Jonathan Haslam wrote:
>> Yes I think this is something I'm looking for, but I'm not sure if I can
>> use your Cap-Eye kernel image because my code changes are in kernel
>> modules such as ip, sockfs and genunix. Nevertheless, I'll be happy to
>> try it.
>>  
>>
> Unfortunately I touch a few areas in genunix so I don't think
> you're going to be able to apply it here at the minute.
> 

No, it won't work if we both touched genunix. :(

Thank you for your information, I'll try some other way.

- yxn

> However, if you would like to try it out anyway, let me know
> and I'll point you at the bits.
> 
> Jon.
> 
>> - yxn
>>
>>  
>>
>>> The following example shows user-land TLB activity by executable
>>> on an Opteron processor. The probename in the probe specification
>>> may well change but it consists of the event name followed the mode
>>> specification and the count:
>>>
>>> # dtrace -qn 'cpc:::[EMAIL PROTECTED] = count();}'
>>> ^C
>>>
>>>  dtrace                                                            1
>>>  in.rlogind                                                        1
>>>  ls                                                                1
>>>  man                                                               1
>>>  nroff                                                             1
>>>  nscd                                                              1
>>>  pt_chmod                                                          1
>>>  quota                                                             1
>>>  sh                                                                1
>>>  sendmail                                                          2
>>>  inetd                                                             3
>>>  svc.configd                                                       3
>>>  ksh                                                               4
>>>  intrd                                                             6
>>>  login                                                            10
>>>
>>> So, in the above we fire the probe every 1000 user-land TLB misses and
>> >from there we simply aggregate on execname. In your case you would
>>> simply change the mode/count to suit and aggregate on stack() (to
>>> start with anyway). Note that we are not getting an absolute view of
>>> event causation here but a sampled view; this should provide a
>>> statistically valid picture of the event activity though.
>>>
>>> I can happily provide you with a kernel to try but it comes as a
>>> Cap-Eye and you, obviously, may not be able to use it if your bits
>>> are outside of a single module or so.
>>>
>>> Cheers.
>>>
>>> Jon.
>>>
>>>
>>>    
>>>
>>>> - yxn
>>>>
>>>>      
>>>>
>> _______________________________________________
>> perf-discuss mailing list
>> perf-discuss@opensolaris.org
>>  
>>
> _______________________________________________
> perf-discuss mailing list
> perf-discuss@opensolaris.org
_______________________________________________
perf-discuss mailing list
perf-discuss@opensolaris.org

Reply via email to