Realistic Memories and Caches

Slides:



Advertisements
Similar presentations
Lecture 19: Cache Basics Today’s topics: Out-of-order execution
Advertisements

Lecture 8: Memory Hierarchy Cache Performance Kai Bu
331 Lec20.1Fall :332:331 Computer Architecture and Assembly Language Fall 2003 Week 13 Basics of Cache [Adapted from Dave Patterson’s UCB CS152.
1  1998 Morgan Kaufmann Publishers Chapter Seven Large and Fast: Exploiting Memory Hierarchy.
331 Lec20.1Spring :332:331 Computer Architecture and Assembly Language Spring 2005 Week 13 Basics of Cache [Adapted from Dave Patterson’s UCB CS152.
CMPE 421 Parallel Computer Architecture
Constructive Computer Architecture Realistic Memories and Caches Arvind Computer Science & Artificial Intelligence Lab. Massachusetts Institute of Technology.
Realistic Memories and Caches Li-Shiuan Peh Computer Science & Artificial Intelligence Lab. Massachusetts Institute of Technology March 21, 2012L13-1
1 How will execution time grow with SIZE? int array[SIZE]; int sum = 0; for (int i = 0 ; i < ; ++ i) { for (int j = 0 ; j < SIZE ; ++ j) { sum +=
Realistic Memories and Caches – Part II Li-Shiuan Peh Computer Science & Artificial Intelligence Lab. Massachusetts Institute of Technology April 2, 2012L14-1.
Multilevel Caches Microprocessors are getting faster and including a small high speed cache on the same chip.
Caches Hiding Memory Access Times. PC Instruction Memory 4 MUXMUX Registers Sign Ext MUXMUX Sh L 2 Data Memory MUXMUX CONTROLCONTROL ALU CTL INSTRUCTION.
Constructive Computer Architecture Realistic Memories and Caches Arvind Computer Science & Artificial Intelligence Lab. Massachusetts Institute of Technology.
Non-blocking Caches Arvind (with Asif Khan) Computer Science & Artificial Intelligence Lab Massachusetts Institute of Technology May 14, 2012L25-1
Realistic Memories and Caches – Part III Li-Shiuan Peh Computer Science & Artificial Intelligence Lab. Massachusetts Institute of Technology April 4, 2012L15-1.
CMSC 611: Advanced Computer Architecture
Caches-2 Constructive Computer Architecture Arvind
Memory Hierarchy Ideal memory is fast, large, and inexpensive
Realistic Memories and Caches
CSE 351 Section 9 3/1/12.
Constructive Computer Architecture Tutorial 6 Cache & Exception
6.175: Constructive Computer Architecture Tutorial 5 Epochs, Debugging, and Caches Quan Nguyen (Troubled by the two biggest problems in computer science…
Associativity in Caches Lecture 25
Edexcel GCSE Computer Science Topic 15 - The Processor (CPU)
CSC 4250 Computer Architectures
Multilevel Memories (Improving performance using alittle “cash”)
How will execution time grow with SIZE?
Virtual Memory Use main memory as a “cache” for secondary (disk) storage Managed jointly by CPU hardware and the operating system (OS) Programs share main.
5.2 Eleven Advanced Optimizations of Cache Performance
Cache Memory Presentation I
Morgan Kaufmann Publishers Memory & Cache
Caches-2 Constructive Computer Architecture Arvind
Cache Coherence Constructive Computer Architecture Arvind
Lecture 21: Memory Hierarchy
Lecture 21: Memory Hierarchy
Cache Memories September 30, 2008
Lecture 23: Cache, Memory, Virtual Memory
Realistic Memories and Caches
Cache Coherence Constructive Computer Architecture Arvind
Lecture 08: Memory Hierarchy Cache Performance
CPE 631 Lecture 05: Cache Design
Cache Coherence Constructive Computer Architecture Arvind
Performance metrics for caches
Performance metrics for caches
Realistic Memories and Caches
Adapted from slides by Sally McKee Cornell University
Caches-2 Constructive Computer Architecture Arvind
Performance metrics for caches
Caches and store buffers
How can we find data in the cache?
Morgan Kaufmann Publishers Memory Hierarchy: Cache Basics
CS 704 Advanced Computer Architecture
Control Hazards Constructive Computer Architecture: Arvind
Caches III CSE 351 Autumn 2018 Instructor: Justin Hsia
Lecture 22: Cache Hierarchies, Memory
CS 3410, Spring 2014 Computer Science Cornell University
CSC3050 – Computer Architecture
Lecture 21: Memory Hierarchy
Performance metrics for caches
Modular Refinement Arvind
Chapter Five Large and Fast: Exploiting Memory Hierarchy
Cache - Optimization.
Update : about 8~16% are writes
Cache Memory Rabi Mahapatra
Realistic Memories and Caches
Cache Coherence Constructive Computer Architecture Arvind
Caches-2 Constructive Computer Architecture Arvind
Performance metrics for caches
10/18: Lecture Topics Using spatial locality
Caches III CSE 351 Spring 2019 Instructor: Ruth Anderson
Presentation transcript:

Realistic Memories and Caches Constructive Computer Architecture Realistic Memories and Caches Arvind Computer Science & Artificial Intelligence Lab. Massachusetts Institute of Technology October 31, 2014 http://csg.csail.mit.edu/6.175

Multistage Pipeline Register File PC Decode Execute Inst Data Memory fEpoch Register File eEpoch redirect e2c PC Decode Execute nap d2e Inst Memory Data Memory scoreboard The use of magic memories (combinational reads) makes such design unrealistic October 31, 2014 http://csg.csail.mit.edu/6.175 2

Magic Memory Model Reads and writes are always completed in one cycle RAM ReadData WriteData Address WriteEnable Clock Reads and writes are always completed in one cycle a Read can be done any time (i.e. combinational) If enabled, a Write is performed at the rising clock edge (the write address and data must be stable at the clock edge) In a real DRAM the data will be available several cycles after the address is supplied October 31, 2014 http://csg.csail.mit.edu/6.175

holds frequently used data Memory Hierarchy Small, Fast Memory SRAM CPU RegFile Big, Slow Memory DRAM holds frequently used data size: RegFile << SRAM << DRAM latency: RegFile << SRAM << DRAM bandwidth: on-chip >> off-chip On a data access: hit (data Î fast memory)  low latency access miss (data Ï fast memory)  long latency access (DRAM) why? Due to cost Due to size of DRAM Due to cost and wire delays (wires on-chip cost much less, and are faster) October 31, 2014 http://csg.csail.mit.edu/6.175

Inside a Cache Main Processor Cache Memory Line = Address Tag Data copy of main mem locations 100, 101, ... Data Byte 100 304 6848 416 Line = <Add tag, Data blk> Address Tag Data Block Tag only needs enough bits to uniquely identify the block (jse) How many bits are needed for the tag? Enough to uniquely identify the block October 31, 2014 http://csg.csail.mit.edu/6.175

Cache Read Search cache tags to find match for the processor generated address Found in cache a.k.a. hit Return copy of data from cache Not in cache a.k.a. miss Read block of data from Main Memory – may require writing back a cache line Wait … Return data to processor and update cache Which line do we replace? October 31, 2014 http://csg.csail.mit.edu/6.175

Write behavior On a write hit On a write miss Write-through: write to both cache and the next level memory write-back: write only to cache and update the next level memory when line is evacuated On a write miss Allocate – because of multi-word lines we first fetch the line, and then update a word in it Not allocate – word modified in memory Write through vs. write back WT: +read miss never results in writes to main memory + main memory always has the most current copy of the data (consistent) - write is slower - every write needs a main memory access - as a result uses more memory bandwidth WB: + writes occur at the speed of the cache memory + multiple writes within a block require only one write to main memory + as a result uses less memory bandwidth - main memory is not always consistent with cache - reads that result in replacement may cause writes of dirty blocks to main memory Write Back with No Write Allocate: on hits it writes to cache setting dirty bit for the block, main memory is not updated; on misses it updates the block in main memory not bringing that block to the cache; Subsequent writes to the same block, if the block originally caused a miss, will generate misses all the way and result in very inefficient execution. Hence, WB+WA more common combination. Write Through with No Write Allocate: on hits it writes to cache and main memory; on misses it updates the block in main memory not bringing that block to the cache; Subsequent writes to the block will update main memory anyway, so write misses aren’t helped. Only read misses helped with allocate. Hence, WT, no WA usually. Re-look at these options when the next level is a cache; not a memory. Write back with no allocate? Why is this October 31, 2014 http://csg.csail.mit.edu/6.175

Cache Line Size A cache line usually holds more than one word Reduces the number of tags and the tag size needed to identify memory locations Spatial locality: Experience shows that if address x is referenced then addresses x+1, x+2 etc. are very likely to be referenced in a short time window consider instruction streams, array and record accesses Communication systems (e.g., bus) are often more efficient in transporting larger data sets October 31, 2014 http://csg.csail.mit.edu/6.175

Types of misses Compulsory misses (cold start) Capacity misses First time data is referenced Run billions of instructions, become insignificant Capacity misses Working set is larger than cache size Solution: increase cache size Conflict misses Usually multiple memory locations are mapped to the same cache location to simplify implementations Thus it is possible that the designated cache location is full while there are empty locations in the cache. Solution: Set-Associative Caches Compulsory: Prefetching, nothing much u can do Capacity: Increase size, nothing much u can do Conflict: Better cache design – set associative caches October 31, 2014 http://csg.csail.mit.edu/6.175

Internal Cache Organization Cache designs restrict where in cache a particular address can reside Direct mapped: An address can reside in exactly one location in the cache. The cache location is typically determined by the lowest order address bits n-way Set associative: An address can reside in any of the a set of n locations in the cache. The set is typically determine by the lowest order address bits October 31, 2014 http://csg.csail.mit.edu/6.175

Direct-Mapped Cache Tag V = Index t k b 2k lines req address Block number Block offset Tag Data Block V = Offset Index t k b HIT Data Word or Byte 2k lines req address Simplest scheme is to extract bits from ‘block number’ to determine ‘set’ (jse) What is a bad reference pattern? Strided = size of cache October 31, 2014 http://csg.csail.mit.edu/6.175

Direct Map Address Selection higher-order vs. lower-order address bits Tag Data Block V = Offset Index t k b HIT Data Word or Byte 2k lines Index and tag reversed Why might this be undesirable? Spatially local blocks conflict. Why higher-order bits as tag may be undesirable? Spatially local blocks conflict October 31, 2014 http://csg.csail.mit.edu/6.175

Reduce Conflict Misses Memory time = Hit time + Prob(miss) * Miss penalty Associativity: Reduce conflict misses by allowing blocks to go to several sets in cache 2-way set associative: each block can be mapped to one of 2 cache sets Fully associative: each block can be mapped to any cache frame October 31, 2014 http://csg.csail.mit.edu/6.175

2-Way Set-Associative Cache Tag Data Block V = Block Offset Index t k b hit Data Word or Byte Compare latency to direct mapped case? (jse) October 31, 2014 http://csg.csail.mit.edu/6.175

Replacement Policy In order to bring in a new cache line, usually another cache line has to be thrown out. Which one? No choice in replacement if the cache is direct mapped Replacement policy for set-associative caches One that is not dirty, i.e., has not been modified In I-cache all lines are clean In D-cache if a dirty line has to be thrown out then it must be written back first Least recently used? Most recently used? Random? How much is performance affected by the choice? Difficult to know without benchmarks and quantitative measurements October 31, 2014 http://csg.csail.mit.edu/6.175

Blocking vs. Non-Blocking cache At most one outstanding miss Cache must wait for memory to respond Cache does not accept requests in the meantime Non-blocking cache: Multiple outstanding misses Cache can continue to process requests while waiting for memory to respond to misses We will first design a write-back, Write-miss allocate, Direct-mapped, blocking cache October 31, 2014 http://csg.csail.mit.edu/6.175

Blocking Cache Interface req status memReq mReqQ missReq DRAM or next level cache Processor cache memResp resp hitQ mRespQ interface Cache; method Action req(MemReq r); method ActionValue#(Data) resp; method ActionValue#(MemReq) memReq; method Action memResp(Line r); endinterface October 31, 2014 http://csg.csail.mit.edu/6.175

Interface dynamics The cache either gets a hit and responds immediately, or it gets a miss, in which case it takes several steps to process the miss Reading the response dequeues it Requests and responses follow the FIFO order Methods are guarded, e.g., the cache may not be ready to accept a request because it is processing a miss A status register keeps track of the state of the cache while it is processing a miss typedef enum {Ready, StartMiss, SendFillReq, WaitFillResp} CacheStatus deriving (Bits, Eq); October 31, 2014 http://csg.csail.mit.edu/6.175

Blocking Cache code structure module mkCache(Cache); RegFile#(CacheIndex, Line) dataArray <- mkRegFileFull; … rule startMiss … endrule; method Action req(MemReq r) … endmethod; method ActionValue#(Data) resp … endmethod; method ActionValue#(MemReq) memReq … endmethod; method Action memResp(Line r) … endmethod; endmodule Internal communications is in line sizes but the processor interface, e.g., the response from the hitQ is word size Let us assume the line size is 4 words CacheIndexSz + CacheTagSz + 4 = AddrSz October 31, 2014 http://csg.csail.mit.edu/6.175

Blocking cache state elements RegFile#(CacheIndex, Line) dataArray <- mkRegFileFull; RegFile#(CacheIndex, Maybe#(CacheTag)) tagArray <- mkRegFileFull; RegFile#(CacheIndex, Bool) dirtyArray <- mkRegFileFull; Fifo#(1, Data) hitQ <- mkBypassFifo; Reg#(MemReq) missReq <- mkRegU; Reg#(CacheStatus) status <- mkReg(Ready); Fifo#(2, MemReq) memReqQ <- mkCFFifo; Fifo#(2, Line) memRespQ <- mkCFFifo; function CacheIndex getIdx(Addr addr) = truncate(addr>>4); function CacheTag getTag(Addr addr) = truncateLSB(addr); Tag and valid bits are kept together as a Maybe type CF Fifos are preferable because they provide better decoupling. An extra cycle here may not affect the performance by much truncate = truncateMSB October 31, 2014 http://csg.csail.mit.edu/6.175

Req method hit processing It is straightforward to extend the cache interface to include a cacheline flush command method Action req(MemReq r) if(status == Ready); let idx = getIdx(r.addr); let tag = getTag(r.addr); Bit#(2) wOffset = truncate(r.addr >> 2); let currTag = tagArray.sub(idx); let hit = isValid(currTag)? fromMaybe(?,currTag)==tag : False; if(hit) begin let x = dataArray.sub(idx); if(r.op == Ld) hitQ.enq(x[wOffset]); else begin x[wOffset]=r.data; dataArray.upd(idx, x); dirtyArray.upd(idx, True); end else begin missReq <= r; status <= StartMiss; end endmethod overwrite the appropriate word of the line October 31, 2014 http://csg.csail.mit.edu/6.175

Rest of the methods Memory side methods method ActionValue#(Data) resp; hitQ.deq; return hitQ.first; endmethod method ActionValue#(MemReq) memReq; memReqQ.deq; return memReqQ.first; method Action memResp(Line r); memRespQ.enq(r); Memory side methods October 31, 2014 http://csg.csail.mit.edu/6.175

Start-miss and Send-fill rules Ready -> StartMiss -> SendFillReq -> WaitFillResp -> Ready rule startMiss(status == StartMiss); let idx = getIdx(missReq.addr); let tag=tagArray.sub(idx); let dirty=dirtyArray.sub(idx); if(isValid(tag) && dirty) begin // write-back let addr = {fromMaybe(?,tag), idx, 4'b0}; let data = dataArray.sub(idx); memReqQ.enq(MemReq{op: St, addr: addr, data: data}); end status <= SendFillReq; endrule Ready -> StartMiss -> SendFillReq -> WaitFillResp -> Ready rule sendFillReq (status == SendFillReq); memReqQ.enq(missReq); status <= WaitFillResp; endrule October 31, 2014 http://csg.csail.mit.edu/6.175

Wait-fill rule Ready -> StartMiss -> SendFillReq -> WaitFillResp -> Ready rule waitFillResp(status == WaitFillResp); let idx = getIdx(missReq.addr); let tag = getTag(missReq.addr); let data = memRespQ.first; tagArray.upd(idx, Valid (tag)); if(missReq.op == Ld) begin dirtyArray.upd(idx,False);dataArray.upd(idx, data); hitQ.enq(data[wOffset]); end else begin data[wOffset] = missReq.data; dirtyArray.upd(idx,True); dataArray.upd(idx, data); end memRespQ.deq; status <= Ready; endrule Is there a problem with waitFill? What if the hitQ is blocked? Should we not at least write it in the cache? October 31, 2014 http://csg.csail.mit.edu/6.175

Hit and miss performance Combinational read/write, i.e. 0-cycle response Requires req and resp methods to be concurrently schedulable, which in turn requires hitQ.enq < {hitQ.deq, hitQ.first} i.e., hitQ should be a bypass Fifo Miss No evacuation: memory load latency plus combinational read/write Evacuation: memory store followed by memory load latency plus combinational read/write Adding an extra cycle here and there in the miss case should not have a big negative performance impact October 31, 2014 http://csg.csail.mit.edu/6.175

Four-Stage Pipeline Register File PC Decode Execute Inst Data Memory Epoch Register File PC Next Addr Pred f2d Decode d2e Execute m2w e2m f12f2 Inst Memory Data Memory scoreboard insert bypass FIFO’s to deal with (0,n) cycle memory response October 31, 2014 http://csg.csail.mit.edu/6.175 26