Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp3891199pxb; Tue, 10 Nov 2020 02:47:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJy/bnFXJDRyYVAx+bJJ7AHEyH4/C5bBaQrIfkwDALxzeadeoFsD57bvl2dAegkNxLGFoOxE X-Received: by 2002:a17:906:77c5:: with SMTP id m5mr19637229ejn.424.1605005233740; Tue, 10 Nov 2020 02:47:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605005233; cv=none; d=google.com; s=arc-20160816; b=vb2mk06MXnEZ3gdbv6t7GNR6mSBsBpSJnYj7CcxYQ4OMYEBh+sJg/fpTbXym/hZTZf m1c0hFJZe5pc0Y1EqcwRHZzEucyDqYkEgpJpdXIHb+/MqfG/8DmM5ScOWCx4CHg2Xbpg nectwSdBO2YG0DPezOPH+R75yTAEFFMo4L7mn7f1JCNhI9A9gBHW5DmT6TKgw/fOMBkp a2MU3z7HcYXL/rvhocLdnbBQMMc/ycHewAuWImKssnhCG5sE1Gbxh01odzCJUopgTAui H43wwmb9k5czbdV7nEgFWg2L9WjNNJeVJlnwHKkQ3CuFlDX3Ltvp8VpW6cU5VU+8zWbx 27Tw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=oFQsrB1pQJCJpwJ/+3su/fUtq3/hpoZUEAeiQ+hAZCc=; b=G38nPe0294sdRTRLW1B/ERXWlcyd4Ab0+XEk6dQ/xFBBltDNL79QTqK8Z4V4kemT4+ M8EMNcak6EtKD+um+KswueSnMK+NVcCYjgqNLpoIV9/v9vyvDM8s8CccrYh/zMeKLwAv 9ViZQfFWU/NJ1lUp35S9EEyp0o09VZksLcKftS5cxxt+PDi5SJiWbwgqZMev9MDM6Mx+ JX/QQ5iK0QKwAes/6jCuyhh9ersOO/yzrGviuYCaqowpbRghGDGK3+E/455Bc4o2o+X+ flzAZ1sECeClY3ICnB7pzHb4TcaT9w8R89JnskbOUHKqOyYGs8j1o327g5kerSz3g61T GZkw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g20si10683436ejm.339.2020.11.10.02.46.43; Tue, 10 Nov 2020 02:47:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726698AbgKJKqi (ORCPT + 99 others); Tue, 10 Nov 2020 05:46:38 -0500 Received: from foss.arm.com ([217.140.110.172]:53700 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726462AbgKJKqi (ORCPT ); Tue, 10 Nov 2020 05:46:38 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id F383E11D4; Tue, 10 Nov 2020 02:46:36 -0800 (PST) Received: from arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id BE3B13F6CF; Tue, 10 Nov 2020 02:46:35 -0800 (PST) Date: Tue, 10 Nov 2020 10:46:32 +0000 From: Dave Martin To: Li Qiang Cc: alexandre.torgue@st.com, catalin.marinas@arm.com, linux-crypto@vger.kernel.org, mcoquelin.stm32@gmail.com, will@kernel.org, davem@davemloft.net, linux-arm-kernel@lists.infradead.org, herbert@gondor.apana.org.au Subject: Re: [PATCH 0/1] arm64: Accelerate Adler32 using arm64 SVE instructions. Message-ID: <20201110104629.GJ6882@arm.com> References: <20201103121506.1533-1-liqiang64@huawei.com> <20201105165301.GH6882@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Nov 09, 2020 at 11:43:35AM +0800, Li Qiang wrote: > Hi Dave, > > I carefully read the ideas you provided and the sample code you gave me.:) > > 在 2020/11/6 0:53, Dave Martin 写道: > > On Tue, Nov 03, 2020 at 08:15:05PM +0800, l00374334 wrote: > >> From: liqiang > >> > >> Dear all, > >> > >> Thank you for taking the precious time to read this email! > >> > >> Let me introduce the implementation ideas of my code here. > >> > >> In the process of using the compression library libz, I found that the adler32 > >> checksum always occupies a higher hot spot, so I paid attention to this algorithm. > >> After getting in touch with the SVE instruction set of armv8, I realized that > >> SVE can effectively accelerate adler32, so I made some attempts and got correct > >> and better performance results. I very much hope that this modification can be > >> applied to the kernel. > >> > >> Below is my analysis process: > >> > >> Adler32 algorithm > >> ================= > >> > >> Reference: https://en.wikipedia.org/wiki/Adler-32 > >> > >> Assume that the buf of the Adler32 checksum to be calculated is D and the length is n: > >> > >> A = 1 + D1 + D2 + ... + Dn (mod 65521) > >> > >> B = (1 + D1) + (1 + D1 + D2) + ... + (1 + D1 + D2 + ... + Dn) (mod 65521) > >> = n×D1 + (n−1)×D2 + (n−2)×D3 + ... + Dn + n (mod 65521) > >> > >> Adler-32(D) = B × 65536 + A > >> > >> In C, an inefficient but straightforward implementation is: > >> > >> const uint32_t MOD_ADLER = 65521; > >> > >> uint32_t adler32(unsigned char *data, size_t len) > >> { > >> uint32_t a = 1, b = 0; > >> size_t index; > >> > >> // Process each byte of the data in order > >> for (index = 0; index < len; ++index) > >> { > >> a = (a + data[index]) % MOD_ADLER; > >> b = (b + a) % MOD_ADLER; > >> } > >> > >> return (b << 16) | a; > >> } > >> > >> SVE vector method > >> ================= > >> > >> Step 1. Determine the block size: > >> Use addvl instruction to get SVE bit width. > >> Assuming the SVE bit width is x here. > >> > >> Step 2. Start to calculate the first block: > >> The calculation formula is: > >> A1 = 1 + D1 + D2 + ... + Dx (mod 65521) > >> B1 = x*D1 + (x-1)*D2 + ... + Dx + x (mod 65521) > >> > >> Step 3. Calculate the follow block: > >> The calculation formula of A2 is very simple, just add up: > >> A2 = A1 + Dx+1 + Dx+2 + ... + D2x (mod 65521) > >> > >> The calculation formula of B2 is more complicated, because > >> the result is related to the length of buf. When calculating > >> the B1 block, it is actually assumed that the length is the > >> block length x. Now when calculating B2, the length is expanded > >> to 2x, so B2 becomes: > >> B2 = 2x*D1 + (2x-1)*D2 + ... + (x+1)*Dx + x*D(x+1) + ... + D2x + 2x > >> = x*D1 + x*D1 + x*D2 + (x-1)*D2 + ... + x*Dx + Dx + x*1 + x + [x*D(x+1) + (x-1)*D(x+2) + ... + D2x] > >> ^^^^ ~~~~ ^^^^ ~~~~~~~~ ^^^^ ~~ ^^^ ~ +++++++++++++++++++++++++++++++++++++ > >> Through the above polynomial transformation: > >> Symbol "^" represents the ; > >> Symbol "~" represents the ; > >> Symbol "+" represents the next block. > >> > >> So we can get the method of calculating the next block from > >> the previous block(Assume that the first byte number of the > >> new block starts from 1): > >> An+1 = An + D1 + D2 + ... + Dx (mod 65521) > >> Bn+1 = Bn + x*An + x*D1 + (x-1)*D2 + ... + Dx (mod 65521) > > > > Putting aside people's concerns for the moment, I think this may be > > formulated in a slightly more convenient way: > > > > If > > X0, X1, ... are the data bytes > > An is 1 + Sum [i=0 .. n-1] Xi > > Bn is n + Sum [i=0 .. n-1] (n-i)Xi > > = Sum [i=1 .. n] Ai > > Yes, this can be calculated from the original expression. > > > > > (i.e., An, Bn are the accumulations for the first n bytes here, not the > > first n blocks) > > > > then > > > > A[n+v] - An = Sum[i=n .. n+v-1] Xi > > > > B[n+v] - Bn = v + (Sum [i=0 .. n+v-1] (n+v-i) Xi) > > - Sum [i=0 .. n-1] (n-i)Xi > > > > = v + (Sum [i=n .. n+v-1] (n+v-i) Xi) > > + (Sum [i=0 .. n-1] (n+v-i) Xi) > > - Sum [i=0 .. n-1] (n-i)Xi > > > > = v + (Sum [i=n .. n+v-1] (n+v-i) Xi) > > + Sum [i=0 .. n-1] ((n+v-i) - (n-i)) Xi > > > > = v + (Sum [i=n .. n+v-1] (n+v-i) Xi) > > + vSum [i=0 .. n-1] Xi > > > > = v + v(An - 1) + Sum [i=n .. n+v-1] (n+v-i) Xi > > > > = vAn + Sum [i=n .. n+v-1] (n+v-i) Xi > > > > = vAn + vSum [i=n .. n+v-1] Xi > > + Sum [i=n .. n+v-1] (n-i) Xi > > > > = vAn + vSum [i=n .. n+v-1] Xi > > + Sum [i=n .. n+v-1] (n-i) Xi > > > > = vA[n+v] + Sum [i=n .. n+v-1] (n-i) Xi > > > > Let j = i - n; then: > > > > B[n+v] - Bn = vA[n+v] - Sum [j=0 .. v-1] j X[j+n] > > > > Which gives us a multiplier j that increases with the X[] index. > > My original approach is to multiply the byte sequence with the **decreasing** > sequence. I think the increasing sequence here is more friendly to the trailing > bytes of the loop.:-) > > > > > > > I think this gives a core loop along the following lines. I don't know > > whether this is correct, or whether it works -- but feel free to take > > ideas from it if it helps. > > > > Accumulators are 32 bits. This provides for a fair number of iterations > > without overflow, but large input data will still require splitting into > > chunks, with modulo reduction steps in between. There are rather a lot > > of serial dependencies in the core loop, but since the operations > > involved are relatively cheap, this is probably not a significant issue > > in practice: the load-to-use dependency is probably the bigger concern. > > Pipelined loop unrolling could address these if necessary. > > > > The horizontal reductions (UADDV) still probably don't need to be done > > until after the last chunk. > > > > > > Beware: I wasn't careful with the initial values for Bn / An, so some > > additional adjustments might be needed... > > > > --8<-- > > > > ptrue pP.s > > ptrue pA.s > > > > mov zA.s, #0 // accumulator for An > > mov zB.s, #0 // accumulator for Bn > > index zJ.s, #0, #1 // zJ.s = [0, 1, .. V-1] > > > > mov zV.s, #0 > > incw zV.s // zV.s = [V, V, .. V] > > When I actually tested this code, I found that the byte length of the > test must be equal to the vector length divided by 4 (that is, an integer > multiple of the number of words in the SVE) and the result is correct. > > And I think one of the reasons is that the value stored in zV.s needs to be > changed in the last cycle. It should be changed to the actual number of > bytes remaining in the last cycle. :) Ah yes, you're quite right about this. In my derivation above, v will need to be smaller than the vector length when processing the final, partial block (if any). > > > > > // where V is number of elements per block > > // = the number of 32-bit elements that fit in a Z-register > > > > add xLimit, xX, xLen > > b start > > > > loop: > > ld1b zX.s, pP/z, [xX] > > incw xX > > In order to verify my conjecture, I added a bit of code to here, which is to > subtract the corresponding value from zV in the last loop. But it is correct > only when the number of bytes is less than one cycle. Test cases that exceed > one complete cycle will also fail. > > So I guess before calculating the last cycle, zA should be summed first, > because before the end of the cycle, zA and zB are scattered in the elements > of the vector, if the last cycle calculates zB, only part of zA is summed > ( Because pP/m does not count inactive elements), it should be incomplete. > > This is just my guess and has not yet been verified.:) I think zA shouldn't be wrong, since that only accumulates active elements anyway. I think it's the bogus zV multiplier involved in the update to zB that is the problem. > > > > add zA.s, pP/m, zA.s, zX.s // zA.s += zX.s > > > > msb zX.s, pP/m, zJ.s, zB.s // zX.s := zB.s - zX.s * zJ.s > > > > movprfx zB, zA > > mad zB.s, pP/m, zV.s, zX.s // zB.s := zX.s + zA.s * V > > start: > > whilelo pP.s, xX, xLimit > > b.first loop There are a few options, I guess. One way is to use CNTP inside the loop to get the number of active elements, instead of just setting zV in advance. This approach may add a slight overhead, but it is worth experimenting with it. If the overhead is neglibible, then this approach has the example of being simple to understand. Alternatively, you could do an adjustment after the loop ends to subtract the appropriate amounts from zB. Unfortunately, pP has already been overwritten by the time the loop ends. If could be backed up into another P-register before overwriting it: this should be pretty low- overhead. A final option would be to change the b.first to a b.last, so that the loop ends after the final full block. Then copy-paste the loop body to execute once more, but using CNTP to get the element count to multiply by, as described above. This makes the code a bit larger, but it probably the best-performance option. You may be able to rotate the loop so that it breaks out after updating zA (which IIUC doesn't need to be done in a special way for the partial block). This would mean you only have to specialise the zB update code. > > > > // Collect the partial sums together: > > > > uaddv d0, pA, z0.s > > uaddv d1, pA, z1.s > > > > // Finally, add 1 to d0, and xLen to d1, and do modulo reduction. > > > > -->8-- > > > > [...] > > > > Cheers > > ---Dave > > . > > > > The code you sent me provides a correct way to deal with trailing bytes, > I need to spend some more time to debug the problem encountered above. > Thank you! > > Cheers.^_^ I was cheekily leaving the testing and debugging for you to do :) Part of my reason for interest in this is that if we enable SVE in the kernel, it would be good to have some clean examples for people to follow -- even if not this algo. SVE is a bit different to use compared with fixed-length vector ISAs, so worked examples are always useful. Cheers ---Dave