From afd0a6cb4f01ee04a77a6f04348e906edb929732 Mon Sep 17 00:00:00 2001 From: Don Domingo Date: Mon, 20 Jul 2009 10:59:30 +1000 Subject: [PATCH] minor revisions to language --- .../en-US/Useful_Scripts-dropwatch.xml | 28 +++++++++++++------ 1 file changed, 19 insertions(+), 9 deletions(-) diff --git a/doc/SystemTap_Beginners_Guide/en-US/Useful_Scripts-dropwatch.xml b/doc/SystemTap_Beginners_Guide/en-US/Useful_Scripts-dropwatch.xml index c7bee9883..3bc69899b 100644 --- a/doc/SystemTap_Beginners_Guide/en-US/Useful_Scripts-dropwatch.xml +++ b/doc/SystemTap_Beginners_Guide/en-US/Useful_Scripts-dropwatch.xml @@ -39,11 +39,10 @@ tracepoint The network stack in Linux can discard packets for various reasons. Some Linux kernels include a -tracepoint, kernel.trace("kfree_skb"), to allow easy probing -to determine where the packets are discarded. The -script uses that tracepoint trace packet discards. The script summarizes the -locations discarding packets every five seconds as totals number of packets -discarded for each location. +tracepoint, kernel.trace("kfree_skb"), which easily tracks where packets +are discarded. uses kernel.trace("kfree_skb") to trace +packet discards; the script summarizes which locations +discard packets every five-second interval. @@ -56,9 +55,8 @@ discarded for each location. -The kernel.trace("kfree_skb") instruments each of the places -in the kernel that drops network packets. Like probes for functions the -tracepoint probes also have arguments. The +The kernel.trace("kfree_skb") traces which places +in the kernel drop network packets. The kernel.trace("kfree_skb") has two arguments: a pointer to the buffer being freed ($skb) and the location in kernel code the buffer is being freed ($location). @@ -87,6 +85,18 @@ Stopping dropped packet monitor + +To make the location of packet drops more meaningful, refer to the +/boot/System.map-`uname -r` file. This file lists the +starting addresses for each function, allowing you to map the +addresses in the output of to a specific +function name. Given the following snippet of the /boot/System.map-`uname -r` file, +the +address 0xffffffff8024cd0f maps to the function +unix_stream_recvmsg and the address 0xffffffff8044b472 maps +to the function arp_rcv: + + [...] ffffffff8024c5cd T unlock_new_inode -- 2.43.5