Galois field pipelined multiplier with polynomial and beta input passing scheme
10503477 ยท 2019-12-10
Assignee
Inventors
Cpc classification
H03M13/6516
ELECTRICITY
G06F11/1076
PHYSICS
H03M13/373
ELECTRICITY
H03M13/617
ELECTRICITY
International classification
G06F11/10
PHYSICS
Abstract
The disclosure provides a very flexible mechanism for a storage controller to create RAID stripes and to re-create corrupted stripes when necessary using the erasure coding scheme. Typically, this is known as a RAID 6 implementation/feature. The erasure code calculations are generated using the Galois Multiplication hardware and the system controller can pass any polynomial into the hardware on a per stripe calculation basis. The polynomial value is passed to the hardware via an input descriptor field. The descriptor controls the entire computation process.
Claims
1. A system for performing a computation on a multiplier, comprising: a load pointer to direct a 8-bit data in bus to a correct multiplier block of a series of multipliers in a round robin fashion; the series of multipliers adapted to produce a series of 8 bit results, wherein the correct multiplier block is adapted to produce an individual 8 bit multiplier result based on the 8-bit data in bus; and a result pointer that selects the individual 8 bit multiplier result from the correct multiplier block result for presentation on an output bus.
2. The system of claim 1, wherein the series of multipliers includes a plurality of multipliers in parallel with each other.
3. The system of claim 1, wherein the series of multipliers use a polynomial select value and a beta value.
4. The system of claim 3, wherein the system is adapted to receive a descriptor.
5. The system of claim 4, wherein the descriptor includes a polynomial select value and a beta value.
6. The system of claim 5, wherein the beta value define an 8-bit constant value to be multiplied by the 8-bit data.
7. The system of claim 6, wherein the descriptor includes a source of the 8-bit data.
8. The system of claim 7, wherein the descriptor includes a P buffer.
9. The system of claim 8, wherein the descriptor includes a Q buffer.
10. The system of claim 1, wherein the series of multipliers is a Galois Field multiplier.
11. The system of claim 10, wherein the series of multipliers uses a Linear Feedback Shift Register.
12. The system of claim 11, wherein the series of multipliers are implemented in a 9 instance deep32 instance wide arrangement.
13. The system of claim 1, wherein the system resides in an IRAY node.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Various exemplary embodiments of this disclosure will be described in detail, wherein like reference numerals refer to identical or similar components or steps, with reference to the following figures, wherein:
(2)
(3)
DETAILED DESCRIPTION
(4) The present subject disclosure provides a very flexible mechanism for a storage controller to create RAID stripes and to re-create corrupted stripes when necessary using the erasure coding scheme. Typically, this is known as a RAID 6 implementation/feature. The erasure code calculations are generated using the Galois Multiplication hardware and the system controller can pass any polynomial into the hardware on a per stripe calculation basis. The polynomial value is passed to the hardware via an input descriptor field. The descriptor controls the entire computation process.
(5) In order to fully understand the present subject matter, one of ordinary skill in the art would have to have a basic understanding of RAID 6, erasure coding, Galois multiplication, and linear feedback shift register (LFSR) operation.
(6) There are many novel aspects of the mechanism discussed according to the present subject disclosure. Some non-limiting examples include, but are not limited to: descriptor based interface controlling all aspects of the calculations; heavily pipe-lined design with very low latency overhead; fully flexible design allowing the client to utilize any polynomial and beta value.
(7) The multiplier hardware consists of (932=288) 8-bit, finite field polynomial multipliers implemented utilizing a Linear Feedback Shift Register (LFSR). This hardware can also be referred to as a Galois Field (GF(2{circumflex over ()}m)) Multiplier, where m is the degree of the polynomial (or LFSR hardware tap select) and beta=the incoming data stream is multiplied by this value.
(8) The 8-bit multiplier hardware design is based in part on the paper entitled: Finite Field Polynomial Multiplier with Linear Feedback Shift Register (Che-Wun Chiou, Chiou-Yng Lee, Jim-Min Lin), which is incorporated by reference herein in its entirety into this disclosure. The substance of the paper will not be repeated here for sake of brevity.
(9) The 8 bit multipliers are implemented in a 9 instance deep32 instance wide arrangement to allow the multiplication operation to be performed on an 256 bit wide input data stream and to efficiently support streaming data input patterns. A 9 clock delay exists from the start of computation to the result being valid. If the input data stream is constantly valid through the entire operation, the 9 clock latency will only be observed at the beginning of the transaction.
(10) As mentioned above, each time a computation is required, the multiplier hardware is given a descriptor from the system. This descriptor is referred to as the XORH (XOR Header). Two fields in the XORH are provided that define the polynomial/tap select value and the multiplier (or beta) value for each operation. These fields are explained in further detail below.
(11) A first field is the polynomial/tap select. This field defines the polynomial that is used by the multiplier logic. More specifically, this field selects the LFSR tap positions of the multiplier circuit. Note that the degree of the polynomial, and therefore, the width of the multiplier circuit, is always assumed to be 8. This field is 8 bits wide and bit positions 7 and 0 are don't care.
(12) For example, assume that the desired polynomial, of degree 8, for a given computation is x{circumflex over ()}8+x{circumflex over ()}4+x{circumflex over ()}3+x{circumflex over ()}2+1. Then the proper value for the polynomial/tap select field would be 0x1C thus selecting an XOR tap to drive LFSR bit positions 4, 3, and 2.
(13) A second field is the multiplier constant (beta). This field defines the 8 bit constant value that is to be multiplied by each incoming byte of the input data stream.
(14) The present machine resides in an IRAY node, which is a type of node that doesn't have a microprocessor, and just the present multiplier (I/O machine). The node receives a descriptor, which contains address, length for the data, the source data, the P buffer, and the Q buffer. It also contains the m value and the beta value. The machine goes out and fetches the data, includes its m and beta values, does its calculations, and then produces the data which it sends out to the external memory.
(15) Thus, one of the abilities of the present subject disclosure is to control the operation of the multiplier by use of the descriptor. This subject matter is most applicable to RAID 6 because it has an XOR multiplier within it.
(16)
(17) As shown in
(18) The subject matter described herein may be used in a variety of preferred ways, including, for example: (a) generation of a module level description of the mechanism; (b) low level, micro-architecture document showing block level flow diagrams for the implementation; (c) generation of Verilog RTL to implement the design; (d) block level simulation to verify the design and modify any issues found; (e) bring up and testing utilizing a hardware emulation platform; (f) integration into the top level design; (g) system level simulation; (h) standard back-end ASIC development process to produce the targeted device. Other variations are also possible.
(19) Alternate uses of the subject disclosure are also within the scope of the present disclosure. For example, the present subject disclosure may easily be expanded or reduced to operate on an input data stream of almost any width.
(20) The examples and methods described above are not limited to software or hardware, but may be either or a combination of both. If software, the method described is presented as code in a software program. If hardware, a processor is used to conduct the steps which are embedded within the hardware. The subject matter may also be a combination of software and hardware with one or more steps being embedded within a hardware component, and the other steps being part of a software program.
(21) The illustrations and examples provided herein are for explanatory purposes and are not intended to limit the scope of the appended claims. It will be recognized by those skilled in the art that changes or modifications may be made to the above described embodiment without departing from the broad inventive concepts of the subject disclosure. It is understood therefore that the subject disclosure is not limited to the particular embodiment which is described, but is intended to cover all modifications and changes within the scope and spirit of the subject disclosure.