Deleted Added
full compact
1.t (1639) 1.t (18715)
1.\" Copyright (c) 1984 M. K. McKusick
2.\" Copyright (c) 1984 The Regents of the University of California.
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright

--- 17 unchanged lines hidden (view full) ---

26.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31.\" SUCH DAMAGE.
32.\"
33.\" @(#)1.t 1.2 (Berkeley) 11/8/90
1.\" Copyright (c) 1984 M. K. McKusick
2.\" Copyright (c) 1984 The Regents of the University of California.
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright

--- 17 unchanged lines hidden (view full) ---

26.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31.\" SUCH DAMAGE.
32.\"
33.\" @(#)1.t 1.2 (Berkeley) 11/8/90
34.\" $Id$
34.\"
35.ds RH Introduction
36.NH 1
37Introduction
38.PP
39The purpose of this paper is to describe the tools and techniques
35.\"
36.ds RH Introduction
37.NH 1
38Introduction
39.PP
40The purpose of this paper is to describe the tools and techniques
40that are available for improving the performance of the the kernel.
41that are available for improving the performance of the kernel.
41The primary tool used to measure the kernel is the hierarchical
42profiler \fIgprof\fP.
43The profiler enables the user to measure the cost of
44the abstractions that the kernel provides to the user.
45Once the expensive abstractions are identified,
46optimizations are postulated to help improve their performance.
47These optimizations are each individually
48verified to insure that they are producing a measurable improvement.
42The primary tool used to measure the kernel is the hierarchical
43profiler \fIgprof\fP.
44The profiler enables the user to measure the cost of
45the abstractions that the kernel provides to the user.
46Once the expensive abstractions are identified,
47optimizations are postulated to help improve their performance.
48These optimizations are each individually
49verified to insure that they are producing a measurable improvement.