client\n-
nfsd.proc.read
count
\n+
nfsd.proc.read
client_ip
\n+ the ip address of client\n+
count
\n read bytes\n
uid
\n requester's user id\n
offset
\n the offset of file \n+
version
\n+ nfs version\n+
proto
\n+ transfer protocol\n
gid
\n requester's group id\n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n
fh
\n file handle (the first part is the length of the file handle)\n-
proto
\n- transfer protocol\n
vlen
\n read blocks \n
size
\n read bytes\n-
version
\n- nfs version\n-
client_ip
\n- the ip address of client\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
probe::nfsd.proc.remove — \n NFS server removing a file for client\n-
nfsd.proc.remove
uid
\n- requester's user id\n+
nfsd.proc.remove
gid
\n+ requester's group id\n
fh
\n file handle (the first part is the length of the file handle)\n-
gid
\n- requester's group id\n-
proto
\n- transfer protocol\n-
version
\n- nfs version\n
filename
\n file name\n-
client_ip
\n- the ip address of client\n
filelen
\n length of file name\n+
version
\n+ nfs version\n+
proto
\n+ transfer protocol\n+
client_ip
\n+ the ip address of client\n+
uid
\n+ requester's user id\n
probe::nfsd.proc.rename — \n NFS Server renaming a file for client\n-
nfsd.proc.rename
tfh
\n- file handler of new path\n-
uid
\n+
nfsd.proc.rename
uid
\n requester's user id\n-
gid
\n- requester's group id\n-
fh
\n- file handler of old path\n-
flen
\n- length of old file name \n+
client_ip
\n+ the ip address of client\n+
tfh
\n+ file handler of new path\n
tlen
\n length of new file name\n-
filename
\n- old file name \n
tname
\n new file name\n-
client_ip
\n- the ip address of client\n+
filename
\n+ old file name \n+
fh
\n+ file handler of old path\n+
gid
\n+ requester's group id\n+
flen
\n+ length of old file name \n
probe::nfsd.proc.write — \n NFS server writing data to file for client\n-
nfsd.proc.write
client_ip
\n- the ip address of client\n-
version
\n- nfs version\n-
size
\n- read bytes\n+
nfsd.proc.write
gid
\n+ requester's group id\n
vlen
\n read blocks \n-
proto
\n- transfer protocol\n-
stable
\n- argp->stable\n
fh
\n file handle (the first part is the length of the file handle)\n+
size
\n+ read bytes\n
vec
\n struct kvec, includes buf address in kernel address and length of each buffer\n-
gid
\n- requester's group id\n+
version
\n+ nfs version\n
offset
\n the offset of file \n-
uid
\n- requester's user id\n+
proto
\n+ transfer protocol\n+
stable
\n+ argp->stable\n+
client_ip
\n+ the ip address of client\n
count
\n read bytes\n+
uid
\n+ requester's user id\n
probe::nfsd.read — \n NFS server reading data from a file for client\n-
nfsd.read
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n-
fh
\n+
nfsd.read
fh
\n file handle (the first part is the length of the file handle)\n
vlen
\n read blocks \n-
count
\n+
size
\n read bytes\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
offset
\n the offset of file \n+
count
\n+ read bytes\n
client_ip
\n the ip address of client\n
file
\n argument file, indicates if the file has been opened.\n-
size
\n- read bytes\n
probe::nfsd.rename — \n NFS server renaming a file for client\n-
nfsd.rename
probe::nfsd.unlink — \n NFS server removing a file or a directory for client\n-
nfsd.unlink
fh
\n- file handle (the first part is the length of the file handle)\n-
filename
\n+
nfsd.unlink
probe::nfsd.write — \n NFS server writing data to a file for client\n-
nfsd.write
size
\n+
nfsd.write
count
\n read bytes\n-
file
\n- argument file, indicates if the file has been opened.\n
client_ip
\n the ip address of client\n+
file
\n+ argument file, indicates if the file has been opened.\n
offset
\n the offset of file \n-
count
\n- read bytes\n
vlen
\n read blocks \n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n
fh
\n file handle (the first part is the length of the file handle)\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n+
size
\n+ read bytes\n
probe::scheduler.cpu_off — \n Process is about to stop running on a cpu\n
scheduler.cpu_off
task_next
\n the process replacing current\n-
task_prev
\n- the process leaving the cpu (same as current)\n-
idle
\n- boolean indicating whether current is the idle process\n
name
\n name of the probe point\n+
idle
\n+ boolean indicating whether current is the idle process\n+
task_prev
\n+ the process leaving the cpu (same as current)\n
probe::scheduler.cpu_on — \n Process is beginning execution on a cpu\n
scheduler.cpu_on
probe::scheduler.ctxswitch — \n A context switch is occuring.\n-
scheduler.ctxswitch
next_pid
\n- The PID of the process to be switched in\n+
scheduler.ctxswitch
prev_priority
\n+ The priority of the process to be switched out\n
prev_pid
\n The PID of the process to be switched out\n-
nexttsk_state
\n- the state of the process to be switched in\n-
prev_tid
\n- The TID of the process to be switched out\n-
next_tid
\n- The TID of the process to be switched in\t \n-
prevtsk_state
\n- the state of the process to be switched out\n-
next_task_name
\n- The name of the process to be switched in\n-
name
\n- name of the probe point\n+
next_pid
\n+ The PID of the process to be switched in\n
next_priority
\n The priority of the process to be switched in\n-
prev_priority
\n- The priority of the process to be switched out\n+
name
\n+ name of the probe point\n
prev_task_name
\n The name of the process to be switched out\n+
prevtsk_state
\n+ the state of the process to be switched out\n+
prev_tid
\n+ The TID of the process to be switched out\n+
nexttsk_state
\n+ the state of the process to be switched in\n+
next_task_name
\n+ The name of the process to be switched in\n+
next_tid
\n+ The TID of the process to be switched in\t \n
probe::scheduler.kthread_stop.return — \n A kthread is stopped and gets the return value\n-
scheduler.kthread_stop.return
probe::scheduler.migrate — \n Task migrating across cpus\n
scheduler.migrate
priority
\n priority of the task being migrated\n-
name
\n- name of the probe point\n-
task
\n- the process that is being migrated\n-
pid
\n- PID of the task being migrated\n
cpu_from
\n the original cpu\n+
task
\n+ the process that is being migrated\n
cpu_to
\n the destination cpu\n+
pid
\n+ PID of the task being migrated\n+
name
\n+ name of the probe point\n
probe::scheduler.process_exit — \n Process exiting\n-
scheduler.process_exit
probe::scheduler.process_fork — \n Process forked\n-
scheduler.process_fork
probe::scheduler.process_free — \n Scheduler freeing a data structure for a process\n-
scheduler.process_free
probe::scheduler.wait_task — \n Waiting on a task to unschedule (become inactive)\n-
scheduler.wait_task
probe::scheduler.wakeup_new — \n Newly created task is woken up for the first time\n
scheduler.wakeup_new
task_tid
\n TID of the new task woken up\n-
task_cpu
\n- cpu of the task woken up\n-
name
\n- name of the probe point\n-
task_pid
\n- PID of the new task woken up\n
task_state
\n state of the task woken up\n
task_priority
\n priority of the new task\n+
name
\n+ name of the probe point\n+
task_pid
\n+ PID of the new task woken up\n+
task_cpu
\n+ cpu of the task woken up\n
probe::scheduler.wakeup — \n Task is woken up\n-
scheduler.wakeup
task_priority
\n- priority of the task being woken up\n-
task_state
\n+
scheduler.wakeup
task_state
\n state of the task being woken up\n-
task_tid
\n- tid of the task being woken up\n+
task_priority
\n+ priority of the task being woken up\n
task_cpu
\n cpu of the task being woken up\n
name
\n name of the probe point\n
task_pid
\n PID of the task being woken up\n+
task_tid
\n+ tid of the task being woken up\n
probe::scsi.iocompleted — \n SCSI mid-layer running the completion processing for block device I/O requests\n-
scsi.iocompleted
data_direction_str
\n- Data direction, as a string\n-
goodbytes
\n- The bytes completed\n-
lun
\n- The lun number\n-
device_state
\n+
scsi.iocompleted
device_state
\n The current state of the device\n+
host_no
\n+ The host number\n+
dev_id
\n+ The scsi device id\n
data_direction
\n The data_direction specifies whether this command is from/to\n the device\n-
device_state_str
\n- The current state of the device, as a string\n-
channel
\n- The channel number\n
req_addr
\n The current struct request pointer, as a number\n-
dev_id
\n- The scsi device id\n-
host_no
\n- The host number\n+
channel
\n+ The channel number\n+
lun
\n+ The lun number\n+
goodbytes
\n+ The bytes completed\n+
data_direction_str
\n+ Data direction, as a string\n+
device_state_str
\n+ The current state of the device, as a string\n
probe::scsi.iodispatching — \n SCSI mid-layer dispatched low-level SCSI command\n-
scsi.iodispatching
request_bufflen
\n- The request buffer length\n-
host_no
\n- The host number\n-
dev_id
\n- The scsi device id\n+
scsi.iodispatching
channel
\n+ The channel number\n
req_addr
\n The current struct request pointer, as a number\n-
channel
\n- The channel number\n+
dev_id
\n+ The scsi device id\n
data_direction
\n The data_direction specifies whether this command is from/to the device\n 0 (DMA_BIDIRECTIONAL), 1 (DMA_TO_DEVICE),\n 2 (DMA_FROM_DEVICE), 3 (DMA_NONE)\n-
device_state_str
\n- The current state of the device, as a string\n+
host_no
\n+ The host number\n
device_state
\n The current state of the device\n-
lun
\n- The lun number\n
request_buffer
\n The request buffer address\n+
request_bufflen
\n+ The request buffer length\n+
device_state_str
\n+ The current state of the device, as a string\n
data_direction_str
\n Data direction, as a string\n+
lun
\n+ The lun number\n
probe::scsi.iodone — \n SCSI command completed by low level driver and enqueued into the done queue.\n-
scsi.iodone
dev_id
\n+
scsi.iodone
data_direction
\n+ The data_direction specifies whether this command is\n+ from/to the device.\n+
dev_id
\n The scsi device id\n
req_addr
\n The current struct request pointer, as a number\n+
channel
\n+ The channel number\n+
scsi_timer_pending
\n+ 1 if a timer is pending on this request\n+
device_state
\n+ The current state of the device\n
host_no
\n The host number\n-
lun
\n- The lun number\n
data_direction_str
\n Data direction, as a string\n-
scsi_timer_pending
\n- 1 if a timer is pending on this request\n
device_state_str
\n The current state of the device, as a string\n-
data_direction
\n- The data_direction specifies whether this command is\n- from/to the device.\n-
channel
\n- The channel number\n-
device_state
\n- The current state of the device\n+
lun
\n+ The lun number\n
probe::scsi.ioentry — \n Prepares a SCSI mid-layer request\n-
scsi.ioentry
req_addr
\n- The current struct request pointer, as a number\n-
disk_major
\n- The major number of the disk (-1 if no information)\n-
device_state
\n+
scsi.ioentry
device_state
\n The current state of the device\n
disk_minor
\n The minor number of the disk (-1 if no information)\n+
req_addr
\n+ The current struct request pointer, as a number\n
device_state_str
\n The current state of the device, as a string\n+
disk_major
\n+ The major number of the disk (-1 if no information)\n
probe::scsi.ioexecute — \n Create mid-layer SCSI request and wait for the result\n-
scsi.ioexecute
retries
\n- Number of times to retry request\n-
request_buffer
\n- The data buffer address\n+
scsi.ioexecute
data_direction_str
\n+ Data direction, as a string\n+
device_state_str
\n+ The current state of the device, as a string\n
lun
\n The lun number\n-
data_direction_str
\n- Data direction, as a string\n-
channel
\n- The channel number\n+
timeout
\n+ Request timeout in seconds\n
data_direction
\n The data_direction specifies whether this command is\n from/to the device.\n-
device_state_str
\n- The current state of the device, as a string\n-
device_state
\n- The current state of the device\n
dev_id
\n The scsi device id\n-
timeout
\n- Request timeout in seconds\n-
host_no
\n- The host number\n+
retries
\n+ Number of times to retry request\n+
channel
\n+ The channel number\n+
request_buffer
\n+ The data buffer address\n
request_bufflen
\n The data buffer buffer length\n+
host_no
\n+ The host number\n+
device_state
\n+ The current state of the device\n
probe::scsi.set_state — \n Order SCSI device state change\n-
scsi.set_state
channel
\n- The channel number\n+
scsi.set_state
old_state_str
\n+ The current state of the device, as a string\n+
host_no
\n+ The host number\n+
dev_id
\n+ The scsi device id\n
state_str
\n The new state of the device, as a string\n+
channel
\n+ The channel number\n
lun
\n The lun number\n-
old_state_str
\n- The current state of the device, as a string\n
old_state
\n The current state of the device\n-
host_no
\n- The host number\n-
dev_id
\n- The scsi device id\n
state
\n The new state of the device\n
probe::signal.check_ignored — \n Checking to see signal is ignored\n-
signal.check_ignored
sig
\n- The number of the signal\n-
sig_name
\n- A string representation of the signal\n-
pid_name
\n+
signal.check_ignored
probe::signal.checkperm.return — \n Check performed on a sent signal completed\n-
signal.checkperm.return
probe::signal.checkperm — \n Check being performed on a sent signal\n-
signal.checkperm
sig_pid
\n- The PID of the process receiving the signal\n-
name
\n- Name of the probe point\n-
sinfo
\n- The address of the siginfo structure\n-
task
\n+
signal.checkperm
task
\n A task handle to the signal recipient\n-
sig
\n- The number of the signal\n-
si_code
\n- Indicates the signal type\n+
sig_pid
\n+ The PID of the process receiving the signal\n
pid_name
\n Name of the process receiving the signal\n+
sig
\n+ The number of the signal\n+
name
\n+ Name of the probe point\n
sig_name
\n A string representation of the signal\n+
si_code
\n+ Indicates the signal type\n+
sinfo
\n+ The address of the siginfo structure\n
probe::signal.do_action.return — \n Examining or changing a signal action completed\n-
signal.do_action.return
probe::signal.do_action — \n Examining or changing a signal action\n-
signal.do_action
oldsigact_addr
\n- The address of the old sigaction\n- struct associated with the signal\n-
sig
\n- The signal to be examined/changed\n-
sig_name
\n- A string representation of the signal\n+
signal.do_action
sa_handler
\n+ The new handler of the signal\n
sigact_addr
\n The address of the new sigaction\n struct associated with the signal\n-
sa_handler
\n- The new handler of the signal\n+
sig_name
\n+ A string representation of the signal\n+
sig
\n+ The signal to be examined/changed\n
name
\n Name of the probe point\n
sa_mask
\n The new mask of the signal\n+
oldsigact_addr
\n+ The address of the old sigaction\n+ struct associated with the signal\n
probe::signal.flush — \n Flushing all pending signals for a task\n
signal.flush
name
\n Name of the probe point\n+
pid_name
\n+ The name of the process associated with the task\n+ performing the flush\n
sig_pid
\n The PID of the process associated with the task\n performing the flush\n
task
\n The task handler of the process performing the flush\n-
pid_name
\n- The name of the process associated with the task\n- performing the flush\n
probe::signal.force_segv.return — \n Forcing send of SIGSEGV complete\n-
signal.force_segv.return
probe::signal.force_segv — \n Forcing send of SIGSEGV\n-
signal.force_segv
sig_name
\n+
signal.force_segv
name
\n+ Name of the probe point\n+
sig
\n+ The number of the signal\n+
sig_name
\n A string representation of the signal\n
pid_name
\n Name of the process receiving the signal\n-
sig
\n- The number of the signal\n-
name
\n- Name of the probe point\n
sig_pid
\n The PID of the process receiving the signal\n
probe::signal.handle — \n Signal handler being invoked\n-
signal.handle
sig_name
\n- A string representation of the signal\n+
signal.handle
regs
\n+ The address of the kernel-mode stack area (deprecated in\n+ SystemTap 2.1)\n
sig_mode
\n Indicates whether the signal was a user-mode or kernel-mode signal\n-
sig
\n- The signal number that invoked the signal handler\n+
oldset_addr
\n+ The address of the bitmask array of blocked signals\n+ (deprecated in SystemTap 2.1)\n+
sinfo
\n+ The address of the siginfo table\n
ka_addr
\n The address of the k_sigaction table\n associated with the signal\n-
sinfo
\n- The address of the siginfo table\n
sig_code
\n The si_code value of the siginfo signal\n-
regs
\n- The address of the kernel-mode stack area (deprecated in\n- SystemTap 2.1)\n-
oldset_addr
\n- The address of the bitmask array of blocked signals\n- (deprecated in SystemTap 2.1)\n+
sig_name
\n+ A string representation of the signal\n+
sig
\n+ The signal number that invoked the signal handler\n
name
\n Name of the probe point\n
probe::signal.pending.return — \n Examination of pending signal completed\n-
signal.pending.return
probe::signal.procmask — \n Examining or changing blocked signals\n
signal.procmask
name
\n Name of the probe point\n-
how
\n- Indicates how to change the blocked signals; possible values are\n- SIG_BLOCK=0 (for blocking signals),\n- SIG_UNBLOCK=1 (for unblocking signals), and\n- SIG_SETMASK=2 for setting the signal mask.\n-
sigset
\n- The actual value to be set for sigset_t\n- (correct?)\n
sigset_addr
\n The address of the signal set (sigset_t)\n to be implemented\n
oldsigset_addr
\n The old address of the signal set\n (sigset_t)\n+
sigset
\n+ The actual value to be set for sigset_t\n+ (correct?)\n+
how
\n+ Indicates how to change the blocked signals; possible values are\n+ SIG_BLOCK=0 (for blocking signals),\n+ SIG_UNBLOCK=1 (for unblocking signals), and\n+ SIG_SETMASK=2 for setting the signal mask.\n
probe::signal.send_sig_queue — \n Queuing a signal to a process\n-
signal.send_sig_queue
sig
\n- The queued signal\n-
pid_name
\n+
signal.send_sig_queue
pid_name
\n Name of the process to which the signal is queued\n+
sig_pid
\n+ The PID of the process to which the signal is queued\n
sig_name
\n A string representation of the signal\n
name
\n Name of the probe point\n+
sig
\n+ The queued signal\n
sigqueue_addr
\n The address of the signal queue\n-
sig_pid
\n- The PID of the process to which the signal is queued\n
probe::signal.send — \n Signal being sent to a process\n-
signal.send
send2queue
\n- Indicates whether the signal is sent to an existing\n- sigqueue (deprecated in SystemTap 2.1)\n+
signal.send
task
\n+ A task handle to the signal recipient\n+
pid_name
\n+ The name of the signal recipient\n
sig_pid
\n The PID of the process receiving the signal\n+
shared
\n+ Indicates whether the signal is shared by the thread group\n
name
\n The name of the function used to send out the signal\n-
sinfo
\n- The address of siginfo struct\n-
sig
\n- The number of the signal\n-
task
\n- A task handle to the signal recipient\n
sig_name
\n A string representation of the signal\n-
pid_name
\n- The name of the signal recipient\n+
sig
\n+ The number of the signal\n+
send2queue
\n+ Indicates whether the signal is sent to an existing\n+ sigqueue (deprecated in SystemTap 2.1)\n+
sinfo
\n+ The address of siginfo struct\n
si_code
\n Indicates the signal type\n-
shared
\n- Indicates whether the signal is shared by the thread group\n
probe::signal.sys_tgkill — \n Sending kill signal to a thread group\n-
signal.sys_tgkill
tgid
\n- The thread group ID of the thread receiving the kill signal\n-
sig_pid
\n- The PID of the thread receiving the kill signal\n-
name
\n- Name of the probe point\n-
pid_name
\n- The name of the signal recipient\n-
sig_name
\n+
signal.sys_tgkill
sig_name
\n A string representation of the signal\n
sig
\n The specific kill signal sent to the process\n+
name
\n+ Name of the probe point\n+
tgid
\n+ The thread group ID of the thread receiving the kill signal\n
task
\n A task handle to the signal recipient\n+
pid_name
\n+ The name of the signal recipient\n+
sig_pid
\n+ The PID of the thread receiving the kill signal\n
probe::signal.sys_tkill — \n Sending a kill signal to a thread\n-
signal.sys_tkill
name
\n- Name of the probe point\n+
signal.sys_tkill
pid_name
\n+ The name of the signal recipient\n
sig_pid
\n The PID of the process receiving the kill signal\n-
sig
\n- The specific signal sent to the process\n
task
\n A task handle to the signal recipient\n
sig_name
\n A string representation of the signal\n-
pid_name
\n- The name of the signal recipient\n+
sig
\n+ The specific signal sent to the process\n+
name
\n+ Name of the probe point\n
probe::signal.syskill — \n Sending kill signal to a process\n-
signal.syskill
name
\n+
signal.syskill
sig_name
\n+ A string representation of the signal\n+
name
\n Name of the probe point\n+
sig
\n+ The specific signal sent to the process\n
sig_pid
\n The PID of the process receiving the signal\n-
sig_name
\n- A string representation of the signal\n
pid_name
\n The name of the signal recipient\n
task
\n A task handle to the signal recipient\n-
sig
\n- The specific signal sent to the process\n
probe::signal.systkill.return — \n Sending kill signal to a thread completed\n-
signal.systkill.return
retstr
\n- The return value to either __group_send_sig_info,\n-
name
\n+
signal.systkill.return
probe::signal.wakeup — \n Sleeping process being wakened for signal\n-
signal.wakeup
sig_pid
\n- The PID of the process to wake\n-
state_mask
\n+
signal.wakeup
state_mask
\n A string representation indicating the mask\n of task states to wake. Possible values are\n TASK_INTERRUPTIBLE, TASK_STOPPED,\n TASK_TRACED, TASK_WAKEKILL, and TASK_INTERRUPTIBLE.\n+
pid_name
\n+ Name of the process to wake\n+
sig_pid
\n+ The PID of the process to wake\n
resume
\n Indicates whether to wake up a task in a\n STOPPED or TRACED state\n-
pid_name
\n- Name of the process to wake\n
probe::socket.aio_read.return — \n Conclusion of message received via sock_aio_read
\n-
socket.aio_read.return
family
\n+
socket.aio_read.return
type
\n+ Socket type value\n+
family
\n Protocol family value\n-
protocol
\n- Protocol value\n+
name
\n+ Name of this probe\n
size
\n Size of message received (in bytes) or error code if success = 0\n-
type
\n- Socket type value\n
state
\n Socket state value\n
flags
\n Socket flags value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
name
\n- Name of this probe\n+
protocol
\n+ Protocol value\n
probe::socket.aio_read — \n Receiving message via sock_aio_read
\n-
socket.aio_read
size
\n- Message size in bytes\n+
socket.aio_read
probe::socket.aio_write.return — \n Conclusion of message send via sock_aio_write
\n
socket.aio_write.return
size
\n Size of message received (in bytes) or error code if success = 0\n-
protocol
\n- Protocol value\n+
state
\n+ Socket state value\n
family
\n Protocol family value\n
name
\n Name of this probe\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n
type
\n Socket type value\n-
state
\n- Socket state value\n+
protocol
\n+ Protocol value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
flags
\n Socket flags value\n
\n Fires at the conclusion of sending a message on a socket\n via the sock_aio_write
function\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-aio-write.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-aio-write.html", "unified_diff": "@@ -1,22 +1,22 @@\n
probe::socket.aio_write — \n Message send via sock_aio_write
\n-
socket.aio_write
size
\n+
socket.aio_write
state
\n+ Socket state value\n+
size
\n Message size in bytes\n-
protocol
\n- Protocol value\n-
family
\n- Protocol family value\n
name
\n Name of this probe\n+
family
\n+ Protocol family value\n
type
\n Socket type value\n+
protocol
\n+ Protocol value\n
flags
\n Socket flags value\n-
state
\n- Socket state value\n
probe::socket.close — \n Close a socket\n-
socket.close
family
\n- Protocol family value\n-
protocol
\n- Protocol value\n-
type
\n+
socket.close
probe::socket.create.return — \n Return from Creation of a socket\n-
socket.create.return
protocol
\n- Protocol value\n+
socket.create.return
type
\n+ Socket type value\n
family
\n Protocol family value\n
name
\n Name of this probe\n-
success
\n- Was socket creation successful? (1 = yes, 0 = no)\n
err
\n Error code if success == 0\n+
success
\n+ Was socket creation successful? (1 = yes, 0 = no)\n+
protocol
\n+ Protocol value\n
requester
\n Requested by user process or the kernel (1 = kernel, 0 = user)\n-
type
\n- Socket type value\n
probe::socket.create — \n Creation of a socket\n-
socket.create
family
\n- Protocol family value\n+
socket.create
requester
\n+ Requested by user process or the kernel (1 = kernel, 0 = user)\n
protocol
\n Protocol value\n-
type
\n- Socket type value\n-
requester
\n- Requested by user process or the kernel (1 = kernel, 0 = user)\n
name
\n Name of this probe\n+
family
\n+ Protocol family value\n+
type
\n+ Socket type value\n
probe::socket.read_iter.return — \n Conclusion of message received via sock_read_iter
\n-
socket.read_iter.return
flags
\n+
socket.read_iter.return
success
\n+ Was receive successful? (1 = yes, 0 = no)\n+
protocol
\n+ Protocol value\n+
flags
\n Socket flags value\n
state
\n Socket state value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
type
\n Socket type value\n
name
\n Name of this probe\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n
family
\n Protocol family value\n-
protocol
\n- Protocol value\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n
probe::socket.read_iter — \n Receiving message via sock_read_iter
\n-
socket.read_iter
family
\n+
socket.read_iter
name
\n+ Name of this probe\n+
family
\n Protocol family value\n+
type
\n+ Socket type value\n+
state
\n+ Socket state value\n
size
\n Message size in bytes\n-
protocol
\n- Protocol value\n
flags
\n Socket flags value\n-
state
\n- Socket state value\n-
type
\n- Socket type value\n-
name
\n- Name of this probe\n+
protocol
\n+ Protocol value\n
probe::socket.readv.return — \n Conclusion of receiving a message via sock_readv
\n-
socket.readv.return
size
\n- Size of message received (in bytes) or error code if success = 0\n-
protocol
\n- Protocol value\n+
socket.readv.return
name
\n+ Name of this probe\n
family
\n Protocol family value\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n-
name
\n- Name of this probe\n+
type
\n+ Socket type value\n
state
\n Socket state value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
flags
\n Socket flags value\n-
type
\n- Socket type value\n+
protocol
\n+ Protocol value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
probe::socket.readv — \n Receiving a message via sock_readv
\n-
socket.readv
protocol
\n- Protocol value\n+
socket.readv
state
\n+ Socket state value\n
size
\n Message size in bytes\n-
family
\n- Protocol family value\n+
type
\n+ Socket type value\n
name
\n Name of this probe\n+
family
\n+ Protocol family value\n+
protocol
\n+ Protocol value\n
flags
\n Socket flags value\n-
state
\n- Socket state value\n-
type
\n- Socket type value\n
probe::socket.receive — \n Message received on a socket.\n
socket.receive
state
\n Socket state value\n-
flags
\n- Socket flags value\n-
type
\n- Socket type value\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
name
\n Name of this probe\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n
family
\n Protocol family value\n+
type
\n+ Socket type value\n
protocol
\n Protocol value\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n+
flags
\n+ Socket flags value\n
probe::socket.recvmsg.return — \n Return from Message being received on socket\n-
socket.recvmsg.return
family
\n- Protocol family value\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n+
socket.recvmsg.return
flags
\n+ Socket flags value\n
protocol
\n Protocol value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n+
name
\n+ Name of this probe\n+
family
\n+ Protocol family value\n
type
\n Socket type value\n
state
\n Socket state value\n-
flags
\n- Socket flags value\n-
name
\n- Name of this probe\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n+
size
\n+ Size of message received (in bytes) or error code if success = 0\n
probe::socket.recvmsg — \n Message being received on socket\n-
socket.recvmsg
name
\n- Name of this probe\n+
socket.recvmsg
size
\n+ Message size in bytes\n
state
\n Socket state value\n-
flags
\n- Socket flags value\n
type
\n Socket type value\n-
size
\n- Message size in bytes\n-
protocol
\n- Protocol value\n
family
\n Protocol family value\n+
name
\n+ Name of this probe\n+
protocol
\n+ Protocol value\n+
flags
\n+ Socket flags value\n
probe::socket.send — \n Message sent on a socket.\n-
socket.send
success
\n- Was send successful? (1 = yes, 0 = no)\n+
socket.send
type
\n+ Socket type value\n+
family
\n+ Protocol family value\n
name
\n Name of this probe\n-
flags
\n- Socket flags value\n-
state
\n- Socket state value\n-
type
\n- Socket type value\n
size
\n Size of message sent (in bytes) or error code if success = 0\n+
state
\n+ Socket state value\n+
flags
\n+ Socket flags value\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n
protocol
\n Protocol value\n-
family
\n- Protocol family value\n
probe::socket.sendmsg.return — \n Return from socket.sendmsg.\n-
socket.sendmsg.return
protocol
\n- Protocol value\n-
size
\n- Size of message sent (in bytes) or error code if success = 0\n-
family
\n- Protocol family value\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n+
socket.sendmsg.return
type
\n+ Socket type value\n
name
\n Name of this probe\n-
type
\n- Socket type value\n-
flags
\n- Socket flags value\n+
family
\n+ Protocol family value\n
state
\n Socket state value\n+
size
\n+ Size of message sent (in bytes) or error code if success = 0\n+
flags
\n+ Socket flags value\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n+
protocol
\n+ Protocol value\n
probe::socket.sendmsg — \n Message is currently being sent on a socket.\n-
socket.sendmsg
state
\n- Socket state value\n-
flags
\n+
socket.sendmsg
probe::socket.write_iter.return — \n Conclusion of message send via sock_write_iter
\n-
socket.write_iter.return
success
\n- Was receive successful? (1 = yes, 0 = no)\n+
socket.write_iter.return
type
\n+ Socket type value\n
name
\n Name of this probe\n-
type
\n- Socket type value\n-
flags
\n- Socket flags value\n+
family
\n+ Protocol family value\n
state
\n Socket state value\n
size
\n Size of message received (in bytes) or error code if success = 0\n+
flags
\n+ Socket flags value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
protocol
\n Protocol value\n-
family
\n- Protocol family value\n
probe::socket.write_iter — \n Message send via sock_write_iter
\n-
socket.write_iter
protocol
\n- Protocol value\n-
size
\n- Message size in bytes\n-
family
\n+
socket.write_iter
probe::socket.writev.return — \n Conclusion of message sent via socket_writev
\n-
socket.writev.return
protocol
\n- Protocol value\n-
size
\n+
socket.writev.return
size
\n Size of message sent (in bytes) or error code if success = 0\n+
state
\n+ Socket state value\n+
type
\n+ Socket type value\n
family
\n Protocol family value\n-
success
\n- Was send successful? (1 = yes, 0 = no)\n
name
\n Name of this probe\n-
state
\n- Socket state value\n+
success
\n+ Was send successful? (1 = yes, 0 = no)\n+
protocol
\n+ Protocol value\n
flags
\n Socket flags value\n-
type
\n- Socket type value\n
probe::socket.writev — \n Message sent via socket_writev
\n-
socket.writev
family
\n+
socket.writev
name
\n+ Name of this probe\n+
family
\n Protocol family value\n-
protocol
\n- Protocol value\n-
size
\n- Message size in bytes\n
type
\n Socket type value\n-
flags
\n- Socket flags value\n
state
\n Socket state value\n-
name
\n- Name of this probe\n+
size
\n+ Message size in bytes\n+
flags
\n+ Socket flags value\n+
protocol
\n+ Protocol value\n
probe::softirq.entry — \n Execution of handler for a pending softirq starting\n
softirq.entry
probe::softirq.exit — \n Execution of handler for a pending softirq completed\n-
softirq.exit
probe::stap.cache_add_nss — \n Add NSS (Network Security Services) information to cache\n-
stap.cache_add_nss
dest_path
\n+
stap.cache_add_nss
probe::stap.cache_add_src — \n Adding C code translation to cache\n-
stap.cache_add_src
dest_path
\n- the path the .c file is going to (incl filename)\n-
source_path
\n+
stap.cache_add_src
probe::stap.system.spawn — \n stap spawned new process\n-
stap.system.spawn
probe::stapio.receive_control_message — \n Received a control message\n
stapio.receive_control_message
probe::staprun.send_control_message — \n Sending a control message\n-
staprun.send_control_message
data
\n+
staprun.send_control_message
probe::sunrpc.clnt.bind_new_program — \n Bind a new RPC program to an existing client\n-
sunrpc.clnt.bind_new_program
prog
\n- the number of new RPC program\n-
servername
\n- the server machine name\n-
progname
\n- the name of new RPC program\n+
sunrpc.clnt.bind_new_program
old_progname
\n+ the name of old RPC program\n
old_vers
\n the version of old RPC program\n-
old_prog
\n- the number of old RPC program\n-
old_progname
\n- the name of old RPC program\n
vers
\n the version of new RPC program\n+
old_prog
\n+ the number of old RPC program\n+
progname
\n+ the name of new RPC program\n+
servername
\n+ the server machine name\n+
prog
\n+ the number of new RPC program\n
probe::sunrpc.clnt.call_async — \n Make an asynchronous RPC call\n-
sunrpc.clnt.call_async
progname
\n- the RPC program name\n-
servername
\n+
sunrpc.clnt.call_async
servername
\n the server machine name\n-
prog
\n- the RPC program number\n
xid
\n current transmission id\n+
proc
\n+ the procedure number in this RPC call\n
dead
\n whether this client is abandoned\n-
port
\n- the port number\n-
vers
\n- the RPC program version number\n+
prog
\n+ the RPC program number\n
flags
\n flags\n-
procname
\n- the procedure name in this RPC call\n-
proc
\n- the procedure number in this RPC call\n
prot
\n the IP protocol number\n+
vers
\n+ the RPC program version number\n+
port
\n+ the port number\n+
progname
\n+ the RPC program name\n+
procname
\n+ the procedure name in this RPC call\n
probe::sunrpc.clnt.call_sync — \n Make a synchronous RPC call\n-
sunrpc.clnt.call_sync
prot
\n- the IP protocol number\n-
proc
\n+
sunrpc.clnt.call_sync
proc
\n the procedure number in this RPC call\n-
procname
\n- the procedure name in this RPC call\n-
flags
\n- flags\n-
vers
\n- the RPC program version number\n-
port
\n- the port number\n+
dead
\n+ whether this client is abandoned\n
prog
\n the RPC program number\n
xid
\n current transmission id\n-
dead
\n- whether this client is abandoned\n-
progname
\n- the RPC program name\n
servername
\n the server machine name\n+
progname
\n+ the RPC program name\n+
procname
\n+ the procedure name in this RPC call\n+
port
\n+ the port number\n+
prot
\n+ the IP protocol number\n+
flags
\n+ flags\n+
vers
\n+ the RPC program version number\n
probe::sunrpc.clnt.clone_client — \n Clone an RPC client structure\n-
sunrpc.clnt.clone_client
prot
\n+
sunrpc.clnt.clone_client
servername
\n+ the server machine name\n+
vers
\n+ the RPC program version number\n+
prot
\n the IP protocol number\n+
port
\n+ the port number\n
prog
\n the RPC program number\n
progname
\n the RPC program name\n-
port
\n- the port number\n
authflavor
\n the authentication flavor\n-
vers
\n- the RPC program version number\n-
servername
\n- the server machine name\n
probe::sunrpc.clnt.create_client — \n Create an RPC client\n-
sunrpc.clnt.create_client
prog
\n- the RPC program number\n-
prot
\n- the IP protocol number\n-
servername
\n+
sunrpc.clnt.create_client
servername
\n the server machine name\n-
progname
\n- the RPC program name\n+
port
\n+ the port number\n
vers
\n the RPC program version number\n+
prot
\n+ the IP protocol number\n+
prog
\n+ the RPC program number\n
authflavor
\n the authentication flavor\n-
port
\n- the port number\n+
progname
\n+ the RPC program name\n
probe::sunrpc.clnt.restart_call — \n Restart an asynchronous RPC call\n-
sunrpc.clnt.restart_call
tk_pid
\n+
sunrpc.clnt.restart_call
tk_runstate
\n+ the task run status\n+
tk_pid
\n the debugging aid of task\n+
servername
\n+ the server machine name\n
tk_flags
\n the task flags\n-
prog
\n- the RPC program number\n-
tk_priority
\n- the task priority\n
xid
\n the transmission id\n-
servername
\n- the server machine name\n-
tk_runstate
\n- the task run status\n+
tk_priority
\n+ the task priority\n+
prog
\n+ the RPC program number\n
probe::sunrpc.clnt.shutdown_client — \n Shutdown an RPC client\n-
sunrpc.clnt.shutdown_client
servername
\n- the server machine name\n+
sunrpc.clnt.shutdown_client
om_execute
\n+ the RPC execution jiffies\n+
om_bytes_recv
\n+ the count of bytes in\n+
authflavor
\n+ the authentication flavor\n+
om_queue
\n+ the jiffies queued for xmit\n+
om_ops
\n+ the count of operations\n+
prog
\n+ the RPC program number\n+
tasks
\n+ the number of references\n+
clones
\n+ the number of clones\n
netreconn
\n the count of reconnections\n+
om_rtt
\n+ the RPC RTT jiffies\n+
servername
\n+ the server machine name\n+
rpccnt
\n+ the count of RPC calls\n
progname
\n the RPC program name\n-
om_bytes_sent
\n- the count of bytes out\n-
om_queue
\n- the jiffies queued for xmit\n
om_ntrans
\n the count of RPC transmissions\n-
om_bytes_recv
\n- the count of bytes in\n-
om_execute
\n- the RPC execution jiffies\n-
tasks
\n- the number of references\n-
prog
\n- the RPC program number\n-
port
\n- the port number\n-
authflavor
\n- the authentication flavor\n
vers
\n the RPC program version number\n-
rpccnt
\n- the count of RPC calls\n-
om_rtt
\n- the RPC RTT jiffies\n-
clones
\n- the number of clones\n
prot
\n the IP protocol number\n-
om_ops
\n- the count of operations\n+
port
\n+ the port number\n+
om_bytes_sent
\n+ the count of bytes out\n
probe::sunrpc.sched.delay — \n Delay an RPC task\n-
sunrpc.sched.delay
tk_flags
\n+
sunrpc.sched.delay
prog
\n+ the program number in the RPC call\n+
xid
\n+ the transmission id in the RPC call\n+
tk_flags
\n the flags of the task\n+
tk_pid
\n+ the debugging id of the task\n
vers
\n the program version in the RPC call\n
delay
\n the time delayed\n
prot
\n the IP protocol in the RPC call\n-
tk_pid
\n- the debugging id of the task\n-
xid
\n- the transmission id in the RPC call\n-
prog
\n- the program number in the RPC call\n
probe::sunrpc.sched.execute — \n Execute the RPC `scheduler'\n-
sunrpc.sched.execute
tk_pid
\n- the debugging id of the task\n-
prot
\n- the IP protocol in the RPC call\n-
vers
\n- the program version in the RPC call\n-
tk_flags
\n- the flags of the task\n-
prog
\n+
sunrpc.sched.execute
probe::sunrpc.sched.new_task — \n Create new task for the specified client\n-
sunrpc.sched.new_task
prot
\n- the IP protocol in the RPC call\n+
sunrpc.sched.new_task
prog
\n+ the program number in the RPC call\n+
xid
\n+ the transmission id in the RPC call\n
tk_flags
\n the flags of the task\n
vers
\n the program version in the RPC call\n-
xid
\n- the transmission id in the RPC call\n-
prog
\n- the program number in the RPC call\n+
prot
\n+ the IP protocol in the RPC call\n
probe::sunrpc.sched.release_task — \n Release all resources associated with a task\n-
sunrpc.sched.release_task
tk_flags
\n- the flags of the task\n-
vers
\n+
sunrpc.sched.release_task
probe::sunrpc.svc.create — \n Create an RPC service\n-
sunrpc.svc.create
probe::sunrpc.svc.destroy — \n Destroy an RPC service\n-
sunrpc.svc.destroy
nettcpconn
\n- the count of accepted TCP connections\n-
sv_prog
\n- the number of the program\n-
rpccnt
\n- the count of valid RPC requests\n-
sv_nrthreads
\n+
sunrpc.svc.destroy
sv_nrthreads
\n the number of concurrent threads\n
rpcbadauth
\n the count of requests drooped for authentication failure\n+
sv_prog
\n+ the number of the program\n+
nettcpconn
\n+ the count of accepted TCP connections\n
sv_progname
\n the name of the program\n
sv_name
\n the service name\n-
netcnt
\n- the count of received RPC requests\n
rpcbadfmt
\n the count of requests dropped for bad formats\n+
rpccnt
\n+ the count of valid RPC requests\n+
netcnt
\n+ the count of received RPC requests\n
probe::sunrpc.svc.drop — \n Drop RPC request\n-
sunrpc.svc.drop
rq_prot
\n+
sunrpc.svc.drop
peer_ip
\n+ the peer address where the request is from\n+
rq_vers
\n+ the program version in the request\n+
rq_prot
\n the IP protocol of the reqeust\n
rq_proc
\n the procedure number in the request\n-
rq_vers
\n- the program version in the request\n-
sv_name
\n- the service name\n
rq_xid
\n the transmission id in the request\n-
peer_ip
\n- the peer address where the request is from\n+
sv_name
\n+ the service name\n
rq_prog
\n the program number in the request\n
probe::sunrpc.svc.process — \n Process an RPC request\n-
sunrpc.svc.process
peer_ip
\n- the peer address where the request is from\n-
rq_prog
\n+
sunrpc.svc.process
rq_prog
\n the program number in the request\n+
sv_prog
\n+ the number of the program\n
rq_xid
\n the transmission id in the request\n-
rq_vers
\n- the program version in the request\n-
sv_name
\n- the service name\n
rq_proc
\n the procedure number in the request\n-
sv_nrthreads
\n- the number of concurrent threads\n+
sv_name
\n+ the service name\n+
rq_vers
\n+ the program version in the request\n
rq_prot
\n the IP protocol of the reqeust\n-
sv_prog
\n- the number of the program\n+
sv_nrthreads
\n+ the number of concurrent threads\n+
peer_ip
\n+ the peer address where the request is from\n
probe::sunrpc.svc.recv — \n Listen for the next RPC request on any socket\n
sunrpc.svc.recv
probe::sunrpc.svc.register — \n Register an RPC service with the local portmapper\n-
sunrpc.svc.register
sv_name
\n+
sunrpc.svc.register
probe::sunrpc.svc.send — \n Return reply to RPC client\n-
sunrpc.svc.send
rq_prot
\n- the IP protocol of the reqeust\n-
rq_prog
\n- the program number in the request\n-
peer_ip
\n+
sunrpc.svc.send
peer_ip
\n the peer address where the request is from\n-
rq_xid
\n- the transmission id in the request\n
rq_vers
\n the program version in the request\n-
sv_name
\n- the service name\n+
rq_prot
\n+ the IP protocol of the reqeust\n+
rq_xid
\n+ the transmission id in the request\n
rq_proc
\n the procedure number in the request\n+
sv_name
\n+ the service name\n+
rq_prog
\n+ the program number in the request\n
probe::syscall_any.return — \n Record exit from a syscall\n-
syscall_any.return
retval
\n+
syscall_any.return
name
\n+ name of the syscall\n+
retval
\n return value of the syscall\n
syscall_nr
\n number of the syscall\n-
name
\n- name of the syscall\n
\n The syscall_any.return probe point is designed to be a low overhead\n that monitors all the syscalls returns via a kernel tracepoint.\n Because of the breadth of syscalls it monitors it provides\n no information about the syscall arguments, argstr string\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-syscall-any.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-syscall-any.html", "unified_diff": "@@ -1,13 +1,13 @@\n
probe::syscall_any — \n Record entry into a syscall\n-
syscall_any
syscall_nr
\n- number of the syscall\n-
name
\n+
syscall_any
\n The syscall_any probe point is designed to be a low overhead\n that monitors all the syscalls entered via a kernel tracepoint.\n Because of the breadth of syscalls it monitors it provides\n no information about the syscall arguments or argstr string\n"}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect.html", "comments": ["Ordering differences only"], "unified_diff": "@@ -1,21 +1,21 @@\n
probe::tcp.disconnect — \n TCP socket disconnection\n
tcp.disconnect
dport
\n TCP destination port\n-
family
\n- IP address family\n-
saddr
\n- A string representing the source IP address\n-
name
\n- Name of this probe\n
flags
\n TCP flags (e.g. FIN, etc) \n
sport
\n TCP source port \n+
saddr
\n+ A string representing the source IP address\n
daddr
\n A string representing the destination IP address\n+
name
\n+ Name of this probe\n
sock
\n Network socket \n+
family
\n+ IP address family\n
probe::tcp.receive — \n Called when a TCP packet is received\n-
tcp.receive
fin
\n- TCP FIN flag\n-
syn
\n- TCP SYN flag\n-
urg
\n+
tcp.receive
urg
\n TCP URG flag\n+
fin
\n+ TCP FIN flag\n
protocol
\n Packet protocol from driver\n-
dport
\n- TCP destination port\n-
saddr
\n- A string representing the source IP address\n
family
\n IP address family\n-
ack
\n- TCP ACK flag\n+
syn
\n+ TCP SYN flag\n+
iphdr
\n+ IP header address\n+
rst
\n+ TCP RST flag\n
name
\n Name of the probe point\n-
psh
\n- TCP PSH flag\n+
ack
\n+ TCP ACK flag\n+
dport
\n+ TCP destination port\n
sport
\n TCP source port\n+
psh
\n+ TCP PSH flag\n
daddr
\n A string representing the destination IP address\n-
iphdr
\n- IP header address\n-
rst
\n- TCP RST flag\n+
saddr
\n+ A string representing the source IP address\n
probe::tcp.recvmsg.return — \n Receiving TCP message complete\n-
tcp.recvmsg.return
family
\n- IP address family\n-
dport
\n+
tcp.recvmsg.return
dport
\n TCP destination port\n+
sport
\n+ TCP source port \n+
daddr
\n+ A string representing the destination IP address\n
saddr
\n A string representing the source IP address\n-
size
\n- Number of bytes received or error code if an error occurred.\n
name
\n Name of this probe\n-
daddr
\n- A string representing the destination IP address\n-
sport
\n- TCP source port \n+
size
\n+ Number of bytes received or error code if an error occurred.\n+
family
\n+ IP address family\n
probe::tcp.recvmsg — \n Receiving TCP message\n-
tcp.recvmsg
size
\n- Number of bytes to be received \n-
family
\n- IP address family\n-
dport
\n+
tcp.recvmsg
dport
\n TCP destination port\n+
sport
\n+ TCP source port \n
saddr
\n A string representing the source IP address\n+
daddr
\n+ A string representing the destination IP address\n
name
\n Name of this probe\n+
size
\n+ Number of bytes to be received \n
sock
\n Network socket\n-
daddr
\n- A string representing the destination IP address\n-
sport
\n- TCP source port \n+
family
\n+ IP address family\n
probe::tcp.sendmsg.return — \n Sending TCP message is done\n-
tcp.sendmsg.return
size
\n- Number of bytes sent or error code if an error occurred. \n-
name
\n+
tcp.sendmsg.return
probe::tcp.sendmsg — \n Sending a tcp message\n-
tcp.sendmsg
sock
\n- Network socket \n-
family
\n- IP address family\n-
size
\n+
tcp.sendmsg
probe::tcp.setsockopt — \n Call to setsockopt
\n-
tcp.setsockopt
optlen
\n- Used to access values for setsockopt
\n-
optname
\n- TCP socket options (e.g. TCP_NODELAY, TCP_MAXSEG, etc)\n+
tcp.setsockopt
sock
\n+ Network socket\n
family
\n IP address family\n-
level
\n- The level at which the socket options will be manipulated\n
name
\n Name of this probe\n-
sock
\n- Network socket\n+
optname
\n+ TCP socket options (e.g. TCP_NODELAY, TCP_MAXSEG, etc)\n+
level
\n+ The level at which the socket options will be manipulated\n
optstr
\n Resolves optname to a human-readable format\n+
optlen
\n+ Used to access values for setsockopt
\n
probe::tcpmib.ActiveOpens — \n Count an active opening of a socket\n-
tcpmib.ActiveOpens
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.ActiveOpens
probe::tcpmib.OutRsts — \n Count the sending of a reset packet\n-
tcpmib.OutRsts
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.OutRsts
probe::tcpmib.OutSegs — \n Count the sending of a TCP segment\n-
tcpmib.OutSegs
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.OutSegs
probe::tty.ioctl — \n called when a ioctl is request to the tty\n-
tty.ioctl
probe::tty.open — \n Called when a tty is opened\n-
tty.open
probe::tty.poll — \n Called when a tty device is being polled\n-
tty.poll
probe::tty.read — \n called when a tty line will be read\n-
tty.read
probe::tty.receive — \n called when a tty receives a message\n-
tty.receive
driver_name
\n- the driver name\n+
tty.receive
id
\n+ the tty id\n
count
\n The amount of characters received\n-
fp
\n- The flag buffer\n-
id
\n- the tty id\n
index
\n The tty Index\n-
cp
\n- the buffer that was received\n
name
\n the name of the module file\n+
cp
\n+ the buffer that was received\n+
fp
\n+ The flag buffer\n+
driver_name
\n+ the driver name\n
probe::tty.release — \n Called when the tty is closed\n-
tty.release
probe::tty.resize — \n Called when a terminal resize happens\n-
tty.resize
new_row
\n+
tty.resize
old_ypixel
\n+ the old ypixel\n+
new_col
\n+ the new col value\n+
new_row
\n the new row value\n-
old_row
\n- the old row value\n+
old_xpixel
\n+ the old xpixel\n
name
\n the tty name\n-
old_ypixel
\n- the old ypixel\n
new_ypixel
\n the new ypixel value\n-
new_col
\n- the new col value\n
old_col
\n the old col value\n
new_xpixel
\n the new xpixel value\n-
old_xpixel
\n- the old xpixel\n+
old_row
\n+ the old row value\n
probe::tty.unregister — \n Called when a tty device is being unregistered\n
tty.unregister
probe::tty.write — \n write to the tty line\n-
tty.write
probe::udp.disconnect.return — \n UDP has been disconnected successfully\n-
udp.disconnect.return
sport
\n- UDP source port\n+
udp.disconnect.return
ret
\n+ Error code (0: no error) \n
family
\n IP address family\n-
daddr
\n- A string representing the destination IP address\n+
saddr
\n+ A string representing the source IP address\n
name
\n The name of this probe\n-
ret
\n- Error code (0: no error) \n
dport
\n UDP destination port\n-
saddr
\n- A string representing the source IP address\n+
daddr
\n+ A string representing the destination IP address\n+
sport
\n+ UDP source port\n
probe::udp.disconnect — \n Fires when a process requests for a UDP disconnection\n-
udp.disconnect
saddr
\n- A string representing the source IP address\n-
flags
\n- Flags (e.g. FIN, etc) \n-
dport
\n+
udp.disconnect
dport
\n UDP destination port\n-
sock
\n- Network socket used by the process\n+
saddr
\n+ A string representing the source IP address\n
name
\n The name of this probe\n-
daddr
\n- A string representing the destination IP address\n
family
\n IP address family\n+
flags
\n+ Flags (e.g. FIN, etc) \n+
sock
\n+ Network socket used by the process\n
sport
\n UDP source port\n+
daddr
\n+ A string representing the destination IP address\n
probe::udp.recvmsg.return — \n Fires whenever an attempt to receive a UDP message received is completed\n-
udp.recvmsg.return
dport
\n- UDP destination port\n-
saddr
\n- A string representing the source IP address\n-
sport
\n+
udp.recvmsg.return
sport
\n UDP source port\n-
daddr
\n- A string representing the destination IP address\n-
name
\n- The name of this probe\n
size
\n Number of bytes received by the process\n+
daddr
\n+ A string representing the destination IP address\n
family
\n IP address family\n+
dport
\n+ UDP destination port\n+
name
\n+ The name of this probe\n+
saddr
\n+ A string representing the source IP address\n
probe::udp.recvmsg — \n Fires whenever a UDP message is received\n-
udp.recvmsg
name
\n+
udp.recvmsg
dport
\n+ UDP destination port\n+
name
\n The name of this probe\n-
daddr
\n- A string representing the destination IP address\n-
family
\n- IP address family\n-
size
\n- Number of bytes received by the process\n-
sport
\n- UDP source port\n
saddr
\n A string representing the source IP address\n-
dport
\n- UDP destination port\n+
family
\n+ IP address family\n
sock
\n Network socket used by the process\n+
sport
\n+ UDP source port\n+
size
\n+ Number of bytes received by the process\n+
daddr
\n+ A string representing the destination IP address\n
probe::udp.sendmsg — \n Fires whenever a process sends a UDP message\n-
udp.sendmsg
name
\n+
udp.sendmsg
family
\n+ IP address family\n+
saddr
\n+ A string representing the source IP address\n+
name
\n The name of this probe\n+
dport
\n+ UDP destination port\n
daddr
\n A string representing the destination IP address\n
size
\n Number of bytes sent by the process\n-
family
\n- IP address family\n
sport
\n UDP source port\n-
saddr
\n- A string representing the source IP address\n-
dport
\n- UDP destination port\n
sock
\n Network socket used by the process \n
probe::vm.brk — \n Fires when a brk is requested (i.e. the heap will be resized)\n-
vm.brk
address
\n- the requested address\n-
length
\n+
vm.brk
probe::vm.kfree — \n Fires when kfree is requested\n-
vm.kfree
call_site
\n- address of the function calling this kmemory function\n-
caller_function
\n- name of the caller function.\n-
ptr
\n+
vm.kfree
probe::vm.kmalloc_node — \n Fires when kmalloc_node is requested\n
vm.kmalloc_node
caller_function
\n name of the caller function\n-
gfp_flag_name
\n- type of kmemory to allocate(in string format)\n-
call_site
\n- address of the function caling this kmemory function\n
bytes_req
\n requested Bytes\n-
gfp_flags
\n- type of kmemory to allocate\n-
name
\n- name of the probe point\n
bytes_alloc
\n allocated Bytes\n+
gfp_flag_name
\n+ type of kmemory to allocate(in string format)\n+
gfp_flags
\n+ type of kmemory to allocate\n+
call_site
\n+ address of the function caling this kmemory function\n
ptr
\n pointer to the kmemory allocated\n+
name
\n+ name of the probe point\n
probe::vm.kmalloc — \n Fires when kmalloc is requested\n-
vm.kmalloc
caller_function
\n- name of the caller function\n-
gfp_flag_name
\n+
vm.kmalloc
gfp_flag_name
\n type of kmemory to allocate (in String format)\n-
call_site
\n- address of the kmemory function\n-
bytes_req
\n- requested Bytes\n
gfp_flags
\n type of kmemory to allocate\n-
name
\n- name of the probe point\n+
caller_function
\n+ name of the caller function\n+
bytes_req
\n+ requested Bytes\n
bytes_alloc
\n allocated Bytes\n+
call_site
\n+ address of the kmemory function\n
ptr
\n pointer to the kmemory allocated\n+
name
\n+ name of the probe point\n
probe::vm.kmem_cache_alloc_node — \n Fires when kmem_cache_alloc_node is requested\n-
vm.kmem_cache_alloc_node
caller_function
\n- name of the caller function\n-
gfp_flag_name
\n- type of kmemory to allocate(in string format)\n-
bytes_req
\n- requested Bytes\n+
vm.kmem_cache_alloc_node
name
\n+ name of the probe point\n+
ptr
\n+ pointer to the kmemory allocated\n
call_site
\n address of the function calling this kmemory function\n
gfp_flags
\n type of kmemory to allocate\n-
name
\n- name of the probe point\n+
gfp_flag_name
\n+ type of kmemory to allocate(in string format)\n
bytes_alloc
\n allocated Bytes\n-
ptr
\n- pointer to the kmemory allocated\n+
bytes_req
\n+ requested Bytes\n+
caller_function
\n+ name of the caller function\n
probe::vm.kmem_cache_alloc — \n Fires when kmem_cache_alloc is requested\n-
vm.kmem_cache_alloc
ptr
\n- pointer to the kmemory allocated\n-
name
\n- name of the probe point\n-
bytes_alloc
\n- allocated Bytes\n+
vm.kmem_cache_alloc
gfp_flag_name
\n+ type of kmemory to allocate(in string format)\n
gfp_flags
\n type of kmemory to allocate\n-
call_site
\n- address of the function calling this kmemory function.\n-
bytes_req
\n- requested Bytes\n-
gfp_flag_name
\n- type of kmemory to allocate(in string format)\n
caller_function
\n name of the caller function.\n+
bytes_req
\n+ requested Bytes\n+
bytes_alloc
\n+ allocated Bytes\n+
call_site
\n+ address of the function calling this kmemory function.\n+
ptr
\n+ pointer to the kmemory allocated\n+
name
\n+ name of the probe point\n
probe::vm.kmem_cache_free — \n Fires when kmem_cache_free is requested\n-
vm.kmem_cache_free
name
\n- Name of the probe point\n-
ptr
\n- Pointer to the kmemory allocated which is returned by kmem_cache\n+
vm.kmem_cache_free
probe::vm.mmap — \n Fires when an mmap is requested\n
vm.mmap
probe::vm.munmap — \n Fires when an munmap is requested\n-
vm.munmap
length
\n+
vm.munmap
probe::vm.oom_kill — \n Fires when a thread is selected for termination by the OOM killer\n-
vm.oom_kill
probe::vm.pagefault — \n Records that a page fault occurred\n-
vm.pagefault
address
\n- the address of the faulting memory access; i.e. the address that caused the page fault\n+
vm.pagefault
probe::vm.write_shared_copy — \n Page copy for shared page write\n
vm.write_shared_copy
probe::vm.write_shared — \n Attempts at writing to a shared page\n-
vm.write_shared