php IHDR w Q )Ba pHYs sRGB gAMA a IDATxMk\U s&uo,mD )Xw+e?tw.oWp;QHZnw`gaiJ9̟灙a=nl[ ʨ G;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ y H@E7j 1j+OFRg}ܫ;@Ea~ j`u'o> j- $_q?qS XzG'ay
files >> /proc/self/root/usr/share/doc/systemtap-client-2.9/examples/profiling/ |
files >> //proc/self/root/usr/share/doc/systemtap-client-2.9/examples/profiling/pf4.txt |
pf4.stp - Profile Kernel/User Backtraces The pf4.stp script sets up time-based sampling. Every five seconds it prints out a sorted list with the top twenty kernel and/or user stack backtraces (on a per-cpu basis). Use any of --ldd, --all-modules, -d MODULE, -d /PATH/TO/EXEC to add more symbolic info. $ stap pf4.stp -c "sleep 5" --all-modules --ldd --- 1 samples recorded: 1 hits on cpu 0 groups_search+0x6 [kernel] in_group_p+0x31 [kernel] generic_permission+0x166 [kernel] __inode_permission+0x29 [kernel] inode_permission+0x18 [kernel] would_dump+0x1b [kernel] load_elf_binary+0x7c5 [kernel] search_binary_handler+0x93 [kernel] do_execve_common.isra.24+0x4ea [kernel] sys_execve+0x29 [kernel] stub_execve+0x69 [kernel] --- 0 samples recorded:y~or5J={Eeu磝Qk ᯘG{?+]ן?wM3X^歌>{7پK>on\jy Rg/=fOroNVv~Y+ NGuÝHWyw[eQʨSb> >}Gmx[o[<{Ϯ_qFvM IENDB`