Optimize Embedded Linux Boot Time Performance

Total Page:16

File Type:pdf, Size:1020Kb

Optimize Embedded Linux Boot Time Performance Optimize Embedded Linux Boot Time Performance WHITE PAPER TABLE OF CONTENTS Abstract ............................................................................................. 3 What is “Embedded Linux”? ............................................................. 4 What does Embedded Linux offer? .................................................. 4 What is Boot Time? ........................................................................... 5 Boot Sequence .................................................................................. 6 Optimizing Boot Time in an Embedded Linux System ...................... 6 Reducing Kernel Boot Time Thereby Increasing Speed ................... 7 Increasing System Startup Time and Application Speed .................. 8 Reducing the Disk Footprint and RAM Size of the Linux Kernel ....... 9 Reducing Application Size and RAM Usage..................................... 10 Reducing Power Consumption ........................................................ 10 Conclusion ....................................................................................... 11 Reference ........................................................................................ 12 Author Info .................................................................................... 112 ©2014, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author. All rights reserved. Abstract Almost everyone has heard of Linux. It is open source, and has been much in discussion in the software development and system administration communities. Linux was originally targeted specifically for desktop PCs running an Intel 80x86 or compatible microprocessor. Linus Torvalds, the inventor of Linux, had said, “Linux will never run on anything but a PC with an IDE hard disk since that is all that I have”. At present, Linux is ported to different microprocessors and runs on multiple platforms that don’t have a hard disk. Most of these devices are not general purpose computer systems and include devices such as network routers and data collection units for tracking tornadoes. It is these types of systems that have collectively been labeled as “Embedded Linux”. Linux has won the race in the embedded device segment. By offering enormous advantages, Linux has crossed every hurdle to enter embedded systems across a wide variety of processor architectures. This has led developers to raise questions about how they could get more performance out of their embedded Linux design, which made “reducing boot time” one of the hot topics of discussion in the embedded Linux community. It is not necessary to invent an engineering resource to save boot time. It is possible to substantially reduce boot time by applying certain system configurations. This whitepaper presents an insight into embedded Linux and a typical boot sequence. It also covers various techniques that can be used to optimize boot time. ©2014, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author. All rights reserved. 3 What is “Embedded Linux”? Linux is itself referred to as a kernel but in daily usage it rarely means so. Embedded Linux generally refers to a complete Linux distribution aimed at embedded devices. In reference to embedded development, there is a Linux kernel and other software or an embedded Linux distribution which contains a package of applications and development tools meant for embedded systems. Linux was originally designed to be a general-purpose operating system (OS). Many approaches have commenced to convert the Linux OS into an embedded OS. There are two ways to switch to embedded Linux: 1. Solutions provided and supported by vendors like MontaVista, Wind River or TimeSys contain their own development tools and environments, and use a few open- source components and proprietary tools. 2. Using community solutions that are open and supported by the community. With Linux, the dimension of computing applications increases, and this includes IBM's tiny Linux wrist watch, hand-held devices (PDAs and cell phones), Internet appliances, robotics, telephony infrastructure equipment, and much more. What does Embedded Linux offer? Though most Linux systems run on PC platforms, it can be a reliable OS for embedded systems. Linux is easier and more flexible to install and administer. Its “back-to-basics” approach is an added advantage. Though a fully featured Linux kernel requires about 1 MB of memory, the Linux micro-kernel actually consumes very little of ©2014, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author. All rights reserved. 4 this memory - around 100K on a Pentium CPU, which also includes a virtual memory and all core operating system functions. It is considered a lightweight operating system. The core Linux OS has a simple micro-kernel architecture. It provides a modular block to build a custom embedded system. The File system is on the top of the micro-kernel. Drivers can be either compiled or added to the kernel at run-time. Linux supports multiprocessor systems and is best-suited for embedded Internet devices. It offers scalability that opens an option of running a real-time application on a dual processor system. In various market segments like consumer electronics, products are such that the device needs to be available for immediate use after power on. An OS for desktops offers boot times in the range of 20 seconds to a few minutes. This is highly unacceptable for various market segments. For a device to qualify for an embedded market, it must be available for use as soon as it is turned on. What is Boot Time? Boot time is the time taken by the system to make it available from the time the power button is pressed. Boot time is one of the major factors in defining the usability of the system. The definition of system availability is different for different devices: For display devices like cellphones – the appearance of home For display of shell prompt on development systems with consoles There is no set criterion to measure boot time. In fact, boot time must be measured in the context of the device and its usage. ©2014, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author. All rights reserved. 5 Boot Sequence Power Applied Pwr/CLK/Reset Load and execute BootLoader Load and execute Kernel Kernel Init Locate/Load/Mount RootFS Init User Space Application start Optimizing Boot Time in an Embedded Linux System Many factors are responsible for boot time performance. This calls for a set of techniques to be applied to optimize the boot time of a Linux system. We are using the term 'optimizing' - instead of 'reducing'. as ‘reducing’ means achieving less boot time by taking custom shortcuts, which are difficult to maintain across component versions. Optimization methods are generic in nature and are easy to maintain across different versions. ©2014, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author. All rights reserved. 6 Areas of optimization Optimization methods fall under the following categories: 1. Size Reducing the size of binaries for each component loaded Removing features that are not required 2. Speed Optimizing the target processor Reducing the number of steps for booting Removing features that are not required To begin with optimizing the boot time of a device: Identify the current boot-time Set the target environment (processor) Define boundary conditions that are specific to the end-product Optimization is an iterative process. To measure the boot time, a reliable source is required. We have listed a set of techniques that can be applied in order to achieve an optimized boot-time for an embedded Linux system. Reducing Kernel Boot Time and thereby Increasing Speed 1. Disable IP auto-config – Instead of initializing the IP address on the kernel command line, use the /etc/init.d/rcS script. 2. The output of kernel bootup messages to the console consumes time. This is normally not needed in the production environment. Disable unwanted console output messages using the “quiet” argument in the Linux kernel bootloader settings. ©2014, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author. All rights reserved. 7 Example: root=/dev/ram0 rw init=/startup.sh quiet 3. Directly boot from the bootstrap code to directly load and execute the Linux kernel image instead of the Uboot. 4. Reduce the kernel size by removing things like features, debugging facilities, etc., which are not from the dedicated system. A smaller kernel loads fast and also executes fast. This reduces the time spent on initializing drivers. 5. Spare memory at boot time by skipping the memory allocation part and manage it yourself. Example: there is 32 MB of RAM Boot your kernel with mem=30 The remaining 2 MB can be claimed by the driver code buf = ioremap ( 0x1e00000, /* Start: 30 MB */ 0x200000 /* Size: 2 MB */ ); This saves a critical amount of time allocating memory. Increasing System Startup Time and Application Speed 1. SysV vs Init – SysV starts the services sequentially. It waits for the current startup script to be completed before starting the next one. In case of Init, if the pre-requisites are fulfilled, it starts the services in parallel. System utilization is also better in the case of Init. 2. Compiler speed optimizations – Most tools are compiled using compiler optimizations. “O2” is the most
Recommended publications
  • Red Hat Enterprise Linux 6 Developer Guide
    Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Dave Brolley William Cohen Roland Grunberg Aldy Hernandez Karsten Hopp Jakub Jelinek Developer Guide Jeff Johnston Benjamin Kosnik Aleksander Kurtakov Chris Moller Phil Muldoon Andrew Overholt Charley Wang Kent Sebastian Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Edition 0 Author Dave Brolley [email protected] Author William Cohen [email protected] Author Roland Grunberg [email protected] Author Aldy Hernandez [email protected] Author Karsten Hopp [email protected] Author Jakub Jelinek [email protected] Author Jeff Johnston [email protected] Author Benjamin Kosnik [email protected] Author Aleksander Kurtakov [email protected] Author Chris Moller [email protected] Author Phil Muldoon [email protected] Author Andrew Overholt [email protected] Author Charley Wang [email protected] Author Kent Sebastian [email protected] Editor Don Domingo [email protected] Editor Jacquelynn East [email protected] Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
    [Show full text]
  • Improving Security Through Egalitarian Binary Recompilation
    Improving Security Through Egalitarian Binary Recompilation David Williams-King Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy under the Executive Committee of the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2021 © 2021 David Williams-King All Rights Reserved Abstract Improving Security Through Egalitarian Binary Recompilation David Williams-King In this thesis, we try to bridge the gap between which program transformations are possible at source-level and which are possible at binary-level. While binaries are typically seen as opaque artifacts, our binary recompiler Egalito (ASPLOS 2020) enables users to parse and modify stripped binaries on existing systems. Our technique of binary recompilation is not robust to errors in disassembly, but with an accurate analysis, provides near-zero transformation overhead. We wrote several demonstration security tools with Egalito, including code randomization, control-flow integrity, retpoline insertion, and a fuzzing backend. We also wrote Nibbler (ACSAC 2019, DTRAP 2020), which detects unused code and removes it. Many of these features, including Nibbler, can be combined with other defenses resulting in multiplicatively stronger or more effective hardening. Enabled by our recompiler, an overriding theme of this thesis is our focus on deployable software transformation. Egalito has been tested by collaborators across tens of thousands of Debian programs and libraries. We coined this term egalitarian in the context of binary security. Simply put, an egalitarian analysis or security mechanism is one that can operate on itself (and is usually more deployable as a result). As one demonstration of this idea, we created a strong, deployable defense against code reuse attacks.
    [Show full text]
  • Chapter 1. Origins of Mac OS X
    1 Chapter 1. Origins of Mac OS X "Most ideas come from previous ideas." Alan Curtis Kay The Mac OS X operating system represents a rather successful coming together of paradigms, ideologies, and technologies that have often resisted each other in the past. A good example is the cordial relationship that exists between the command-line and graphical interfaces in Mac OS X. The system is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X exemplifies how a capable system can result from the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and, of course, individuals. Apple has been around since 1976, and many accounts of its history have been told. If the story of Apple as a company is fascinating, so is the technical history of Apple's operating systems. In this chapter,[1] we will trace the history of Mac OS X, discussing several technologies whose confluence eventually led to the modern-day Apple operating system. [1] This book's accompanying web site (www.osxbook.com) provides a more detailed technical history of all of Apple's operating systems. 1 2 2 1 1.1. Apple's Quest for the[2] Operating System [2] Whereas the word "the" is used here to designate prominence and desirability, it is an interesting coincidence that "THE" was the name of a multiprogramming system described by Edsger W. Dijkstra in a 1968 paper. It was March 1988. The Macintosh had been around for four years.
    [Show full text]
  • CIS Ubuntu Linux 18.04 LTS Benchmark
    CIS Ubuntu Linux 18.04 LTS Benchmark v1.0.0 - 08-13-2018 Terms of Use Please see the below link for our current terms of use: https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/ 1 | P a g e Table of Contents Terms of Use ........................................................................................................................................................... 1 Overview ............................................................................................................................................................... 12 Intended Audience ........................................................................................................................................ 12 Consensus Guidance ..................................................................................................................................... 13 Typographical Conventions ...................................................................................................................... 14 Scoring Information ..................................................................................................................................... 14 Profile Definitions ......................................................................................................................................... 15 Acknowledgements ...................................................................................................................................... 17 Recommendations ............................................................................................................................................
    [Show full text]
  • Linux Fundamentals Paul Cobbaut Linux Fundamentals Paul Cobbaut
    Linux Fundamentals Paul Cobbaut Linux Fundamentals Paul Cobbaut Publication date 2015-05-24 CEST Abstract This book is meant to be used in an instructor-led training. For self-study, the intent is to read this book next to a working Linux computer so you can immediately do every subject, practicing each command. This book is aimed at novice Linux system administrators (and might be interesting and useful for home users that want to know a bit more about their Linux system). However, this book is not meant as an introduction to Linux desktop applications like text editors, browsers, mail clients, multimedia or office applications. More information and free .pdf available at http://linux-training.be . Feel free to contact the author: • Paul Cobbaut: [email protected], http://www.linkedin.com/in/cobbaut Contributors to the Linux Training project are: • Serge van Ginderachter: [email protected], build scripts and infrastructure setup • Ywein Van den Brande: [email protected], license and legal sections • Hendrik De Vloed: [email protected], buildheader.pl script We'd also like to thank our reviewers: • Wouter Verhelst: [email protected], http://grep.be • Geert Goossens: [email protected], http://www.linkedin.com/in/ geertgoossens • Elie De Brauwer: [email protected], http://www.de-brauwer.be • Christophe Vandeplas: [email protected], http://christophe.vandeplas.com • Bert Desmet: [email protected], http://blog.bdesmet.be • Rich Yonts: [email protected], Copyright 2007-2015 Netsec BVBA, Paul Cobbaut Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts.
    [Show full text]
  • [Improving System Performance Using Application-Level Hints]
    Improving System Performance using Application-Level Hints Björn Döbel Technische Universität Dresden, Department of Computer Science, Operating Systems Group 8th June 2005 Supervising professor: Prof. Dr. Hermann Härtig Supervisor: Dipl.-Inf. Martin Pohlack Selbständigkeitserklärung Hiermit erkläre ich, die vorliegende Arbeit selbständig verfasst zu haben. Ich habe keine anderen als die im Quellenverzeichnis angegebenen Literaturhilfsmittel verwendet. Dresden, 08.06.2005 Björn Döbel 2 Contents 1 Introduction 5 1.1 State of the art .................................. 6 1.1.1 Monitoring ............................... 7 1.1.2 Resource management ......................... 8 1.1.3 Linux kernel modules ......................... 9 1.1.4 Caches in Linux ............................ 10 1.1.5 Using prefetching to increase application performance ........ 11 1.2 Related work .................................. 14 1.2.1 Transparent Informed Prefetch ..................... 14 1.2.2 Speculative Hinting ........................... 15 1.2.3 Integrating prefetching and caching .................. 16 2 Design 19 2.1 Disk accesses and application startup ...................... 19 2.2 Design goals ................................... 20 2.3 Design decisions ................................ 21 2.3.1 Collecting data ............................. 21 2.3.2 Modifying the Linux kernel ...................... 23 2.3.3 HintMod - the kernel module ...................... 24 2.3.4 HintGen - the hint generator ...................... 25 2.3.5 Application of hints .........................
    [Show full text]
  • CIS Red Hat Enterprise Linux 7 Benchmark
    CIS Red Hat Enterprise Linux 7 Benchmark v2.1.1 - 01-31-2017 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Public License. The link to the license terms can be found at https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode To further clarify the Creative Commons license related to CIS Benchmark content, you are authorized to copy and redistribute the content for use by you, within your organization and outside your organization for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, (ii) a link to the license is provided. Additionally, if you remix, transform or build upon the CIS Benchmark(s), you may only distribute the modified materials if they are subject to the same license terms as the original Benchmark license and your derivative will no longer be a CIS Benchmark. Commercial use of CIS Benchmarks is subject to the prior approval of the Center for Internet Security. 1 | P a g e Table of Contents Overview ............................................................................................................................................................... 12 Intended Audience ........................................................................................................................................ 12 Consensus Guidance ..................................................................................................................................... 12 Typographical Conventions .....................................................................................................................
    [Show full text]
  • Reducing Memory Usage at Shard Library Use on Embedded Devices
    Reducing Memory Usage at Shard Library Use on Embedded Devices 2007.02.22 Tetsuji Yamamoto, Matsushita Electric Industrial Co., Ltd. Masashige Mizuyama, Panasonic Mobile Communications Co., Ltd. [translated by Takao Ikoma] Table of Contents Background Analysis Method discussed Lazy Loading (overview, idea, implementation) Results Issues CE Linux Forum Japan Regional Technical Jamboree #13 2007/02/22 Copyright (C) 2007 Matsushita Electric Industrial Co., Ltd. 2 Background(1) In embedded systems such as cellular phones, features of applications have grown up, so more dynamic libraries are getting linked (in some cases, dozens of libraries are linked) dependency among dynamic libraries gets complicated, unnecessary library for the application, or library required only for a specific feature, must be linked CASE1 app libA.so libD.so main(){ funcA(){ funcD(){ funcA(); } } funcB(); funcC(){ } funcD(); } libB.so funcB(){ } For the dependency shown above, lib A, B and D should be linked; but libD.so is not actually used, thus the memory for the library is wasted. CE Linux Forum Japan Regional Technical Jamboree #13 2007/02/22 Copyright (C) 2007 Matsushita Electric Industrial Co., Ltd. 3 Background(2) CASE2: app libA.so libD.so funcA(bool X){ funcD(){ main(){ if(X){ } funcA(FALSE); func D(); funcB(); } else { } func B(); } libB.so funcB(){ } For the structure shown above, funcD() is never called at runtime, but should be linked. → To handle this with dynamic loading (dlopen(), dlsym()), both the application and the libraries should be restructured, which would cost a lot Would like to save this memory overhead for which unused library is loaded. CE Linux Forum Japan Regional Technical Jamboree #13 2007/02/22 Copyright (C) 2007 Matsushita Electric Industrial Co., Ltd.
    [Show full text]
  • Red Hat Enterprise Linux 7 Migration Planning Guide
    Red Hat Enterprise Linux 7 Migration Planning Guide Migrating to Red Hat Enterprise Linux 7 Laura Bailey Red Hat Enterprise Linux 7 Migration Planning Guide Migrating to Red Hat Enterprise Linux 7 Laura Bailey Legal Notice Copyright © 2014 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project. The OpenStack ® Word Mark and OpenStack Logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission.
    [Show full text]
  • Roberto Agostino Vitillo (LBNL)
    SHARING C++ OBJECTS IN LINUX Roberto Agostino Vitillo (LBNL) 1 EXAMPLE USE CASE Database of objects in shared memory (simplified view...) object object Process A object Process B object Physical Memory Virtual MemoryB VirtualMemory A 2 OBJECT SHARING • Objects can be allocated in shared memory segments (e.g. custom allocators) • Assumptions: ‣ GCC ≥ 3 (Itanium C++ ABI) ‣ Linux ≥ 2.6.12 (Address Space Layout Randomization) ‣ Changing the default visibility of symbols, with visibility pragmas or linker scripts for example, is not considered ‣ Binding references to global symbols to the definition within a shared library (e.g. ld’s -Bsymbolic option) is not considered • Issues: ‣ Static data ‣ Pointers and references ‣ Virtual functions ‣ Virtual inheritance 3 STATIC DATA • Static data members have external linkage; each process has its own copy • Non-const static data members reside in the object file’s .data section: changes are not shared between the processes • Const static members reside in the object’s file .rodata section and their semantic is not altered • Same argument applies to local static variables 4 POINTERS AND REFERENCES • Pointers and references can be shared only when pointing to objects within shared segments that are mapped at the same virtual base address in all processes ‣ allocate needed shared segments before forking ‣ allocate shared segments at the same virtual base address in all processes ‣ use “slow” offset pointers 5 VIRTUAL TABLES • A class that has virtual Virtual Table Layout (Itanium ABI) methods or virtual bases
    [Show full text]
  • Dynamic Linking with the ARM Compiler Toolchain Application Note 242
    Dynamic Linking with the ARM Compiler toolchain Application Note 242 Copyright © 2010 ARM. All rights reserved. ARM DAI 0242A (ID011411) Dynamic Linking with the ARM Compiler toolchain Application Note 242 Copyright © 2010 ARM. All rights reserved. Release Information The following changes have been made to this book. Change History Date Issue Confidentiality Change December 2010 A Non-Confidential First release Proprietary Notice Words and logos marked with or are registered trademarks or trademarks of ARM in the EU and other countries, except as otherwise stated below in this proprietary notice. Other brands and names mentioned herein may be the trademarks of their respective owners. Neither the whole nor any part of the information contained in, or the product described in, this document may be adapted or reproduced in any material form except with the prior written permission of the copyright holder. The product described in this document is subject to continuous developments and improvements. All particulars of the product and its use contained in this document are given by ARM in good faith. However, all warranties implied or expressed, including but not limited to implied warranties of merchantability, or fitness for purpose, are excluded. This document is intended only to assist the reader in the use of the product. ARM shall not be liable for any loss or damage arising from the use of any information in this document, or any error or omission in such information, or any incorrect use of the product. Where the term ARM is used it means "ARM or any of its subsidiaries as appropriate".
    [Show full text]
  • Zygote Anatomy Based on Prelink & Preload for Android Platform
    23-Oct(Fri) , 2009 ZygoteZygote AnatomyAnatomy BasedBased onon PrelinkPrelink && PreloadPreload forfor AndroidAndroid PlatformPlatform 4th Korea Android Seminar GeunSik Lim [email protected] http://blog.naver.com/invain 4th Korea Android Seminar 1/53 Agenda 1. Dynamic Linking & Static Linking 2. Prelink Fundamentals 3. Understanding Preload 4. Custom Linker (=Android Prelink) 5. Zygote Walkthrough 6. Relation between process and thread by Zygote 4th Korea Android Seminar 2/53 Main Keywords in This Session Dynamic Linking Prelink Prefetch Custom Linker Static Preread for Android Linking P rel oad Zygote Prefork Dynamic Loading 4th Korea Android Seminar 3/53 Location of Linker in FOSS World 4th Korea Android Seminar 4/53 Static Linking • Static linking avoids dependency problems. (-static) • In general cases, static linking can result in a performance improvement. • Static linking can also allow the application to be contained in a single executable file, simplifying distribution and installation. • In static linking, the size of the executable becomes greater than in dynamic linking, as the library code is stored within the executable rather than in separate files. 4th Korea Android Seminar 5/53 Dynamic Linking • Libraries can be integrated into a program once by a linker. Dynamic linking has advantages in code size and management. ( -dynamic) • But, every time a program is run, the loader needs to find the relevant libraries. • Because 1) the libraries can move around in memory, this causes a performance penalty, 2) and the more libraries
    [Show full text]