Fields
Name of the kernel function or tracepoint where the event was captured.Examples:
"kfree_skb_reason", "__netif_receive_skb_core", "tcp_v4_rcv"Type of kernel probe that generated this event.Possible values:
"kprobe"- Kernel probe (function entry)"kretprobe"- Kernel return probe (function exit)"raw_tracepoint"- Raw kernel tracepoint
Kernel call stack at the probe point, when stack trace collection is enabled.Contains an ordered list of kernel function names from the innermost frame (current function) to outermost frame (entry point).
Display Format
The kernel section is displayed with a probe type abbreviation:[tp]= raw_tracepoint[k]= kprobe[kr]= kretprobe
Stack Traces
When stack traces are enabled (via probe configuration), thestack_trace field contains the kernel call stack:
- Multi-line format: Each function on a new line (indented)
- Single-line format: Comma-separated list in brackets
Example JSON
Basic Kernel Probe
Kretprobe
With Stack Trace
Raw Tracepoint
When This Section Appears
The kernel section is present when:- Events are captured from kernel probes (not userspace)
- Retis attaches to kernel functions or tracepoints
- Any kernel-based collector is enabled
kernel or userspace, never both.
Stack traces must be explicitly enabled in probe configuration. They add overhead but provide valuable debugging context for understanding execution paths.
