Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 24 Nov 2021 13:02:47 -0500
From:      Allan Jude <allanjude@freebsd.org>
To:        Emmanuel Vadot <manu@bidouilliste.com>, Helge Oldach <freebsd@oldach.net>
Cc:        src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org
Subject:   Re: git: 32a2fed6e71f - stable/13 - openssl: Fix detection of ARMv7 and ARM64 CPU features
Message-ID:  <8664c9a1-f000-d07f-5f48-3b18d3e5f629@freebsd.org>
In-Reply-To: <20211124093016.e031bc2e2e935d1c67dbc0ae@bidouilliste.com>
References:  <d1d98c6b-f643-5c43-3dc2-de24e752be57@freebsd.org> <202111231936.1ANJaeDT011754@nuc.oldach.net> <20211124093016.e031bc2e2e935d1c67dbc0ae@bidouilliste.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 11/24/2021 3:30 AM, Emmanuel Vadot wrote:
> On Tue, 23 Nov 2021 20:36:40 +0100 (CET)
> freebsd@oldach.net (Helge Oldach) wrote:
> 
>> Allan Jude wrote on Tue, 23 Nov 2021 20:14:53 +0100 (CET):
>>> On 11/23/2021 5:00 AM, Helge Oldach wrote:
>>>> Allan Jude wrote on Mon, 22 Nov 2021 19:14:13 +0100 (CET):
>>>> Hmmm. On a RPi4/8G:
>>>>
>>>> Before (FreeBSD 13.0-STABLE (GENERIC) #366 stable/13-n248173-d16fbc488e6):
>>>> | type             16 bytes     64 bytes    256 bytes   1024 bytes   8192 bytes  16384 bytes
>>>> | aes-256-gcm      35791.98k    38533.57k    39986.77k    41397.59k    39840.43k    39638.36k
>>>>
>>>> After (FreeBSD 13.0-STABLE (GENERIC) #367 stable/13-n248176-f085bb0e621)
>>>>
>>>> | type             16 bytes     64 bytes    256 bytes   1024 bytes   8192 bytes  16384 bytes
>>>> | aes-256-gcm      21277.62k    23226.64k    23613.90k    23687.51k    23892.93k    23947.95k
>>>>
>>>> It seems that AES throughput is actually cut by almost half?
>>>
>>> Do you know which of the CPU optimizations your RPi4 supports?
>>
>> Is this what you need?
>>
>>   Instruction Set Attributes 0 = <CRC32>
> 
>   So there is no AES+PMULL instruction set on RPI4, I guess that openssl
> uses them for aes-gcm.
> 
>   I wonder what it uses before that make it have this boost.
> 
>   On my rockpro64 I do see the improvement btw :
> root@generic:~ # cpuset -l 4,5 openssl speed -evp aes-256-gcm
> ...
> aes-256-gcm     122861.59k   337938.39k   565408.44k   661223.09k   709175.19k   712327.25k
> root@generic:~ # cpuset -l 4,5 env OPENSSL_armcap=0 openssl speed -evp aes-256-gcm
> ...
> aes-256-gcm      34068.11k    38068.62k    39435.24k    39818.75k    39905.34k    39922.35k
> 
>   Running on the big cores at max freq.
> 
>>   Instruction Set Attributes 1 = <>
>>           Processor Features 0 = <AdvSIMD,FP,EL3 32,EL2 32,EL1 32,EL0 32>
>>           Processor Features 1 = <>
>>        Memory Model Features 0 = <TGran4,TGran64,SNSMem,BigEnd,16bit ASID,16TB PA>
>>        Memory Model Features 1 = <8bit VMID>
>>        Memory Model Features 2 = <32bit CCIDX,48bit VA>
>>               Debug Features 0 = <DoubleLock,2 CTX BKPTs,4 Watchpoints,6 Breakpoints,PMUv3,Debugv8>
>>               Debug Features 1 = <>
>>           Auxiliary Features 0 = <>
>>           Auxiliary Features 1 = <>
>> AArch32 Instruction Set Attributes 5 = <CRC32,SEVL>
>> AArch32 Media and VFP Features 0 = <FPRound,FPSqrt,FPDivide,DP VFPv3+v4,SP VFPv3+v4,AdvSIMD>
>> AArch32 Media and VFP Features 1 = <SIMDFMAC,FPHP DP Conv,SIMDHP SP Conv,SIMDSP,SIMDInt,SIMDLS,FPDNaN,FPFtZ>
>>
>>> You can set the environment variable OPENSSL_armcap to override
>>> OpenSSL's detection.
>>>
>>> Try: env OPENSSL_armcap=0 openssl speed -evp aes-256-gcm
>>
>> On FreeBSD 13.0-STABLE (GENERIC) #367 stable/13-n248176-f085bb0e621 again (i.e. after this commit):
>>
>> hmo@p48 ~ $ env OPENSSL_armcap=0 openssl speed -evp aes-256-gcm
>> Doing aes-256-gcm for 3s on 16 size blocks: 6445704 aes-256-gcm's in 3.08s
>> Doing aes-256-gcm for 3s on 64 size blocks: 1861149 aes-256-gcm's in 3.00s
>> Doing aes-256-gcm for 3s on 256 size blocks: 479664 aes-256-gcm's in 3.01s
>> Doing aes-256-gcm for 3s on 1024 size blocks: 122853 aes-256-gcm's in 3.04s
>> Doing aes-256-gcm for 3s on 8192 size blocks: 15181 aes-256-gcm's in 3.00s
>> Doing aes-256-gcm for 3s on 16384 size blocks: 7796 aes-256-gcm's in 3.07s
>> OpenSSL 1.1.1l-freebsd  24 Aug 2021
>> built on: reproducible build, date unspecified
>> options:bn(64,64) rc4(int) des(int) aes(partial) idea(int) blowfish(ptr)
>> compiler: clang
>> The 'numbers' are in 1000s of bytes per second processed.
>> type             16 bytes     64 bytes    256 bytes   1024 bytes   8192 bytes  16384 bytes
>> aes-256-gcm      33504.57k    39704.51k    40825.01k    41394.83k    41454.25k    41601.52k
>> hmo@p48 ~ $ openssl speed -evp aes-256-gcm
>> Doing aes-256-gcm for 3s on 16 size blocks: 4066201 aes-256-gcm's in 3.00s
>> Doing aes-256-gcm for 3s on 64 size blocks: 1087387 aes-256-gcm's in 3.00s
>> Doing aes-256-gcm for 3s on 256 size blocks: 280110 aes-256-gcm's in 3.03s
>> Doing aes-256-gcm for 3s on 1024 size blocks: 70412 aes-256-gcm's in 3.04s
>> Doing aes-256-gcm for 3s on 8192 size blocks: 8762 aes-256-gcm's in 3.00s
>> Doing aes-256-gcm for 3s on 16384 size blocks: 4402 aes-256-gcm's in 3.02s
>> OpenSSL 1.1.1l-freebsd  24 Aug 2021
>> built on: reproducible build, date unspecified
>> options:bn(64,64) rc4(int) des(int) aes(partial) idea(int) blowfish(ptr)
>> compiler: clang
>> The 'numbers' are in 1000s of bytes per second processed.
>> type             16 bytes     64 bytes    256 bytes   1024 bytes   8192 bytes  16384 bytes
>> aes-256-gcm      21686.41k    23197.59k    23656.30k    23725.04k    23926.10k    23916.23k
>> hmo@p48 ~ $
>>
>> Kind regards,
>> Helge
> 
> 

So based on results from Manu, and Mark Millard, it seems almost every 
ARM platform is faster when it takes advantage of the CPU features, 
except the RPi4(B).

As Manu pointed out, it doesn't appear to have the AES+PMULL feature, 
which means it must be something else that is slowing it down.

What might help, is to try each feature in turn, and figure out which 
one is causing slower results.

#define HWCAP_FP                0x00000001
#define HWCAP_ASIMD             0x00000002
#define HWCAP_EVTSTRM           0x00000004
#define HWCAP_AES               0x00000008
#define HWCAP_PMULL             0x00000010
#define HWCAP_SHA1              0x00000020
#define HWCAP_SHA2              0x00000040
#define HWCAP_CRC32             0x00000080

So try:
env OPENSSL_armcap=1 openssl speed -evp aes-256-gcm

as well as with armcap=2, 3 (both FP and ASIMD), 8 (just AES) etc.

For ones where the CPU lacks the feature, it will crash with 'Illegal 
instruction'

Separately, it might also be interesting to see the results of `openssl 
speed -evp sha256` before/after/with the different OPENSSL_armcap values

-- 
Allan Jude



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8664c9a1-f000-d07f-5f48-3b18d3e5f629>