Details: - Removed support for all induced methods except for 1m. This included removing code related to 3mh, 3m1, 4mh, 4m1a, and 4m1b as well as any code that existed only to support those implementations. These implementations were rarely used and posed code maintenance challenges for BLIS's maintainers going forward. - Removed reference kernels for packm that pack 3m and 4m micropanels, and removed 3m/4m-related code from bli_cntx_ref.c. - Removed support for 3m/4m from the code in frame/ind, then reorganized and streamlined the remaining code in that directory. The *ind(), *nat(), and *1m() APIs were all removed. (These additional API layers no longer made as much sense with only one induced method (1m) being supported.) The bli_ind.c file (and header) were moved to frame/base and bli_l3_ind.c (and header) and bli_l3_ind_tapi.h were moved to frame/3. - Removed 3m/4m support from the code in frame/1m/packm. - Removed 3m/4m support from trmm/trsm macrokernels and simplified some pointer arithmetic that was previously expressed in terms of the bli_ptr_inc_by_frac() static inline function (whose definition was also removed). - Removed the following subdirectories of level-0 macro headers from frame/include/level0: ri3, rih, ri, ro, rpi. The level-0 scalar macros defined in these directories were used exclusively for 3m and 4m method codes. - Simplified bli_cntx_set_blkszs() and bli_cntx_set_ind_blkszs() in light of 1m being the only induced method left within BLIS. - Removed dt_on_output field within auxinfo_t and its associated accessor functions. - Re-indexed the 1e/1r pack schemas after removing those associated with variants of the 3m and 4m methods. This leaves two bits unused within the pack format portion of the schema bitfield. (See bli_type_defs.h for more info.) - Spun off the basic and expert interfaces to the object and typed APIs into separate files: bli_l3_oapi.c and bli_l3_oapi_ex.c; bli_l3_tapi.c and bli_l3_tapi_ex.c. - Moved the level-3 operation-specific _check function calls from the operations' _front() functions to the corresponding _ex() function of the object API. (This change roughly maintains where the _check() functions are called in the call stack but lays the groundwork for future changes that may come to the level-3 object APIs.) Minor modifications to bli_l3_check.c to allow the check() functions to be called from the expert interface APIs. - Removed support within the testsuite for testing the aforementioned induced methods, and updated the standalone test drivers in the 'test' directory so reflect the retirement of those induced methods. - Modified the sandbox contract so that the user is obliged to define bli_gemm_ex() instead of bli_gemmnat(). (This change was made in light of the *nat() functions no longer existing.) Also updated the existing 'power10' and 'gemmlike' sandboxes to come into compliance with the new sandbox rules. - Updated BLISObjectAPI.md, BLISTypedAPI.md, Testsuite.md documentation to reflect the retirement of 3m/4m, and also modified Sandboxes.md to bring the document into alignment with new conventions. - Updated various comments; removed segments of commented-out code.
11 KiB
Contents
Introduction
This file briefly describes the requirements for building a custom BLIS sandbox.
Simply put, a sandbox in BLIS provides an alternative implementation to the
gemm operation.
To get a little more specific, a sandbox provides an alternative implementation
to the function bli_gemm_ex(), which is the
expert interface for calling the
object-based API for the gemm operation.
Why sandboxes? Sometimes you want to experiment with tweaks or changes to
the gemm operation, but you want to do so in a simple environment rather than
the highly macroized and refactored (and somewhat obfuscated) code of the
core framework. By building a BLIS sandbox, you can experiment (within limits)
and still benefit from BLIS's existing build system, testsuite, and toolbox of
utility functions.
Enabling a sandbox
To enable a sandbox at configure-time, you simply specify it as an option to
configure. Either of the following usages are accepted:
$ ./configure --enable-sandbox=gemmlike auto
$ ./configure -s gemmlike auto
Here, we tell configure that we want to use the gemmlike sandbox, which
corresponds to a sub-directory of sandbox named gemmlike. (Reminder: the
auto argument is the configuration target and thus unrelated to
sandboxes.)
NOTE: Using your own sandbox implementation means that BLIS will call your sandbox for all problem sizes and shapes, for all datatypes supported by BLIS. If you intend to only implement a subset of this functionality within your sandbox, you should be sure to redirect execution back into the core framework for the parts that you don't wish to reimplement yourself.
As configure runs, you should get output that includes lines
similar to:
configure: configuring for alternate gemm implementation:
configure: sandbox/gemmlike
And when you build BLIS, the last files to be compiled will be the source code in the specified sandbox:
Compiling obj/haswell/sandbox/gemmlike/bls_gemm.o ('haswell' CFLAGS for sandboxes)
Compiling obj/haswell/sandbox/gemmlike/bls_gemm_bp_var1.o ('haswell' CFLAGS for sandboxes)
...
That's it! After the BLIS library is built, it will contain your chosen
sandbox's implementation of bli_gemm_ex() instead of the default BLIS
implementation.
Sandbox rules
Like any civilized sandbox, there are rules for playing here. Please follow these guidelines for the best sandbox developer experience.
-
Don't bother worrying about makefiles. We've already taken care of the boring/annoying/headache-inducing build system stuff for you. :) By configuring BLIS with a sandbox enabled,
makewill scan your sandbox directory and compile all of its source code using similar compilation rules as were used for the rest of the framework. In addition, the compilation command line will automatically contain one-I<includepath>option for every subdirectory in your sandbox, so it doesn't matter where in your sandbox you place your header files. They will be found! -
Your sandbox must be written in C99 or C++11. If you write your sandbox in C++11, you must use one of the BLIS-approved file extensions for your source files (
.cc,.cpp,.cxx) and your header files (.hh,.hpp,.hxx). Note thatblis.halready contains all of its definitions inside of anextern "C"block, so you should be able to#include "blis.h"from your C++11 source code without any issues. -
All of your code to replace BLIS's default implementation of
bli_gemm_ex()should reside in the named sandbox directory, or some directory therein. (Obviously.) For example, the "gemmlike" sandbox is located insandbox/gemmlike. All of the code associated with this sandbox will be contained withinsandbox/gemmlike. Note that you absolutely may include additional code and interfaces within the sandbox, if you wish -- code and interfaces that are not directly or indirectly needed for satisfying the the "contract" set forth by the sandbox (i.e., including a local definition ofbli_gemm_ex()). -
The only header file that is required of your sandbox is
bli_sandbox.h. It must be namedbli_sandbox.hbecauseblis.hwill#includethis file when the sandbox is enabled at configure-time. That said, you will probably want to keep the file empty. Why require a file that is supposed to be empty? Well, it doesn't have to be empty. Anything placed in this file will be folded into the flattened (monolithic)blis.hat compile-time. Therefore, you should only place things (e.g. prototypes or type definitions) inbli_sandbox.hif those things would be needed at compile-time by: (a) the BLIS framework itself, or (b) an application that calls your sandbox-enabled BLIS library. Usually, neither of these situations will require any of your local definitions since those local definitions are only needed to define your sandbox implementation ofbli_gemm_ex(), and this function is already prototyped by BLIS. But if you are adding additional APIs and/or operations to the sandbox that are unrelated tobli_gemm_ex(), then you'll want to#includethose function prototypes from withinbli_sandbox.h -
Your definition of
bli_gemm_ex()should be the only function you define in your sandbox that begins withbli_. If you define other functions that begin withbli_, you risk a namespace collision with existing framework functions. To guarantee safety, please prefix your locally-defined sandbox functions with another prefix. Here, in thegemmlikesandbox, we use the prefixbls_. (Thesis for sandbox.) Also, please avoid the prefixbla_since that prefix is also used in BLIS for BLAS compatibility functions.
If you follow these rules, you will be much more likely to have a pleasant experience integrating your BLIS sandbox into the larger framework.
Caveats
Notice that the BLIS sandbox is not all-powerful. You are more-or-less stuck working with the existing BLIS infrastructure.
For example, with a BLIS sandbox you can do the following kinds of things:
- use a different
gemmalgorithmic partitioning path than the default Goto-like algorithm; - experiment with different implementations of
packm(not justpackmkernels, which can already be customized within each sub-configuration); - try inlining your functions manually;
- pivot away from using
obj_tobjects at higher algorithmic level (such as immediately after callingbli_gemm_ex()) to try to avoid some overhead; - create experimental implementations of new BLAS-like operations (provided
that you also provide an implementation of
bli_gemm_ex()).
You cannot, however, use a sandbox to do the following kinds of things:
- define new datatypes (half-precision, quad-precision, short integer, etc.) and expect the rest of BLIS to "know" how to handle them;
- use a sandbox to replace the default implementation of a different level-3 operation, such as Hermitian rank-k update;
- change the existing BLIS APIs (typed or object);
- remove support for one or more BLIS datatypes (to cut down on library size, for example).
Another important limitation is the fact that the build system currently uses
"framework CFLAGS" when compiling the sandbox source files. These are the same
CFLAGS used when compiling general framework source code,
# Example framework CFLAGS used by 'haswell' sub-configuration
-O3 -Wall -Wno-unused-function -Wfatal-errors -fPIC -std=c99
-D_POSIX_C_SOURCE=200112L -I./include/haswell -I./frame/3/
-I./frame/1m/ -I./frame/1f/ -I./frame/1/ -I./frame/include
-DBLIS_VERSION_STRING=\"0.3.2-51\"
which are likely more general-purpose than the CFLAGS used for, say,
optimized kernels or even reference kernels.
# Example optimized kernel CFLAGS used by 'haswell' sub-configuration
-O3 -mavx2 -mfma -mfpmath=sse -march=core-avx2 -Wall -Wno-unused-function
-Wfatal-errors -fPIC -std=c99 -D_POSIX_C_SOURCE=200112L -I./include/haswell
-I./frame/3/ -I./frame/1m/ -I./frame/1f/ -I./frame/1/ -I./frame/include
-DBLIS_VERSION_STRING=\"0.3.2-51\"
(To see precisely which flags are being employed for any given file, enable
verbosity at compile-time via make V=1.) Compiling sandboxes with these more
versatile CFLAGS compiler options means that we only need to compile one
instance of each sandbox source file, even when targeting multiple
configurations (for example, via ./configure x86_64). However, it also means
that sandboxes are not ideal for microkernels, as they sometimes need additional
compiler flags not included in the set used for framework CFLAGS in order to
yield the highest performance. If you have a new microkernel you would like to
use within a sandbox, you can always develop it within a sandbox. However,
once it is stable and ready for use by others, it's best to formally register
the kernel(s) along with a new configuration, which will allow you to specify
kernel-specific compiler flags to be used when compiling your microkernel.
Please see the
Configuration Guide
for more details, and when in doubt, please don't be shy about seeking
guidance from BLIS developers by opening a
new issue or sending a message to the
blis-devel mailing list.
Notwithstanding these limitations, hopefully you still find BLIS sandboxes useful!
Known issues
- Mixed datatype support. Unless you really know what you are doing, you
should probably disable mixed datatype support when using a sandbox. (Mixed
datatype support can be disabled by configuring with
--disable-mixed-dt.) The BLIS testsuite is smart enough to verify that you've configured BLIS with mixed datatype support before allowing you to test with mixed domains/precisions enabled ininput.general. However, if those options are enabled and BLIS was built with mixed datatype support, then BLIS assumes that the implementation ofgemmwill support mixing of datatypes. BLIS must assume this, because there's no way for it to confirm at runtime that an implementation was written to support mixing datatypes. Note that even thegemmlikesandbox included with BLIS does not support mixed-datatype computation.
Conclusion
If you encounter any problems, or are really bummed-out that gemm is the
only operation for which you can provide a sandbox implementation, please open
a new issue on GitHub.
If you are unsure about how something works, you can still open an issue. Or, you can send a message to blis-devel mailing list.
Happy sandboxing!