Chapter 23. Profiling memory accesses with perf mem