A processor, or set of processors, executes instructions from an instruction set, e.g., the instruction set architecture (ISA). The instruction set is the part of the computer architecture related to programming, and generally includes the native data types, instructions, register architecture, addressing modes, memory architecture, interrupt and exception handling, and external input and output (I/O). It should be noted that the term instruction herein may refer to a macro-instruction, e.g., an instruction that is provided to the processor for execution, or to a micro-instruction, e.g., an instruction that results from a processor's decoder decoding macro-instructions.
Various examples in accordance with the present disclosure will be described with reference to the drawings, in which:
The present disclosure relates to methods, apparatus, systems, and non-transitory computer-readable storage media for probabilistic data manipulation detection (e.g., detecting an integrity violation) based on collision patterns and encryption. Examples herein are directed to memory controller circuitry and methods for data encryption that allows for probabilistic detection of data manipulation or access violations. In certain examples, the performance and storage overheads are configurable and adjustable, e.g., dependent on the workload. In certain examples, the overheads can be chosen to be negligible.
A technical problem is that certain integrity checks may rely on data being compressed, e.g., and if data can be compressed, the integrity check adds an authentication tag. Certain examples utilize ambiguous encodings of data with repeated byte entries, e.g., where repeated byte entries allow for different choices of encodings resulting in different ciphertexts when combined with encryption across repeated encryptions of the same plaintext. Rules can also be applied that can detect when the wrong pair was encoded, e.g., providing integrity.
Certain cryptographic circuitry utilizes compartmentalization to eliminate the need for process and/or virtual machine (VM) separation and their associated overheads. Certain examples herein use cryptography to provide intra-process security, e.g., instead of paging or segmentation. While encryption addresses confidentiality for such a solution (e.g., via multi-key encrypted memory such as, but not limited to, that provided by total memory encryption multiple-key (TME-MK)), an (e.g., software) adversary that has illegitimate access to some memory ciphertext can attempt to read this section, but only gets wrongly decrypted data at best. However, this wrongly decrypted data can still be used in replay attacks due to the bijective (e.g., symmetric) nature of certain memory encryption schemes. Meaning that new data can be overwritten with old data controlled by an adversary.
To overcome these problems, examples herein are directed to a memory controller circuitry and methods for data encryption that counts the number of (e.g., byte granularity) repeated values (e.g., collisions) in the plaintext of one cache line (e.g., 64 bytes wide). In certain examples, a minimum threshold number of collisions and/or a maximum threshold number of collisions are defined. In certain examples, if detected collisions are above the minimum threshold and/or below the maximum threshold (e.g., lie in between the minimum and maximum thresholds, the data in the cache line is replaced by a fixed indicator. e.g., and the “replaced” plaintext in the cache line is looked up in a data structure for conflict resolution (e.g., conflict resolution table). In certain examples, the plaintext (e.g., with fixed indicator) is encrypted and the ciphertext is stored. In certain examples, if the ciphertext is manipulated or decrypted with a wrong key, with a certain probability, the decrypted plaintext has a number of collisions lying above the minimum threshold and/or below the maximum threshold (e.g., in between the minimum and maximum thresholds), and allowing to detect an integrity violation. As one example of a read from memory, a minimum threshold of collisions is three and a maximum threshold of collisions is five, and thus a (e.g., decrypted) data line having three collisions is expected to have a conflict indicator set in the decrypted plaintext or ciphertext, and if it does not, this indicates there is an integrity violation.
Examples herein provide for an integrity check that can operate on random and compressed data, providing tunable alternate encodings with a high probability (e.g., with over 99% of both real and random data being encodable). In certain examples, this avoids the need for additional memory lookups to restore unencodable data versus using compression and, thus, improves the performance and reduces memory overhead of the system versus using integrity tags to detect misuse or storing counter values for ciphertext indistinguishability.
Certain examples herein utilize the difference in the number of collisions one expects for random data versus structured data like text. In certain examples, one cache line (e.g., 64 bytes) of random data is expected to have less collisions between the content of bytes compared to characters of text. For example, a cache line of (e.g., American Standard Code for Information Interchange (ASCII)) may have a very high frequency of characters like spaces or ‘e’, while not including the character ‘°’. Thus, in certain examples, a memory controller circuitry performs an integrity check by defining (e.g., user defining) a minimum threshold and/or a maximum threshold of collisions in one plaintext cache line as a “no-go zone”, e.g., where such data is replaced by a conflict indicator instead of the data (e.g., where the original data is to be retrieved by a lookup in a conflict resolution data structure). In certain examples, the plaintext is then encrypted before it is stored in memory as ciphertext. In certain examples, the minimum and/or maximum thresholds are chosen, so that there are collisions above the minimum threshold and/or below the maximum threshold (e.g., between the min and max thresholds) relatively frequently in random data, but almost never in structured data. In certain examples, if the ciphertext is manipulated and/or decrypted with a wrong key, a resulting plaintext follows a (e.g., pseudo) random distribution. Hence, in certain examples, there is a certain probability that such a plaintext has a number of collisions which lies in between the defined minimum and maximum thresholds. In these cases, this allows for detecting that either the ciphertext was manipulated or decrypted with a wrong key.
Certain examples herein are implemented as an integrity checking mode, e.g., of a memory controller circuitry. For example, where the integrity checking mode is in addition to or alternatively to an XOR-encrypt-XOR (XEX) Tweakable block ciphertext Stealing (XTS) mode, Electronic Code Book (ECB) mode, Cipher Block Chaining (CBC) mode, etc. of the computer system (e.g., memory controller circuitry). Memory operations by a processor to external system memory may be protected via encryption and integrity, e.g., with integrity checked according to this disclosure (e.g., based on collision patterns).
A memory controller circuit (e.g., operating according to an integrity checking mode disclosed herein) cannot practically be performed in the human mind (or with pen and paper).
Turning now to the figures,
A core may be any hardware processor core, e.g., as an instance of core 1690 in
Computer system 100 includes registers 110. In certain examples, registers 110 (e.g., for a particular core) includes one or any combination of: control/capabilities register(s) 110A, shadow stack pointer register 110B, instruction pointer (IP) register 110C, and/or key identification (key ID) register 110D.
In certain examples, each of control/capabilities register(s) 110A of core 102 includes the same data as corresponding control/capabilities register(s) of other cores (e.g., core_N). In certain examples, control/capabilities registers store the control values and/or capability indicating values for cryptographic circuitry (e.g., an encryption circuit and/or decryption circuit) or other component(s). For example, where capabilities register(s) store value(s) (e.g., provided by execution of hardware initialization manager storage 138) that indicate the functionality that a corresponding cryptographic circuitry (e.g., cryptographic circuitry 114, cryptographic circuitry 116B, and/or cryptographic circuitry 134) is capable of and/or control register(s) store values that control the corresponding cryptographic circuitry (e.g., cryptographic circuitry 114, cryptographic circuitry 116B, and/or cryptographic circuitry 134), for example, collision threshold(s) register(s) 110E, e.g., that are programmable with a value(s) that indicates the minimum collision threshold and/or maximum collision threshold as discussed herein.
In certain examples, memory 120 is to store a (e.g., data) stack 122 and/or a shadow stack 124. In certain examples, shadow stack 124 stores a context for a thread, for example, that includes a shadow stack pointer, e.g., for that context. Shadow stack pointer may be an address, e.g., a linear address or other value to indicate a value of the stack pointer. In certain examples, each respective linear address specifies a different byte in memory (e.g., in a stack). In certain examples, the current shadow stack pointer is stored in a shadow stack pointer register 110B.
In certain examples, a (e.g., user level) request (e.g., from a thread that is a user level privilege thread) to switch a context (e.g., push and/or pop a stack pointer) may be received. In certain examples, a request to switch a context includes pushing or popping from stack 122 one or more other items of data in addition to a stack pointer. In certain examples, program code (e.g., software) executing in user level may request a push or a pop of a (e.g., non-shadow) stack 122. In certain examples, a request is the issuance of an instruction to a processor for decode and/or execution. For example, a request for a pop of a stack pointer from stack 122 may include executing a restore stack pointer instruction. For example, a request for a push of a stack pointer to stack 122 may include executing a save stack pointer instruction. In certain examples, shadow stack 124 is a second separate stack that “shadows” the (e.g., program call) stack 122. In certain examples, a function stores its return address to both the call stack 122 and the shadow stack 124. In certain examples, a function loads the return address from both the call stack 122 and the shadow stack 124, e.g., and the processor 101 compares them, and if the two records of the return address differ, then an attack is detected (e.g., and an exception reported to the OS), and if they match, the access (e.g., push or pop) is allowed to proceed.
In certain examples, instruction pointer (IP) register 110C is to store the (e.g., current) IP value, e.g., RIP value for 64 bit address modes or EIP value for 32 bit addressing modes.
In certain examples, memory access (e.g., store or load) requests for memory 120 are generated by processor 101 (e.g., a core), e.g., a memory access request generated by execution circuitry 106 of core 102 (e.g., caused by the execution of an instruction decoded by decoder circuitry 104) and/or a memory access request may be generated by execution circuit of another core_N. In certain examples, a memory address for the memory access is generated by an address generation unit (AGU) 108 of the execution circuitry 106.
In certain examples, a memory access request is serviced by a cache, e.g., cache within a core and/or cache 112 shared by multiple cores. Additionally or alternatively (e.g., for a cache miss), memory access request may be serviced by memory 120 separate from a cache. In certain examples, a memory access request is a load of data from memory 120 into a cache of a processor, e.g., cache 112. In certain examples, a memory access request is a store of data to memory 120 from (e.g., a cache of) a processor, e.g., cache 112.
In certain examples, computer system 100 includes cryptographic circuitry (e.g., that utilizes encryption to store encrypted information and decryption to decrypt that stored and encrypted information). In certain examples, cryptographic circuitry is included within a processor 101. In certain examples, cryptographic circuitry 116B is included within memory controller circuit 116. In certain examples, cryptographic circuitry is included between levels of a cache hierarchy. In certain examples, cryptographic circuitry 134 is included within a network interface controller (NIC) circuit 132, e.g., a NIC circuit 132 that is to control the sending and/or receiving of data over a network. In certain examples, single cryptographic circuitry is utilized for both (e.g., all) cores of computer system 100. In certain examples, cryptographic circuitry includes a control to set it into a particular mode, for example, mode 114A to set cryptographic circuitry 114 into a particular mode (e.g., such as an integrity checking mode and/or a matching pair mode (e.g., “birthday pair” mode) of data encryption and/or decryption discussed herein) or similarly for other cryptographic circuitry.
Certain systems (e.g., processors) utilize encryption and decryption of data to provide security. In certain examples, cryptographic circuitry is separate from a processor core, for example, as an offload circuit controlled by a command sent from processor core, e.g., cryptographic circuitry 114 separate from any cores. Cryptographic circuitry 114 may receive a memory access (e.g., store) request from one or more of its cores (e.g., from address generation unit 108 of execution circuitry 106). In certain examples, cryptographic circuitry is to, e.g., for an input of a destination address and text to be encrypted (e.g., plaintext) (e.g., and a key), perform an encryption to generate a ciphertext (e.g., encrypted data). The ciphertext may then be stored in storage, e.g., in memory 120. In certain examples, cryptographic circuitry performs a decryption operation, e.g., for a memory load request. The cryptographic circuitry may include a tweaked mode of operation, such as AES-XTS, using the memory address as a tweak to the cryptographic operation, e.g., ensuring that even the same data encrypted for different addresses results in different ciphertext. Other modes such as AES-CBC may be used to extend across an entire memory line that is larger than a single block of data, e.g., allowing an initial locator value for a pair encoding to be distributed across the ciphertext for an entire memory line.
In certain examples, a processor (e.g., as an instruction set architecture (ISA) extension) supports total memory encryption (TME) (for example, memory encryption with a single ephemeral key) and/or multiple-key TME (TME-MK or MKTME) (for example, memory encryption that supports the use of multiple keys for page granular memory encryption, e.g., with additional support for software provisioned keys).
In certain examples, TME provides the capability to encrypt the entirety of the physical memory of a system. For example, with this capability enabled in the very early stages of the boot process with a small change to hardware initialization manager code (e.g., Basic Input/Output System (BIOS) firmware), e.g., stored in storage 138. In certain examples, once TME is configured and locked in, it will encrypt all the data on external memory buses of computer system 100 using an encryption standard/algorithm (e.g., an Advanced Encryption Standard (AES), such as, but not limited to, one using 128-bit keys). In certain examples, the encryption key used for TME uses a hardware random number generator implemented in the computer system (e.g., processor), and the key(s) (e.g., to be stored in data structure 126) are not accessible by software or by using external interfaces to the computer system (e.g., system-on-a-chip (SoC)). In certain examples, TME capability provides protections of encryption to external memory buses and/or memory.
In certain examples, multi-key TME (TME-MK) adds support for multiple encryption keys. In certain examples, the computer system implementation supports a fixed number of encryption keys, and software can configure the computer system to use a subset of available keys. In certain examples, software manages the use of keys and can use each of the available keys for encrypting any section (e.g., page or a cache line) of the memory. Thus, certain examples of TME-MK allow page granular encryption of memory where the physical address specifics the key ID (KeyID). In certain examples (e.g., by default), cryptographic circuitry (e.g., TME-MK) uses the (e.g., TME) encryption key unless explicitly specified by software. In addition to supporting a processor (e.g., central processing unit (CPU)) generated ephemeral key (e.g., not accessible by software or by using external interfaces to a computer system), examples of TME-MK also support software provided keys. In certain examples, software provided keys are used with non-volatile memory or when combined with attestation mechanisms and/or used with key provisioning services. In certain examples, a tweak key used for TME-MK is supplied by software. Certain examples (e.g., platforms) herein use TME and/or TME-MK to prevent an attacker with physical access to the machine from reading memory (e.g., and stealing any confidential information therein). In one example, an AES-XTS standard is used as the encryption algorithm to provide the desired security.
In certain examples, each page of memory pages 128 includes a key used to encrypt information, e.g., and thus can be used to decrypt that encrypted information. In certain examples, the keyID register is used with page tables (e.g., extended and/or non-extended page tables). In certain examples, the keyID register specifies the key itself, e.g., where the cryptographic engine (e.g., cryptographic circuitry) is part of the processor pipeline. In certain examples, the keyID register provides the keyID, e.g., the page table entries do not provide the keyID.
In certain examples, TME-MK cryptographic (e.g., encryption) circuitry maintains an internal key table not accessible by software to store the information (e.g., key and encryption mode) associated with each KeyID (e.g., a corresponding KeyID for a corresponding encrypted memory block/page) (for example, where a key ID is incorporated into the physical address, e.g., in the page tables, and also in every other storage location such as the caches and TLB). In one example, each KeyID is associated with one of three encryption modes: (i) encryption using the key specified, (ii) do not encrypt at all (e.g., memory will be plain text), or (iii) encrypt using the TME Key. In certain examples, unless otherwise specified by software, TME (e.g., TME-MK) uses a hardware-generated ephemeral key by default which is inaccessible by software or external interfaces, e.g., and TME-MK also supports software-provided keys.
In certain examples, the PCONFIG is used to program KeyID attributes for TME-MK.
Table 1 below indicates an example TME-MK Key Table:
Table 2 below indicates example PCONFIG Leaf Encodings:
Table 3 below indicates example PCONFIG targets (e.g., TME-MK encryption circuit):
In a virtualization scenario, certain examples herein allow a virtual machine monitor (VMM) or hypervisor to manage the use of keys to transparently support (e.g., legacy) operating systems without any changes (e.g., such that TME-MK can also be viewed as TME virtualization in such a deployment scenario). In certain examples, an operating system (OS) is enabled to take additional advantage of TME-MK capability, both in native and virtualized environments. In certain examples, TME-MK is available to each guest OS in a virtualized environment, and the guest OS can take advantage of TME-MK in the same ways as a native OS.
In certain examples, computer system 100 includes a memory controller circuit 116. In one example, a single memory controller circuit is utilized for a plurality of cores of computer system 100. Memory controller circuit 116 of processor 101 may receive an address for a memory access request, e.g., and for a store request also receiving the payload data (e.g., ciphertext) to be stored at the address, and then perform the corresponding access into memory 120, e.g., via one or more memory buses 118. Each memory controller (MC) may have an identification value, e.g., “MC ID”. Memory and/or memory bus(es) (e.g., a memory channel thereof) may have an identification value, e.g., “channel ID”. Each memory device (e.g., non-volatile memory 120 device) may have its own channel ID. Each processor (e.g., socket) (e.g., of a single SoC) may have an identification value, e.g., “socket ID”. In certain examples, memory controller circuit 116 includes a direct memory access engine 116A, e.g., for performing memory accesses into memory 120. Memory may be a volatile memory (e.g., DRAM), non-volatile memory (e.g., non-volatile DIMM or non-volatile DRAM) and/or secondary (e.g., external) memory (e.g., not directly accessible by a processor), for example, a disk and/or solid-state drive (e.g., memory unit 928 in
In certain examples, computer system 100 includes a NIC circuit 132, e.g., to transfer data over a network. In certain examples, a NIC circuit 132 includes cryptographic circuitry 134 (e.g., encryption and/or decryption circuit), e.g., to encrypt (and/or decrypt) data, but without a core and/or encryption (or decryption) circuit of a processor (e.g., processor die) performing the encryption (or decryption). In the case where a NIC circuit that is supplied by a different vendor (e.g., manufacturer) than a socket (e.g., processor), the NIC circuit is viewed as a security risk for the vendor (e.g., manufacturer) of the socket in certain examples. In certain examples, encryption (and decryption) performed by NIC circuit 132 is enabled or disabled (e.g., via a request sent by socket). In certain examples, NIC circuit 132 includes a remote DMA engine 136, e.g., to send data via a network.
In one example, the hardware initialization manager (non-transitory) storage 138 stores hardware initialization manager firmware (e.g., or software). In one example, the hardware initialization manager (non-transitory) storage 138 stores Basic Input/Output System (BIOS) firmware. In another example, the hardware initialization manager (non-transitory) storage 138 stores Unified Extensible Firmware Interface (UEFI) firmware. In certain examples (e.g., triggered by the power-on or reboot of a processor), computer system 100 (e.g., core 102) executes the hardware initialization manager firmware (e.g., or software) stored in hardware initialization manager (non-transitory) storage 138 to initialize the system 100 for operation, for example, to begin executing an operating system (OS) and/or initialize and test the (e.g., hardware) components of system 100.
In certain examples, data is stored as a single unit in memory 120, e.g., a first data section 130-1 stored on a first memory page and a second data section 130-N (e.g., where N is any integer greater than 1) stored (e.g., at least in part) on a second memory page.
In certain examples, memory controller circuitry 116 (and/or other circuitry) is to implement integrity checking (e.g., integrity checking mode) according to this disclosure. In certain examples, integrity checking is according to the operation(s) in
The operations 200 include, at block 202, retrieving a data line from memory given a particular (e.g., physical) address. The operations 200 further include, at block 204, decrypting the data line (e.g., using a specified keyID, identified key, and/or tweak). The operations 200 further include, at block 206, checking if a portion of the data line is a conflict indicator value (e.g., lookup indicator (IL)), and if yes, proceeding to block 208, and if no, proceeding to block 212. Some examples place the conflict indicator test 206 before decryption of the line 204. The operations 200 further include, at block 208, reading the conflict resolution data structure, e.g., by using the data line's address as an index into an array structure, to determine the corresponding (e.g., original) value, and substituting that correct value in place of the conflict indicator value reproducing the original data line. The operations 200 further include, at block 210, forwarding the data to a cache (e.g., cache 112 in
In certain examples, the minimum threshold and/or maximum threshold is selected to avoid utilizing the conflict data structure (e.g., table) on every memory access, but still utilizing the conflict data structure (e.g., table) to detect a hit enough to use the conflict data structure (e.g., table) for access violation protection.
In certain examples, the conflict indicator is used within the data line (e.g., cache line), for example, not within separate metadata or additional memory. In certain examples, the conflict indicator value (e.g., 8 bits/1 Byte wide) is to (i) identify a location of the repeated value that is still within the modified plaintext (e.g., the modified plaintext that includes the locator value) and/or (ii) identify a location of the repeated value that is not within the modified plaintext to make space for the locator value.
Examples herein can be combined with decoding/decompression schemes (e.g., modes) and/or encoding/compression schemes (e.g., modes), for example, a (e.g., “birthday mode”) asymmetrical encryption mode (e.g., as discussed in reference to
Combining with compression modes can also be used to select between different distributions where one distribution may be better than another. For example, using Birthday Mode on encode, different distributions can be tested against the data to be encoded. The distribution with the best properties can then be selected based on which birthday pair is chosen to be encoded. On decode, the decoder will then reverse this by observing which pair was compressed and it will know which distribution to use to decode the data in certain examples.
Other examples may find there is no suitable encoding on encode, and elect instead to attempt compression, e.g., only setting the conflict indicator if no method is viable to encode the data. On decode, the decoder will test if there is a viable encoding, and if finding none, will instead attempt decompression assuming the conflict indicator was not present in certain examples.
Certain examples herein utilize encryption (e.g., and decryption) according to a standard, e.g., an AES-XTS standard. Certain examples herein utilize wide (e.g., tweakable) blockciphers that diffuse over a whole cache line.
Certain examples herein modify the input plaintext according to one or more of the examples (e.g., modes or sub-modes) herein to generate a modified plaintext. Certain examples herein use circuitry in a repeated value (e.g., collision) based decoding/decompression scheme (e.g., mode). In certain examples, the repeated value (e.g., collision) based decoding/decompression scheme (e.g., mode) (e.g., in block 220 and/or block 222) is according to one or more operations discussed in reference to
Some or all of the operations 201 (or other processes described herein, or variations, and/or combinations thereof) are performed under the control of one or more computer systems configured with executable instructions and are implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) executing collectively on one or more processors, by hardware or combinations thereof. The code is stored on a computer-readable storage medium, for example, in the form of a computer program comprising instructions executable by one or more processors. The computer-readable storage medium is non-transitory. In some examples, one or more (or all) of the operations 201 are performed by a component(s) of the other figures (e.g., memory controller circuit 116).
The operations 201 include, at block 202, retrieving a data line from memory given a particular (e.g., physical) address. The operations 201 further include, at block 204, decrypting the data line (e.g., using a specified keyID, identified key, and/or tweak). The operations 201 further include, at block 206, checking if a portion of the data line is a conflict indicator value (e.g., lookup indicator (IL)), and if yes, proceeding to block 208, and if no, proceeding to block 212. Some examples place the conflict indicator test 206 before decryption of the line 204. The operations 201 further include, at block 208, reading the conflict resolution data structure, e.g., by using the data line's address as an index into an array structure, to determine the corresponding (e.g., original) value, and substituting that correct value in place of the conflict indicator value reproducing the original data line. The operations 201 further include, at block 222, determining if the conflict resolution data structure (e.g., table) indicates a failure, e.g., where table entries are protected with a message authentication code (MAC), or have an additional entry that indicates which key IS is allowed to access a certain entry, if an access happens with a wrong key (e.g., key ID), then a failure is reported, and if yes, proceeding to block 216 and if no, proceeding to block 210. The operations 201 further include, at block 210, forwarding the data to a cache (e.g., cache 112 in
The operations 300 include, at block 302, receiving a data line (e.g., from a processor or processor cache) for writing to memory. The operations 300 further include, at block 304, searching the data line for a conflict indicator value (e.g., coincidentally the same value in the data line as the conflict indicator value (e.g., bit pattern) of the encoding scheme), and if yes, proceeding to block 306, and if no, proceeding to block 312. The operations 300 further include, at block 306, storing an original value of the data line (e.g., value at the same location and same width as a locator value) into a data structure (e.g., conflict table indexed by the memory line address) (e.g., data structure 126 in
Certain examples herein modify the input plaintext according to one or more of the examples (e.g., modes or sub-modes) herein to generate a modified plaintext. Certain examples herein use circuitry in a repeated value (e.g., collision) based encoding/compression scheme (e.g., mode). In certain examples, the repeated value (e.g., collision) based encoding/compression scheme (e.g., mode) (e.g., in block 318 and/or block 320) is according to one or more operations discussed in reference to
Some or all of the operations 301 (or other processes described herein, or variations, and/or combinations thereof) are performed under the control of one or more computer systems configured with executable instructions and are implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) executing collectively on one or more processors, by hardware or combinations thereof. The code is stored on a computer-readable storage medium, for example, in the form of a computer program comprising instructions executable by one or more processors. The computer-readable storage medium is non-transitory. In some examples, one or more (or all) of the operations 301 are performed by a component(s) of the other figures (e.g., memory controller circuit 116).
The operations 301 include, at block 302, receiving a data line (e.g., from a processor or processor cache) for writing to memory. The operations 301 further include, at block 304, searching the data line for a conflict indicator value (e.g., coincidentally the same value in the data line as the conflict indicator value (e.g., bit pattern) of the encoding scheme), and if yes, proceeding to block 306, and if no, proceeding to block 312. The operations 301 further include, at block 306, storing an original value of the data line (e.g., value at the same location and same width as a locator value) into a data structure (e.g., conflict table indexed by the memory line address) (e.g., data structure 126 in
The operations 400 include, at block 402, executing, by an execution circuitry, an instruction to generate a memory request to read a data line from memory. The operations 400 further include, at block 404, decrypting, by a memory controller circuit, the data line into a decrypted data line. The operations 400 further include, at block 406, determining, by the memory controller circuit, that a field of the decrypted data line is not set to a conflict indicator value. The operations 400 further include, at block 408, determining, by the memory controller circuit, a number of value collisions within the data line. The operations 400 further include, at block 410, marking, by the memory controller circuit, the data line with an error indication in response to the number of value collisions being less than a maximum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value.
Certain examples above (e.g., in
In certain examples, a processor includes an AES-XTS mode (e.g., XEX-based tweaked-codebook mode with ciphertext stealing) for memory encryption, e.g., including Intel® Total Memory Encryption (TME), Intel® Software Guard Extensions, and Intel® Trust Domain Extensions (TDX), and other storage encryption solutions. In certain examples, encryption in XTS mode uses the memory address as a tweak to create different ciphertext for different memory locations despite the input data being the same, whereas certain examples in ECB mode produce the same ciphertext for the same plaintext. However, a technical issue is that the same plaintext for the same address encrypted with the same key will still yield the same ciphertext, e.g., allowing an adversary (e.g., attacker) to use this symmetry to attempt to circumvent the encryption.
In certain examples, memory controller circuitry (e.g., a memory encryption engine) uses an in-memory version tree to give a unique counter value for every data encryption when storing data to memory. This results in a unique ciphertext for each write, but the version tree takes about twenty-five percent of memory for metadata and lowers performance by about three times. The high memory overheads and performance impact prevent real world use of such examples.
To overcome the above technical problems, examples herein take advantage of the seemingly paradoxical high probability of finding a matching pair of values in a set of random numbers, e.g., the “Birthday Paradox”. In certain examples, a special encoding of a selected pair of matching values (e.g., bytes) in a cache line and/or memory line are used to break symmetries, e.g., even when using a symmetric cipher. In certain examples, when multiple pairs arise, (e.g., only) one pair is chosen to be encoded within a memory line or portion thereof. In certain examples, the pair to be encoded is chosen at random to change the resulting ciphertext, e.g., even when the input plaintext is the same. While many pairs are typical in non-random appearing computer data (for example, unencrypted and/or uncompressed data, such as, but not limited to, code, pictures, text files, memory initialized to zero, etc.) creating a large number of choices for an encoded (e.g., byte) pair, pairs also appear in random data (e.g., already encrypted data and/or compressed data). In certain examples, these choices allow for different encodings resulting in different ciphertexts across repeated encryptions of the same plaintext. In certain examples, rule(s) are applied to detect when the wrong pair was encoded, e.g., providing integrity or authenticity. In certain examples, a matching pair mode (e.g., “birthday pair” mode) of data encryption provides integrity, replay prevention, and/or ciphertext differentiation, for example, in contrast to an (e.g., XTS) mode does not provide integrity, replay prevention, and/or ciphertext differentiation and thus allowing adversarial code books to be generated or ciphertext corruption to go undetected. In certain examples, a processor (e.g., memory controller circuit) with a matching pair mode (e.g., “birthday pair” mode) of data encryption disclosed herein provides a more secure encryption, against even hardware adversaries, with the best performance and lowest cost. In certain examples, a physical circuit (e.g., memory controller circuit) for memory encryption (e.g., and decryption) includes a matching pair mode (e.g., “birthday pair” mode) of data encryption disclosed herein. In certain examples, a memory controller circuit in matching pair mode (e.g., “birthday pair” mode) of data encryption writing the same data to memory will result in different ciphertexts (e.g., with high probability). In certain examples, a memory controller circuit in matching pair mode (e.g., “birthday pair” mode) of data encryption is able to encrypt (e.g., encode) greater than about 98% of memory lines, e.g., and even about 70% of random data can be encoded, for example, virtually eliminating sequestered storage and accesses thereto, providing lower (e.g., XTS like) overhead and performance with much better security properties by constantly changing the ciphertext. A memory controller circuit (e.g., operating according to a matching pair mode disclosed herein) cannot practically be performed in the human mind (or with pen and paper).
In certain examples, a computer system (e.g., memory controller circuit thereof) implements a matching pair mode (e.g., “birthday pair” mode) of data encryption and/or decryption, for example, to implement (i) the repeated value (e.g., collision) based decoding/decompression scheme referred to in
The following table depicts several partial encodings combined with a conflict indicator in ciphertext. Notably, certain examples assume a conflict indicator that covers 512 bits and hence, it does not get a matching ciphertext by chance. In certain examples, a smaller conflict indicator (e.g., a one-byte special value) may also be used to save memory used by the conflict table. In certain examples, this has a considerable advantage in detection rate over the conflict indicator in a plaintext method if the encoding rate is small, e.g., but if the encoding rate is high, the advantage gets small in certain examples.
Further to the table below, for:
The following table shows a comparison of ambiguous encodings (e.g., alternative encodings or choices) that result in different ciphertexts for the same input plaintext. For this table below, the algorithms have the same name as in the table above, but instead of making a deterministic selection on which pair to select, they are selected randomly.
In certain examples, a data line 500 includes multiple elements (e.g., a 512-bit data line 500 includes 64 elements where each element is 8 bits/1 Byte wide).
In certain examples, a memory controller circuit (e.g., memory controller circuit 116 in
In certain examples, one value of a repeated pair of values in a data line 500 is removed to make room (e.g., space) in the modified data line for the locator value. In certain examples, the format of the locator value is according to one or more of the examples (e.g., modes or sub-modes) herein to generate a modified data line (e.g., modified plaintext).
In certain examples, in a first mode (e.g., first sub-mode) (e.g., first algorithm), a certain number of (e.g., 16) bits of a data line (e.g., plaintext) are encoded, based on two sets of repeated values (e.g., bytes) (e.g., any “birthday pair”). In certain examples, those number of bits (e.g., 16b/2B) recovered (e.g., removed) is for a locator value. In certain examples, the locator value includes two bits to indicate first and second block locations (e.g., 16B), e.g., first or second block (e.g., quadrant) indicated by a first bit set to 0 or 1 (e.g., respectively) of the locator value and third or fourth block (e.g., quadrant) indicated by a second bit set to 0 or 1 (e.g., respectively) of the locator value.
In certain examples, the locator value includes four bits location first in block and 3 bits of offset location of second byte in same block (e.g., can extend to wraparound or adjacent block, extending to adjacent block may give more options as these are all random bytes).
In certain examples, the locator value includes 4 bits and 3 bits for identifying bytes in second identified block (e.g., last block may wraparound to first).
In certain examples, if there are not two sets of valid repeated values (e.g., pairs that are encodable according to a format of the locator values), then set a first value of the locator value to indicate no encoding with an invalid (e.g., 16b) locator value (e.g., xFFFF). In certain examples, a memory controller circuit uses an error correction code (ECC) to correct this replaced (e.g., 16b) value as if it was corrupted data. In certain examples, the replaced original (e.g., byte) value may instead be stored in sequestered memory (e.g., data structure 126 for conflict resolution in
In certain examples, it is assumed that across all four blocks (e.g., quadrants), there are often more than 2 pairs of repeated values, e.g., even for random data (e.g., where approximately 40% of the time a byte value repeats within a quadrant). In certain examples, a memory controller circuit utilizes multiple sets of repeated values for asymmetrical encryption because on a write, the memory controller circuit (e.g., randomly) chooses a first set (e.g., first pair) of matching values for encoding, and leaves the second (or third, fourth, etc.) set of matching values for next choice, e.g., where this choice results in different/asymmetric ciphertext across writes in comparison to what was read. In certain examples, the modified data (e.g., modified plaintext) is encoded, e.g., based on the domain key to prevent controlled replay across domains by an adversary.
In certain examples, in a second mode (e.g., second sub-mode) (e.g., second algorithm), a data line (e.g., plaintext) (e.g., 64 bytes) is split into four equal sized quadrants (e.g., each of 128b/16B) and the memory controller circuit (e.g., encoding algorithm thereof) searches for the collision of values (e.g., on a single byte granularity) in the first quadrant with the second and a collision with one value (e.g., one byte) of the third quadrant with one value (e.g., one byte) of the fourth. In certain examples, the memory controller circuit is then to compress the data line by two bytes (16 bits), and is thus to use four times four bits to locate the matching bytes in the quadrants. In certain examples, the memory controller circuit is to find one matching pair on average for both bytes that encode (e.g., 16*16/2{circumflex over ( )}8). In certain examples, one location value (e.g., 0xFFFF) is taken (e.g., reserved) to indicate that there were no found matching values and would not encode. In certain examples, the one location value is reclaimed as the locator position.
In certain examples, in a third mode (e.g., third sub-mode) (e.g., third algorithm), the memory controller circuit is only to encode one pair (e.g., one byte) in one half of a data line (e.g., plaintext) (e.g., 64 bytes), for example, in one mode, both the repeated values of a single pair are required to be in the same half of a data line (e.g., and the locator value is included in that half of the data line).
In certain examples, in a fourth mode (e.g., fourth sub-mode) (e.g., fourth algorithm), the memory controller circuit is to extend the one pair encoding of the third mode across the data line (e.g., 64B cache line). In certain examples, for a single byte encoding (e.g., single byte locator value), having multiple pairs gives a choice on which pair to encode. This choice can also carry information when there are multiple alternate pairs available (e.g., encoding one pair but not knowing which half it is in, there are two possible locations). For example, always choose the highest byte value for the encoded pair in certain examples. That means, on a read, when the memory controller circuit determines there are multiple (e.g., unencoded) pairs, there are two alternative locations for the encoded byte, e.g., presuming that the correct alternate encoded location is the one with the larger byte value of the two possible locations. Certain examples herein chose to encode the pair with this property on a write. Examples herein further increase the efficiency of a single pair encoding to cover the whole data line (e.g., cache line) (e.g., to cover all four quadrants) when multiple pairs exist. In certain examples, the remaining unencoded pairs indicate to the memory controller circuit which encoded location (e.g., half) is the correct one.
In certain examples, for data not following a uniform distribution, it is assumed that the data is picked randomly for a uniform distribution of bytes, e.g., where the uniform distribution is the probability distribution leading to the smallest number of collisions. In certain examples, if the data follows any other probability distribution, e.g., like the characters in English texts, it can be expected that many collisions to occur (e.g., the space character repeats frequently). This means that the fraction of cache lines that are encodable rises for non-random data, e.g., with 98% of lines being encodable according to the examples herein, minimizing the need to access a conflict table, and avoiding any associated performance impact.
In certain examples, the memory controller circuit determines that a data line 500 includes only one set of matching values (e.g., one pair) and they are both in the first half 500A of the data line. In certain examples, such an encode is achieved with an eight bit locator, e.g., such that the first five bits of the locator indicate which of 32 different bytes within the 256 bits (e.g., 8 bits per slot×32 slots=256 bits) includes the first instance of the matching values that is still within the modified plaintext and the other three bits of the locator indicate an offset (e.g., a three bit offset) within that half (e.g., within that quadrant) of the second instance of the matching values that is removed (for example, to utilize, e.g., with shifting as discussed herein, that removed space to store the locator value 502). In certain examples, such a decode is achieved by the memory controller circuit because it detects no other pair, it uses an eight bit encode of the one pair in the first half only, e.g., and recreates the single pair in the first half using the locator value. In certain examples, a locator value is selected to indicate any split of bits for absolute or relative indexing, for example, an 8-bit locator value to cumulatively identify two different byte locations, e.g., (i) using five bits to identify a first byte and three bits to identify (e.g., an offset to) a second byte, (ii) using six bits to identify one out of 64 different bytes and two bits to identify (e.g., an offset to) a second byte (e.g., 2 bytes of relative offset to this byte), or (iii) using five bits to identify a first byte from the even (or alternatively odd) byte positions to cover the span of the 64 byte cache line while using three bits to identify (e.g. an offset to) a second byte.
In certain examples, the memory controller circuit determines that a data line 500 includes no matching values or only one set of matching values (e.g., one pair) and they are both in the second half 500B of the data line. In certain examples, such an encode is not achieved with an eight bit locator format, e.g., and the locator value field 502 indicates that the memory line address is to be used as an index into data structure 126 for conflict resolution in
In certain examples, the format of the pair encoding (e.g., and locator value) used for an encoding is the same as that used for a decoding, e.g., according to the mode.
In certain examples, an additional locator bit (e.g., 9th bit) is desired to be used, however, the removal of the single value (e.g., eight bits/byte) of a pair of repeated values only creates that amount (e.g., eight bits) of space in the modified data line (e.g., modified plain text). In certain examples, a memory controller circuit includes a mode that utilizes an additional locator bit.
In certain examples, when two or more pairs exist on a write, the additional locator bit (e.g., 9th bit) is used to deterministically locate the encoded pair by identifying which half it is located. In certain examples, the additional locator bit overlaps with more data, so the memory controller circuit is to reconstruct the original data according to a rule, for example, where the rule is if the original data bit was a one, then the largest or highest pair is encoded (e.g., larger value of the two pairs of repeated value or the pair is in the farthest/highest position from the beginning of the data line), else, the smallest or lowest pair is encoded (e.g. the smallest byte value or the pair closest to the beginning of the data line). In certain examples, if more than two pairs exist, then the encoded pair is in the top half for a one in that bit position (e.g., 9th bit) in the original data (e.g., unmodified data) versus the encoded pair in the bottom half for zero in that bit position (e.g., 9th bit) in the original data (e.g., unmodified data).
In certain examples, if multiple pairs of repeated values (e.g., a first pair having a repeated byte value of six and a second pair having a repeated byte value of zero in a pair), the additional locator bit 602 (e.g., ninth bit) determines which half of the data line (e.g., cache line) the encoded pair is located (e.g., otherwise assume single pair is in first half encoded with just an 8 bit locator). In certain examples, location within a half is determined from the first 5 bits 604 of locator value 502, which locate the repeated byte value, and a three-bit offset value 606 of the locator value 502, e.g., with wraparound within that quadrant to locate byte replaced by locator. This allows any one pair within any quadrant to be encoded.
In certain examples, a memory controller circuit (e.g., in an “additional locator bit” mode) determines that there are two pairs of matching values (e.g., a first pair with a first matching value and a second pair with a second matching value), so, as there are two or more pairs, it is to use the additional locator bit 602 (e.g., 9th bit). In certain examples, the reason two or more pairs are required to use the locator (e.g., 9th) bit is that the choice of which pair to encode is used to recover the data bit replaced by the ninth locator bit.
In certain examples, on a memory write, if the original (e.g., ninth) data bit (e.g., in the data line at position 602) is a zero, the memory controller circuit is to encode the lowest pair (e.g., the pair at the lower relative position compared to the other pair), and if that pair is in the first half of the cache line 500A, the ninth bit 602 is set to zero, else the ninth bit 602 is set to one indicating the encoded pair is in the second half of the cache line 500B, and if the original data bit is a one, the memory controller circuit is to encode the highest pair (e.g., the pair at the higher relative position) and if that encoded pair is in the first half of the cache line 500A the ninth bit 602 is set to zero, else if the highest pair is in the second half of the cache line 500B, the ninth bit 602 is set to one. In this way, the ninth bit locates which half the encoded pair is, and the original data bit replaced by the ninth bit is determined by which pair (e.g., the higher or lower location) was encoded.
In certain examples, a decode of a modified data line (e.g., modified plaintext) using the additional locator value 602 includes the memory controller circuit determining if the modified data line includes an unencoded pair of values. (e.g. a visible pair of matching byte values within the same quadrant), and thus the memory controller circuit is to presume that the additional locator value 602 is used if so, allowing the encoded pair to be located across both halves of the cache line.
In certain examples, on decode, the additional locator value 602 being set to a zero indicates to the memory controller circuit that the pair of matching (e.g., repeated) values that is encoded by the locator value 502 is within the first half of the data line. In certain examples, the memory controller circuit determines that the pair encoded by the locator value 502 and ninth bit 602 is at a lower position versus the second (e.g., unencoded) pair, and sets the bit position formerly storing the additional locator value 602 to a zero, else sets the bit to a one, e.g., to generate the original plaintext (e.g., where the memory controller circuit is further to restore the data (e.g., byte) encoded by the locator value 502.
In certain examples, if the original (e.g., ninth) data bit (e.g., in the data line) is a zero, the memory controller circuit is to encode the smallest pair (e.g., the pair at the lower relative position), and if that encoded pair is located in the second half, overwrites the data bit with one, and if the original data bit is a one, the memory controller circuit is to encode the highest pair (e.g., the pair at the higher relative position), and if that encoded pair is in the second half, overwrites the data bit with a one.
In certain examples, a decode of a modified data line (e.g., modified plaintext) using the additional locator value 602 includes the memory controller circuit determining if the modified data line includes an unencoded pair of values, (e.g. a visible pair of matching byte values within the same quadrant), and thus the memory controller circuit is to presume that the additional locator value 602 is used if so, allowing the encoded pair to be located across both halves of the cache line.
In certain examples, the additional locator value 602 being set to a one indicates to the memory controller circuit that the pair of matching (e.g., repeated) values that is encoded by the locator value 502 is within the second half of the data line. In certain examples, the memory controller circuit determines that the pair encoded by the locator value 502 is at a lower position versus the second (e.g., unencoded) pair, and sets the bit 602 formerly storing the additional locator value to a zero, else sets the bit to a one, e.g., to generate the original plaintext (e.g., where the memory controller circuit is further to restore the data (e.g., byte) encoded by the locator value 502).
Two Pairs, with One Pair in Each Half
In certain examples, if the original data bit 602 (e.g., in the data line) is a zero, the memory controller circuit is to encode the pair in the lower half (e.g., lower position) setting the ninth bit to zero, and if the original data bit is a one, the memory controller circuit is to encode the pair in the upper half (e.g., higher position), setting the ninth bit to one.
In certain examples, a decode of a modified data line (e.g., modified plaintext) using the additional locator value 602 includes the memory controller circuit determining if the modified data line includes an unencoded pair of values, e.g., and thus the memory controller circuit is to presume that the additional locator value 602 is used if so.
In certain examples, the additional locator value 602 being set to a zero indicates to the memory controller circuit that the pair of matching (e.g., repeated) values that is encoded by the locator value 502 is within the first half of the data line, and the additional locator value 602 being set to a one indicates to the memory controller circuit that the pair of matching (e.g., repeated) values that is encoded by the locator value 502 is within the second half of the data line.
In certain examples, the memory controller circuit determines that the pair encoded by the locator value 502 and additional locator (e.g., ninth) bit 602 is at lower position (e.g., lower half), and sets the bit formerly storing the additional locator value 602 to a zero, else sets the bit to a one, e.g., to generate the plaintext (e.g., where the memory controller circuit is further to restore the data (e.g., byte) encoded by the locator value 502).
In certain examples, such a formal can be extended to a data line (e.g., cache line) having three or more pairs. For example, where with more pairs, more choices can be made, e.g., if the encoded pair is in the higher half set of all pair positions, restore the additional (e.g., 9th) data bit to 1, if encoded pair in lower half set of all pair positions, restore the additional (e.g., 9th) data to 0. In certain examples, the memory controller circuit (e.g., during creation of the modified data line) can choose any pair from the higher or lower set of pair positions, e.g., where all pairs can be in the same quadrant, still half will be in higher set and half in lower set of pair positions.
In certain examples, the solution for the off-by-one problem relies on maintaining quadrants, e.g., move the quadrant with the compressed/encoded pair to the front (e.g., next to the locator which is the first byte in
In certain examples, the locator value 502 includes four bits to identify the repeated byte within a quadrant, three bits to identify the offset within the quadrant to this pair's compressed/missing byte, and 1 bit to identify which half of the data line the quadrant is located (e.g., and the optional additional locator bit (e.g., ninth bit) to identify which half if there are multiple pairs). In certain examples, where the quadrant with the encoded pair is swapped with the first quadrant position adjacent to the locator 502, the remaining quadrants maintain their positions (e.g., no bytes are shifted) and, thus, any visible pairs are valid within their respective quadrant on decode.
In certain examples, assuming all data is apparently random, if the conflict indicator in the matching pair mode (e.g., “birthday pair” mode) flow is set outside of data encryption, that will improve access control (e.g., detection of memory access using the wrong key). In certain examples, a memory lookup step can also store the correct keyID, key hash, or integrity value used to originally encrypt the stored cache line match the key currently used to access the memory line. In certain examples, if a line cannot be encoded, the data is “stamped” with this conflict indicator value. In certain examples, the indicator overwrites data, so the conflict table is used to store the original data (e.g., and in certain examples this causes a performance impact because memory is now accessed twice: once for the data line, and once to get the original data from the conflict table). Certain examples herein use the data line's (e.g., physical) address as an index into this conflict table (e.g., as an indexed array) to find the right entry. In addition to storing the data overwritten by the conflict indicator in the conflict table, certain examples also store the key ID that was used to encrypt the data (or store the key hash or an integrity hash). In certain examples that are performing these two memory operations, the values (e.g., keyID, key hash, or integrity value) can be used to check access control for the data line as well (e.g., to check if the stored key ID in the conflict table for the data line's address matches the key ID used to access the data line).
Certain examples herein (e.g., of a memory controller circuit) detect access control violations by decoding the data line and observing if the encoding rules were not followed (e.g., based on which pair was chosen to be encoded, e.g., if there were three pairs with a ninth bit algorithm on encode, either the pair in the highest or lowest position should have been encoded, but if on decode the pair in the middle position were found to be encoded, an access control violation or ciphertext corruption may be detected) or noting that the line could not be encoded in the first place, e.g., thus using a memory lookup anyway, which can also perform an access control check.
In certain examples, a data line is all zeros, and a memory controller circuit in matching pair mode (e.g., “birthday pair” mode) with an eight bit locator value allows for 255 possible encodings for an all zero line as every byte can be paired as they are all the same value (0) as well as a 100% encoding rate (and there is always a pair to encode). Randomly picking which byte pair to encode results in the different ciphertext for the same plaintext (all zeros). In certain examples, with a ninth bit algorithm, it is possible to pick from the half of pair locations corresponding to the encoding of the ninth bit, again allowing for 255 possible encodings for an all zero line resulting in 255 different possible ciphertexts. Note also, if the encrypted zero line were corrupted or read using the wrong key, it would decrypt to the random case where the access control check can be applied in certain examples. In certain examples, there is a threshold on the number of pairs (e.g., three pairs) to determine when to use access control (e.g., where it only applies to random or corrupted data, e.g., as decrypted data revealing many matching pairs is unlikely to be corrupt).
In certain examples, a modified data line (e.g., modified cache line) including a locator value is then to be encrypted, e.g., according to a key as discussed herein, and then the encrypted version of the modified data line is stored. In certain examples, an encrypted version of the modified data line is decrypted, and then the modified data line is returned by a memory controller circuit in matching pair mode (e.g., “birthday pair” mode) back to the original data line (e.g., plaintext), e.g., according to the examples (e.g., sub modes) discussed herein.
In certain examples, the modified data line (e.g., the entire data line) is encrypted by a wide block cipher (for example, a symmetric-key tweakable block cipher, e.g., the Threefish cipher). In certain examples, the memory address may also be used as a tweak. In certain examples, a wide block cipher will diffuse the change due to the alternate pair encoding across the entire memory line, and the result is completely different ciphertext for any change in the pair encoded. In certain examples, a CBC mode fully diffuses the encoding across the whole memory line. CBC mode may also include the memory line address to further localize the ciphertext. In some examples, additional bits beyond the ninth bit can be similarly encoded, e.g., when a cache line is 128 bytes long, a tenth bit may be used to determine which side of the line the encoded pair is located when 4 or more pairs are available to reconstitute the original ninth and tenth data bit values, and so on.
With multiple pairs there can be rules that also function as access control and/or integrity without requiring any additional encoding, e.g., if the rule is the highest value pair is the one encoded, then on an invalid read (e.g., using wrong key or reading a corrupted written line from memory), if the encoded byte value is lower than another encodable pair it is in violation of the rule and detected as a violation of access control and/or integrity. In certain examples of a ninth bit algorithm, if there are three pairs on encode, the rule is either the highest or lowest pair position is encoded. This means on a decode, if the middle pair position was found to be encoded, an access control violation or data corruption is detected. In certain examples, when many pairs are detected on decode, the data is assumed to be legitimate as incorrectly decrypted ciphertext should result in random decrypted data with minimal matching pairs.
In certain examples, the matching pair mode (e.g., “birthday pair” mode) is used with a key refresh, e.g., where periodically the memory encryption key is changed. In certain examples, because the matching pair mode (e.g., “birthday pair” mode) can produce numerous (e.g., 100s) of alternate ciphertexts for the same plaintext, it fills the gap between periodic key refreshes. In certain examples, when the encryption key changes, entirely new ciphertexts are produced even for the exact same plaintexts.
The operations 700 include, at block 702, retrieving a data line from memory given a particular (e.g., physical) address. The operations 700 further include, at block 704, decrypting the data line (e.g., using a specified keyID, identified key, and/or tweak). The operations 700 further include, at block 706, checking if a portion of the data line is a conflict indicator value (e.g., lookup indicator (II.)), and if yes, proceeding to block 708, and if no, proceeding to block 712. Some examples place the conflict indicator test 706 before decryption of the line 704. The operations 700 further include, at block 708, reading the conflict resolution data structure, e.g., by using the data line's address as an index into an array structure, to determine the corresponding (e.g., original) value, and substituting that correct value in place of the conflict indicator value reproducing the original data line. The operations 700 further include, at block 710, forwarding the data to a cache (e.g., cache 112 in
The operations 800 include, at block 802, receiving a data line (e.g., from a processor or processor cache) for writing to memory. The operations 800 further include, at block 804, searching the data line for encodable pairs (for example, repeated values (e.g., repeated byte), e.g., repeated within a single quadrant, for all quadrants). The operations 800 further include, at block 806, checking if there is at least one encodable pair (e.g., one set of repeated values within a quadrant), and if yes, proceeding to block 814, and if no, proceeding to block 808. The operations 800 further include, at block 808, storing an original value of the data line (e.g., value at the same location and same width as a locator value) into a data structure (e.g., conflict table indexed by the memory line address) (e.g., data structure 126 in
In certain examples, there are triplets of the same value (e.g., 3 elements (e.g., bytes) with the same value within a quadrant), and those triplets are encoded as multiple pairs, e.g., the first value and the middle value produces one locator value, and the middle value and the last value produce a different locator value becoming alternate pairs. In certain examples, the first value and the last value can be a third pair.
Some examples utilize instruction formats described herein. Some examples are implemented in one or more computer architectures, cores, accelerators, etc. Some examples are generated or are IP cores. Some examples utilize emulation and/or translation.
At least some examples of the disclosed technologies can be described in view of the following examples.
In one set of examples, an apparatus (e.g., a hardware processor) includes an execution circuitry to execute an instruction to generate a memory request to read a data line from memory; and a memory controller circuit to: decrypt the data line into a decrypted data line, determine that a field of the decrypted data line is not set to a conflict indicator value, determine a number of value collisions within the data line, and mark the data line with an error indication in response to the number of value collisions being less than a maximum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value. In certain examples, the memory controller circuit is to mark the data line with the error indication in response to the number of value collisions being greater than a minimum threshold of value collisions, the number of value collisions being less than the maximum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value. In certain examples, the memory controller circuit is to send the data line to a cache in response to the number of value collisions being less than the minimum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value. In certain examples, the memory controller circuit is to send the data line to a cache in response to the number of value collisions being greater than the maximum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value. In certain examples, the memory controller circuit is further to: determine that a field of a second data line to be read is set to a conflict indicator value; in response to the determination that the field of the second data line is set to the conflict indicator value, perform a read of conflict resolution data to determine a replacement value for the conflict indicator value in the second data line; replace the conflict indicator value in the second data line with the replacement value to generate a restored data line; and send the restored data line to a cache. In certain examples, the memory controller circuit is further to: receive a second data line for writing to the memory; determine a number of value collisions within the second data line; and insert a conflict indicator value into the second data line to generate a modified second data line in response to the number of value collisions within the second data line being greater than a minimum threshold of value collisions. In certain examples, wherein the memory controller circuit is further to: receive a second data line for writing to the memory; determine a number of value collisions within the second data line; and insert a conflict indicator value into the second data line to generate a modified second data line in response to the number of value collisions within the second data line being greater than a minimum threshold of value collisions and less than the maximum threshold of value collisions.
In another set of examples, a method includes executing, by an execution circuitry, an instruction to generate a memory request to read a data line from memory; decrypting, by a memory controller circuit, the data line into a decrypted data line; determining, by the memory controller circuit, that a field of the decrypted data line is not set to a conflict indicator value; determining, by the memory controller circuit, a number of value collisions within the data line; and marking, by the memory controller circuit, the data line with an error indication in response to the number of value collisions being less than a maximum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value. In certain examples, the marking further comprises marking, by the memory controller circuit, the data line with the error indication in response to the number of value collisions being greater than a minimum threshold of value collisions, the number of value collisions being less than the maximum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value. In certain examples, the method further comprises, sending, by the memory controller circuit, the data line to a cache in response to the number of value collisions being less than the minimum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value. In certain examples, the method further comprises sending, by the memory controller circuit, the data line to a cache in response to the number of value collisions being greater than the maximum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value. In certain examples, the method further comprises: determining, by the memory controller circuit, that a field of a second data line to be read is set to a conflict indicator value; in response to the determination that the field of the second data line is set to the conflict indicator value, performing, by the memory controller circuit, a read of conflict resolution data to determine a replacement value for the conflict indicator value in the second data line; replacing, by the memory controller circuit, the conflict indicator value in the second data line with the replacement value to generate a restored data line; and sending, by the memory controller circuit, the restored data line to a cache. In certain examples, the method further comprises: receiving, by the memory controller circuit, a second data line for writing to the memory; determining, by the memory controller circuit, a number of value collisions within the second data line; and inserting, by the memory controller circuit, a conflict indicator value into the second data line to generate a modified second data line in response to the number of value collisions within the second data line being greater than a minimum threshold of value collisions. In certain examples, the method further comprises: receiving, by the memory controller circuit, a second data line for writing to the memory; determining, by the memory controller circuit, a number of value collisions within the second data line; and inserting, by the memory controller circuit, a conflict indicator value into the second data line to generate a modified second data line in response to the number of value collisions within the second data line being greater than a minimum threshold of value collisions and less than the maximum threshold of value collisions.
In yet another set of examples, a system includes a memory; an execution circuitry to execute an instruction to generate a memory request to read a data line from the memory; and a memory controller circuit to: decrypt the data line into a decrypted data line, determine that a field of the decrypted data line is not set to a conflict indicator value, determine a number of value collisions within the data line, and mark the data line with an error indication in response to the number of value collisions being less than a maximum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value. In certain examples, the memory controller circuit is to mark the data line with the error indication in response to the number of value collisions being greater than a minimum threshold of value collisions, the number of value collisions being less than the maximum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value. In certain examples, the memory controller circuit is to send the data line to a cache in response to the number of value collisions being less than the minimum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value. In certain examples, the memory controller circuit is to send the data line to a cache in response to the number of value collisions being greater than the maximum threshold of value collisions, and the field of the decrypted data line not being set to the conflict indicator value. In certain examples, the memory controller circuit is further to: determine that a field of a second data line to be read is set to a conflict indicator value; in response to the determination that the field of the second data line is set to the conflict indicator value, perform a read of conflict resolution data to determine a replacement value for the conflict indicator value in the second data line; replace the conflict indicator value in the second data line with the replacement value to generate a restored data line; and send the restored data line to a cache. In certain examples, the memory controller circuit is further to: receive a second data line for writing to the memory; determine a number of value collisions within the second data line; and insert a conflict indicator value into the second data line to generate a modified second data line in response to the number of value collisions within the second data line being greater than a minimum threshold of value collisions. In certain examples, wherein the memory controller circuit is further to: receive a second data line for writing to the memory; determine a number of value collisions within the second data line; and insert a conflict indicator value into the second data line to generate a modified second data line in response to the number of value collisions within the second data line being greater than a minimum threshold of value collisions and less than the maximum threshold of value collisions.
Exemplary architectures, systems, etc. that the above may be used in are detailed below.
Detailed below are descriptions of example computer architectures. Other system designs and configurations known in the arts for laptop, desktop, and handheld personal computers (PC) s, personal digital assistants, engineering workstations, servers, disaggregated servers, network devices, network hubs, switches, routers, embedded processors, digital signal processors (DSPs), graphics devices, video game devices, set-top boxes, micro controllers, cell phones, portable media players, hand-held devices, and various other electronic devices, are also suitable. In general, a variety of systems or electronic devices capable of incorporating a processor and/or other execution logic as disclosed herein are generally suitable.
Processors 970 and 980 are shown including integrated memory controller (IMC) circuitry 972 and 982, respectively. Processor 970 also includes interface circuits 976 and 978; similarly, second processor 980 includes interface circuits 986 and 988. Processors 970, 980 may exchange information via the interface 950 using interface circuits 978, 988. IMCs 972 and 982 couple the processors 970, 980 to respective memories, namely a memory 932 and a memory 934, which may be portions of main memory locally attached to the respective processors.
Processors 970, 980 may each exchange information with a network interface (NW I/F) 990 via individual interfaces 952, 954 using interface circuits 976, 994, 986, 998. The network interface 990 (e.g., one or more of an interconnect, bus, and/or fabric, and in some examples is a chipset) may optionally exchange information with a coprocessor 938 via an interface circuit 992. In some examples, the coprocessor 938 is a special-purpose processor, such as, for example, a high-throughput processor, a network or communication processor, compression engine, graphics processor, general purpose graphics processing unit (GPGPU), neural-network processing unit (NPU), embedded processor, or the like.
A shared cache (not shown) may be included in either processor 970, 980 or outside of both processors, yet connected with the processors via an interface such as P-P interconnect, such that either or both processors' local cache information may be stored in the shared cache if a processor is placed into a low power mode.
Network interface 990 may be coupled to a first interface 916 via interface circuit 996. In some examples, first interface 916 may be an interface such as a Peripheral Component Interconnect (PCI) interconnect, a PCI Express interconnect or another I/O interconnect. In some examples, first interface 916 is coupled to a power control unit (PCU) 917, which may include circuitry, software, and/or firmware to perform power management operations with regard to the processors 970, 980 and/or co-processor 938. PCU 917 provides control information to a voltage regulator (not shown) to cause the voltage regulator to generate the appropriate regulated voltage. PCU 917 also provides control information to control the operating voltage generated. In various examples, PCU 917 may include a variety of power management logic units (circuitry) to perform hardware-based power management. Such power management may be wholly processor controlled (e.g., by various processor hardware, and which may be triggered by workload and/or power, thermal or other processor constraints) and/or the power management may be performed responsive to external sources (such as a platform or power management source or system software).
PCU 917 is illustrated as being present as logic separate from the processor 970 and/or processor 980. In other cases, PCU 917 may execute on a given one or more of cores (not shown) of processor 970 or 980. In some cases, PCU 917 may be implemented as a microcontroller (dedicated or general-purpose) or other control logic configured to execute its own dedicated power management code, sometimes referred to as P-code. In yet other examples, power management operations to be performed by PCU 917 may be implemented externally to a processor, such as by way of a separate power management integrated circuit (PMIC) or another component external to the processor. In yet other examples, power management operations to be performed by PCU 917 may be implemented within BIOS or other system software.
Various I/O devices 914 may be coupled to first interface 916, along with a bus bridge 918 which couples first interface 916 to a second interface 920. In some examples, one or more additional processor(s) 915, such as coprocessors, high throughput many integrated core (MIC) processors, GPGPUs, accelerators (such as graphics accelerators or digital signal processing (DSP) units), field programmable gate arrays (FPGAs), or any other processor, are coupled to first interface 916. In some examples, second interface 920 may be a low pin count (LPC) interface. Various devices may be coupled to second interface 920 including, for example, a keyboard and/or mouse 922, communication devices 927 and storage circuitry 928. Storage circuitry 928 may be one or more non-transitory machine-readable storage media as described below, such as a disk drive or other mass storage device which may include instructions/code and data 930 and may implement instruction storage in some examples. Further, an audio I/O 924 may be coupled to second interface 920. Note that other architectures than the point-to-point architecture described above are possible. For example, instead of the point-to-point architecture, a system such as multiprocessor system 900 may implement a multi-drop interface or other such architecture.
Processor cores may be implemented in different ways, for different purposes, and in different processors. For instance, implementations of such cores may include: 1) a general purpose in-order core intended for general-purpose computing; 2) a high-performance general purpose out-of-order core intended for general-purpose computing; 3) a special purpose core intended primarily for graphics and/or scientific (throughput) computing. Implementations of different processors may include: 1) a CPU including one or more general purpose in-order cores intended for general-purpose computing and/or one or more general purpose out-of-order cores intended for general-purpose computing; and 2) a coprocessor including one or more special purpose cores intended primarily for graphics and/or scientific (throughput) computing. Such different processors lead to different computer system architectures, which may include: 1) the coprocessor on a separate chip from the CPU; 2) the coprocessor on a separate die in the same package as a CPU; 3) the coprocessor on the same die as a CPU (in which case, such a coprocessor is sometimes referred to as special purpose logic, such as integrated graphics and/or scientific (throughput) logic, or as special purpose cores); and 4) a system on a chip (SoC) that may be included on the same die as the described CPU (sometimes referred to as the application core(s) or application processor(s)), the above described coprocessor, and additional functionality. Example core architectures are described next, followed by descriptions of example processors and computer architectures.
Thus, different implementations of the processor 1000 may include: 1) a CPU with the special purpose logic 1008 being integrated graphics and/or scientific (throughput) logic (which may include one or more cores, not shown), and the cores 1002(A)-(N) being one or more general purpose cores (e.g., general purpose in-order cores, general purpose out-of-order cores, or a combination of the two); 2) a coprocessor with the cores 1002(A)-(N) being a large number of special purpose cores intended primarily for graphics and/or scientific (throughput); and 3) a coprocessor with the cores 1002(A)-(N) being a large number of general purpose in-order cores. Thus, the processor 1000 may be a general-purpose processor, coprocessor or special-purpose processor, such as, for example, a network or communication processor, compression engine, graphics processor, GPGPU (general purpose graphics processing unit), a high throughput many integrated core (MIC) coprocessor (including 30 or more cores), embedded processor, or the like. The processor may be implemented on one or more chips. The processor 1000 may be a part of and/or may be implemented on one or more substrates using any of a number of process technologies, such as, for example, complementary metal oxide semiconductor (CMOS), bipolar CMOS (BiCMOS), P-type metal oxide semiconductor (PMOS), or N-type metal oxide semiconductor (NMOS).
A memory hierarchy includes one or more levels of cache unit(s) circuitry 1004(A)-(N) within the cores 1002(A)-(N), a set of one or more shared cache unit(s) circuitry 1006, and external memory (not shown) coupled to the set of integrated memory controller unit(s) circuitry 1014. The set of one or more shared cache unit(s) circuitry 1006 may include one or more mid-level caches, such as level 2 (L2), level 3 (L3), level 4 (L4), or other levels of cache, such as a last level cache (LLC), and/or combinations thereof. While in some examples interface network circuitry 1012 (e.g., a ring interconnect) interfaces the special purpose logic 1008 (e.g., integrated graphics logic), the set of shared cache unit(s) circuitry 1006, and the system agent unit circuitry 1010, alternative examples use any number of well-known techniques for interfacing such units. In some examples, coherency is maintained between one or more of the shared cache unit(s) circuitry 1006 and cores 1002(A)-(N). In some examples, interface controller units circuitry 1016 couple the cores 1002 to one or more other devices 1018 such as one or more I/O devices, storage, one or more communication devices (e.g., wireless networking, wired networking, etc.), etc.
In some examples, one or more of the cores 1002(A)-(N) are capable of multi-threading. The system agent unit circuitry 1010 includes those components coordinating and operating cores 1002(A)-(N). The system agent unit circuitry 1010 may include, for example, power control unit (PCU) circuitry and/or display unit circuitry (not shown). The PCU may be or may include logic and components needed for regulating the power state of the cores 1002(A)-(N) and/or the special purpose logic 1008 (e.g., integrated graphics logic). The display unit circuitry is for driving one or more externally connected displays.
The cores 1002(A)-(N) may be homogenous in terms of instruction set architecture (ISA). Alternatively, the cores 1002(A)-(N) may be heterogeneous in terms of ISA; that is, a subset of the cores 1002(A)-(N) may be capable of executing an ISA, while other cores may be capable of executing only a subset of that ISA or another ISA.
The processing subsystem 1101, for example, includes one or more parallel processor(s) 1112 coupled to memory hub 1105 via a bus or other communication link 1113. The communication link 1113 may be one of any number of standards-based communication link technologies or protocols, such as, but not limited to PCI Express, or may be a vendor specific communications interface or communications fabric. The one or more parallel processor(s) 1112 may form a computationally focused parallel or vector processing system that can include a large number of processing cores and/or processing clusters, such as a many integrated core (MIC) processor. For example, the one or more parallel processor(s) 1112 form a graphics processing subsystem that can output pixels to one of the one or more display device(s) 1110A coupled via the I/O hub 1107. The one or more parallel processor(s) 1112 can also include a display controller and display interface (not shown) to enable a direct connection to one or more display device(s) 1110B.
Within the I/O subsystem 1111, a system storage unit 1114 can connect to the I/O hub 1107 to provide a storage mechanism for the computing system 1100. An I/O switch 1116 can be used to provide an interface mechanism to enable connections between the I/O hub 1107 and other components, such as a network adapter 1118 and/or wireless network adapter 1119 that may be integrated into the platform, and various other devices that can be added via one or more add-in device(s) 1120. The add-in device(s) 1120 may also include, for example, one or more external graphics processor devices, graphics cards, and/or compute accelerators. The network adapter 1118 can be an Ethernet adapter or another wired network adapter. The wireless network adapter 1119 can include one or more of a Wi-Fi, Bluetooth, near field communication (NFC), or other network device that includes one or more wireless radios.
The computing system 1100 can include other components not explicitly shown, including USB or other port connections, optical storage drives, video capture devices, and the like, which may also be connected to the I/O hub 1107. Communication paths interconnecting the various components in
The one or more parallel processor(s) 1112 may incorporate circuitry optimized for graphics and video processing, including, for example, video output circuitry, and constitutes a graphics processing unit (GPU). Alternatively or additionally, the one or more parallel processor(s) 1112 can incorporate circuitry optimized for general purpose processing, while preserving the underlying computational architecture, described in greater detail herein. Components of the computing system 1100 may be integrated with one or more other system elements on a single integrated circuit. For example, the one or more parallel processor(s) 1112, memory hub 1105, processor(s) 1102, and I/O hub 1107 can be integrated into a system on chip (SoC) integrated circuit. Alternatively, the components of the computing system 1100 can be integrated into a single package to form a system in package (SIP) configuration. In some examples at least a portion of the components of the computing system 1100 can be integrated into a multi-chip module (MCM), which can be interconnected with other multi-chip modules into a modular computing system.
It will be appreciated that the computing system 1100 shown herein is illustrative and that variations and modifications are possible. The connection topology, including the number and arrangement of bridges, the number of processor(s) 1102, and the number of parallel processor(s) 1112, may be modified as desired. For instance, system memory 1104 can be connected to the processor(s) 1102 directly rather than through a bridge, while other devices communicate with system memory 1104 via the memory hub 1105 and the processor(s) 1102. In other alternative topologies, the parallel processor(s) 1112 are connected to the I/O hub 1107 or directly to one of the one or more processor(s) 1102, rather than to the memory hub 1105. In other examples, the I/O hub 1107 and memory hub 1105 may be integrated into a single chip. It is also possible that two or more sets of processor(s) 1102 are attached via multiple sockets, which can couple with two or more instances of the parallel processor(s) 1112.
Some of the particular components shown herein are optional and may not be included in all implementations of the computing system 1100. For example, any number of add-in cards or peripherals may be supported, or some components may be eliminated. Furthermore, some architectures may use different terminology for components similar to those illustrated in
The parallel processor 1200 includes a parallel processing unit 1202. The parallel processing unit includes an I/O unit 1204 that enables communication with other devices, including other instances of the parallel processing unit 1202. The I/O unit 1204 may be directly connected to other devices. For instance, the I/O unit 1204 connects with other devices via the use of a hub or switch interface, such as memory hub 1105. The connections between the memory hub 1105 and the I/O unit 1204 form a communication link 1113. Within the parallel processing unit 1202, the I/O unit 1204 connects with a host interface 1206 and a memory crossbar 1216, where the host interface 1206 receives commands directed to performing processing operations and the memory crossbar 1216 receives commands directed to performing memory operations.
When the host interface 1206 receives a command buffer via the I/O unit 1204, the host interface 1206 can direct work operations to perform those commands to a front end 1208. In some examples the front end 1208 couples with a scheduler 1210, which is configured to distribute commands or other work items to a processing cluster array 1212. The scheduler 1210 ensures that the processing cluster array 1212 is properly configured and in a valid state before tasks are distributed to the processing clusters of the processing cluster array 1212. The scheduler 1210 may be implemented via firmware logic executing on a microcontroller. The microcontroller implemented scheduler 1210 is configurable to perform complex scheduling and work distribution operations at coarse and fine granularity, enabling rapid preemption and context switching of threads executing on the processing cluster array 1212. Preferably, the host software can prove workloads for scheduling on the processing cluster array 1212 via one of multiple graphics processing doorbells. In other examples, polling for new workloads or interrupts can be used to identify or indicate availability of work to perform. The workloads can then be automatically distributed across the processing cluster array 1212 by the scheduler 1210 logic within the scheduler microcontroller.
The processing cluster array 1212 can include up to “N” processing clusters (e.g., cluster 1214A, cluster 1214B, through cluster 1214N). Each cluster 1214A-1214N of the processing cluster array 1212 can execute a large number of concurrent threads. The scheduler 1210 can allocate work to the clusters 1214A-1214N of the processing cluster array 1212 using various scheduling and/or work distribution algorithms, which may vary depending on the workload arising for each type of program or computation. The scheduling can be handled dynamically by the scheduler 1210 or can be assisted in part by compiler logic during compilation of program logic configured for execution by the processing cluster array 1212. Optionally, different clusters 1214A-1214N of the processing cluster array 1212 can be allocated for processing different types of programs or for performing different types of computations.
The processing cluster array 1212 can be configured to perform various types of parallel processing operations. For example, the processing cluster array 1212 is configured to perform general-purpose parallel compute operations. For example, the processing cluster array 1212 can include logic to execute processing tasks including filtering of video and/or audio data, performing modeling operations, including physics operations, and performing data transformations.
The processing cluster array 1212 is configured to perform parallel graphics processing operations. In such examples in which the parallel processor 1200 is configured to perform graphics processing operations, the processing cluster array 1212 can include additional logic to support the execution of such graphics processing operations, including, but not limited to texture sampling logic to perform texture operations, as well as tessellation logic and other vertex processing logic. Additionally, the processing cluster array 1212 can be configured to execute graphics processing related shader programs such as, but not limited to vertex shaders, tessellation shaders, geometry shaders, and pixel shaders. The parallel processing unit 1202 can transfer data from system memory via the I/O unit 1204 for processing. The transferred data can be stored to on-chip memory (e.g., parallel processor memory 1222) during processing, then written back to system memory.
In examples in which the parallel processing unit 1202 is used to perform graphics processing, the scheduler 1210 may be configured to divide the processing workload into approximately equal sized tasks, to better enable distribution of the graphics processing operations to multiple clusters 1214A-1214N of the processing cluster array 1212. In some of these examples, portions of the processing cluster array 1212 can be configured to perform different types of processing. For example, a first portion may be configured to perform vertex shading and topology generation, a second portion may be configured to perform tessellation and geometry shading, and a third portion may be configured to perform pixel shading or other screen space operations, to produce a rendered image for display. Intermediate data produced by one or more of the clusters 1214A-1214N may be stored in buffers to allow the intermediate data to be transmitted between clusters 1214A-1214N for further processing.
During operation, the processing cluster array 1212 can receive processing tasks to be executed via the scheduler 1210, which receives commands defining processing tasks from front end 1208. For graphics processing operations, processing tasks can include indices of data to be processed, e.g., surface (patch) data, primitive data, vertex data, and/or pixel data, as well as state parameters and commands defining how the data is to be processed (e.g., what program is to be executed). The scheduler 1210 may be configured to fetch the indices corresponding to the tasks or may receive the indices from the front end 1208. The front end 1208 can be configured to ensure the processing cluster array 1212 is configured to a valid state before the workload specified by incoming command buffers (e.g., batch-buffers, push buffers, etc.) is initiated.
Each of the one or more instances of the parallel processing unit 1202 can couple with parallel processor memory 1222. The parallel processor memory 1222 can be accessed via the memory crossbar 1216, which can receive memory requests from the processing cluster array 1212 as well as the I/O unit 1204. The memory crossbar 1216 can access the parallel processor memory 1222 via a memory interface 1218. The memory interface 1218 can include multiple partition units (e.g., partition unit 1220A, partition unit 1220B, through partition unit 1220N) that can each couple to a portion (e.g., memory unit) of parallel processor memory 1222. The number of partition units 1220A-1220N may be configured to be equal to the number of memory units, such that a first partition unit 1220A has a corresponding first memory unit 1224A, a second partition unit 1220B has a corresponding second memory unit 1224B, and an Nth partition unit 1220N has a corresponding Nth memory unit 1224N. In other examples, the number of partition units 1220A-1220N may not be equal to the number of memory devices.
The memory units 1224A-1224N can include various types of memory devices, including dynamic random-access memory (DRAM) or graphics random access memory, such as synchronous graphics random access memory (SGRAM), including graphics double data rate (GDDR) memory. Optionally, the memory units 1224A-1224N may also include 3D stacked memory, including but not limited to high bandwidth memory (HBM). Persons skilled in the art will appreciate that the specific implementation of the memory units 1224A-1224N can vary and can be selected from one of various conventional designs. Render targets, such as frame buffers or texture maps may be stored across the memory units 1224A-1224N, allowing partition units 1220A-1220N to write portions of each render target in parallel to efficiently use the available bandwidth of parallel processor memory 1222. In some examples, a local instance of the parallel processor memory 1222 may be excluded in favor of a unified memory design that utilizes system memory in conjunction with local cache memory.
Optionally, any one of the clusters 1214A-1214N of the processing cluster array 1212 has the ability to process data that will be written to any of the memory units 1224A-1224N within parallel processor memory 1222. The memory crossbar 1216 can be configured to transfer the output of each cluster 1214A-1214N to any partition unit 1220A-1220N or to another cluster 1214A-1214N, which can perform additional processing operations on the output. Each cluster 1214A-1214N can communicate with the memory interface 1218 through the memory crossbar 1216 to read from or write to various external memory devices. In one of the examples with the memory crossbar 1216 the memory crossbar 1216 has a connection to the memory interface 1218 to communicate with the I/O unit 1204, as well as a connection to a local instance of the parallel processor memory 1222, enabling the processing units within the different processing clusters 1214A-1214N to communicate with system memory or other memory that is not local to the parallel processing unit 1202. Generally, the memory crossbar 1216 may, for example, be able to use virtual channels to separate traffic streams between the clusters 1214A-1214N and the partition units 1220A-1220N.
While a single instance of the parallel processing unit 1202 is illustrated within the parallel processor 1200, any number of instances of the parallel processing unit 1202 can be included. For example, multiple instances of the parallel processing unit 1202 can be provided on a single add-in card, or multiple add-in cards can be interconnected. For example, the parallel processor 1200 can be an add-in device, such as add-in device 1120 of
In some examples, the parallel processing unit 1202 can be partitioned into multiple instances. Those multiple instances can be configured to execute workloads associated with different clients in an isolated manner, enabling a pre-determined quality of service to be provided for each client. For example, each cluster 1214A-1214N can be compartmentalized and isolated from other clusters, allowing the processing cluster array 1212 to be divided into multiple compute partitions or instances. In such configuration, workloads that execute on an isolated partition are protected from faults or errors associated with a different workload that executes on a different partition. The partition units 1220A-1220N can be configured to enable a dedicated and/or isolated path to memory for the clusters 1214A-1214N associated with the respective compute partitions. This datapath isolation enables the compute resources within a partition can communicate with one or more assigned memory units 1224A-1224N without being subjected to inference by the activities of other partitions.
In graphics applications, the ROP 1226 is a processing unit that performs raster operations such as stencil, z test, blending, and the like. The ROP 1226 then outputs processed graphics data that is stored in graphics memory. In some examples the ROP 1226 includes or couples with a CODEC 1227 that includes compression logic to compress depth or color data that is written to memory or the L2 cache 1221 and decompress depth or color data that is read from memory or the L2 cache 1221. The compression logic can be lossless compression logic that makes use of one or more of multiple compression algorithms. The type of compression that is performed by the CODEC 1227 can vary based on the statistical characteristics of the data to be compressed. For example, in some examples, delta color compression is performed on depth and color data on a per-tile basis. In some examples the CODEC 1227 includes compression and decompression logic that can compress and decompress compute data associated with machine learning operations. The CODEC 1227 can, for example, compress sparse matrix data for sparse machine learning operations. The CODEC 1227 can also compress sparse matrix data that is encoded in a sparse matrix format (e.g., coordinate list encoding (COO), compressed sparse row (CSR), compress sparse column (CSC), etc.) to generate compressed and encoded sparse matrix data. The compressed and encoded sparse matrix data can be decompressed and/or decoded before being processed by processing elements or the processing elements can be configured to consume compressed, encoded, or compressed and encoded data for processing.
The ROP 1226 may be included within each processing cluster (e.g., cluster 1214A-1214N of
Operation of the processing cluster 1214 can be controlled via a pipeline manager 1232 that distributes processing tasks to SIMT parallel processors. The pipeline manager 1232 receives instructions from the scheduler 1210 of
Each graphics multiprocessor 1234 within the processing cluster 1214 can include an identical set of functional execution logic (e.g., arithmetic logic units, load-store units, etc.). The functional execution logic can be configured in a pipelined manner in which new instructions can be issued before previous instructions are complete. The functional execution logic supports a variety of operations including integer and floating-point arithmetic, comparison operations. Boolean operations, bit-shifting, and computation of various algebraic functions. The same functional-unit hardware could be leveraged to perform different operations and any combination of functional units may be present.
The instructions transmitted to the processing cluster 1214 constitute a thread. A set of threads executing across the set of parallel processing engines is a thread group. A thread group executes the same program on different input data. Each thread within a thread group can be assigned to a different processing engine within a graphics multiprocessor 1234. A thread group may include fewer threads than the number of processing engines within the graphics multiprocessor 1234. When a thread group includes fewer threads than the number of processing engines, one or more of the processing engines may be idle during cycles in which that thread group is being processed. A thread group may also include more threads than the number of processing engines within the graphics multiprocessor 1234. When the thread group includes more threads than the number of processing engines within the graphics multiprocessor 1234, processing can be performed over consecutive clock cycles. Optionally, multiple thread groups can be executed concurrently on the graphics multiprocessor 1234.
The graphics multiprocessor 1234 may include an internal cache memory to perform load and store operations. Optionally, the graphics multiprocessor 1234 can forego an internal cache and use a cache memory (e.g., level 1 (L1) cache 1248) within the processing cluster 1214. Each graphics multiprocessor 1234 also has access to level 2 (L2) caches within the partition units (e.g., partition units 1220A-1220N of
Each processing cluster 1214 may include an MMU 1245 (memory management unit) that is configured to map virtual addresses into physical addresses. In other examples, one or more instances of the MMU 1245 may reside within the memory interface 1218 of
In graphics and computing applications, a processing cluster 1214 may be configured such that each graphics multiprocessor 1234 is coupled to a texture unit 1236 for performing texture mapping operations, e.g., determining texture sample positions, reading texture data, and filtering the texture data. Texture data is read from an internal texture L1 cache (not shown) or in some examples from the L1 cache within graphics multiprocessor 1234 and is fetched from an L2 cache, local parallel processor memory, or system memory, as needed. Each graphics multiprocessor 1234 outputs processed tasks to the data crossbar 1240 to provide the processed task to another processing cluster 1214 for further processing or to store the processed task in an L2 cache, local parallel processor memory, or system memory via the memory crossbar 1216. A preROP 1242 (pre-raster operations unit) is configured to receive data from graphics multiprocessor 1234, direct data to ROP units, which may be located with partition units as described herein (e.g., partition units 1220A-1220N of
It will be appreciated that the core architecture described herein is illustrative and that variations and modifications are possible. Any number of processing units, e.g., graphics multiprocessor 1234, texture units 1236, preROPs 1242, etc., may be included within a processing cluster 1214. Further, while only one processing cluster 1214 is shown, a parallel processing unit as described herein may include any number of instances of the processing cluster 1214. Optionally, each processing cluster 1214 can be configured to operate independently of other processing clusters 1214 using separate and distinct processing units, L1 caches, L2 caches, etc.
The instruction cache 1252 may receive a stream of instructions to execute from the pipeline manager 1232. The instructions are cached in the instruction cache 1252 and dispatched for execution by the instruction unit 1254. The instruction unit 1254 can dispatch instructions as thread groups (e.g., warps), with each thread of the thread group assigned to a different execution unit within GPGPU core 1262. An instruction can access any of a local, shared, or global address space by specifying an address within a unified address space. The address mapping unit 1256 can be used to translate addresses in the unified address space into a distinct memory address that can be accessed by the load/store units 1266.
The register file 1258 provides a set of registers for the functional units of the graphics multiprocessor 1234. The register file 1258 provides temporary storage for operands connected to the data paths of the functional units (e.g., GPGPU cores 1262, load/store units 1266) of the graphics multiprocessor 1234. The register file 1258 may be divided between each of the functional units such that each functional unit is allocated a dedicated portion of the register file 1258. For example, the register file 1258 may be divided between the different warps being executed by the graphics multiprocessor 1234.
The GPGPU cores 1262 can each include floating point units (FPUs) and/or integer arithmetic logic units (ALUs) that are used to execute instructions of the graphics multiprocessor 1234. In some implementations, the GPGPU cores 1262 can include hardware logic that may otherwise reside within the tensor and/or ray-tracing cores 1263. The GPGPU cores 1262 can be similar in architecture or can differ in architecture. For example and in some examples, a first portion of the GPGPU cores 1262 include a single precision FPU and an integer ALU while a second portion of the GPGPU cores include a double precision FPU. Optionally, the FPUs can implement the IEEE 754-2008 standard for floating point arithmetic or enable variable precision floating point arithmetic. The graphics multiprocessor 1234 can additionally include one or more fixed function or special function units to perform specific functions such as copy rectangle or pixel blending operations. One or more of the GPGPU cores can also include fixed or special function logic.
The GPGPU cores 1262 may include SIMD logic capable of performing a single instruction on multiple sets of data. Optionally, GPGPU cores 1262 can physically execute SIMD4, SIMD8, and SIMD16 instructions and logically execute SIMD1, SIMD2, and SIMD32 instructions. The SIMD instructions for the GPGPU cores can be generated at compile time by a shader compiler or automatically generated when executing programs written and compiled for single program multiple data (SPMD) or SIMT architectures. Multiple threads of a program configured for the SIMT execution model can be executed via a single SIMD instruction. For example and in some examples, eight SIMT threads that perform the same or similar operations can be executed in parallel via a single SIMD8 logic unit.
The memory and cache interconnect 1268 is an interconnect network that connects each of the functional units of the graphics multiprocessor 1234 to the register file 1258 and to the shared memory 1270. For example, the memory and cache interconnect 1268 is a crossbar interconnect that allows the load/store unit 1266 to implement load and store operations between the shared memory 1270 and the register file 1258. The register file 1258 can operate at the same frequency as the GPGPU cores 1262, thus data transfer between the GPGPU cores 1262 and the register file 1258 is very low latency. The shared memory 1270 can be used to enable communication between threads that execute on the functional units within the graphics multiprocessor 1234. The cache memory 1272 can be used as a data cache for example, to cache texture data communicated between the functional units and the texture unit 1236. The shared memory 1270 can also be used as a program managed cached. The shared memory 1270 and the cache memory 1272 can couple with the data crossbar 1240 to enable communication with other components of the processing cluster. Threads executing on the GPGPU cores 1262 can programmatically store data within the shared memory in addition to the automatically cached data that is stored within the cache memory 1272.
The graphics multiprocessor 1325 of
The various components can communicate via an interconnect fabric 1327. The interconnect fabric 1327 may include one or more crossbar switches to enable communication between the various components of the graphics multiprocessor 1325. The interconnect fabric 1327 may be a separate, high-speed network fabric layer upon which each component of the graphics multiprocessor 1325 is stacked. The components of the graphics multiprocessor 1325 communicate with remote components via the interconnect fabric 1327. For example, the cores 1336A-1336B, 1337A-1337B, and 1338A-1338B can each communicate with shared memory 1346 via the interconnect fabric 1327. The interconnect fabric 1327 can arbitrate communication within the graphics multiprocessor 1325 to ensure a fair bandwidth allocation between components.
The graphics multiprocessor 1350 of
Persons skilled in the art will understand that the architecture described in
The parallel processor or GPGPU as described herein may be communicatively coupled to host/processor cores to accelerate graphics operations, machine-learning operations, pattern analysis operations, and various general-purpose GPU (GPGPU) functions. The GPU may be communicatively coupled to the host processor/cores over a bus or other interconnect (e.g., a high-speed interconnect such as PCIe, NVLink, or other known protocols, standardized protocols, or proprietary protocols). In other examples, the GPU may be integrated on the same package or chip as the cores and communicatively coupled to the cores over an internal processor bus/interconnect (i.e., internal to the package or chip). Regardless of the manner in which the GPU is connected, the processor cores may allocate work to the GPU in the form of sequences of commands/instructions contained in a work descriptor. The GPU then uses dedicated circuitry/logic for efficiently processing these commands/instructions.
As illustrated, a multi-core group 1365A may include a set of graphics cores 1370, a set of tensor cores 1371, and a set of ray tracing cores 1372. A scheduler/dispatcher 1368 schedules and dispatches the graphics threads for execution on the various cores 1370, 1371, 1372. A set of register files 1369 store operand values used by the cores 1370, 1371, 1372 when executing the graphics threads. These may include, for example, integer registers for storing integer values, floating point registers for storing floating point values, vector registers for storing packed data elements (integer and/or floating-point data elements) and tile registers for storing tensor/matrix values. The tile registers may be implemented as combined sets of vector registers.
One or more combined level 1 (L1) caches and shared memory units 1373 store graphics data such as texture data, vertex data, pixel data, ray data, bounding volume data, etc., locally within each multi-core group 1365A. One or more texture units 1374 can also be used to perform texturing operations, such as texture mapping and sampling. A Level 2 (L2) cache 1375 shared by all or a subset of the multi-core groups 1365A-1365N stores graphics data and/or instructions for multiple concurrent graphics threads. As illustrated, the L2 cache 1375 may be shared across a plurality of multi-core groups 1365A-1365N. One or more memory controllers 1367 couple the GPU 1380 to a memory 1366 which may be a system memory (e.g., DRAM) and/or a dedicated graphics memory (e.g., GDDR6 memory).
Input/output (I/O) circuitry 1363 couples the GPU 1380 to one or more I/O devices 1362 such as digital signal processors (DSPs), network controllers, or user input devices. An on-chip interconnect may be used to couple the I/O devices 1362 to the GPU 1380 and memory 1366. One or more I/O memory management units (IOMMUs) 1364 of the I/O circuitry 1363 couple the I/O devices 1362 directly to the system memory 1366. Optionally, the IOMMU 1364 manages multiple sets of page tables to map virtual addresses to physical addresses in system memory 1366. The I/O devices 1362, CPU(s) 1361, and GPU(s) 1380 may then share the same virtual address space.
In one implementation of the IOMMU 1364, the IOMMU 1364 supports virtualization. In this case, it may manage a first set of page tables to map guest/graphics virtual addresses to guest/graphics physical addresses and a second set of page tables to map the guest/graphics physical addresses to system/host physical addresses (e.g., within system memory 1366). The base addresses of each of the first and second sets of page tables may be stored in control registers and swapped out on a context switch (e.g., so that the new context is provided with access to the relevant set of page tables). While not illustrated in
The CPU(s) 1361, GPUs 1380, and I/O devices 1362 may be integrated on a single semiconductor chip and/or chip package. The illustrated memory 1366 may be integrated on the same chip or may be coupled to the memory controllers 1367 via an off-chip interface. In one implementation, the memory 1366 comprises GDDR6 memory which shares the same virtual address space as other physical system-level memories, although the underlying principles described herein are not limited to this specific implementation.
The tensor cores 1371 may include a plurality of execution units specifically designed to perform matrix operations, which are the fundamental compute operation used to perform deep learning operations. For example, simultaneous matrix multiplication operations may be used for neural network training and inferencing. The tensor cores 1371 may perform matrix processing using a variety of operand precisions including single precision floating-point (e.g., 32 bits), half-precision floating point (e.g., 16 bits), integer words (16 bits), bytes (8 bits), and half-bytes (4 bits). For example, a neural network implementation extracts features of each rendered scene, potentially combining details from multiple frames, to construct a high-quality final image.
In deep learning implementations, parallel matrix multiplication work may be scheduled for execution on the tensor cores 1371. The training of neural networks, in particular, requires a significant number of matrix dot product operations. In order to process an inner-product formulation of an N×N×N matrix multiply, the tensor cores 1371 may include at least N dot-product processing elements. Before the matrix multiply begins, one entire matrix is loaded into tile registers and at least one column of a second matrix is loaded each cycle for N cycles. Each cycle, there are N dot products that are processed.
Matrix elements may be stored at different precisions depending on the particular implementation, including 16-bit words, 8-bit bytes (e.g., INT8) and 4-bit half-bytes (e.g., INT4). Different precision modes may be specified for the tensor cores 1371 to ensure that the most efficient precision is used for different workloads (e.g., such as inferencing workloads which can tolerate quantization to bytes and half-bytes). Supported formats additionally include 64-bit floating point (FP64) and non-IEEE floating point formats such as the bfloat16 format (e.g., Brain floating point), a 16-bit floating point format with one sign bit, eight exponent bits, and eight significand bits, of which seven are explicitly stored. One example includes support for a reduced precision tensor-float (TF32) mode, which performs computations using the range of FP32 (8-bits) and the precision of FP16 (10-bits). Reduced precision TF32 operations can be performed on FP32 inputs and produce FP32 outputs at higher performance relative to FP32 and increased precision relative to FP16. In some examples, one or more 8-bit floating point formats (FP8) are supported.
In some examples the tensor cores 1371 support a sparse mode of operation for matrices in which the vast majority of values are zero. The tensor cores 1371 include support for sparse input matrices that are encoded in a sparse matrix representation (e.g., coordinate list encoding (COO), compressed sparse row (CSR), compress sparse column (CSC), etc.). The tensor cores 1371 also include support for compressed sparse matrix representations in the event that the sparse matrix representation may be further compressed. Compressed, encoded, and/or compressed and encoded matrix data, along with associated compression and/or encoding metadata, can be read by the tensor cores 1371 and the non-zero values can be extracted. For example, for a given input matrix A, a non-zero value can be loaded from the compressed and/or encoded representation of at least a portion of matrix A. Based on the location in matrix A for the non-zero value, which may be determined from index or coordinate metadata associated with the non-zero value, a corresponding value in input matrix B may be loaded. Depending on the operation to be performed (e.g., multiply), the load of the value from input matrix B may be bypassed if the corresponding value is a zero value. In some examples, the pairings of values for certain operations, such as multiply operations, may be pre-scanned by scheduler logic and only operations between non-zero inputs are scheduled. Depending on the dimensions of matrix A and matrix B and the operation to be performed, output matrix C may be dense or sparse. Where output matrix C is sparse and depending on the configuration of the tensor cores 1371, output matrix C may be output in a compressed format, a sparse encoding, or a compressed sparse encoding.
The ray tracing cores 1372 may accelerate ray tracing operations for both real-time ray tracing and non-real-time ray tracing implementations. In particular, the ray tracing cores 1372 may include ray traversal/intersection circuitry for performing ray traversal using bounding volume hierarchies (BVHs) and identifying intersections between rays and primitives enclosed within the BVH volumes. The ray tracing cores 1372 may also include circuitry for performing depth testing and culling (e.g., using a Z buffer or similar arrangement). In one implementation, the ray tracing cores 1372 perform traversal and intersection operations in concert with the image denoising techniques described herein, at least a portion of which may be executed on the tensor cores 1371. For example, the tensor cores 1371 may implement a deep learning neural network to perform denoising of frames generated by the ray tracing cores 1372. However, the CPU(s) 1361, graphics cores 1370, and/or ray tracing cores 1372 may also implement all or a portion of the denoising and/or deep learning algorithms.
In addition, as described above, a distributed approach to denoising may be employed in which the GPU 1380 is in a computing device coupled to other computing devices over a network or high-speed interconnect. In this distributed approach, the interconnected computing devices may share neural network learning/training data to improve the speed with which the overall system learns to perform denoising for different types of image frames and/or different graphics applications.
The ray tracing cores 1372 may process all BVH traversal and/or ray-primitive intersections, saving the graphics cores 1370 from being overloaded with thousands of instructions per ray. For example. each ray tracing core 1372 includes a first set of specialized circuitry for performing bounding box tests (e.g., for traversal operations) and/or a second set of specialized circuitry for performing the ray-triangle intersection tests (e.g., intersecting rays which have been traversed). Thus, for example, the multi-core group 1365A can simply launch a ray probe, and the ray tracing cores 1372 independently perform ray traversal and intersection and return hit data (e.g., a hit, no hit, multiple hits, etc.) to the thread context. The other cores 1370, 1371 are freed to perform other graphics or compute work while the ray tracing cores 1372 perform the traversal and intersection operations.
Optionally, each ray tracing core 1372 may include a traversal unit to perform BVH testing operations and/or an intersection unit which performs ray-primitive intersection tests. The intersection unit generates a “hit”, “no hit”, or “multiple hit” response, which it provides to the appropriate thread. During the traversal and intersection operations, the execution resources of the other cores (e.g., graphics cores 1370 and tensor cores 1371) are freed to perform other forms of graphics work.
In some examples described below, a hybrid rasterization/ray tracing approach is used in which work is distributed between the graphics cores 1370 and ray tracing cores 1372.
The ray tracing cores 1372 (and/or other cores 1370, 1371) may include hardware support for a ray tracing instruction set such as Microsoft's DirectX Ray Tracing (DXR) which includes a DispatchRays command, as well as ray-generation, closest-hit, any-hit, and miss shaders, which enable the assignment of unique sets of shaders and textures for each object. Another ray tracing platform which may be supported by the ray tracing cores 1372, graphics cores 1370 and tensor cores 1371 is Vulkan API (e.g., Vulkan version 1.1.85 and later). Note, however, that the underlying principles described herein are not limited to any particular ray tracing ISA.
In general, the various cores 1372, 1371, 1370 may support a ray tracing instruction set that includes instructions/functions for one or more of ray generation, closest hit, any hit, ray-primitive intersection, per-primitive and hierarchical bounding box construction, miss, visit, and exceptions. More specifically, some examples includes ray tracing instructions to perform one or more of the following functions:
In some examples the ray tracing cores 1372 may be adapted to accelerate general-purpose compute operations that can be accelerated using computational techniques that are analogous to ray intersection tests. A compute framework can be provided that enables shader programs to be compiled into low level instructions and/or primitives that perform general-purpose compute operations via the ray tracing cores. Exemplary computational problems that can benefit from compute operations performed on the ray tracing cores 1372 include computations involving beam, wave, ray, or particle propagation within a coordinate space. Interactions associated with that propagation can be computed relative to a geometry or mesh within the coordinate space. For example, computations associated with electromagnetic signal propagation through an environment can be accelerated via the use of instructions or primitives that are executed via the ray tracing cores. Diffraction and reflection of the signals by objects in the environment can be computed as direct ray-tracing analogies.
Ray tracing cores 1372 can also be used to perform computations that are not directly analogous to ray tracing. For example, mesh projection, mesh refinement, and volume sampling computations can be accelerated using the ray tracing cores 1372. Generic coordinate space calculations, such as nearest neighbor calculations can also be performed. For example, the set of points near a given point can be discovered by defining a bounding box in the coordinate space around the point. BVH and ray probe logic within the ray tracing cores 1372 can then be used to determine the set of point intersections within the bounding box. The intersections constitute the origin point and the nearest neighbors to that origin point. Computations that are performed using the ray tracing cores 1372 can be performed in parallel with computations performed on the graphics cores 1372 and tensor cores 1371. A shader compiler can be configured to compile a compute shader or other general-purpose graphics processing program into low level primitives that can be parallelized across the graphics cores 1370, tensor cores 1371, and ray tracing cores 1372.
Building larger and larger silicon dies is challenging for a variety of reasons. As silicon dies become larger, manufacturing yields become smaller and process technology requirements for different components may diverge. On the other hand, in order to have a high-performance system, key components should be interconnected by high speed, high bandwidth, low latency interfaces. These contradicting needs pose a challenge to high performance chip development.
Examples described herein provide techniques to disaggregate an architecture of a system on a chip integrated circuit into multiple distinct chiplets that can be packaged onto a common chassis. In some examples, a graphics processing unit or parallel processor is composed from diverse silicon chiplets that are separately manufactured. A chiplet is an at least partially packaged integrated circuit that includes distinct units of logic that can be assembled with other chiplets into a larger package. A diverse set of chiplets with different IP core logic can be assembled into a single device. Additionally the chiplets can be integrated into a base die or base chiplet using active interposer technology. The concepts described herein enable the interconnection and communication between the different forms of IP within the GPU. The development of IPs on different process may be mixed. This avoids the complexity of converging multiple IPs, especially on a large SoC with several flavors IPs, to the same process.
Enabling the use of multiple process technologies improves the time to market and provides a cost-effective way to create multiple product SKUs. For customers, this means getting products that are more tailored to their requirements in a cost effective and timely manner. Additionally, the disaggregated IPs are more amenable to being power gated independently, components that are not in use on a given workload can be powered off, reducing overall power consumption.
As shown in
The various chiplets can be bonded to a base die 1510 and configured to communicate with each other and logic within the base die 1510 via an interconnect layer 1512. In some examples, the base die 1510 can include global logic 1501, which can include scheduler 1511 and power management 1521 logic units, an interface 1502, a dispatch unit 1503, and an interconnect fabric module 1508 coupled with or integrated with one or more L3 cache banks 1509A-1509N. The interconnect fabric 1508 can be an inter-chiplet fabric that is integrated into the base die 1510. Logic chiplets can use the fabric 1508 to relay messages between the various chiplets. Additionally, L3 cache banks 1509A-1509N in the base die and/or L3 cache banks within the memory chiplets 1506 can cache data read from and transmitted to DRAM chiplets within the memory chiplets 1506 and to system memory of a host.
In some examples the global logic 1501 is a microcontroller that can execute firmware to perform scheduler 1511 and power management 1521 functionality for the parallel processor 1520. The microcontroller that executes the global logic can be tailored for the target use case of the parallel processor 1520. The scheduler 1511 can perform global scheduling operations for the parallel processor 1520. The power management 1521 functionality can be used to enable or disable individual chiplets within the parallel processor when those chiplets are not in use.
The various chiplets of the parallel processor 1520 can be designed to perform specific functionality that, in existing designs, would be integrated into a single die. A set of compute chiplets 1505 can include clusters of compute units (e.g., execution units, streaming multiprocessors, etc.) that include programmable logic to execute compute or graphics shader instructions. A media chiplet 1504 can include hardware logic to accelerate media encode and decode operations. Memory chiplets 1506 can include volatile memory (e.g., DRAM) and one or more SRAM cache memory banks (e.g., L3 banks).
As shown in
At least a portion of the components within the illustrated chiplet 1530 can also be included within logic embedded within the base die 1510 of
Thus, while various examples described herein use the term SOC to describe a device or system having a processor and associated circuitry (e.g., Input/Output (“I/O”) circuitry, power delivery circuitry, memory circuitry, etc.) integrated monolithically into a single Integrated Circuit (“IC”) die, or chip, the present disclosure is not limited in that respect. For example, in various examples of the present disclosure, a device or system can have one or more processors (e.g., one or more processor cores) and associated circuitry (e.g., Input/Output (“I/O”) circuitry, power delivery circuitry, etc.) arranged in a disaggregated collection of discrete dies, tiles and/or chiplets (e.g., one or more discrete processor core die arranged adjacent to one or more other die such as memory die, I/O die, etc.). In such disaggregated devices and systems the various dies, tiles and/or chiplets can be physically and electrically coupled together by a package structure including, for example, various packaging substrates, interposers, active interposers, photonic interposers, interconnect bridges and the like. The disaggregated collection of discrete dies, tiles, and/or chiplets can also be part of a System-on-Package (“SoP”).
In
By way of example, the example register renaming, out-of-order issue/execution architecture core of
The front-end unit circuitry 1630 may include branch prediction circuitry 1632 coupled to instruction cache circuitry 1634, which is coupled to an instruction translation lookaside buffer (TLB) 1636, which is coupled to instruction fetch circuitry 1638, which is coupled to decode circuitry 1640. In some examples, the instruction cache circuitry 1634 is included in the memory unit circuitry 1670 rather than the front-end circuitry 1630. The decode circuitry 1640 (or decoder) may decode instructions, and generate as an output one or more micro-operations, micro-code entry points, microinstructions, other instructions, or other control signals, which are decoded from, or which otherwise reflect, or are derived from, the original instructions. The decode circuitry 1640 may further include address generation unit (AGU, not shown) circuitry. In some examples, the AGU generates an LSU address using forwarded register ports, and may further perform branch forwarding (e.g., immediate offset branch forwarding, LR register branch forwarding, etc.). The decode circuitry 1640 may be implemented using various different mechanisms. Examples of suitable mechanisms include, but are not limited to, lookup tables, hardware implementations, programmable logic arrays (PLAs), microcode read only memories (ROMs), etc. In some examples, the core 1690 includes a microcode ROM (not shown) or other medium that stores microcode for certain macroinstructions (e.g., in decode circuitry 1640 or otherwise within the front-end circuitry 1630). In some examples, the decode circuitry 1640 includes a micro-operation (micro-op) or operation cache (not shown) to hold/cache decoded operations, micro-tags, or micro-operations generated during the decode or other stages of the processor pipeline 1600. The decode circuitry 1640 may be coupled to rename/allocator unit circuitry 1652 in the execution engine circuitry 1650.
The execution engine circuitry 1650 includes the rename/allocator unit circuitry 1652 coupled to retirement unit circuitry 1654 and a set of one or more scheduler(s) circuitry 1656. The scheduler(s) circuitry 1656 represents any number of different schedulers, including reservations stations, central instruction window, etc. In some examples, the scheduler(s) circuitry 1656 can include arithmetic logic unit (ALU) scheduler/scheduling circuitry, ALU queues, address generation unit (AGU) scheduler/scheduling circuitry, AGU queues, etc. The scheduler(s) circuitry 1656 is coupled to the physical register file(s) circuitry 1658. Each of the physical register file(s) circuitry 1658 represents one or more physical register files, different ones of which store one or more different data types, such as scalar integer, scalar floating-point, packed integer, packed floating-point, vector integer, vector floating-point, status (e.g., an instruction pointer that is the address of the next instruction to be executed), etc. In some examples, the physical register file(s) circuitry 1658 includes vector registers unit circuitry, writemask registers unit circuitry, and scalar register unit circuitry. These register units may provide architectural vector registers, vector mask registers, general-purpose registers, etc. The physical register file(s) circuitry 1658 is coupled to the retirement unit circuitry 1654 (also known as a retire queue or a retirement queue) to illustrate various ways in which register renaming and out-of-order execution may be implemented (e.g., using a reorder buffer(s) (ROB(s)) and a retirement register file(s); using a future file(s), a history buffer(s), and a retirement register file(s); using a register maps and a pool of registers; etc.). The retirement unit circuitry 1654 and the physical register file(s) circuitry 1658 are coupled to the execution cluster(s) 1660. The execution cluster(s) 1660 includes a set of one or more execution unit(s) circuitry 1662 and a set of one or more memory access circuitry 1664. The execution unit(s) circuitry 1662 may perform various arithmetic, logic, floating-point or other types of operations (e.g., shifts, addition, subtraction, multiplication) and on various types of data (e.g., scalar integer, scalar floating-point, packed integer, packed floating-point, vector integer, vector floating-point). While some examples may include a number of execution units or execution unit circuitry dedicated to specific functions or sets of functions, other examples may include only one execution unit circuitry or multiple execution units/execution unit circuitry that all perform all functions. The scheduler(s) circuitry 1656, physical register file(s) circuitry 1658, and execution cluster(s) 1660 are shown as being possibly plural because certain examples create separate pipelines for certain types of data/operations (e.g., a scalar integer pipeline, a scalar floating-point/packed integer/packed floating-point/vector integer/vector floating-point pipeline, and/or a memory access pipeline that each have their own scheduler circuitry, physical register file(s) circuitry, and/or execution cluster- and in the case of a separate memory access pipeline, certain examples are implemented in which only the execution cluster of this pipeline has the memory access unit(s) circuitry 1664). It should also be understood that where separate pipelines are used, one or more of these pipelines may be out-of-order issue/execution and the rest in-order.
In some examples, the execution engine unit circuitry 1650 may perform load store unit (LSU) address/data pipelining to an Advanced Microcontroller Bus (AMB) interface (not shown), and address phase and writeback, data phase load, store, and branches.
The set of memory access circuitry 1664 is coupled to the memory unit circuitry 1670, which includes data TLB circuitry 1672 coupled to data cache circuitry 1674 coupled to level 2 (L2) cache circuitry 1676. In some examples, the memory access circuitry 1664 may include load unit circuitry, store address unit circuitry, and store data unit circuitry, each of which is coupled to the data TLB circuitry 1672 in the memory unit circuitry 1670. The instruction cache circuitry 1634 is further coupled to the level 2 (L2) cache circuitry 1676 in the memory unit circuitry 1670. In some examples, the instruction cache 1634 and the data cache 1674 are combined into a single instruction and data cache (not shown) in L2 cache circuitry 1676, level 3 (L3) cache circuitry (not shown), and/or main memory. The L2 cache circuitry 1676 is coupled to one or more other levels of cache and eventually to a main memory.
The core 1690 may support one or more instructions sets (e.g., the x86 instruction set architecture (optionally with some extensions that have been added with newer versions); the MIPS instruction set architecture; the ARM instruction set architecture (optionally with optional additional extensions such as NEON)), including the instruction(s) described herein. In some examples, the core 1690 includes logic to support a packed data instruction set architecture extension (e.g., AVX1, AVX2), thereby allowing the operations used by many multimedia applications to be performed using packed data.
In some examples, the register architecture 1800 includes writemask/predicate registers 1815. For example, in some examples, there are 8 writemask/predicate registers (sometimes called k0 through k7) that are each 16-bit, 32-bit, 64-bit, or 128-bit in size. Writemask/predicate registers 1815 may allow for merging (e.g., allowing any set of elements in the destination to be protected from updates during the execution of any operation) and/or zeroing (e.g., zeroing vector masks allow any set of elements in the destination to be zeroed during the execution of any operation). In some examples, each data element position in a given writemask/predicate register 1815 corresponds to a data element position of the destination. In other examples, the writemask/predicate registers 1815 are scalable and consists of a set number of enable bits for a given vector element (e.g., 8 enable bits per 64-bit vector element).
The register architecture 1800 includes a plurality of general-purpose registers 1825. These registers may be 16-bit, 32-bit, 64-bit, etc. and can be used for scalar operations. In some examples, these registers are referenced by the names RAX, RBX, RCX, RDX, RBP, RSI, RDI, RSP, and R8 through R15.
In some examples, the register architecture 1800 includes scalar floating-point (FP) register file 1845 which is used for scalar floating-point operations on 32/64/80-bit floating-point data using the x87 instruction set architecture extension or as MMX registers to perform operations on 64-bit packed integer data, as well as to hold operands for some operations performed between the MMX and XMM registers.
One or more flag registers 1840 (e.g., EFLAGS, RFLAGS, etc.) store status and control information for arithmetic, compare, and system operations. For example, the one or more flag registers 1840 may store condition code information such as carry, parity, auxiliary carry, zero, sign, and overflow. In some examples, the one or more flag registers 1840 are called program status and control registers.
Segment registers 1820 contain segment points for use in accessing memory. In some examples, these registers are referenced by the names CS, DS, SS, ES, FS, and GS.
Model specific registers or machine specific registers (MSRs) 1835 control and report on processor performance. Most MSRs 1835 handle system-related functions and are not accessible to an application program. For example, MSRs may provide control for one or more of: performance-monitoring counters, debug extensions, memory type range registers, thermal and power management, instruction-specific support, and/or processor feature/mode support. Machine check registers 1860 consist of control, status, and error reporting MSRs that are used to detect and report on hardware errors. Control register(s) 1855 (e.g., CR0-CR4) determine the operating mode of a processor (e.g., processor 970, 980, 938, 915, and/or 1000) and the characteristics of a currently executing task. In some examples, MSRs 1835 are a subset of control registers 1855.
One or more instruction pointer register(s) 1830 store an instruction pointer value. Debug registers 1850 control and allow for the monitoring of a processor or core's debugging operations.
Memory (mem) management registers 1865 specify the locations of data structures used in protected mode memory management. These registers may include a global descriptor table register (GDTR), interrupt descriptor table register (IDTR), task register, and a local descriptor table register (LDTR) register.
Alternative examples may use wider or narrower registers. Additionally, alternative examples may use more, less, or different register files and registers. The register architecture 1800 may, for example, be used in register file 110, or physical register file(s) circuitry 1658.
An instruction set architecture (ISA) may include one or more instruction formats. A given instruction format may define various fields (e.g., number of bits, location of bits) to specify, among other things, the operation to be performed (e.g., opcode) and the operand(s) on which that operation is to be performed and/or other data field(s) (e.g., mask). Some instruction formats are further broken down through the definition of instruction templates (or sub-formats). For example, the instruction templates of a given instruction format may be defined to have different subsets of the instruction format's fields (the included fields are typically in the same order, but at least some have different bit positions because there are less fields included) and/or defined to have a given field interpreted differently. Thus, each instruction of an ISA is expressed using a given instruction format (and, if defined, in a given one of the instruction templates of that instruction format) and includes fields for specifying the operation and the operands. For example, an example ADD instruction has a specific opcode and an instruction format that includes an opcode field to specify that opcode and operand fields to select operands (source 1/destination and source2); and an occurrence of this ADD instruction in an instruction stream will have specific contents in the operand fields that select specific operands. In addition, though the description below is made in the context of x86 ISA, it is within the knowledge of one skilled in the art to apply the teachings of the present disclosure in another ISA.
Examples of the instruction(s) described herein may be embodied in different formats. Additionally, example systems, architectures, and pipelines are detailed below. Examples of the instruction(s) may be executed on such systems, architectures, and pipelines, but are not limited to those detailed.
The prefix(es) field(s) 1901, when used, modifies an instruction. In some examples, one or more prefixes are used to repeat string instructions (e.g., 0xF0, 0xF2, 0xF3, etc.), to provide section overrides (e.g., 0x2E, 0x36, 0x3E, 0x26, 0x64, 0x65, 0x2E, 0x3E, etc.), to perform bus lock operations, and/or to change operand (e.g., 0x66) and address sizes (e.g., 0x67). Certain instructions require a mandatory prefix (e.g., 0x66, 0xF2, 0xF3, etc.). Certain of these prefixes may be considered “legacy” prefixes. Other prefixes, one or more examples of which are detailed herein, indicate, and/or provide further capability, such as specifying particular registers, etc. The other prefixes typically follow the “legacy” prefixes.
The opcode field 1903 is used to at least partially define the operation to be performed upon a decoding of the instruction. In some examples, a primary opcode encoded in the opcode field 1903 is one, two, or three bytes in length. In other examples, a primary opcode can be a different length. An additional 3-bit opcode field is sometimes encoded in another field.
The addressing information field 1905 is used to address one or more operands of the instruction, such as a location in memory or one or more registers.
The content of the MOD field 2042 distinguishes between memory access and non-memory access modes. In some examples, when the MOD field 2042 has a binary value of 11 (11b), a register-direct addressing mode is utilized, and otherwise a register-indirect addressing mode is used.
The register field 2044 may encode either the destination register operand or a source register operand or may encode an opcode extension and not be used to encode any instruction operand. The content of register field 2044, directly or through address generation, specifics the locations of a source or destination operand (either in a register or in memory). In some examples, the register field 2044 is supplemented with an additional bit from a prefix (e.g., prefix 1901) to allow for greater addressing.
The R/M field 2046 may be used to encode an instruction operand that references a memory address or may be used to encode either the destination register operand or a source register operand. Note the R/M field 2046 may be combined with the MOD field 2042 to dictate an addressing mode in some examples.
The SIB byte 2004 includes a scale field 2052, an index field 2054, and a base field 2056 to be used in the generation of an address. The scale field 2052 indicates a scaling factor. The index field 2054 specifies an index register to use. In some examples, the index field 2054 is supplemented with an additional bit from a prefix (e.g., prefix 1901) to allow for greater addressing. The base field 2056 specifies a base register to use. In some examples, the base field 2056 is supplemented with an additional bit from a prefix (e.g., prefix 1901) to allow for greater addressing. In practice, the content of the scale field 2052 allows for the scaling of the content of the index field 2054 for memory address generation (e.g., for address generation that uses 2scale*index+base).
Some addressing forms utilize a displacement value to generate a memory address. For example, a memory address may be generated according to 2scale*index+base+displacement, index*scale+displacement, r/m+displacement, instruction pointer (RIP/EIP)+displacement, register+displacement, etc. The displacement may be a 1-byte, 2-byte, 4-byte, etc. value. In some examples, the displacement field 1907 provides this value. Additionally, in some examples, a displacement factor usage is encoded in the MOD field of the addressing information field 1905 that indicates a compressed displacement scheme for which a displacement value is calculated and stored in the displacement field 1907.
In some examples, the immediate value field 1909 specifies an immediate value for the instruction. An immediate value may be encoded as a 1-byte value, a 2-byte value, a 4-byte value, etc.
Instructions using the first prefix 1901(A) may specify up to three registers using 3-bit fields depending on the format: 1) using the reg field 2044 and the R/M field 2046 of the MOD R/M byte 2002; 2) using the MOD R/M byte 2002 with the SIB byte 2004 including using the reg field 2044 and the base field 2056 and index field 2054; or 3) using the register field of an opcode.
In the first prefix 1901(A), bit positions of the payload byte 7:4 are set as 0100. Bit position 3 (W) can be used to determine the operand size but may not solely determine operand width. As such, when W=0, the operand size is determined by a code segment descriptor (CS.D) and when W=1, the operand size is 64-bit.
Note that the addition of another bit allows for 16 (24) registers to be addressed, whereas the MOD R/M reg field 2044 and MOD R/M R/M field 2046 alone can each only address 8 registers.
In the first prefix 1901(A), bit position 2 (R) may be an extension of the MOD R/M reg field 2044 and may be used to modify the MOD R/M reg field 2044 when that field encodes a general-purpose register, a 64-bit packed data register (e.g., an SSE register), or a control or debug register. R is ignored when MOD R/M byte 2002 specifies other registers or defines an extended opcode.
Bit position 1 (X) may modify the SIB byte index field 2054.
Bit position 0 (B) may modify the base in the MOD R/M R/M field 2046 or the SIB byte base field 2056; or it may modify the opcode register field used for accessing general purpose registers (e.g., general purpose registers 1825).
In some examples, the second prefix 1901(B) comes in two forms—a two-byte form and a three-byte form. The two-byte second prefix 1901(B) is used mainly for 128-bit, scalar, and some 256-bit instructions; while the three-byte second prefix 1901(B) provides a compact replacement of the first prefix 1901(A) and 3-byte opcode instructions.
Instructions that use this prefix may use the MOD R/M R/M field 2046 to encode the instruction operand that references a memory address or encode either the destination register operand or a source register operand.
Instructions that use this prefix may use the MOD R/M reg field 2044 to encode either the destination register operand or a source register operand, or to be treated as an opcode extension and not used to encode any instruction operand.
For instruction syntax that support four operands, vvvv, the MOD R/M R/M field 2046 and the MOD R/M reg field 2044 encode three of the four operands. Bits[7:4] of the immediate value field 1909 are then used to encode the third source register operand.
Bit[7] of byte 2 2317 is used similar to W of the first prefix 1901(A) including helping to determine promotable operand sizes. Bit[2] is used to dictate the length (L) of the vector (where a value of 0 is a scalar or 128-bit vector and a value of 1 is a 256-bit vector). Bits[1:0] provide opcode extensionality equivalent to some legacy prefixes (e.g., 00=no prefix, 01=66H, 10=F3H, and 11=F2H). Bits[6:3], shown as vvvv, may be used to: 1) encode the first source register operand, specified in inverted (1s complement) form and valid for instructions with 2 or more source operands; 2) encode the destination register operand, specified in Is complement form for certain vector shifts; or 3) not encode any operand, the field is reserved and should contain a certain value, such as 1111b.
Instructions that use this prefix may use the MOD R/M R/M field 2046 to encode the instruction operand that references a memory address or encode either the destination register operand or a source register operand.
Instructions that use this prefix may use the MOD R/M reg field 2044 to encode either the destination register operand or a source register operand, or to be treated as an opcode extension and not used to encode any instruction operand.
For instruction syntax that support four operands, vvvv, the MOD R/M R/M field 2046, and the MOD R/M reg field 2044 encode three of the four operands. Bits[7:4] of the immediate value field 1909 are then used to encode the third source register operand.
The third prefix 1901(C) can encode 32 vector registers (e.g., 128-bit, 256-bit, and 512-bit registers) in 64-bit mode. In some examples, instructions that utilize a writemask/opmask (see discussion of registers in a previous figure, such as
The third prefix 1901(C) may encode functionality that is specific to instruction classes (e.g., a packed instruction with “load+op” semantic can support embedded broadcast functionality, a floating-point instruction with rounding semantic can support static rounding functionality, a floating-point instruction with non-rounding arithmetic semantic can support “suppress all exceptions” functionality, etc.).
The first byte of the third prefix 1901(C) is a format field 2411 that has a value, in some examples, of 62H. Subsequent bytes are referred to as payload bytes 2415-2419 and collectively form a 24-bit value of P[23:0] providing specific capability in the form of one or more fields (detailed herein).
In some examples, P[1:0] of payload byte 2419 are identical to the low two mm bits. P[3:2] are reserved in some examples. Bit P[4] (R′) allows access to the high 16 vector register set when combined with P[7] and the MOD R/M reg field 2044. P[6] can also provide access to a high 16 vector register when SIB-type addressing is not needed. P[7:5] consist of R, X, and B which are operand specifier modifier bits for vector register, general purpose register, memory addressing and allow access to the next set of 8 registers beyond the low 8 registers when combined with the MOD R/M register field 2044 and MOD R/M R/M field 2046. P[9:8] provide opcode extensionality equivalent to some legacy prefixes (e.g., 00=no prefix, 01=66H, 10=F3H, and 11=F2H). P[10] in some examples is a fixed value of 1. P[14:11], shown as vvvv, may be used to: 1) encode the first source register operand, specified in inverted (1s complement) form and valid for instructions with 2 or more source operands; 2) encode the destination register operand, specified in 1s complement form for certain vector shifts; or 3) not encode any operand, the field is reserved and should contain a certain value, such as 1111b.
P[15] is similar to W of the first prefix 1901(A) and second prefix 1901(B) and may serve as an opcode extension bit or operand size promotion.
P[18:16] specify the index of a register in the opmask (writemask) registers (e.g., writemask/predicate registers 1815). In some examples, the specific value aaa=000 has a special behavior implying no opmask is used for the particular instruction (this may be implemented in a variety of ways including the use of an opmask hardwired to all ones or hardware that bypasses the masking hardware). When merging, vector masks allow any set of elements in the destination to be protected from updates during the execution of any operation (specified by the base operation and the augmentation operation); in other some examples, preserving the old value of each element of the destination where the corresponding mask bit has a 0. In contrast, when zeroing vector masks allow any set of elements in the destination to be zeroed during the execution of any operation (specified by the base operation and the augmentation operation); in some examples, an element of the destination is set to 0 when the corresponding mask bit has a 0 value. A subset of this functionality is the ability to control the vector length of the operation being performed (that is, the span of elements being modified, from the first to the last one); however, it is not necessary that the elements that are modified be consecutive. Thus, the opmask field allows for partial vector operations, including loads, stores, arithmetic, logical, etc. While examples are described in which the opmask field's content selects one of a number of opmask registers that contains the opmask to be used (and thus the opmask field's content indirectly identifies that masking to be performed), alternative examples instead or additional allow the mask write field's content to directly specify the masking to be performed.
P[19] can be combined with P[14:11] to encode a second source vector register in a non-destructive source syntax which can access an upper 16 vector registers using P[19]. P[20] encodes multiple functionalities, which differs across different classes of instructions and can affect the meaning of the vector length/rounding control specifier field (P[22:21]). P[23] indicates support for merging-writemasking (e.g., when set to 0) or support for zeroing and merging-writemasking (e.g., when set to 1).
Example examples of encoding of registers in instructions using the third prefix 1901(C) are detailed in the following tables.
As illustrated in
In some examples, the execution units 2508A-2508N are primarily used to execute shader programs. A shader processor 2502 can process the various shader programs and dispatch execution threads associated with the shader programs via a thread dispatcher 2504. In some examples the thread dispatcher includes logic to arbitrate thread initiation requests from the graphics and media pipelines and instantiate the requested threads on one or more execution unit in the execution units 2508A-2508N. For example, a geometry pipeline can dispatch vertex, tessellation, or geometry shaders to the thread execution logic for processing. In some examples, thread dispatcher 2504 can also process runtime thread spawning requests from the executing shader programs.
In some examples, the execution units 2508A-2508N support an instruction set that includes native support for many standard 3D graphics shader instructions, such that shader programs from graphics libraries (e.g., Direct 3D and OpenGL) are executed with a minimal translation. The execution units support vertex and geometry processing (e.g., vertex programs, geometry programs, vertex shaders), pixel processing (e.g., pixel shaders, fragment shaders) and general-purpose processing (e.g., compute and media shaders). Each of the execution units 2508A-2508N is capable of multi-issue single instruction multiple data (SIMD) execution and multi-threaded operation enables an efficient execution environment in the face of higher latency memory accesses. Each hardware thread within each execution unit has a dedicated high-bandwidth register file and associated independent thread-state. Execution is multi-issue per clock to pipelines capable of integer, single and double precision floating point operations, SIMD branch capability, logical operations, transcendental operations, and other miscellaneous operations. While waiting for data from memory or one of the shared functions, dependency logic within the execution units 2508A-2508N causes a waiting thread to sleep until the requested data has been returned. While the waiting thread is sleeping, hardware resources may be devoted to processing other threads. For example, during a delay associated with a vertex shader operation, an execution unit can perform operations for a pixel shader, fragment shader, or another type of shader program, including a different vertex shader. Various examples can apply to use execution by use of Single Instruction Multiple Thread (SIMT) as an alternate to use of SIMD or in addition to use of SIMD. Reference to a SIMD core or operation can apply also to SIMT or apply to SIMD in combination with SIMT.
Each execution unit in execution units 2508A-2508N operates on arrays of data elements. The number of data elements is the “execution size.” or the number of channels for the instruction. An execution channel is a logical unit of execution for data element access, masking, and flow control within instructions. The number of channels may be independent of the number of physical Arithmetic Logic Units (ALUs) or Floating Point Units (FPUs) for a particular graphics processor. In some examples, execution units 2508A-2508N support integer and floating-point data types.
The execution unit instruction set includes SIMD instructions. The various data elements can be stored as a packed data type in a register and the execution unit will process the various elements based on the data size of the elements. For example, when operating on a 256-bit wide vector, the 256 bits of the vector are stored in a register and the execution unit operates on the vector as four separate 64-bit packed data elements (Quad-Word (QW) size data elements), eight separate 32-bit packed data elements (Double Word (DW) size data elements), sixteen separate 16-bit packed data elements (Word (W) size data elements), or thirty-two separate 8-bit data elements (byte (B) size data elements). However, different vector widths and register sizes are possible.
In some examples one or more execution units can be combined into a fused execution unit 2509A-2509N having thread control logic (2507A-2507N) that is common to the fused EUs. Multiple EUs can be fused into an EU group. Each EU in the fused EU group can be configured to execute a separate SIMD hardware thread. The number of EUs in a fused EU group can vary according to examples. Additionally, various SIMD widths can be performed per-EU, including but not limited to SIMD8, SIMD16, and SIMD32. Each fused graphics execution unit 2509A-2509N includes at least two execution units. For example, fused execution unit 2509A includes a first EU 2508A, second EU 2508B, and thread control logic 2507A that is common to the first EU 2508A and the second EU 2508B. The thread control logic 2507A controls threads executed on the fused graphics execution unit 2509A, allowing each EU within the fused execution units 2509A-2509N to execute using a common instruction pointer register.
One or more internal instruction caches (e.g., 2506) are included in the thread execution logic 2500 to cache thread instructions for the execution units. In some examples, one or more data caches (e.g., 2512) are included to cache thread data during thread execution. Threads executing on the execution logic 2500 can also store explicitly managed data in the shared local memory 2511. In some examples, a sampler 2510 is included to provide texture sampling for 3D operations and media sampling for media operations. In some examples, sampler 2510 includes specialized texture or media sampling functionality to process texture or media data during the sampling process before providing the sampled data to an execution unit.
During execution, the graphics and media pipelines send thread initiation requests to thread execution logic 2500 via thread spawning and dispatch logic. Once a group of geometric objects has been processed and rasterized into pixel data, pixel processor logic (e.g., pixel shader logic, fragment shader logic, etc.) within the shader processor 2502 is invoked to further compute output information and cause results to be written to output surfaces (e.g., color buffers, depth buffers, stencil buffers, etc.). In some examples, a pixel shader or fragment shader calculates the values of the various vertex attributes that are to be interpolated across the rasterized object. In some examples, pixel processor logic within the shader processor 2502 then executes an application programming interface (API)-supplied pixel or fragment shader program. To execute the shader program, the shader processor 2502 dispatches threads to an execution unit (e.g., 2508A) via thread dispatcher 2504. In some examples, shader processor 2502 uses texture sampling logic in the sampler 2510 to access texture data in texture maps stored in memory. Arithmetic operations on the texture data and the input geometry data compute pixel color data for each geometric fragment, or discards one or more pixels from further processing.
In some examples, the data port 2514 provides a memory access mechanism for the thread execution logic 2500 to output processed data to memory for further processing on a graphics processor output pipeline. In some examples, the data port 2514 includes or couples to one or more cache memories (e.g., data cache 2512) to cache data for memory access via the data port.
In some examples, the execution logic 2500 can also include a ray tracer 2505 that can provide ray tracing acceleration functionality. The ray tracer 2505 can support a ray tracing instruction set that includes instructions/functions for ray generation.
In some examples the graphics execution unit 2508 has an architecture that is a combination of Simultaneous Multi-Threading (SMT) and fine-grained Interleaved Multi-Threading (IMT). The architecture has a modular configuration that can be fine-tuned at design time based on a target number of simultaneous threads and number of registers per execution unit, where execution unit resources are divided across logic used to execute multiple simultaneous threads. The number of logical threads that may be executed by the graphics execution unit 2508 is not limited to the number of hardware threads, and multiple logical threads can be assigned to each hardware thread.
In some examples, the graphics execution unit 2508 can co-issue multiple instructions, which may each be different instructions. The thread arbiter 2522 of the graphics execution unit thread 2508 can dispatch the instructions to one of the send unit 2530, branch unit 2532, or SIMD FPU(s) 2534 for execution. Each execution thread can access 128 general-purpose registers within the GRF 2524, where each register can store 32 bytes, accessible as a SIMD 8-element vector of 32-bit data elements. In some examples, each execution unit thread has access to 4 Kbytes within the GRF 2524, although examples are not so limited, and greater or fewer register resources may be provided in other examples. In some examples the graphics execution unit 2508 is partitioned into seven hardware threads that can independently perform computational operations, although the number of threads per execution unit can also vary according to examples. For example, in some examples up to 16 hardware threads are supported. In an example in which seven threads may access 4 Kbytes, the GRF 2524 can store a total of 28 Kbytes. Where 16 threads may access 4 Kbytes, the GRF 2524 can store a total of 64 Kbytes. Flexible addressing modes can permit registers to be addressed together to build effectively wider registers or to represent strided rectangular block data structures.
In some examples, memory operations, sampler operations, and other longer-latency system communications are dispatched via “send” instructions that are executed by the message passing send unit 2530. In some examples, branch instructions are dispatched to a dedicated branch unit 2532 to facilitate SIMD divergence and eventual convergence.
In some examples the graphics execution unit 2508 includes one or more SIMD floating point units (FPU(s)) 2534 to perform floating-point operations. In some examples, the FPU(s) 2534 also support integer computation. In some examples the FPU(s) 2534 can SIMD execute up to M number of 32-bit floating-point (or integer) operations, or SIMD execute up to 2M 16-bit integer or 16-bit floating-point operations. In some examples, at least one of the FPU(s) provides extended math capability to support high-throughput transcendental math functions and double precision 64-bit floating-point. In some examples, a set of 8-bit integer SIMD ALUs 2535 are also present, and may be specifically optimized to perform operations associated with machine learning computations.
In some examples, arrays of multiple instances of the graphics execution unit 2508 can be instantiated in a graphics sub-core grouping (e.g., a sub-slice). For scalability, product architects can choose the exact number of execution units per sub-core grouping. In some examples the execution unit 2508 can execute instructions across a plurality of execution channels. In a further example, each thread executed on the graphics execution unit 2508 is executed on a different channel.
The execution unit 2600 also includes a compute unit 2610 that includes multiple different types of functional units. In some examples the compute unit 2610 includes an ALU unit 2611 that includes an array of arithmetic logic units. The ALU unit 2611 can be configured to perform 64-bit, 32-bit, and 16-bit integer and floating point operations. Integer and floating point operations may be performed simultaneously. The compute unit 2610 can also include a systolic array 2612, and a math unit 2613. The systolic array 2612 includes a W wide and D deep network of data processing units that can be used to perform vector or other data-parallel operations in a systolic manner. In some examples the systolic array 2612 can be configured to perform matrix operations, such as matrix dot product operations. In some examples the systolic array 2612 support 16-bit floating point operations, as well as 8-bit and 4-bit integer operations. In some examples the systolic array 2612 can be configured to accelerate machine learning operations. In such examples, the systolic array 2612 can be configured with support for the bfloat 16-bit floating point format. In some examples, a math unit 2613 can be included to perform a specific subset of mathematical operations in an efficient and lower-power manner than ALU unit 2611. The math unit 2613 can include a variant of math logic that may be found in shared function logic of a graphics processing engine provided by other examples (e.g., math logic of a shared function logic). In some examples the math unit 2613 can be configured to perform 32-bit and 64-bit floating point operations.
The thread control unit 2601 includes logic to control the execution of threads within the execution unit. The thread control unit 2601 can include thread arbitration logic to start, stop, and preempt execution of threads within the execution unit 2600. The thread state unit 2602 can be used to store thread state for threads assigned to execute on the execution unit 2600. Storing the thread state within the execution unit 2600 enables the rapid pre-emption of threads when those threads become blocked or idle. The instruction fetch/prefetch unit 2603 can fetch instructions from an instruction cache of higher level execution logic (e.g., instruction cache 2506 as in
The execution unit 2600 additionally includes a register file 2606 that can be used by hardware threads executing on the execution unit 2600. Registers in the register file 2606 can be divided across the logic used to execute multiple simultaneous threads within the compute unit 2610 of the execution unit 2600. The number of logical threads that may be executed by the graphics execution unit 2600 is not limited to the number of hardware threads, and multiple logical threads can be assigned to each hardware thread. The size of the register file 2606 can vary across examples based on the number of supported hardware threads. In some examples, register renaming may be used to dynamically allocate registers to hardware threads.
In some examples, the graphics processor execution units natively support instructions in a 128-bit instruction format 2710. A 64-bit compacted instruction format 2730 is available for some instructions based on the selected instruction, instruction options, and number of operands. The native 128-bit instruction format 2710 provides access to all instruction options, while some options and operations are restricted in the 64-bit format 2730. The native instructions available in the 64-bit format 2730 vary by example. In some examples, the instruction is compacted in part using a set of index values in an index field 2713. The execution unit hardware references a set of compaction tables based on the index values and uses the compaction table outputs to reconstruct a native instruction in the 128-bit instruction format 2710. Other sizes and formats of instruction can be used.
For each format, instruction opcode 2712 defines the operation that the execution unit is to perform. The execution units execute each instruction in parallel across the multiple data elements of each operand. For example, in response to an add instruction the execution unit performs a simultaneous add operation across each color channel representing a texture element or picture element. By default, the execution unit performs each instruction across all data channels of the operands. In some examples, instruction control field 2714 enables control over certain execution options, such as channels selection (e.g., predication) and data channel order (e.g., swizzle). For instructions in the 128-bit instruction format 2710 an exec-size field 2716 limits the number of data channels that will be executed in parallel. In some examples, exec-size field 2716 is not available for use in the 64-bit compact instruction format 2730.
Some execution unit instructions have up to three operands including two source operands, src0 2720, src1 2722, and one destination 2718. In some examples, the execution units support dual destination instructions, where one of the destinations is implied. Data manipulation instructions can have a third source operand (e.g., SRC2 2724), where the instruction opcode 2712 determines the number of source operands. An instruction's last source operand can be an immediate (e.g., hard-coded) value passed with the instruction.
In some examples, the 128-bit instruction format 2710 includes an access/address mode field 2726 specifying, for example, whether direct register addressing mode or indirect register addressing mode is used. When direct register addressing mode is used, the register address of one or more operands is directly provided by bits in the instruction.
In some examples, the 128-bit instruction format 2710 includes an access/address mode field 2726, which specifies an address mode and/or an access mode for the instruction. In some examples the access mode is used to define a data access alignment for the instruction. Some examples support access modes including a 16-byte aligned access mode and a 1-byte aligned access mode, where the byte alignment of the access mode determines the access alignment of the instruction operands. For example, when in a first mode, the instruction may use byte-aligned addressing for source and destination operands and when in a second mode, the instruction may use 16-byte-aligned addressing for all source and destination operands.
In some examples, the address mode portion of the access/address mode field 2726 determines whether the instruction is to use direct or indirect addressing. When direct register addressing mode is used bits in the instruction directly provide the register address of one or more operands. When indirect register addressing mode is used, the register address of one or more operands may be computed based on an address register value and an address immediate field in the instruction.
In some examples instructions are grouped based on opcode 2712 bit-fields to simplify Opcode decode 2740. For an 8-bit opcode, bits 4, 5, and 6 allow the execution unit to determine the type of opcode. The precise opcode grouping shown is merely an example. In some examples, a move and logic opcode group 2742 includes data movement and logic instructions (e.g., move (mov), compare (cmp)). In some examples, move and logic group 2742 shares the five most significant bits (MSB), where move (mov) instructions are in the form of 0000xxxxb and logic instructions are in the form of 0001xxxxb. A flow control instruction group 2744 (e.g., call, jump (jmp)) includes instructions in the form of 0010xxxxb (e.g., 0x20). A miscellaneous instruction group 2746 includes a mix of instructions, including synchronization instructions (e.g., wait, send) in the form of 0011xxxxb (e.g., 0x30). A parallel math instruction group 2748 includes component-wise arithmetic instructions (e.g., add, multiply (mul)) in the form of 0100xxxxb (e.g., 0x40). The parallel math group 2748 performs the arithmetic operations in parallel across data channels. The vector math group 2750 includes arithmetic instructions (e.g., dp4) in the form of 0101xxxxb (e.g., 0x50). The vector math group performs arithmetic such as dot product calculations on vector operands. The illustrated opcode decode 2740, in some examples, can be used to determine which portion of an execution unit will be used to execute a decoded instruction. For example, some instructions may be designated as systolic instructions that will be performed by a systolic array. Other instructions, such as ray-tracing instructions (not shown) can be routed to a ray-tracing core or ray-tracing logic within a slice or partition of execution logic.
In some examples, graphics processor 2800 includes a geometry pipeline 2820, a media pipeline 2830, a display engine 2840, thread execution logic 2850, and a render output pipeline 2870. In some examples, graphics processor 2800 is a graphics processor within a multi-core processing system that includes one or more general-purpose processing cores. The graphics processor is controlled by register writes to one or more control registers (not shown) or via commands issued to graphics processor 2800 via a ring interconnect 2802. In some examples, ring interconnect 2802 couples graphics processor 2800 to other processing components, such as other graphics processors or general-purpose processors. Commands from ring interconnect 2802 are interpreted by a command streamer 2803, which supplies instructions to individual components of the geometry pipeline 2820 or the media pipeline 2830.
In some examples, command streamer 2803 directs the operation of a vertex fetcher 2805 that reads vertex data from memory and executes vertex-processing commands provided by command streamer 2803. In some examples, vertex fetcher 2805 provides vertex data to a vertex shader 2807, which performs coordinate space transformation and lighting operations to each vertex. In some examples, vertex fetcher 2805 and vertex shader 2807 execute vertex-processing instructions by dispatching execution threads to execution units 2852A-2852B via a thread dispatcher 2831.
In some examples, execution units 2852A-2852B are an array of vector processors having an instruction set for performing graphics and media operations. In some examples, execution units 2852A-2852B have an attached L1 cache 2851 that is specific for each array or shared between the arrays. The cache can be configured as a data cache, an instruction cache, or a single cache that is partitioned to contain data and instructions in different partitions.
In some examples, geometry pipeline 2820 includes tessellation components to perform hardware-accelerated tessellation of 3D objects. In some examples, a programmable hull shader 2811 configures the tessellation operations. A programmable domain shader 2817 provides back-end evaluation of tessellation output. A tessellator 2813 operates at the direction of hull shader 2811 and contains special purpose logic to generate a set of detailed geometric objects based on a coarse geometric model that is provided as input to geometry pipeline 2820. In some examples, if tessellation is not used, tessellation components (e.g., hull shader 2811, tessellator 2813, and domain shader 2817) can be bypassed.
In some examples, complete geometric objects can be processed by a geometry shader 2819 via one or more threads dispatched to execution units 2852A-2852B, or can proceed directly to the clipper 2829. In some examples, the geometry shader operates on entire geometric objects, rather than vertices or patches of vertices as in previous stages of the graphics pipeline. If the tessellation is disabled the geometry shader 2819 receives input from the vertex shader 2807. In some examples, geometry shader 2819 is programmable by a geometry shader program to perform geometry tessellation if the tessellation units are disabled.
Before rasterization, a clipper 2829 processes vertex data. The clipper 2829 may be a fixed function clipper or a programmable clipper having clipping and geometry shader functions. In some examples, a rasterizer and depth test component 2873 in the render output pipeline 2870 dispatches pixel shaders to convert the geometric objects into per pixel representations. In some examples, pixel shader logic is included in thread execution logic 2850. In some examples, an application can bypass the rasterizer and depth test component 2873 and access un-rasterized vertex data via a stream out unit 2823.
The graphics processor 2800 has an interconnect bus, interconnect fabric, or some other interconnect mechanism that allows data and message passing amongst the major components of the processor. In some examples, execution units 2852A-2852B and associated logic units (e.g., L1 cache 2851, sampler 2854, texture cache 2858, etc.) interconnect via a data port 2856 to perform memory access and communicate with render output pipeline components of the processor. In some examples, sampler 2854, caches 2851, 2858 and execution units 2852A-2852B each have separate memory access paths. In some examples the texture cache 2858 can also be configured as a sampler cache.
In some examples, render output pipeline 2870 contains a rasterizer and depth test component 2873 that converts vertex-based objects into an associated pixel-based representation. In some examples, the rasterizer logic includes a windower/masker unit to perform fixed function triangle and line rasterization. An associated render cache 2878 and depth cache 2879 are also available in some examples. A pixel operations component 2877 performs pixel-based operations on the data, though in some instances, pixel operations associated with 2D operations (e.g., bit block image transfers with blending) are performed by the 2D engine 2841, or substituted at display time by the display controller 2843 using overlay display planes. In some examples, a shared L3 cache 2875 is available to all graphics components, allowing the sharing of data without the use of main system memory.
In some examples, graphics processor media pipeline 2830 includes a media engine 2837 and a video front-end 2834. In some examples, video front-end 2834 receives pipeline commands from the command streamer 2803. In some examples, media pipeline 2830 includes a separate command streamer. In some examples, video front-end 2834 processes media commands before sending the command to the media engine 2837. In some examples, media engine 2837 includes thread spawning functionality to spawn threads for dispatch to thread execution logic 2850 via thread dispatcher 2831.
In some examples, graphics processor 2800 includes a display engine 2840. In some examples, display engine 2840 is external to processor 2800 and couples with the graphics processor via the ring interconnect 2802, or some other interconnect bus or fabric. In some examples, display engine 2840 includes a 2D engine 2841 and a display controller 2843. In some examples, display engine 2840 contains special purpose logic capable of operating independently of the 3D pipeline. In some examples, display controller 2843 couples with a display device (not shown), which may be a system integrated display device, as in a laptop computer, or an external display device attached via a display device connector.
In some examples, the geometry pipeline 2820 and media pipeline 2830 are configurable to perform operations based on multiple graphics and media programming interfaces and are not specific to any one application programming interface (API). In some examples, driver software for the graphics processor translates API calls that are specific to a particular graphics or media library into commands that can be processed by the graphics processor. In some examples, support is provided for the Open Graphics Library (OpenGL), Open Computing Language (OpenCL), and/or Vulkan graphics and compute API, all from the Khronos Group. In some examples, support may also be provided for the Direct3D library from the Microsoft Corporation. In some examples, a combination of these libraries may be supported. Support may also be provided for the Open Source Computer Vision Library (OpenCV). A future API with a compatible 3D pipeline would also be supported if a mapping can be made from the pipeline of the future API to the pipeline of the graphics processor.
In some examples, client 2902 specifies the client unit of the graphics device that processes the command data. In some examples, a graphics processor command parser examines the client field of each command to condition the further processing of the command and route the command data to the appropriate client unit. In some examples, the graphics processor client units include a memory interface unit, a render unit, a 2D unit, a 3D unit, and a media unit. Each client unit has a corresponding processing pipeline that processes the commands. Once the command is received by the client unit, the client unit reads the opcode 2904 and, if present, sub-opcode 2905 to determine the operation to perform. The client unit performs the command using information in data field 2906. For some commands, an explicit command size 2908 is expected to specify the size of the command. In some examples, the command parser automatically determines the size of at least some of the commands based on the command opcode. In some examples commands are aligned via multiples of a double word. Other command formats can be used.
The flow diagram in
In some examples, the graphics processor command sequence 2910 may begin with a pipeline flush command 2912 to cause any active graphics pipeline to complete the currently pending commands for the pipeline. In some examples, the 3D pipeline 2922 and the media pipeline 2924 do not operate concurrently. The pipeline flush is performed to cause the active graphics pipeline to complete any pending commands. In response to a pipeline flush, the command parser for the graphics processor will pause command processing until the active drawing engines complete pending operations and the relevant read caches are invalidated. Optionally, any data in the render cache that is marked ‘dirty’ can be flushed to memory. In some examples, pipeline flush command 2912 can be used for pipeline synchronization or before placing the graphics processor into a low power state.
In some examples, a pipeline select command 2913 is used when a command sequence requires the graphics processor to explicitly switch between pipelines. In some examples, a pipeline select command 2913 is required only once within an execution context before issuing pipeline commands unless the context is to issue commands for both pipelines. In some examples, a pipeline flush command 2912 is required immediately before a pipeline switch via the pipeline select command 2913.
In some examples, a pipeline control command 2914 configures a graphics pipeline for operation and is used to program the 3D pipeline 2922 and the media pipeline 2924. In some examples, pipeline control command 2914 configures the pipeline state for the active pipeline. In some examples, the pipeline control command 2914 is used for pipeline synchronization and to clear data from one or more cache memories within the active pipeline before processing a batch of commands.
In some examples, return buffer state commands 2916 are used to configure a set of return buffers for the respective pipelines to write data. Some pipeline operations require the allocation, selection, or configuration of one or more return buffers into which the operations write intermediate data during processing. In some examples, the graphics processor also uses one or more return buffers to store output data and to perform cross thread communication. In some examples, the return buffer state 2916 includes selecting the size and number of return buffers to use for a set of pipeline operations.
The remaining commands in the command sequence differ based on the active pipeline for operations. Based on a pipeline determination 2920, the command sequence is tailored to the 3D pipeline 2922 beginning with the 3D pipeline state 2930 or the media pipeline 2924 beginning at the media pipeline state 2940.
The commands to configure the 3D pipeline state 2930 include 3D state setting commands for vertex buffer state, vertex element state, constant color state, depth buffer state, and other state variables that are to be configured before 3D primitive commands are processed. The values of these commands are determined at least in part based on the particular 3D API in use. In some examples, 3D pipeline state 2930 commands are also able to selectively disable or bypass certain pipeline elements if those elements will not be used.
In some examples, 3D primitive 2932 command is used to submit 3D primitives to be processed by the 3D pipeline. Commands and associated parameters that are passed to the graphics processor via the 3D primitive 2932 command are forwarded to the vertex fetch function in the graphics pipeline. The vertex fetch function uses the 3D primitive 2932 command data to generate vertex data structures. The vertex data structures are stored in one or more return buffers. In some examples, 3D primitive 2932 command is used to perform vertex operations on 3D primitives via vertex shaders. To process vertex shaders, 3D pipeline 2922 dispatches shader execution threads to graphics processor execution units.
In some examples, 3D pipeline 2922 is triggered via an execute 2934 command or event. In some examples, a register write triggers command execution. In some examples execution is triggered via a ‘go’ or ‘kick’ command in the command sequence. In some examples, command execution is triggered using a pipeline synchronization command to flush the command sequence through the graphics pipeline. The 3D pipeline will perform geometry processing for the 3D primitives. Once operations are complete, the resulting geometric objects are rasterized and the pixel engine colors the resulting pixels. Additional commands to control pixel shading and pixel back end operations may also be included for those operations.
In some examples, the graphics processor command sequence 2910 follows the media pipeline 2924 path when performing media operations. In general, the specific use and manner of programming for the media pipeline 2924 depends on the media or compute operations to be performed. Specific media decode operations may be offloaded to the media pipeline during media decode. In some examples, the media pipeline can also be bypassed and media decode can be performed in whole or in part using resources provided by one or more general-purpose processing cores. In some examples, the media pipeline also includes elements for general-purpose graphics processor unit (GPGPU) operations, where the graphics processor is used to perform SIMD vector operations using computational shader programs that are not explicitly related to the rendering of graphics primitives.
In some examples, media pipeline 2924 is configured in a similar manner as the 3D pipeline 2922. A set of commands to configure the media pipeline state 2940 are dispatched or placed into a command queue before the media object commands 2942. In some examples, commands for the media pipeline state 2940 include data to configure the media pipeline elements that will be used to process the media objects. This includes data to configure the video decode and video encode logic within the media pipeline, such as encode or decode format. In some examples, commands for the media pipeline state 2940 also support the use of one or more pointers to “indirect” state elements that contain a batch of state settings.
In some examples, media object commands 2942 supply pointers to media objects for processing by the media pipeline. The media objects include memory buffers containing video data to be processed. In some examples, all media pipeline states must be valid before issuing a media object command 2942. Once the pipeline state is configured and media object commands 2942 are queued, the media pipeline 2924 is triggered via an execute command 2944 or an equivalent execute event (e.g., register write). Output from media pipeline 2924 may then be post processed by operations provided by the 3D pipeline 2922 or the media pipeline 2924. In some examples, GPGPU operations are configured and executed in a similar manner as media operations.
Program code may be applied to input information to perform the functions described herein and generate output information. The output information may be applied to one or more output devices, in known fashion. For purposes of this application, a processing system includes any system that has a processor, such as, for example, a digital signal processor (DSP), a microcontroller, an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a microprocessor, or any combination thereof.
The program code may be implemented in a high-level procedural or object-oriented programming language to communicate with a processing system. The program code may also be implemented in assembly or machine language, if desired. In fact, the mechanisms described herein are not limited in scope to any particular programming language. In any case, the language may be a compiled or interpreted language.
Examples of the mechanisms disclosed herein may be implemented in hardware, software, firmware, or a combination of such implementation approaches. Examples may be implemented as computer programs or program code executing on programmable systems comprising at least one processor, a storage system (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device.
Such machine-readable storage media may include, without limitation, non-transitory, tangible arrangements of articles manufactured or formed by a machine or device, including storage media such as hard disks, any other type of disk including floppy disks, optical disks, compact disk read-only memories (CD-ROMs), compact disk rewritables (CD-RWs), and magneto-optical disks, semiconductor devices such as read-only memories (ROMs), random access memories (RAMs) such as dynamic random access memories (DRAMs), static random access memories (SRAMs), erasable programmable read-only memories (EPROMs), flash memories, electrically erasable programmable read-only memories (EEPROMs), phase change memory (PCM), magnetic or optical cards, or any other type of media suitable for storing electronic instructions.
Accordingly, examples also include non-transitory, tangible machine-readable media containing instructions or containing design data, such as Hardware Description Language (HDL), which defines structures, circuits, apparatuses, processors and/or system features described herein. Such examples may also be referred to as program products.
In some cases, an instruction converter may be used to convert an instruction from a source instruction set architecture to a target instruction set architecture. For example, the instruction converter may translate (e.g., using static binary translation, dynamic binary translation including dynamic compilation), morph, emulate, or otherwise convert an instruction to one or more other instructions to be processed by the core. The instruction converter may be implemented in software, hardware, firmware, or a combination thereof. The instruction converter may be on processor, off processor, or part on and part off processor.
One or more aspects of at least some examples may be implemented by representative code stored on a machine-readable medium which represents and/or defines logic within an integrated circuit such as a processor. For example, the machine-readable medium may include instructions which represent various logic within the processor. When read by a machine, the instructions may cause the machine to fabricate the logic to perform the techniques described herein. Such representations, known as “IP cores,” are reusable units of logic for an integrated circuit that may be stored on a tangible, machine-readable medium as a hardware model that describes the structure of the integrated circuit. The hardware model may be supplied to various customers or manufacturing facilities, which load the hardware model on fabrication machines that manufacture the integrated circuit. The integrated circuit may be fabricated such that the circuit performs operations described in association with any of the examples described herein.
The RTL design 3115 or equivalent may be further synthesized by the design facility into a hardware model 3120, which may be in a hardware description language (HDL), or some other representation of physical design data. The HDL may be further simulated or tested to verify the IP core design. The IP core design can be stored for delivery to a 3rd party fabrication facility 3165 using non-volatile memory 3140 (e.g., hard disk, flash memory, or any non-volatile storage medium). Alternatively, the IP core design may be transmitted (e.g., via the Internet) over a wired connection 3150 or wireless connection 3160. The fabrication facility 3165 may then fabricate an integrated circuit that is based at least in part on the IP core design. The fabricated integrated circuit can be configured to perform operations in accordance with at least some examples described herein.
References to “some examples.” “an example,” etc., indicate that the example described may include a particular feature, structure, or characteristic, but every example may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same example. Further, when a particular feature, structure, or characteristic is described in connection with an example, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure, or characteristic in connection with other examples whether or not explicitly described.
Moreover, in the various examples described above, unless specifically noted otherwise, disjunctive language such as the phrase “at least one of A, B, or C” or “A, B, and/or C” is intended to be understood to mean either A, B, or C, or any combination thereof (i.e., A and B, A and C, B and C, and A, B and C).
The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. It will, however, be evident that various modifications and changes may be made thereunto without departing from the broader spirit and scope of the disclosure as set forth in the claims.