pub fn start_profiling(blacklist: &[String])
Expand description

Start profiling, blacklisting the given crates.

Without blacklisting, profiling can be extremely verbose. We recommend blackisting at least alloc, build, core, rayon, rayon-core, serde, serde-json, std and unknown. However what should be blacklisted depends on what you’re trying to understand. If you examine the tracebacks generated by profiling, you can tune the list appropriately.

It is not clear how the timing of the profiling is handled. There is a parameter frequency that is passed to the profiling machinery, but we don’t know what it does.

Profiling appears to correctly represent wallclock in parallel loops.