Hardware Breakpoint implementation in BCC
Hardware Breakpoint implementation in BCC Manali ShuklaAanandita Dhawan Maneesh Soni October 28, 2020 Hardware breakpoint Memory breakpoint implementation: mem: [:access] [Hardware breakpoint] Example: perf stat -e mem:0xffffffffbb65f478:rw 01 https://www.kernel.org/doc/ols/2009/ols2009-pages-149-158.pdf Implementation void required or not ? ● symbols -> symbol address ○ manual right now ○ Can it be made as part of implementation? 05 To-do list Any Questions ??? 0 码力 | 8 页 | 2.02 MB | 1 年前3Hiding Your Implementation Details is Not So Simple
About me 2 Hiding your Implementation Details, Amir Kirsh @ CppCon, 2024 Lecturer Academic College of Tel-Aviv-Yaffo Tel-Aviv University Member of the Israeli ISO C++ NB Co-Organizer of the CoreCpp conference and meetup group Trainer and Advisor (C++, but not only)Hiding your Implementation DetailsHiding your Implementation Details Why?Protect Object Integrity Expose the necessary interfaces only Debug Data modifications happens internally, in specific places. Encapsulation 5 Hiding your Implementation Details, Amir Kirsh @ CppCon, 2024Reduces Dependencies Components depend only what we actually0 码力 | 145 页 | 2.45 MB | 5 月前3A Long Journey of Changing std::sort Implementation at Scale
2AGENDA FOR TODAY History of sorting Why have we decided to change anything? Bugs, bugs, bugs Implementation What can you do? 3REMINDERS Sorting is the ordering of elements std::sort, std::stable_sort0 码力 | 182 页 | 7.65 MB | 5 月前3Service mesh security best practices: from implementation to verification
Anthony Roman, Lei Tang Google April 26, 2022 Service mesh security best practices: from implementation to verification Who are we? Anthony Roman Istio Github: anthony-roman Lei Tang Istio Github: lei-tang Session agenda 1. Service mesh security architecture and implementation. 2. Service mesh security best practices. 3. Lifecycle of service mesh security and demo. Service mesh security security architecture ● Attack vectors. ● Service mesh security architecture and implementation. 1 Attack Vectors and Surfaces Istio is both a collection of security controls and an attack target0 码力 | 29 页 | 1.77 MB | 1 年前3Design and Implementation of Highly Scalable Quantifiable Data Structures in C++
Entropy Measurement Design and Implementation of Quantifiable Stack/Queue Live DemonstrationMotivation Quantifiability Vector Space Entropy Measurement Design and Implementation of Quantifiable Stack/Queue Performance Engineering Case Study: k-FIFO Queue Design and Implementation of Quantifiable Stack/Queue Live Demonstration Design and Implementation of Highly Scalable Quantifiable Data Structures in C++ 2MotivationMotivation Quantifiability Vector Space Entropy Measurement Design and Implementation of Quantifiable Stack/Queue Live Demonstration Correctness Conditions A correctness condition defines correct0 码力 | 51 页 | 4.08 MB | 5 月前3Common Package Specification (CPS) in Practice: A Full Round Trip Implementation in Conan C++ Package
Common Package Specification (CPS) in practice: A full round trip implementation in Conan C++ package manager CppCon24Outline - Introduction to Common Package Specification (CPS) - Creation of CPS } } } zlib.cps 9CPS files and where to find them - Goals of the talk: - Provide implementation experience - Provide tools for testing - Discuss possible gaps and future work - Lessons learned0 码力 | 66 页 | 1.76 MB | 5 月前3PyTorch Release Notes
Automatic Mixed Precision (AMP) for PyTorch is available in this container through the native implementation. AMP enables users to try mixed precision training by adding only three lines of Python to an tokens from multiple previous segments. Our implementation is based on the codebase that was published by the authors of the Transformer-XL paper. Our implementation uses modified model architecture hyperparameters Cores. This model script is available on GitHub. ‣ Jasper model: This repository provides an implementation of the Jasper model in PyTorch from the Jasper: An End-to-End Convolutional Neural Acoustic Model0 码力 | 365 页 | 2.94 MB | 1 年前3Spring Framework 2.0.8 Reference
.................... 180 9.5.1. Understanding the Spring Framework's declarative transaction implementation ..... 182 9.5.2. A first example ........................................................... ................................................... 358 18.3. Using Spring's convenience EJB implementation classes ............................................... 358 19. JMS ........................ Injection features. The basic concept here is the BeanFactory, which provides a sophisticated implementation of the factory pattern which removes the need for programmatic singletons and allows you to decouple0 码力 | 502 页 | 3.61 MB | 1 年前3Spring Framework 2.0.7 Reference
.................... 180 9.5.1. Understanding the Spring Framework's declarative transaction implementation ..... 182 9.5.2. A first example ........................................................... ................................................... 358 18.3. Using Spring's convenience EJB implementation classes ............................................... 358 19. JMS ........................ Injection features. The basic concept here is the BeanFactory, which provides a sophisticated implementation of the factory pattern which removes the need for programmatic singletons and allows you to decouple0 码力 | 502 页 | 3.61 MB | 1 年前3Spring Framework 2.0.4 Reference
.................... 179 9.5.1. Understanding the Spring Framework's declarative transaction implementation ..... 181 9.5.2. A first example ........................................................... ................................................... 356 18.3. Using Spring's convenience EJB implementation classes ............................................... 356 19. JMS ........................ Injection features. The basic concept here is the BeanFactory, which provides a sophisticated implementation of the factory pattern which removes the need for programmatic singletons and allows you to decouple0 码力 | 500 页 | 3.60 MB | 1 年前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100