dtrace -n 'syscall:::entry { @num pid,execname » = count(); }'
At work the functional test suite of our application used up quite a lot of RAM (over 500 megs). For a long time it was cheaper to buy the developers an extra gig of RAM than to spend time hunting down a possible memory leak, but finally curiosity overcame me and I started investigating.
a reverse engineering framework consisting of multiple extensible components
debugging kernel problems (slides). greg 'grog' lehey.
debugging kernel problems (tutorial). greg 'grog' lehey.