blob: 1625768b5475571f213e288826cccef8e010b7f6 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
|
probe.kernel.sys_open.entry()
{
$dynamic_call_graph =1;
}
# What you would see in the output would be something of this kind
# call sys_open
# call getname
# call do_getname
# return do_getname
# return getname
# call get_unused_fd
# call find_next_zero_bit
# return find_next_zero_bit
# return get_unused_fd
# call filep_open
.....
return sys_open
# The above probe could be customized to a particular process as well,
# like in the following
probe.kernel.sys_open.entry()
{
if ($PID == 1234)
$dynamic_call_graph =1;
}
|