From beb173a31622e99e40301d95bc74c0e63be7bea9 Mon Sep 17 00:00:00 2001 From: johannst Date: Fri, 2 Oct 2020 09:28:40 +0000 Subject: deploy: d0f74b8605d72868c49fec7d27225398118f9409 --- monitor/lsof.html | 18 +++++++++++++++++- print.html | 18 +++++++++++++++++- searchindex.js | 2 +- searchindex.json | 2 +- 4 files changed, 36 insertions(+), 4 deletions(-) diff --git a/monitor/lsof.html b/monitor/lsof.html index 79e3753..62e6d5e 100644 --- a/monitor/lsof.html +++ b/monitor/lsof.html @@ -150,12 +150,15 @@

lsof(8)

lsof
+  -r <s> ..... repeatedly execute command ervery <s> seconds
   -a ......... AND slection filters instead ORing (OR: default)
   -p <pid> ... filter by <pid>
   +fg ........ show file flags for file descripros
   -n ......... don't convert network addr to hostnames
   -P ......... don't convert network port to service names
   -i <@h[:p]>. show connections to h (hostname|ip addr) with optional port p
+  -s <p:s> ... in conjunction with '-i' filter for protocol <p> in state <s>
+  -U ......... show unix domain sockets ('@' indicates abstract sock name, see unix(7))
 
file flags:
   R/W/RW ..... read/write/read-write
@@ -163,6 +166,16 @@
   AP ......... append
   TR ......... truncate
 
+
-s protocols
+  TCP, UDP
+
+-s states (TCP)
+  CLOSED, IDLE, BOUND, LISTEN, ESTABLISHED, SYN_SENT, SYN_RCDV, ESTABLISHED,
+  CLOSE_WAIT, FIN_WAIT1, CLOSING, LAST_ACK, FIN_WAIT_2, TIME_WAIT
+
+-s states (UDP)
+  Unbound, Idle
+

Examples

File flags

Show open files with file flags for process:

@@ -170,13 +183,16 @@

Open TCP connections

Show open tcp connections for $USER:

-
lsof -a -u $USER -i tcp
+
lsof -a -u $USER -i TCP
 

Note: -a ands the results. If -a is not given all open files matching $USER and all tcp connections are listed (ored).

Open connection to specific host

Show open connections to localhost for $USER:

lsof -a -u $USER -i @localhost
+
+

IPv4 TCP connections in ESTABLISHED state

+
lsof -i 4TCP -s TCP:ESTABLISHED
 
diff --git a/print.html b/print.html index 1b1bc35..7179ad2 100644 --- a/print.html +++ b/print.html @@ -1147,12 +1147,15 @@ executed. To workaround that bug one can create a wrapper function which calls

lsof(8)

lsof
+  -r <s> ..... repeatedly execute command ervery <s> seconds
   -a ......... AND slection filters instead ORing (OR: default)
   -p <pid> ... filter by <pid>
   +fg ........ show file flags for file descripros
   -n ......... don't convert network addr to hostnames
   -P ......... don't convert network port to service names
   -i <@h[:p]>. show connections to h (hostname|ip addr) with optional port p
+  -s <p:s> ... in conjunction with '-i' filter for protocol <p> in state <s>
+  -U ......... show unix domain sockets ('@' indicates abstract sock name, see unix(7))
 
file flags:
   R/W/RW ..... read/write/read-write
@@ -1160,6 +1163,16 @@ executed. To workaround that bug one can create a wrapper function which calls
   AP ......... append
   TR ......... truncate
 
+
-s protocols
+  TCP, UDP
+
+-s states (TCP)
+  CLOSED, IDLE, BOUND, LISTEN, ESTABLISHED, SYN_SENT, SYN_RCDV, ESTABLISHED,
+  CLOSE_WAIT, FIN_WAIT1, CLOSING, LAST_ACK, FIN_WAIT_2, TIME_WAIT
+
+-s states (UDP)
+  Unbound, Idle
+

Examples

File flags

Show open files with file flags for process:

@@ -1167,7 +1180,7 @@ executed. To workaround that bug one can create a wrapper function which calls

Open TCP connections

Show open tcp connections for $USER:

-
lsof -a -u $USER -i tcp
+
lsof -a -u $USER -i TCP
 

Note: -a ands the results. If -a is not given all open files matching $USER and all tcp connections are listed (ored).

@@ -1175,6 +1188,9 @@ executed. To workaround that bug one can create a wrapper function which calls

Show open connections to localhost for $USER:

lsof -a -u $USER -i @localhost
 
+

IPv4 TCP connections in ESTABLISHED state

+
lsof -i 4TCP -s TCP:ESTABLISHED
+

pidstat(1)

pidstat [opt] [interval] [cont]
   -U [user]     show username instead UID, optionally only show for user
diff --git a/searchindex.js b/searchindex.js
index 8e18958..34868f6 100644
--- a/searchindex.js
+++ b/searchindex.js
@@ -1 +1 @@
-Object.assign(window.search, {"doc_urls":["tools/index.html#tools","tools/zsh.html#zsh1","tools/zsh.html#keybindings","tools/zsh.html#completion","tools/zsh.html#installation","tools/zsh.html#completion-variables","tools/zsh.html#completion-functions","tools/zsh.html#example","tools/bash.html#bash1","tools/bash.html#expansion","tools/bash.html#generator","tools/bash.html#parameter","tools/bash.html#pathname","tools/bash.html#io-redirection","tools/bash.html#explanation","tools/bash.html#argument-parsing-with-getopts","tools/bash.html#example","tools/bash.html#completion","tools/bash.html#example","tools/fish.html#fish1","tools/fish.html#quick-info","tools/fish.html#variables","tools/fish.html#setunset-variables","tools/fish.html#lists","tools/fish.html#special-variables-lists","tools/fish.html#command-handling","tools/fish.html#io-redirection","tools/fish.html#control-flow","tools/fish.html#if--else","tools/fish.html#switch","tools/fish.html#while-loop","tools/fish.html#for-loop","tools/fish.html#functions","tools/fish.html#autoloading","tools/fish.html#helper","tools/fish.html#prompt","tools/fish.html#useful-builtins","tools/fish.html#keymaps","tools/fish.html#debug","tools/tmux.html#tmux1","tools/tmux.html#tmux-cli","tools/tmux.html#scripting","tools/tmux.html#bindings","tools/tmux.html#command-mode","tools/git.html#git1","tools/git.html#staging","tools/git.html#remote","tools/git.html#branching","tools/git.html#resetting","tools/git.html#tags","tools/git.html#diff","tools/git.html#log","tools/git.html#file-history","tools/git.html#patching","tools/git.html#submodules","tools/git.html#inspection","tools/git.html#revision-specifier","tools/awk.html#awk1","tools/awk.html#input-processing","tools/awk.html#program","tools/awk.html#special-pattern","tools/awk.html#special-variables","tools/awk.html#special-statements--functions","tools/awk.html#examples","tools/awk.html#filter-records","tools/awk.html#capture-in-variables","tools/awk.html#run-shell-command-and-capture-output","tools/emacs.html#emacs1","tools/emacs.html#help","tools/emacs.html#package-manager","tools/emacs.html#window","tools/emacs.html#yankpaste","tools/emacs.html#blockrect","tools/emacs.html#mass-edit","tools/emacs.html#grep","tools/emacs.html#lisp-mode","tools/emacs.html#narrow","tools/emacs.html#org","tools/emacs.html#org-source","tools/gdb.html#gdb1","tools/gdb.html#cli","tools/gdb.html#interactive-usage","tools/gdb.html#user-commands-macros","tools/gdb.html#hooks","tools/gdb.html#examples","tools/gdb.html#catch-sigsegv-and-execute-commands","tools/gdb.html#run-backtrace-on-thread-1-batch-mode","tools/gdb.html#script-gdb-for-automating-debugging-sessions","tools/gdb.html#know-bugs","tools/gdb.html#workaround-command--finish-bug","tools/radare2.html#radare21","tools/radare2.html#print","tools/radare2.html#flags","tools/radare2.html#help","tools/radare2.html#relocation","monitor/index.html#resource-analysis--monitor","monitor/lsof.html#lsof8","monitor/lsof.html#examples","monitor/lsof.html#file-flags","monitor/lsof.html#open-tcp-connections","monitor/lsof.html#open-connection-to-specific-host","monitor/pidstat.html#pidstat1","monitor/pidstat.html#page-fault-and-memory-utilization","monitor/pidstat.html#io-statistics","monitor/pgrep.html#pgrep1","monitor/pgrep.html#debug-newest-process","monitor/pmap.html#pmap1","monitor/pstack.html#pstack1","trace_profile/index.html#trace-and-profile","trace_profile/strace.html#strace1","trace_profile/strace.html#examples","trace_profile/ltrace.html#ltrace1","trace_profile/ltrace.html#example","trace_profile/perf.html#perf1","trace_profile/perf.html#flamegraph","trace_profile/perf.html#flamegraph-with-single-event-trace","trace_profile/perf.html#flamegraph-with-multiple-event-traces","trace_profile/oprofile.html#oprofile","trace_profile/time.html#usrbintime1","binary/index.html#binary","binary/od.html#od1","binary/od.html#ascii-to-hex-string","binary/od.html#extract-parts-of-file","binary/xxd.html#xxd1","binary/xxd.html#ascii-to-hex-stream","binary/xxd.html#hex-to-binary-stream","binary/xxd.html#ascii-to-binary","binary/xxd.html#ascii-to-c-array-hex-encoded","binary/readelf.html#readelf1","binary/objdump.html#objdump1","binary/objdump.html#disassemble-section","binary/nm.html#nm1","development/index.html#development","development/c++filt.html#cfilt1","development/c++filt.html#demangle-symbol","development/c++filt.html#demangle-stream","development/c++.html#c","development/c++.html#type-deduction","development/glibc.html#glibc","development/glibc.html#malloc-tracer--mtrace3","development/glibc.html#malloc-check--mallopt3","development/gcc.html#gcc1","development/gcc.html#cli","development/gcc.html#preprocessing","development/gcc.html#builtins","development/gcc.html#__builtin_expectexpr-cond","development/make.html#make1","development/make.html#anatomy-of-make-rules","development/make.html#pattern-rules--automatic-variables","development/make.html#pattern-rules","development/make.html#automatic-variables","development/make.html#useful-functions","development/make.html#substitution-references","development/make.html#filter","development/make.html#filter-out","development/make.html#abspath","development/ld.so.html#ldso8","development/ld.so.html#environment-variables","development/ld.so.html#ld_preload-initialization-order-and-link-map","development/ld.so.html#dynamic-linking-x86_64","arch/index.html#arch","arch/x86_64.html#x86_64","arch/x86_64.html#registers","arch/x86_64.html#general-purpose-register","arch/x86_64.html#special-register","arch/x86_64.html#flags-register","arch/x86_64.html#addressing","arch/x86_64.html#size-directives","arch/x86_64.html#sysv-x86_64-abi","arch/x86_64.html#passing-arguments-to-functions","arch/x86_64.html#return-values-from-functions","arch/x86_64.html#caller-saved-registers","arch/x86_64.html#callee-saved-registers","arch/x86_64.html#stack","arch/x86_64.html#function-prologue--epilogue","arch/x86_64.html#asm-skeleton","arch/x86_64.html#references","arch/arm64.html#arm64","arch/arm64.html#registers","arch/arm64.html#general-purpose-registers","arch/arm64.html#special-registers-per-el","arch/arm64.html#addressing","arch/arm64.html#offset","arch/arm64.html#index","arch/arm64.html#pair-access","arch/arm64.html#procedure-call-standard-arm64--aapcs64-","arch/arm64.html#passing-arguments-to-functions","arch/arm64.html#return-values-from-functions","arch/arm64.html#callee-saved-registers","arch/arm64.html#stack","arch/arm64.html#frame-chain","arch/arm64.html#function-prologue--epilogue","arch/arm64.html#asm-skeleton","arch/arm64.html#references"],"index":{"documentStore":{"docInfo":{"0":{"body":9,"breadcrumbs":1,"title":1},"1":{"body":0,"breadcrumbs":2,"title":1},"10":{"body":16,"breadcrumbs":2,"title":1},"100":{"body":9,"breadcrumbs":7,"title":4},"101":{"body":26,"breadcrumbs":4,"title":1},"102":{"body":50,"breadcrumbs":7,"title":4},"103":{"body":6,"breadcrumbs":5,"title":2},"104":{"body":22,"breadcrumbs":4,"title":1},"105":{"body":14,"breadcrumbs":6,"title":3},"106":{"body":12,"breadcrumbs":4,"title":1},"107":{"body":6,"breadcrumbs":4,"title":1},"108":{"body":5,"breadcrumbs":2,"title":2},"109":{"body":64,"breadcrumbs":3,"title":1},"11":{"body":60,"breadcrumbs":2,"title":1},"110":{"body":25,"breadcrumbs":3,"title":1},"111":{"body":27,"breadcrumbs":3,"title":1},"112":{"body":11,"breadcrumbs":3,"title":1},"113":{"body":128,"breadcrumbs":3,"title":1},"114":{"body":0,"breadcrumbs":3,"title":1},"115":{"body":15,"breadcrumbs":6,"title":4},"116":{"body":17,"breadcrumbs":6,"title":4},"117":{"body":43,"breadcrumbs":3,"title":1},"118":{"body":6,"breadcrumbs":3,"title":1},"119":{"body":5,"breadcrumbs":1,"title":1},"12":{"body":93,"breadcrumbs":2,"title":1},"120":{"body":45,"breadcrumbs":2,"title":1},"121":{"body":34,"breadcrumbs":4,"title":3},"122":{"body":76,"breadcrumbs":4,"title":3},"123":{"body":19,"breadcrumbs":2,"title":1},"124":{"body":6,"breadcrumbs":4,"title":3},"125":{"body":7,"breadcrumbs":4,"title":3},"126":{"body":11,"breadcrumbs":3,"title":2},"127":{"body":15,"breadcrumbs":6,"title":5},"128":{"body":55,"breadcrumbs":2,"title":1},"129":{"body":36,"breadcrumbs":2,"title":1},"13":{"body":24,"breadcrumbs":3,"title":2},"130":{"body":8,"breadcrumbs":3,"title":2},"131":{"body":7,"breadcrumbs":2,"title":1},"132":{"body":7,"breadcrumbs":1,"title":1},"133":{"body":0,"breadcrumbs":2,"title":1},"134":{"body":3,"breadcrumbs":3,"title":2},"135":{"body":10,"breadcrumbs":3,"title":2},"136":{"body":0,"breadcrumbs":2,"title":1},"137":{"body":14,"breadcrumbs":3,"title":2},"138":{"body":0,"breadcrumbs":2,"title":1},"139":{"body":62,"breadcrumbs":4,"title":3},"14":{"body":26,"breadcrumbs":2,"title":1},"140":{"body":34,"breadcrumbs":4,"title":3},"141":{"body":0,"breadcrumbs":2,"title":1},"142":{"body":0,"breadcrumbs":2,"title":1},"143":{"body":15,"breadcrumbs":2,"title":1},"144":{"body":0,"breadcrumbs":2,"title":1},"145":{"body":90,"breadcrumbs":3,"title":2},"146":{"body":0,"breadcrumbs":2,"title":1},"147":{"body":27,"breadcrumbs":4,"title":3},"148":{"body":0,"breadcrumbs":5,"title":4},"149":{"body":36,"breadcrumbs":3,"title":2},"15":{"body":64,"breadcrumbs":4,"title":3},"150":{"body":68,"breadcrumbs":3,"title":2},"151":{"body":0,"breadcrumbs":3,"title":2},"152":{"body":14,"breadcrumbs":3,"title":2},"153":{"body":16,"breadcrumbs":2,"title":1},"154":{"body":17,"breadcrumbs":3,"title":2},"155":{"body":23,"breadcrumbs":2,"title":1},"156":{"body":0,"breadcrumbs":2,"title":1},"157":{"body":38,"breadcrumbs":3,"title":2},"158":{"body":128,"breadcrumbs":6,"title":5},"159":{"body":246,"breadcrumbs":4,"title":3},"16":{"body":35,"breadcrumbs":2,"title":1},"160":{"body":2,"breadcrumbs":1,"title":1},"161":{"body":21,"breadcrumbs":2,"title":1},"162":{"body":0,"breadcrumbs":2,"title":1},"163":{"body":62,"breadcrumbs":4,"title":3},"164":{"body":15,"breadcrumbs":3,"title":2},"165":{"body":31,"breadcrumbs":3,"title":2},"166":{"body":34,"breadcrumbs":2,"title":1},"167":{"body":40,"breadcrumbs":3,"title":2},"168":{"body":0,"breadcrumbs":4,"title":3},"169":{"body":40,"breadcrumbs":4,"title":3},"17":{"body":123,"breadcrumbs":2,"title":1},"170":{"body":23,"breadcrumbs":4,"title":3},"171":{"body":14,"breadcrumbs":4,"title":3},"172":{"body":15,"breadcrumbs":4,"title":3},"173":{"body":29,"breadcrumbs":2,"title":1},"174":{"body":31,"breadcrumbs":4,"title":3},"175":{"body":94,"breadcrumbs":3,"title":2},"176":{"body":42,"breadcrumbs":2,"title":1},"177":{"body":14,"breadcrumbs":2,"title":1},"178":{"body":0,"breadcrumbs":2,"title":1},"179":{"body":40,"breadcrumbs":4,"title":3},"18":{"body":66,"breadcrumbs":2,"title":1},"180":{"body":52,"breadcrumbs":5,"title":4},"181":{"body":0,"breadcrumbs":2,"title":1},"182":{"body":47,"breadcrumbs":2,"title":1},"183":{"body":18,"breadcrumbs":2,"title":1},"184":{"body":18,"breadcrumbs":3,"title":2},"185":{"body":0,"breadcrumbs":6,"title":5},"186":{"body":35,"breadcrumbs":4,"title":3},"187":{"body":8,"breadcrumbs":4,"title":3},"188":{"body":3,"breadcrumbs":4,"title":3},"189":{"body":15,"breadcrumbs":2,"title":1},"19":{"body":0,"breadcrumbs":2,"title":1},"190":{"body":52,"breadcrumbs":3,"title":2},"191":{"body":36,"breadcrumbs":4,"title":3},"192":{"body":139,"breadcrumbs":3,"title":2},"193":{"body":12,"breadcrumbs":2,"title":1},"2":{"body":53,"breadcrumbs":2,"title":1},"20":{"body":19,"breadcrumbs":3,"title":2},"21":{"body":19,"breadcrumbs":2,"title":1},"22":{"body":25,"breadcrumbs":3,"title":2},"23":{"body":51,"breadcrumbs":2,"title":1},"24":{"body":39,"breadcrumbs":4,"title":3},"25":{"body":8,"breadcrumbs":3,"title":2},"26":{"body":8,"breadcrumbs":3,"title":2},"27":{"body":0,"breadcrumbs":3,"title":2},"28":{"body":10,"breadcrumbs":1,"title":0},"29":{"body":14,"breadcrumbs":2,"title":1},"3":{"body":0,"breadcrumbs":2,"title":1},"30":{"body":4,"breadcrumbs":2,"title":1},"31":{"body":5,"breadcrumbs":2,"title":1},"32":{"body":11,"breadcrumbs":2,"title":1},"33":{"body":24,"breadcrumbs":2,"title":1},"34":{"body":24,"breadcrumbs":2,"title":1},"35":{"body":19,"breadcrumbs":2,"title":1},"36":{"body":24,"breadcrumbs":3,"title":2},"37":{"body":28,"breadcrumbs":2,"title":1},"38":{"body":19,"breadcrumbs":2,"title":1},"39":{"body":19,"breadcrumbs":2,"title":1},"4":{"body":36,"breadcrumbs":2,"title":1},"40":{"body":86,"breadcrumbs":3,"title":2},"41":{"body":119,"breadcrumbs":2,"title":1},"42":{"body":128,"breadcrumbs":2,"title":1},"43":{"body":24,"breadcrumbs":3,"title":2},"44":{"body":0,"breadcrumbs":2,"title":1},"45":{"body":7,"breadcrumbs":2,"title":1},"46":{"body":21,"breadcrumbs":2,"title":1},"47":{"body":55,"breadcrumbs":2,"title":1},"48":{"body":50,"breadcrumbs":2,"title":1},"49":{"body":35,"breadcrumbs":2,"title":1},"5":{"body":25,"breadcrumbs":3,"title":2},"50":{"body":22,"breadcrumbs":2,"title":1},"51":{"body":27,"breadcrumbs":2,"title":1},"52":{"body":19,"breadcrumbs":3,"title":2},"53":{"body":109,"breadcrumbs":2,"title":1},"54":{"body":64,"breadcrumbs":2,"title":1},"55":{"body":27,"breadcrumbs":2,"title":1},"56":{"body":28,"breadcrumbs":3,"title":2},"57":{"body":18,"breadcrumbs":2,"title":1},"58":{"body":45,"breadcrumbs":3,"title":2},"59":{"body":37,"breadcrumbs":2,"title":1},"6":{"body":89,"breadcrumbs":3,"title":2},"60":{"body":29,"breadcrumbs":3,"title":2},"61":{"body":22,"breadcrumbs":3,"title":2},"62":{"body":72,"breadcrumbs":4,"title":3},"63":{"body":0,"breadcrumbs":2,"title":1},"64":{"body":18,"breadcrumbs":3,"title":2},"65":{"body":39,"breadcrumbs":3,"title":2},"66":{"body":25,"breadcrumbs":6,"title":5},"67":{"body":0,"breadcrumbs":2,"title":1},"68":{"body":59,"breadcrumbs":2,"title":1},"69":{"body":12,"breadcrumbs":3,"title":2},"7":{"body":77,"breadcrumbs":2,"title":1},"70":{"body":21,"breadcrumbs":2,"title":1},"71":{"body":28,"breadcrumbs":2,"title":1},"72":{"body":16,"breadcrumbs":2,"title":1},"73":{"body":35,"breadcrumbs":3,"title":2},"74":{"body":17,"breadcrumbs":2,"title":1},"75":{"body":36,"breadcrumbs":3,"title":2},"76":{"body":16,"breadcrumbs":2,"title":1},"77":{"body":36,"breadcrumbs":2,"title":1},"78":{"body":20,"breadcrumbs":3,"title":2},"79":{"body":0,"breadcrumbs":2,"title":1},"8":{"body":0,"breadcrumbs":2,"title":1},"80":{"body":42,"breadcrumbs":2,"title":1},"81":{"body":180,"breadcrumbs":3,"title":2},"82":{"body":25,"breadcrumbs":4,"title":3},"83":{"body":24,"breadcrumbs":2,"title":1},"84":{"body":0,"breadcrumbs":2,"title":1},"85":{"body":13,"breadcrumbs":5,"title":4},"86":{"body":9,"breadcrumbs":7,"title":6},"87":{"body":36,"breadcrumbs":6,"title":5},"88":{"body":0,"breadcrumbs":3,"title":2},"89":{"body":27,"breadcrumbs":5,"title":4},"9":{"body":0,"breadcrumbs":2,"title":1},"90":{"body":0,"breadcrumbs":2,"title":1},"91":{"body":11,"breadcrumbs":2,"title":1},"92":{"body":16,"breadcrumbs":2,"title":1},"93":{"body":9,"breadcrumbs":2,"title":1},"94":{"body":15,"breadcrumbs":2,"title":1},"95":{"body":5,"breadcrumbs":3,"title":3},"96":{"body":49,"breadcrumbs":4,"title":1},"97":{"body":0,"breadcrumbs":4,"title":1},"98":{"body":10,"breadcrumbs":5,"title":2},"99":{"body":21,"breadcrumbs":6,"title":3}},"docs":{"0":{"body":"zsh bash fish tmux git awk emacs gdb radare2","breadcrumbs":"Tools","id":"0","title":"Tools"},"1":{"body":"","breadcrumbs":"Tools » zsh(1)","id":"1","title":"zsh(1)"},"10":{"body":"# generate sequence from n to m\n{n..m}\n# generate sequence from n to m step by s\n{n..m..s} # expand cartesian product\n{a,b}{c,d}","breadcrumbs":"Tools » Generator","id":"10","title":"Generator"},"100":{"body":"Show open connections to localhost for $USER: lsof -a -u $USER -i @localhost","breadcrumbs":"Resource analysis & monitor » Open connection to specific host","id":"100","title":"Open connection to specific host"},"101":{"body":"pidstat [opt] [interval] [cont] -U [user] show username instead UID, optionally only show for user -r memory statistics -d I/O statistics -h single line per process and no lines with average","breadcrumbs":"Resource analysis & monitor » pidstat(1)","id":"101","title":"pidstat(1)"},"102":{"body":"pidstat -r -p  [interval] [count] minor_pagefault: Happens when the page needed is already in memory but not allocated to the faulting process, in that case the kernel only has to create a new page-table entry pointing to the shared physical page (not required to load a memory page from disk). major_pagefault: Happens when the page needed is NOT in memory, the kernel has to create a new page-table entry and populate the physical page (required to load a memory page from disk).","breadcrumbs":"Resource analysis & monitor » Page fault and memory utilization","id":"102","title":"Page fault and memory utilization"},"103":{"body":"pidstat -d -p  [interval] [count]","breadcrumbs":"Resource analysis & monitor » I/O statistics","id":"103","title":"I/O statistics"},"104":{"body":"pgrep [opts]  -n only list newest matching process -u  only show matching for user  -l additionally list command -a additionally list command + arguments","breadcrumbs":"Resource analysis & monitor » pgrep(1)","id":"104","title":"pgrep(1)"},"105":{"body":"For example attach gdb to newest zsh process from $USER. gdb -p $(pgrep -n -u $USER zsh)","breadcrumbs":"Resource analysis & monitor » Debug newest process","id":"105","title":"Debug newest process"},"106":{"body":"pmap  Dump virtual memory map of process. Compared to /proc//maps it shows the size of the mappings.","breadcrumbs":"Resource analysis & monitor » pmap(1)","id":"106","title":"pmap(1)"},"107":{"body":"pstack  Dump stack for all threads of process.","breadcrumbs":"Resource analysis & monitor » pstack(1)","id":"107","title":"pstack(1)"},"108":{"body":"strace ltrace perf OProfile time","breadcrumbs":"Trace and Profile","id":"108","title":"Trace and Profile"},"109":{"body":"strace [opts] [prg] -f .......... follow child processes on fork(2) -p  .... attach to running process -s  ... max string size, truncate of longer (default: 32) -e  ... expression for trace filtering -o  ... log output into  -c .......... dump syscall statitics at the end : trace=syscall[,syscall] .... trace only syscall listed trace=file ................. trace all syscall that take a filename as arg trace=process .............. trace process management related syscalls trace=signal ............... trace signal related syscalls signal ..................... trace signals delivered to the process","breadcrumbs":"Trace and Profile » strace(1)","id":"109","title":"strace(1)"},"11":{"body":"# default param\nbar=${foo:-some_val} # if $foo set, then bar=$foo else bar=some_val # check param set\nbar=${foo:?msg} # if $foo set, then bar=$foo else exit and print msg # indirect\nFOO=foo\nBAR=FOO\nbar=${!BAR} # deref value of BAR -> bar=$FOO # prefix\n${foo#prefix} # remove prefix when expanding $foo\n# suffix\n${foo%suffix} # remove suffix when expanding $foo # substitute\n${foo/pattern/string} # replace pattern with string when expanding foo\n# pattern starts with\n# '/' replace all occurences of pattern\n# '#' pattern match at beginning\n# '%' pattern match at end Note: prefix/suffix/pattern are expanded as pathnames .","breadcrumbs":"Tools » Parameter","id":"11","title":"Parameter"},"110":{"body":"Trace open(2) & socket(2) syscalls for a running process + child processes: strace -f -e trace=open,socket -p  Trace signals delivered to a running process: strace -f -e signal -p ","breadcrumbs":"Trace and Profile » Examples","id":"110","title":"Examples"},"111":{"body":"ltrace [opts] [prg] -f .......... follow child processes on fork(2) -p  .... attach to running process -o  ... log output into  -l  . show who calls into lib matched by  -C .......... demangle","breadcrumbs":"Trace and Profile » ltrace(1)","id":"111","title":"ltrace(1)"},"112":{"body":"List which program/libs call into libstdc++: ltrace -l '*libstdc++*' -C -o ltrace.log ./main","breadcrumbs":"Trace and Profile » Example","id":"112","title":"Example"},"113":{"body":"perf list show supported hw/sw events perf stat -p  .. show stats for running process -I  ... show stats periodically over interval  -e  ... filter for events perf top -p  .. show stats for running process -F  ... sampling frequency -K ........ hide kernel threads perf record -p  ............... record stats for running process -F  ................ sampling frequency --call-graph  .. [fp, dwarf, lbr] method how to caputre backtrace fp : use frame-pointer, need to compile with -fno-omit-frame-pointer dwarf: use .cfi debug information lbr : use hardware last branch record facility -g ..................... short-hand for --call-graph fp -e  ................ filter for events perf report -n .................... annotate symbols with nr of samples --stdio ............... report to stdio, if not presen tui mode -g graph,0.5,caller ... show caller based call chains with value >0.5 Useful : page-faults minor-faults major-faults cpu-cycles` task-clock","breadcrumbs":"Trace and Profile » perf(1)","id":"113","title":"perf(1)"},"114":{"body":"","breadcrumbs":"Trace and Profile » Flamegraph","id":"114","title":"Flamegraph"},"115":{"body":"perf record -g -e cpu-cycles -p \nperf script | FlameGraph/stackcollapse-perf.pl | FlameGraph/flamegraph.pl > cycles-flamegraph.svg","breadcrumbs":"Trace and Profile » Flamegraph with single event trace","id":"115","title":"Flamegraph with single event trace"},"116":{"body":"perf record -g -e cpu-cycles,page-faults -p \nperf script --per-event-dump\n# fold & generate as above","breadcrumbs":"Trace and Profile » Flamegraph with multiple event traces","id":"116","title":"Flamegraph with multiple event traces"},"117":{"body":"operf -g -p  -g ...... caputre call-graph information opreport [opt] FILE show time spent per binary image -l ...... show time spent per symbol -c ...... show callgraph information (see below) -a ...... add column with time spent accumulated over child nodes ophelp show supported hw/sw events","breadcrumbs":"Trace and Profile » OProfile","id":"117","title":"OProfile"},"118":{"body":"# statistics of process run\n/usr/bin/time -v ","breadcrumbs":"Trace and Profile » /usr/bin/time(1)","id":"118","title":"/usr/bin/time(1)"},"119":{"body":"od xxd readelf objdump nm","breadcrumbs":"Binary","id":"119","title":"Binary"},"12":{"body":"* match any string\n? match any single char\n\\\\ match backslash\n[abc] match any char of 'a' 'b' 'c'\n[a-z] match any char between 'a' - 'z'\n[^ab] negate, match all not 'a' 'b'\n[:class:] match any char in class, available: alnum,alpha,ascii,blank,cntrl,digit,graph,lower, print,punct,space,upper,word,xdigit Wit extglob shell option enabled it is possible to have more powerful patterns. In the following pattern-list is one ore more patterns separated by | char. ?(pattern-list) matches zero or one occurrence of the given patterns\n*(pattern-list) matches zero or more occurrences of the given patterns\n+(pattern-list) matches one or more occurrences of the given patterns\n@(pattern-list) matches one of the given patterns\n!(pattern-list) matches anything except one of the given patterns Note: shopt -s extglob/shopt -u extglob to enable/disable extglob option.","breadcrumbs":"Tools » Pathname","id":"12","title":"Pathname"},"120":{"body":"od [opts]  -An don't print addr info -tx4 print hex in 4 byte chunks -ta print as named character -tc printable chars or backslash escape -w4 print 4 bytes per line -j  skip  bytes from  (hex if start with 0x) -N  dump  bytes (hex of start with 0x)","breadcrumbs":"Binary » od(1)","id":"120","title":"od(1)"},"121":{"body":"echo -n AAAABBBB | od -An -w4 -tx4 >> 41414141 >> 42424242 echo -n '\\x7fELF\\n' | od -tx1 -ta -tc >> 0000000 7f 45 4c 46 0a # tx1 >> del E L F nl # ta >> 177 E L F \\n # tc","breadcrumbs":"Binary » ASCII to hex string","id":"121","title":"ASCII to hex string"},"122":{"body":"For example .rodata section from an elf file. We can use readelf to get the offset into the file where the .rodata section starts. readelf -W -S foo >> Section Headers: >> [Nr] Name Type Address Off Size ES Flg Lk Inf Al >> ... >> [15] .rodata PROGBITS 00000000004009c0 0009c0 000030 00 A 0 0 16 With the offset of -j 0x0009c0 we can dump -N 0x30 bytes from the beginning of the .rodata section as follows: od -j 0x0009c0 -N 0x30 -tx4 -w4 foo >> 0004700 00020001 >> 0004704 00000000 >> * >> 0004740 00000001 >> 0004744 00000002 >> 0004750 00000003 >> 0004754 00000004 Note : Numbers starting with 0x will be interpreted as hex by od.","breadcrumbs":"Binary » Extract parts of file","id":"122","title":"Extract parts of file"},"123":{"body":"xxd [opts] -p dump continuous hexdump -r convert hexdump into binary ('revert') -e dump as little endian mode -i output as C array","breadcrumbs":"Binary » xxd(1)","id":"123","title":"xxd(1)"},"124":{"body":"echo -n 'aabb' | xxd -p >> 61616262","breadcrumbs":"Binary » ASCII to hex stream","id":"124","title":"ASCII to hex stream"},"125":{"body":"echo -n '61616262' | xxd -p -r >> aabb","breadcrumbs":"Binary » Hex to binary stream","id":"125","title":"Hex to binary stream"},"126":{"body":"echo -n '\\x7fELF' | xxd -p | xxd -p -r | file -p - >> ELF","breadcrumbs":"Binary » ASCII to binary","id":"126","title":"ASCII to binary"},"127":{"body":"xxd -i <(echo -n '\\x7fELF') >> unsigned char _proc_self_fd_11[] = { >> 0x7f, 0x45, 0x4c, 0x46 >> }; >> unsigned int _proc_self_fd_11_len = 4;","breadcrumbs":"Binary » ASCII to C array (hex encoded)","id":"127","title":"ASCII to C array (hex encoded)"},"128":{"body":"readelf [opts]  -W|--wide wide output, dont break output at 80 chars -h print ELF header -S print section headers -l print program headers + segment mapping -d print .dynamic section (dynamic link information) --syms print symbol tables (.symtab .dynsym) --dyn-syms print dynamic symbol table (exported symbols for dynamic linker) -r print relocation sections (.rel.*, .rela.*)","breadcrumbs":"Binary » readelf(1)","id":"128","title":"readelf(1)"},"129":{"body":"objdump [opts]  -M intel use intil syntax -d disassemble text section -D disassemble all sections -S mix disassembly with source code -C demangle -j 
display info for section --[no-]show-raw-insn [dont] show object code next to disassembly","breadcrumbs":"Binary » objdump(1)","id":"129","title":"objdump(1)"},"13":{"body":"Note: The trick with bash I/O redirection is to interpret from left-to-right. # stdout & stderr to file\ncommand >file 2>&1\n# equivalent\ncommand &>file # stderr to stdout & stdout to file\ncommand 2>&1 >file","breadcrumbs":"Tools » I/O redirection","id":"13","title":"I/O redirection"},"130":{"body":"For example .plt section: objdump -j .plt -d ","breadcrumbs":"Binary » Disassemble section","id":"130","title":"Disassemble section"},"131":{"body":"nm [opts] -C demangle -u undefined only","breadcrumbs":"Binary » nm(1)","id":"131","title":"nm(1)"},"132":{"body":"c++filt c++ glibc gcc [make] (./make.md) ld.so","breadcrumbs":"Development","id":"132","title":"Development"},"133":{"body":"","breadcrumbs":"Development » c++filt(1)","id":"133","title":"c++filt(1)"},"134":{"body":"c++-filt ","breadcrumbs":"Development » Demangle symbol","id":"134","title":"Demangle symbol"},"135":{"body":"For example dynamic symbol table: readelf -W --dyn-syms | c++filt","breadcrumbs":"Development » Demangle stream","id":"135","title":"Demangle stream"},"136":{"body":"","breadcrumbs":"Development » c++","id":"136","title":"c++"},"137":{"body":"Force compile error to see what auto is deduced to. auto foo = bar(); // force compile error\ntypename decltype(foo)::_;","breadcrumbs":"Development » Type deduction","id":"137","title":"Type deduction"},"138":{"body":"","breadcrumbs":"Development » glibc","id":"138","title":"glibc"},"139":{"body":"Trace memory allocation and de-allocation to detect memory leaks. Need to call mtrace(3) to install the tracing hooks. If we can't modify the binary to call mtrace we can create a small shared library and pre-load it. // libmtrace.c\n#include \n__attribute__((constructor)) static void init_mtrace() { mtrace(); } Compile as: gcc -shared -fPIC -o libmtrace.so libmtrace.c To generate the trace file run: export MALLOC_TRACE=\nLD_PRELOAD=./libmtrace.so Note : If MALLOC_TRACE is not set mtrace won't install tracing hooks. To get the results of the trace file: mtrace $MALLOC_TRACE","breadcrumbs":"Development » malloc tracer mtrace(3)","id":"139","title":"malloc tracer mtrace(3)"},"14":{"body":"j>&i Duplicate fd i to fd j, making j a copy of i. See dup2(2) . Example: command 2>&1 >file duplicate fd 1 to fd 2, effectively redirecting stderr to stdout redirect stdout to file","breadcrumbs":"Tools » Explanation","id":"14","title":"Explanation"},"140":{"body":"Configure action when glibc detects memory error. export MALLOC_CHECK_= Useful values: 1 print detailed error & continue\n3 print detailed error + stack trace + memory mappings & abort\n7 print simple error message + stack trace + memory mappings & abort","breadcrumbs":"Development » malloc check mallopt(3)","id":"140","title":"malloc check mallopt(3)"},"141":{"body":"","breadcrumbs":"Development » gcc(1)","id":"141","title":"gcc(1)"},"142":{"body":"","breadcrumbs":"Development » CLI","id":"142","title":"CLI"},"143":{"body":"While debugging can be helpful to just pre-process files. gcc -E [-dM] ... -E run only preprocessor -dM list only #define statements","breadcrumbs":"Development » Preprocessing","id":"143","title":"Preprocessing"},"144":{"body":"","breadcrumbs":"Development » Builtins","id":"144","title":"Builtins"},"145":{"body":"Give the compiler a hint which branch is hot, so it can lay out the code accordingly to reduce number of jump instructions. See on compiler explorer . echo \"\nextern void foo();\nextern void bar();\nvoid run0(int x) { if (__builtin_expect(x,0)) { foo(); } else { bar(); }\n}\nvoid run1(int x) { if (__builtin_expect(x,1)) { foo(); } else { bar(); }\n}\n\" | gcc -O2 -S -masm=intel -o /dev/stdout -xc - Will generate something similar to the following. run0: bar is on the path without branch run1: foo is on the path without branch run0: test edi, edi jne .L4 xor eax, eax jmp bar\n.L4: xor eax, eax jmp foo\nrun1: test edi, edi je .L6 xor eax, eax jmp foo\n.L6: xor eax, eax jmp bar","breadcrumbs":"Development » __builtin_expect(expr, cond)","id":"145","title":"__builtin_expect(expr, cond)"},"146":{"body":"","breadcrumbs":"Development » make(1)","id":"146","title":"make(1)"},"147":{"body":"target .. : prerequisite .. recipe .. target: an output generated by the rule prerequisite: an input that is used to generate the target recipe: list of actions to generate the output from the input Use make -p to print all rules and variables (implicitly + explicitly defined).","breadcrumbs":"Development » Anatomy of make rules","id":"147","title":"Anatomy of make rules"},"148":{"body":"","breadcrumbs":"Development » Pattern rules & Automatic variables","id":"148","title":"Pattern rules & Automatic variables"},"149":{"body":"A pattern rule contains the % char (exactly one of them) and look like this example: %.o : %.c $(CC) -c $(CFLAGS) $(CPPFLAGS) $< -o $@ The target matches files of the pattern %.o, where % matches any none-empty substring and other character match just them self. The substring matched by % is called the stem. % in the prerequisite stands for the matched stem in the target.","breadcrumbs":"Development » Pattern rules","id":"149","title":"Pattern rules"},"15":{"body":"The getopts builtin uses following global variables: OPTARG, value of last option argument OPTIND, index of the next argument to process (user must reset) OPTERR, display errors if set to 1 getopts [] specifies the names of supported options, eg f:c f: means -f option with an argument c means -c option without an argument specifies a variable name which getopts fills with the last parsed option argument optionally specify argument string to parse, by default getopts parses $@","breadcrumbs":"Tools » Argument parsing with getopts","id":"15","title":"Argument parsing with getopts"},"150":{"body":"As targets and prerequisites in pattern rules can't be spelled explicitly in the recipe, make provides a set of automatic variables to work with: $@: Name of the target that triggered the rule. $<: Name of the first prerequisite. $^: Names of all prerequisites (without duplicates). $+: Names of all prerequisites (with duplicates). $*: Stem of the pattern rule. # file: Makefile all: foobar blabla foo% bla%: aaa bbb bbb @echo \"@ = $@\" @echo \"< = $<\" @echo \"^ = $^\" @echo \"+ = $+\" @echo \"* = $*\" @echo \"----\" aaa:\nbbb: Running above Makefile gives: @ = foobar\n< = aaa\n^ = aaa bbb\n+ = aaa bbb bbb\n* = bar\n----\n@ = blabla\n< = aaa\n^ = aaa bbb\n+ = aaa bbb bbb\n* = bla\n----","breadcrumbs":"Development » Automatic variables","id":"150","title":"Automatic variables"},"151":{"body":"","breadcrumbs":"Development » Useful functions","id":"151","title":"Useful functions"},"152":{"body":"Substitute strings matching pattern in a list. in := a.o l.a c.o\nout := $(in:.o=.c)\n# => out = a.c l.a c.c","breadcrumbs":"Development » Substitution references","id":"152","title":"Substitution references"},"153":{"body":"Keep strings matching a pattern in a list. in := a.a b.b c.c d.d\nout := $(filter %.b %.c, $(in))\n# => out = b.b c.c","breadcrumbs":"Development » filter","id":"153","title":"filter"},"154":{"body":"Remove strings matching a pattern from a list. in := a.a b.b c.c d.d\nout := $(filter-out %.b %.c, $(in))\n# => out = a.a d.d","breadcrumbs":"Development » filter-out","id":"154","title":"filter-out"},"155":{"body":"Resolve each file name as absolute path (don't resolve symlinks). $(abspath fname1 fname2 ..) ### `realpath`\nResolve each file name as canonical path.\n```make\n$(realpath fname1 fname2 ..)","breadcrumbs":"Development » abspath","id":"155","title":"abspath"},"156":{"body":"","breadcrumbs":"Development » ld.so(8)","id":"156","title":"ld.so(8)"},"157":{"body":"LD_PRELOAD= colon separated list of libso's to be pre loaded LD_DEBUG= comma separated list of debug options =help list available options =libs show library search path =files processing of input files =symbols show search path for symbol lookup =bindings show against which definition a symbol is bound","breadcrumbs":"Development » Environment Variables","id":"157","title":"Environment Variables"},"158":{"body":"Libraries specified in LD_PRELOAD are loaded from left-to-right but initialized from right-to-left. > ldd ./main >> libc.so.6 => /usr/lib/libc.so.6 > LD_PRELOAD=liba.so:libb.so ./main --> preloaded in this order <-- initialized in this order The preload order determines: the order libraries are inserted into the link map the initialization order for libraries For the example listed above the resulting link map will look like the following: +------+ +------+ +------+ +------+ | main | -> | liba | -> | libb | -> | libc | +------+ +------+ +------+ +------+ This can be seen when running with LD_DEBUG=files: > LD_DEBUG=files LD_PRELOAD=liba.so:libb.so ./main # load order (-> determines link map) >> file=liba.so [0]; generating link map >> file=libb.so [0]; generating link map >> file=libc.so.6 [0]; generating link map # init order >> calling init: /usr/lib/libc.so.6 >> calling init: /libb.so >> calling init: /liba.so >> initialize program: ./main To verify the link map order we let ld.so resolve the memcpy(3) libc symbol (used in main ) dynamically, while enabling LD_DEBUG=symbols,bindings to see the resolving in action. > LD_DEBUG=symbols,bindings LD_PRELOAD=liba.so:libb.so ./main >> symbol=memcpy; lookup in file=./main [0] >> symbol=memcpy; lookup in file=/liba.so [0] >> symbol=memcpy; lookup in file=/libb.so [0] >> symbol=memcpy; lookup in file=/usr/lib/libc.so.6 [0] >> binding file ./main [0] to /usr/lib/libc.so.6 [0]: normal symbol `memcpy' [GLIBC_2.14]","breadcrumbs":"Development » LD_PRELOAD: Initialization Order and Link Map","id":"158","title":"LD_PRELOAD: Initialization Order and Link Map"},"159":{"body":"Dynamic linking basically works via one indirect jump. It uses a combination of function trampolines (.plt section) and a function pointer table (.got.plt section). On the first call the trampoline sets up some metadata and then jumps to the ld.so runtime resolve function, which in turn patches the table with the correct function pointer. .plt ....... procedure linkage table, contains function trampolines, usually located in code segment (rx permission) .got.plt ... global offset table for .plt, holds the function pointer table Using radare2 we can analyze this in more detail: [0x00401040]> pd 4 @ section..got.plt ;-- section..got.plt: ;-- .got.plt: ; [22] -rw- section size 32 named .got.plt ;-- _GLOBAL_OFFSET_TABLE_: [0] 0x00404000 .qword 0x0000000000403e10 ; section..dynamic [1] 0x00404008 .qword 0x0000000000000000 ; CODE XREF from section..plt @ +0x6 [2] 0x00404010 .qword 0x0000000000000000 ;-- reloc.puts: ; CODE XREF from sym.imp.puts @ 0x401030 [3] 0x00404018 .qword 0x0000000000401036 ; RELOC 64 puts [0x00401040]> pd 6 @ section..plt ;-- section..plt: ;-- .plt: ; [12] -r-x section size 32 named .plt ┌─> 0x00401020 ff35e22f0000 push qword [0x00404008] ╎ 0x00401026 ff25e42f0000 jmp qword [0x00404010] ╎ 0x0040102c 0f1f4000 nop dword [rax] ┌ 6: int sym.imp.puts (const char *s); └ ╎ 0x00401030 ff25e22f0000 jmp qword [reloc.puts] ╎ 0x00401036 6800000000 push 0 └─< 0x0040103b e9e0ffffff jmp sym..plt At address 0x00401030 in the .plt section we see the indirect jump for puts using the function pointer in _GLOBAL_OFFSET_TABLE_[3] (GOT). GOT[3] initially points to instruction after the puts trampoline 0x00401036. This pushes the relocation index 0 and then jumps to the first trampoline 0x00401020. The first trampoline jumps to GOT[2] which will be filled at program startup by the ld.so with its resolve function. The ld.so resolve function fixes the relocation referenced by the relocation index pushed by the puts trampoline. The relocation entry at index 0 tells the resolve function which symbol to search for and where to put the function pointer: > readelf -r
>> Relocation section '.rela.plt' at offset 0x4b8 contains 1 entry: >> Offset Info Type Sym. Value Sym. Name + Addend >> 000000404018 000200000007 R_X86_64_JUMP_SLO 0000000000000000 puts@GLIBC_2.2.5 + 0 As we can see the offset from relocation at index 0 points to GOT[3].","breadcrumbs":"Development » Dynamic Linking (x86_64)","id":"159","title":"Dynamic Linking (x86_64)"},"16":{"body":"#!/bin/bash\nfunction parse_args() { while getopts \"f:c\" PARAM; do case $PARAM in f) echo \"GOT -f $OPTARG\";; c) echo \"GOT -c\";; *) echo \"ERR: print usage\"; exit 1;; esac done # users responsibility to reset OPTIND OPTIND=0\n} parse_args -f xxx -c\nparse_args -f yyy","breadcrumbs":"Tools » Example","id":"16","title":"Example"},"160":{"body":"x86_64 arm64","breadcrumbs":"Arch","id":"160","title":"Arch"},"161":{"body":"keywords: x86_64, x86, abi 64bit synonyms: x86_64, x64, amd64, intel 64 32bit synonyms: x86, ia32, i386 ISA type: CISC Endianness: little","breadcrumbs":"Arch » x86_64","id":"161","title":"x86_64"},"162":{"body":"","breadcrumbs":"Arch » Registers","id":"162","title":"Registers"},"163":{"body":"bytes\n[7:0] [3:0] [1:0] [1] [0] desc\n----------------------------------------------------------\nrax eax ax ah al accumulator\nrbx ebx bx bh bl base register\nrcx ecx cx ch cl counter\nrdx edx dx dh dl data register\nrsi esi si - sil source index\nrdi edi di - dil destination index\nrbp ebp bp - bpl base pointer\nrsp esp sp - spl stack pointer\nr8-15 rNd rNw - rNb","breadcrumbs":"Arch » General purpose register","id":"163","title":"General purpose register"},"164":{"body":"bytes\n[7:0] [3:0] [1:0] desc\n---------------------------------------------------\nrflags eflags flags flags register\nrip eip ip instruction pointer","breadcrumbs":"Arch » Special register","id":"164","title":"Special register"},"165":{"body":"rflags\nbits desc\n-----------------------------\n[11] OF overflow flag\n[10] DF direction flag [7] SF sign flag [6] ZF zero flag [4] AF auxiliary carry flag [2] PF parity flag [0] CF carry flag","breadcrumbs":"Arch » FLAGS register","id":"165","title":"FLAGS register"},"166":{"body":"movw [rax], rbx // save val in rbx at [rax]\nmovw [imm], rbx // save val in rbx at [imm]\nmovw rax, [rbx+4*rcx] // load val at [rbx+4*rcx] into rax rip relative addressing: lea rax, [rip+.my_str] // load addr of .my_str into rax\n...\n.my_str:\n.asciz \"Foo\"","breadcrumbs":"Arch » Addressing","id":"166","title":"Addressing"},"167":{"body":"Explicitly specify size of the operation. mov byte ptr [rax], 0xff // save 1 byte(s) at [rax]\nmov word ptr [rax], 0xff // save 2 byte(s) at [rax]\nmov dword ptr [rax], 0xff // save 4 byte(s) at [rax]\nmov qword ptr [rax], 0xff // save 8 byte(s) at [rax]","breadcrumbs":"Arch » Size directives","id":"167","title":"Size directives"},"168":{"body":"","breadcrumbs":"Arch » SysV x86_64 ABI","id":"168","title":"SysV x86_64 ABI"},"169":{"body":"Integer/Pointer arguments reg arg\n-----------\nrdi 1\nrsi 2\nrdx 3\nrcx 4\nr8 5\nr9 6 Floating point arguments reg arg\n-----------\nxmm0 1 .. ..\nxmm7 8 Additional arguments are passed on the stack. Arguments are pushed right-to-left (RTL), meaning next arguments are closer to current rsp.","breadcrumbs":"Arch » Passing arguments to functions","id":"169","title":"Passing arguments to functions"},"17":{"body":"The complete builtin is used to interact with the completion system. complete # print currently installed completion handler\ncomplete -F # install as completion handler for \ncomplete -r # uninstall completion handler for Variables available in completion functions: # in\n$1 # \n$2 # current word\n$3 # privous word COMP_WORDS # array with current command line words\nCOMP_CWORD # index into COMP_WORDS with current cursor position # out\nCOMPREPLY # array with possible completions The compgen builtin is used to generate possible matches by comparing word against words generated by option. compgen