1 / 27

Block-Precise Processors Nagesh B Lakshminarayana , Hyesoon Kim

Block-Precise Processors Nagesh B Lakshminarayana , Hyesoon Kim. Block-Precise Processors. Processors designed for low power Architectural state is correct at basic block granularity rather than instruction granularity. Outline. Background B-Processor mechanisms Results Conclusion.

tan
Download Presentation

Block-Precise Processors Nagesh B Lakshminarayana , Hyesoon Kim

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Block-Precise ProcessorsNagesh B Lakshminarayana, Hyesoon Kim

  2. Block-Precise Processors • Processors designed for low power • Architectural state is correct at basic block granularity rather than instruction granularity

  3. Outline Background B-Processor mechanisms Results Conclusion

  4. Pipeline Designs • Depending on when instructions read their source operands two pipeline designs are possible • Operand values are read before issue • Operand values are read after issue • Issue  instruction sent to functional unit for execution • Dispatch  instruction inserted into instruction scheduler

  5. Operands Values Are Read Before Issue Fetch, Decode and Dispatch Read ARF ROB/ Rename Buffer Data-Capture Scheduler Update Bypass and Wake up Execution Units • Pipeline has a Data-Capture (DC) Scheduler • DC Scheduler + ARF + ROB with Data – Intel Nehalem, Intel Core

  6. DC Scheduler + ARF + ROB with Data • Results produced by instructions are copied twice • First to ROB – on instruction completion • Then to ARF – on instruction commit • ROB + ARF consume a significant portion of the total core power • > 10% [Brooks et al. ISCA 2000]

  7. Goal • Design mechanism(s) to reduce the power consumption of the ROB + ARF • reduce the number of writes to these structures

  8. Related Work • Change the organization of these structures • ports, hierarchical organization, banking [MICRO’92, MICRO’94] • Reduce accesses to these structures • Register File Caches [Yung et al, ICCD ‘95] • Reduce writes • Target short-lived variables (mostly VLIW)

  9. Observation Basic Block … ADD R1, R2, R3 SUB R4, R1, R6 … MUL R1, R1, R4 … JGZ R10 Inst-M Inst-N • Many instruction results within a basic block are not visible outside the basic block • we call such values BB-Internal values • Values visible outside a basic block are called BB-External values • The last value written to a register within a basic block is a BB-External value

  10. Dependency Distance • Dependency Distance (Dep-Distance) – integer value defined for every instruction • For instructions producing BB-Internal value(s) only • it is the distance of last consumer from the instruction • For instructions producing BB-External value(s) • it is infinite

  11. Dependency Distance • Many BB-Internal values become dead shortly after being produced • i.e., all consumers of BB-Internal value are found within a short distance of the instruction producing the BB-Internal value • >22% of all instructions produce BB-Internal values only and those values are consumed within 4 instructions of being produced

  12. Mechanisms – Overview Instruction results are broadcast over the bypass network If we can guarantee that instructions dependent on BB-Internal values produced by a instruction have received the BB-Internal values from the bypass network then we can skip writing the BB-Internal values to the operand store(s)

  13. Mechanisms – Overview If results of a instruction are not being written to operand stores (Mechanism #1), then we can stop broadcast of results beyond first stage of bypass

  14. Eliminating writes to ROB and ARF Assistance of the Compiler Changes to ISA Changes to hardware

  15. Compiler Do analysis of life-time of variables and identify the dep-distance of instructions in basic blocks

  16. ISA Extensions • Add 2-bits to instruction encoding • Compiler passes dep-distance of instructions via this encoding • Bits can be encoded in several ways • Example encoding using multiples of 2

  17. Changes to Scheduler • Add a bit-mask (Presence Vector) to track the presence of instructions in Scheduler • Bit-mask of same size as ROB • Bit mask has head and tail pointers • First 0 (from tail) in mask is set when a new instruction is dispatched • First 1 (from head) in mask is cleared when a instruction is retired

  18. Changes to Scheduler – – 0 0 DD = 3 PV PV Scheduler Scheduler Check 0 – – 0 Ia 1 1 Ia 1 Ib Ib 1 Ic 1 Ic 1 1 1 Id Id hit . . . … . . . … • When instruction is issued, check if all dependent instructions have been dispatched • If dep-distance is n, check if nth bit from bit for this instruction is set • If set then do not write to ROB and ARF

  19. Changes to Scheduler 01 10 11 Dep-Distance • d1d0 – 2 bit encoding for the instruction • bxbx-1…b0 – Presence Vector • d1d0 = 00  must write to ROB and ARF • d1d0 = 01  dep-distance is 1 • d1d0 = 10  dep-distance in [2,3] • d1d0 = 11  dep-distance in [4,7]

  20. Issues – Supporting Precise Exceptions • Precise exceptions are not supported • Many instructions will not update the architectural state as they are supposed to do • But at end of a basic block architectural state matches state obtained with regular execution • Soln: Check-point RF at the end of each basic block, whenever there is an exception, rollback to start of basic block and execute in instruction-precise mode • Use a light weight RF check-pointing mechanism

  21. Check-pointing Mechanism ARF-0 ARF ARF ARF-1 Dirty and State Masks 2 copies of ARF • ARF  2 ARF + 1 Dirty Mask + Several State Masks • Each bit mask is equal to size of ARF • # of state masks is equal to the maximum number of basic blocks supported by pipeline + 1

  22. Check-pointing Mechanism • Dirty mask • Tracks which registers have been written by the current basic block • State mask • Holds current mapping of registers i.e., whether latest value of register is in ARF0 or in ARF1 • First write to a register in a basic block flips the bit in the state mask • register value at end of last basic block is untouched • subsequent writes to same register use the current mapping

  23. Results • MacSim Simulator • with integrated McPAT-based tool for modeling power • Nehalem like core • 4-wide, 128 entry ROB, 36 entry scheduler, 16 IRegs, 32 Fregs • 22nm

  24. Results • Power savings for ROB + ARF • 15% over baseline, 7% over RFC-32 • FP benchmarks – B-Processor skips writing many results and RFC mechanism writes lot of live values to ROB

  25. Results • Power savings for Bypass Network • baseline has two levels of bypass • 10% savings on average

  26. Conclusion • ROB + ARF contribute a significant fraction of total power • propose mechanism to reduce their power consumption • For bb-internal values, if all dependent instructions read value off bypass network then skip writes to ROB and ARF and broadcast beyond first stage of bypass • Mechanism results in correct architecture state at basic block granularity • Mechanism reduces ROB + ARF power consumption by 15% and bypass power consumption by 10% relative to conventional design

  27. Thank You!

More Related