DPDK patches and discussions
 help / color / mirror / Atom feed
From: Konstantin Ananyev <konstantin.v.ananyev@yandex.ru>
To: "Morten Brørup" <mb@smartsharesystems.com>,
	"Stanisław Kardach" <kda@semihalf.com>,
	"Honnappa Nagarahalli" <Honnappa.Nagarahalli@arm.com>
Cc: dev <dev@dpdk.org>, Bruce Richardson <bruce.richardson@intel.com>,
	Jan Viktorin <viktorin@rehivetech.com>,
	Ruifeng Wang <Ruifeng.Wang@arm.com>,
	David Christensen <drc@linux.vnet.ibm.com>, nd <nd@arm.com>
Subject: Re: [RFC v2] non-temporal memcpy
Date: Fri, 29 Jul 2022 10:21:41 +0100	[thread overview]
Message-ID: <efd915c0-b2a4-e91e-561c-f1a57d35a1ed@yandex.ru> (raw)
In-Reply-To: <98CBD80474FA8B44BF855DF32C47DC35D87201@smartserver.smartshare.dk>

28/07/2022 11:51, Morten Brørup пишет:
> From: Stanisław Kardach [mailto:kda@semihalf.com]
> Sent: Thursday, 28 July 2022 00.02
>> On Wed, 27 Jul 2022, 21:53 Honnappa Nagarahalli, <Honnappa.Nagarahalli@arm.com> wrote:
>>
>>>>>>> Yes, x86 needs 16B alignment for NT load/stores But that's
>>>> supposed
>>>>>> to be arch
>>>>>>> specific limitation, that we probably want to hide, no?
>>>>>
>>>>> Correct. However, optional hints for optimization purposes will be
>>>> available.
>>>>> And it is up to the architecture specific implementation to make the
>>>> best use
>>>>> of these hints, or just ignore them.
>>>>>
>>>>>>> Inside the function can check alignment of both src and dst and
>>>>>> decide should it
>>>>>>> use NT load/store instructions or just do normal copy.
>>>>>> IMO, the normal copy should not be done by this API under any
>>>>>> conditions. Why not let the application call memcpy/rte_memcpy
>>>>>> when the NT copy is not applicable? It helps the programmer to
>>>> understand
>>>>>> and debug the issues much easier.
>>>>>
>>>>> Yes, the programmer must choose between normal memcpy() and non-
>>>>> temporal rte_memcpy_nt(). I am offering new functions, not modifying
>>>>> memcpy() or rte_memcpy().
>>>>>
>>>>> And rte_memcpy_nt() will silently fall back to normal memcpy() if
>>>> non-
>>>>> temporal copying is unavailable, e.g. on POWER and RISC-V
>>>> architectures,
>>>>> which don't have NT load/store instructions.
>>>> I am talking about a scenario where the application is being ported
>>>> between architectures. Not everyone knows about the capabilities of
>>>> the architecture. It is better to indicate upfront (ex: compilation
>>>> failures) that a certain feature is not supported on the target
>>>> architecture rather than the user having to discover through painful
>>>> debugging.
>>>
>>> I'm considering rte_memcpy_nt() a performance optimized variant of
>>> memcpy(), where the performance gain is less cache pollution. Thus, silent
>>> fallback to memcpy() should suffice.
>>>
>>> Other architecture differences also affect DPDK performance; the inability to
>>> perform non-temporal load/store just one more to the (undocumented) list.
>>>
>>> Failing at build time if NT load/store is unavailable by the architecture would
>>> prevent the function from being used by other DPDK libraries, e.g. by the
>>> rte_pktmbuf_copy() function used by the pdump library.
>> The other libraries in DPDK need to provide NT versions as the libraries need to cater for not-NT use cases as well. i.e. we cannot hide a NT copy under rte_pktmbuf_copy() API, we need to have rte_pktmbuf_copy_nt()
> 
> Yes, it was my intention to provide rte_pktmbuf_copy_nt() as a new function. Some uses of rte_pktmbuf_copy() may benefit from having the copied data in cache.
> 
> But there is a ripple effect:
> 
> It is also my intention to improve the pdump and pcapng libraries by using rte_pktmbuf_copy_nt() instead of rte_pktmbuf_copy(). These would normally benefit from not polluting the cache.
> 
> So the underlying rte_memcpy_nt() function needs a fallback if the architecture doesn't support non-temporal memory copy, now that the pdump and pcapng libraries depend on it.
> 
> Alternatively, if rte_memcpy_nt() has no fallback to standard memcpy(), but an application fails to build if the application developer tries to use rte_memcpy_nt(), we would have to modify e.g. pdump_copy() like this:
> 
> + #ifdef RTE_CPUFLAG_xxx
>    p = rte_pktmbuf_copy_nt(pkts[i], mp, 0, cbs->snaplen);
> + #else
>    p = rte_pktmbuf_copy(pkts[i], mp, 0, cbs->snaplen);
> + #endif
> 
> Personally, I prefer the fallback inside rte_memcpy_nt(), rather than having to check for it everywhere.

+1 here.
If we going to introduce rte_memcpy_nt(), I think it better be
'best effort' approach - if it can do NT, great, if not
just fall back to normal copy.

> 
> The developer using the pdump library will not know if the fallback is inside rte_memcpy_nt() or outside using #ifdef. It is still hidden inside pdump_copy().
> 
>>
>>>
>>> I don't oppose to your idea, I just don't have any idea how to reasonably
>>> implement it. So I'm trying to defend why it is not important.
>> I am suggesting that the applications could implement #ifdef depending on the architecture.
>> I assume that it would be a pre-processor flag defined (or not) on DPDK side and application doing #ifdef based on it?
>>
>> Another way to achieve this would be to use #warning directive (see [1]) inside DPDK when the generic fallback is taken.
>>
>> Also isn't the argument on memcpy_nt capability query not a more general one, that is how would/should application query DPDK's capabilities when run or compiled?
> 
> Good point! You just solved this part of the puzzle, Stanislaw:
> 
> The ability to perform non-temporal memory load/store is a CPU feature.
> 
> Applications that need to know if non-temporal memory access is available should check for the appropriate CPU feature flag, e.g. RTE_CPUFLAG_SSE4_1 on x86 architecture. This works both at runtime and at compile time.
> 
>>
>> [1] https://gcc.gnu.org/onlinedocs/cpp/Diagnostics.html
> 


  reply	other threads:[~2022-07-29  9:23 UTC|newest]

Thread overview: 57+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-07-19 15:26 Morten Brørup
2022-07-19 18:00 ` David Christensen
2022-07-19 18:41   ` Morten Brørup
2022-07-19 18:51     ` Stanisław Kardach
2022-07-19 22:15       ` Morten Brørup
2022-07-21 23:19 ` Konstantin Ananyev
2022-07-22 10:44   ` Morten Brørup
2022-07-24 13:35     ` Konstantin Ananyev
2022-07-24 22:18       ` Morten Brørup
2022-07-29 10:00         ` Konstantin Ananyev
2022-07-29 10:46           ` Morten Brørup
2022-07-29 11:50             ` Konstantin Ananyev
2022-07-29 17:17               ` Morten Brørup
2022-07-29 22:00                 ` Konstantin Ananyev
2022-07-30  9:51                   ` Morten Brørup
2022-08-02  9:05                     ` Konstantin Ananyev
2022-07-29 12:13             ` Konstantin Ananyev
2022-07-29 16:05               ` Stephen Hemminger
2022-07-29 17:29                 ` Morten Brørup
2022-08-07 20:40                 ` Mattias Rönnblom
2022-08-09  9:24                   ` Morten Brørup
2022-08-09 11:53                     ` Mattias Rönnblom
2022-10-09 16:16                       ` Morten Brørup
2022-07-29 18:13               ` Morten Brørup
2022-07-29 19:49                 ` Konstantin Ananyev
2022-07-29 20:26                   ` Morten Brørup
2022-07-29 21:34                     ` Konstantin Ananyev
2022-08-07 20:20                     ` Mattias Rönnblom
2022-08-09  9:34                       ` Morten Brørup
2022-08-09 11:56                         ` Mattias Rönnblom
2022-08-10 21:05                     ` Honnappa Nagarahalli
2022-08-11 11:50                       ` Mattias Rönnblom
2022-08-11 16:26                         ` Honnappa Nagarahalli
2022-07-25  1:17       ` Honnappa Nagarahalli
2022-07-27 10:26         ` Morten Brørup
2022-07-27 17:37           ` Honnappa Nagarahalli
2022-07-27 18:49             ` Morten Brørup
2022-07-27 19:12               ` Stephen Hemminger
2022-07-28  9:00                 ` Morten Brørup
2022-07-27 19:52               ` Honnappa Nagarahalli
2022-07-27 22:02                 ` Stanisław Kardach
2022-07-28 10:51                   ` Morten Brørup
2022-07-29  9:21                     ` Konstantin Ananyev [this message]
2022-08-07 20:25 ` Mattias Rönnblom
2022-08-09  9:46   ` Morten Brørup
2022-08-09 12:05     ` Mattias Rönnblom
2022-08-09 15:00       ` Morten Brørup
2022-08-10 11:47         ` Mattias Rönnblom
2022-08-09 15:26     ` Stephen Hemminger
2022-08-09 17:24       ` Morten Brørup
2022-08-10 11:59         ` Mattias Rönnblom
2022-08-10 12:12           ` Morten Brørup
2022-08-10 11:55       ` Mattias Rönnblom
2022-08-10 12:18         ` Morten Brørup
2022-08-10 21:20           ` Honnappa Nagarahalli
2022-08-11 11:53             ` Mattias Rönnblom
2022-08-11 22:24               ` Honnappa Nagarahalli

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=efd915c0-b2a4-e91e-561c-f1a57d35a1ed@yandex.ru \
    --to=konstantin.v.ananyev@yandex.ru \
    --cc=Honnappa.Nagarahalli@arm.com \
    --cc=Ruifeng.Wang@arm.com \
    --cc=bruce.richardson@intel.com \
    --cc=dev@dpdk.org \
    --cc=drc@linux.vnet.ibm.com \
    --cc=kda@semihalf.com \
    --cc=mb@smartsharesystems.com \
    --cc=nd@arm.com \
    --cc=viktorin@rehivetech.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).