Searched refs:sys_enter (Results 1 – 16 of 16) sorted by relevance
2 (perf record -e raw_syscalls:sys_enter $@ || \3 perf record -e syscalls:sys_enter $@) 2> /dev/null
17 int sys_enter(void *ctx) in sys_enter() function
16 int sys_enter(void *ctx) in sys_enter() function
25 int sys_enter(const void *ctx) in sys_enter() function
30 int sys_enter(void *ctx) in sys_enter() function
19 err = bpf_prog_get_info_by_fd(skel->progs.sys_enter.prog_fd, in test_verif_stats()
30 if (prog != skel->progs.sys_enter && prog != skel->progs.sys_exit) in augmented_syscalls__prepare()
103 int sys_enter(u64 *ctx) in sys_enter() function
525 int sys_enter(struct syscall_enter_args *args) in sys_enter() function
132 const char *sys_enter, member151 struct evsel *sys_enter, member1480 struct bpf_program *sys_enter, member3635 struct evsel *sys_enter, *sys_exit; in trace__add_syscall_newtp() local3638 if (sys_enter == NULL) in trace__add_syscall_newtp()3654 evlist__add(evlist, sys_enter); in trace__add_syscall_newtp()3666 trace->syscalls.events.sys_enter = sys_enter; in trace__add_syscall_newtp()3676 evsel__delete_priv(sys_enter); in trace__add_syscall_newtp()3943 pair_prog = pair->bpf_prog.sys_enter; in trace__find_usable_bpf_prog_entry()4062 sc->bpf_prog.sys_enter = pair_prog; in trace__init_syscalls_bpf_prog_array_maps()[all …]
86 - we can enable the sys_enter and/or sys_exit syscalls found under93 the sys_enter events:96 # perf record -a -e raw_syscalls:sys_enter232 sys_enter() handler do the necessary tallying until all events have234 store that information; every time the sys_enter() handler is called,359 perf record -a -e raw_syscalls:sys_enter
663 strace-like sys_enter+sys_exit lines.
87 17247: tracepoint name sys_enter tag 192d548b9d754067 gpl
204 SEC("raw_tp/sys_enter")378 printf("sys_enter prog FD: %d\n",400 sys_enter prog FD: 8
Completed in 30 milliseconds