|
You are here |
blog.sentry.io | ||
| | | | |
stefan-marr.de
|
|
| | | | | Sampling profilers can go surprisingly wrong on simple programs. Here a brief overview, and all details in our paper! | |
| | | | |
blog.maxgio.me
|
|
| | | | | In the previous blog about the program execution environment, we introduced the concept of stack unwinding with frame pointers as one of the techniques leveraged for profiling a program. In this blog, we'll see practically how we can build a simple sampling-based continuous profiler. Since we don't want the application to necessarily be instrumented, we can use the Linux kernel instrumentation. Thanks to eBPF we're able to dynamically load and attach the profiler program to specific kernel entry points, ... | |
| | | | |
btorpey.github.io
|
|
| | | | | Memory checking using plain old malloc | |
| | | | |
argp.github.io
|
|
| | | |||