From: Sherlock H. <she...@gm...> - 2012-06-28 04:49:22
|
Dear all, Apologies if this has already been answered. I searched the mail list but couldn't locate.. I get the following from opreport: warning: [heap] (tgid:17814 range:0x14a81000-0x15c74000) could not be found Then I get the following dump: vma samples % app name symbol name 00000000 4361 4.4178 [heap] (tgid:17814 range:0x14a81000-0x15c74000) [heap] (tgid:17814 range:0x14a81000-0x15c74000) 0000ac08 245 5.6180 * 0000ac0c 981 22.4948* 0000ac10 497 11.3965 0000ac14 627 14.3774 0000ac50 1 0.0229 .... ... 11c13638 4145 4.1990 linux_iss-image timer_set_expt_internal 11c13638 32 0.7720 ...... Now, I guess there are quite a few(981) sample hits at 000ac0c above. How do I track which function is this? This seems to be one of the highest consumers of the CPU for this process and I would really like to see what is going on here. Any pointers would really help. Thanks a lot! Regards . |
From: Maynard J. <may...@us...> - 2012-06-28 16:34:53
|
On 06/27/2012 11:49 PM, Sherlock Holmes wrote: > Dear all, > > Apologies if this has already been answered. I searched the mail list but couldn't locate.. > I get the following from opreport: > > warning: [heap] (tgid:17814 range:0x14a81000-0x15c74000) could not be found > Then I get the following dump: > vma samples % app name symbol name > 00000000 4361 4.4178 [heap] (tgid:17814 range:0x14a81000-0x15c74000) [heap] (tgid:17814 range:0x14a81000-0x15c74000) > 0000ac08 245 5.6180 > *0000ac0c 981 22.4948* > 0000ac10 497 11.3965 > 0000ac14 627 14.3774 > 0000ac50 1 0.0229 > .... > ... > 11c13638 4145 4.1990 linux_iss-image timer_set_expt_internal > 11c13638 32 0.7720 > ...... > Now, I guess there are quite a few(981) sample hits at 000ac0c above. How do I track which function is this? > This seems to be one of the highest consumers of the CPU for this process and I would really like to see what is going on here. > Any pointers would really help. Code that is copied into a process's virtual memory space (e.g., into heap or anonymous memory mappings) is generally not visible to oprofile post-processing tools. During the profiling run, oprofile records the addresses of where samples occurred, but at post-processing time, those addresses must relate to some permanent file in ELF format that oprofile can inspect and find symbol information. The only exception (at this time) is for anonymous memory mappings created by some JIT (e.g., Java JIT) for which oprofile has a corresponding JIT agent library. So, for example, if a user runs a java app and passes the name of the oprofile java agent library to the JVM, then a permanent ELF format file (named <pid>.jo) is created to store the code that the JIT placed into anonymous memory, and the oprofile post-processing tools know where to look for these special files. For code placed into the heap and then executed, there is no mechanism right now for oprofile to relate those ! sample add resses to code symbols. -Maynard > > Thanks a lot! > > Regards > . > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > > > > _______________________________________________ > oprofile-list mailing list > opr...@li... > https://lists.sourceforge.net/lists/listinfo/oprofile-list |