Lines Matching refs:do_sys_open
168 instead of space. For example, adding myprobe event on do_sys_open like below::
170 p:myprobe do_sys_open dfd=%ax filename=%dx flags=%cx mode=+4($stack)
174 p:myprobe,do_sys_open,dfd=%ax,filename=%dx,flags=%cx,mode=+4($stack)
182 …echo 'p:myprobe do_sys_open dfd=%ax filename=%dx flags=%cx mode=+4($stack)' > /sys/kernel/tracing/…
184 This sets a kprobe on the top of do_sys_open() function with recording
192 echo 'r:myretprobe do_sys_open $retval' >> /sys/kernel/tracing/kprobe_events
194 This sets a kretprobe on the return point of do_sys_open() function with
256 …<...>-1447 [001] 1038282.286875: myprobe: (do_sys_open+0x0/0xd6) dfd=3 filename=7fffd1ec4440 flag…
257 …<...>-1447 [001] 1038282.286878: myretprobe: (sys_openat+0xc/0xe <- do_sys_open) $retval=ffffffff…
258 …<...>-1447 [001] 1038282.286885: myprobe: (do_sys_open+0x0/0xd6) dfd=ffffff9c filename=40413c fla…
259 … <...>-1447 [001] 1038282.286915: myretprobe: (sys_open+0x1b/0x1d <- do_sys_open) $retval=3
260 …<...>-1447 [001] 1038282.286969: myprobe: (do_sys_open+0x0/0xd6) dfd=ffffff9c filename=4041c6 fla…
261 … <...>-1447 [001] 1038282.286976: myretprobe: (sys_open+0x1b/0x1d <- do_sys_open) $retval=3
265 returns from SYMBOL(e.g. "sys_open+0x1b/0x1d <- do_sys_open" means kernel
266 returns from do_sys_open to sys_open+0x1b).