Received: by 2002:a05:6358:111d:b0:dc:6189:e246 with SMTP id f29csp866524rwi; Mon, 31 Oct 2022 08:27:04 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4Qy1UtL7TkFL0A0fEvzrw6uMjAisKVruYB15M1NukxEP3oblK4fDJRHFtQ60+5fTDAQcq1 X-Received: by 2002:a63:f20a:0:b0:464:8c6:f27e with SMTP id v10-20020a63f20a000000b0046408c6f27emr13109661pgh.411.1667230024413; Mon, 31 Oct 2022 08:27:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667230024; cv=none; d=google.com; s=arc-20160816; b=MzxO5AHe6MrO4yIMmp6og8pnQVlneit85HypRJZ7Y4IIf0Mi0L6woYw45KLdpEfJEQ iqsTvByx8CaQgSlLmsRUMbhvxj9Zj8jhaqUtG5QHiwfT086UskASEsFytvM5MYI9Agk4 Te68Ior7OHwDjqQLObb+QvMflOjEcLc798J0O2XlNL81AEm+27flnqH+3vUCgPoEfHfo TrvRsFdIkkzsxrd+z+7YxgA/z55HxXVAmQPvn771XwdG3DEr4nWJbX6YDlaUfe44odKs KSqtV2vnbHnXqjogbMXAuWjDRg/xFLW0N/Rapdk98q0O0YWhIR+5Kxk35Q653fzaW9k3 eYKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:references:cc :to:from:subject; bh=qxz3StMKkDgnewDlFp7Y7V0eH9iMcfijK2J42vDESls=; b=jWq6NThri7gHlK22tfs3ct+VMpz2n8unJxdB5H/uY8rI/S4hckAW9lUKSitlu5tlkr 4DZL5kvMzWO6p94/HIncuCQoKAwjpovGwyxh8cP26NpRzsjW6+qTP1unDGpYaJH5LmNq 3Ez3onXpoH3cmaYLk8YJfI9sEYHZYrvYBO3xhPVs+5BOnEcWY/t7qhsnV3/2bQyu6VGq wkhCUmeiZKBx+qEbAeLEC6TPOpNQq61NpM5stTCqY+4JbdA82ytxaU2OKaZHOv9iyAXr XQSgI1jVShY1Gh5h5cjSoF6PXFVi5Hg4gAwVEnXx5Y8e83zz/rzjNIzEM/LWhrEzUiiO /CkA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id bm18-20020a656e92000000b0046afcba3088si9596349pgb.735.2022.10.31.08.26.50; Mon, 31 Oct 2022 08:27:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231693AbiJaPEs (ORCPT + 99 others); Mon, 31 Oct 2022 11:04:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41024 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229875AbiJaPEq (ORCPT ); Mon, 31 Oct 2022 11:04:46 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 84B5D10557; Mon, 31 Oct 2022 08:04:44 -0700 (PDT) Received: from dggpemm500021.china.huawei.com (unknown [172.30.72.55]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4N1Gdj2ZyPzHvP4; Mon, 31 Oct 2022 23:04:25 +0800 (CST) Received: from dggpemm500006.china.huawei.com (7.185.36.236) by dggpemm500021.china.huawei.com (7.185.36.109) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Mon, 31 Oct 2022 23:04:42 +0800 Received: from [10.174.178.55] (10.174.178.55) by dggpemm500006.china.huawei.com (7.185.36.236) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Mon, 31 Oct 2022 23:04:41 +0800 Subject: Re: [PATCH v7 00/11] kallsyms: Optimizes the performance of lookup symbols From: "Leizhen (ThunderTown)" To: Luis Chamberlain CC: Josh Poimboeuf , Jiri Kosina , Miroslav Benes , Petr Mladek , Joe Lawrence , , , Masahiro Yamada , Alexei Starovoitov , Jiri Olsa , Kees Cook , Andrew Morton , , Steven Rostedt , "Ingo Molnar" References: <20221017064950.2038-1-thunder.leizhen@huawei.com> <77f1c8f0-5e67-0e57-9285-15ba613044fb@huawei.com> <4f06547b-456f-e1ec-c535-16577f502ff1@huawei.com> <712fae84-aadc-7d29-f311-a3352bab6346@huawei.com> Message-ID: Date: Mon, 31 Oct 2022 23:04:30 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-Originating-IP: [10.174.178.55] X-ClientProxiedBy: dggems706-chm.china.huawei.com (10.3.19.183) To dggpemm500006.china.huawei.com (7.185.36.236) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/10/31 12:55, Leizhen (ThunderTown) wrote: > > > On 2022/10/29 16:10, Leizhen (ThunderTown) wrote: >> >> >> On 2022/10/27 14:27, Leizhen (ThunderTown) wrote: >>> >>> >>> On 2022/10/27 11:26, Leizhen (ThunderTown) wrote: >>>> >>>> >>>> On 2022/10/27 3:03, Luis Chamberlain wrote: >>>>> On Wed, Oct 26, 2022 at 02:44:36PM +0800, Leizhen (ThunderTown) wrote: >>>>>> On 2022/10/26 1:53, Luis Chamberlain wrote: >>>>>>> This answers how we don't use a hash table, the question was *should* we >>>>>>> use one? >>>>>> >>>>>> I'm not the original author, and I can only answer now based on my understanding. Maybe >>>>>> the original author didn't think of the hash method, or he has weighed it out. >>>>>> >>>>>> Hash is a good solution if only performance is required and memory overhead is not >>>>>> considered. Using hash will increase the memory size by up to "4 * kallsyms_num_syms + >>>>>> 4 * ARRAY_SIZE(hashtable)" bytes, kallsyms_num_syms is about 1-2 million. >>> >>> Sorry, 1-2 million ==> 0.1~0.2 million >>> >>>>>> >>>>>> Because I don't know what hash algorithm will be used, the cost of generating the >>>>>> hash value corresponding to the symbol name is unknown now. But I think it's gonna >>>>>> be small. But it definitely needs a simpler algorithm, the tool needs to implement >>>>>> the same hash algorithm. >>>>> >>>>> For instance, you can look at evaluating if alloc_large_system_hash() would help. >>>> >> >> The following three hash algorithms are compared. The kernel is compiled by defconfig >> on arm64. >> >> |---------------------------------------------------------------------------------------| >> | | hash &= HASH_TABLE_SIZE - 1 | >> | | number of conflicts >= 1000 | >> |---------------------------------------------------------------------------------------| >> | ARRAY_SIZE(hash_table) | crc16 | jhash_one_at_a_time | string hash_32 | >> |---------------------------------------------------------------------------------------| >> | | 345b: 3905 | 0d40: 1013 | 4a4c: 6548 | >> | | 35bb: 1016 | 35ce: 6549 | 883a: 1015 | >> | 0x10000 | 385b: 6548 | 4440: 19126 | d05f: 19129 | >> | | f0ba: 19127 | 7ebe: 3916 | ecda: 3903 | >> |---------------------------------------------------------------------------------------| >> | | 0ba: 19168 | 440: 19165 | 05f: 19170 | >> | | 45b: 3955 | 5ce: 6577 | 83a: 1066 | >> | 0x1000 | 5bb: 1069 | d40: 1052 | a4c: 6609 | >> | | 85b: 6582 | ebe: 3938 | cda: 3924 | >> |---------------------------------------------------------------------------------------| >> >> Based on the above test results, I conclude that: >> 1. For the worst-case scenario, the three algorithms are not much different. But the kernel >> only implements crc16 and string hash_32. The latter is not processed byte-by-byte, so >> it is coupled with byte order and sizeof(long). So crc16 is the best choice. >> 2. For the worst-case scenario, there are almost 19K strings are mapped to the same hash >> value,just over 1/10 of the total. And with my current compression-then-comparison >> approach, it's 25-30 times faster. So there's still a need for my current approach, and >> they can be combined. >> if (nr_conflicts(key) >= CONST_N) { >> newname = compress(name); >> for_each_name_in_slot(key): compare(new_name) >> } else { >> for_each_name_in_slot(key): compare(name) >> } >> >> Above CONST_N can be roughly calculated: >> time_of_compress(name) + N * time_of_compare(new_name) <= N * time_of_compare(name) >> 3. For the worst-case scenario, there is no obvious difference between ARRAY_SIZE(hash_table) >> 0x10000 and 0x1000. So ARRAY_SIZE(hash_table)=0x1000 is enough. >> Statistic information: >> |------------------------------------------------------| >> | nr_conflicts(key) | ARRAY_SIZE(hash_table) | >> |------------------------------------------------------| >> | <= ? | 0x1000 | 0x10000 | >> |------------------------------------------------------| >> | 0 | 0 | 7821 | >> | 20 | 19 | 57375 | >> | 40 | 2419 | 124 | >> | 60 | 1343 | 70 | >> | 80 | 149 | 73 | >> | 100 | 38 | 49 | >> | 200 | 108 | 16 | >> | 400 | 14 | 2 | >> | 600 | 2 | 2 | >> | 800 | 0 | 0 | >> | 1000 | 0 | 0 | >> | 100000 | 4 | 4 | >> |------------------------------------------------------| >> >> >> Also, I re-calculated: >> Using hash will increase the memory size by up to "6 * kallsyms_num_syms + 4 * ARRAY_SIZE(hashtable)" >> |---- What I said earlier was 4 >> The increased size is close to 1 MB if CONFIG_KALLSYMS_ALL=y. >> >> Hi, Luis: >> For the reasons of the above-mentioned second conclusion. And except for patches 4-6, >> even if only the hash method is used, other patches and option "--lto-clang" in patch 6/11 >> are also needed. If you don't mind, I'd like to use hash at the next stage. The current >> patch set is already huge. > > I just had an update in response to David Laight's email. The hash solution is like > a centrist. It doesn't seem very feasible. > > Now, we need to make a decision. Choose one of the two: > 1. Continue with my current approach. Improve the average performance of > kallsyms_lookup_name() by 20 to 30 times. The memory overhead is increased by: > arm64 (defconfig): > 73.5KiB and 4.0% if CONFIG_KALLSYMS_ALL=y. > 19.8KiB and 2.8% if CONFIG_KALLSYMS_ALL=n. > x86 (defconfig): > 49.0KiB and 3.0% if CONFIG_KALLSYMS_ALL=y. > 16.8KiB and 2.3% if CONFIG_KALLSYMS_ALL=n. > 2. Sort names, binary search (The static function causes duplicate names. Additional work is required) > 2^18=262144, only up to 18 symbol expansions and comparisons are required. > The performance is definitely excellent, although I haven't tested it yet. > The memory overhead is increased by: 6 * kallsyms_num_syms > arm64 (defconfig): > 1MiB if CONFIG_KALLSYMS_ALL=y. > 362KiB if CONFIG_KALLSYMS_ALL=n. > x86 (defconfig): > 770KiB if CONFIG_KALLSYMS_ALL=y. > 356KiB if CONFIG_KALLSYMS_ALL=n. > Preliminary Test Results: (On Qemu arm64) [ 73.049249] kallsyms_selftest: kallsyms_lookup_name() looked up 151880 symbols [ 73.049331] kallsyms_selftest: The time spent on each symbol is (ns): min=1088, max=46848, avg=6629 > > > >> >> >>>> OK, I found the right hash function. In this way, the tool does not need to consider >>>> the byte order. >>> >>> https://en.wikipedia.org/wiki/Jenkins_hash_function >>> >>> Let's go with jenkins_one_at_a_time_hash(), which looks simpler and doesn't even >>> have to think about sizeof(long). It seems to be closest to our current needs. >>> >>> uint32_t jenkins_one_at_a_time_hash(const uint8_t* key, size_t length) { >>> size_t i = 0; >>> uint32_t hash = 0; >>> >>> while (i != length) { >>> hash += key[i++]; >>> hash += hash << 10; >>> hash ^= hash >> 6; >>> } >>> hash += hash << 3; >>> hash ^= hash >> 11; >>> hash += hash << 15; >>> >>> return hash; >>> } >>> >>>> >>>> include/linux/stringhash.h >>>> >>>> /* >>>> * Version 1: one byte at a time. Example of use: >>>> * >>>> * unsigned long hash = init_name_hash; >>>> * while (*p) >>>> * hash = partial_name_hash(tolower(*p++), hash); >>>> * hash = end_name_hash(hash); >>>> >>>> >>>>> >>>>> Luis >>>>> . >>>>> >>>> >>> >> > -- Regards, Zhen Lei