ip Probes
            
         The ip probes are described in the following table.
               
Table 11-48 List of ip Probes
                  
| Probe | Description | 
|---|---|
| 
                                  | Fires when the kernel network stack sends an  | 
| 
                                  | Fires when the kernel network stack receives an  | 
| 
                                  | Fires when the kernel network stack drops an incoming  | 
| 
                                  | Fires when the kernel network stack drops an outgoing  | 
| 
                                  | IP address added to the system. | 
| 
                                  | IP address removed from the system. | 
| 
                                  | IP interface state (flags) change. | 
| 
                                  | IP route added. | 
| 
                                  | IP route changed. | 
| 
                                  | IP route removed. | 
| 
                                  | IP route is failing or Kernel suspects partitioning. | 
| 
                                  | Route lookup failed on this address. | 
| 
                                  | Use different route. | 
These probes trace packets on physical interfaces and also packets on loopback interfaces that are processed by ip. An IP packet must have a full IP header to be visible by these probes.
               
Note:
Loopbacktcp packets on Oracle Solaris may be processed by tcp fusion, a performance feature that by-passes the ip layer. These fused packets will not be visible using the ip:::send and ip:::receive probes. They are typically all loopback tcp packets after the tcp handshake.