{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/r-b-build.BpwSvkQD/b1/systemtap_4.8-2_i386.changes", "source2": "/srv/reproducible-results/rbuild-debian/r-b-build.BpwSvkQD/b2/systemtap_4.8-2_i386.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -1,11 +1,11 @@\n \n 4dda445e6f6607eea73a660e2523c34b 9028 devel optional systemtap-client_4.8-2_i386.deb\n d184789b4507212c01d2aa735ceafc31 678376 devel optional systemtap-common_4.8-2_i386.deb\n 52f34f3954c04bcd92a66fad274607fb 20118692 debug optional systemtap-dbgsym_4.8-2_i386.deb\n- df91b894fb38de8f169f7560d28191ea 2570404 doc optional systemtap-doc_4.8-2_i386.deb\n+ 62709afc7333e9af2719eba6c8e6cb71 2570444 doc optional systemtap-doc_4.8-2_i386.deb\n 79d179a333d5989770c8cdb897fce057 1162368 debug optional systemtap-runtime-dbgsym_4.8-2_i386.deb\n aed9c1408df895fb9fefa9d125c74d7d 147752 devel optional systemtap-runtime_4.8-2_i386.deb\n debd47f752232ff325e90ab9e6466e0b 19380 devel optional systemtap-sdt-dev_4.8-2_i386.deb\n 62a367d0dee1eadf87de92280c8d16d1 1952944 debug optional systemtap-server-dbgsym_4.8-2_i386.deb\n 02d317f4ab3fbfce5f042a6f3e0f63cc 165640 devel optional systemtap-server_4.8-2_i386.deb\n b6e6c316b4a2d81543941c402a074bb2 1498124 devel optional systemtap_4.8-2_i386.deb\n"}, {"source1": "systemtap-doc_4.8-2_i386.deb", "source2": "systemtap-doc_4.8-2_i386.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2023-02-28 20:45:06.000000 debian-binary\n--rw-r--r-- 0 0 0 53880 2023-02-28 20:45:06.000000 control.tar.xz\n--rw-r--r-- 0 0 0 2516332 2023-02-28 20:45:06.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 53900 2023-02-28 20:45:06.000000 control.tar.xz\n+-rw-r--r-- 0 0 0 2516352 2023-02-28 20:45:06.000000 data.tar.xz\n"}, {"source1": "control.tar.xz", "source2": "control.tar.xz", "unified_diff": null, "details": [{"source1": "control.tar", "source2": "control.tar", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "comments": ["Files differ"], "unified_diff": null}]}]}]}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-ioblock-end.html", "unified_diff": "@@ -1,41 +1,41 @@\n
probe::ioblock.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock.end
size
\n+
ioblock.end
opf
\n+ operations and flags\n+
idx
\n+ offset into the bio vector array\n+
size
\n total size in bytes\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
error
\n+ 0 on success\n+
sector
\n+ beginning sector for the entire bio\n+
phys_segments
\n+ number of segments in this bio after physical address coalescing is performed.\n
hw_segments
\n number of segments after physical and DMA remapping hardware coalescing is performed\n-
idx
\n- offset into the bio vector array\n-
opf
\n- operations and flags\n+
bytes_done
\n+ number of bytes transferred\n+
devname
\n+ block device name\n
rw
\n binary trace for read/write request\n-
phys_segments
\n- number of segments in this bio after physical address coalescing is performed.\n
ino
\n i-node number of the mapped file\n-
sector
\n- beginning sector for the entire bio\n-
error
\n- 0 on success\n-
bytes_done
\n- number of bytes transferred\n
name
\n name of the probe point\n-
devname
\n- block device name\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n
probe::ioblock.request — \n Fires whenever making a generic block I/O request.\n-
ioblock.request
devname
\n- block device name\n+
ioblock.request
phys_segments
\n+ number of segments in this bio after physical address coalescing is performed\n+
sector
\n+ beginning sector for the entire bio\n+
hw_segments
\n+ number of segments after physical and DMA remapping hardware coalescing is performed\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n
name
\n name of the probe point\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
rw
\n+ binary trace for read/write request\n+
ino
\n+ i-node number of the mapped file\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid \n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
bdev
\n- target block device\n+
devname
\n+ block device name\n+
size
\n+ total size in bytes\n
opf
\n operations and flags\n
idx
\n offset into the bio vector array\n
bdev_contains
\n points to the device object which contains the partition (when bio structure represents a partition)\n-
hw_segments
\n- number of segments after physical and DMA remapping hardware coalescing is performed\n-
size
\n- total size in bytes\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
sector
\n- beginning sector for the entire bio\n-
rw
\n- binary trace for read/write request\n-
ino
\n- i-node number of the mapped file\n-
phys_segments
\n- number of segments in this bio after physical address coalescing is performed\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
bdev
\n+ target block device\n
probe::ioblock_trace.bounce — \n Fires whenever a buffer bounce is needed for at least one page of a block IO request.\n-
ioblock_trace.bounce
opf
\n- operations and flags\n+
ioblock_trace.bounce
bdev
\n+ target block device\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n
idx
\n offset into the bio vector array\n phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
opf
\n+ operations and flags\n
size
\n total size in bytes\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
sector
\n- beginning sector for the entire bio\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
ino
\n- i-node number of the mapped file\n-
rw
\n- binary trace for read/write request\n
devname
\n device for which a buffer bounce was needed.\n-
name
\n- name of the probe point\n
bytes_done
\n number of bytes transferred\n
q
\n request queue on which this bio was queued.\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n-
bdev
\n- target block device\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
name
\n+ name of the probe point\n+
rw
\n+ binary trace for read/write request\n+
ino
\n+ i-node number of the mapped file\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
sector
\n+ beginning sector for the entire bio\n
probe::ioblock_trace.end — \n Fires whenever a block I/O transfer is complete.\n-
ioblock_trace.end
size
\n- total size in bytes\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
opf
\n- operations and flags\n-
ino
\n- i-node number of the mapped file\n-
rw
\n- binary trace for read/write request\n-
p_start_sect
\n- points to the start sector of the partition structure of the device\n-
sector
\n- beginning sector for the entire bio\n+
ioblock_trace.end
devname
\n+ block device name\n
bytes_done
\n number of bytes transferred\n-
devname
\n- block device name\n-
name
\n- name of the probe point\n-
bdev
\n- target block device\n+
q
\n+ request queue on which this bio was queued.\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n-
q
\n- request queue on which this bio was queued.\n+
ino
\n+ i-node number of the mapped file\n+
rw
\n+ binary trace for read/write request\n+
name
\n+ name of the probe point\n+
p_start_sect
\n+ points to the start sector of the partition structure of the device\n+
sector
\n+ beginning sector for the entire bio\n+
bdev
\n+ target block device\n
vcnt
\n bio vector count which represents number of array element (page, offset, length) which makes up this I/O request\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
opf
\n+ operations and flags\n+
size
\n+ total size in bytes\n
probe::ioblock_trace.request — \n Fires just as a generic block I/O request is created for a bio.\n-
ioblock_trace.request
opf
\n- operations and flags\n-
idx
\n- offset into the bio vector array\n- phys_segments
- number of segments in this bio after physical address coalescing is performed.\n-
bdev_contains
\n- points to the device object which contains the partition (when bio structure represents a partition)\n-
size
\n- total size in bytes\n+
ioblock_trace.request
sector
\n+ beginning sector for the entire bio\n
p_start_sect
\n points to the start sector of the partition structure of the device\n-
sector
\n- beginning sector for the entire bio\n
rw
\n binary trace for read/write request\n
ino
\n i-node number of the mapped file\n
name
\n name of the probe point\n-
devname
\n- block device name\n-
bytes_done
\n- number of bytes transferred\n-
vcnt
\n- bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n-
q
\n- request queue on which this bio was queued.\n
flags
\n see below\n BIO_UPTODATE 0 ok after I/O completion\n BIO_RW_BLOCK 1 RW_AHEAD set, and read/write would block\n BIO_EOF 2 out-out-bounds error\n BIO_SEG_VALID 3 nr_hw_seg valid\n BIO_CLONED 4 doesn't own data\n BIO_BOUNCED 5 bio is a bounce bio\n BIO_USER_MAPPED 6 contains user pages\n BIO_EOPNOTSUPP 7 not supported\n+
bytes_done
\n+ number of bytes transferred\n+
q
\n+ request queue on which this bio was queued.\n+
devname
\n+ block device name\n+
size
\n+ total size in bytes\n+
opf
\n+ operations and flags\n+
idx
\n+ offset into the bio vector array\n+ phys_segments
- number of segments in this bio after physical address coalescing is performed.\n+
vcnt
\n+ bio vector count which represents number of array element (page, offset, length) which make up this I/O request\n+
bdev_contains
\n+ points to the device object which contains the partition (when bio structure represents a partition)\n
bdev
\n target block device\n
probe::ioscheduler.elv_add_request.kp — \n kprobe based probe to indicate that a request was added to the request queue\n-
ioscheduler.elv_add_request.kp
disk_minor
\n- Disk minor number of the request\n-
q
\n- pointer to request queue\n+
ioscheduler.elv_add_request.kp
disk_major
\n+ Disk major number of the request\n
rq
\n Address of the request\n
elevator_name
\n The type of I/O elevator currently enabled\n+
q
\n+ pointer to request queue\n
name
\n Name of the probe point\n+
disk_minor
\n+ Disk minor number of the request\n
rq_flags
\n Request flags\n-
disk_major
\n- Disk major number of the request\n
probe::ioscheduler.elv_add_request.tp — \n tracepoint based probe to indicate a request is added to the request queue.\n-
ioscheduler.elv_add_request.tp
disk_minor
\n- Disk minor number of request.\n+
ioscheduler.elv_add_request.tp
q
\n+ Pointer to request queue.\n+
name
\n+ Name of the probe point\n
rq_flags
\n Request flags.\n+
disk_minor
\n+ Disk minor number of request.\n
disk_major
\n Disk major no of request.\n-
name
\n- Name of the probe point\n
rq
\n Address of request.\n-
q
\n- Pointer to request queue.\n
elevator_name
\n The type of I/O elevator currently enabled.\n
probe::ioscheduler.elv_add_request — \n probe to indicate request is added to the request queue.\n-
ioscheduler.elv_add_request
disk_minor
\n- Disk minor number of request.\n-
rq
\n- Address of request.\n-
q
\n+
ioscheduler.elv_add_request
q
\n Pointer to request queue.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n
rq_flags
\n Request flags.\n+
disk_minor
\n+ Disk minor number of request.\n
disk_major
\n Disk major no of request.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n+
rq
\n+ Address of request.\n
probe::ioscheduler.elv_completed_request — \n Fires when a request is completed\n-
ioscheduler.elv_completed_request
disk_minor
\n- Disk minor number of the request\n-
rq_flags
\n- Request flags\n-
disk_major
\n+
ioscheduler.elv_completed_request
probe::ioscheduler.elv_next_request.return — \n Fires when a request retrieval issues a return signal\n-
ioscheduler.elv_next_request.return
disk_major
\n- Disk major number of the request\n-
disk_minor
\n- Disk minor number of the request\n-
rq_flags
\n- Request flags\n-
name
\n+
ioscheduler.elv_next_request.return
probe::ioscheduler.elv_next_request — \n Fires when a request is retrieved from the request queue\n-
ioscheduler.elv_next_request
probe::ioscheduler_trace.elv_abort_request — \n Fires when a request is aborted.\n-
ioscheduler_trace.elv_abort_request
rq
\n- Address of request.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n-
name
\n+
ioscheduler_trace.elv_abort_request
probe::ioscheduler_trace.elv_completed_request — \n Fires when a request is\n-
ioscheduler_trace.elv_completed_request
disk_minor
\n- Disk minor number of request.\n-
name
\n- Name of the probe point\n-
rq
\n+
ioscheduler_trace.elv_completed_request
probe::ioscheduler_trace.elv_issue_request — \n Fires when a request is\n-
ioscheduler_trace.elv_issue_request
rq_flags
\n- Request flags.\n-
disk_major
\n+
ioscheduler_trace.elv_issue_request
disk_major
\n Disk major no of request.\n-
name
\n- Name of the probe point\n-
rq
\n- Address of request.\n
elevator_name
\n The type of I/O elevator currently enabled.\n+
rq
\n+ Address of request.\n+
rq_flags
\n+ Request flags.\n
disk_minor
\n Disk minor number of request.\n+
name
\n+ Name of the probe point\n
probe::ioscheduler_trace.elv_requeue_request — \n Fires when a request is\n
ioscheduler_trace.elv_requeue_request
disk_major
\n Disk major no of request.\n-
rq_flags
\n- Request flags.\n-
elevator_name
\n- The type of I/O elevator currently enabled.\n
rq
\n Address of request.\n+
elevator_name
\n+ The type of I/O elevator currently enabled.\n
name
\n Name of the probe point\n
disk_minor
\n Disk minor number of request.\n+
rq_flags
\n+ Request flags.\n
probe::ioscheduler_trace.plug — \n Fires when a request queue is plugged;\n-
ioscheduler_trace.plug
probe::ipmib.FragFails — \n Count datagram fragmented unsuccessfully\n-
ipmib.FragFails
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.FragFails
probe::ipmib.FragOKs — \n Count datagram fragmented successfully\n-
ipmib.FragOKs
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.FragOKs
probe::ipmib.InAddrErrors — \n Count arriving packets with an incorrect address\n-
ipmib.InAddrErrors
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.InAddrErrors
probe::ipmib.InDiscards — \n Count discarded inbound packets\n-
ipmib.InDiscards
skb
\n- pointer to the struct sk_buff being acted on\n-
op
\n+
ipmib.InDiscards
probe::ipmib.InNoRoutes — \n Count an arriving packet with no matching socket\n-
ipmib.InNoRoutes
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.InNoRoutes
probe::ipmib.OutRequests — \n Count a request to send a packet\n-
ipmib.OutRequests
op
\n- value to be added to the counter (default value of 1)\n-
skb
\n+
ipmib.OutRequests
probe::irq_handler.entry — \n Execution of interrupt handler starting\n-
irq_handler.entry
thread_flags
\n- Flags related to thread\n+
irq_handler.entry
irq
\n+ irq number\n
dir
\n pointer to the proc/irq/NN/name entry\n-
thread_fn
\n- interrupt handler function for threaded interrupts\n-
dev_name
\n- name of device\n
next_irqaction
\n pointer to next irqaction for shared interrupts\n+
thread_flags
\n+ Flags related to thread\n+
thread_fn
\n+ interrupt handler function for threaded interrupts\n+
action
\n+ struct irqaction* for this interrupt num\n
flags
\n Flags for IRQ handler\n
handler
\n interrupt handler function\n
flags_str
\n symbolic string representation of IRQ flags\n-
action
\n- struct irqaction* for this interrupt num\n-
irq
\n- irq number\n-
dev_id
\n- Cookie to identify device\n
thread
\n thread pointer for threaded interrupts\n+
dev_name
\n+ name of device\n+
dev_id
\n+ Cookie to identify device\n
probe::irq_handler.exit — \n Execution of interrupt handler completed\n-
irq_handler.exit
dev_name
\n+
irq_handler.exit
flags
\n+ flags for IRQ handler\n+
handler
\n+ interrupt handler function that was executed\n+
flags_str
\n+ symbolic string representation of IRQ flags\n+
dev_id
\n+ Cookie to identify device\n+
ret
\n+ return value of the handler\n+
thread
\n+ thread pointer for threaded interrupts\n+
dev_name
\n name of device\n+
irq
\n+ interrupt number\n+
action
\n+ struct irqaction*\n
next_irqaction
\n pointer to next irqaction for shared interrupts\n+
dir
\n+ pointer to the proc/irq/NN/name entry\n
thread_flags
\n Flags related to thread\n
thread_fn
\n interrupt handler function for threaded interrupts\n-
dir
\n- pointer to the proc/irq/NN/name entry\n-
flags_str
\n- symbolic string representation of IRQ flags\n-
handler
\n- interrupt handler function that was executed\n-
irq
\n- interrupt number\n-
action
\n- struct irqaction*\n-
dev_id
\n- Cookie to identify device\n-
thread
\n- thread pointer for threaded interrupts\n-
flags
\n- flags for IRQ handler\n-
ret
\n- return value of the handler\n
probe::kprocess.create — \n Fires whenever a new process or thread is successfully created\n-
kprocess.create
new_pid
\n- The PID of the newly created process\n-
new_tid
\n+
kprocess.create
probe::kprocess.exec_complete — \n Return from exec to a new program\n-
kprocess.exec_complete
success
\n- A boolean indicating whether the exec was successful\n-
errno
\n+
kprocess.exec_complete
errno
\n The error number resulting from the exec\n-
name
\n- Name of the system call (“execve”) (SystemTap v2.5+)\n
retstr
\n A string representation of errno (SystemTap v2.5+)\n+
success
\n+ A boolean indicating whether the exec was successful\n+
name
\n+ Name of the system call (“execve”) (SystemTap v2.5+)\n
probe::linuxmib.ListenDrops — \n Count of times conn request that were dropped\n-
linuxmib.ListenDrops
sk
\n- Pointer to the struct sock being acted on\n-
op
\n+
linuxmib.ListenDrops
probe::linuxmib.ListenOverflows — \n Count of times a listen queue overflowed\n-
linuxmib.ListenOverflows
sk
\n- Pointer to the struct sock being acted on\n-
op
\n+
linuxmib.ListenOverflows
probe::netdev.change_mac — \n Called when the netdev_name has the MAC changed\n
netdev.change_mac
probe::netdev.change_mtu — \n Called when the netdev MTU is changed\n-
netdev.change_mtu
probe::netdev.change_rx_flag — \n Called when the device RX flag will be changed\n-
netdev.change_rx_flag
probe::netdev.hard_transmit — \n Called when the devices is going to TX (hard)\n
netdev.hard_transmit
probe::netdev.receive — \n Data received from network device.\n-
netdev.receive
probe::netdev.rx — \n Called when the device is going to receive a packet\n-
netdev.rx
probe::netdev.set_promiscuity — \n Called when the device enters/leaves promiscuity\n-
netdev.set_promiscuity
enable
\n- If the device is entering promiscuity mode\n-
disable
\n- If the device is leaving promiscuity mode\n+
netdev.set_promiscuity
dev_name
\n+ The device that is entering/leaving promiscuity mode\n
inc
\n Count the number of promiscuity openers\n-
dev_name
\n- The device that is entering/leaving promiscuity mode\n+
disable
\n+ If the device is leaving promiscuity mode\n+
enable
\n+ If the device is entering promiscuity mode\n
probe::netdev.transmit — \n Network device transmitting buffer\n-
netdev.transmit
dev_name
\n- The name of the device. e.g: eth0, ath1.\n+
netdev.transmit
protocol
\n+ The protocol of this packet(defined in include/linux/if_ether.h).\n
length
\n The length of the transmit buffer.\n-
protocol
\n- The protocol of this packet(defined in include/linux/if_ether.h).\n
truesize
\n The size of the data to be transmitted.\n+
dev_name
\n+ The name of the device. e.g: eth0, ath1.\n
probe::netfilter.arp.forward — \n - Called for each ARP packet to be forwarded\n-
netfilter.arp.forward
ar_op
\n- ARP opcode (command)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
ar_pro
\n- Format of protocol address\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
length
\n+
netfilter.arp.forward
length
\n The length of the packet buffer contents, in bytes\n-
data_str
\n- A string representing the packet buffer contents\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n
ar_tha
\n Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
arphdr
\n- Address of ARP header\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n
ar_sha
\n Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
arphdr
\n+ Address of ARP header\n+
pf
\n+ Protocol family -- always “arp”\n
ar_hln
\n Length of hardware address\n
outdev_name
\n Name of network device packet will be routed to (if known)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
ar_op
\n+ ARP opcode (command)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
ar_hrd
\n+ Format of hardware address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
data_str
\n+ A string representing the packet buffer contents\n
indev_name
\n Name of network device packet was received on (if known)\n-
ar_data
\n- Address of ARP packet data region (after the header)\n-
pf
\n- Protocol family -- always “arp”\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
ar_pln
\n Length of protocol address\n-
ar_hrd
\n- Format of hardware address\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
ar_pro
\n+ Format of protocol address\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
probe::netfilter.arp.in — \n - Called for each incoming ARP packet\n-
netfilter.arp.in
nf_stop
\n+
netfilter.arp.in
pf
\n+ Protocol family -- always “arp”\n+
arphdr
\n+ Address of ARP header\n+
ar_hln
\n+ Length of hardware address\n+
nf_stop
\n Constant used to signify a 'stop' verdict\n+
ar_op
\n+ ARP opcode (command)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
ar_hrd
\n+ Format of hardware address\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
ar_pro
\n- Format of protocol address\n-
data_str
\n- A string representing the packet buffer contents\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n
length
\n The length of the packet buffer contents, in bytes\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
ar_op
\n- ARP opcode (command)\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n
nf_accept
\n Constant used to signify an 'accept' verdict\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
pf
\n- Protocol family -- always “arp”\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
ar_pln
\n Length of protocol address\n-
ar_hrd
\n- Format of hardware address\n+
ar_pro
\n+ Format of protocol address\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
arphdr
\n- Address of ARP header\n-
ar_hln
\n- Length of hardware address\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
ar_data
\n- Address of ARP packet data region (after the header)\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n
indev_name
\n Name of network device packet was received on (if known)\n+
data_str
\n+ A string representing the packet buffer contents\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
probe::netfilter.arp.out — \n - Called for each outgoing ARP packet\n-
netfilter.arp.out
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
ar_sip
\n- Ethernet+IP only (ar_pro==0x800): source IP address\n-
ar_tip
\n- Ethernet+IP only (ar_pro==0x800): target IP address\n-
data_str
\n- A string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n+
netfilter.arp.out
arphdr
\n+ Address of ARP header\n+
pf
\n+ Protocol family -- always “arp”\n+
ar_hln
\n+ Length of hardware address\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
ar_pro
\n- Format of protocol address\n+
ar_op
\n+ ARP opcode (command)\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
ar_hrd
\n+ Format of hardware address\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
ar_data
\n+ Address of ARP packet data region (after the header)\n+
ar_tha
\n+ Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
ar_sha
\n+ Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
ar_op
\n- ARP opcode (command)\n-
ar_hrd
\n- Format of hardware address\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
ar_pln
\n Length of protocol address\n-
pf
\n- Protocol family -- always “arp”\n-
ar_data
\n- Address of ARP packet data region (after the header)\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
arphdr
\n- Address of ARP header\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
ar_pro
\n+ Format of protocol address\n
outdev
\n Address of net_device representing output device, 0 if unknown\n-
ar_hln
\n- Length of hardware address\n-
ar_sha
\n- Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address \n-
ar_tha
\n- Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address\n+
ar_sip
\n+ Ethernet+IP only (ar_pro==0x800): source IP address\n+
ar_tip
\n+ Ethernet+IP only (ar_pro==0x800): target IP address\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
data_str
\n+ A string representing the packet buffer contents\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
probe::netfilter.bridge.forward — \n Called on an incoming bridging packet destined for some other computer\n-
netfilter.bridge.forward
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
br_bid
\n- Identity of bridge\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
protocol
\n- Packet protocol\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n+
netfilter.bridge.forward
br_vid
\n+ Protocol version identifier\n+
brhdr
\n+ Address of bridge header\n+
br_rmac
\n+ Root bridge MAC address\n
pf
\n Protocol family -- always “bridge”\n-
br_poid
\n- Port identifier\n-
br_type
\n- BPDU type\n-
br_max
\n- Max age in 1/256 secs\n
br_prid
\n Protocol identifier\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_rid
\n- Identity of root bridge\n-
brhdr
\n- Address of bridge header\n-
br_msg
\n- Message age in 1/256 secs\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
br_mac
\n Bridge MAC address\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
br_flags
\n BPDU flags\n-
br_fd
\n- Forward delay in 1/256 secs\n-
br_vid
\n- Protocol version identifier\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
br_rmac
\n- Root bridge MAC address\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_htime
\n- Hello time in 1/256 secs\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n+
br_rid
\n+ Identity of root bridge\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
protocol
\n+ Packet protocol\n
length
\n The length of the packet buffer contents, in bytes\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
br_fd
\n+ Forward delay in 1/256 secs\n+
br_bid
\n+ Identity of bridge\n+
br_max
\n+ Max age in 1/256 secs\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_htime
\n+ Hello time in 1/256 secs\n+
br_type
\n+ BPDU type\n+
br_poid
\n+ Port identifier\n+
br_msg
\n+ Message age in 1/256 secs\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n
data_str
\n A string representing the packet buffer contents\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n
probe::netfilter.bridge.local_in — \n Called on a bridging packet destined for the local computer\n-
netfilter.bridge.local_in
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_rmac
\n- Root bridge MAC address\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
netfilter.bridge.local_in
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_poid
\n+ Port identifier\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
data_str
\n+ A string representing the packet buffer contents\n
br_htime
\n Hello time in 1/256 secs\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_type
\n+ BPDU type\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
data_str
\n- A string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
nf_queue
\n Constant used to signify a 'queue' verdict\n-
br_rid
\n- Identity of root bridge\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
br_prid
\n- Protocol identifier\n-
br_msg
\n- Message age in 1/256 secs\n-
brhdr
\n- Address of bridge header\n
br_fd
\n Forward delay in 1/256 secs\n+
br_max
\n+ Max age in 1/256 secs\n+
br_bid
\n+ Identity of bridge\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
br_rid
\n+ Identity of root bridge\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
protocol
\n+ Packet protocol\n
br_mac
\n Bridge MAC address\n-
br_flags
\n- BPDU flags\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
br_prid
\n+ Protocol identifier\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
br_flags
\n+ BPDU flags\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_rmac
\n+ Root bridge MAC address\n+
brhdr
\n+ Address of bridge header\n
br_vid
\n Protocol version identifier\n
pf
\n Protocol family -- always “bridge”\n-
br_poid
\n- Port identifier\n-
br_type
\n- BPDU type\n-
br_max
\n- Max age in 1/256 secs\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
br_bid
\n- Identity of bridge\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
protocol
\n- Packet protocol\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n
probe::netfilter.bridge.local_out — \n Called on a bridging packet coming from a local process\n-
netfilter.bridge.local_out
br_max
\n- Max age in 1/256 secs\n-
br_type
\n- BPDU type\n-
br_poid
\n- Port identifier\n-
pf
\n- Protocol family -- always “bridge”\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
br_bid
\n- Identity of bridge\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n+
netfilter.bridge.local_out
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
br_rid
\n+ Identity of root bridge\n
protocol
\n Packet protocol\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n
length
\n The length of the packet buffer contents, in bytes\n-
data_str
\n- A string representing the packet buffer contents\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
br_vid
\n+ Protocol version identifier\n+
brhdr
\n+ Address of bridge header\n
br_rmac
\n Root bridge MAC address\n+
pf
\n+ Protocol family -- always “bridge”\n+
br_prid
\n+ Protocol identifier\n+
br_mac
\n+ Bridge MAC address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
nf_stop
\n Constant used to signify a 'stop' verdict\n-
br_htime
\n- Hello time in 1/256 secs\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
br_flags
\n BPDU flags\n-
br_mac
\n- Bridge MAC address\n-
br_fd
\n- Forward delay in 1/256 secs\n-
br_vid
\n- Protocol version identifier\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n+
br_htime
\n+ Hello time in 1/256 secs\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_type
\n+ BPDU type\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_poid
\n+ Port identifier\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
br_prid
\n- Protocol identifier\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
data_str
\n+ A string representing the packet buffer contents\n
nf_queue
\n Constant used to signify a 'queue' verdict\n-
br_rid
\n- Identity of root bridge\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
brhdr
\n- Address of bridge header\n-
br_msg
\n- Message age in 1/256 secs\n+
br_fd
\n+ Forward delay in 1/256 secs\n+
br_bid
\n+ Identity of bridge\n+
br_max
\n+ Max age in 1/256 secs\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
probe::netfilter.bridge.post_routing — \n - Called before a bridging packet hits the wire\n-
netfilter.bridge.post_routing
br_rmac
\n- Root bridge MAC address\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
br_htime
\n- Hello time in 1/256 secs\n+
netfilter.bridge.post_routing
br_fd
\n+ Forward delay in 1/256 secs\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
br_max
\n+ Max age in 1/256 secs\n+
br_bid
\n+ Identity of bridge\n
nf_repeat
\n Constant used to signify a 'repeat' verdict\n-
length
\n- The length of the packet buffer contents, in bytes\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
llcproto_stp
\n+ Constant used to signify Bridge Spanning Tree Protocol packet\n+
br_htime
\n+ Hello time in 1/256 secs\n+
br_type
\n+ BPDU type\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
br_poid
\n+ Port identifier\n+
br_msg
\n+ Message age in 1/256 secs\n
data_str
\n A string representing the packet buffer contents\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
br_prid
\n- Protocol identifier\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
br_rid
\n- Identity of root bridge\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
br_rmac
\n+ Root bridge MAC address\n+
br_vid
\n+ Protocol version identifier\n
brhdr
\n Address of bridge header\n-
br_msg
\n- Message age in 1/256 secs\n+
pf
\n+ Protocol family -- always “bridge”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
br_mac
\n Bridge MAC address\n+
br_prid
\n+ Protocol identifier\n
br_flags
\n BPDU flags\n-
br_fd
\n- Forward delay in 1/256 secs\n-
br_vid
\n- Protocol version identifier\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
pf
\n- Protocol family -- always “bridge”\n-
br_poid
\n- Port identifier\n-
br_type
\n- BPDU type\n-
br_max
\n- Max age in 1/256 secs\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
br_bid
\n- Identity of bridge\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_rid
\n+ Identity of root bridge\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
length
\n+ The length of the packet buffer contents, in bytes\n
protocol
\n Packet protocol\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
llcproto_stp
\n- Constant used to signify Bridge Spanning Tree Protocol packet\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
probe::netfilter.bridge.pre_routing — \n - Called before a bridging packet is routed\n-
netfilter.bridge.pre_routing
br_htime
\n- Hello time in 1/256 secs\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n-
br_rmac
\n- Root bridge MAC address\n-
data_str
\n- A string representing the packet buffer contents\n+
netfilter.bridge.pre_routing
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
br_rid
\n+ Identity of root bridge\n
length
\n The length of the packet buffer contents, in bytes\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
br_msg
\n- Message age in 1/256 secs\n+
protocol
\n+ Packet protocol\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
br_rmac
\n+ Root bridge MAC address\n+
br_vid
\n+ Protocol version identifier\n
brhdr
\n Address of bridge header\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
br_rid
\n- Identity of root bridge\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n+
pf
\n+ Protocol family -- always “bridge”\n+
br_mac
\n+ Bridge MAC address\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n
br_prid
\n Protocol identifier\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
llcpdu
\n- Address of LLC Protocol Data Unit\n-
br_vid
\n- Protocol version identifier\n-
br_fd
\n- Forward delay in 1/256 secs\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
br_flags
\n BPDU flags\n-
br_mac
\n- Bridge MAC address\n-
br_poid
\n- Port identifier\n-
pf
\n- Protocol family -- always “bridge”\n-
br_max
\n- Max age in 1/256 secs\n-
br_type
\n- BPDU type\n-
br_cost
\n- Total cost from transmitting bridge to root\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
br_htime
\n+ Hello time in 1/256 secs\n
llcproto_stp
\n Constant used to signify Bridge Spanning Tree Protocol packet\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
protocol
\n- Packet protocol\n+
br_cost
\n+ Total cost from transmitting bridge to root\n+
br_type
\n+ BPDU type\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
br_msg
\n+ Message age in 1/256 secs\n+
br_poid
\n+ Port identifier\n
indev_name
\n Name of network device packet was received on (if known)\n+
llcpdu
\n+ Address of LLC Protocol Data Unit\n+
data_str
\n+ A string representing the packet buffer contents\n+
br_fd
\n+ Forward delay in 1/256 secs\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
br_max
\n+ Max age in 1/256 secs\n
br_bid
\n Identity of bridge\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
probe::netfilter.ip.forward — \n Called on an incoming IP packet addressed to some other computer\n-
netfilter.ip.forward
daddr
\n- A string representing the destination IP address\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
family
\n- IP address family\n+
netfilter.ip.forward
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n
urg
\n TCP URG flag (if protocol is TCP; ipv4 only)\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
saddr
\n- A string representing the source IP address\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n
iphdr
\n Address of IP header\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
data_str
\n- A string representing the packet buffer contents\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n+
saddr
\n+ A string representing the source IP address\n
nf_stop
\n Constant used to signify a 'stop' verdict\n
indev
\n Address of net_device representing input device, 0 if unknown\n+
daddr
\n+ A string representing the destination IP address\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
data_str
\n+ A string representing the packet buffer contents\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
family
\n+ IP address family\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n
probe::netfilter.ip.local_in — \n Called on an incoming IP packet addressed to the local computer\n-
netfilter.ip.local_in
daddr
\n- A string representing the destination IP address\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n+
netfilter.ip.local_in
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n
outdev
\n Address of net_device representing output device, 0 if unknown\n
family
\n IP address family\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
saddr
\n- A string representing the source IP address\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
data_str
\n+ A string representing the packet buffer contents\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n
pf
\n Protocol family -- either “ipv4” or “ipv6”\n+
indev
\n+ Address of net_device representing input device, 0 if unknown\n+
daddr
\n+ A string representing the destination IP address\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
iphdr
\n- Address of IP header\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n+
saddr
\n+ A string representing the source IP address\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
data_str
\n- A string representing the packet buffer contents\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
length
\n The length of the packet buffer contents, in bytes\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
iphdr
\n+ Address of IP header\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
sport
\n TCP or UDP source port (ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n-
indev
\n- Address of net_device representing input device, 0 if unknown\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n
probe::netfilter.ip.local_out — \n Called on an outgoing IP packet\n-
netfilter.ip.local_out
nf_repeat
\n+
netfilter.ip.local_out
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
family
\n+ IP address family\n+
nf_repeat
\n Constant used to signify a 'repeat' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n
data_str
\n A string representing the packet buffer contents\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
sport
\n- TCP or UDP source port (ipv4 only)\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
pf
\n+ Protocol family -- either “ipv4” or “ipv6”\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
outdev_name
\n+ Name of network device packet will be routed to (if known)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
nf_stop
\n Constant used to signify a 'stop' verdict\n+
saddr
\n+ A string representing the source IP address\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n+
daddr
\n+ A string representing the destination IP address\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
iphdr
\n+ Address of IP header\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
dport
\n TCP or UDP destination port (ipv4 only)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n-
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n
syn
\n TCP SYN flag (if protocol is TCP; ipv4 only)\n
nf_drop
\n Constant used to signify a 'drop' verdict\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
iphdr
\n- Address of IP header\n-
family
\n- IP address family\n
urg
\n TCP URG flag (if protocol is TCP; ipv4 only)\n-
saddr
\n- A string representing the source IP address\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
pf
\n- Protocol family -- either “ipv4” or “ipv6”\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
daddr
\n- A string representing the destination IP address\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n
probe::netfilter.ip.post_routing — \n Called immediately before an outgoing IP packet leaves the computer\n
netfilter.ip.post_routing
pf
\n Protocol family -- either “ipv4” or “ipv6”\n-
family
\n- IP address family\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
nf_stop
\n+ Constant used to signify a 'stop' verdict\n
saddr
\n A string representing the source IP address\n-
ipproto_tcp
\n- Constant used to signify that the packet protocol is TCP\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n-
ipproto_udp
\n- Constant used to signify that the packet protocol is UDP\n-
indev_name
\n- Name of network device packet was received on (if known)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n+
data_hex
\n+ A hexadecimal string representing the packet buffer contents\n
outdev_name
\n Name of network device packet will be routed to (if known)\n
daddr
\n A string representing the destination IP address\n-
nf_stop
\n- Constant used to signify a 'stop' verdict\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
data_str
\n- A string representing the packet buffer contents\n-
length
\n- The length of the packet buffer contents, in bytes\n+
iphdr
\n+ Address of IP header\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n
sport
\n TCP or UDP source port (ipv4 only)\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
ipproto_udp
\n+ Constant used to signify that the packet protocol is UDP\n
ack
\n TCP ACK flag (if protocol is TCP; ipv4 only)\n
nf_accept
\n Constant used to signify an 'accept' verdict\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n
syn
\n TCP SYN flag (if protocol is TCP; ipv4 only)\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
ipproto_tcp
\n+ Constant used to signify that the packet protocol is TCP\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
family
\n+ IP address family\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n
rst
\n TCP RST flag (if protocol is TCP; ipv4 only)\n-
iphdr
\n- Address of IP header\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
data_hex
\n- A hexadecimal string representing the packet buffer contents\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
data_str
\n+ A string representing the packet buffer contents\n
nf_stolen
\n Constant used to signify a 'stolen' verdict\n
probe::netfilter.ip.pre_routing — \n Called before an IP packet is routed\n-
netfilter.ip.pre_routing
nf_stolen
\n- Constant used to signify a 'stolen' verdict\n+
netfilter.ip.pre_routing
outdev_name
\n+ Name of network device packet will be routed to (if known)\n
data_hex
\n A hexadecimal string representing the packet buffer contents\n-
dport
\n- TCP or UDP destination port (ipv4 only)\n-
rst
\n- TCP RST flag (if protocol is TCP; ipv4 only)\n-
iphdr
\n- Address of IP header\n-
nf_queue
\n- Constant used to signify a 'queue' verdict\n-
nf_accept
\n- Constant used to signify an 'accept' verdict\n-
nf_drop
\n- Constant used to signify a 'drop' verdict\n-
syn
\n- TCP SYN flag (if protocol is TCP; ipv4 only)\n-
fin
\n- TCP FIN flag (if protocol is TCP; ipv4 only)\n-
data_str
\n- A string representing the packet buffer contents\n-
sport
\n- TCP or UDP source port (ipv4 only)\n-
length
\n- The length of the packet buffer contents, in bytes\n-
ack
\n- TCP ACK flag (if protocol is TCP; ipv4 only)\n-
nf_repeat
\n- Constant used to signify a 'repeat' verdict\n-
psh
\n- TCP PSH flag (if protocol is TCP; ipv4 only)\n
nf_stop
\n Constant used to signify a 'stop' verdict\n+
saddr
\n+ A string representing the source IP address\n
indev
\n Address of net_device representing input device, 0 if unknown\n-
outdev_name
\n- Name of network device packet will be routed to (if known)\n-
protocol
\n- Packet protocol from driver (ipv4 only)\n
daddr
\n A string representing the destination IP address\n-
indev_name
\n- Name of network device packet was received on (if known)\n+
pf
\n+ Protocol family - either 'ipv4' or 'ipv6'\n+
fin
\n+ TCP FIN flag (if protocol is TCP; ipv4 only)\n+
syn
\n+ TCP SYN flag (if protocol is TCP; ipv4 only)\n+
nf_drop
\n+ Constant used to signify a 'drop' verdict\n+
urg
\n+ TCP URG flag (if protocol is TCP; ipv4 only)\n
ipproto_udp
\n Constant used to signify that the packet protocol is UDP\n-
outdev
\n- Address of net_device representing output device, 0 if unknown\n+
length
\n+ The length of the packet buffer contents, in bytes\n+
sport
\n+ TCP or UDP source port (ipv4 only)\n+
iphdr
\n+ Address of IP header\n+
protocol
\n+ Packet protocol from driver (ipv4 only)\n+
dport
\n+ TCP or UDP destination port (ipv4 only)\n+
nf_accept
\n+ Constant used to signify an 'accept' verdict\n+
ack
\n+ TCP ACK flag (if protocol is TCP; ipv4 only)\n
family
\n IP address family\n-
saddr
\n- A string representing the source IP address\n+
nf_repeat
\n+ Constant used to signify a 'repeat' verdict\n+
outdev
\n+ Address of net_device representing output device, 0 if unknown\n
ipproto_tcp
\n Constant used to signify that the packet protocol is TCP\n-
urg
\n- TCP URG flag (if protocol is TCP; ipv4 only)\n-
pf
\n- Protocol family - either 'ipv4' or 'ipv6'\n+
nf_queue
\n+ Constant used to signify a 'queue' verdict\n+
data_str
\n+ A string representing the packet buffer contents\n+
indev_name
\n+ Name of network device packet was received on (if known)\n+
nf_stolen
\n+ Constant used to signify a 'stolen' verdict\n+
psh
\n+ TCP PSH flag (if protocol is TCP; ipv4 only)\n+
rst
\n+ TCP RST flag (if protocol is TCP; ipv4 only)\n
probe::nfs.aop.readpage — \n NFS client synchronously reading a page\n-
nfs.aop.readpage
size
\n- number of pages to be read in this execution \n-
i_flag
\n- file flags\n+
nfs.aop.readpage
file
\n+ file argument\n+
i_size
\n+ file length in bytes\n
dev
\n device identifier\n-
rsize
\n- read size (in bytes)\n
__page
\n the address of page\n-
ino
\n- inode number\n-
i_size
\n- file length in bytes\n+
size
\n+ number of pages to be read in this execution \n
sb_flag
\n super block flags\n-
file
\n- file argument\n+
rsize
\n+ read size (in bytes)\n+
ino
\n+ inode number\n
page_index
\n offset within mapping, can used a page identifier\n and position identifier in the page frame\n+
i_flag
\n+ file flags\n
probe::nfs.aop.readpages — \n NFS client reading multiple pages\n-
nfs.aop.readpages
rpages
\n- read size (in pages)\n-
ino
\n+
nfs.aop.readpages
ino
\n inode number \n-
dev
\n- device identifier\n-
rsize
\n- read size (in bytes)\n
size
\n number of pages attempted to read in this execution\n+
rsize
\n+ read size (in bytes)\n
nr_pages
\n number of pages attempted to read in this execution\n+
dev
\n+ device identifier\n+
rpages
\n+ read size (in pages)\n
file
\n filp argument\n
probe::nfs.aop.release_page — \n NFS client releasing page\n
nfs.aop.release_page
probe::nfs.aop.write_begin — \n NFS client begin to write data\n-
nfs.aop.write_begin
to
\n- end address of this write operation \n+
nfs.aop.write_begin
size
\n+ write bytes\n+
__page
\n+ the address of page\n
offset
\n start address of this write operation \n+
to
\n+ end address of this write operation \n+
dev
\n+ device identifier\n+
ino
\n+ inode number \n
page_index
\n offset within mapping, can used a page identifier\n and position identifier in the page frame\n-
ino
\n- inode number \n-
__page
\n- the address of page\n-
dev
\n- device identifier\n-
size
\n- write bytes\n
\n Occurs when write operation occurs on nfs. It prepare a page for writing,\n look for a request corresponding to the page. If there\n is one, and it belongs to another file, it flush it out\n before it tries to copy anything into the page. \n Also do the same if it finds a request from an existing\n dropped page\n", "details": [{"source1": "html2text {}", "source2": "html2text {}", "unified_diff": "@@ -2,29 +2,29 @@\n Prev\u00a0Chapter\u00a031.\u00a0Network File Storage Tapset\u00a0Next\n ===============================================================================\n ***** Name *****\n probe::nfs.aop.write_begin \u2014 NFS client begin to write data\n ***** Synopsis *****\n nfs.aop.write_begin\n ***** Values *****\n- to\n- end address of this write operation\n+ size\n+ write bytes\n+ __page\n+ the address of page\n offset\n start address of this write operation\n+ to\n+ end address of this write operation\n+ dev\n+ device identifier\n+ ino\n+ inode number\n page_index\n offset within mapping, can used a page identifier and position identifier\n in the page frame\n- ino\n- inode number\n- __page\n- the address of page\n- dev\n- device identifier\n- size\n- write bytes\n ***** Description *****\n Occurs when write operation occurs on nfs. It prepare a page for writing, look\n for a request corresponding to the page. If there is one, and it belongs to\n another file, it flush it out before it tries to copy anything into the page.\n Also do the same if it finds a request from an existing dropped page\n ===============================================================================\n Prev\u00a0 Up \u00a0Next\n"}]}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-aop-write-end.html", "unified_diff": "@@ -1,29 +1,29 @@\n
probe::nfs.aop.write_end — \n NFS client complete writing data\n-
nfs.aop.write_end
page_index
\n- offset within mapping, can used a page identifier and position identifier in the page frame\n+
nfs.aop.write_end
__page
\n+ the address of page\n+
offset
\n+ start address of this write operation\n+
size
\n+ write bytes\n+
i_size
\n+ file length in bytes\n
ino
\n inode number\n+
page_index
\n+ offset within mapping, can used a page identifier and position identifier in the page frame\n
i_flag
\n file flags\n-
size
\n- write bytes\n-
__page
\n- the address of page\n-
dev
\n- device identifier\n
sb_flag
\n super block flags\n
to
\n end address of this write operation\n-
i_size
\n- file length in bytes\n-
offset
\n- start address of this write operation\n+
dev
\n+ device identifier\n
probe::nfs.aop.writepage — \n NFS client writing a mapped page to the NFS server\n-
nfs.aop.writepage
page_index
\n- offset within mapping,\n- can used a page identifier and position identifier in the page frame\n+
nfs.aop.writepage
i_size
\n+ file length in bytes\n+
for_reclaim
\n+ a flag of writeback_control,\n+ indicates if it's invoked from the page allocator\n
wsize
\n write size\n
size
\n number of pages to be written in this execution\n-
i_flag
\n- file flags\n
__page
\n the address of page\n+
for_kupdate
\n+ a flag of writeback_control,\n+ indicates if it's a kupdate writeback\n
dev
\n device identifier\n+
i_state
\n+ inode state flags\n
ino
\n inode number \n-
i_size
\n- file length in bytes\n+
i_flag
\n+ file flags\n+
page_index
\n+ offset within mapping,\n+ can used a page identifier and position identifier in the page frame\n
sb_flag
\n super block flags\n-
i_state
\n- inode state flags\n-
for_reclaim
\n- a flag of writeback_control,\n- indicates if it's invoked from the page allocator\n-
for_kupdate
\n- a flag of writeback_control,\n- indicates if it's a kupdate writeback\n
probe::nfs.aop.writepages — \n NFS client writing several dirty pages to the NFS server\n-
nfs.aop.writepages
nr_to_write
\n- number of pages attempted to be written in this execution\n-
wsize
\n- write size\n-
size
\n- number of pages attempted to be written in this execution\n-
dev
\n+
nfs.aop.writepages
dev
\n device identifier\n+
for_kupdate
\n+ a flag of writeback_control,\n+ indicates if it's a kupdate writeback\n
wpages
\n write size (in pages)\n
ino
\n inode number\n-
for_kupdate
\n- a flag of writeback_control,\n- indicates if it's a kupdate writeback\n
for_reclaim
\n a flag of writeback_control,\n indicates if it's invoked from the page allocator\n+
size
\n+ number of pages attempted to be written in this execution\n+
nr_to_write
\n+ number of pages attempted to be written in this execution\n+
wsize
\n+ write size\n
probe::nfs.fop.aio_read — \n NFS client aio_read file operation\n-
nfs.fop.aio_read
pos
\n- current position of file \n-
attrtimeo
\n- how long the cached information is assumed to be valid.\n- We need to revalidate the cached attrs for this inode\n- if jiffies - read_cache_jiffies > attrtimeo.\n+
nfs.fop.aio_read
cache_valid
\n+ cache related bit mask flag\n
parent_name
\n parent dir name\n-
ino
\n- inode number \n+
buf
\n+ the address of buf in user space\n
cache_time
\n when we started read-caching this inode\n-
count
\n- read bytes\n-
cache_valid
\n- cache related bit mask flag\n
dev
\n device identifier\n+
pos
\n+ current position of file \n+
count
\n+ read bytes\n+
attrtimeo
\n+ how long the cached information is assumed to be valid.\n+ We need to revalidate the cached attrs for this inode\n+ if jiffies - read_cache_jiffies > attrtimeo.\n
file_name
\n file name\n-
buf
\n- the address of buf in user space\n+
ino
\n+ inode number \n
probe::nfs.fop.aio_write — \n NFS client aio_write file operation\n-
nfs.fop.aio_write
probe::nfs.fop.flush — \n NFS client flush file operation\n-
nfs.fop.flush
probe::nfs.fop.fsync — \n NFS client fsync operation\n-
nfs.fop.fsync
probe::nfs.fop.llseek — \n NFS client llseek operation\n-
nfs.fop.llseek
whence_str
\n- symbolic string representation of the position to seek from\n-
ino
\n+
nfs.fop.llseek
probe::nfs.fop.lock — \n NFS client file lock operation\n-
nfs.fop.lock
cmd
\n- cmd arguments\n-
fl_end
\n- ending offset of locked region\n+
nfs.fop.lock
dev
\n+ device identifier\n
fl_flag
\n lock flags\n-
fl_type
\n- lock type\n-
dev
\n- device identifier\n
fl_start
\n starting offset of locked region\n-
ino
\n- inode number\n+
cmd
\n+ cmd arguments\n+
fl_end
\n+ ending offset of locked region\n
i_mode
\n file type and access rights\n+
ino
\n+ inode number\n+
fl_type
\n+ lock type\n
probe::nfs.fop.mmap — \n NFS client mmap operation\n-
nfs.fop.mmap
cache_valid
\n- cache related bit mask flag\n-
cache_time
\n- when we started read-caching this inode\n-
ino
\n+
nfs.fop.mmap
ino
\n inode number \n-
vm_start
\n- start address within vm_mm \n-
buf
\n- the address of buf in user space\n-
dev
\n- device identifier\n-
file_name
\n- file name\n
vm_flag
\n vm flags\n-
parent_name
\n- parent dir name\n+
vm_start
\n+ start address within vm_mm \n
vm_end
\n the first byte after end address within vm_mm\n+
file_name
\n+ file name\n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode \n if jiffies - read_cache_jiffies > attrtimeo.\n+
dev
\n+ device identifier\n+
cache_time
\n+ when we started read-caching this inode\n+
parent_name
\n+ parent dir name\n+
buf
\n+ the address of buf in user space\n+
cache_valid
\n+ cache related bit mask flag\n
probe::nfs.fop.open — \n NFS client file open operation\n-
nfs.fop.open
probe::nfs.fop.read_iter — \n NFS client read_iter file operation\n
nfs.fop.read_iter
cache_time
\n when we started read-caching this inode\n+
pos
\n+ current position of file \n+
dev
\n+ device identifier\n+
cache_valid
\n+ cache related bit mask flag\n+
parent_name
\n+ parent dir name\n
ino
\n inode number \n
count
\n read bytes\n-
cache_valid
\n- cache related bit mask flag\n-
dev
\n- device identifier\n-
file_name
\n- file name\n-
pos
\n- current position of file \n
attrtimeo
\n how long the cached information is assumed to be valid.\n We need to revalidate the cached attrs for this inode\n if jiffies - read_cache_jiffies > attrtimeo.\n-
parent_name
\n- parent dir name\n+
file_name
\n+ file name\n
probe::nfs.fop.release — \n NFS client release page operation\n-
nfs.fop.release
probe::nfs.fop.sendfile — \n NFS client send file operation\n-
nfs.fop.sendfile
dev
\n- device identifier\n+
nfs.fop.sendfile
ppos
\n+ current position of file\n+
attrtimeo
\n+ how long the cached information is assumed to be valid.\n+ We need to revalidate the cached attrs for this inode\n+ if jiffies - read_cache_jiffies > attrtimeo.\n
count
\n read bytes\n-
cache_time
\n- when we started read-caching this inode\n
ino
\n inode number\n
cache_valid
\n cache related bit mask flag\n-
attrtimeo
\n- how long the cached information is assumed to be valid.\n- We need to revalidate the cached attrs for this inode\n- if jiffies - read_cache_jiffies > attrtimeo.\n-
ppos
\n- current position of file\n+
dev
\n+ device identifier\n+
cache_time
\n+ when we started read-caching this inode\n
nfs.fop.write_iter
probe::nfs.proc.commit_done — \n NFS client response to a commit RPC task\n-
nfs.proc.commit_done
count
\n- number of bytes committed\n+
nfs.proc.commit_done
server_ip
\n+ IP address of server\n+
timestamp
\n+ V4 timestamp, which is used for lease renewal\n
valid
\n fattr->valid, indicates which fields are valid \n-
server_ip
\n- IP address of server\n
status
\n result of last operation\n-
timestamp
\n- V4 timestamp, which is used for lease renewal\n
version
\n NFS version\n
prot
\n transfer protocol\n+
count
\n+ number of bytes committed\n
probe::nfs.proc.commit_setup — \n NFS client setting up a commit RPC task\n
nfs.proc.commit_setup
version
\n NFS version\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
count
\n+ bytes in this commit\n
prot
\n transfer protocol\n+
size
\n+ bytes in this commit\n
server_ip
\n IP address of server\n+
offset
\n+ the file offset\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
offset
\n- the file offset\n-
size
\n- bytes in this commit\n-
count
\n- bytes in this commit\n
probe::nfs.proc.commit — \n NFS client committing data on server\n-
nfs.proc.commit
version
\n- NFS version\n-
bitmask0
\n+
nfs.proc.commit
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
size
\n+ read bytes in this execution\n
prot
\n transfer protocol\n-
server_ip
\n- IP address of server\n+
version
\n+ NFS version\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n
offset
\n the file offset\n-
size
\n- read bytes in this execution\n+
server_ip
\n+ IP address of server\n
\n All the nfs.proc.commit kernel functions were removed in kernel\n commit 200baa in December 2006, so these probes do not exist on Linux\n 2.6.21 and newer kernels.\n
\n \n Fires when client writes the buffered data to disk.\n", "details": [{"source1": "html2text {}", "source2": "html2text {}", "unified_diff": "@@ -2,30 +2,30 @@\n Prev\u00a0Chapter\u00a031.\u00a0Network File Storage Tapset\u00a0Next\n ===============================================================================\n ***** Name *****\n probe::nfs.proc.commit \u2014 NFS client committing data on server\n ***** Synopsis *****\n nfs.proc.commit\n ***** Values *****\n- version\n- NFS version\n bitmask0\n V4 bitmask representing the set of attributes supported on this\n filesystem\n+ size\n+ read bytes in this execution\n prot\n transfer protocol\n- server_ip\n- IP address of server\n+ version\n+ NFS version\n bitmask1\n V4 bitmask representing the set of attributes supported on this\n filesystem\n offset\n the file offset\n- size\n- read bytes in this execution\n+ server_ip\n+ IP address of server\n ***** Description *****\n All the nfs.proc.commit kernel functions were removed in kernel commit 200baa\n in December 2006, so these probes do not exist on Linux 2.6.21 and newer\n kernels.\n Fires when client writes the buffered data to disk. The buffered data is\n asynchronously written by client earlier. The commit function works in sync\n way. This probe point does not exist in NFSv2.\n"}]}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-nfs-proc-create.html", "unified_diff": "@@ -1,17 +1,17 @@\n
probe::nfs.proc.create — \n NFS client creating file on server\n-
nfs.proc.create
filename
\n- file name\n-
prot
\n+
nfs.proc.create
prot
\n transfer protocol\n
version
\n NFS version (the function is used for all NFS version)\n-
flag
\n- indicates create mode (only for NFSv3 and NFSv4)\n-
filelen
\n- length of file name\n
fh
\n file handle of parent dir\n
server_ip
\n IP address of server\n+
flag
\n+ indicates create mode (only for NFSv3 and NFSv4)\n+
filelen
\n+ length of file name\n+
filename
\n+ file name\n
probe::nfs.proc.lookup — \n NFS client opens/searches a file on server\n-
nfs.proc.lookup
filename
\n- the name of file which client opens/searches on server\n-
prot
\n- transfer protocol\n+
nfs.proc.lookup
name_len
\n+ the length of file name\n
version
\n NFS version\n+
prot
\n+ transfer protocol\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n+
filename
\n+ the name of file which client opens/searches on server\n+
server_ip
\n+ IP address of server\n
bitmask1
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
server_ip
\n- IP address of server\n-
name_len
\n- the length of file name\n
probe::nfs.proc.open — \n NFS client allocates file read/write context information\n-
nfs.proc.open
server_ip
\n- IP address of server\n+
nfs.proc.open
probe::nfs.proc.read_done — \n NFS client response to a read RPC task\n-
nfs.proc.read_done
timestamp
\n- V4 timestamp, which is used for lease renewal\n-
version
\n- NFS version\n+
nfs.proc.read_done
probe::nfs.proc.read_setup — \n NFS client setting up a read RPC task\n
nfs.proc.read_setup
probe::nfs.proc.read — \n NFS client synchronously reads file from server\n-
nfs.proc.read
prot
\n- transfer protocol\n-
version
\n- NFS version\n-
count
\n- read bytes in this execution\n+
nfs.proc.read
probe::nfs.proc.release — \n NFS client releases file read/write context information\n-
nfs.proc.release
flag
\n- file flag\n-
mode
\n- file mode\n+
nfs.proc.release
probe::nfs.proc.remove — \n NFS client removes a file on server\n-
nfs.proc.remove
probe::nfs.proc.rename_done — \n NFS client response to a rename RPC task\n-
nfs.proc.rename_done
timestamp
\n- V4 timestamp, which is used for lease renewal\n-
prot
\n- transfer protocol\n+
nfs.proc.rename_done
status
\n+ result of last operation\n
version
\n NFS version\n-
old_fh
\n- file handle of old parent dir\n-
status
\n- result of last operation\n-
new_fh
\n- file handle of new parent dir\n+
prot
\n+ transfer protocol\n
server_ip
\n IP address of server\n+
timestamp
\n+ V4 timestamp, which is used for lease renewal\n+
new_fh
\n+ file handle of new parent dir\n+
old_fh
\n+ file handle of old parent dir\n
probe::nfs.proc.rename_setup — \n NFS client setting up a rename RPC task\n-
nfs.proc.rename_setup
version
\n- NFS version\n-
prot
\n- transfer protocol\n-
server_ip
\n+
nfs.proc.rename_setup
probe::nfs.proc.rename — \n NFS client renames a file on server\n-
nfs.proc.rename
old_filelen
\n- length of old file name\n+
nfs.proc.rename
old_fh
\n+ file handle of old parent dir\n+
old_name
\n+ old file name\n+
new_name
\n+ new file name\n
new_fh
\n file handle of new parent dir\n
server_ip
\n IP address of server\n-
new_name
\n- new file name\n-
version
\n- NFS version (the function is used for all NFS version)\n-
old_name
\n- old file name\n-
new_filelen
\n- length of new file name\n-
old_fh
\n- file handle of old parent dir\n+
old_filelen
\n+ length of old file name\n
prot
\n transfer protocol\n+
new_filelen
\n+ length of new file name\n+
version
\n+ NFS version (the function is used for all NFS version)\n
probe::nfs.proc.write_done — \n NFS client response to a write RPC task\n-
nfs.proc.write_done
prot
\n+
nfs.proc.write_done
server_ip
\n+ IP address of server\n+
timestamp
\n+ V4 timestamp, which is used for lease renewal\n+
count
\n+ number of bytes written\n+
prot
\n transfer protocol\n+
valid
\n+ fattr->valid, indicates which fields are valid \n
version
\n NFS version\n-
timestamp
\n- V4 timestamp, which is used for lease renewal\n
status
\n result of last operation\n-
server_ip
\n- IP address of server\n-
valid
\n- fattr->valid, indicates which fields are valid \n-
count
\n- number of bytes written\n
probe::nfs.proc.write_setup — \n NFS client setting up a write RPC task\n-
nfs.proc.write_setup
how
\n+
nfs.proc.write_setup
bitmask1
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem \n+
offset
\n+ the file offset\n+
server_ip
\n+ IP address of server\n+
bitmask0
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n+
count
\n+ bytes written in this execution\n+
size
\n+ bytes written in this execution\n+
how
\n used to set args.stable. The stable value could be:\n NFS_UNSTABLE,NFS_DATA_SYNC,NFS_FILE_SYNC\n (in nfs.proc3.write_setup and nfs.proc4.write_setup)\n
prot
\n transfer protocol\n-
bitmask0
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n
version
\n NFS version\n-
size
\n- bytes written in this execution\n-
count
\n- bytes written in this execution\n-
offset
\n- the file offset\n-
bitmask1
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem \n-
server_ip
\n- IP address of server\n
probe::nfs.proc.write — \n NFS client synchronously writes file to server\n-
nfs.proc.write
prot
\n+
nfs.proc.write
version
\n+ NFS version\n+
prot
\n transfer protocol\n+
size
\n+ read bytes in this execution\n
bitmask0
\n V4 bitmask representing the set of attributes supported\n on this filesystem\n-
version
\n- NFS version\n-
bitmask1
\n- V4 bitmask representing the set of attributes supported\n- on this filesystem\n-
flags
\n- used to set task->tk_flags in rpc_init_task function\n
server_ip
\n IP address of server\n-
size
\n- read bytes in this execution\n
offset
\n the file offset\n+
flags
\n+ used to set task->tk_flags in rpc_init_task function\n+
bitmask1
\n+ V4 bitmask representing the set of attributes supported\n+ on this filesystem\n
probe::nfsd.commit — \n NFS server committing all pending writes to stable storage\n
nfsd.commit
offset
\n the offset of file\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
count
\n+ read bytes\n
size
\n read bytes\n
flag
\n indicates whether this execution is a sync operation\n-
fh
\n- file handle (the first part is the length of the file handle)\n
client_ip
\n the ip address of client\n-
count
\n- read bytes\n
probe::nfsd.create — \n NFS server creating a file(regular,dir,device,fifo) for client\n-
nfsd.create
fh
\n- file handle (the first part is the length of the file handle)\n-
filelen
\n- the length of file name\n-
client_ip
\n- the ip address of client\n-
iap_mode
\n+
nfsd.create
iap_mode
\n file access mode\n
filename
\n file name \n-
type
\n- file type(regular,dir,device,fifo ...)\n
iap_valid
\n Attribute flags\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
type
\n+ file type(regular,dir,device,fifo ...)\n+
client_ip
\n+ the ip address of client\n+
filelen
\n+ the length of file name\n
probe::nfsd.createv3 — \n NFS server creating a regular file or set file attributes for client\n-
nfsd.createv3
truncp
\n- trunp arguments, indicates if the file shouldbe truncate\n+
nfsd.createv3
fh
\n+ file handle (the first part is the length of the file handle)\n+
verifier
\n+ file attributes (atime,mtime,mode). It's used to reset file attributes for CREATE_EXCLUSIVE\n+
iap_mode
\n+ file access mode\n
iap_valid
\n Attribute flags\n
filename
\n file name \n-
iap_mode
\n- file access mode\n-
verifier
\n- file attributes (atime,mtime,mode). It's used to reset file attributes for CREATE_EXCLUSIVE\n+
createmode
\n+ create mode .The possible values could be: NFS3_CREATE_EXCLUSIVE, NFS3_CREATE_UNCHECKED, or NFS3_CREATE_GUARDED\n
filelen
\n the length of file name\n-
fh
\n- file handle (the first part is the length of the file handle)\n+
truncp
\n+ trunp arguments, indicates if the file shouldbe truncate\n
client_ip
\n the ip address of client\n-
createmode
\n- create mode .The possible values could be: NFS3_CREATE_EXCLUSIVE, NFS3_CREATE_UNCHECKED, or NFS3_CREATE_GUARDED\n
probe::nfsd.dispatch — \n NFS server receives an operation from client\n-
nfsd.dispatch
probe::nfsd.lookup — \n NFS server opening or searching file for a file for client\n
nfsd.lookup
probe::nfsd.open — \n NFS server opening a file for client\n-
nfsd.open
fh
\n+
nfsd.open
type
\n+ type of file (regular file or dir)\n+
fh
\n file handle (the first part is the length of the file handle)\n-
client_ip
\n- the ip address of client\n
access
\n indicates the type of open (read/write/commit/readdir...) \n-
type
\n- type of file (regular file or dir)\n+
client_ip
\n+ the ip address of client\n
probe::nfsd.proc.commit — \n NFS server performing a commit operation for client\n-
nfsd.proc.commit
client_ip
\n- the ip address of client\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
gid
\n- requester's group id\n-
offset
\n- the offset of file \n-
size
\n- read bytes\n-
proto
\n+
nfsd.proc.commit
proto
\n transfer protocol\n-
count
\n- read bytes\n
uid
\n requester's user id\n
version
\n nfs version\n+
client_ip
\n+ the ip address of client\n+
count
\n+ read bytes\n+
size
\n+ read bytes\n+
gid
\n+ requester's group id\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
offset
\n+ the offset of file \n
probe::nfsd.proc.create — \n NFS server creating a file for client\n-
nfsd.proc.create
gid
\n+
nfsd.proc.create
filename
\n+ file name\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
gid
\n requester's group id\n
filelen
\n length of file name\n-
fh
\n- file handle (the first part is the length of the file handle)\n-
client_ip
\n- the ip address of client\n-
filename
\n- file name\n+
version
\n+ nfs version\n
uid
\n requester's user id\n+
client_ip
\n+ the ip address of client\n
proto
\n transfer protocol\n-
version
\n- nfs version\n
probe::nfsd.proc.lookup — \n NFS server opening or searching for a file for client\n-
nfsd.proc.lookup
proto
\n+
nfsd.proc.lookup
fh
\n+ file handle of parent dir (the first part is the length of the file handle)\n+
proto
\n transfer protocol\n+
client_ip
\n+ the ip address of client\n
uid
\n requester's user id\n+
filename
\n+ file name \n+
version
\n+ nfs version\n
filelen
\n the length of file name\n-
fh
\n- file handle of parent dir (the first part is the length of the file handle)\n-
client_ip
\n- the ip address of client\n
gid
\n requester's group id\n-
version
\n- nfs version\n-
filename
\n- file name \n
probe::nfsd.proc.read — \n NFS server reading file for client\n-
nfsd.proc.read
gid
\n- requester's group id\n-
client_ip
\n- the ip address of client\n+
nfsd.proc.read
proto
\n+ transfer protocol\n
fh
\n file handle (the first part is the length of the file handle)\n+
offset
\n+ the offset of file \n
uid
\n requester's user id\n
vlen
\n read blocks \n-
proto
\n- transfer protocol\n-
count
\n- read bytes\n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n
version
\n nfs version\n+
client_ip
\n+ the ip address of client\n+
count
\n+ read bytes\n
size
\n read bytes\n-
offset
\n- the offset of file \n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n+
gid
\n+ requester's group id\n
probe::nfsd.proc.remove — \n NFS server removing a file for client\n-
nfsd.proc.remove
version
\n- nfs version\n+
nfsd.proc.remove
gid
\n+ requester's group id\n+
filelen
\n+ length of file name\n+
client_ip
\n+ the ip address of client\n
uid
\n requester's user id\n+
version
\n+ nfs version\n
proto
\n transfer protocol\n
filename
\n file name\n-
gid
\n- requester's group id\n
fh
\n file handle (the first part is the length of the file handle)\n-
filelen
\n- length of file name\n-
client_ip
\n- the ip address of client\n
probe::nfsd.proc.rename — \n NFS Server renaming a file for client\n-
nfsd.proc.rename
fh
\n+
nfsd.proc.rename
filename
\n+ old file name \n+
fh
\n file handler of old path\n-
client_ip
\n- the ip address of client\n-
tname
\n- new file name\n
gid
\n requester's group id\n-
tlen
\n- length of new file name\n-
flen
\n- length of old file name \n-
filename
\n- old file name \n
tfh
\n file handler of new path\n+
tname
\n+ new file name\n+
client_ip
\n+ the ip address of client\n+
flen
\n+ length of old file name \n
uid
\n requester's user id\n+
tlen
\n+ length of new file name\n
probe::nfsd.proc.write — \n NFS server writing data to file for client\n-
nfsd.proc.write
version
\n- nfs version\n+
nfsd.proc.write
fh
\n+ file handle (the first part is the length of the file handle)\n+
offset
\n+ the offset of file \n
stable
\n argp->stable\n
proto
\n transfer protocol\n-
count
\n- read bytes\n+
version
\n+ nfs version\n
uid
\n requester's user id\n-
vec
\n- struct kvec, includes buf address in kernel address and length of each buffer\n-
offset
\n- the offset of file \n-
size
\n- read bytes\n+
vlen
\n+ read blocks \n
client_ip
\n the ip address of client\n-
fh
\n- file handle (the first part is the length of the file handle)\n+
size
\n+ read bytes\n+
count
\n+ read bytes\n+
vec
\n+ struct kvec, includes buf address in kernel address and length of each buffer\n
gid
\n requester's group id\n-
vlen
\n- read blocks \n
probe::nfsd.read — \n NFS server reading data from a file for client\n-
nfsd.read
file
\n- argument file, indicates if the file has been opened.\n-
count
\n+
nfsd.read
size
\n read bytes\n-
size
\n+
count
\n read bytes\n-
offset
\n- the offset of file \n
vec
\n struct kvec, includes buf address in kernel address and length of each buffer\n+
file
\n+ argument file, indicates if the file has been opened.\n
vlen
\n read blocks \n-
fh
\n- file handle (the first part is the length of the file handle)\n
client_ip
\n the ip address of client\n+
fh
\n+ file handle (the first part is the length of the file handle)\n+
offset
\n+ the offset of file \n
probe::nfsd.rename — \n NFS server renaming a file for client\n-
nfsd.rename
filename
\n- old file name \n-
flen
\n+
nfsd.rename
flen
\n length of old file name \n-
tfh
\n- file handler of new path\n-
tname
\n- new file name\n
client_ip
\n the ip address of client\n-
fh
\n- file handler of old path\n+
tname
\n+ new file name\n
tlen
\n length of new file name\n+
tfh
\n+ file handler of new path\n+
filename
\n+ old file name \n+
fh
\n+ file handler of old path\n
probe::nfsd.unlink — \n NFS server removing a file or a directory for client\n-
nfsd.unlink
probe::nfsd.write — \n NFS server writing data to a file for client\n
nfsd.write
fh
\n file handle (the first part is the length of the file handle)\n-
client_ip
\n- the ip address of client\n+
offset
\n+ the offset of file \n
vlen
\n read blocks \n+
client_ip
\n+ the ip address of client\n+
file
\n+ argument file, indicates if the file has been opened.\n
vec
\n struct kvec, includes buf address in kernel address and length of each buffer\n-
size
\n- read bytes\n-
offset
\n- the offset of file \n
count
\n read bytes\n-
file
\n- argument file, indicates if the file has been opened.\n+
size
\n+ read bytes\n
probe::scheduler.cpu_off — \n Process is about to stop running on a cpu\n-
scheduler.cpu_off
task_next
\n- the process replacing current\n-
task_prev
\n+
scheduler.cpu_off
probe::scheduler.cpu_on — \n Process is beginning execution on a cpu\n-
scheduler.cpu_on
task_prev
\n- the process that was previously running on this cpu\n-
idle
\n+
scheduler.cpu_on
probe::scheduler.ctxswitch — \n A context switch is occuring.\n
scheduler.ctxswitch
name
\n name of the probe point\n-
prev_pid
\n- The PID of the process to be switched out\n-
next_pid
\n- The PID of the process to be switched in\n-
prev_priority
\n- The priority of the process to be switched out\n-
prev_task_name
\n- The name of the process to be switched out\n-
next_task_name
\n- The name of the process to be switched in\n
next_priority
\n The priority of the process to be switched in\n+
prev_priority
\n+ The priority of the process to be switched out\n+
next_pid
\n+ The PID of the process to be switched in\n
next_tid
\n The TID of the process to be switched in\t \n+
prev_pid
\n+ The PID of the process to be switched out\n
prev_tid
\n The TID of the process to be switched out\n-
prevtsk_state
\n- the state of the process to be switched out\n+
next_task_name
\n+ The name of the process to be switched in\n
nexttsk_state
\n the state of the process to be switched in\n+
prevtsk_state
\n+ the state of the process to be switched out\n+
prev_task_name
\n+ The name of the process to be switched out\n
probe::scheduler.migrate — \n Task migrating across cpus\n-
scheduler.migrate
cpu_to
\n- the destination cpu\n+
scheduler.migrate
pid
\n+ PID of the task being migrated\n
cpu_from
\n the original cpu\n-
pid
\n- PID of the task being migrated\n-
priority
\n- priority of the task being migrated\n+
cpu_to
\n+ the destination cpu\n
task
\n the process that is being migrated\n+
priority
\n+ priority of the task being migrated\n
name
\n name of the probe point\n
probe::scheduler.process_free — \n Scheduler freeing a data structure for a process\n-
scheduler.process_free
probe::scheduler.signal_send — \n Sending a signal\n-
scheduler.signal_send
probe::scheduler.wait_task — \n Waiting on a task to unschedule (become inactive)\n-
scheduler.wait_task
probe::scheduler.wakeup_new — \n Newly created task is woken up for the first time\n-
scheduler.wakeup_new
task_state
\n- state of the task woken up\n+
scheduler.wakeup_new
task_priority
\n+ priority of the new task\n+
task_pid
\n+ PID of the new task woken up\n
task_tid
\n TID of the new task woken up\n+
task_state
\n+ state of the task woken up\n
name
\n name of the probe point\n
task_cpu
\n cpu of the task woken up\n-
task_priority
\n- priority of the new task\n-
task_pid
\n- PID of the new task woken up\n
probe::scheduler.wakeup — \n Task is woken up\n-
scheduler.wakeup
task_priority
\n- priority of the task being woken up\n-
task_pid
\n- PID of the task being woken up\n+
scheduler.wakeup
name
\n+ name of the probe point\n
task_cpu
\n cpu of the task being woken up\n-
name
\n- name of the probe point\n
task_state
\n state of the task being woken up\n+
task_priority
\n+ priority of the task being woken up\n+
task_pid
\n+ PID of the task being woken up\n
task_tid
\n tid of the task being woken up\n
probe::scsi.iocompleted — \n SCSI mid-layer running the completion processing for block device I/O requests\n-
scsi.iocompleted
device_state_str
\n- The current state of the device, as a string\n-
goodbytes
\n- The bytes completed\n-
lun
\n- The lun number\n-
data_direction_str
\n+
scsi.iocompleted
data_direction_str
\n Data direction, as a string\n
channel
\n The channel number\n+
lun
\n+ The lun number\n+
goodbytes
\n+ The bytes completed\n
req_addr
\n The current struct request pointer, as a number\n+
device_state
\n+ The current state of the device\n
data_direction
\n The data_direction specifies whether this command is from/to\n the device\n-
dev_id
\n- The scsi device id\n-
device_state
\n- The current state of the device\n+
device_state_str
\n+ The current state of the device, as a string\n
host_no
\n The host number\n+
dev_id
\n+ The scsi device id\n
probe::scsi.iodispatching — \n SCSI mid-layer dispatched low-level SCSI command\n
scsi.iodispatching
device_state_str
\n The current state of the device, as a string\n-
request_bufflen
\n- The request buffer length\n
host_no
\n The host number\n-
device_state
\n- The current state of the device\n
request_buffer
\n The request buffer address\n-
lun
\n- The lun number\n-
data_direction_str
\n- Data direction, as a string\n
dev_id
\n The scsi device id\n-
req_addr
\n- The current struct request pointer, as a number\n+
request_bufflen
\n+ The request buffer length\n+
lun
\n+ The lun number\n
channel
\n The channel number\n+
data_direction_str
\n+ Data direction, as a string\n+
device_state
\n+ The current state of the device\n
data_direction
\n The data_direction specifies whether this command is from/to the device\n 0 (DMA_BIDIRECTIONAL), 1 (DMA_TO_DEVICE),\n 2 (DMA_FROM_DEVICE), 3 (DMA_NONE)\n+
req_addr
\n+ The current struct request pointer, as a number\n
probe::scsi.iodone — \n SCSI command completed by low level driver and enqueued into the done queue.\n-
scsi.iodone
device_state_str
\n- The current state of the device, as a string\n-
dev_id
\n- The scsi device id\n-
channel
\n- The channel number\n-
req_addr
\n+
scsi.iodone
req_addr
\n The current struct request pointer, as a number\n
data_direction
\n The data_direction specifies whether this command is\n from/to the device.\n-
lun
\n- The lun number\n-
data_direction_str
\n- Data direction, as a string\n-
scsi_timer_pending
\n- 1 if a timer is pending on this request\n
device_state
\n The current state of the device\n+
data_direction_str
\n+ Data direction, as a string\n+
channel
\n+ The channel number\n+
lun
\n+ The lun number\n+
dev_id
\n+ The scsi device id\n
host_no
\n The host number\n+
device_state_str
\n+ The current state of the device, as a string\n+
scsi_timer_pending
\n+ 1 if a timer is pending on this request\n
probe::scsi.ioentry — \n Prepares a SCSI mid-layer request\n-
scsi.ioentry
disk_minor
\n+
scsi.ioentry
device_state
\n+ The current state of the device\n+
disk_minor
\n The minor number of the disk (-1 if no information)\n+
req_addr
\n+ The current struct request pointer, as a number\n
disk_major
\n The major number of the disk (-1 if no information)\n-
device_state
\n- The current state of the device\n
device_state_str
\n The current state of the device, as a string\n-
req_addr
\n- The current struct request pointer, as a number\n
probe::scsi.ioexecute — \n Create mid-layer SCSI request and wait for the result\n-
scsi.ioexecute
request_bufflen
\n+
scsi.ioexecute
device_state
\n+ The current state of the device\n+
data_direction
\n+ The data_direction specifies whether this command is\n+ from/to the device.\n+
request_bufflen
\n The data buffer buffer length\n+
lun
\n+ The lun number\n+
retries
\n+ Number of times to retry request\n+
data_direction_str
\n+ Data direction, as a string\n+
channel
\n+ The channel number\n+
dev_id
\n+ The scsi device id\n
timeout
\n Request timeout in seconds\n
device_state_str
\n The current state of the device, as a string\n-
request_buffer
\n- The data buffer address\n-
retries
\n- Number of times to retry request\n-
device_state
\n- The current state of the device\n
host_no
\n The host number\n-
dev_id
\n- The scsi device id\n-
data_direction
\n- The data_direction specifies whether this command is\n- from/to the device.\n-
channel
\n- The channel number\n-
data_direction_str
\n- Data direction, as a string\n-
lun
\n- The lun number\n+
request_buffer
\n+ The data buffer address\n
probe::scsi.set_state — \n Order SCSI device state change\n-
scsi.set_state
state
\n+
scsi.set_state
dev_id
\n+ The scsi device id\n+
old_state
\n+ The current state of the device\n+
host_no
\n+ The host number\n+
state
\n The new state of the device\n
state_str
\n The new state of the device, as a string\n-
host_no
\n- The host number\n-
old_state
\n- The current state of the device\n
old_state_str
\n The current state of the device, as a string\n
lun
\n The lun number\n
channel
\n The channel number\n-
dev_id
\n- The scsi device id\n
probe::signal.check_ignored.return — \n Check to see signal is ignored completed\n-
signal.check_ignored.return
probe::signal.check_ignored — \n Checking to see signal is ignored\n-
signal.check_ignored
sig
\n+
signal.check_ignored
sig_pid
\n+ The PID of the process receiving the signal\n+
sig
\n The number of the signal\n-
sig_name
\n- A string representation of the signal\n
pid_name
\n Name of the process receiving the signal\n-
sig_pid
\n- The PID of the process receiving the signal\n+
sig_name
\n+ A string representation of the signal\n
probe::signal.checkperm — \n Check being performed on a sent signal\n-
signal.checkperm
name
\n+
signal.checkperm
sig_pid
\n+ The PID of the process receiving the signal\n+
name
\n Name of the probe point\n+
sig
\n+ The number of the signal\n+
si_code
\n+ Indicates the signal type\n
sinfo
\n The address of the siginfo structure\n
task
\n A task handle to the signal recipient\n-
sig_pid
\n- The PID of the process receiving the signal\n
pid_name
\n Name of the process receiving the signal\n
sig_name
\n A string representation of the signal\n-
sig
\n- The number of the signal\n-
si_code
\n- Indicates the signal type\n
probe::signal.do_action — \n Examining or changing a signal action\n-
signal.do_action
sa_mask
\n- The new mask of the signal\n+
signal.do_action
sig_name
\n+ A string representation of the signal\n
name
\n Name of the probe point\n-
sa_handler
\n- The new handler of the signal\n-
sig_name
\n- A string representation of the signal\n+
sa_mask
\n+ The new mask of the signal\n
sig
\n The signal to be examined/changed\n-
oldsigact_addr
\n- The address of the old sigaction\n- struct associated with the signal\n+
sa_handler
\n+ The new handler of the signal\n
sigact_addr
\n The address of the new sigaction\n struct associated with the signal\n+
oldsigact_addr
\n+ The address of the old sigaction\n+ struct associated with the signal\n
probe::signal.flush — \n Flushing all pending signals for a task\n-
signal.flush
pid_name
\n- The name of the process associated with the task\n- performing the flush\n-
task
\n- The task handler of the process performing the flush\n-
name
\n+
signal.flush
probe::signal.force_segv — \n Forcing send of SIGSEGV\n-
signal.force_segv
sig
\n- The number of the signal\n+
signal.force_segv
sig_name
\n+ A string representation of the signal\n
pid_name
\n Name of the process receiving the signal\n-
sig_name
\n- A string representation of the signal\n-
sig_pid
\n- The PID of the process receiving the signal\n+
sig
\n+ The number of the signal\n
name
\n Name of the probe point\n+
sig_pid
\n+ The PID of the process receiving the signal\n
probe::signal.handle — \n Signal handler being invoked\n-
signal.handle
sig_mode
\n- Indicates whether the signal was a user-mode or kernel-mode signal\n-
regs
\n- The address of the kernel-mode stack area (deprecated in\n- SystemTap 2.1)\n+
signal.handle
sig_code
\n+ The si_code value of the siginfo signal\n
sig_name
\n A string representation of the signal\n-
sig_code
\n- The si_code value of the siginfo signal\n-
sig
\n- The signal number that invoked the signal handler\n-
sinfo
\n- The address of the siginfo table\n+
oldset_addr
\n+ The address of the bitmask array of blocked signals\n+ (deprecated in SystemTap 2.1)\n
ka_addr
\n The address of the k_sigaction table\n associated with the signal\n+
sig_mode
\n+ Indicates whether the signal was a user-mode or kernel-mode signal\n+
sinfo
\n+ The address of the siginfo table\n+
regs
\n+ The address of the kernel-mode stack area (deprecated in\n+ SystemTap 2.1)\n
name
\n Name of the probe point\n-
oldset_addr
\n- The address of the bitmask array of blocked signals\n- (deprecated in SystemTap 2.1)\n+
sig
\n+ The signal number that invoked the signal handler\n
probe::signal.pending — \n Examining pending signal\n-
signal.pending
name
\n- Name of the probe point\n-
sigset_size
\n+
signal.pending
probe::signal.procmask.return — \n Examining or changing blocked signals completed\n-
signal.procmask.return
probe::signal.procmask — \n Examining or changing blocked signals\n-
signal.procmask
how
\n+
signal.procmask
sigset_addr
\n+ The address of the signal set (sigset_t)\n+ to be implemented\n+
how
\n Indicates how to change the blocked signals; possible values are\n SIG_BLOCK=0 (for blocking signals),\n SIG_UNBLOCK=1 (for unblocking signals), and\n SIG_SETMASK=2 for setting the signal mask.\n-
sigset_addr
\n- The address of the signal set (sigset_t)\n- to be implemented\n+
sigset
\n+ The actual value to be set for sigset_t\n+ (correct?)\n
oldsigset_addr
\n The old address of the signal set\n (sigset_t)\n
name
\n Name of the probe point\n-
sigset
\n- The actual value to be set for sigset_t\n- (correct?)\n
probe::signal.send.return — \n Signal being sent to a process completed (deprecated in SystemTap 2.1)\n-
signal.send.return
send2queue
\n- Indicates whether the sent signal was sent to an existing sigqueue\n+
signal.send.return
retstr
\n+ The return value to either __group_send_sig_info, specific_send_sig_info, or send_sigqueue\n
shared
\n Indicates whether the sent signal is shared by the thread group.\n
name
\n The name of the function used to send out the signal\n-
retstr
\n- The return value to either __group_send_sig_info, specific_send_sig_info, or send_sigqueue\n+
send2queue
\n+ Indicates whether the sent signal was sent to an existing sigqueue\n
\n Possible __group_send_sig_info and\n specific_send_sig_info return values are as follows;\n
\n \n", "details": [{"source1": "html2text {}", "source2": "html2text {}", "unified_diff": "@@ -3,23 +3,23 @@\n ===============================================================================\n ***** Name *****\n probe::signal.send.return \u2014 Signal being sent to a process completed\n (deprecated in SystemTap 2.1)\n ***** Synopsis *****\n signal.send.return\n ***** Values *****\n- send2queue\n- Indicates whether the sent signal was sent to an existing sigqueue\n+ retstr\n+ The return value to either __group_send_sig_info, specific_send_sig_info,\n+ or send_sigqueue\n shared\n Indicates whether the sent signal is shared by the thread group.\n name\n The name of the function used to send out the signal\n- retstr\n- The return value to either __group_send_sig_info, specific_send_sig_info,\n- or send_sigqueue\n+ send2queue\n+ Indicates whether the sent signal was sent to an existing sigqueue\n ***** Context *****\n The signal's sender. (correct?)\n ***** Description *****\n Possible __group_send_sig_info and specific_send_sig_info return values are as\n follows;\n 0 -- The signal is successfully sent to a process, which means that, (1) the\n signal was ignored by the receiving process, (2) this is a non-RT signal and\n"}]}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-signal-send-sig-queue.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-signal-send-sig-queue.html", "comments": ["Ordering differences only"], "unified_diff": "@@ -1,15 +1,15 @@\n
probe::signal.send_sig_queue — \n Queuing a signal to a process\n
signal.send_sig_queue
sig_pid
\n The PID of the process to which the signal is queued\n
sigqueue_addr
\n The address of the signal queue\n-
name
\n- Name of the probe point\n
sig
\n The queued signal\n+
name
\n+ Name of the probe point\n
sig_name
\n A string representation of the signal\n
pid_name
\n Name of the process to which the signal is queued\n
probe::signal.send — \n Signal being sent to a process\n-
signal.send
sig
\n- The number of the signal\n-
si_code
\n- Indicates the signal type\n-
pid_name
\n- The name of the signal recipient\n-
sig_name
\n- A string representation of the signal\n-
send2queue
\n- Indicates whether the signal is sent to an existing\n- sigqueue (deprecated in SystemTap 2.1)\n-
sig_pid
\n+
signal.send
sig_pid
\n The PID of the process receiving the signal\n
name
\n The name of the function used to send out the signal\n+
send2queue
\n+ Indicates whether the signal is sent to an existing\n+ sigqueue (deprecated in SystemTap 2.1)\n+
si_code
\n+ Indicates the signal type\n+
sig
\n+ The number of the signal\n
sinfo
\n The address of siginfo struct\n
task
\n A task handle to the signal recipient\n
shared
\n Indicates whether the signal is shared by the thread group\n+
sig_name
\n+ A string representation of the signal\n+
pid_name
\n+ The name of the signal recipient\n
probe::signal.sys_tgkill.return — \n Sending kill signal to a thread group completed\n-
signal.sys_tgkill.return
probe::signal.sys_tgkill — \n Sending kill signal to a thread group\n-
signal.sys_tgkill
name
\n- Name of the probe point\n-
task
\n- A task handle to the signal recipient\n-
tgid
\n+
signal.sys_tgkill
tgid
\n The thread group ID of the thread receiving the kill signal\n
sig_pid
\n The PID of the thread receiving the kill signal\n+
sig
\n+ The specific kill signal sent to the process\n+
name
\n+ Name of the probe point\n
pid_name
\n The name of the signal recipient\n
sig_name
\n A string representation of the signal\n-
sig
\n- The specific kill signal sent to the process\n+
task
\n+ A task handle to the signal recipient\n
probe::signal.sys_tkill — \n Sending a kill signal to a thread\n-
signal.sys_tkill
task
\n- A task handle to the signal recipient\n+
signal.sys_tkill
sig_pid
\n+ The PID of the process receiving the kill signal\n
name
\n Name of the probe point\n-
sig_pid
\n- The PID of the process receiving the kill signal\n+
sig
\n+ The specific signal sent to the process\n+
task
\n+ A task handle to the signal recipient\n
sig_name
\n A string representation of the signal\n
pid_name
\n The name of the signal recipient\n-
sig
\n- The specific signal sent to the process\n
probe::signal.syskill — \n Sending kill signal to a process\n
signal.syskill
pid_name
\n The name of the signal recipient\n
sig_name
\n A string representation of the signal\n-
sig
\n- The specific signal sent to the process\n-
name
\n- Name of the probe point\n
task
\n A task handle to the signal recipient\n
sig_pid
\n The PID of the process receiving the signal\n+
sig
\n+ The specific signal sent to the process\n+
name
\n+ Name of the probe point\n
probe::signal.wakeup — \n Sleeping process being wakened for signal\n
signal.wakeup
resume
\n Indicates whether to wake up a task in a\n STOPPED or TRACED state\n
pid_name
\n Name of the process to wake\n-
sig_pid
\n- The PID of the process to wake\n
state_mask
\n A string representation indicating the mask\n of task states to wake. Possible values are\n TASK_INTERRUPTIBLE, TASK_STOPPED,\n TASK_TRACED, TASK_WAKEKILL, and TASK_INTERRUPTIBLE.\n+
sig_pid
\n+ The PID of the process to wake\n
probe::socket.aio_read.return — \n Conclusion of message received via sock_aio_read
\n
socket.aio_read.return
flags
\n Socket flags value\n+
state
\n+ Socket state value\n+
name
\n+ Name of this probe\n
size
\n Size of message received (in bytes) or error code if success = 0\n
protocol
\n Protocol value\n
type
\n Socket type value\n-
name
\n- Name of this probe\n-
family
\n- Protocol family value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
state
\n- Socket state value\n+
family
\n+ Protocol family value\n
probe::socket.aio_read — \n Receiving message via sock_aio_read
\n-
socket.aio_read
size
\n+
socket.aio_read
name
\n+ Name of this probe\n+
size
\n Message size in bytes\n+
state
\n+ Socket state value\n
flags
\n Socket flags value\n-
protocol
\n- Protocol value\n-
type
\n- Socket type value\n-
name
\n- Name of this probe\n
family
\n Protocol family value\n-
state
\n- Socket state value\n+
type
\n+ Socket type value\n+
protocol
\n+ Protocol value\n
probe::socket.aio_write.return — \n Conclusion of message send via sock_aio_write
\n-
socket.aio_write.return
family
\n- Protocol family value\n-
type
\n- Socket type value\n-
name
\n- Name of this probe\n-
state
\n+
socket.aio_write.return
state
\n Socket state value\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n
flags
\n Socket flags value\n+
name
\n+ Name of this probe\n
size
\n Size of message received (in bytes) or error code if success = 0\n+
type
\n+ Socket type value\n
protocol
\n Protocol value\n+
family
\n+ Protocol family value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n
probe::socket.aio_write — \n Message send via sock_aio_write
\n-
socket.aio_write
flags
\n+
socket.aio_write
probe::socket.close — \n Close a socket\n-
socket.close
flags
\n- Socket flags value\n-
protocol
\n- Protocol value\n+
socket.close
probe::socket.create.return — \n Return from Creation of a socket\n-
socket.create.return
protocol
\n- Protocol value\n-
err
\n+
socket.create.return
err
\n Error code if success == 0\n-
family
\n- Protocol family value\n+
protocol
\n+ Protocol value\n
type
\n Socket type value\n
name
\n Name of this probe\n-
success
\n- Was socket creation successful? (1 = yes, 0 = no)\n
requester
\n Requested by user process or the kernel (1 = kernel, 0 = user)\n+
success
\n+ Was socket creation successful? (1 = yes, 0 = no)\n+
family
\n+ Protocol family value\n
probe::socket.create — \n Creation of a socket\n
socket.create
probe::socket.read_iter.return — \n Conclusion of message received via sock_read_iter
\n-
socket.read_iter.return
family
\n- Protocol family value\n-
name
\n- Name of this probe\n-
type
\n+
socket.read_iter.return
type
\n Socket type value\n-
state
\n- Socket state value\n+
protocol
\n+ Protocol value\n+
family
\n+ Protocol family value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n+
state
\n+ Socket state value\n
flags
\n Socket flags value\n+
name
\n+ Name of this probe\n
size
\n Size of message received (in bytes) or error code if success = 0\n-
protocol
\n- Protocol value\n
probe::socket.read_iter — \n Receiving message via sock_read_iter
\n-
socket.read_iter
state
\n- Socket state value\n-
name
\n- Name of this probe\n+
socket.read_iter
probe::socket.readv.return — \n Conclusion of receiving a message via sock_readv
\n-
socket.readv.return
success
\n- Was receive successful? (1 = yes, 0 = no)\n-
state
\n- Socket state value\n+
socket.readv.return
size
\n+ Size of message received (in bytes) or error code if success = 0\n
name
\n Name of this probe\n-
type
\n- Socket type value\n+
state
\n+ Socket state value\n+
flags
\n+ Socket flags value\n
family
\n Protocol family value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n+
type
\n+ Socket type value\n
protocol
\n Protocol value\n-
flags
\n- Socket flags value\n-
size
\n- Size of message received (in bytes) or error code if success = 0\n
probe::socket.readv — \n Receiving a message via sock_readv
\n-
socket.readv
protocol
\n- Protocol value\n+
socket.readv
state
\n+ Socket state value\n
flags
\n Socket flags value\n-
size
\n- Message size in bytes\n-
state
\n- Socket state value\n
name
\n Name of this probe\n+
size
\n+ Message size in bytes\n
type
\n Socket type value\n+
protocol
\n+ Protocol value\n
family
\n Protocol family value\n
\n Fires at the beginning of receiving a message on a socket\n via the sock_readv
function\n", "details": [{"source1": "html2text {}", "source2": "html2text {}", "unified_diff": "@@ -2,26 +2,26 @@\n Prev\u00a0Chapter\u00a014.\u00a0Socket Tapse\u00a0Next\n ===============================================================================\n ***** Name *****\n probe::socket.readv \u2014 Receiving a message via sock_readv\n ***** Synopsis *****\n socket.readv\n ***** Values *****\n- protocol\n- Protocol value\n- flags\n- Socket flags value\n- size\n- Message size in bytes\n state\n Socket state value\n+ flags\n+ Socket flags value\n name\n Name of this probe\n+ size\n+ Message size in bytes\n type\n Socket type value\n+ protocol\n+ Protocol value\n family\n Protocol family value\n ***** Context *****\n The message sender\n ***** Description *****\n Fires at the beginning of receiving a message on a socket via the sock_readv\n function\n"}]}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-receive.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-receive.html", "unified_diff": "@@ -1,21 +1,21 @@\n
probe::socket.receive — \n Message received on a socket.\n-
socket.receive
success
\n+
socket.receive
family
\n+ Protocol family value\n+
success
\n Was send successful? (1 = yes, 0 = no)\n-
state
\n- Socket state value\n
type
\n Socket type value\n-
name
\n- Name of this probe\n-
family
\n- Protocol family value\n
protocol
\n Protocol value\n-
flags
\n- Socket flags value\n+
name
\n+ Name of this probe\n
size
\n Size of message received (in bytes) or error code if success = 0\n+
state
\n+ Socket state value\n+
flags
\n+ Socket flags value\n
probe::socket.recvmsg.return — \n Return from Message being received on socket\n-
socket.recvmsg.return
state
\n- Socket state value\n+
socket.recvmsg.return
family
\n+ Protocol family value\n
success
\n Was receive successful? (1 = yes, 0 = no)\n-
family
\n- Protocol family value\n
type
\n Socket type value\n-
name
\n- Name of this probe\n
protocol
\n Protocol value\n
size
\n Size of message received (in bytes) or error code if success = 0\n+
name
\n+ Name of this probe\n+
state
\n+ Socket state value\n
flags
\n Socket flags value\n
\n Fires at the conclusion of receiving a message on a socket\n via the sock_recvmsg
function.\n", "details": [{"source1": "html2text {}", "source2": "html2text {}", "unified_diff": "@@ -2,28 +2,28 @@\n Prev\u00a0Chapter\u00a014.\u00a0Socket Tapse\u00a0Next\n ===============================================================================\n ***** Name *****\n probe::socket.recvmsg.return \u2014 Return from Message being received on socket\n ***** Synopsis *****\n socket.recvmsg.return\n ***** Values *****\n- state\n- Socket state value\n- success\n- Was receive successful? (1 = yes, 0 = no)\n family\n Protocol family value\n+ success\n+ Was receive successful? (1 = yes, 0 = no)\n type\n Socket type value\n- name\n- Name of this probe\n protocol\n Protocol value\n size\n Size of message received (in bytes) or error code if success = 0\n+ name\n+ Name of this probe\n+ state\n+ Socket state value\n flags\n Socket flags value\n ***** Context *****\n The message receiver.\n ***** Description *****\n Fires at the conclusion of receiving a message on a socket via the sock_recvmsg\n function.\n"}]}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-socket-recvmsg.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-socket-recvmsg.html", "unified_diff": "@@ -1,22 +1,22 @@\n
probe::socket.recvmsg — \n Message being received on socket\n-
socket.recvmsg
flags
\n- Socket flags value\n+
socket.recvmsg
name
\n+ Name of this probe\n
size
\n Message size in bytes\n+
flags
\n+ Socket flags value\n+
state
\n+ Socket state value\n+
family
\n+ Protocol family value\n
protocol
\n Protocol value\n
type
\n Socket type value\n-
name
\n- Name of this probe\n-
family
\n- Protocol family value\n-
state
\n- Socket state value\n
probe::socket.send — \n Message sent on a socket.\n-
socket.send
size
\n- Size of message sent (in bytes) or error code if success = 0\n+
socket.send
state
\n+ Socket state value\n
flags
\n Socket flags value\n-
protocol
\n- Protocol value\n-
type
\n- Socket type value\n+
size
\n+ Size of message sent (in bytes) or error code if success = 0\n
name
\n Name of this probe\n+
type
\n+ Socket type value\n+
protocol
\n+ Protocol value\n
family
\n Protocol family value\n
success
\n Was send successful? (1 = yes, 0 = no)\n-
state
\n- Socket state value\n
probe::socket.sendmsg.return — \n Return from socket.sendmsg.\n-
socket.sendmsg.return
state
\n+
socket.sendmsg.return
size
\n+ Size of message sent (in bytes) or error code if success = 0\n+
name
\n+ Name of this probe\n+
flags
\n+ Socket flags value\n+
state
\n Socket state value\n
success
\n Was send successful? (1 = yes, 0 = no)\n
family
\n Protocol family value\n-
type
\n- Socket type value\n-
name
\n- Name of this probe\n
protocol
\n Protocol value\n-
size
\n- Size of message sent (in bytes) or error code if success = 0\n-
flags
\n- Socket flags value\n+
type
\n+ Socket type value\n
probe::socket.sendmsg — \n Message is currently being sent on a socket.\n-
socket.sendmsg
size
\n- Message size in bytes\n-
flags
\n- Socket flags value\n-
protocol
\n+
socket.sendmsg
probe::socket.write_iter.return — \n Conclusion of message send via sock_write_iter
\n-
socket.write_iter.return
state
\n+
socket.write_iter.return
flags
\n+ Socket flags value\n+
state
\n Socket state value\n-
success
\n- Was receive successful? (1 = yes, 0 = no)\n-
family
\n- Protocol family value\n
name
\n Name of this probe\n-
type
\n- Socket type value\n-
protocol
\n- Protocol value\n-
flags
\n- Socket flags value\n
size
\n Size of message received (in bytes) or error code if success = 0\n+
protocol
\n+ Protocol value\n+
type
\n+ Socket type value\n+
success
\n+ Was receive successful? (1 = yes, 0 = no)\n+
family
\n+ Protocol family value\n
probe::socket.write_iter — \n Message send via sock_write_iter
\n-
socket.write_iter
flags
\n+
socket.write_iter
state
\n+ Socket state value\n+
flags
\n Socket flags value\n+
name
\n+ Name of this probe\n
size
\n Message size in bytes\n+
type
\n+ Socket type value\n
protocol
\n Protocol value\n
family
\n Protocol family value\n-
type
\n- Socket type value\n-
name
\n- Name of this probe\n-
state
\n- Socket state value\n
probe::socket.writev.return — \n Conclusion of message sent via socket_writev
\n-
socket.writev.return
protocol
\n- Protocol value\n-
flags
\n- Socket flags value\n-
size
\n- Size of message sent (in bytes) or error code if success = 0\n-
state
\n- Socket state value\n-
success
\n+
socket.writev.return
success
\n Was send successful? (1 = yes, 0 = no)\n
family
\n Protocol family value\n+
protocol
\n+ Protocol value\n
type
\n Socket type value\n+
size
\n+ Size of message sent (in bytes) or error code if success = 0\n
name
\n Name of this probe\n+
flags
\n+ Socket flags value\n+
state
\n+ Socket state value\n
probe::socket.writev — \n Message sent via socket_writev
\n-
socket.writev
flags
\n- Socket flags value\n-
size
\n- Message size in bytes\n+
socket.writev
family
\n+ Protocol family value\n
protocol
\n Protocol value\n-
name
\n- Name of this probe\n
type
\n Socket type value\n-
family
\n- Protocol family value\n+
size
\n+ Message size in bytes\n+
name
\n+ Name of this probe\n+
flags
\n+ Socket flags value\n
state
\n Socket state value\n
\n Fires at the beginning of sending a message on a socket\n via the sock_writev
function\n", "details": [{"source1": "html2text {}", "source2": "html2text {}", "unified_diff": "@@ -2,26 +2,26 @@\n Prev\u00a0Chapter\u00a014.\u00a0Socket Tapse\u00a0Next\n ===============================================================================\n ***** Name *****\n probe::socket.writev \u2014 Message sent via socket_writev\n ***** Synopsis *****\n socket.writev\n ***** Values *****\n- flags\n- Socket flags value\n- size\n- Message size in bytes\n+ family\n+ Protocol family value\n protocol\n Protocol value\n- name\n- Name of this probe\n type\n Socket type value\n- family\n- Protocol family value\n+ size\n+ Message size in bytes\n+ name\n+ Name of this probe\n+ flags\n+ Socket flags value\n state\n Socket state value\n ***** Context *****\n The message sender\n ***** Description *****\n Fires at the beginning of sending a message on a socket via the sock_writev\n function\n"}]}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-softirq-entry.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-softirq-entry.html", "unified_diff": "@@ -1,11 +1,11 @@\n
probe::softirq.entry — \n Execution of handler for a pending softirq starting\n-
softirq.entry
vec_nr
\n- softirq vector number\n-
action
\n- pointer to softirq handler just about to execute\n-
h
\n+
softirq.entry
probe::softirq.exit — \n Execution of handler for a pending softirq completed\n-
softirq.exit
vec
\n- softirq_action vector\n-
h
\n- struct softirq_action* for just executed softirq\n-
action
\n+
softirq.exit
probe::stap.cache_add_src — \n Adding C code translation to cache\n-
stap.cache_add_src
source_path
\n- the path the .c file is coming from (incl filename)\n-
dest_path
\n+
stap.cache_add_src
probe::stapio.receive_control_message — \n Received a control message\n
stapio.receive_control_message
probe::sunrpc.clnt.bind_new_program — \n Bind a new RPC program to an existing client\n-
sunrpc.clnt.bind_new_program
old_prog
\n- the number of old RPC program\n-
old_vers
\n+
sunrpc.clnt.bind_new_program
old_vers
\n the version of old RPC program\n-
prog
\n- the number of new RPC program\n-
old_progname
\n- the name of old RPC program\n+
servername
\n+ the server machine name\n+
old_prog
\n+ the number of old RPC program\n
progname
\n the name of new RPC program\n+
old_progname
\n+ the name of old RPC program\n+
prog
\n+ the number of new RPC program\n
vers
\n the version of new RPC program\n-
servername
\n- the server machine name\n
probe::sunrpc.clnt.call_async — \n Make an asynchronous RPC call\n-
sunrpc.clnt.call_async
prot
\n- the IP protocol number\n+
sunrpc.clnt.call_async
dead
\n+ whether this client is abandoned\n
prog
\n the RPC program number\n+
vers
\n+ the RPC program version number\n+
proc
\n+ the procedure number in this RPC call\n+
servername
\n+ the server machine name\n+
port
\n+ the port number\n
xid
\n current transmission id\n
procname
\n the procedure name in this RPC call\n-
flags
\n- flags\n+
prot
\n+ the IP protocol number\n
progname
\n the RPC program name\n-
port
\n- the port number\n-
dead
\n- whether this client is abandoned\n-
vers
\n- the RPC program version number\n-
servername
\n- the server machine name\n-
proc
\n- the procedure number in this RPC call\n+
flags
\n+ flags\n
probe::sunrpc.clnt.call_sync — \n Make a synchronous RPC call\n-
sunrpc.clnt.call_sync
procname
\n- the procedure name in this RPC call\n+
sunrpc.clnt.call_sync
xid
\n+ current transmission id\n+
port
\n+ the port number\n+
servername
\n+ the server machine name\n
flags
\n flags\n+
progname
\n+ the RPC program name\n+
procname
\n+ the procedure name in this RPC call\n
prot
\n the IP protocol number\n-
prog
\n- the RPC program number\n-
xid
\n- current transmission id\n-
port
\n- the port number\n
dead
\n whether this client is abandoned\n-
vers
\n- the RPC program version number\n-
servername
\n- the server machine name\n
proc
\n the procedure number in this RPC call\n-
progname
\n- the RPC program name\n+
vers
\n+ the RPC program version number\n+
prog
\n+ the RPC program number\n
probe::sunrpc.clnt.clone_client — \n Clone an RPC client structure\n
sunrpc.clnt.clone_client
servername
\n the server machine name\n-
authflavor
\n- the authentication flavor\n-
progname
\n- the RPC program name\n-
vers
\n- the RPC program version number\n-
prog
\n- the RPC program number\n
port
\n the port number\n+
prog
\n+ the RPC program number\n
prot
\n the IP protocol number\n+
authflavor
\n+ the authentication flavor\n+
vers
\n+ the RPC program version number\n+
progname
\n+ the RPC program name\n
probe::sunrpc.clnt.create_client — \n Create an RPC client\n-
sunrpc.clnt.create_client
authflavor
\n+
sunrpc.clnt.create_client
prot
\n+ the IP protocol number\n+
authflavor
\n the authentication flavor\n-
servername
\n- the server machine name\n
vers
\n the RPC program version number\n+
prog
\n+ the RPC program number\n
progname
\n the RPC program name\n+
servername
\n+ the server machine name\n
port
\n the port number\n-
prog
\n- the RPC program number\n-
prot
\n- the IP protocol number\n
probe::sunrpc.clnt.restart_call — \n Restart an asynchronous RPC call\n-
sunrpc.clnt.restart_call
tk_priority
\n- the task priority\n-
prog
\n- the RPC program number\n-
xid
\n- the transmission id\n-
servername
\n- the server machine name\n-
tk_runstate
\n+
sunrpc.clnt.restart_call
probe::sunrpc.clnt.shutdown_client — \n Shutdown an RPC client\n-
sunrpc.clnt.shutdown_client
clones
\n+
sunrpc.clnt.shutdown_client
prog
\n+ the RPC program number\n+
rpccnt
\n+ the count of RPC calls\n+
vers
\n+ the RPC program version number\n+
clones
\n the number of clones\n-
om_execute
\n- the RPC execution jiffies\n-
port
\n- the port number\n-
om_bytes_sent
\n- the count of bytes out\n+
om_rtt
\n+ the RPC RTT jiffies\n+
netreconn
\n+ the count of reconnections\n+
om_ops
\n+ the count of operations\n+
prot
\n+ the IP protocol number\n+
authflavor
\n+ the authentication flavor\n+
progname
\n+ the RPC program name\n
om_ntrans
\n the count of RPC transmissions\n-
vers
\n- the RPC program version number\n+
om_bytes_sent
\n+ the count of bytes out\n
servername
\n the server machine name\n
om_queue
\n the jiffies queued for xmit\n-
progname
\n- the RPC program name\n-
rpccnt
\n- the count of RPC calls\n
om_bytes_recv
\n the count of bytes in\n-
om_ops
\n- the count of operations\n-
authflavor
\n- the authentication flavor\n-
prot
\n- the IP protocol number\n+
om_execute
\n+ the RPC execution jiffies\n
tasks
\n the number of references\n-
prog
\n- the RPC program number\n-
om_rtt
\n- the RPC RTT jiffies\n-
netreconn
\n- the count of reconnections\n+
port
\n+ the port number\n
sunrpc.sched.delay
tk_pid
\n the debugging id of the task\n
vers
\n the program version in the RPC call\n
tk_flags
\n the flags of the task\n+
prog
\n+ the program number in the RPC call\n+
xid
\n+ the transmission id in the RPC call\n
delay
\n the time delayed\n
prot
\n the IP protocol in the RPC call\n-
xid
\n- the transmission id in the RPC call\n-
prog
\n- the program number in the RPC call\n
probe::sunrpc.sched.execute — \n Execute the RPC `scheduler'\n-
sunrpc.sched.execute
probe::sunrpc.sched.new_task — \n Create new task for the specified client\n-
sunrpc.sched.new_task
prog
\n+
sunrpc.sched.new_task
tk_flags
\n+ the flags of the task\n+
vers
\n+ the program version in the RPC call\n+
prog
\n the program number in the RPC call\n
xid
\n the transmission id in the RPC call\n
prot
\n the IP protocol in the RPC call\n-
vers
\n- the program version in the RPC call\n-
tk_flags
\n- the flags of the task\n
probe::sunrpc.sched.release_task — \n Release all resources associated with a task\n-
sunrpc.sched.release_task
prog
\n+
sunrpc.sched.release_task
tk_flags
\n+ the flags of the task\n+
vers
\n+ the program version in the RPC call\n+
prog
\n the program number in the RPC call\n
xid
\n the transmission id in the RPC call\n
prot
\n the IP protocol in the RPC call\n-
vers
\n- the program version in the RPC call\n-
tk_flags
\n- the flags of the task\n
probe::sunrpc.svc.create — \n Create an RPC service\n-
sunrpc.svc.create
probe::sunrpc.svc.destroy — \n Destroy an RPC service\n-
sunrpc.svc.destroy
sv_progname
\n- the name of the program\n-
rpcbadauth
\n- the count of requests drooped for authentication failure\n-
rpccnt
\n- the count of valid RPC requests\n-
rpcbadfmt
\n+
sunrpc.svc.destroy
rpcbadfmt
\n the count of requests dropped for bad formats\n
sv_name
\n the service name\n-
netcnt
\n- the count of received RPC requests\n+
sv_prog
\n+ the number of the program\n
nettcpconn
\n the count of accepted TCP connections\n+
netcnt
\n+ the count of received RPC requests\n
sv_nrthreads
\n the number of concurrent threads\n-
sv_prog
\n- the number of the program\n+
rpcbadauth
\n+ the count of requests drooped for authentication failure\n+
sv_progname
\n+ the name of the program\n+
rpccnt
\n+ the count of valid RPC requests\n
probe::sunrpc.svc.drop — \n Drop RPC request\n-
sunrpc.svc.drop
rq_prot
\n+
sunrpc.svc.drop
sv_name
\n+ the service name\n+
rq_prot
\n the IP protocol of the reqeust\n-
rq_xid
\n- the transmission id in the request\n-
peer_ip
\n- the peer address where the request is from\n
rq_prog
\n the program number in the request\n-
sv_name
\n- the service name\n+
rq_xid
\n+ the transmission id in the request\n
rq_vers
\n the program version in the request\n
rq_proc
\n the procedure number in the request\n+
peer_ip
\n+ the peer address where the request is from\n
probe::sunrpc.svc.process — \n Process an RPC request\n-
sunrpc.svc.process
peer_ip
\n- the peer address where the request is from\n-
rq_prog
\n+
sunrpc.svc.process
rq_prog
\n the program number in the request\n+
rq_prot
\n+ the IP protocol of the reqeust\n
sv_name
\n the service name\n-
sv_nrthreads
\n- the number of concurrent threads\n
sv_prog
\n the number of the program\n-
rq_prot
\n- the IP protocol of the reqeust\n-
rq_xid
\n- the transmission id in the request\n-
rq_vers
\n- the program version in the request\n+
peer_ip
\n+ the peer address where the request is from\n
rq_proc
\n the procedure number in the request\n+
rq_vers
\n+ the program version in the request\n+
sv_nrthreads
\n+ the number of concurrent threads\n+
rq_xid
\n+ the transmission id in the request\n
probe::sunrpc.svc.recv — \n Listen for the next RPC request on any socket\n-
sunrpc.svc.recv
probe::sunrpc.svc.register — \n Register an RPC service with the local portmapper\n-
sunrpc.svc.register
port
\n- the port number\n+
sunrpc.svc.register
probe::sunrpc.svc.send — \n Return reply to RPC client\n-
sunrpc.svc.send
rq_vers
\n- the program version in the request\n-
rq_proc
\n- the procedure number in the request\n+
sunrpc.svc.send
rq_prog
\n+ the program number in the request\n+
rq_prot
\n+ the IP protocol of the reqeust\n
sv_name
\n the service name\n-
rq_prog
\n- the program number in the request\n
peer_ip
\n the peer address where the request is from\n+
rq_proc
\n+ the procedure number in the request\n+
rq_vers
\n+ the program version in the request\n
rq_xid
\n the transmission id in the request\n-
rq_prot
\n- the IP protocol of the reqeust\n
probe::syscall_any.return — \n Record exit from a syscall\n-
syscall_any.return
syscall_nr
\n+
syscall_any.return
retval
\n+ return value of the syscall\n+
syscall_nr
\n number of the syscall\n
name
\n name of the syscall\n-
retval
\n- return value of the syscall\n
\n The syscall_any.return probe point is designed to be a low overhead\n that monitors all the syscalls returns via a kernel tracepoint.\n Because of the breadth of syscalls it monitors it provides\n no information about the syscall arguments, argstr string\n", "details": [{"source1": "html2text {}", "source2": "html2text {}", "unified_diff": "@@ -2,20 +2,20 @@\n Prev\u00a0Chapter\u00a036.\u00a0Syscall Any Tapse\u00a0Next\n ===============================================================================\n ***** Name *****\n probe::syscall_any.return \u2014 Record exit from a syscall\n ***** Synopsis *****\n syscall_any.return\n ***** Values *****\n+ retval\n+ return value of the syscall\n syscall_nr\n number of the syscall\n name\n name of the syscall\n- retval\n- return value of the syscall\n ***** Context *****\n The process performing the syscall\n ***** Description *****\n The syscall_any.return probe point is designed to be a low overhead that\n monitors all the syscalls returns via a kernel tracepoint. Because of the\n breadth of syscalls it monitors it provides no information about the syscall\n arguments, argstr string representation of those arguments, or a string\n"}]}, {"source1": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect.html", "source2": "./usr/share/doc/systemtap-doc/tapsets/API-tcp-disconnect.html", "comments": ["Ordering differences only"], "unified_diff": "@@ -1,21 +1,21 @@\n
probe::tcp.disconnect — \n TCP socket disconnection\n
tcp.disconnect
dport
\n TCP destination port\n-
saddr
\n- A string representing the source IP address\n-
sock
\n- Network socket \n-
flags
\n- TCP flags (e.g. FIN, etc) \n
name
\n Name of this probe\n-
daddr
\n- A string representing the destination IP address\n
sport
\n TCP source port \n
family
\n IP address family\n+
daddr
\n+ A string representing the destination IP address\n+
flags
\n+ TCP flags (e.g. FIN, etc) \n+
sock
\n+ Network socket \n+
saddr
\n+ A string representing the source IP address\n
probe::tcp.receive — \n Called when a TCP packet is received\n-
tcp.receive
family
\n+
tcp.receive
protocol
\n+ Packet protocol from driver\n+
name
\n+ Name of the probe point\n+
family
\n IP address family\n-
sport
\n- TCP source port\n
daddr
\n A string representing the destination IP address\n-
syn
\n- TCP SYN flag\n-
protocol
\n- Packet protocol from driver\n
psh
\n TCP PSH flag\n-
fin
\n- TCP FIN flag\n
saddr
\n A string representing the source IP address\n-
name
\n- Name of the probe point\n-
rst
\n- TCP RST flag\n-
urg
\n- TCP URG flag\n+
fin
\n+ TCP FIN flag\n
dport
\n TCP destination port\n
iphdr
\n IP header address\n+
sport
\n+ TCP source port\n+
rst
\n+ TCP RST flag\n+
syn
\n+ TCP SYN flag\n
ack
\n TCP ACK flag\n+
urg
\n+ TCP URG flag\n
probe::tcp.recvmsg.return — \n Receiving TCP message complete\n-
tcp.recvmsg.return
saddr
\n- A string representing the source IP address\n+
tcp.recvmsg.return
family
\n+ IP address family\n+
sport
\n+ TCP source port \n
name
\n Name of this probe\n
dport
\n TCP destination port\n-
family
\n- IP address family\n
size
\n Number of bytes received or error code if an error occurred.\n-
sport
\n- TCP source port \n+
saddr
\n+ A string representing the source IP address\n
daddr
\n A string representing the destination IP address\n
probe::tcp.recvmsg — \n Receiving TCP message\n-
tcp.recvmsg
dport
\n+
tcp.recvmsg
family
\n+ IP address family\n+
sport
\n+ TCP source port \n+
dport
\n TCP destination port\n+
name
\n+ Name of this probe\n+
size
\n+ Number of bytes to be received \n
saddr
\n A string representing the source IP address\n
sock
\n Network socket\n-
name
\n- Name of this probe\n
daddr
\n A string representing the destination IP address\n-
sport
\n- TCP source port \n-
family
\n- IP address family\n-
size
\n- Number of bytes to be received \n
probe::tcp.sendmsg.return — \n Sending TCP message is done\n-
tcp.sendmsg.return
name
\n- Name of this probe\n-
size
\n+
tcp.sendmsg.return
probe::tcp.sendmsg — \n Sending a tcp message\n-
tcp.sendmsg
name
\n- Name of this probe\n-
size
\n+
tcp.sendmsg
probe::tcp.setsockopt — \n Call to setsockopt
\n-
tcp.setsockopt
optname
\n- TCP socket options (e.g. TCP_NODELAY, TCP_MAXSEG, etc)\n-
family
\n+
tcp.setsockopt
family
\n IP address family\n-
level
\n- The level at which the socket options will be manipulated\n
optlen
\n Used to access values for setsockopt
\n+
name
\n+ Name of this probe\n+
optname
\n+ TCP socket options (e.g. TCP_NODELAY, TCP_MAXSEG, etc)\n+
level
\n+ The level at which the socket options will be manipulated\n
optstr
\n Resolves optname to a human-readable format\n
sock
\n Network socket\n-
name
\n- Name of this probe\n
probe::tcpmib.ActiveOpens — \n Count an active opening of a socket\n-
tcpmib.ActiveOpens
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.ActiveOpens
probe::tcpmib.AttemptFails — \n Count a failed attempt to open a socket\n-
tcpmib.AttemptFails
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.AttemptFails
probe::tcpmib.CurrEstab — \n Update the count of open sockets\n-
tcpmib.CurrEstab
sk
\n- pointer to the struct sock being acted on\n-
op
\n+
tcpmib.CurrEstab
probe::tcpmib.OutRsts — \n Count the sending of a reset packet\n-
tcpmib.OutRsts
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.OutRsts
probe::tcpmib.OutSegs — \n Count the sending of a TCP segment\n-
tcpmib.OutSegs
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.OutSegs
probe::tcpmib.PassiveOpens — \n Count the passive creation of a socket\n-
tcpmib.PassiveOpens
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.PassiveOpens
probe::tcpmib.RetransSegs — \n Count the retransmission of a TCP segment\n-
tcpmib.RetransSegs
op
\n- value to be added to the counter (default value of 1)\n-
sk
\n+
tcpmib.RetransSegs
probe::tty.init — \n Called when a tty is being initalized\n-
tty.init
probe::tty.ioctl — \n called when a ioctl is request to the tty\n-
tty.ioctl
probe::tty.open — \n Called when a tty is opened\n-
tty.open
probe::tty.read — \n called when a tty line will be read\n-
tty.read
probe::tty.receive — \n called when a tty receives a message\n-
tty.receive
probe::tty.register — \n Called when a tty device is registred\n-
tty.register
probe::tty.release — \n Called when the tty is closed\n-
tty.release
inode_number
\n- the inode number\n-
file_flags
\n- the file flags\n-
inode_flags
\n- the inode flags\n-
inode_state
\n+
tty.release
probe::tty.resize — \n Called when a terminal resize happens\n-
tty.resize
old_xpixel
\n- the old xpixel\n-
old_ypixel
\n- the old ypixel\n-
new_row
\n- the new row value\n+
tty.resize
new_ypixel
\n+ the new ypixel value\n
new_col
\n the new col value\n
name
\n the tty name\n-
new_xpixel
\n- the new xpixel value\n+
new_row
\n+ the new row value\n
old_col
\n the old col value\n
old_row
\n the old row value\n-
new_ypixel
\n- the new ypixel value\n+
old_ypixel
\n+ the old ypixel\n+
new_xpixel
\n+ the new xpixel value\n+
old_xpixel
\n+ the old xpixel\n
probe::tty.unregister — \n Called when a tty device is being unregistered\n-
tty.unregister
probe::tty.write — \n write to the tty line\n-
tty.write
probe::udp.disconnect.return — \n UDP has been disconnected successfully\n-
udp.disconnect.return
daddr
\n+
udp.disconnect.return
name
\n+ The name of this probe\n+
ret
\n+ Error code (0: no error) \n+
daddr
\n A string representing the destination IP address\n
sport
\n UDP source port\n-
dport
\n- UDP destination port\n
family
\n IP address family\n
saddr
\n A string representing the source IP address\n-
name
\n- The name of this probe\n-
ret
\n- Error code (0: no error) \n+
dport
\n+ UDP destination port\n
probe::udp.disconnect — \n Fires when a process requests for a UDP disconnection\n-
udp.disconnect
sock
\n- Network socket used by the process\n+
udp.disconnect
daddr
\n+ A string representing the destination IP address\n
sport
\n UDP source port\n-
daddr
\n- A string representing the destination IP address\n-
saddr
\n- A string representing the source IP address\n
flags
\n Flags (e.g. FIN, etc) \n-
family
\n- IP address family\n-
dport
\n- UDP destination port\n
name
\n The name of this probe\n+
saddr
\n+ A string representing the source IP address\n+
dport
\n+ UDP destination port\n+
sock
\n+ Network socket used by the process\n+
family
\n+ IP address family\n
probe::udp.recvmsg.return — \n Fires whenever an attempt to receive a UDP message received is completed\n-
udp.recvmsg.return
dport
\n- UDP destination port\n-
saddr
\n+
udp.recvmsg.return
saddr
\n A string representing the source IP address\n-
family
\n- IP address family\n-
name
\n- The name of this probe\n+
dport
\n+ UDP destination port\n
size
\n Number of bytes received by the process\n+
family
\n+ IP address family\n
daddr
\n A string representing the destination IP address\n
sport
\n UDP source port\n+
name
\n+ The name of this probe\n
probe::udp.recvmsg — \n Fires whenever a UDP message is received\n-
udp.recvmsg
dport
\n+
udp.recvmsg
sport
\n+ UDP source port\n+
daddr
\n+ A string representing the destination IP address\n+
name
\n+ The name of this probe\n+
dport
\n UDP destination port\n-
family
\n- IP address family\n
saddr
\n A string representing the source IP address\n-
name
\n- The name of this probe\n+
family
\n+ IP address family\n
sock
\n Network socket used by the process\n
size
\n Number of bytes received by the process\n-
daddr
\n- A string representing the destination IP address\n-
sport
\n- UDP source port\n
probe::udp.sendmsg — \n Fires whenever a process sends a UDP message\n-
udp.sendmsg
size
\n- Number of bytes sent by the process\n-
sock
\n- Network socket used by the process \n+
udp.sendmsg
name
\n+ The name of this probe\n
daddr
\n A string representing the destination IP address\n
sport
\n UDP source port\n-
dport
\n- UDP destination port\n-
saddr
\n- A string representing the source IP address\n+
size
\n+ Number of bytes sent by the process\n
family
\n IP address family\n-
name
\n- The name of this probe\n+
sock
\n+ Network socket used by the process \n+
saddr
\n+ A string representing the source IP address\n+
dport
\n+ UDP destination port\n
probe::vm.brk — \n Fires when a brk is requested (i.e. the heap will be resized)\n-
vm.brk
name
\n+
vm.brk
probe::vm.kfree — \n Fires when kfree is requested\n-
vm.kfree
call_site
\n- address of the function calling this kmemory function\n-
caller_function
\n+
vm.kfree
probe::vm.kmalloc_node — \n Fires when kmalloc_node is requested\n-
vm.kmalloc_node
gfp_flags
\n+
vm.kmalloc_node
bytes_req
\n+ requested Bytes\n+
gfp_flags
\n type of kmemory to allocate\n-
gfp_flag_name
\n- type of kmemory to allocate(in string format)\n
call_site
\n address of the function caling this kmemory function\n-
name
\n- name of the probe point\n-
caller_function
\n- name of the caller function\n-
bytes_req
\n- requested Bytes\n
ptr
\n pointer to the kmemory allocated\n+
name
\n+ name of the probe point\n
bytes_alloc
\n allocated Bytes\n+
gfp_flag_name
\n+ type of kmemory to allocate(in string format)\n+
caller_function
\n+ name of the caller function\n
probe::vm.kmalloc — \n Fires when kmalloc is requested\n-
vm.kmalloc
gfp_flags
\n- type of kmemory to allocate\n-
call_site
\n+
vm.kmalloc
call_site
\n address of the kmemory function\n-
gfp_flag_name
\n- type of kmemory to allocate (in String format)\n+
gfp_flags
\n+ type of kmemory to allocate\n+
bytes_req
\n+ requested Bytes\n
caller_function
\n name of the caller function\n+
ptr
\n+ pointer to the kmemory allocated\n
name
\n name of the probe point\n
bytes_alloc
\n allocated Bytes\n-
ptr
\n- pointer to the kmemory allocated\n-
bytes_req
\n- requested Bytes\n+
gfp_flag_name
\n+ type of kmemory to allocate (in String format)\n
probe::vm.kmem_cache_alloc_node — \n Fires when kmem_cache_alloc_node is requested\n-
vm.kmem_cache_alloc_node
ptr
\n- pointer to the kmemory allocated\n+
vm.kmem_cache_alloc_node
call_site
\n+ address of the function calling this kmemory function\n+
gfp_flags
\n+ type of kmemory to allocate\n
bytes_req
\n requested Bytes\n-
bytes_alloc
\n- allocated Bytes\n
caller_function
\n name of the caller function\n-
name
\n- name of the probe point\n-
call_site
\n- address of the function calling this kmemory function\n
gfp_flag_name
\n type of kmemory to allocate(in string format)\n-
gfp_flags
\n- type of kmemory to allocate\n+
bytes_alloc
\n+ allocated Bytes\n+
name
\n+ name of the probe point\n+
ptr
\n+ pointer to the kmemory allocated\n
probe::vm.kmem_cache_alloc — \n Fires when kmem_cache_alloc is requested\n-
vm.kmem_cache_alloc
gfp_flags
\n+
vm.kmem_cache_alloc
bytes_req
\n+ requested Bytes\n+
gfp_flags
\n type of kmemory to allocate\n
call_site
\n address of the function calling this kmemory function.\n
gfp_flag_name
\n type of kmemory to allocate(in string format)\n-
caller_function
\n- name of the caller function.\n-
name
\n- name of the probe point\n-
ptr
\n- pointer to the kmemory allocated\n-
bytes_req
\n- requested Bytes\n
bytes_alloc
\n allocated Bytes\n+
ptr
\n+ pointer to the kmemory allocated\n+
name
\n+ name of the probe point\n+
caller_function
\n+ name of the caller function.\n
probe::vm.kmem_cache_free — \n Fires when kmem_cache_free is requested\n-
vm.kmem_cache_free
call_site
\n- Address of the function calling this kmemory function\n+
vm.kmem_cache_free
probe::vm.mmap — \n Fires when an mmap is requested\n-
vm.mmap
address
\n- the requested address\n-
length
\n+
vm.mmap
probe::vm.munmap — \n Fires when an munmap is requested\n-
vm.munmap
name
\n+
vm.munmap
probe::vm.pagefault.return — \n Indicates what type of fault occurred\n-
vm.pagefault.return
probe::vm.write_shared_copy — \n Page copy for shared page write\n-
vm.write_shared_copy
name
\n- Name of the probe point\n+
vm.write_shared_copy
probe::vm.write_shared — \n Attempts at writing to a shared page\n-
vm.write_shared
probe::workqueue.execute — \n Executing deferred work\n-
workqueue.execute
probe::workqueue.insert — \n Queuing work on a workqueue\n-
workqueue.insert