ip Probes
The ip probes are described in the following table.
Table 11-48 List of ip Probes
| Probe | Description |
|---|---|
|
|
Fires when the kernel network stack sends an |
|
|
Fires when the kernel network stack receives an |
|
|
Fires when the kernel network stack drops an incoming |
|
|
Fires when the kernel network stack drops an outgoing |
|
|
IP address added to the system. |
|
|
IP address removed from the system. |
|
|
IP interface state (flags) change. |
|
|
IP route added. |
|
|
IP route changed. |
|
|
IP route removed. |
|
|
IP route is failing or Kernel suspects partitioning. |
|
|
Route lookup failed on this address. |
|
|
Use different route. |
These probes trace packets on physical interfaces and also packets on loopback interfaces that are processed by ip. An IP packet must have a full IP header to be visible by these probes.
Note:
Loopbacktcp packets on Oracle Solaris may be processed by tcp fusion, a performance feature that by-passes the ip layer. These fused packets will not be visible using the ip:::send and ip:::receive probes. They are typically all loopback tcp packets after the tcp handshake.