Received: by 2002:a05:6358:795:b0:dc:4c66:fc3e with SMTP id n21csp196625rwj; Sat, 29 Oct 2022 01:23:25 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4I4uP9yWIt0Pt/rrNHzHJLV3wq5IbEmL+jc19nPjRAcnZonG6CY8cLdw9P5eobFVAUJCw9 X-Received: by 2002:a05:6402:1348:b0:461:c056:bf65 with SMTP id y8-20020a056402134800b00461c056bf65mr3400713edw.414.1667031805589; Sat, 29 Oct 2022 01:23:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667031805; cv=none; d=google.com; s=arc-20160816; b=ef7+/zhYq5hQX5GsNbcvW7l+UOeNe2xWTTT6Gk9JM4VCWEtVgB7CE6no5T0cMwbNh+ U6SW2Md+JtWVpNbZb137pMcojfun0rZQPu6HXbPpe6Ae6IlgYk2tbNYMpR6iyEFsGjuS 3CxoOaIX2vWQH4Mql1JDuu+F90eCZJP7TtWM+s0yhpMr5YPyExOH2U/voc1hT8yZN6Jm 7MR5Udjquy7q+uQOno63d1WZ+eiuPtuyZVhi3iwQvDXHHPTMTIZUch6nNY+wzKBEjv4B sr9Py7SS6IkMBnc0gyljUStYNXNH9SxFPLOFTqCfzDpZSEYdQUl2esEhula4Wq+/s6KY Vqxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:references:cc :to:from:subject; bh=qa0N6BuU+MbgqAo9ObQBljF1RIsAFe2IIwjw/0gJO9s=; b=Bbq54NvMUcjNHDScDwdfGitNuHD7cnMQrNGSMlE3lXl24Jl0paYM3k6H5+OoKZtCeI iuMPkOHa6qqYX+QAfHCccJp8nXr+I4rgZNKJj+Fz7IrEJdqm/t5SvCuK12W055ktHFfB LQ6G9W6A/Wg8A/Ke8kRYFAmCC50uqFRMpbVBLxjEGN7tHgtwkHEgaxJWmfZFkQOvtttH xi60Fur3mhX72buOEgNkYBK1G5f7gYsC2eEnnLndnPckAT18jcWbaHv8b1Kme8Jpc5ZJ U0LVy1yHrPhWSQhT/e5zpdG70nc1IBDBhbO7U8Nwi7Ok2wr5GcEM2G3AjBaimhrb7dLD dxDA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h26-20020a0564020e9a00b0045c240cea74si960789eda.296.2022.10.29.01.23.01; Sat, 29 Oct 2022 01:23:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229613AbiJ2ILC (ORCPT + 99 others); Sat, 29 Oct 2022 04:11:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33320 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229553AbiJ2ILA (ORCPT ); Sat, 29 Oct 2022 04:11:00 -0400 Received: from szxga03-in.huawei.com (szxga03-in.huawei.com [45.249.212.189]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 07CA37B297; Sat, 29 Oct 2022 01:10:59 -0700 (PDT) Received: from dggpemm500020.china.huawei.com (unknown [172.30.72.57]) by szxga03-in.huawei.com (SkyGuard) with ESMTP id 4MzsVH3rgzzFqSR; Sat, 29 Oct 2022 16:08:07 +0800 (CST) Received: from dggpemm500006.china.huawei.com (7.185.36.236) by dggpemm500020.china.huawei.com (7.185.36.49) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Sat, 29 Oct 2022 16:10:57 +0800 Received: from [10.174.178.55] (10.174.178.55) by dggpemm500006.china.huawei.com (7.185.36.236) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Sat, 29 Oct 2022 16:10:56 +0800 Subject: Re: [PATCH v7 00/11] kallsyms: Optimizes the performance of lookup symbols From: "Leizhen (ThunderTown)" To: Luis Chamberlain CC: Josh Poimboeuf , Jiri Kosina , Miroslav Benes , Petr Mladek , Joe Lawrence , , , Masahiro Yamada , Alexei Starovoitov , Jiri Olsa , Kees Cook , Andrew Morton , , Steven Rostedt , "Ingo Molnar" References: <20221017064950.2038-1-thunder.leizhen@huawei.com> <77f1c8f0-5e67-0e57-9285-15ba613044fb@huawei.com> <4f06547b-456f-e1ec-c535-16577f502ff1@huawei.com> Message-ID: <712fae84-aadc-7d29-f311-a3352bab6346@huawei.com> Date: Sat, 29 Oct 2022 16:10:44 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-Originating-IP: [10.174.178.55] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpemm500006.china.huawei.com (7.185.36.236) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/10/27 14:27, Leizhen (ThunderTown) wrote: > > > On 2022/10/27 11:26, Leizhen (ThunderTown) wrote: >> >> >> On 2022/10/27 3:03, Luis Chamberlain wrote: >>> On Wed, Oct 26, 2022 at 02:44:36PM +0800, Leizhen (ThunderTown) wrote: >>>> On 2022/10/26 1:53, Luis Chamberlain wrote: >>>>> This answers how we don't use a hash table, the question was *should* we >>>>> use one? >>>> >>>> I'm not the original author, and I can only answer now based on my understanding. Maybe >>>> the original author didn't think of the hash method, or he has weighed it out. >>>> >>>> Hash is a good solution if only performance is required and memory overhead is not >>>> considered. Using hash will increase the memory size by up to "4 * kallsyms_num_syms + >>>> 4 * ARRAY_SIZE(hashtable)" bytes, kallsyms_num_syms is about 1-2 million. > > Sorry, 1-2 million ==> 0.1~0.2 million > >>>> >>>> Because I don't know what hash algorithm will be used, the cost of generating the >>>> hash value corresponding to the symbol name is unknown now. But I think it's gonna >>>> be small. But it definitely needs a simpler algorithm, the tool needs to implement >>>> the same hash algorithm. >>> >>> For instance, you can look at evaluating if alloc_large_system_hash() would help. >> The following three hash algorithms are compared. The kernel is compiled by defconfig on arm64. |---------------------------------------------------------------------------------------| | | hash &= HASH_TABLE_SIZE - 1 | | | number of conflicts >= 1000 | |---------------------------------------------------------------------------------------| | ARRAY_SIZE(hash_table) | crc16 | jhash_one_at_a_time | string hash_32 | |---------------------------------------------------------------------------------------| | | 345b: 3905 | 0d40: 1013 | 4a4c: 6548 | | | 35bb: 1016 | 35ce: 6549 | 883a: 1015 | | 0x10000 | 385b: 6548 | 4440: 19126 | d05f: 19129 | | | f0ba: 19127 | 7ebe: 3916 | ecda: 3903 | |---------------------------------------------------------------------------------------| | | 0ba: 19168 | 440: 19165 | 05f: 19170 | | | 45b: 3955 | 5ce: 6577 | 83a: 1066 | | 0x1000 | 5bb: 1069 | d40: 1052 | a4c: 6609 | | | 85b: 6582 | ebe: 3938 | cda: 3924 | |---------------------------------------------------------------------------------------| Based on the above test results, I conclude that: 1. For the worst-case scenario, the three algorithms are not much different. But the kernel only implements crc16 and string hash_32. The latter is not processed byte-by-byte, so it is coupled with byte order and sizeof(long). So crc16 is the best choice. 2. For the worst-case scenario, there are almost 19K strings are mapped to the same hash value,just over 1/10 of the total. And with my current compression-then-comparison approach, it's 25-30 times faster. So there's still a need for my current approach, and they can be combined. if (nr_conflicts(key) >= CONST_N) { newname = compress(name); for_each_name_in_slot(key): compare(new_name) } else { for_each_name_in_slot(key): compare(name) } Above CONST_N can be roughly calculated: time_of_compress(name) + N * time_of_compare(new_name) <= N * time_of_compare(name) 3. For the worst-case scenario, there is no obvious difference between ARRAY_SIZE(hash_table) 0x10000 and 0x1000. So ARRAY_SIZE(hash_table)=0x1000 is enough. Statistic information: |------------------------------------------------------| | nr_conflicts(key) | ARRAY_SIZE(hash_table) | |------------------------------------------------------| | <= ? | 0x1000 | 0x10000 | |------------------------------------------------------| | 0 | 0 | 7821 | | 20 | 19 | 57375 | | 40 | 2419 | 124 | | 60 | 1343 | 70 | | 80 | 149 | 73 | | 100 | 38 | 49 | | 200 | 108 | 16 | | 400 | 14 | 2 | | 600 | 2 | 2 | | 800 | 0 | 0 | | 1000 | 0 | 0 | | 100000 | 4 | 4 | |------------------------------------------------------| Also, I re-calculated: Using hash will increase the memory size by up to "6 * kallsyms_num_syms + 4 * ARRAY_SIZE(hashtable)" |---- What I said earlier was 4 The increased size is close to 1 MB if CONFIG_KALLSYMS_ALL=y. Hi, Luis: For the reasons of the above-mentioned second conclusion. And except for patches 4-6, even if only the hash method is used, other patches and option "--lto-clang" in patch 6/11 are also needed. If you don't mind, I'd like to use hash at the next stage. The current patch set is already huge. >> OK, I found the right hash function. In this way, the tool does not need to consider >> the byte order. > > https://en.wikipedia.org/wiki/Jenkins_hash_function > > Let's go with jenkins_one_at_a_time_hash(), which looks simpler and doesn't even > have to think about sizeof(long). It seems to be closest to our current needs. > > uint32_t jenkins_one_at_a_time_hash(const uint8_t* key, size_t length) { > size_t i = 0; > uint32_t hash = 0; > > while (i != length) { > hash += key[i++]; > hash += hash << 10; > hash ^= hash >> 6; > } > hash += hash << 3; > hash ^= hash >> 11; > hash += hash << 15; > > return hash; > } > >> >> include/linux/stringhash.h >> >> /* >> * Version 1: one byte at a time. Example of use: >> * >> * unsigned long hash = init_name_hash; >> * while (*p) >> * hash = partial_name_hash(tolower(*p++), hash); >> * hash = end_name_hash(hash); >> >> >>> >>> Luis >>> . >>> >> > -- Regards, Zhen Lei