From 6513fc5eb55b306e2b1088123498e6c50b9e7273 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bj=C3=B6rn=20Gustavsson?= Date: Thu, 12 Mar 2015 15:35:13 +0100 Subject: Update Efficiency Guide MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Language cleaned up by the technical writers xsipewe and tmanevik from Combitech. Proofreading and corrections by Björn Gustavsson. --- system/doc/efficiency_guide/advanced.xml | 296 ++++++++++--------- system/doc/efficiency_guide/binaryhandling.xml | 359 +++++++++++++----------- system/doc/efficiency_guide/commoncaveats.xml | 135 +++++---- system/doc/efficiency_guide/drivers.xml | 115 ++++---- system/doc/efficiency_guide/functions.xml | 120 ++++---- system/doc/efficiency_guide/introduction.xml | 28 +- system/doc/efficiency_guide/listhandling.xml | 120 ++++---- system/doc/efficiency_guide/myths.xml | 128 ++++----- system/doc/efficiency_guide/processes.xml | 159 ++++++----- system/doc/efficiency_guide/profiling.xml | 319 +++++++++++---------- system/doc/efficiency_guide/tablesDatabases.xml | 194 ++++++------- 11 files changed, 1027 insertions(+), 946 deletions(-) (limited to 'system') diff --git a/system/doc/efficiency_guide/advanced.xml b/system/doc/efficiency_guide/advanced.xml index 51f1b2612c..3513a91e34 100644 --- a/system/doc/efficiency_guide/advanced.xml +++ b/system/doc/efficiency_guide/advanced.xml @@ -18,7 +18,6 @@ basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. - Advanced @@ -31,175 +30,216 @@
Memory -

A good start when programming efficiently is to have knowledge about +

A good start when programming efficiently is to know how much memory different data types and operations require. It is implementation-dependent how much memory the Erlang data types and - other items consume, but here are some figures for the - erts-5.2 system (OTP release R9B). (There have been no significant - changes in R13.)

+ other items consume, but the following table shows some figures for + the erts-5.2 system in R9B. There have been no significant + changes in R13.

-

The unit of measurement is memory words. There exists both a 32-bit - and a 64-bit implementation, and a word is therefore, 4 bytes or +

The unit of measurement is memory words. There exists both a + 32-bit and a 64-bit implementation. A word is therefore 4 bytes or 8 bytes, respectively.

- Data type - Memory size + Data Type + Memory Size - Small integer - 1 word

-On 32-bit architectures: -134217729 < i < 134217728 (28 bits)

-On 64-bit architectures: -576460752303423489 < i < 576460752303423488 (60 bits)
+ Small integer + 1 word.

+ On 32-bit architectures: -134217729 < i < 134217728 + (28 bits).

+ On 64-bit architectures: -576460752303423489 < i < + 576460752303423488 (60 bits).
- Big integer - 3..N words + Large integer + 3..N words. - Atom - 1 word. Note: an atom refers into - an atom table which also consumes memory. + Atom + 1 word.

+ An atom refers into an atom table, which also consumes memory. The atom text is stored once for each unique atom in this table. The atom table is not garbage-collected.
- Float - On 32-bit architectures: 4 words

-On 64-bit architectures: 3 words
+ Float + On 32-bit architectures: 4 words.

+ On 64-bit architectures: 3 words.
- Binary - 3..6 + data (can be shared) + Binary + 3..6 words + data (can be shared). - List - 1 word + 1 word per element + the size of each element + List + 1 word + 1 word per element + the size of each element. - String (is the same as a list of integers) - 1 word + 2 words per character + String (is the same as a list of integers) + 1 word + 2 words per character. - Tuple - 2 words + the size of each element + Tuple + 2 words + the size of each element. - Pid - 1 word for a process identifier from the current local node, and 5 words for a process identifier from another node. Note: a process identifier refers into a process table and a node table which also consumes memory. + Pid + 1 word for a process identifier from the current local node + + 5 words for a process identifier from another node.

+ A process identifier refers into a process table and a node table, + which also consumes memory.
- Port - 1 word for a port identifier from the current local node, and 5 words for a port identifier from another node. Note: a port identifier refers into a port table and a node table which also consumes memory. + Port + 1 word for a port identifier from the current local node + + 5 words for a port identifier from another node.

+ A port identifier refers into a port table and a node table, + which also consumes memory.
- Reference - On 32-bit architectures: 5 words for a reference from the current local node, and 7 words for a reference from another node.

-On 64-bit architectures: 4 words for a reference from the current local node, and 6 words for a reference from another node. Note: a reference refers into a node table which also consumes memory.
+ Reference + On 32-bit architectures: 5 words for a reference from the + current local node + 7 words for a reference from another + node.

+ On 64-bit architectures: 4 words for a reference from the current + local node + 6 words for a reference from another node.

+ A reference refers into a node table, which also consumes + memory.
- Fun - 9..13 words + size of environment. Note: a fun refers into a fun table which also consumes memory. + Fun + 9..13 words + the size of environment.

+ A fun refers into a fun table, which also consumes memory.
- Ets table - Initially 768 words + the size of each element (6 words + size of Erlang data). The table will grow when necessary. + Ets table + Initially 768 words + the size of each element (6 words + + the size of Erlang data). The table grows when necessary. - Erlang process - 327 words when spawned including a heap of 233 words. + Erlang process + 327 words when spawned, including a heap of 233 words. - Memory size of different data types + Memory Size of Different Data Types
- System limits -

The Erlang language specification puts no limits on number of processes, - length of atoms etc., but for performance and memory saving reasons, - there will always be limits in a practical implementation of the Erlang - language and execution environment.

- - Processes - -

The maximum number of simultaneously alive Erlang processes is - by default 32768. This limit can be configured at startup, - for more information see the - +P - command line flag of - erl(1).

-
- Distributed nodes - - - Known nodes - -

A remote node Y has to be known to node X if there exist - any pids, ports, references, or funs (Erlang data types) from Y - on X, or if X and Y are connected. The maximum number of remote - nodes simultaneously/ever known to a node is limited by the - maximum number of atoms - available for node names. All data concerning remote nodes, - except for the node name atom, are garbage-collected.

-
- Connected nodes - The maximum number of simultaneously connected nodes is limited by - either the maximum number of simultaneously known remote nodes, - the maximum number of (Erlang) ports - available, or - the maximum number of sockets - available. -
-
- Characters in an atom - 255 - Atoms - - By default, the maximum number of atoms is 1048576. - This limit can be raised or lowered using the +t option. - Ets-tables - The default is 1400, can be changed with the environment variable ERL_MAX_ETS_TABLES. - Elements in a tuple - The maximum number of elements in a tuple is 67108863 (26 bit unsigned integer). Other factors - such as the available memory can of course make it hard to create a tuple of that size. - Size of binary - In the 32-bit implementation of Erlang, 536870911 bytes is the - largest binary that can be constructed or matched using the bit syntax. - (In the 64-bit implementation, the maximum size is 2305843009213693951 bytes.) - If the limit is exceeded, bit syntax construction will fail with a - system_limit exception, while any attempt to match a binary that is - too large will fail. - This limit is enforced starting with the R11B-4 release; in earlier releases, - operations on too large binaries would in general either fail or give incorrect - results. - In future releases of Erlang/OTP, other operations that create binaries (such as - list_to_binary/1) will probably also enforce the same limit. - Total amount of data allocated by an Erlang node - The Erlang runtime system can use the complete 32 (or 64) bit address space, - but the operating system often limits a single process to use less than that. - Length of a node name - An Erlang node name has the form host@shortname or host@longname. The node name is - used as an atom within the system so the maximum size of 255 holds for the node name too. - Open ports - - -

The maximum number of simultaneously open Erlang ports is - often by default 16384. This limit can be configured at startup, - for more information see the - +Q - command line flag of - erl(1).

-
- Open files, and sockets - + System Limits +

The Erlang language specification puts no limits on the number of + processes, length of atoms, and so on. However, for performance and + memory saving reasons, there will always be limits in a practical + implementation of the Erlang language and execution environment.

- The maximum number of simultaneously open files and sockets - depend on - the maximum number of Erlang ports - available, and operating system specific settings and limits.
- Number of arguments to a function or fun - 255 -
+ + + Processes + The maximum number of simultaneously alive Erlang processes + is by default 32,768. This limit can be configured at startup. + For more information, see the + +P + command-line flag in the + erl(1) + manual page in erts. + + + Known nodes + A remote node Y must be known to node X if there exists + any pids, ports, references, or funs (Erlang data types) from Y + on X, or if X and Y are connected. The maximum number of remote + nodes simultaneously/ever known to a node is limited by the + maximum number of atoms + available for node names. All data concerning remote nodes, + except for the node name atom, are garbage-collected. + + + Connected nodes + The maximum number of simultaneously connected nodes is + limited by either the maximum number of simultaneously known + remote nodes, + the maximum number of (Erlang) ports + available, or + the maximum number of sockets + available. + + + Characters in an atom + 255. + + + Atoms + By default, the maximum number of atoms is 1,048,576. This + limit can be raised or lowered using the +t option. + + + Ets tables + Default is 1400. It can be changed with the environment + variable ERL_MAX_ETS_TABLES. + + + Elements in a tuple + The maximum number of elements in a tuple is 67,108,863 + (26-bit unsigned integer). Clearly, other factors such as the + available memory can make it difficult to create a tuple of + that size. + + + Size of binary + In the 32-bit implementation of Erlang, 536,870,911 + bytes is the largest binary that can be constructed or matched + using the bit syntax. In the 64-bit implementation, the maximum + size is 2,305,843,009,213,693,951 bytes. If the limit is + exceeded, bit syntax construction fails with a + system_limit exception, while any attempt to match a + binary that is too large fails. This limit is enforced starting + in R11B-4.

+ In earlier Erlang/OTP releases, operations on too large + binaries in general either fail or give incorrect results. In + future releases, other operations that create binaries (such as + list_to_binary/1) will probably also enforce the same + limit.
+
+ + Total amount of data allocated by an Erlang node + The Erlang runtime system can use the complete 32-bit + (or 64-bit) address space, but the operating system often + limits a single process to use less than that. + + + Length of a node name + An Erlang node name has the form host@shortname or + host@longname. The node name is used as an atom within + the system, so the maximum size of 255 holds also for the + node name. + + + Open ports + The maximum number of simultaneously open Erlang ports is + often by default 16,384. This limit can be configured at startup. + For more information, see the + +Q + command-line flag in the + erl(1) manual page + in erts. + + + Open files and + sockets + The maximum number of simultaneously open files and + sockets depends on + the maximum number of Erlang ports + available, as well as on operating system-specific settings + and limits. + + + Number of arguments to a function or fun + 255 + + System Limits +
diff --git a/system/doc/efficiency_guide/binaryhandling.xml b/system/doc/efficiency_guide/binaryhandling.xml index 4ba1378059..0ac1a7ee32 100644 --- a/system/doc/efficiency_guide/binaryhandling.xml +++ b/system/doc/efficiency_guide/binaryhandling.xml @@ -23,7 +23,7 @@ The Initial Developer of the Original Code is Ericsson AB. - Constructing and matching binaries + Constructing and Matching Binaries Bjorn Gustavsson 2007-10-12 @@ -31,10 +31,10 @@ binaryhandling.xml -

In R12B, the most natural way to write binary construction and matching is now +

In R12B, the most natural way to construct and match binaries is significantly faster than in earlier releases.

-

To construct at binary, you can simply write

+

To construct a binary, you can simply write as follows:

DO (in R12B) / REALLY DO NOT (in earlier releases)

my_list_to_binary([], Acc) -> Acc.]]> -

In releases before R12B, Acc would be copied in every iteration. - In R12B, Acc will be copied only in the first iteration and extra - space will be allocated at the end of the copied binary. In the next iteration, - H will be written in to the extra space. When the extra space runs out, - the binary will be reallocated with more extra space.

- -

The extra space allocated (or reallocated) will be twice the size of the +

In releases before R12B, Acc is copied in every iteration. + In R12B, Acc is copied only in the first iteration and extra + space is allocated at the end of the copied binary. In the next iteration, + H is written into the extra space. When the extra space runs out, + the binary is reallocated with more extra space. The extra space allocated + (or reallocated) is twice the size of the existing binary data, or 256, whichever is larger.

The most natural way to match binaries is now the fastest:

@@ -64,55 +63,79 @@ my_binary_to_list(<>) -> my_binary_to_list(<<>>) -> [].]]>
- How binaries are implemented + How Binaries are Implemented

Internally, binaries and bitstrings are implemented in the same way. - In this section, we will call them binaries since that is what + In this section, they are called binaries because that is what they are called in the emulator source code.

-

There are four types of binary objects internally. Two of them are - containers for binary data and two of them are merely references to - a part of a binary.

- -

The binary containers are called refc binaries - (short for reference-counted binaries) and heap binaries.

+

Four types of binary objects are available internally:

+ +

Two are containers for binary data and are called:

+ + Refc binaries (short for + reference-counted binaries) + Heap binaries +
+

Two are merely references to a part of a binary and + are called:

+ + sub binaries + match contexts +
+
-

Refc binaries - consist of two parts: an object stored on - the process heap, called a ProcBin, and the binary object itself - stored outside all process heaps.

+
+ + Refc Binaries +

Refc binaries consist of two parts:

+ + An object stored on the process heap, called a + ProcBin + The binary object itself, stored outside all process + heaps +

The binary object can be referenced by any number of ProcBins from any - number of processes; the object contains a reference counter to keep track + number of processes. The object contains a reference counter to keep track of the number of references, so that it can be removed when the last reference disappears.

All ProcBin objects in a process are part of a linked list, so that the garbage collector can keep track of them and decrement the reference counters in the binary when a ProcBin disappears.

+
-

Heap binaries are small binaries, - up to 64 bytes, that are stored directly on the process heap. - They will be copied when the process - is garbage collected and when they are sent as a message. They don't +

+ + Heap Binaries +

Heap binaries are small binaries, up to 64 bytes, and are stored + directly on the process heap. They are copied when the process is + garbage-collected and when they are sent as a message. They do not require any special handling by the garbage collector.

+
-

There are two types of reference objects that can reference part of - a refc binary or heap binary. They are called sub binaries and - match contexts.

+
+ Sub Binaries +

The reference objects sub binaries and + match contexts can reference part of + a refc binary or heap binary.

A sub binary is created by split_binary/2 and when a binary is matched out in a binary pattern. A sub binary is a reference - into a part of another binary (refc or heap binary, never into a another + into a part of another binary (refc or heap binary, but never into another sub binary). Therefore, matching out a binary is relatively cheap because the actual binary data is never copied.

+
-

A match context is - similar to a sub binary, but is optimized - for binary matching; for instance, it contains a direct pointer to the binary - data. For each field that is matched out of a binary, the position in the - match context will be incremented.

+
+ Match Context + +

A match context is similar to a sub binary, but is + optimized for binary matching. For example, it contains a direct + pointer to the binary data. For each field that is matched out of + a binary, the position in the match context is incremented.

In R11B, a match context was only used during a binary matching operation.

@@ -122,27 +145,28 @@ my_binary_to_list(<<>>) -> [].]]> context and discard the sub binary. Instead of creating a sub binary, the match context is kept.

-

The compiler can only do this optimization if it can know for sure +

The compiler can only do this optimization if it knows that the match context will not be shared. If it would be shared, the functional properties (also called referential transparency) of Erlang would break.

+
- Constructing binaries - -

In R12B, appending to a binary or bitstring

+ Constructing Binaries +

In R12B, appending to a binary or bitstring + is specially optimized by the runtime system:

> <>]]> -

is specially optimized by the run-time system. - Because the run-time system handles the optimization (instead of +

As the runtime system handles the optimization (instead of the compiler), there are very few circumstances in which the optimization - will not work.

+ does not work.

-

To explain how it works, we will go through this code

+

To explain how it works, let us examine the following code line + by line:

>, %% 1 @@ -152,81 +176,81 @@ Bin3 = <>, %% 4 Bin4 = <>, %% 5 !!! {Bin4,Bin3} %% 6]]> -

line by line.

- -

The first line (marked with the %% 1 comment), assigns + + Line 1 (marked with the %% 1 comment), assigns a heap binary to - the variable Bin0.

+ the Bin0 variable. -

The second line is an append operation. Since Bin0 + Line 2 is an append operation. As Bin0 has not been involved in an append operation, a new refc binary - will be created and the contents of Bin0 will be copied - into it. The ProcBin part of the refc binary will have + is created and the contents of Bin0 is copied + into it. The ProcBin part of the refc binary has its size set to the size of the data stored in the binary, while - the binary object will have extra space allocated. - The size of the binary object will be either twice the + the binary object has extra space allocated. + The size of the binary object is either twice the size of Bin0 or 256, whichever is larger. In this case - it will be 256.

+ it is 256. -

It gets more interesting in the third line. + Line 3 is more interesting. Bin1 has been used in an append operation, - and it has 255 bytes of unused storage at the end, so the three new bytes - will be stored there.

+ and it has 255 bytes of unused storage at the end, so the 3 new + bytes are stored there. -

Same thing in the fourth line. There are 252 bytes left, - so there is no problem storing another three bytes.

+ Line 4. The same applies here. There are 252 bytes left, + so there is no problem storing another 3 bytes. -

But in the fifth line something interesting happens. - Note that we don't append to the previous result in Bin3, - but to Bin1. We expect that Bin4 will be assigned - the value <<0,1,2,3,17>>. We also expect that + Line 5. Here, something interesting happens. Notice + that the result is not appended to the previous result in Bin3, + but to Bin1. It is expected that Bin4 will be assigned + the value <<0,1,2,3,17>>. It is also expected that Bin3 will retain its value (<<0,1,2,3,4,5,6,7,8,9>>). - Clearly, the run-time system cannot write the byte 17 into the binary, + Clearly, the runtime system cannot write byte 17 into the binary, because that would change the value of Bin3 to - <<0,1,2,3,4,17,6,7,8,9>>.

- -

What will happen?

+ <<0,1,2,3,4,17,6,7,8,9>>. + -

The run-time system will see that Bin1 is the result +

The runtime system sees that Bin1 is the result from a previous append operation (not from the latest append operation), - so it will copy the contents of Bin1 to a new binary - and reserve extra storage and so on. (We will not explain here how the - run-time system can know that it is not allowed to write into Bin1; + so it copies the contents of Bin1 to a new binary, + reserve extra storage, and so on. (Here is not explained how the + runtime system can know that it is not allowed to write into Bin1; it is left as an exercise to the curious reader to figure out how it is done by reading the emulator sources, primarily erl_bits.c.)

- Circumstances that force copying + Circumstances That Force Copying

The optimization of the binary append operation requires that there is a single ProcBin and a single reference to the ProcBin for the binary. The reason is that the binary object can be - moved (reallocated) during an append operation, and when that happens + moved (reallocated) during an append operation, and when that happens, the pointer in the ProcBin must be updated. If there would be more than one ProcBin pointing to the binary object, it would not be possible to find and update all of them.

-

Therefore, certain operations on a binary will mark it so that +

Therefore, certain operations on a binary mark it so that any future append operation will be forced to copy the binary. In most cases, the binary object will be shrunk at the same time to reclaim the extra space allocated for growing.

-

When appending to a binary

+

When appending to a binary as follows, only the binary returned + from the latest append operation will support further cheap append + operations:

>]]> -

only the binary returned from the latest append operation will - support further cheap append operations. In the code fragment above, +

In the code fragment in the beginning of this section, appending to Bin will be cheap, while appending to Bin0 will force the creation of a new binary and copying of the contents of Bin0.

If a binary is sent as a message to a process or port, the binary will be shrunk and any further append operation will copy the binary - data into a new binary. For instance, in the following code fragment

+ data into a new binary. For example, in the following code fragment + Bin1 will be copied in the third line:

>, @@ -234,12 +258,12 @@ PortOrPid ! Bin1, Bin = <> %% Bin1 will be COPIED ]]> -

Bin1 will be copied in the third line.

- -

The same thing happens if you insert a binary into an ets - table or send it to a port using erlang:port_command/2 or pass it to +

The same happens if you insert a binary into an Ets + table, send it to a port using erlang:port_command/2, or + pass it to enif_inspect_binary in a NIF.

+

Matching a binary will also cause it to shrink and the next append operation will copy the binary data:

@@ -249,22 +273,23 @@ Bin1 = <>, Bin = <> %% Bin1 will be COPIED ]]> -

The reason is that a match context +

The reason is that a + match context contains a direct pointer to the binary data.

-

If a process simply keeps binaries (either in "loop data" or in the process - dictionary), the garbage collector may eventually shrink the binaries. - If only one such binary is kept, it will not be shrunk. If the process later - appends to a binary that has been shrunk, the binary object will be reallocated - to make place for the data to be appended.

+

If a process simply keeps binaries (either in "loop data" or in the + process + dictionary), the garbage collector can eventually shrink the binaries. + If only one such binary is kept, it will not be shrunk. If the process + later appends to a binary that has been shrunk, the binary object will + be reallocated to make place for the data to be appended.

-
- Matching binaries + Matching Binaries -

We will revisit the example shown earlier

+

Let us revisit the example in the beginning of the previous section:

DO (in R12B)

>) -> [H|my_binary_to_list(T)]; my_binary_to_list(<<>>) -> [].]]> -

too see what is happening under the hood.

- -

The very first time my_binary_to_list/1 is called, +

The first time my_binary_to_list/1 is called, a match context - will be created. The match context will point to the first - byte of the binary. One byte will be matched out and the match context - will be updated to point to the second byte in the binary.

+ is created. The match context points to the first + byte of the binary. 1 byte is matched out and the match context + is updated to point to the second byte in the binary.

-

In R11B, at this point a sub binary +

In R11B, at this point a + sub binary would be created. In R12B, the compiler sees that there is no point in creating a sub binary, because there will soon be a call to a function (in this case, - to my_binary_to_list/1 itself) that will immediately + to my_binary_to_list/1 itself) that immediately will create a new match context and discard the sub binary.

-

Therefore, in R12B, my_binary_to_list/1 will call itself +

Therefore, in R12B, my_binary_to_list/1 calls itself with the match context instead of with a sub binary. The instruction - that initializes the matching operation will basically do nothing + that initializes the matching operation basically does nothing when it sees that it was passed a match context instead of a binary.

When the end of the binary is reached and the second clause matches, the match context will simply be discarded (removed in the next - garbage collection, since there is no longer any reference to it).

+ garbage collection, as there is no longer any reference to it).

To summarize, my_binary_to_list/1 in R12B only needs to create one match context and no sub binaries. In R11B, if the binary contains N bytes, N+1 match contexts and N - sub binaries will be created.

+ sub binaries are created.

-

In R11B, the fastest way to match binaries is:

+

In R11B, the fastest way to match binaries is as follows:

DO NOT (in R12B)

end.]]>

This function cleverly avoids building sub binaries, but it cannot - avoid building a match context in each recursion step. Therefore, in both R11B and R12B, + avoid building a match context in each recursion step. + Therefore, in both R11B and R12B, my_complicated_binary_to_list/1 builds N+1 match - contexts. (In a future release, the compiler might be able to generate code - that reuses the match context, but don't hold your breath.)

+ contexts. (In a future Erlang/OTP release, the compiler might be able + to generate code that reuses the match context.)

-

Returning to my_binary_to_list/1, note that the match context was - discarded when the entire binary had been traversed. What happens if +

Returning to my_binary_to_list/1, notice that the match context + was discarded when the entire binary had been traversed. What happens if the iteration stops before it has reached the end of the binary? Will the optimization still work?

@@ -336,29 +361,23 @@ after_zero(<<>>) -> <<>>. ]]> -

Yes, it will. The compiler will remove the building of the sub binary in the - second clause

+

Yes, it will. The compiler will remove the building of the sub binary in + the second clause:

>) -> after_zero(T); -. -. -.]]> +...]]> -

but will generate code that builds a sub binary in the first clause

+

But it will generate code that builds a sub binary in the first clause:

>) -> T; -. -. -.]]> +...]]> -

Therefore, after_zero/1 will build one match context and one sub binary +

Therefore, after_zero/1 builds one match context and one sub binary (assuming it is passed a binary that contains a zero byte).

Code like the following will also be optimized:

@@ -371,12 +390,14 @@ all_but_zeroes_to_list(<<0,T/binary>>, Acc, Remaining) -> all_but_zeroes_to_list(<>, Acc, Remaining) -> all_but_zeroes_to_list(T, [Byte|Acc], Remaining-1).]]> -

The compiler will remove building of sub binaries in the second and third clauses, - and it will add an instruction to the first clause that will convert Buffer - from a match context to a sub binary (or do nothing if Buffer already is a binary).

+

The compiler removes building of sub binaries in the second and third + clauses, and it adds an instruction to the first clause that converts + Buffer from a match context to a sub binary (or do nothing if + Buffer is a binary already).

-

Before you begin to think that the compiler can optimize any binary patterns, - here is a function that the compiler (currently, at least) is not able to optimize:

+

Before you begin to think that the compiler can optimize any binary + patterns, the following function cannot be optimized by the compiler + (currently, at least):

>) -> @@ -386,43 +407,43 @@ non_opt_eq([_|_], <<_,_/binary>>) -> non_opt_eq([], <<>>) -> true.]]> -

It was briefly mentioned earlier that the compiler can only delay creation of - sub binaries if it can be sure that the binary will not be shared. In this case, - the compiler cannot be sure.

+

It was mentioned earlier that the compiler can only delay creation of + sub binaries if it knows that the binary will not be shared. In this case, + the compiler cannot know.

-

We will soon show how to rewrite non_opt_eq/2 so that the delayed sub binary - optimization can be applied, and more importantly, we will show how you can find out - whether your code can be optimized.

+

Soon it is shown how to rewrite non_opt_eq/2 so that the delayed + sub binary optimization can be applied, and more importantly, it is shown + how you can find out whether your code can be optimized.

- The bin_opt_info option + Option bin_opt_info

Use the bin_opt_info option to have the compiler print a lot of - information about binary optimizations. It can be given either to the compiler or - erlc

+ information about binary optimizations. It can be given either to the + compiler or erlc:

-

or passed via an environment variable

+

or passed through an environment variable:

-

Note that the bin_opt_info is not meant to be a permanent option added - to your Makefiles, because it is not possible to eliminate all messages that - it generates. Therefore, passing the option through the environment is in most cases - the most practical approach.

+

Notice that the bin_opt_info is not meant to be a permanent + option added to your Makefiles, because all messages that it + generates cannot be eliminated. Therefore, passing the option through + the environment is in most cases the most practical approach.

-

The warnings will look like this:

+

The warnings look as follows:

-

To make it clearer exactly what code the warnings refer to, - in the examples that follow, the warnings are inserted as comments - after the clause they refer to:

+

To make it clearer exactly what code the warnings refer to, the + warnings in the following examples are inserted as comments + after the clause they refer to, for example:

>) -> @@ -434,12 +455,12 @@ after_zero(<<_,T/binary>>) -> after_zero(<<>>) -> <<>>.]]> -

The warning for the first clause tells us that it is not possible to - delay the creation of a sub binary, because it will be returned. - The warning for the second clause tells us that a sub binary will not be +

The warning for the first clause says that the creation of a sub + binary cannot be delayed, because it will be returned. + The warning for the second clause says that a sub binary will not be created (yet).

-

It is time to revisit the earlier example of the code that could not +

Let us revisit the earlier example of the code that could not be optimized and find out why:

>) -> non_opt_eq([], <<>>) -> true.]]> -

The compiler emitted two warnings. The INFO warning refers to the function - non_opt_eq/2 as a callee, indicating that any functions that call non_opt_eq/2 - will not be able to make delayed sub binary optimization. - There is also a suggestion to change argument order. - The second warning (that happens to refer to the same line) refers to the construction of - the sub binary itself.

+

The compiler emitted two warnings. The INFO warning refers + to the function non_opt_eq/2 as a callee, indicating that any + function that call non_opt_eq/2 cannot make delayed sub binary + optimization. There is also a suggestion to change argument order. + The second warning (that happens to refer to the same line) refers to + the construction of the sub binary itself.

-

We will soon show another example that should make the distinction between INFO - and NOT OPTIMIZED warnings somewhat clearer, but first we will heed the suggestion - to change argument order:

+

Soon another example will show the difference between the + INFO and NOT OPTIMIZED warnings somewhat clearer, but + let us first follow the suggestion to change argument order:

>, [H|T2]) -> @@ -485,15 +506,13 @@ match_body([0|_], <>) -> %% sub binary optimization; %% SUGGEST changing argument order done; -. -. -.]]> +...]]>

The warning means that if there is a call to match_body/2 (from another clause in match_body/2 or another function), the - delayed sub binary optimization will not be possible. There will be additional - warnings for any place where a sub binary is matched out at the end of and - passed as the second argument to match_body/2. For instance:

+ delayed sub binary optimization will not be possible. More warnings will + occur for any place where a sub binary is matched out at the end of and + passed as the second argument to match_body/2, for example:

>) -> @@ -504,10 +523,10 @@ match_head(List, <<_:10,Data/binary>>) ->
- Unused variables + Unused Variables -

The compiler itself figures out if a variable is unused. The same - code is generated for each of the following functions

+

The compiler figures out if a variable is unused. The same + code is generated for each of the following functions:

>, Count) -> count1(T, Count+1); @@ -519,11 +538,9 @@ count2(<<>>, Count) -> Count. count3(<<_H,T/binary>>, Count) -> count3(T, Count+1); count3(<<>>, Count) -> Count.]]> -

In each iteration, the first 8 bits in the binary will be skipped, not matched out.

- +

In each iteration, the first 8 bits in the binary will be skipped, + not matched out.

-
- diff --git a/system/doc/efficiency_guide/commoncaveats.xml b/system/doc/efficiency_guide/commoncaveats.xml index 551b0a03e6..71991d342f 100644 --- a/system/doc/efficiency_guide/commoncaveats.xml +++ b/system/doc/efficiency_guide/commoncaveats.xml @@ -18,7 +18,6 @@ basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. - Common Caveats @@ -29,49 +28,50 @@ commoncaveats.xml -

Here we list a few modules and BIFs to watch out for, and not only +

This section lists a few modules and BIFs to watch out for, not only from a performance point of view.

- The timer module + Timer Module

Creating timers using erlang:send_after/3 - and erlang:start_timer/3 + and + erlang:start_timer/3 +, is much more efficient than using the timers provided by the - timer module. The - timer module uses a separate process to manage the timers, - and that process can easily become overloaded if many processes + timer module in STDLIB. + The timer module uses a separate process to manage the timers. + That process can easily become overloaded if many processes create and cancel timers frequently (especially when using the SMP emulator).

-

The functions in the timer module that do not manage timers (such as - timer:tc/3 or timer:sleep/1), do not call the timer-server process - and are therefore harmless.

+

The functions in the timer module that do not manage timers + (such as timer:tc/3 or timer:sleep/1), do not call the + timer-server process and are therefore harmless.

list_to_atom/1 -

Atoms are not garbage-collected. Once an atom is created, it will never - be removed. The emulator will terminate if the limit for the number - of atoms (1048576 by default) is reached.

+

Atoms are not garbage-collected. Once an atom is created, it is never + removed. The emulator terminates if the limit for the number + of atoms (1,048,576 by default) is reached.

-

Therefore, converting arbitrary input strings to atoms could be - dangerous in a system that will run continuously. - If only certain well-defined atoms are allowed as input, you can use +

Therefore, converting arbitrary input strings to atoms can be + dangerous in a system that runs continuously. + If only certain well-defined atoms are allowed as input, list_to_existing_atom/1 + can be used to to guard against a denial-of-service attack. (All atoms that are allowed - must have been created earlier, for instance by simply using all of them + must have been created earlier, for example, by simply using all of them in a module and loading that module.)

Using list_to_atom/1 to construct an atom that is passed to - apply/3 like this

- + apply/3 as follows, is quite expensive and not recommended + in time-critical code:

-apply(list_to_atom("some_prefix"++Var), foo, Args) - -

is quite expensive and is not recommended in time-critical code.

+apply(list_to_atom("some_prefix"++Var), foo, Args)
@@ -81,25 +81,25 @@ apply(list_to_atom("some_prefix"++Var), foo, Args) length of the list, as opposed to tuple_size/1, byte_size/1, and bit_size/1, which all execute in constant time.

-

Normally you don't have to worry about the speed of length/1, - because it is efficiently implemented in C. In time critical-code, though, - you might want to avoid it if the input list could potentially be very long.

+

Normally, there is no need to worry about the speed of length/1, + because it is efficiently implemented in C. In time-critical code, + you might want to avoid it if the input list could potentially be very + long.

Some uses of length/1 can be replaced by matching. - For instance, this code

- + For example, the following code:

foo(L) when length(L) >= 3 -> ... -

can be rewritten to

+

can be rewritten to:

foo([_,_,_|_]=L) -> ... -

(One slight difference is that length(L) will fail if the L - is an improper list, while the pattern in the second code fragment will - accept an improper list.)

+

One slight difference is that length(L) fails if L + is an improper list, while the pattern in the second code fragment + accepts an improper list.

@@ -107,50 +107,49 @@ foo([_,_,_|_]=L) ->

setelement/3 copies the tuple it modifies. Therefore, updating a tuple in a loop - using setelement/3 will create a new copy of the tuple every time.

+ using setelement/3 creates a new copy of the tuple every time.

There is one exception to the rule that the tuple is copied. If the compiler clearly can see that destructively updating the tuple would - give exactly the same result as if the tuple was copied, the call to - setelement/3 will be replaced with a special destructive setelement - instruction. In the following code sequence

- + give the same result as if the tuple was copied, the call to + setelement/3 is replaced with a special destructive setelement + instruction. In the following code sequence, the first setelement/3 + call copies the tuple and modifies the ninth element:

multiple_setelement(T0) -> T1 = setelement(9, T0, bar), T2 = setelement(7, T1, foobar), setelement(5, T2, new_value). -

the first setelement/3 call will copy the tuple and modify the - ninth element. The two following setelement/3 calls will modify +

The two following setelement/3 calls modify the tuple in place.

-

For the optimization to be applied, all of the followings conditions +

For the optimization to be applied, all the followings conditions must be true:

The indices must be integer literals, not variables or expressions. The indices must be given in descending order. - There must be no calls to other function in between the calls to + There must be no calls to another function in between the calls to setelement/3. The tuple returned from one setelement/3 call must only be used in the subsequent call to setelement/3. -

If it is not possible to structure the code as in the multiple_setelement/1 +

If the code cannot be structured as in the multiple_setelement/1 example, the best way to modify multiple elements in a large tuple is to - convert the tuple to a list, modify the list, and convert the list back to + convert the tuple to a list, modify the list, and convert it back to a tuple.

size/1 -

size/1 returns the size for both tuples and binary.

+

size/1 returns the size for both tuples and binaries.

-

Using the new BIFs tuple_size/1 and byte_size/1 introduced - in R12B gives the compiler and run-time system more opportunities for - optimization. A further advantage is that the new BIFs could help Dialyzer +

Using the new BIFs tuple_size/1 and byte_size/1, introduced + in R12B, gives the compiler and the runtime system more opportunities for + optimization. Another advantage is that the new BIFs can help Dialyzer to find more bugs in your program.

@@ -159,22 +158,21 @@ multiple_setelement(T0) ->

It is usually more efficient to split a binary using matching instead of calling the split_binary/2 function. Furthermore, mixing bit syntax matching and split_binary/2 - may prevent some optimizations of bit syntax matching.

+ can prevent some optimizations of bit syntax matching.

DO

> = Bin,]]>

DO NOT

- {Bin1,Bin2} = split_binary(Bin, Num) - + {Bin1,Bin2} = split_binary(Bin, Num)
- The '--' operator -

Note that the '--' operator has a complexity - proportional to the product of the length of its operands, - meaning that it will be very slow if both of its operands + Operator "--" +

The "--" operator has a complexity + proportional to the product of the length of its operands. + This means that the operator is very slow if both of its operands are long lists:

DO NOT

@@ -182,42 +180,39 @@ multiple_setelement(T0) -> HugeList1 -- HugeList2]]>

Instead use the ordsets - module:

+ module in STDLIB:

DO

HugeSet1 = ordsets:from_list(HugeList1), HugeSet2 = ordsets:from_list(HugeList2), - ordsets:subtract(HugeSet1, HugeSet2) - + ordsets:subtract(HugeSet1, HugeSet2) -

Obviously, that code will not work if the original order +

Obviously, that code does not work if the original order of the list is important. If the order of the list must be - preserved, do like this:

+ preserved, do as follows:

DO

-

Subtle note 1: This code behaves differently from '--' - if the lists contain duplicate elements. (One occurrence - of an element in HugeList2 will remove all +

This code behaves differently from "--" + if the lists contain duplicate elements (one occurrence + of an element in HugeList2 removes all occurrences in HugeList1.)

+

Also, this code compares lists elements using the + "==" operator, while "--" uses the "=:=" operator. + If that difference is important, sets can be used instead of + gb_sets, but sets:from_list/1 is much + slower than gb_sets:from_list/1 for long lists.

-

Subtle note 2: This code compares lists elements using the - '==' operator, while '--' uses the '=:='. If - that difference is important, sets can be used instead of - gb_sets, but note that sets:from_list/1 is much - slower than gb_sets:from_list/1 for long lists.

- -

Using the '--' operator to delete an element +

Using the "--" operator to delete an element from a list is not a performance problem:

OK

- HugeList1 -- [Element] - + HugeList1 -- [Element]
diff --git a/system/doc/efficiency_guide/drivers.xml b/system/doc/efficiency_guide/drivers.xml index dfc49bdf21..33d6333e7d 100644 --- a/system/doc/efficiency_guide/drivers.xml +++ b/system/doc/efficiency_guide/drivers.xml @@ -18,7 +18,6 @@ basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. - Drivers @@ -29,26 +28,26 @@ drivers.xml -

This chapter provides a (very) brief overview on how to write efficient - drivers. It is assumed that you already have a good understanding of +

This section provides a brief overview on how to write efficient drivers.

+

It is assumed that you have a good understanding of drivers.

- Drivers and concurrency + Drivers and Concurrency -

The run-time system will always take a lock before running +

The runtime system always takes a lock before running any code in a driver.

-

By default, that lock will be at the driver level, meaning that +

By default, that lock is at the driver level, that is, if several ports have been opened to the same driver, only code for one port at the same time can be running.

-

A driver can be configured to instead have one lock for each port.

+

A driver can be configured to have one lock for each port instead.

-

If a driver is used in a functional way (i.e. it holds no state, +

If a driver is used in a functional way (that is, holds no state, but only does some heavy calculation and returns a result), several - ports with registered names can be opened beforehand and the port to - be used can be chosen based on the scheduler ID like this:

+ ports with registered names can be opened beforehand, and the port to + be used can be chosen based on the scheduler ID as follows:

-define(PORT_NAMES(), @@ -67,82 +66,82 @@ client_port() ->
- Avoiding copying of binaries when calling a driver + Avoiding Copying Binaries When Calling a Driver

There are basically two ways to avoid copying a binary that is - sent to a driver.

- -

If the Data argument for - port_control/3 - is a binary, the driver will be passed a pointer to the contents of - the binary and the binary will not be copied. - If the Data argument is an iolist (list of binaries and lists), - all binaries in the iolist will be copied.

- -

Therefore, if you want to send both a pre-existing binary and some - additional data to a driver without copying the binary, you must call - port_control/3 twice; once with the binary and once with the - additional data. However, that will only work if there is only one - process communicating with the port (because otherwise another process - could call the driver in-between the calls).

- -

Another way to avoid copying binaries is to implement an outputv - callback (instead of an output callback) in the driver. - If a driver has an outputv callback, refc binaries passed - in an iolist in the Data argument for - port_command/2 - will be passed as references to the driver.

+ sent to a driver:

+ + +

If the Data argument for + port_control/3 + is a binary, the driver will be passed a pointer to the contents of + the binary and the binary will not be copied. If the Data + argument is an iolist (list of binaries and lists), all binaries in + the iolist will be copied.

+ +

Therefore, if you want to send both a pre-existing binary and some + extra data to a driver without copying the binary, you must call + port_control/3 twice; once with the binary and once with the + extra data. However, that will only work if there is only one + process communicating with the port (because otherwise another process + can call the driver in-between the calls).

+ +

Implement an outputv callback (instead of an + output callback) in the driver. If a driver has an + outputv callback, refc binaries passed in an iolist + in the Data argument for + port_command/2 + will be passed as references to the driver.

+
- Returning small binaries from a driver + Returning Small Binaries from a Driver -

The run-time system can represent binaries up to 64 bytes as - heap binaries. They will always be copied when sent in a messages, - but they will require less memory if they are not sent to another +

The runtime system can represent binaries up to 64 bytes as + heap binaries. They are always copied when sent in messages, + but they require less memory if they are not sent to another process and garbage collection is cheaper.

-

If you know that the binaries you return are always small, - you should use driver API calls that do not require a pre-allocated - binary, for instance +

If you know that the binaries you return are always small, you + are advised to use driver API calls that do not require a pre-allocated + binary, for example, driver_output() - or - erl_drv_output_term() + or + erl_drv_output_term(), using the ERL_DRV_BUF2BINARY format, - to allow the run-time to construct a heap binary.

+ to allow the runtime to construct a heap binary.

- Returning big binaries without copying from a driver + Returning Large Binaries without Copying from a Driver -

To avoid copying data when a big binary is sent or returned from +

To avoid copying data when a large binary is sent or returned from the driver to an Erlang process, the driver must first allocate the binary and then send it to an Erlang process in some way.

-

Use driver_alloc_binary() to allocate a binary.

+

Use + driver_alloc_binary() + to allocate a binary.

There are several ways to send a binary created with - driver_alloc_binary().

+ driver_alloc_binary():

-

From the control callback, a binary can be returned provided - that - set_port_control_flags() - has been called with the flag value PORT_CONTROL_FLAG_BINARY.

-
+ From the control callback, a binary can be returned if + set_port_control_flags() + has been called with the flag value PORT_CONTROL_FLAG_BINARY. -

A single binary can be sent with - driver_output_binary().

+ A single binary can be sent with + driver_output_binary(). -

Using + Using erl_drv_output_term() or erl_drv_send_term(), - a binary can be included in an Erlang term.

-
+ a binary can be included in an Erlang term.
- diff --git a/system/doc/efficiency_guide/functions.xml b/system/doc/efficiency_guide/functions.xml index ec1a45eaa9..bd23c9d90d 100644 --- a/system/doc/efficiency_guide/functions.xml +++ b/system/doc/efficiency_guide/functions.xml @@ -18,7 +18,6 @@ basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. - Functions @@ -30,17 +29,18 @@
- Pattern matching -

Pattern matching in function head and in case and receive - clauses are optimized by the compiler. With a few exceptions, there is nothing - to gain by rearranging clauses.

+ Pattern Matching +

Pattern matching in function head as well as in case and + receive clauses are optimized by the compiler. With a few + exceptions, there is nothing to gain by rearranging clauses.

One exception is pattern matching of binaries. The compiler - will not rearrange clauses that match binaries. Placing the - clause that matches against the empty binary last will usually - be slightly faster than placing it first.

+ does not rearrange clauses that match binaries. Placing the + clause that matches against the empty binary last is usually + slightly faster than placing it first.

-

Here is a rather contrived example to show another exception:

+

The following is a rather unnatural example to show another + exception:

DO NOT

@@ -53,27 +53,30 @@ atom_map1(five) -> 5; atom_map1(six) -> 6.

The problem is the clause with the variable Int. - Since a variable can match anything, including the atoms - four, five, and six that the following clauses - also will match, the compiler must generate sub-optimal code that will - execute as follows:

+ As a variable can match anything, including the atoms + four, five, and six, which the following clauses + also match, the compiler must generate suboptimal code that + executes as follows:

-

First the input value is compared to one, two, and + + First, the input value is compared to one, two, and three (using a single instruction that does a binary search; thus, quite efficient even if there are many values) to select which - one of the first three clauses to execute (if any).

+ one of the first three clauses to execute (if any). + + >If none of the first three clauses match, the fourth clause + match as a variable always matches. -

If none of the first three clauses matched, the fourth clause - will match since a variable always matches. If the guard test - is_integer(Int) succeeds, the fourth clause will be - executed.

+ If the guard test is_integer(Int) succeeds, the fourth + clause is executed. -

If the guard test failed, the input value is compared to + If the guard test fails, the input value is compared to four, five, and six, and the appropriate clause - is selected. (There will be a function_clause exception if - none of the values matched.)

+ is selected. (There is a function_clause exception if none of + the values matched.) + -

Rewriting to either

+

Rewriting to either:

DO

5; atom_map2(six) -> 6; atom_map2(Int) when is_integer(Int) -> Int.]]> -

or

+

or:

DO

4; atom_map3(five) -> 5; atom_map3(six) -> 6.]]> -

will give slightly more efficient matching code.

+

gives slightly more efficient matching code.

-

Here is a less contrived example:

+

Another example:

DO NOT

match anything, the compiler is not allowed to rearrange the clauses, but must generate code that matches them in the order written.

-

If the function is rewritten like this

+

If the function is rewritten as follows, the compiler is free to + rearrange the clauses:

DO

map_pairs2(Map, [X|Xs], [Y|Ys]) -> [Map(X, Y)|map_pairs2(Map, Xs, Ys)].]]> -

the compiler is free to rearrange the clauses. It will generate code - similar to this

+

The compiler will generate code similar to this:

DO NOT (already done by the compiler)

Ys0 end.]]> -

which should be slightly faster for presumably the most common case +

This is slightly faster for probably the most common case that the input lists are not empty or very short. - (Another advantage is that Dialyzer is able to deduce a better type - for the variable Xs.)

+ (Another advantage is that Dialyzer can deduce a better type + for the Xs variable.)

- Function Calls + Function Calls -

Here is an intentionally rough guide to the relative costs of - different kinds of calls. It is based on benchmark figures run on +

This is an intentionally rough guide to the relative costs of + different calls. It is based on benchmark figures run on Solaris/Sparc:

Calls to local or external functions (foo(), m:foo()) - are the fastest kind of calls. + are the fastest calls. + Calling or applying a fun (Fun(), apply(Fun, [])) - is about three times as expensive as calling a local function. + is about three times as expensive as calling a local + function. + Applying an exported function (Mod:Name(), - apply(Mod, Name, [])) is about twice as expensive as calling a fun, - or about six times as expensive as calling a local function. + apply(Mod, Name, [])) is about twice as expensive as calling + a fun or about six times as expensive as calling a local + function.
- Notes and implementation details + Notes and Implementation Details

Calling and applying a fun does not involve any hash-table lookup. A fun contains an (indirect) pointer to the function that implements @@ -178,42 +185,44 @@ explicit_map_pairs(Map, Xs0, Ys0) ->

Tuples are not fun(s). A "tuple fun", {Module,Function}, is not a fun. The cost for calling a "tuple fun" is similar to that - of apply/3 or worse. Using "tuple funs" is strongly discouraged, - as they may not be supported in a future release, - and because there exists a superior alternative since the R10B - release, namely the fun Module:Function/Arity syntax.

+ of apply/3 or worse. + Using "tuple funs" is strongly discouraged, + as they might not be supported in a future Erlang/OTP release, + and because there exists a superior alternative from R10B, + namely the fun Module:Function/Arity syntax.

apply/3 must look up the code for the function to execute - in a hash table. Therefore, it will always be slower than a + in a hash table. It is therefore always slower than a direct call or a fun call.

It no longer matters (from a performance point of view) - whether you write

+ whether you write:

Module:Function(Arg1, Arg2) -

or

+

or:

apply(Module, Function, [Arg1,Arg2]) -

(The compiler internally rewrites the latter code into the former.)

+

The compiler internally rewrites the latter code into the + former.

-

The following code

+

The following code is slightly slower because the shape of the + list of arguments is unknown at compile time.

apply(Module, Function, Arguments) -

is slightly slower because the shape of the list of arguments - is not known at compile time.

- Memory usage in recursion -

When writing recursive functions it is preferable to make them - tail-recursive so that they can execute in constant memory space.

+ Memory Usage in Recursion +

When writing recursive functions, it is preferable to make them + tail-recursive so that they can execute in constant memory space:

+

DO

list_length(List) -> @@ -224,13 +233,14 @@ list_length([], AccLen) -> list_length([_|Tail], AccLen) -> list_length(Tail, AccLen + 1). % Tail-recursive +

DO NOT

+ list_length([]) -> 0. % Base case list_length([_ | Tail]) -> list_length(Tail) + 1. % Not tail-recursive
- diff --git a/system/doc/efficiency_guide/introduction.xml b/system/doc/efficiency_guide/introduction.xml index 9726d3ad11..a8360f1cdd 100644 --- a/system/doc/efficiency_guide/introduction.xml +++ b/system/doc/efficiency_guide/introduction.xml @@ -18,7 +18,6 @@ basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. - Introduction @@ -32,38 +31,39 @@
Purpose -

Premature optimization is the root of all evil. -- D.E. Knuth

+

"Premature optimization is the root of all evil" + (D.E. Knuth)

-

Efficient code can be well-structured and clean code, based on +

Efficient code can be well-structured and clean, based on a sound overall architecture and sound algorithms. Efficient code can be highly implementation-code that bypasses documented interfaces and takes advantage of obscure quirks in the current implementation.

-

Ideally, your code should only contain the first kind of efficient - code. If that turns out to be too slow, you should profile the application +

Ideally, your code only contains the first type of efficient + code. If that turns out to be too slow, profile the application to find out where the performance bottlenecks are and optimize only the - bottlenecks. Other code should stay as clean as possible.

+ bottlenecks. Let other code stay as clean as possible.

-

Fortunately, compiler and run-time optimizations introduced in - R12B makes it easier to write code that is both clean and - efficient. For instance, the ugly workarounds needed in R11B and earlier +

Fortunately, compiler and runtime optimizations introduced in + Erlang/OTP R12B makes it easier to write code that is both clean and + efficient. For example, the ugly workarounds needed in R11B and earlier releases to get the most speed out of binary pattern matching are no longer necessary. In fact, the ugly code is slower than the clean code (because the clean code has become faster, not because the uglier code has become slower).

-

This Efficiency Guide cannot really learn you how to write efficient +

This Efficiency Guide cannot really teach you how to write efficient code. It can give you a few pointers about what to avoid and what to use, and some understanding of how certain language features are implemented. - We have generally not included general tips about optimization that will - work in any language, such as moving common calculations out of loops.

+ This guide does not include general tips about optimization that + works in any language, such as moving common calculations out of loops.

Prerequisites -

It is assumed that the reader is familiar with the Erlang - programming language and concepts of OTP.

+

It is assumed that you are familiar with the Erlang programming + language and the OTP concepts.

diff --git a/system/doc/efficiency_guide/listhandling.xml b/system/doc/efficiency_guide/listhandling.xml index 9112738b18..b950f55ad1 100644 --- a/system/doc/efficiency_guide/listhandling.xml +++ b/system/doc/efficiency_guide/listhandling.xml @@ -18,10 +18,9 @@ basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. - - List handling + List Handling Bjorn Gustavsson 2007-11-16 @@ -30,19 +29,18 @@
- Creating a list + Creating a List -

Lists can only be built starting from the end and attaching - list elements at the beginning. If you use the ++ operator - like this

+

Lists can only be built starting from the end and attaching list + elements at the beginning. If you use the "++" operator as + follows, a new list is created that is a copy of the elements in + List1, followed by List2:

List1 ++ List2 -

you will create a new list which is copy of the elements in List1, - followed by List2. Looking at how lists:append/1 or ++ would be - implemented in plain Erlang, it can be seen clearly that the first list - is copied:

+

Looking at how lists:append/1 or ++ would be + implemented in plain Erlang, clearly the first list is copied:

append([H|T], Tail) -> @@ -50,12 +48,12 @@ append([H|T], Tail) -> append([], Tail) -> Tail. -

So the important thing when recursing and building a list is to - make sure that you attach the new elements to the beginning of the list, - so that you build a list, and not hundreds or thousands of - copies of the growing result list.

+

When recursing and building a list, it is important to ensure + that you attach the new elements to the beginning of the list. In + this way, you will build one list, not hundreds or thousands + of copies of the growing result list.

-

Let us first look at how it should not be done:

+

Let us first see how it is not to be done:

DO NOT

bad_fib(N, Current, Next, Fibs) -> bad_fib(N - 1, Next, Current + Next, Fibs ++ [Current]).]]> -

Here we are not a building a list; in each iteration step we - create a new list that is one element longer than the new previous list.

+

Here more than one list is built. In each iteration step a new list + is created that is one element longer than the new previous list.

-

To avoid copying the result in each iteration, we must build the list in - reverse order and reverse the list when we are done:

+

To avoid copying the result in each iteration, build the list in + reverse order and reverse the list when you are done:

DO

- List comprehensions + List Comprehensions

Lists comprehensions still have a reputation for being slow. They used to be implemented using funs, which used to be slow.

-

In recent Erlang/OTP releases (including R12B), a list comprehension

+

In recent Erlang/OTP releases (including R12B), a list comprehension:

-

is basically translated to a local function

+

is basically translated to a local function:

'lc^0'([E|Tail], Expr) -> [Expr(E)|'lc^0'(Tail, Expr)]; 'lc^0'([], _Expr) -> []. -

In R12B, if the result of the list comprehension will obviously not be used, - a list will not be constructed. For instance, in this code

+

In R12B, if the result of the list comprehension will obviously + not be used, a list will not be constructed. For example, in this code:

-

or in this code

+

or in this code:

[io:put_chars(E) || E <- List]; ... -> end, some_function(...), -. -. -.]]> +...]]>
-

the value is neither assigned to a variable, nor passed to another function, - nor returned, so there is no need to construct a list and the compiler will simplify - the code for the list comprehension to

+

the value is not assigned to a variable, not passed to another function, + and not returned. This means that there is no need to construct a list and + the compiler will simplify the code for the list comprehension to:

'lc^0'([E|Tail], Expr) -> @@ -139,14 +133,15 @@ some_function(...),
- Deep and flat lists + Deep and Flat Lists

lists:flatten/1 - builds an entirely new list. Therefore, it is expensive, and even - more expensive than the ++ (which copies its left argument, - but not its right argument).

+ builds an entirely new list. It is therefore expensive, and even + more expensive than the ++ operator (which copies its + left argument, but not its right argument).

-

In the following situations, you can easily avoid calling lists:flatten/1:

+

In the following situations, you can easily avoid calling + lists:flatten/1:

When sending data to a port. Ports understand deep lists @@ -155,16 +150,19 @@ some_function(...), When calling BIFs that accept deep lists, such as list_to_binary/1 or iolist_to_binary/1. - When you know that your list is only one level deep, you can can use + When you know that your list is only one level deep, you can use lists:append/1. -

Port example

+
+ Port Example +

DO

       ...
       port_command(Port, DeepList)
       ...
+

DO NOT

       ...
@@ -180,7 +178,7 @@ some_function(...),
       port_command(Port, TerminatedStr)
       ...
-

Instead do like this:

+

Instead:

DO

@@ -188,47 +186,53 @@ some_function(...),
       TerminatedStr = [String, 0], % String="foo" => [[$f, $o, $o], 0]
       port_command(Port, TerminatedStr) 
       ...
+
+ +
+ Append Example -

Append example

DO

       > lists:append([[1], [2], [3]]).
       [1,2,3]
       >
+

DO NOT

       > lists:flatten([[1], [2], [3]]).
       [1,2,3]
       >
+
- Why you should not worry about recursive lists functions + Recursive List Functions -

In the performance myth chapter, the following myth was exposed: - Tail-recursive functions - are MUCH faster than recursive functions.

+

In Section 7.2, the following myth was exposed: + Tail-Recursive Functions + are Much Faster Than Recursive Functions.

To summarize, in R12B there is usually not much difference between a body-recursive list function and tail-recursive function that reverses the list at the end. Therefore, concentrate on writing beautiful code - and forget about the performance of your list functions. In the time-critical - parts of your code (and only there), measure before rewriting - your code.

- -

Important note: This section talks about lists functions that - construct lists. A tail-recursive function that does not construct - a list runs in constant space, while the corresponding body-recursive - function uses stack space proportional to the length of the list. - For instance, a function that sums a list of integers, should not be - written like this

+ and forget about the performance of your list functions. In the + time-critical parts of your code (and only there), measure + before rewriting your code.

+ +

This section is about list functions that construct + lists. A tail-recursive function that does not construct a list runs + in constant space, while the corresponding body-recursive function + uses stack space proportional to the length of the list.

+ +

For example, a function that sums a list of integers, is + not to be written as follows:

DO NOT

recursive_sum([H|T]) -> H+recursive_sum(T); recursive_sum([]) -> 0. -

but like this

+

Instead:

DO

diff --git a/system/doc/efficiency_guide/myths.xml b/system/doc/efficiency_guide/myths.xml index b1108dbab2..70d2dae88e 100644 --- a/system/doc/efficiency_guide/myths.xml +++ b/system/doc/efficiency_guide/myths.xml @@ -31,47 +31,48 @@ myths.xml +

Some truths seem to live on well beyond their best-before date, - perhaps because "information" spreads more rapidly from person-to-person - faster than a single release note that notes, for instance, that funs + perhaps because "information" spreads faster from person-to-person + than a single release note that says, for example, that funs have become faster.

-

Here we try to kill the old truths (or semi-truths) that have +

This section tries to kill the old truths (or semi-truths) that have become myths.

- Myth: Funs are slow -

Yes, funs used to be slow. Very slow. Slower than apply/3. + Myth: Funs are Slow +

Funs used to be very slow, slower than apply/3. Originally, funs were implemented using nothing more than compiler trickery, ordinary tuples, apply/3, and a great deal of ingenuity.

-

But that is ancient history. Funs was given its own data type - in the R6B release and was further optimized in the R7B release. - Now the cost for a fun call falls roughly between the cost for a call to - local function and apply/3.

+

But that is history. Funs was given its own data type + in R6B and was further optimized in R7B. + Now the cost for a fun call falls roughly between the cost for a call + to a local function and apply/3.

- Myth: List comprehensions are slow + Myth: List Comprehensions are Slow

List comprehensions used to be implemented using funs, and in the - bad old days funs were really slow.

+ old days funs were indeed slow.

-

Nowadays the compiler rewrites list comprehensions into an ordinary - recursive function. Of course, using a tail-recursive function with +

Nowadays, the compiler rewrites list comprehensions into an ordinary + recursive function. Using a tail-recursive function with a reverse at the end would be still faster. Or would it? That leads us to the next myth.

- Myth: Tail-recursive functions are MUCH faster - than recursive functions + Myth: Tail-Recursive Functions are Much Faster + Than Recursive Functions

According to the myth, recursive functions leave references - to dead terms on the stack and the garbage collector will have to - copy all those dead terms, while tail-recursive functions immediately + to dead terms on the stack and the garbage collector has to copy + all those dead terms, while tail-recursive functions immediately discard those terms.

That used to be true before R7B. In R7B, the compiler started @@ -79,48 +80,47 @@ be used with an empty list, so that the garbage collector would not keep dead values any longer than necessary.

-

Even after that optimization, a tail-recursive function would - still most of the time be faster than a body-recursive function. Why?

+

Even after that optimization, a tail-recursive function is + still most of the times faster than a body-recursive function. Why?

It has to do with how many words of stack that are used in each - recursive call. In most cases, a recursive function would use more words + recursive call. In most cases, a recursive function uses more words on the stack for each recursion than the number of words a tail-recursive - would allocate on the heap. Since more memory is used, the garbage - collector will be invoked more frequently, and it will have more work traversing + would allocate on the heap. As more memory is used, the garbage + collector is invoked more frequently, and it has more work traversing the stack.

-

In R12B and later releases, there is an optimization that will +

In R12B and later releases, there is an optimization that in many cases reduces the number of words used on the stack in - body-recursive calls, so that a body-recursive list function and + body-recursive calls. A body-recursive list function and a tail-recursive function that calls lists:reverse/1 at the - end will use exactly the same amount of memory. + marker="stdlib:lists#reverse/1">lists:reverse/1 at + the end will use the same amount of memory. lists:map/2, lists:filter/2, list comprehensions, and many other recursive functions now use the same amount of space as their tail-recursive equivalents.

-

So which is faster?

+

So, which is faster? + It depends. On Solaris/Sparc, the body-recursive function seems to + be slightly faster, even for lists with a lot of elements. On the x86 + architecture, tail-recursion was up to about 30% faster.

-

It depends. On Solaris/Sparc, the body-recursive function seems to - be slightly faster, even for lists with very many elements. On the x86 - architecture, tail-recursion was up to about 30 percent faster.

- -

So the choice is now mostly a matter of taste. If you really do need +

So, the choice is now mostly a matter of taste. If you really do need the utmost speed, you must measure. You can no longer be - absolutely sure that the tail-recursive list function will be the fastest - in all circumstances.

+ sure that the tail-recursive list function always is the fastest.

-

Note: A tail-recursive function that does not need to reverse the - list at the end is, of course, faster than a body-recursive function, +

A tail-recursive function that does not need to reverse the + list at the end is faster than a body-recursive function, as are tail-recursive functions that do not construct any terms at all - (for instance, a function that sums all integers in a list).

+ (for example, a function that sums all integers in a list).

- Myth: '++' is always bad + Myth: Operator "++" is Always Bad -

The ++ operator has, somewhat undeservedly, got a very bad reputation. - It probably has something to do with code like

+

The ++ operator has, somewhat undeservedly, got a bad reputation. + It probably has something to do with code like the following, + which is the most inefficient way there is to reverse a list:

DO NOT

@@ -129,12 +129,10 @@ naive_reverse([H|T]) -> naive_reverse([]) -> []. -

which is the most inefficient way there is to reverse a list. - Since the ++ operator copies its left operand, the result - will be copied again and again and again... leading to quadratic - complexity.

+

As the ++ operator copies its left operand, the result + is copied repeatedly, leading to quadratic complexity.

-

On the other hand, using ++ like this

+

But using ++ as follows is not bad:

OK

@@ -143,11 +141,11 @@ naive_but_ok_reverse([H|T], Acc) -> naive_but_ok_reverse([], Acc) -> Acc. -

is not bad. Each list element will only be copied once. +

Each list element is copied only once. The growing result Acc is the right operand - for the ++ operator, and it will not be copied.

+ for the ++ operator, and it is not copied.

-

Of course, experienced Erlang programmers would actually write

+

Experienced Erlang programmers would write as follows:

DO

@@ -156,32 +154,34 @@ vanilla_reverse([H|T], Acc) -> vanilla_reverse([], Acc) -> Acc. -

which is slightly more efficient because you don't build a - list element only to directly copy it. (Or it would be more efficient - if the the compiler did not automatically rewrite [H]++Acc +

This is slightly more efficient because here you do not build a + list element only to copy it directly. (Or it would be more efficient + if the compiler did not automatically rewrite [H]++Acc to [H|Acc].)

- Myth: Strings are slow - -

Actually, string handling could be slow if done improperly. - In Erlang, you'll have to think a little more about how the strings - are used and choose an appropriate representation and use - the re module instead of the obsolete - regexp module if you are going to use regular expressions.

+ Myth: Strings are Slow + +

String handling can be slow if done improperly. + In Erlang, you need to think a little more about how the strings + are used and choose an appropriate representation. If you + use regular expressions, use the + re module in STDLIB + instead of the obsolete regexp module.

- Myth: Repairing a Dets file is very slow + Myth: Repairing a Dets File is Very Slow

The repair time is still proportional to the number of records - in the file, but Dets repairs used to be much, much slower in the past. + in the file, but Dets repairs used to be much slower in the past. Dets has been massively rewritten and improved.

- Myth: BEAM is a stack-based byte-code virtual machine (and therefore slow) + Myth: BEAM is a Stack-Based Byte-Code Virtual Machine + (and Therefore Slow)

BEAM is a register-based virtual machine. It has 1024 virtual registers that are used for holding temporary values and for passing arguments when @@ -193,11 +193,11 @@ vanilla_reverse([], Acc) ->

- Myth: Use '_' to speed up your program when a variable is not used + Myth: Use "_" to Speed Up Your Program When a Variable + is Not Used -

That was once true, but since R6B the BEAM compiler is quite capable of seeing itself +

That was once true, but from R6B the BEAM compiler can see that a variable is not used.

- diff --git a/system/doc/efficiency_guide/processes.xml b/system/doc/efficiency_guide/processes.xml index 86951e2dcc..3bdc314235 100644 --- a/system/doc/efficiency_guide/processes.xml +++ b/system/doc/efficiency_guide/processes.xml @@ -30,15 +30,15 @@
- Creation of an Erlang process + Creating an Erlang Process -

An Erlang process is lightweight compared to operating - systems threads and processes.

+

An Erlang process is lightweight compared to threads and + processes in operating systems.

A newly spawned Erlang process uses 309 words of memory in the non-SMP emulator without HiPE support. (SMP support - and HiPE support will both add to this size.) The size can - be found out like this:

+ and HiPE support both add to this size.) The size can + be found as follows:

 Erlang (BEAM) emulator version 5.6 [async-threads:0] [kernel-poll:false]
@@ -51,11 +51,11 @@ Eshell V5.6  (abort with ^G)
 3> Bytes div erlang:system_info(wordsize).
 309
-

The size includes 233 words for the heap area (which includes the stack). - The garbage collector will increase the heap as needed.

+

The size includes 233 words for the heap area (which includes the + stack). The garbage collector increases the heap as needed.

The main (outer) loop for a process must be tail-recursive. - If not, the stack will grow until the process terminates.

+ Otherwise, the stack grows until the process terminates.

DO NOT

@@ -74,7 +74,7 @@ loop() ->

The call to io:format/2 will never be executed, but a return address will still be pushed to the stack each time loop/0 is called recursively. The correct tail-recursive - version of the function looks like this:

+ version of the function looks as follows:

DO

@@ -90,92 +90,98 @@ loop() -> end.
- Initial heap size + Initial Heap Size

The default initial heap size of 233 words is quite conservative - in order to support Erlang systems with hundreds of thousands or - even millions of processes. The garbage collector will grow and - shrink the heap as needed.

+ to support Erlang systems with hundreds of thousands or + even millions of processes. The garbage collector grows and + shrinks the heap as needed.

In a system that use comparatively few processes, performance - might be improved by increasing the minimum heap size using either - the +h option for + might be improved by increasing the minimum heap size + using either the +h option for erl or on a process-per-process basis using the min_heap_size option for spawn_opt/4.

-

The gain is twofold: Firstly, although the garbage collector will - grow the heap, it will grow it step by step, which will be more - costly than directly establishing a larger heap when the process - is spawned. Secondly, the garbage collector may also shrink the - heap if it is much larger than the amount of data stored on it; - setting the minimum heap size will prevent that.

- -

The emulator will probably use more memory, and because garbage - collections occur less frequently, huge binaries could be +

The gain is twofold:

+ + Although the garbage collector grows the heap, it grows it + step-by-step, which is more costly than directly establishing a + larger heap when the process is spawned. + The garbage collector can also shrink the heap if it is + much larger than the amount of data stored on it; + setting the minimum heap size prevents that. + + +

The emulator probably uses more memory, and because garbage + collections occur less frequently, huge binaries can be kept much longer.

In systems with many processes, computation tasks that run - for a short time could be spawned off into a new process with - a higher minimum heap size. When the process is done, it will - send the result of the computation to another process and terminate. - If the minimum heap size is calculated properly, the process may not - have to do any garbage collections at all. - This optimization should not be attempted + for a short time can be spawned off into a new process with + a higher minimum heap size. When the process is done, it sends + the result of the computation to another process and terminates. + If the minimum heap size is calculated properly, the process might + not have to do any garbage collections at all. + This optimization is not to be attempted without proper measurements.

-
- Process messages + Process Messages -

All data in messages between Erlang processes is copied, with - the exception of +

All data in messages between Erlang processes is copied, + except for refc binaries on the same Erlang node.

When a message is sent to a process on another Erlang node, - it will first be encoded to the Erlang External Format before - being sent via an TCP/IP socket. The receiving Erlang node decodes - the message and distributes it to the right process.

+ it is first encoded to the Erlang External Format before + being sent through a TCP/IP socket. The receiving Erlang node decodes + the message and distributes it to the correct process.

- The constant pool + Constant Pool

Constant Erlang terms (also called literals) are now kept in constant pools; each loaded module has its own pool. - The following function

+ The following function does no longer build the tuple every time + it is called (only to have it discarded the next time the garbage + collector was run), but the tuple is located in the module's + constant pool:

DO (in R12B and later)

days_in_month(M) -> - element(M, {31,28,31,30,31,30,31,31,30,31,30,31}). - -

will no longer build the tuple every time it is called (only - to have it discarded the next time the garbage collector was run), but - the tuple will be located in the module's constant pool.

+ element(M, {31,28,31,30,31,30,31,31,30,31,30,31}).

But if a constant is sent to another process (or stored in - an ETS table), it will be copied. - The reason is that the run-time system must be able - to keep track of all references to constants in order to properly - unload code containing constants. (When the code is unloaded, - the constants will be copied to the heap of the processes that refer + an Ets table), it is copied. + The reason is that the runtime system must be able + to keep track of all references to constants to unload code + containing constants properly. (When the code is unloaded, + the constants are copied to the heap of the processes that refer to them.) The copying of constants might be eliminated in a future - release.

+ Erlang/OTP release.

- Loss of sharing + Loss of Sharing -

Shared sub-terms are not preserved when a term is sent - to another process, passed as the initial process arguments in - the spawn call, or stored in an ETS table. - That is an optimization. Most applications do not send messages - with shared sub-terms.

+

Shared subterms are not preserved in the following + cases:

+ + When a term is sent to another process + When a term is passed as the initial process arguments in + the spawn call + When a term is stored in an Ets table + +

That is an optimization. Most applications do not send messages + with shared subterms.

-

Here is an example of how a shared sub-term can be created:

+

The following example shows how a shared subterm can be created:

kilo_byte() -> @@ -186,32 +192,32 @@ kilo_byte(0, Acc) -> kilo_byte(N, Acc) -> kilo_byte(N-1, [Acc|Acc]). -

kilo_byte/0 creates a deep list. If we call - list_to_binary/1, we can convert the deep list to a binary - of 1024 bytes:

+

kilo_byte/1 creates a deep list. + If list_to_binary/1 is called, the deep list can be + converted to a binary of 1024 bytes:

 1> byte_size(list_to_binary(efficiency_guide:kilo_byte())).
 1024
-

Using the erts_debug:size/1 BIF we can see that the +

Using the erts_debug:size/1 BIF, it can be seen that the deep list only requires 22 words of heap space:

 2> erts_debug:size(efficiency_guide:kilo_byte()).
 22
-

Using the erts_debug:flat_size/1 BIF, we can calculate - the size of the deep list if sharing is ignored. It will be +

Using the erts_debug:flat_size/1 BIF, the size of the + deep list can be calculated if sharing is ignored. It becomes the size of the list when it has been sent to another process - or stored in an ETS table:

+ or stored in an Ets table:

 3> erts_debug:flat_size(efficiency_guide:kilo_byte()).
 4094
-

We can verify that sharing will be lost if we insert the - data into an ETS table:

+

It can be verified that sharing will be lost if the data is + inserted into an Ets table:

 4> T = ets:new(tab, []).
@@ -223,21 +229,21 @@ true
 7> erts_debug:flat_size(element(2, hd(ets:lookup(T, key)))).
 4094
-

When the data has passed through an ETS table, +

When the data has passed through an Ets table, erts_debug:size/1 and erts_debug:flat_size/1 return the same value. Sharing has been lost.

-

In a future release of Erlang/OTP, we might implement a - way to (optionally) preserve sharing. We have no plans to make - preserving of sharing the default behaviour, since that would +

In a future Erlang/OTP release, it might be implemented a + way to (optionally) preserve sharing. There are no plans to make + preserving of sharing the default behaviour, as that would penalize the vast majority of Erlang applications.

- The SMP emulator + SMP Emulator -

The SMP emulator (introduced in R11B) will take advantage of a +

The SMP emulator (introduced in R11B) takes advantage of a multi-core or multi-CPU computer by running several Erlang scheduler threads (typically, the same as the number of cores). Each scheduler thread schedules Erlang processes in the same way as the Erlang scheduler @@ -247,11 +253,11 @@ true must have more than one runnable Erlang process most of the time. Otherwise, the Erlang emulator can still only run one Erlang process at the time, but you must still pay the overhead for locking. Although - we try to reduce the locking overhead as much as possible, it will never - become exactly zero.

+ Erlang/OTP tries to reduce the locking overhead as much as possible, + it will never become exactly zero.

-

Benchmarks that may seem to be concurrent are often sequential. - The estone benchmark, for instance, is entirely sequential. So is also +

Benchmarks that appear to be concurrent are often sequential. + The estone benchmark, for example, is entirely sequential. So is the most common implementation of the "ring benchmark"; usually one process is active, while the others wait in a receive statement.

@@ -259,6 +265,5 @@ true can be used to profile your application to see how much potential (or lack thereof) it has for concurrency.

- diff --git a/system/doc/efficiency_guide/profiling.xml b/system/doc/efficiency_guide/profiling.xml index b93c884270..5df12eefe0 100644 --- a/system/doc/efficiency_guide/profiling.xml +++ b/system/doc/efficiency_guide/profiling.xml @@ -30,190 +30,197 @@
- Do not guess about performance - profile + Do Not Guess About Performance - Profile

Even experienced software developers often guess wrong about where - the performance bottlenecks are in their programs.

- -

Therefore, profile your program to see where the performance + the performance bottlenecks are in their programs. Therefore, profile + your program to see where the performance bottlenecks are and concentrate on optimizing them.

-

Erlang/OTP contains several tools to help finding bottlenecks.

+

Erlang/OTP contains several tools to help finding bottlenecks:

+ + + fprof provides the most detailed information about + where the program time is spent, but it significantly slows down the + program it profiles. -

fprof provide the most detailed information - about where the time is spent, but it significantly slows down the - program it profiles.

+

eprof provides time information of each function + used in the program. No call graph is produced, but eprof has + considerable less impact on the program it profiles.

+

If the program is too large to be profiled by fprof or + eprof, the cover and cprof tools can be used + to locate code parts that are to be more thoroughly profiled using + fprof or eprof.

-

eprof provides time information of each function used - in the program. No callgraph is produced but eprof has - considerable less impact on the program profiled.

+ cover provides execution counts per line per + process, with less overhead than fprof. Execution counts + can, with some caution, be used to locate potential performance + bottlenecks. -

If the program is too big to be profiled by fprof or eprof, - cover and cprof could be used to locate parts of the - code that should be more thoroughly profiled using fprof or - eprof.

+ cprof is the most lightweight tool, but it only + provides execution counts on a function basis (for all processes, + not per process). +
-

cover provides execution counts per line per process, - with less overhead than fprof. Execution counts can - with some caution be used to locate potential performance bottlenecks. - The most lightweight tool is cprof, but it only provides execution - counts on a function basis (for all processes, not per process).

+

The tools are further described in + Tools.

- Big systems -

If you have a big system it might be interesting to run profiling + Large Systems +

For a large system, it can be interesting to run profiling on a simulated and limited scenario to start with. But bottlenecks - have a tendency to only appear or cause problems when - there are many things going on at the same time, and when there - are many nodes involved. Therefore it is desirable to also run + have a tendency to appear or cause problems only when + many things are going on at the same time, and when + many nodes are involved. Therefore, it is also desirable to run profiling in a system test plant on a real target system.

-

When your system is big you do not want to run the profiling - tools on the whole system. You want to concentrate on processes - and modules that you know are central and stand for a big part of the - execution.

+ +

For a large system, you do not want to run the profiling + tools on the whole system. Instead you want to concentrate on + central processes and modules, which contribute for a big part + of the execution.

- What to look for -

When analyzing the result file from the profiling activity - you should look for functions that are called many + What to Look For +

When analyzing the result file from the profiling activity, + look for functions that are called many times and have a long "own" execution time (time excluding calls - to other functions). Functions that just are called very - many times can also be interesting, as even small things can add - up to quite a bit if they are repeated often. Then you need to - ask yourself what can I do to reduce this time. Appropriate - types of questions to ask yourself are:

+ to other functions). Functions that are called a lot of + times can also be interesting, as even small things can add + up to quite a bit if repeated often. Also + ask yourself what you can do to reduce this time. The following + are appropriate types of questions to ask yourself:

+ - Can I reduce the number of times the function is called? - Are there tests that can be run less often if I change - the order of tests? - Are there redundant tests that can be removed? - Is there some expression calculated giving the same result - each time? - Are there other ways of doing this that are equivalent and + Is it possible to reduce the number of times the function + is called? + Can any test be run less often if the order of tests is + changed? + Can any redundant tests be removed? + Does any calculated expression give the same result + each time? + Are there other ways to do this that are equivalent and more efficient? - Can I use another internal data representation to make - things more efficient? + Can another internal data representation be used to make + things more efficient? -

These questions are not always trivial to answer. You might - need to do some benchmarks to back up your theory, to avoid - making things slower if your theory is wrong. See benchmarking.

+ +

These questions are not always trivial to answer. Some + benchmarks might be needed to back up your theory and to avoid + making things slower if your theory is wrong. For details, see + Benchmarking.

Tools - +
fprof -

- fprof measures the execution time for each function, - both own time i.e how much time a function has used for its - own execution, and accumulated time i.e. including called - functions. The values are displayed per process. You also get - to know how many times each function has been - called. fprof is based on trace to file in order to - minimize runtime performance impact. Using fprof is just a - matter of calling a few library functions, see - fprof - manual page under the application tools. fprof was introduced in - version R8 of Erlang/OTP. -

+

fprof measures the execution time for each function, + both own time, that is, how much time a function has used for its + own execution, and accumulated time, that is, including called + functions. The values are displayed per process. You also get + to know how many times each function has been called.

+ +

fprof is based on trace to file to minimize runtime + performance impact. Using fprof is just a matter of + calling a few library functions, see the + fprof manual page in + tools .fprof was introduced in R8.

-
- eprof -

- eprof is based on the Erlang trace_info BIFs. Eprof shows how much time has been used by - each process, and in which function calls this time has been - spent. Time is shown as percentage of total time and absolute time. - See eprof for - additional information. -

-
+
+ eprof +

eprof is based on the Erlang trace_info BIFs. + eprof shows how much time has been used by each process, + and in which function calls this time has been spent. Time is + shown as percentage of total time and absolute time. For more + information, see the eprof + manual page in tools.

+
cover -

- cover's primary use is coverage analysis to verify - test cases, making sure all relevant code is covered. - cover counts how many times each executable line of - code is executed when a program is run. This is done on a per - module basis. Of course this information can be used to - determine what code is run very frequently and could therefore - be subject for optimization. Using cover is just a matter of - calling a few library functions, see - cover - manual page under the application tools.

+

The primary use of cover is coverage analysis to verify + test cases, making sure that all relevant code is covered. + cover counts how many times each executable line of code + is executed when a program is run, on a per module basis.

+

Clearly, this information can be used to determine what + code is run very frequently and can therefore be subject for + optimization. Using cover is just a matter of calling a + few library functions, see the + cover manual page in + tools.

cprof

cprof is something in between fprof and - cover regarding features. It counts how many times each - function is called when the program is run, on a per module - basis. cprof has a low performance degradation effect (versus - fprof) and does not need to recompile - any modules to profile (versus cover). - See cprof manual page for additional - information. -

+ cover regarding features. It counts how many times each + function is called when the program is run, on a per module + basis. cprof has a low performance degradation effect + (compared with fprof) and does not need to recompile + any modules to profile (compared with cover). + For more information, see the + cprof manual page in + tools.

- Tool summarization + Tool Summary - Tool - Results - Size of result - Effects on program execution time - Records number of calls - Records Execution time - Records called by - Records garbage collection + Tool + Results + Size of Result + Effects on Program Execution Time + Records Number of Calls + Records Execution Time + Records Called by + Records Garbage Collection - fprof - per process to screen/file - large - significant slowdown - yes - total and own - yes - yes + fprof + Per process to screen/file + Large + Significant slowdown + Yes + Total and own + Yes + Yes - eprof - per process/function to screen/file - medium - small slowdown - yes - only total - no - no + eprof + Per process/function to screen/file + Medium + Small slowdown + Yes + Only total + No + No - cover - per module to screen/file - small - moderate slowdown - yes, per line - no - no - no + cover + Per module to screen/file + Small + Moderate slowdown + Yes, per line + No + No + No - cprof - per module to caller - small - small slowdown - yes - no - no - no + cprof + Per module to caller + Small + Small slowdown + Yes + No + No + No - + Tool Summary
@@ -226,49 +233,51 @@ implementation of a given algorithm or function is the fastest. Benchmarking is far from an exact science. Today's operating systems generally run background tasks that are difficult to turn off. - Caches and multiple CPU cores doesn't make it any easier. - It would be best to run Unix-computers in single-user mode when + Caches and multiple CPU cores does not facilitate benchmarking. + It would be best to run UNIX computers in single-user mode when benchmarking, but that is inconvenient to say the least for casual testing.

Benchmarks can measure wall-clock time or CPU time.

-

timer:tc/3 measures + + timer:tc/3 measures wall-clock time. The advantage with wall-clock time is that I/O, - swapping, and other activities in the operating-system kernel are + swapping, and other activities in the operating system kernel are included in the measurements. The disadvantage is that the - the measurements will vary wildly. Usually it is best to run the - benchmark several times and note the shortest time - that time should + measurements vary a lot. Usually it is best to run the + benchmark several times and note the shortest time, which is to be the minimum time that is possible to achieve under the best of - circumstances.

+ circumstances. -

statistics/1 - with the argument runtime measures CPU time spent in the Erlang - virtual machine. The advantage is that the results are more + statistics/1 + with argument runtime measures CPU time spent in the Erlang + virtual machine. The advantage with CPU time is that the results are more consistent from run to run. The disadvantage is that the time spent in the operating system kernel (such as swapping and I/O) - are not included. Therefore, measuring CPU time is misleading if - any I/O (file or socket) is involved.

+ is not included. Therefore, measuring CPU time is misleading if + any I/O (file or socket) is involved. +

It is probably a good idea to do both wall-clock measurements and CPU time measurements.

-

Some additional advice:

+

Some final advice:

- The granularity of both types of measurement could be quite - high so you should make sure that each individual measurement + The granularity of both measurement types can be high. + Therefore, ensure that each individual measurement lasts for at least several seconds. - To make the test fair, each new test run should run in its own, + To make the test fair, each new test run is to run in its own, newly created Erlang process. Otherwise, if all tests run in the - same process, the later tests would start out with larger heap sizes - and therefore probably do less garbage collections. You could - also consider restarting the Erlang emulator between each test. + same process, the later tests start out with larger heap sizes + and therefore probably do fewer garbage collections. + Also consider restarting the Erlang emulator between each test. Do not assume that the fastest implementation of a given algorithm - on computer architecture X also is the fastest on computer architecture Y. - + on computer architecture X is also the fastest on computer architecture + Y.
diff --git a/system/doc/efficiency_guide/tablesDatabases.xml b/system/doc/efficiency_guide/tablesDatabases.xml index 94c921fa1c..215c2afa1f 100644 --- a/system/doc/efficiency_guide/tablesDatabases.xml +++ b/system/doc/efficiency_guide/tablesDatabases.xml @@ -18,10 +18,9 @@ basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. - - Tables and databases + Tables and Databases Ingela Anderton 2001-08-07 @@ -30,46 +29,45 @@
- Ets, Dets and Mnesia + Ets, Dets, and Mnesia

Every example using Ets has a corresponding example in - Mnesia. In general all Ets examples also apply to Dets tables.

+ Mnesia. In general, all Ets examples also apply to Dets tables.

- Select/Match operations -

Select/Match operations on Ets and Mnesia tables can become + Select/Match Operations +

Select/match operations on Ets and Mnesia tables can become very expensive operations. They usually need to scan the complete - table. You should try to structure your - data so that you minimize the need for select/match - operations. However, if you really need a select/match operation, - it will still be more efficient than using tab2list. - Examples of this and also of ways to avoid select/match will be provided in - some of the following sections. The functions - ets:select/2 and mnesia:select/3 should be preferred over - ets:match/2,ets:match_object/2, and mnesia:match_object/3.

- -

There are exceptions when the complete table is not - scanned, for instance if part of the key is bound when searching an - ordered_set table, or if it is a Mnesia - table and there is a secondary index on the field that is - selected/matched. If the key is fully bound there will, of course, be - no point in doing a select/match, unless you have a bag table and - you are only interested in a sub-set of the elements with - the specific key.

-
-

When creating a record to be used in a select/match operation you - want most of the fields to have the value '_'. The easiest and fastest way - to do that is as follows:

+ table. Try to structure the data to minimize the need for select/match + operations. However, if you require a select/match operation, + it is still more efficient than using tab2list. + Examples of this and of how to avoid select/match are provided in + the following sections. The functions + ets:select/2 and mnesia:select/3 are to be preferred + over ets:match/2, ets:match_object/2, and + mnesia:match_object/3.

+

In some circumstances, the select/match operations do not need + to scan the complete table. + For example, if part of the key is bound when searching an + ordered_set table, or if it is a Mnesia + table and there is a secondary index on the field that is + selected/matched. If the key is fully bound, there is + no point in doing a select/match, unless you have a bag table + and are only interested in a subset of the elements with + the specific key.

+

When creating a record to be used in a select/match operation, you + want most of the fields to have the value "_". The easiest and + fastest way to do that is as follows:

 #person{age = 42, _ = '_'}. 
- Deleting an element -

The delete operation is considered + Deleting an Element +

The delete operation is considered successful if the element was not present in the table. Hence all attempts to check that the element is present in the Ets/Mnesia table before deletion are unnecessary. Here follows - an example for Ets tables.

+ an example for Ets tables:

DO

 ...
@@ -88,14 +86,16 @@ end,
     
- Data fetching -

Do not fetch data that you already have! Consider that you - have a module that handles the abstract data type Person. You - export the interface function print_person/1 that uses the internal functions - print_name/1, print_age/1, print_occupation/1.

+ Fetching Data +

Do not fetch data that you already have.

+

Consider that you have a module that handles the abstract data + type Person. You export the interface function + print_person/1, which uses the internal functions + print_name/1, print_age/1, and + print_occupation/1.

-

If the functions print_name/1 and so on, had been interface - functions the matter comes in to a whole new light, as you +

If the function print_name/1, and so on, had been interface + functions, the situation would have been different, as you do not want the user of the interface to know about the internal data representation.

@@ -136,7 +136,7 @@ print_person(PersonId) -> io:format("No person with ID = ~p~n", [PersonID]) end. -%%% Internal functions +%%% Internal functionss print_name(PersonID) -> [Person] = ets:lookup(person, PersonId), io:format("No person ~p~n", [Person#person.name]). @@ -151,31 +151,31 @@ print_occupation(PersonID) ->
- Non-persistent data storage + Non-Persistent Database Storage

For non-persistent database storage, prefer Ets tables over - Mnesia local_content tables. Even the Mnesia dirty_write + Mnesia local_content tables. Even the Mnesia dirty_write operations carry a fixed overhead compared to Ets writes. Mnesia must check if the table is replicated or has indices, this involves at least one Ets lookup for each - dirty_write. Thus, Ets writes will always be faster than + dirty_write. Thus, Ets writes is always faster than Mnesia writes.

tab2list -

Assume we have an Ets-table, which uses idno as key, - and contains:

+

Assuming an Ets table that uses idno as key + and contains the following:

 [#person{idno = 1, name = "Adam",  age = 31, occupation = "mailman"},
  #person{idno = 2, name = "Bryan", age = 31, occupation = "cashier"},
  #person{idno = 3, name = "Bryan", age = 35, occupation = "banker"},
  #person{idno = 4, name = "Carl",  age = 25, occupation = "mailman"}]
-

If we must return all data stored in the Ets-table we - can use ets:tab2list/1. However, usually we are only +

If you must return all data stored in the Ets table, you + can use ets:tab2list/1. However, usually you are only interested in a subset of the information in which case - ets:tab2list/1 is expensive. If we only want to extract - one field from each record, e.g., the age of every person, we - should use:

+ ets:tab2list/1 is expensive. If you only want to extract + one field from each record, for example, the age of every person, + then:

DO

 ...
@@ -192,8 +192,8 @@ ets:select(Tab,[{ #person{idno='_',
 TabList = ets:tab2list(Tab),
 lists:map(fun(X) -> X#person.age end, TabList),
 ...
-

If we are only interested in the age of all persons named - Bryan, we should:

+

If you are only interested in the age of all persons named + "Bryan", then:

DO

 ...
@@ -224,8 +224,8 @@ BryanList = lists:filter(fun(X) -> X#person.name == "Bryan" end,
                          TabList),
 lists:map(fun(X) -> X#person.age end, BryanList),
 ...
-

If we need all information stored in the Ets table about - persons named Bryan we should:

+

If you need all information stored in the Ets table about + persons named "Bryan", then:

DO

 ...
@@ -243,60 +243,60 @@ lists:filter(fun(X) -> X#person.name == "Bryan" end, TabList),
     
- Ordered_set tables -

If the data in the table should be accessed so that the order + Ordered_set Tables +

If the data in the table is to be accessed so that the order of the keys in the table is significant, the table type - ordered_set could be used instead of the more usual + ordered_set can be used instead of the more usual set table type. An ordered_set is always - traversed in Erlang term order with regard to the key field - so that return values from functions such as select, + traversed in Erlang term order regarding the key field + so that the return values from functions such as select, match_object, and foldl are ordered by the key values. Traversing an ordered_set with the first and next operations also returns the keys ordered.

An ordered_set only guarantees that - objects are processed in key order. Results from functions as - ets:select/2 appear in the key order even if + objects are processed in key order. + Results from functions such as + ets:select/2 appear in key order even if the key is not included in the result.

- Ets specific + Ets-Specific
- Utilizing the keys of the Ets table -

An Ets table is a single key table (either a hash table or a - tree ordered by the key) and should be used as one. In other + Using Keys of Ets Table +

An Ets table is a single-key table (either a hash table or a + tree ordered by the key) and is to be used as one. In other words, use the key to look up things whenever possible. A - lookup by a known key in a set Ets table is constant and for a - ordered_set Ets table it is O(logN). A key lookup is always + lookup by a known key in a set Ets table is constant and for + an ordered_set Ets table it is O(logN). A key lookup is always preferable to a call where the whole table has to be - scanned. In the examples above, the field idno is the + scanned. In the previous examples, the field idno is the key of the table and all lookups where only the name is known - will result in a complete scan of the (possibly large) table + result in a complete scan of the (possibly large) table for a matching result.

A simple solution would be to use the name field as the key instead of the idno field, but that would cause - problems if the names were not unique. A more general solution - would be to create a second table with name as key and - idno as data, i.e. to index (invert) the table with regards - to the name field. The second table would of course have to be - kept consistent with the master table. Mnesia could do this - for you, but a home brew index table could be very efficient + problems if the names were not unique. A more general solution would + be to create a second table with name as key and + idno as data, that is, to index (invert) the table regarding + the name field. Clearly, the second table would have to be + kept consistent with the master table. Mnesia can do this + for you, but a home brew index table can be very efficient compared to the overhead involved in using Mnesia.

An index table for the table in the previous examples would - have to be a bag (as keys would appear more than once) and could + have to be a bag (as keys would appear more than once) and can have the following contents:

- 
 [#index_entry{name="Adam", idno=1},
  #index_entry{name="Bryan", idno=2},
  #index_entry{name="Bryan", idno=3},
  #index_entry{name="Carl", idno=4}]
-

Given this index table a lookup of the age fields for - all persons named "Bryan" could be done like this:

+

Given this index table, a lookup of the age fields for + all persons named "Bryan" can be done as follows:

 ...
 MatchingIDs = ets:lookup(IndexTable,"Bryan"),
@@ -306,30 +306,31 @@ lists:map(fun(#index_entry{idno = ID}) ->
           end,
           MatchingIDs),
 ...
-

Note that the code above never uses ets:match/2 but - instead utilizes the ets:lookup/2 call. The +

Notice that this code never uses ets:match/2 but + instead uses the ets:lookup/2 call. The lists:map/2 call is only used to traverse the idnos - matching the name "Bryan" in the table; therefore the number of lookups + matching the name "Bryan" in the table; thus the number of lookups in the master table is minimized.

Keeping an index table introduces some overhead when - inserting records in the table, therefore the number of operations - gained from the table has to be weighted against the number of - operations inserting objects in the table. However, note that the gain when - the key can be used to lookup elements is significant.

+ inserting records in the table. The number of operations gained + from the table must therefore be compared against the number of + operations inserting objects in the table. However, notice that the + gain is significant when the key can be used to lookup elements.

- Mnesia specific + Mnesia-Specific
- Secondary index + Secondary Index

If you frequently do a lookup on a field that is not the - key of the table, you will lose performance using - "mnesia:select/match_object" as this function will traverse the - whole table. You may create a secondary index instead and + key of the table, you lose performance using + "mnesia:select/match_object" as this function traverses the + whole table. You can create a secondary index instead and use "mnesia:index_read" to get faster access, however this - will require more memory. Example:

+ requires more memory.

+

Example

 -record(person, {idno, name, age, occupation}).
         ...
@@ -347,14 +348,15 @@ PersonsAge42 =
 
     
Transactions -

Transactions is a way to guarantee that the distributed +

Using transactions is a way to guarantee that the distributed Mnesia database remains consistent, even when many different - processes update it in parallel. However if you have - real time requirements it is recommended to use dirty - operations instead of transactions. When using the dirty - operations you lose the consistency guarantee, this is usually + processes update it in parallel. However, if you have + real-time requirements it is recommended to use dirty + operations instead of transactions. When using dirty + operations, you lose the consistency guarantee; this is usually solved by only letting one process update the table. Other - processes have to send update requests to that process.

+ processes must send update requests to that process.

+

Example

 ...
 % Using transaction
-- 
cgit v1.2.3