echo 'r:testretprobe ovs_dp_upcall $retval' >> /sys/kernel/debug/tracing/kprobe_events
# cat /sys/kernel/debug/tracing/kprobe_profile
testretprobe 1966690 0
echo 1 > /sys/kernel/debug/tracing/events/kprobes/testretprobe/enable
# cat /sys/kernel/debug/tracing/trace
"
...
ksoftirqd/32-174 [032] d.s. 3909.091493: testretprobe: (ovs_dp_process_packet+0xf4/0x120 [openvswitch] <- ovs_dp_upcall) arg1=0xfffffff5
ksoftirqd/32-174 [032] d.s. 3909.091495: testretprobe: (ovs_dp_process_packet+0xf4/0x120 [openvswitch] <- ovs_dp_upcall) arg1=0
ksoftirqd/32-174 [032] d.s. 3909.091498: testretprobe: (ovs_dp_process_packet+0xf4/0x120 [openvswitch] <- ovs_dp_upcall) arg1=0
ksoftirqd/32-174 [032] d.s. 3909.091501: testretprobe: (ovs_dp_process_packet+0xf4/0x120 [openvswitch] <- ovs_dp_upcall) arg1=0
ksoftirqd/32-174 [032] d.s. 3909.091503: testretprobe: (ovs_dp_process_packet+0xf4/0x120 [openvswitch] <- ovs_dp_upcall) arg1=0xfffffff5
...
"
0xfffffff5 is -11, that is, -EAGAIN
每一行代表kernel命中event, <- SYMBOL代表kernel返回到SYMBOL(例如: “ovs_dp_process_packet+0xf4/0x120 [openvswitch] <- ovs_dp_upcall” 代表kernel从ovs_dp_upcall返回到ovs_dp_process_packet+0xf4)