Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

perf: Speedup sdk.Int overflow checks #19386

Merged
merged 4 commits into from
Feb 9, 2024

Conversation

ValarDragon
Copy link
Contributor

@ValarDragon ValarDragon commented Feb 8, 2024

This PR speedsup all sdk.Int math ops, especially for smaller Int arithmetic.

Currently sdk.Int overflow checks compare against bigint.BitLen(), which is a complex method as it aims to be:

We see this taking 1.1 seconds of the Osmosis epoch time! (Used to be 5+ seconds, until we moved more math to native bigInt math. Now its just 1.1 second in converting these final results into sdk.Int)

This PR notices that we only need to check if its greater than 256 bits, which is equivalent to checking if it takes 4 words. Note in the code, we use bits.UintSize, so it works on 32 bit machines as well.

So we change this to using int.Bits() which returns an []big.Word, with no copies, and hence will be much faster.

Notice that here in the tests we test the precise overflow bounds: https://github.com/cosmos/cosmos-sdk/blob/main/math/int_test.go#L175-L185

therefore this should be state compatible. (And I tested it with the tests under this)

Out of some abundance of caution, its possible that the most significant word could be all zeroes. To handle this edge case, we say that if the bigint uses too many words, then run the fallback (slower) BitLen logic, thus ensuring it will always be compatible.


Author Checklist

All items are required. Please add a note to the item if the item is not applicable and
please add links to any relevant follow up issues.

I have...

  • included the correct type prefix in the PR title
  • confirmed ! in the type prefix if API or client breaking change
  • targeted the correct branch (see PR Targeting)
  • provided a link to the relevant issue or specification
  • reviewed "Files changed" and left comments if necessary
  • included the necessary unit and integration tests
  • added a changelog entry to CHANGELOG.md
  • updated the relevant documentation or specification, including comments for documenting Go code
  • confirmed all CI checks have passed

Reviewers Checklist

All items are required. Please add a note if the item is not applicable and please add
your handle next to the items reviewed if you only reviewed selected items.

I have...

  • confirmed the correct type prefix in the PR title
  • confirmed all author checklist items have been addressed
  • reviewed state machine logic, API design and naming, documentation is accurate, tests and test coverage

Summary by CodeRabbit

  • Refactor
    • Enhanced performance and reliability by improving the handling of maximum word length for integer types.

Currently sdk.Int overflow checks compare against bigint.BitLen(),
which is a complex method as it aims to be:
- constant time
- give granularity into how many bits are present in the final word.
See: https://cs.opensource.google/go/go/+/refs/tags/go1.22.0:src/math/big/nat.go;l=654-674

We see this taking 1.1 seconds of the Osmosis epoch time!
(Used to be 5+ seconds, until we moved more math to native bigInt math.
Now its just 1.1 second in converting these final results into sdk.Int)

This PR notices that we only need to check if its greater than 256 bits,
which is equivalent to checking if it takes 4 words.
Note in the code, we use bits.UintSize, so it works on 32 bit machines
as well.

So we change this to using int.Bits() which returns an []big.Word,
with no copies, and hence will be much faster.
@ValarDragon ValarDragon requested a review from a team as a code owner February 8, 2024 21:55
@ValarDragon ValarDragon changed the title Speedup sdk.Int overflow checks perf: Speedup sdk.Int overflow checks Feb 8, 2024

This comment has been minimized.

Copy link
Contributor

coderabbitai bot commented Feb 8, 2024

Walkthrough

Walkthrough

This modification introduces a new constant, maxWordLen, to the Int and Uint types, aimed at optimizing integer range checks. By defining the maximum word length as MaxBitLen / bits.UintSize, the change enhances the way functions validate integer sizes, replacing direct bit length comparisons with this more efficient constant-based approach.

Changes

File(s) Summary
math/int.go Introduced maxWordLen to optimize integer range checks for Int and Uint using a calculated constant.
math/int_test.go Added BenchmarkIntOverflowCheckTime for big integer operations in the math package.
math/CHANGELOG.md Focuses on optimizing overflow checks in math.Int operations within the cosmos-sdk math module.

Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

Share

Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>.
    • Generate unit-tests for this file.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit tests for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai generate interesting stats about this repository from git and render them as a table.
    • @coderabbitai show all the console.log statements in this repository.
    • @coderabbitai read src/utils.ts and generate unit tests.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (invoked as PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger a review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai help to get help.

Additionally, you can add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.

CodeRabbit Configration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • The JSON schema for the configuration file is available here.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/coderabbit-overrides.v2.json

CodeRabbit Discord Community

Join our Discord Community to get help, request features, and share feedback.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review Status

Actionable comments generated: 2

Configuration used: .coderabbit.yml

Commits Files that changed from the base of the PR and between cf9accc and 5e979bc.
Files selected for processing (1)
  • math/int.go (10 hunks)
Additional comments: 8
math/int.go (8)
  • 78-78: The overflow check using len(i.Bits()) > maxWordLen is correct and improves performance by avoiding direct bit length comparisons. This change aligns with the PR's objective.
  • 135-135: The panic message in NewIntFromBigInt() should be consistent with the one in NewIntFromBigIntMut() for clarity. Currently, both panic messages are identical, which is good for consistency.
  • 150-150: The use of len(i.Bits()) > maxWordLen for overflow detection in NewIntFromBigIntMut() is consistent with the approach in NewIntFromBigInt(). This maintains uniformity in handling big integers.
  • 164-164: The overflow check in NewIntFromString() using len(i.Bits()) > maxWordLen is correctly implemented. It ensures that the integer does not exceed the maximum word length, aligning with the optimization goal.
  • 182-182: The overflow check in NewIntWithDecimal() is correctly implemented using len(i.Bits()) > maxWordLen. This ensures that the resulting integer from the decimal conversion does not exceed the maximum word length.
  • 292-292: The overflow check in SafeAdd() using len(res.i.Bits()) > maxWordLen is correctly implemented. This ensures that the addition operation does not result in an integer exceeding the maximum word length.
  • 317-317: The overflow/underflow check in SafeSub() using len(res.i.Bits()) > maxWordLen is correctly implemented. This ensures that the subtraction operation does not result in an integer exceeding the maximum word length.
  • 342-342: The overflow check in SafeMul() using len(res.i.Bits()) > maxWordLen is correctly implemented. This ensures that the multiplication operation does not result in an integer exceeding the maximum word length.

math/int.go Outdated
Comment on lines 17 to 19
// maxWordLen defines the maximum word length supported by Int and Uint types.
// Note: This can only be used in checks if MaxBitLen % 64 == 0
const maxWordLen = MaxBitLen / 64
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ensure the assumption MaxBitLen % 64 == 0 is always valid. If MaxBitLen could change in the future, consider adding a compile-time assertion or runtime check to enforce this constraint.

math/int.go Outdated Show resolved Hide resolved
@ValarDragon
Copy link
Contributor Author

ValarDragon commented Feb 8, 2024

I added a benchmark to show the speed difference on the existing table of small values (<= 78 bits). I expect this difference becomes more pronounced on the real Osmosis data set.

Its an ~25% speedup, to this step which is part of every Int operation.
Something similar can be done for Dec.

Before:

BenchmarkIntOverflowCheckTime-12    	 4743949	       228.5 ns/op	       0 B/op	       0 allocs/op
PASS
ok  	cosmossdk.io/math	1.437s

After:

BenchmarkIntOverflowCheckTime-12    	 6575220	       175.3 ns/op	       0 B/op	       0 allocs/op
PASS
ok  	cosmossdk.io/math	1.557s

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review Status

Actionable comments generated: 0

Configuration used: .coderabbit.yml

Commits Files that changed from the base of the PR and between 5e979bc and 5d1aeba.
Files selected for processing (3)
  • math/CHANGELOG.md (1 hunks)
  • math/int.go (12 hunks)
  • math/int_test.go (1 hunks)
Files skipped from review as they are similar to previous changes (1)
  • math/int.go
Additional comments: 2
math/CHANGELOG.md (1)
  • 45-45: LGTM!
math/int_test.go (1)
  • 691-711: LGTM!

Copy link
Member

@facundomedica facundomedica left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! Ty for the detailed PR description 🫶🏻

@facundomedica facundomedica added this pull request to the merge queue Feb 9, 2024
Merged via the queue into main with commit ac48269 Feb 9, 2024
63 of 64 checks passed
@facundomedica facundomedica deleted the dev/speedup_int_overflow_checks branch February 9, 2024 08:52
@ValarDragon
Copy link
Contributor Author

TYSM! I also learned this morning, that its impossible for the top word of a Nat to have 0's, so we could omit the fallback check -- but it doesn't really matter since its rarely called.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants