1 // SPDX-License-Identifier: GPL-2.0
3 * Hook into 'openat' syscall entry tracepoint
7 * perf trace -e tools/perf/examples/bpf/sys_enter_openat.c cat /etc/passwd > /dev/null
9 * It'll catch some openat syscalls related to the dynamic linked and
10 * the last one should be the one for '/etc/passwd'.
12 * The syscall_enter_openat_args can be used to get the syscall fields
13 * and use them for filtering calls, i.e. use in expressions for
19 struct syscall_enter_openat_args
{
20 unsigned long long unused
;
28 int syscall_enter(openat
)(struct syscall_enter_openat_args
*args
)