From Superscalar Oo To Multicore Sst: Checkpoint And Transactional Memory Support For Sst

  • Uploaded by: stratusdesign
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View From Superscalar Oo To Multicore Sst: Checkpoint And Transactional Memory Support For Sst as PDF for free.

More details

  • Words: 1,290
  • Pages: 14
From Superscalar OO to Multicore SST Checkpoint and Transactional memory support for SST © [email protected] stratusdesign.blogspot.com

The OO Superscalar legacy • • •



OO legacy technique of the superscalar era does it have a future in multicore? Used to utilise otherwise wasted cycles while waiting for memory State of the art Year

Inflight Instructions

Clock Speed

1998 2008

90 200

600Mhz 3200Mhz

Ultimately limited by Parallelism found in code Logic for RRF/CDB cycle latencies Hazard checking burden increases quadratically with size of issue queue/reservation station due to the CAM like structure used for these queues o Ability to scale as memory wall increases o o o

Speculative execution evolution • Scout (Run-ahead) thread o During a data-dependent stall (eg L1 cache miss) enter run-ahead mode continuing execution in program order  Helps to warm caches until dependency resolved and normal execution can be resumed  Throws away lots of instructions that could have been executed between stall and resolution of the data-dependency

• Evolution to SST o During a data-dependent stall (eg L1 cache miss) enter execute-ahead mode doing speculative execution (..contd)

Evolution to SST • Speculative Execution Depends on => o o

Checkpointing Transactional Memory

• Exploits => hardware threading o o

Ahead thread executing instructions speculatively Behind thread executing instructions with resolved data dependencies

• Advantages =>

[+] Single threaded software code is being executed simultaneously from 2 different locations using hardware threads o [+] Achieves MLP and ILP o [-] Program locality works toward ensuring cache misses are kept to a minimum or the prefetcher may be able to produce the result with a very low cycle latency o

Hazards • Common to OO and SST • Data o

RAW, WAR, WAW

• Control o

Branching, Exceptions

• Memory Consistency Protocols o

Scheme must not break effect of Total Store Ordering (The Von-Neuman/Turing ordering of a code). In other words the results of the dynamic machine scheduling of code must not differ with the static program schedule)

OO & SST Differences • Traditional OO Stalls instructions with any data dependency, that is , there is no progression to the retirement unit. o Uses register renaming to continue OO ‘execute’ o

• SST

RAW => Defers instructions and any resolved operands in a deferred queue (DQ) o WAR, WAW => Speculatively retired o

Data hazards • Executing instructions out of order is problematical as potentially N versions of operands held in finite set of registers • When does the register have the correct value for the right instruction? • RAW a=5; a=10; b=a+1; • b should be 11 not 6





WAR a=5 b=a+1 a=6 b should be 5 not 6

• •

WAW a=5; b=50; b should be 50 not 5

SST handling of Data Hazards • Ahead thread o

Avoids RAW by using NT bit and deferring the instruction

• Behind thread

Avoids WAR by saving resolved operands alongside relevant instruction in the DQ o Avoids WAW the NT bits determines if it can update the ARF (architectural register file) if not the WAW bit is set preventing this and the SRF register update may only be used to do data forwarding o

• Discovering and propagating data dependencies o

Reg[dest] = Reg[operand_1] || Reg[operand_n]

SST handling of Control Hazards • Speculation fails if any of the following occur o o

Branch Mis-Prediction Transactional Memory Failure  Memory order violation detected by ‘S’ bit in cache

o

Exception

• Failed speculation causes o o

speculative checkpoint to be discarded and, architectural checkpoint restored

SST Memory Consistency Protocol • Load Order protocol Speculative loads set the cache line “S” speculatively read bit (transactional memory support) o If cache logic evicts or invalidates a line with the ‘S’ bit set then ahead thread speculation has failed for this episode o

Checkpoints • For N=2 • At start of an SST episode 2 checkpoints are created o

Architectural Checkpoint  Initially active  Once active ahead-thread progresses with speculative execution

o

Speculative Checkpoint (inactive)  Behind thread wakes then makes it active ; clears W bit vector  NT bit vector copied to SNT bit vector to detect WAW hazards

o

When deferred queue empty for speculative episode a “merge” operation is performed  Merge is Ahead-thread results + Behind-thread results => Architectural Checkpoint  NT = SNT && W ; SNT and W bit vectors cleared ; Architectural Checkpoint is discarded ; Speculative Checkpoint is made active aka it becomes the new Architectural Checkpoint

o

When deferred queue empty for all speculative episodes a “join” operation is performed  Join similar to Merge except nothing remains in the Deferred Queue and the speculative episode is ended returning the Ahead-thread to Normal mode

SST new circuit structures • To Handle N Checkpoints (assume N=2) o

2 Defer Queues  Hold instructions & resolved operands used by behind thread

o

1 Architectural register file (aka Normal RF)  Initially read by Ahead-thread

o

2 Working register files (aka speculative RF)  Ahead-thread initially reads ARF updates SRF1 until,  speculative checkpoint when it updates SRF2 the behind-thread wakes and uses SRF1

o

Status bits NT, SNT, W, WAW  Not There, Speculatively Not There, Written, WAW  Behind thread uses W bit like Ahead thread uses NT bit  SNT bit is used to capture register state of Ahead thread when Behind thread initiates  NT =/= SNT => WAW when checked during SST episode  Any Register with WAW set value gets dropped at end of SST episode

o

S bit in Cache line  Cache Slot is waiting for a ‘S’peculative Load

High Level SW initiates a Memory Transaction

SST logic

L1 Miss

Active•Architectural Inactive•Speculative

Arch Checkpoint

Set ‘S’ bit in Cache

Begin SST Episode

Instr has no Data Dependencies?

Start Executing Main thread Speculatively ahead

Start Behind thread in wait mode to handle Defers

L1 Resolved

Instr has Data Dependencies?

Enqueue DQ with Instr & All Resolved Opr

Speculation Successful Program Execution resumes were speculation finished

Wakeup Behind Thread

Behind Thread Runs Thru DQ for Active Checkpoint

DQ Full? Execute Instr and Retire OO

WAIT more data expected

DQ Empty for current & spec ckpt?

Done Ahead Thread •Normal Mode Behind Thread •Pause

Tx Fail ‘S’bit Detect Mem Order Violation

WAIT Restore Checkpoint

Br Mispredict

Exception Ahead Thread• Scout Mode Behind Thread•Pause

SST scheduling Program Order LDX addr1, %r1 ADD %r1, 0x04, %r2 STX %r2, addr2 SETHI 0x01, %r2 STX %r2, addr3 etc..

Saving operands in DQ prevents WAR as any valid data in register at that time is captured and saved for Behind-Thread to use later regardless of future writes by Ahead-Thread

Deferring data-dependent instructions prevents RAW – here %r2 was read at 3 but written before at 2

; Ahead-Thread

RAW

1 LDX addr1, %r1 ; Load Miss on addr1, Defer and set R1[ NT ]) To Defer Q ; Checkpoint Start Ahead-Thread, Behind-Thread Waits for data read

;Deferred Queue

WAR

LDX

addr1, %r1[NT]

ADD

%r1[NT], 0x04, %r2[NT]

STX

%r2[NT] , addr2

2 ADD %r1, 0x04, %r2 ; Source Operand has NT bit set Defer and set R2[NT] To Defer Q

SST Order LDX addr1, %r1 ADD %r1, 0x04, %r2 STX %r2, addr2 SETHI 0x01, %r2 STX %r2, addr3 etc..

3 STX %r2, addr2 ; Source Operand has NT bit set Defer)To Defer Q

4 SETHI 0x01, %r2 ; Ahead Thread Executes Independently)

5 STX %r2, addr3 ; Ahead Thread Executes Independently & continues speculative execution of more program instructions

WAW

Registers with WAW bit not committed to Architectural state – here %r2 was written at 4 & 6

; Load Miss resolves start Behind-Thread 6 ADD %r1, 0x04, %r2[NT=0,SNT=1] ; NT was reset at 4, set waw bit 7 STX %r2, addr3

Related Documents

Sst
December 2019 32
Sst
October 2019 36
Sst
April 2020 24
Sst Amnesty
May 2020 17
Sst Presentation
May 2020 13

More Documents from ""