-
Notifications
You must be signed in to change notification settings - Fork 218
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve __clzsi2
performance
#366
Merged
alexcrichton
merged 1 commit into
rust-lang:master
from
AaronKutch:better-leading-zeros
Jul 28, 2020
Merged
Changes from all commits
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,143 @@ | ||
// Note: these functions happen to produce the correct `usize::leading_zeros(0)` value | ||
// without a explicit zero check. Zero is probably common enough that it could warrant | ||
// adding a zero check at the beginning, but `__clzsi2` has a precondition that `x != 0`. | ||
// Compilers will insert the check for zero in cases where it is needed. | ||
|
||
/// Returns the number of leading binary zeros in `x`. | ||
pub fn usize_leading_zeros_default(x: usize) -> usize { | ||
// The basic idea is to test if the higher bits of `x` are zero and bisect the number | ||
// of leading zeros. It is possible for all branches of the bisection to use the same | ||
// code path by conditionally shifting the higher parts down to let the next bisection | ||
// step work on the higher or lower parts of `x`. Instead of starting with `z == 0` | ||
// and adding to the number of zeros, it is slightly faster to start with | ||
// `z == usize::MAX.count_ones()` and subtract from the potential number of zeros, | ||
// because it simplifies the final bisection step. | ||
let mut x = x; | ||
// the number of potential leading zeros | ||
let mut z = usize::MAX.count_ones() as usize; | ||
// a temporary | ||
let mut t: usize; | ||
#[cfg(target_pointer_width = "64")] | ||
{ | ||
t = x >> 32; | ||
if t != 0 { | ||
z -= 32; | ||
x = t; | ||
} | ||
} | ||
#[cfg(any(target_pointer_width = "32", target_pointer_width = "64"))] | ||
{ | ||
t = x >> 16; | ||
if t != 0 { | ||
z -= 16; | ||
x = t; | ||
} | ||
} | ||
t = x >> 8; | ||
if t != 0 { | ||
z -= 8; | ||
x = t; | ||
} | ||
t = x >> 4; | ||
if t != 0 { | ||
z -= 4; | ||
x = t; | ||
} | ||
t = x >> 2; | ||
if t != 0 { | ||
z -= 2; | ||
x = t; | ||
} | ||
// the last two bisections are combined into one conditional | ||
t = x >> 1; | ||
if t != 0 { | ||
z - 2 | ||
} else { | ||
z - x | ||
} | ||
|
||
// We could potentially save a few cycles by using the LUT trick from | ||
// "https://embeddedgurus.com/state-space/2014/09/ | ||
// fast-deterministic-and-portable-counting-leading-zeros/". | ||
// However, 256 bytes for a LUT is too large for embedded use cases. We could remove | ||
// the last 3 bisections and use this 16 byte LUT for the rest of the work: | ||
//const LUT: [u8; 16] = [0, 1, 2, 2, 3, 3, 3, 3, 4, 4, 4, 4, 4, 4, 4, 4]; | ||
//z -= LUT[x] as usize; | ||
//z | ||
// However, it ends up generating about the same number of instructions. When benchmarked | ||
// on x86_64, it is slightly faster to use the LUT, but this is probably because of OOO | ||
// execution effects. Changing to using a LUT and branching is risky for smaller cores. | ||
} | ||
|
||
// The above method does not compile well on RISC-V (because of the lack of predicated | ||
// instructions), producing code with many branches or using an excessively long | ||
// branchless solution. This method takes advantage of the set-if-less-than instruction on | ||
// RISC-V that allows `(x >= power-of-two) as usize` to be branchless. | ||
|
||
/// Returns the number of leading binary zeros in `x`. | ||
pub fn usize_leading_zeros_riscv(x: usize) -> usize { | ||
let mut x = x; | ||
// the number of potential leading zeros | ||
let mut z = usize::MAX.count_ones() as usize; | ||
// a temporary | ||
let mut t: usize; | ||
|
||
// RISC-V does not have a set-if-greater-than-or-equal instruction and | ||
// `(x >= power-of-two) as usize` will get compiled into two instructions, but this is | ||
// still the most optimal method. A conditional set can only be turned into a single | ||
// immediate instruction if `x` is compared with an immediate `imm` (that can fit into | ||
// 12 bits) like `x < imm` but not `imm < x` (because the immediate is always on the | ||
// right). If we try to save an instruction by using `x < imm` for each bisection, we | ||
// have to shift `x` left and compare with powers of two approaching `usize::MAX + 1`, | ||
// but the immediate will never fit into 12 bits and never save an instruction. | ||
#[cfg(target_pointer_width = "64")] | ||
{ | ||
// If the upper 32 bits of `x` are not all 0, `t` is set to `1 << 5`, otherwise | ||
// `t` is set to 0. | ||
t = ((x >= (1 << 32)) as usize) << 5; | ||
// If `t` was set to `1 << 5`, then the upper 32 bits are shifted down for the | ||
// next step to process. | ||
x >>= t; | ||
// If `t` was set to `1 << 5`, then we subtract 32 from the number of potential | ||
// leading zeros | ||
z -= t; | ||
} | ||
#[cfg(any(target_pointer_width = "32", target_pointer_width = "64"))] | ||
{ | ||
t = ((x >= (1 << 16)) as usize) << 4; | ||
x >>= t; | ||
z -= t; | ||
} | ||
t = ((x >= (1 << 8)) as usize) << 3; | ||
x >>= t; | ||
z -= t; | ||
t = ((x >= (1 << 4)) as usize) << 2; | ||
x >>= t; | ||
z -= t; | ||
t = ((x >= (1 << 2)) as usize) << 1; | ||
x >>= t; | ||
z -= t; | ||
t = (x >= (1 << 1)) as usize; | ||
x >>= t; | ||
z -= t; | ||
// All bits except the LSB are guaranteed to be zero for this final bisection step. | ||
// If `x != 0` then `x == 1` and subtracts one potential zero from `z`. | ||
z - x | ||
} | ||
|
||
intrinsics! { | ||
#[maybe_use_optimized_c_shim] | ||
#[cfg(any( | ||
target_pointer_width = "16", | ||
target_pointer_width = "32", | ||
target_pointer_width = "64" | ||
))] | ||
/// Returns the number of leading binary zeros in `x`. | ||
pub extern "C" fn __clzsi2(x: usize) -> usize { | ||
if cfg!(any(target_arch = "riscv32", target_arch = "riscv64")) { | ||
usize_leading_zeros_riscv(x) | ||
} else { | ||
usize_leading_zeros_default(x) | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,54 @@ | ||
use rand_xoshiro::rand_core::{RngCore, SeedableRng}; | ||
use rand_xoshiro::Xoshiro128StarStar; | ||
|
||
use compiler_builtins::int::__clzsi2; | ||
use compiler_builtins::int::leading_zeros::{ | ||
usize_leading_zeros_default, usize_leading_zeros_riscv, | ||
}; | ||
|
||
#[test] | ||
fn __clzsi2_test() { | ||
// Binary fuzzer. We cannot just send a random number directly to `__clzsi2()`, because we need | ||
// large sequences of zeros to test. This XORs, ANDs, and ORs random length strings of 1s to | ||
// `x`. ORs insure sequences of ones, ANDs insures sequences of zeros, and XORs are not often | ||
// destructive but add entropy. | ||
let mut rng = Xoshiro128StarStar::seed_from_u64(0); | ||
let mut x = 0usize; | ||
// creates a mask for indexing the bits of the type | ||
let bit_indexing_mask = usize::MAX.count_ones() - 1; | ||
// 10000 iterations is enough to make sure edge cases like single set bits are tested and to go | ||
// through many paths. | ||
for _ in 0..10_000 { | ||
let r0 = bit_indexing_mask & rng.next_u32(); | ||
// random length of ones | ||
let ones: usize = !0 >> r0; | ||
let r1 = bit_indexing_mask & rng.next_u32(); | ||
// random circular shift | ||
let mask = ones.rotate_left(r1); | ||
match rng.next_u32() % 4 { | ||
0 => x |= mask, | ||
1 => x &= mask, | ||
// both 2 and 3 to make XORs as common as ORs and ANDs combined | ||
_ => x ^= mask, | ||
} | ||
let lz = x.leading_zeros() as usize; | ||
let lz0 = __clzsi2(x); | ||
let lz1 = usize_leading_zeros_default(x); | ||
let lz2 = usize_leading_zeros_riscv(x); | ||
if lz0 != lz { | ||
panic!("__clzsi2({}): expected: {}, found: {}", x, lz, lz0); | ||
} | ||
if lz1 != lz { | ||
panic!( | ||
"usize_leading_zeros_default({}): expected: {}, found: {}", | ||
x, lz, lz1 | ||
); | ||
} | ||
if lz2 != lz { | ||
panic!( | ||
"usize_leading_zeros_riscv({}): expected: {}, found: {}", | ||
x, lz, lz2 | ||
); | ||
} | ||
} | ||
} |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
To avoid the duplication here could this perhaps use
if cfg!(...)
internally?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes