62
CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (www.cs.berkeley.edu/~kubitron) lecture slides: http://inst.eecs.berkeley.edu/~cs152/

CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

CS152Computer Architecture and Engineering

Lecture 10

Exceptions (continued)Introduction to Pipelining

March 1, 2004

John Kubiatowicz (www.cs.berkeley.edu/~kubitron)

lecture slides: http://inst.eecs.berkeley.edu/~cs152/

Page 2: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.2

Recap: Microprogramming

° Microprogramming is a fundamental concept• implement an instruction set by building a very simple processor

and interpreting the instructions

• essential for very complex instructions and when few register transfers are possible

• overkill when ISA matches datapath 1-1

sequencercontrol

datapath control

micro-PC-sequencer:fetch,dispatch,sequential

microinstruction ()

DispatchROMOpcode

-Code ROM

DecodeDecode

To DataPath

Decoders implement our -code language:

For instance:rt-ALUrd-ALUmem-ALU

Page 3: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.3

Recap: Microprogramming

° Microprogramming is a convenient method for implementing structured control state diagrams:

• Random logic replaced by microPC sequencer and ROM

• Each line of ROM called a instruction: contains sequencer control + values for control points

• limited state transitions: branch to zero, next sequential,branch to instruction address from displatch ROM

° Design of a Microprogramming language1.Start with list of control signals

2.Group signals together that make sense (vs. random): called “fields”

3.Place fields in some logical order (e.g., ALU operation & ALU operands first and microinstruction sequencing last)

4.To minimize the width, encode operations that will never be used at the same time

5.Create a symbolic legend for the microinstruction format, showing name of field values and how they set the control signals

Page 4: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.4

Recap: Multicycle datapath (book)

IdealMemoryWrAdrDin

RAdr

32

32

32Dout

MemWr

32

AL

U

3232

ALUOp

ALUControl

32

IRWr

Instru

ction R

eg

32

Reg File

Ra

Rw

busW

Rb5

5

32busA

32busB

RegWr

Rs

Rt

Mu

x

0

1

Rt

Rd

PCWr

ALUSelA

Mux 01

RegDst

Mu

x

0

1

32

PC

MemtoReg

Extend

ExtOp

Mu

x

0

132

0

1

23

4

16Imm 32

<< 2

ALUSelB

Mu

x1

0

32

Zero

ZeroPCWrCond PCSrc

32

IorD

Mem

Data R

eg

AL

U O

ut

B

A

MemRd

Page 5: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.5

Recap: Start with List of control signals

Signal name Effect when deasserted Effect when assertedALUSelA 1st ALU operand = PC 1st ALU operand = Reg[rs]RegWrite None Reg. is written MemtoReg Reg. write data input = ALU Reg. write data input = memory RegDst Reg. dest. no. = rt Reg. dest. no. = rdMemRead None Memory at address is read,

MDR <= Mem[addr]MemWrite None Memory at address is written IorD Memory address = PC Memory address = SIRWrite None IR <= MemoryPCWrite None PC <= PCSourcePCWriteCond None IF ALUzero then PC <= PCSourcePCSource PCSource = ALU PCSource = ALUoutExtOp Zero Extended Sign Extended

Sin

gle

Bit

Con

trol

Signal name Value Effect ALUOp 00 ALU adds 01 ALU subtracts 10 ALU does function code

11 ALU does logical OR ALUSelB 00 2nd ALU input = 4 01 2nd ALU input = Reg[rt] 10 2nd ALU input = extended,shift left 2 11 2nd ALU input = extended

Mu

ltip

le B

it C

ontr

ol

Page 6: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.6

Recap: Group together related signals

IdealMemoryWrAdrDin

RAdr

32

32

32Dout

MemWr

32

AL

U

3232

ALUOp

ALUControl

32

IRWr

Instru

ction R

eg

32

Reg File

Ra

Rw

busW

Rb5

5

32busA

32busB

RegWr

Rs

Rt

Mu

x

0

1

Rt

Rd

PCWr

ALUSelA

Mux 01

RegDst

Mu

x

0

1

32

PC

MemtoReg

Extend

ExtOp

Mu

x

0

132

0

1

23

4

16Imm 32

<< 2

ALUSelB

Mu

x1

0

32

Zero

ZeroPCWrCond PCSrc

32

IorD

Mem

Data R

eg

AL

U O

ut

B

A

MemRd

ALU

SRC1

SRC2

DestinationMemory

PCWrite

Page 7: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.7

Recap: Group into Fields, Order and Assign Names

Field Name Values for Field Function of Field with Specific ValueALU Add ALU adds

Subt. ALU subtractsFunc ALU does function codeOr ALU does logical OR

SRC1 PC 1st ALU input <= PCrs 1st ALU input <= Reg[rs]

SRC2 4 2nd ALU input <= 4Extend 2nd ALU input <= sign ext. IR[15-0]Extend0 2nd ALU input <= zero ext. IR[15-0] Extshft 2nd ALU input <= sign ex., sl IR[15-0]rt 2nd ALU input <= Reg[rt]

dest(ination) rd ALU Reg[rd] <= ALUout rt ALU Reg[rt] <= ALUout

rt Mem Reg[rt] <= Mem Mem(ory) Read PC Read memory using PC

Read ALU Read memory using ALUout for addrWrite ALU Write memory using ALUout for addr

Memreg IR IR <= MemPCwrite PCwr PC <= PCSource

PCSrc IF Zero then PCSource <= ALUout else ALUPCWrCond IF Zero then PC <= PCSource

Seq(uencing) Seq Go to next sequential µinstructionFetch Go to the first microinstructionDispatch Dispatch using ROM.

ALU SRC1

SRC2

Dest Mem Memreg PCwrite Seq

Page 8: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.8

Recap: Quick check: what do these fieldnames mean?

Code Name RegWrite MemToRegRegDest

00 --- 0 X X01 rd ALU 1 0 110 rt ALU 1 0 011 rt MEM 1 1 0

Code Name ALUSelB ExtOp000 --- X X001 4 00 X010 rt 01 X011 ExtShft 10 1100 Extend 11 1111 Extend0 11 0

Destination:

SRC2:

Page 9: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.9

Recap: Finite State Machine (FSM) Spec

IR <= MEM[PC]PC <= PC + 4

R-type

ALUout <= A fun B

R[rd] <= ALUout

ALUout <= A or ZX

R[rt] <= ALUout

ORi

ALUout <= A + SX

R[rt] <= M

M <= MEM[ALUout]

LW

ALUout <= A + SX

MEM[ALUout] <= B

SW

“instruction fetch”

“decode”

0000

0001

0100

0101

0110

0111

1000

1001

1010

1011

1100

BEQ

0010

If A = B then PC <= ALUout

ALUout <= PC +SX

Exe

cute

Mem

ory

Writ

e-ba

ck

Page 10: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.10

Recap: Microprogram it yourself!Addr ALU SRC1 SRC2 Dest. Memory Mem. Reg. PC Write Sequencing

Fetch:0000: Add PC 4 Read PC IR ALU Seq0001: Add PC Extshft Dispatch

BEQ:0010: Subt. rs rt ALUoutCond. Fetch

Rtype:0100: Func rs rt Seq0101: rd ALU Fetch

ORI:0110: Or rs Extend0 Seq0111: rt ALU Fetch

LW:1000: Add rs Extend Seq1001: Read ALU Seq1010: rt MEM Fetch

SW:1011: Add rs Extend Seq1100: Write ALU Fetch

Page 11: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.11

Recap: Specific Sequencer from last lecture

Sequencer-based control unit from last lecture• Called “microPC” or “µPC” vs. state register

Code Name Effect 00 fetch Next µaddress = 0 01 dispatch Next µaddress = dispatch ROM 10 seq Next µaddress = µaddress + 1

ROM:

Opcode

microPC

1

µAddressSelectLogic

Adder

ROM

Mux

0012

Opcode: Dispatch state000000: Rtype (0100) 000100: BEQ (0010) 001101: ORI (0110) 100011: LW (1000) 101011: SW (1011)

Page 12: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.12

Review: Overview of Control

° Control may be designed using one of several initial representations. The choice of sequence control, and how logic is represented, can then be determined independently; the control can then be implemented with one of several methods using a structured logic technique.

Initial Representation Finite State Diagram Microprogram

Sequencing Control Explicit Next State Microprogram counter Function + Dispatch ROMs

Logic Representation Logic Equations Truth Tables

Implementation PLA ROM Technique

“hardwired control” “microprogrammed control”

Page 13: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.13

Exceptions

° Exception = unprogrammed control transfer• system takes action to handle the exception

- must record the address of the offending instruction- record any other information necessary to return afterwards

• returns control to user• must save & restore user state

° Allows constuction of a “user virtual machine”

normal control flow: sequential, jumps, branches, calls, returns

user program SystemExceptionHandlerException:

return fromexception

Page 14: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.14

Two Types of Exceptions: Interrupts and Traps° Interrupts

• caused by external events:

- Network, Keyboard, Disk I/O, Timer

• asynchronous to program execution

- Most interrupts can be disabled for brief periods of time

- Some (like “Power Failing”) are non-maskable (NMI)

• may be handled between instructions

• simply suspend and resume user program

° Traps• caused by internal events

- exceptional conditions (overflow)

- errors (parity)

- faults (non-resident page)

• synchronous to program execution

• condition must be remedied by the handler

• instruction may be retried or simulated and program continued or program may be aborted

Page 15: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.15

Precise Exceptions° Precise state of the machine is preserved as if

program executed up to the offending instruction• All previous instructions completed

• Offending instruction and all following instructions act as if they have not even started

• Same system code will work on different implementations

• Position clearly established by IBM

• Difficult in the presence of pipelining, out-ot-order execution, ...

• MIPS takes this position

° Imprecise system software has to figure out what is where and put it all back together

° Performance goals often lead designers to forsake precise interrupts

• system software developers, user, markets etc. usually wish they had not done this

° Modern techniques for out-of-order execution and branch prediction help implement precise interrupts

Page 16: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.16

Big Picture: user / system modes° Two modes of execution (user/system) :

• operating system runs in privileged mode and has access to all of the resources of the computer

• presents “virtual resources” to each user that are more convenient that the physical resources

- files vs. disk sectors

- virtual memory vs physical memory

• protects each user program from others

• protects system from malicious users.• OS is assumed to “know best”, and is trusted code, so enter

system mode on exception

° Exceptions allow the system to taken action in response to events that occur while user program is executing:

• Might provide supplemental behavior (dealing with denormal floating-point numbers for instance).

• “Unimplemented instruction” used to emulate instructions that were not included in hardware (I.e. MicroVax)

Page 17: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.17

Administrivia

° Midterm I on Wednesday 3/10• 5:30 - 8:30 in 306 Soda Hall • Bring a Calculator!• One 8 1/2 by 11 page (both sides) of notes• Make up exam: Tuesday 5:30 – 8:30 in 606 Soda Hall

° Meet at LaVal’s afterwards for Pizza• North-side Lavals!• I’ll Buy!

° Materials through Chapter 5, some of Chapter 6,Appendix A, B & C

• Should understand single-cycle processor• multicycle processor, including exceptions

° Get moving on Lab 3!• This is a hard lab, since there are so many new things

Page 18: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.18

Addressing the Exception Handler

° Traditional Approach: Interupt Vector• PC <- MEM[ IV_base + cause || 00]

• 370, 68000, Vax, 80x86, . . .

° RISC Handler Table• PC <– IT_base + cause || 0000

• saves state and jumps

• Sparc, PA, M88K, . . .

° MIPS Approach: fixed entry• PC <– EXC_addr

• Actually very small table

- RESET entry

- TLB

- other

iv_basecause

handlercode

iv_basecause

handler entry code

Page 19: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.19

Saving State

° Push it onto the stack• Vax, 68k, 80x86

° Shadow Registers• M88k

• Save state in a shadow of the internal pipeline registers

° Save it in special registers• MIPS EPC, BadVaddr, Status, Cause

Page 20: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.20

Additions to MIPS ISA to support Exceptions?° Exception state is kept in “coprocessor 0”.

• Use mfc0 read contents of these registers• Every register is 32 bits, but may be only partially defined

BadVAddr (register 8)• register contained memory address at which memory reference occurred

Status (register 12) • interrupt mask and enable bits

Cause (register 13)• the cause of the exception• Bits 5 to 2 of this register encodes the exception type (e.g undefined

instruction=10 and arithmetic overflow=12)

EPC (register 14)• address of the affected instruction (register 14 of coprocessor 0).

° Control signals to write BadVAddr, Status, Cause, and EPC° Be able to write exception address into PC (8000 0080hex)° May have to undo PC = PC + 4, since want EPC to point to offending

instruction (not its successor): PC = PC - 4

Page 21: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.21

Details of Status register

° Mask = 1 bit for each of 5 hardware and 3 software interrupt levels

• 1 => enables interrupts• 0 => disables interrupts

° k = kernel/user• 0 => was in the kernel when interrupt occurred• 1 => was running user mode

° e = interrupt enable• 0 => interrupts were disabled• 1 => interrupts were enabled

° When interrupt occurs, 6 LSB shifted left 2 bits, setting 2 LSB to 0

• run in kernel mode with interrupts disabled

Status

15 8 5 4 3 2 1 0

k e k e k eMask

oldprev

current

Page 22: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.22

Details of Cause register

° Pending interrupt 5 hardware levels: bit set if interrupt occurs but not yet serviced

• handles cases when more than one interrupt occurs at same time, or while records interrupt requests when interrupts disabled

° Exception Code encodes reasons for interrupt• 0 (INT) => external interrupt

• 4 (ADDRL) => address error exception (load or instr fetch)

• 5 (ADDRS) => address error exception (store)

• 6 (IBUS) => bus error on instruction fetch

• 7 (DBUS) => bus error on data fetch

• 8 (Syscall) => Syscall exception

• 9 (BKPT) => Breakpoint exception

• 10 (RI) => Reserved Instruction exception

• 12 (OVF) => Arithmetic overflow exception

Status15 10

Pending

5 2

Code

Page 23: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.23

Part of the handler in trap_handler.s.ktext 0x80000080

entry: Exceptions/interrupts come here.set noat

move $k1 $at # Save $at

.set at

sw $v0 s1 # Not re-entrent and we can't trust $sp

sw $a0 s2

mfc0 $k0 $13 # Cause Grab the cause registerli $v0 4 # syscall 4 (print_str)

la $a0 __m1_

syscall

li $v0 1 # syscall 1 (print_int)

srl $a0 $k0 2 # shift Cause reg

syscall

ret: lw $v0 s1

lw $a0 s2

mfc0 $k0 $14 # EPC Get the return address (EPC).set noat

move $at $k1 # Restore $at

.set at

rfe # Return from exception handler

addiu $k0 $k0 4 # Return to next instruction

jr $k0

Page 24: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.24

Example: How Control Handles Traps in our FSD

° Undefined Instruction–detected when no next state is defined from state 1 for the op value.

• We handle this exception by defining the next state value for all op values other than lw, sw, 0 (R-type), jmp, beq, and ori as new state 12.

• Shown symbolically using “other” to indicate that the op field does not match any of the opcodes that label arcs out of state 1.

° Arithmetic overflow–detected on ALU ops such as signed add

• Used to save PC and enter exception handler

° External Interrupt – flagged by asserted interrupt line• Again, must save PC and enter exception handler

° Note: Challenge in designing control of a real machine is to handle different interactions between instructions and other exception-causing events such that control logic remains small and fast.

• Complex interactions makes the control unit the most challenging aspect of hardware design

Page 25: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.25

How add traps and interrupts to state diagram?

IR <= MEM[PC]PC <= PC + 4

R-type

S <= A fun B

R[rd] <= S

S <= A op ZX

R[rt] <= S

ORi

S <= A + SX

R[rt] <= M

M <= MEM[S]

LW

S <= A + SX

MEM[S] <= B

SW

“instruction fetch”

“decode”

0000

0001

0100

0101

0110

0111

1000

1001

1010

1011

1100

BEQ

0010

If A = Bthen PC <= S

S<= PC +SX

undefined instruction

EPC <= PC - 4PC <= exp_addrcause <= 10 (RI)

other

S <= A - B

overflow

EPC <= PC - 4PC <= exp_addrcause <= 12 (Ovf)

EPC <= PC - 4PC <= exp_addrcause <= 0(INT)

HandleInterrupt

Pending INT

Interrupts are precise because user-visible state committed after exceptions flagged!

Page 26: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.26

But: What has to change in our -sequencer?

° Need concept of branch at micro-code level

R-type

S <= A fun B0100

overflow

EPC <= PC - 4PC <= exp_addrcause <= 12 (Ovf)

µAddressSelectLogic

Opcode

microPC

1

Ad

der

DispatchROM

Mux

0012

Mux

Mux

0

1

overflowpending interrupt

4?

N?

Cond SelectDo -branch

-offset Seq Select

Page 27: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.27

Example: Can easily use with for non-ideal memory

IR <= MEM[PC]

R-type

A <= R[rs]B <= R[rt]

S <= A fun B

R[rd] <= SPC <= PC + 4

S <= A or ZX

R[rt] <= SPC <= PC + 4

ORi

S <= A + SX

R[rt] <= MPC <= PC + 4

M <= MEM[S]

LW

S <= A + SX

MEM[S] <= B

BEQPC <=

Next(PC)

SW

“instruction fetch”

“decode / operand fetch”

Exe

cute

Mem

ory

Writ

e-ba

ck

~wait wait

~wait wait

PC <= PC + 4

~wait wait

Page 28: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.28

Question #1: Why do microcoding?

° If simple instruction could execute at very high clock rate…

° If you could even write compilers to produce microinstructions…

° If most programs use simple instructions and addressing modes…

° If microcode is kept in RAM instead of ROM so as to fix bugs …

° If same memory used for control memory could be used instead as cache for “macroinstructions”…

° Then why not skip instruction interpretation by a microprogram and simply compile directly into lowest language of machine? (microprogramming is overkill when ISA matches datapath 1-1)

Page 29: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.29

Legacy Software and Microprogramming

° IBM bet company on 360 Instruction Set Architecture (ISA): single instruction set for many classes of machines

• (8-bit to 64-bit)

° Stewart Tucker stuck with job of what to do about software compatibility

• If microprogramming could easily do same instruction set on many different microarchitectures, then why couldn’t multiple microprograms do multiple instruction sets on the same microarchitecture?

• Coined term “emulation”: instruction set interpreter in microcode for non-native instruction set

• Very successful: in early years of IBM 360 it was hard to know whether old instruction set or new instruction set was more frequently used

Page 30: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.30

Microprogramming Pros and Cons

° Ease of design

° Flexibility• Easy to adapt to changes in organization, timing, technology

• Can make changes late in design cycle, or even in the field

° Can implement very powerful instruction sets (just more control memory)

° Generality• Can implement multiple instruction sets on same machine.

• Can tailor instruction set to application.

° Compatibility• Many organizations, same instruction set

° Costly to implement

° Slow

Page 31: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.31

Recall: Performance Evaluation

° What is the average CPI?• state diagram gives CPI for each instruction type

• workload gives frequency of each type

Type CPIi for type Frequency CPIi x freqIi

Arith/Logic 4 40% 1.6

Load 5 30% 1.5

Store 4 10% 0.4

branch 3 20% 0.6

Average CPI:4.1

Page 32: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.32

Question #2: Can we get CPI < 4.1?

IdealMemoryWrAdrDin

RAdr

32

32

32Dout

MemWr

32

AL

U

3232

ALUOp

ALUControl

32

IRWr

Instru

ction R

eg

32

Reg File

Ra

Rw

busW

Rb5

5

32busA

32busB

RegWr

Rs

Rt

Mu

x

0

1

Rt

Rd

PCWr

ALUSelA

Mux 01

RegDst

Mu

x

0

1

32

PC

MemtoReg

Extend

ExtOp

Mu

x

0

132

0

1

23

4

16Imm 32

<< 2

ALUSelB

Mu

x

1

0

32

Zero

ZeroPCWrCond PCSrc

32

IorD

Mem

Data R

eg

AL

U O

ut

B

A

° Seems to be lots of “idle” hardware• Why not overlap instructions???

Page 33: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.33

The Big Picture: Where are We Now?

° The Five Classic Components of a Computer

° Next Topics: • Pipelining by Analogy

• Pipeline hazards

Control

Datapath

Memory

Processor

Input

Output

Page 34: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.34

Pipelining is Natural!

° Laundry Example

° Ann, Brian, Cathy, Dave each have one load of clothes to wash, dry, and fold

° Washer takes 30 minutes

° Dryer takes 40 minutes

° “Folder” takes 20 minutes

A B C D

Page 35: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.35

Sequential Laundry

° Sequential laundry takes 6 hours for 4 loads° If they learned pipelining, how long would laundry take?

A

B

C

D

30 40 20 30 40 20 30 40 20 30 40 20

6 PM 7 8 9 10 11 Midnight

Task

Order

Time

Page 36: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.36

Pipelined Laundry: Start work ASAP

° Pipelined laundry takes 3.5 hours for 4 loads

A

B

C

D

6 PM 7 8 9 10 11 Midnight

Task

Order

Time

30 40 40 40 40 20

Page 37: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.37

Pipelining Lessons

° Pipelining doesn’t help latency of single task, it helps throughput of entire workload

° Pipeline rate limited by slowest pipeline stage

° Multiple tasks operating simultaneously using different resources

° Potential speedup = Number pipe stages

° Unbalanced lengths of pipe stages reduces speedup

° Time to “fill” pipeline and time to “drain” it reduces speedup

° Stall for Dependences

A

B

C

D

6 PM 7 8 9

Task

Order

Time

30 40 40 40 40 20

Page 38: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.38

The Five Stages of Load

° Ifetch: Instruction Fetch• Fetch the instruction from the Instruction Memory

° Reg/Dec: Registers Fetch and Instruction Decode

° Exec: Calculate the memory address

° Mem: Read the data from the Data Memory

° Wr: Write the data back to the register file

Cycle 1 Cycle 2 Cycle 3 Cycle 4 Cycle 5

Ifetch Reg/Dec Exec Mem WrLoad

Page 39: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.39

Note: These 5 stages were there all along!

IR <= MEM[PC]PC <= PC + 4

R-type

ALUout <= A fun B

R[rd] <= ALUout

ALUout <= A op ZX

R[rt] <= ALUout

ORi

ALUout <= A + SX

R[rt] <= M

M <= MEM[ALUout]

LW

ALUout <= A + SX

MEM[ALUout] <= B

SW

0000

0001

0100

0101

0110

0111

1000

1001

1010

1011

1100

BEQ

0010

If A = B then PC <= ALUout

ALUout <= PC +SX

Exe

cute

Mem

ory

Writ

e-ba

ckD

ecod

eF

etch

Page 40: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.40

Pipelining° Improve performance by increasing throughput

Ideal speedup is number of stages in the pipeline. Do we achieve this?

Page 41: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.41

Basic Idea

° What do we need to add to split the datapath into stages?

Page 42: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.42

Graphically Representing Pipelines

° Can help with answering questions like:• how many cycles does it take to execute this code?

• what is the ALU doing during cycle 4?

• use this representation to help understand datapaths

Page 43: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.43

Conventional Pipelined Execution Representation

IFetch Dcd Exec Mem WB

IFetch Dcd Exec Mem WB

IFetch Dcd Exec Mem WB

IFetch Dcd Exec Mem WB

IFetch Dcd Exec Mem WB

IFetch Dcd Exec Mem WBProgram Flow

Time

Page 44: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.44

Single Cycle, Multiple Cycle, vs. Pipeline

Clk

Cycle 1

Multiple Cycle Implementation:

Ifetch Reg Exec Mem Wr

Cycle 2 Cycle 3 Cycle 4 Cycle 5 Cycle 6 Cycle 7 Cycle 8 Cycle 9 Cycle 10

Load Ifetch Reg Exec Mem Wr

Ifetch Reg Exec Mem

Load Store

Pipeline Implementation:

Ifetch Reg Exec Mem WrStore

Clk

Single Cycle Implementation:

Load Store Waste

Ifetch

R-type

Ifetch Reg Exec Mem WrR-type

Cycle 1 Cycle 2

Page 45: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.45

Why Pipeline?

° Suppose we execute 100 instructions

° Single Cycle Machine• 45 ns/cycle x 1 CPI x 100 inst = 4500 ns

° Multicycle Machine• 10 ns/cycle x 4.1 CPI (due to inst mix) x 100 inst = 4100 ns

° Ideal pipelined machine• 10 ns/cycle x (1 CPI x 100 inst + 4 cycle drain) = 1040 ns

Page 46: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.46

Why Pipeline? Because we can!

Instr.

Order

Time (clock cycles)

Inst 0

Inst 1

Inst 2

Inst 4

Inst 3A

LUIm Reg Dm Reg

AL

UIm Reg Dm Reg

AL

UIm Reg Dm Reg

AL

UIm Reg Dm Reg

AL

UIm Reg Dm Reg

Page 47: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.47

Can pipelining get us into trouble?° Yes: Pipeline Hazards

• structural hazards: attempt to use the same resource two different ways at the same time

- E.g., combined washer/dryer would be a structural hazard or folder busy doing something else (watching TV)

• control hazards: attempt to make a decision before condition is evaluated

- E.g., washing football uniforms and need to get proper detergent level; need to see after dryer before next load in

- branch instructions

• data hazards: attempt to use item before it is ready

- E.g., one sock of pair in dryer and one in washer; can’t fold until get sock from washer through dryer

- instruction depends on result of prior instruction still in the pipeline

° Can always resolve hazards by waiting• pipeline control must detect the hazard

• take action (or delay action) to resolve hazards

Page 48: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.48

Mem

Single Memory is a Structural Hazard

Instr.

Order

Time (clock cycles)

Load

Instr 1

Instr 2

Instr 3

Instr 4A

LUMem Reg Mem Reg

AL

UMem Reg Mem Reg

AL

UMem Reg Mem RegA

LUReg Mem Reg

AL

UMem Reg Mem Reg

Detection is easy in this case! (right half highlight means read, left half write)

Page 49: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.49

Structural Hazards limit performance

° Example: if 1.3 memory accesses per instruction and only one memory access per cycle then

• average CPI 1.3

• otherwise resource is more than 100% utilized

Page 50: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.50

° Stall: wait until decision is clear° Impact: 2 lost cycles (i.e. 3 clock cycles per branch

instruction) => slow° Move decision to end of decode

• save 1 cycle per branch

Control Hazard Solution #1: Stall

Instr.

Order

Time (clock cycles)

Add

Beq

Load

AL

UMem Reg Mem Reg

AL

UMem Reg Mem RegA

LUReg Mem RegMem

Lostpotential

Page 51: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.51

° Predict: guess one direction then back up if wrong° Impact: 0 lost cycles per branch instruction if right,

1 if wrong (right 50% of time)• Need to “Squash” and restart following instruction if wrong• Produce CPI on branch of (1 *.5 + 2 * .5) = 1.5• Total CPI might then be: 1.5 * .2 + 1 * .8 = 1.1 (20% branch)

° More dynamic scheme: history of 1 branch ( 90%)

Control Hazard Solution #2: Predict

Instr.

Order

Time (clock cycles)

Add

Beq

Load

AL

UMem Reg Mem Reg

AL

UMem Reg Mem Reg

Mem

AL

UReg Mem Reg

Page 52: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.52

° Delayed Branch: Redefine branch behavior (takes place after next instruction)

° Impact: 0 clock cycles per branch instruction if can find instruction to put in “slot” ( 50% of time)

° As launch more instruction per clock cycle, less useful

Control Hazard Solution #3: Delayed Branch

Instr.

Order

Time (clock cycles)

Add

Beq

Misc

AL

UMem Reg Mem Reg

AL

UMem Reg Mem Reg

Mem

AL

UReg Mem Reg

Load Mem

AL

UReg Mem Reg

Page 53: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.53

Data Hazard on r1

add r1,r2,r3

sub r4,r1,r3

and r6,r1,r7

or r8,r1,r9

xor r10,r1,r11

Page 54: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.54

• Dependencies backwards in time are hazards

Data Hazard on r1:

Instr.

Order

Time (clock cycles)

add r1,r2,r3

sub r4,r1,r3

and r6,r1,r7

or r8,r1,r9

xor r10,r1,r11

IF

ID/RF

EX MEM WBAL

UIm Reg Dm Reg

AL

UIm Reg Dm RegA

LUIm Reg Dm Reg

Im

AL

UReg Dm Reg

AL

UIm Reg Dm Reg

Page 55: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.55

• “Forward” result from one stage to another

• “or” OK if define read/write properly

Data Hazard Solution:

Instr.

Order

Time (clock cycles)

add r1,r2,r3

sub r4,r1,r3

and r6,r1,r7

or r8,r1,r9

xor r10,r1,r11

IF

ID/RF

EX MEM WBAL

UIm Reg Dm Reg

AL

UIm Reg Dm RegA

LUIm Reg Dm Reg

Im

AL

UReg Dm Reg

AL

UIm Reg Dm Reg

Page 56: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.56

Reg

• Dependencies backwards in time are hazards

• Can’t solve with forwarding: • Must delay/stall instruction dependent on loads

Forwarding (or Bypassing): What about Loads?

Time (clock cycles)

lw r1,0(r2)

sub r4,r1,r3

IF

ID/RF

EX MEM WBAL

UIm Reg Dm

AL

UIm Reg Dm Reg

Page 57: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.57

Reg

• Dependencies backwards in time are hazards

• Can’t solve with forwarding: • Must delay/stall instruction dependent on loads

Forwarding (or Bypassing): What about Loads

Time (clock cycles)

lw r1,0(r2)

sub r4,r1,r3

IF

ID/RF

EX MEM WBAL

UIm Reg Dm

AL

UIm Reg Dm RegStall

Page 58: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.58

Designing a Pipelined Processor

° Go back and examine your datapath and control diagram

° associated resources with states

° ensure that flows do not conflict, or figure out how to resolve

° assert control in appropriate stage

Page 59: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.59

Control and Datapath: Split state diag into 5 pieces

IR <- Mem[PC]; PC <– PC+4;

A <- R[rs]; B<– R[rt]

S <– A + B;

R[rd] <– S;

S <– A + SX;

M <– Mem[S]

R[rd] <– M;

S <– A or ZX;

R[rt] <– S;

S <– A + SX;

Mem[S] <- B

If CondPC < PC+SX;

Exe

c

Reg

. F

ile

Mem

Acc

ess

Dat

aM

em

A

B

SReg

File

Equ

al

PC

Nex

t P

C

IR

Inst

. M

em

D

M

Page 60: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.60

Summary: Exceptions° Microprogramming is a fundamental concept

• implement an instruction set by building a very simple processor and interpreting the instructions

• essential for very complex instructions and when few register transfers are possible

• Control design reduces to Microprogramming

° Exceptions are the hard part of control• Need to find convenient place to detect exceptions and to branch to

state or microinstruction that saves PC and invokes the operating system

• Providing clean interrupt model gets hard with pipelining!

° Precise Exception state of the machine is preserved as if program executed up to the offending instruction

• All previous instructions completed

• Offending instruction and all following instructions act as if they have not even started

Page 61: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.61

Summary: Pipelining

° Reduce CPI by overlapping many instructions• Average throughput of approximately 1 CPI with fast clock

° Utilize capabilities of the Datapath • start next instruction while working on the current one• limited by length of longest stage (plus fill/flush)• detect and resolve hazards

° What makes it easy• all instructions are the same length• just a few instruction formats• memory operands appear only in loads and stores

° What makes it hard?• structural hazards: suppose we had only one memory• control hazards: need to worry about branch instructions• data hazards: an instruction depends on a previous instruction

Page 62: CS152 Computer Architecture and Engineering Lecture 10 Exceptions (continued) Introduction to Pipelining March 1, 2004 John Kubiatowicz (kubitron)

3/1/04 ©UCB Spring 2004 CS152 / Kubiatowicz

Lec10.62

Summary: Where this class is going

° We’ll build a simple pipeline and look at these issues• Lab 5 Pipelined Processor• Lab 6 With caches

° We’ll talk about modern processors and what’s really hard:

• Branches (control hazards) are really hard!

• Exception handling

• Trying to improve performance with out-of-order execution, etc.

• Trying to get CPI < 1 (Superscalar execution)