gdb/bcache.h - gdb

Macros defined

Source code

  1. /* Include file cached obstack implementation.
  2.    Written by Fred Fish <fnf@cygnus.com>
  3.    Rewritten by Jim Blandy <jimb@cygnus.com>

  4.    Copyright (C) 1999-2015 Free Software Foundation, Inc.

  5.    This file is part of GDB.

  6.    This program is free software; you can redistribute it and/or modify
  7.    it under the terms of the GNU General Public License as published by
  8.    the Free Software Foundation; either version 3 of the License, or
  9.    (at your option) any later version.

  10.    This program is distributed in the hope that it will be useful,
  11.    but WITHOUT ANY WARRANTY; without even the implied warranty of
  12.    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  13.    GNU General Public License for more details.

  14.    You should have received a copy of the GNU General Public License
  15.    along with this program.  If not, see <http://www.gnu.org/licenses/>.  */

  16. #ifndef BCACHE_H
  17. #define BCACHE_H 1

  18. /* A bcache is a data structure for factoring out duplication in
  19.    read-only structures.  You give the bcache some string of bytes S.
  20.    If the bcache already contains a copy of S, it hands you back a
  21.    pointer to its copy.  Otherwise, it makes a fresh copy of S, and
  22.    hands you back a pointer to that.  In either case, you can throw
  23.    away your copy of S, and use the bcache's.

  24.    The "strings" in question are arbitrary strings of bytes --- they
  25.    can contain zero bytes.  You pass in the length explicitly when you
  26.    call the bcache function.

  27.    This means that you can put ordinary C objects in a bcache.
  28.    However, if you do this, remember that structs can contain `holes'
  29.    between members, added for alignment.  These bytes usually contain
  30.    garbage.  If you try to bcache two objects which are identical from
  31.    your code's point of view, but have different garbage values in the
  32.    structure's holes, then the bcache will treat them as separate
  33.    strings, and you won't get the nice elimination of duplicates you
  34.    were hoping for.  So, remember to memset your structures full of
  35.    zeros before bcaching them!

  36.    You shouldn't modify the strings you get from a bcache, because:

  37.    - You don't necessarily know who you're sharing space with.  If I
  38.    stick eight bytes of text in a bcache, and then stick an eight-byte
  39.    structure in the same bcache, there's no guarantee those two
  40.    objects don't actually comprise the same sequence of bytes.  If
  41.    they happen to, the bcache will use a single byte string for both
  42.    of them.  Then, modifying the structure will change the string.  In
  43.    bizarre ways.

  44.    - Even if you know for some other reason that all that's okay,
  45.    there's another problem.  A bcache stores all its strings in a hash
  46.    table.  If you modify a string's contents, you will probably change
  47.    its hash value.  This means that the modified string is now in the
  48.    wrong place in the hash table, and future bcache probes will never
  49.    find it.  So by mutating a string, you give up any chance of
  50.    sharing its space with future duplicates.


  51.    Size of bcache VS hashtab:

  52.    For bcache, the most critical cost is size (or more exactly the
  53.    overhead added by the bcache).  It turns out that the bcache is
  54.    remarkably efficient.

  55.    Assuming a 32-bit system (the hash table slots are 4 bytes),
  56.    ignoring alignment, and limit strings to 255 bytes (1 byte length)
  57.    we get ...

  58.    bcache: This uses a separate linked list to track the hash chain.
  59.    The numbers show roughly 100% occupancy of the hash table and an
  60.    average chain length of 4.  Spreading the slot cost over the 4
  61.    chain elements:

  62.    4 (slot) / 4 (chain length) + 1 (length) + 4 (chain) = 6 bytes

  63.    hashtab: This uses a more traditional re-hash algorithm where the
  64.    chain is maintained within the hash table.  The table occupancy is
  65.    kept below 75% but we'll assume its perfect:

  66.    4 (slot) x 4/3 (occupancy) +  1 (length) = 6 1/3 bytes

  67.    So a perfect hashtab has just slightly larger than an average
  68.    bcache.

  69.    It turns out that an average hashtab is far worse.  Two things
  70.    hurt:

  71.    - Hashtab's occupancy is more like 50% (it ranges between 38% and
  72.    75%) giving a per slot cost of 4x2 vs 4x4/3.

  73.    - the string structure needs to be aligned to 8 bytes which for
  74.    hashtab wastes 7 bytes, while for bcache wastes only 3.

  75.    This gives:

  76.    hashtab: 4 x 2 + 1 + 7 = 16 bytes

  77.    bcache 4 / 4 + 1 + 4 + 3 = 9 bytes

  78.    The numbers of GDB debugging GDB support this.  ~40% vs ~70% overhead.


  79.    Speed of bcache VS hashtab (the half hash hack):

  80.    While hashtab has a typical chain length of 1, bcache has a chain
  81.    length of round 4.  This means that the bcache will require
  82.    something like double the number of compares after that initial
  83.    hash.  In both cases the comparison takes the form:

  84.    a.length == b.length && memcmp (a.data, b.data, a.length) == 0

  85.    That is lengths are checked before doing the memcmp.

  86.    For GDB debugging GDB, it turned out that all lengths were 24 bytes
  87.    (no C++ so only psymbols were cached) and hence, all compares
  88.    required a call to memcmp.  As a hack, two bytes of padding
  89.    (mentioned above) are used to store the upper 16 bits of the
  90.    string's hash value and then that is used in the comparison vis:

  91.    a.half_hash == b.half_hash && a.length == b.length && memcmp
  92.    (a.data, b.data, a.length)

  93.    The numbers from GDB debugging GDB show this to be a remarkable
  94.    100% effective (only necessary length and memcmp tests being
  95.    performed).

  96.    Mind you, looking at the wall clock, the same GDB debugging GDB
  97.    showed only marginal speed up (0.780 vs 0.773s).  Seems GDB is too
  98.    busy doing something else :-(

  99. */


  100. struct bcache;

  101. /* Find a copy of the LENGTH bytes at ADDR in BCACHE.  If BCACHE has
  102.    never seen those bytes before, add a copy of them to BCACHE.  In
  103.    either case, return a pointer to BCACHE's copy of that string.
  104.    Since the cached value is ment to be read-only, return a const
  105.    buffer.  */
  106. extern const void *bcache (const void *addr, int length,
  107.                            struct bcache *bcache);

  108. /* Like bcache, but if ADDED is not NULL, set *ADDED to true if the
  109.    bytes were newly added to the cache, or to false if the bytes were
  110.    found in the cache.  */
  111. extern const void *bcache_full (const void *addr, int length,
  112.                                 struct bcache *bcache, int *added);

  113. /* Free all the storage used by BCACHE.  */
  114. extern void bcache_xfree (struct bcache *bcache);

  115. /* Create a new bcache object.  */
  116. extern struct bcache *bcache_xmalloc (
  117.     unsigned long (*hash_function)(const void *, int length),
  118.     int (*compare_function)(const void *, const void *, int length));

  119. /* Print statistics on BCACHE's memory usage and efficacity at
  120.    eliminating duplication.  TYPE should be a string describing the
  121.    kind of data BCACHE holds.  Statistics are printed using
  122.    `printf_filtered' and its ilk.  */
  123. extern void print_bcache_statistics (struct bcache *bcache, char *type);
  124. extern int bcache_memory_used (struct bcache *bcache);

  125. /* The hash functions */
  126. extern unsigned long hash(const void *addr, int length);
  127. extern unsigned long hash_continue (const void *addr, int length,
  128.                                     unsigned long h);

  129. #endif /* BCACHE_H */