sock_exceed_buf_limitRegular
4.4: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated);
4.8: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated);
4.10: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated);
4.13: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated);
4.15: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated);
4.18: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated);
5.0: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
5.3: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
5.4: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
5.8: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
5.11: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
5.13: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
5.15: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
5.19: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int sysctl_mem[3];
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
6.2: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int sysctl_mem[3];
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
6.5: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int sysctl_mem[3];
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
6.8: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int sysctl_mem[3];
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
arm64: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
armhf: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
ppc64el: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
riscv64: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
aws: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
azure: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
gcp: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
lowlatency: ✅Event:
struct trace_event_raw_sock_exceed_buf_limit {
struct trace_entry ent;
char name[32];
long int *sysctl_mem;
long int allocated;
int sysctl_rmem;
int rmem_alloc;
int sysctl_wmem;
int wmem_alloc;
int wmem_queued;
int kind;
char __data[0];
};
Function:
void trace_event_raw_event_sock_exceed_buf_limit(void *__data, struct sock *sk, struct proto *prot, long int allocated, int kind);
Regular
4.4 and 4.8 ✅
4.8 and 4.10 ✅
4.10 and 4.13 ✅
4.13 and 4.15 ✅
4.15 and 4.18 ✅
4.18 and 5.0 ⚠️int sysctl_wmem
int wmem_alloc
int wmem_queued
int kind
int kind
5.0 and 5.3 ✅
5.3 and 5.4 ✅
5.4 and 5.8 ✅
5.8 and 5.11 ✅
5.11 and 5.13 ✅
5.13 and 5.15 ✅
5.15 and 5.19 ⚠️long int *sysctl_mem ➡️ long int sysctl_mem[3]
5.19 and 6.2 ✅
6.2 and 6.5 ✅
6.5 and 6.8 ✅
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
amd64 and riscv64 ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅