1.t (1639) | 1.t (18715) |
---|---|
1.\" Copyright (c) 1984 M. K. McKusick 2.\" Copyright (c) 1984 The Regents of the University of California. 3.\" All rights reserved. 4.\" 5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that the following conditions 7.\" are met: 8.\" 1. Redistributions of source code must retain the above copyright --- 17 unchanged lines hidden (view full) --- 26.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31.\" SUCH DAMAGE. 32.\" 33.\" @(#)1.t 1.2 (Berkeley) 11/8/90 | 1.\" Copyright (c) 1984 M. K. McKusick 2.\" Copyright (c) 1984 The Regents of the University of California. 3.\" All rights reserved. 4.\" 5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that the following conditions 7.\" are met: 8.\" 1. Redistributions of source code must retain the above copyright --- 17 unchanged lines hidden (view full) --- 26.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31.\" SUCH DAMAGE. 32.\" 33.\" @(#)1.t 1.2 (Berkeley) 11/8/90 |
34.\" $Id$ |
|
34.\" 35.ds RH Introduction 36.NH 1 37Introduction 38.PP 39The purpose of this paper is to describe the tools and techniques | 35.\" 36.ds RH Introduction 37.NH 1 38Introduction 39.PP 40The purpose of this paper is to describe the tools and techniques |
40that are available for improving the performance of the the kernel. | 41that are available for improving the performance of the kernel. |
41The primary tool used to measure the kernel is the hierarchical 42profiler \fIgprof\fP. 43The profiler enables the user to measure the cost of 44the abstractions that the kernel provides to the user. 45Once the expensive abstractions are identified, 46optimizations are postulated to help improve their performance. 47These optimizations are each individually 48verified to insure that they are producing a measurable improvement. | 42The primary tool used to measure the kernel is the hierarchical 43profiler \fIgprof\fP. 44The profiler enables the user to measure the cost of 45the abstractions that the kernel provides to the user. 46Once the expensive abstractions are identified, 47optimizations are postulated to help improve their performance. 48These optimizations are each individually 49verified to insure that they are producing a measurable improvement. |