The present invention relates to computer processors. More specifically, the present invention relates to a system and method for processing compiled object code to help reduce memory latency-related delays and, therefore, improve the speed with which the object code can be processed.
As processors become ever faster, increasingly the bottleneck restricting processing throughput is the speed—or lack thereof—of computer memory in responding to processor directives. This “memory latency” is a very serious problem, because processors process instructions and data much faster than these instructions and data can be retrieved from memory. Today, the speed with which microprocessors can process instructions commonly is rated in gigahertz. Unfortunately, overall system performance is hamstrung by motherboards operating between one hundred and three hundred megahertz, i.e., almost an order of magnitude slower.
To make matters worse, the disparity between the speed of processor clocks and memory clocks is growing. Currently, the ratio of processor clock speed to memory clock speed typically is 8:1, but that ratio is predicted to increase to 100:1 in the next few years. Compounding the problem is the fact that a memory system may require ten or more of its own memory clock cycles to respond to a memory retrieval request, thus, the ratio for a complete memory cycle is far worse. Today, completion of one full memory cycle may result in the waste of hundreds of processing cycles. In the near future, based on current performance trends in microprocessors, completion of a memory cycle may result in the waste of thousands of processing cycles.
To help reduce delays caused by memory latency, processors incorporate an execution pipeline. In the execution pipeline, a sequence of instructions to be executed are queued to avoid the interminable memory retrieval delays that would result if each instruction were retrieved from memory one at a time. However, if the wrong instructions and/or data have been loaded into the pipeline, the processor will fall idle while the wrong instructions are cleared and replaced with the correct instructions.
If the processor has not reached the end of the instructions queued in the execution pipeline, delays still may result when conditional branch instructions are encountered. A typical CPU may sequentially load a range of instructions from memory in the order they appear, ignoring the possibility that a conditional branch instruction in that range could redirect processing to a different set of instructions.
In the situation depicted in
On the other hand,
The taking of an unexpected branch 160 may result in a significantly longer processor idle interval than the processor reaching the end of the queued instructions at 150. If the processor reaches the end of the queued instructions, the next needed instructions may be in the process of being fetched to the execution pipeline. If the instructions are in the process of being retrieved, only a few processor cycles might remain before the instructions reach the execution pipeline. However, if an unexpected branch is taken as at 160, the retrieval of the next instructions starts anew, and hundreds of processor cycles might pass before the next instructions reach the execution pipeline.
To avoid processing delays resulting from unexpected branching, techniques such as branch speculation and prediction have been devised. With reference to
If the correct educated guess is made, the effect is the same as if the instructions in sequence were loaded ignoring any possible branches, as shown in
Prediction is a technique which exploits multiscalar or superscalar processors. A multiscalar processor includes multiple functional units which provides independent execution slots to simultaneously and independently process different, short word instructions. Using prediction, a multiscalar processor can simultaneously execute both eventualities of an IF-THEN-ELSE-type instruction, making the outcome of each available without having to wait the time required for the sequential execution of both eventualities. Based on the parallel processing of instructions, the execution pipeline can be kept filled for more than one branch possibility. “Very Long Instruction Word” processing methodologies, such as Expressly Parallel Instruction Computing (“EPIC”) devised by Intel and Hewlett-Packard, are designed to take advantage of multiscalar processors in this manner. The EPIC methodology relies on the compiler to detect such potential parallelism and generated object code to exploit multiscalar processing.
Prediction, too, has many limitations. Of course, if available processing parallelism is not detected, prediction simply will not be used. In addition, if the instructions are long word instructions such that a single instruction consumes all of the available functional units, there can be no parallel processing, and, thus, no prediction. Alternatively, because a string of conditional branches potentially can invoke many different possible branches, the possibility remains that instructions might be loaded into the execution pipeline for an incorrect branch. In such a case, the result would be that as illustrated in
In sum, the object of branch speculation, and/or prediction is to avoid wasting processor by filling the execution pipeline with instructions are most likely to be needed as a result of a conditional branch or with parallel sets instructions to allow for multiple conditional branch outcomes, respectively. However, even if speculation or prediction help to fill the execution pipeline with the appropriate instructions, those instructions might invoke other branches, routine calls, or data references, which may not be resolved until the processor actually processes the instruction. This would result in memory latency delays even when branch speculation or prediction work as intended.
For example, referring to
Cache memory may avoid some of these delays by reducing the time required to retrieve information from memory by transferring portions of the contents of memory into fast memory devices disposed on the microprocessor itself (level one cache) or directly coupled to the microprocessor (level two cache). Typically, the processor can retrieve data from level two cache usually in half the time it can retrieve data from main memory, and in one-third or even one-sixth the time it would take to retrieve the same data from main memory. When a processor calls for instructions or data from memory, other information stored nearby in memory also are transferred to cache memory because it is very common for a large percentage of the work done by a particular program or routine to be performed by programming loops manifested in localized groups of instructions.
However, the use of cache memory does not completely solve the memory latency problem. Unless the desired data happens to be present in cache, the presence of cache memory saves no time at all. Cache memory has only a small fraction of the capacity of main memory, therefore, it can store only a fraction of the data stored in main memory. Should the processor call for data beyond the limited range of data transferred to cache, the data will have to be retrieved from memory, again leaving the processor idle for tens or hundreds of cycles while the relevant memory pages are fetched.
What is needed is a way to help expedite the retrieval of memory pages from memory into the execution pipeline to avoid or reduce memory latency delays. It is to improving this process that the present invention is directed.
One aspect of the invention provides a method for processing programming instructions by an instruction processor. The method includes loading a reference table having at least one reference and an associated memory address. The reference table is associated with a group of programming instructions. The method further includes identifying programming instructions of the group having invocation of a reference in the reference table. Prior to processing a programming instruction having an invocation, retrieval of information corresponding to the respective associated memory address is initiated in response to identifying the invocation. The programming instruction having the invocation is then processed.
Another aspect of the invention provides a method for retrieving data referenced by an address reference invoked by a programming instruction queued for execution in an execution pipeline from a memory system. The method includes receiving a reference table having an entry for a memory address corresponding to the address reference. The reference table is associated with a segment of programming instructions including the programming instruction invoking the address reference. The method further includes identifying the address reference in the execution pipeline and initiating retrieval of contents stored at the corresponding memory address.
Another aspect of the invention provides a method for retrieving information identified by address references invoked by programming instructions loaded in an instruction queue. The method includes receiving a reference table having entries for memory addresses corresponding to respective address references. Prior to processing, programming instructions loaded in the instruction queue are parsed for programming instructions invoking an address reference. In response to finding a programming instruction invoking an address reference, retrieval of the contents of the memory address entered in the reference table corresponding to the invoked address reference is initiated.
Another aspect of the invention provides a system for processing programming instructions. The system includes an execution pipeline cache operable to queue programming instructions and a memory controller operable to retrieve information corresponding to a memory address. The system further includes a memory management processor coupled to the execution pipeline cache and the memory controller. The memory management processor includes a reference table buffer operable to store a reference table having at least one reference and an associated memory address. The reference table is associated with a segment of programming instructions. The memory management processor is operable to identify programming instructions of the segment that are queued in the execution pipeline cache that have invocation of a reference in the reference table. The memory management processor is further operable to control the memory controller to initiate retrieval of information corresponding to the respective associated memory address in response to identifying the invocation prior to the processing of a programming instruction having an invocation. An instruction processor coupled to the execution pipeline cache and memory management processor is operable to process the programming instruction having the invocation.
It should be noted that the preferred embodiment of a system and method of the present invention are equally applicable both to programs created high-level language source code and assembly language source code. Throughout this description, the term compiler will be used, but it can be taken to mean a compiler or an assembler. Similarly, while functional blocks of programming are referred to as routines, the term routines can be taken to mean routines, subroutines, procedures, or other similar programming segments.
When instructions or other information are sought by the instruction processor 304 or other devices, the requests are passed across the internal bus 320 to a memory controller 324. The memory controller 324 controls the operation of the on-board level 1 cache 328, the level 2 cache controller 332, and the bus interface controller 336 through an internal memory bus 340. The memory controller 324 receives requests for instructions or other data, and determines whether the requested information is resident in cache or whether it must be retrieved from elsewhere in the system 352. For information not resident in level 1 cache 328, if it is resident in level 2 cache 344, the level 2 cache controller retrieves it through a level 2 cache channel 348. For information not resident in either level 1 cache 328 or level 2 cache 344, the bus interface controller 336 seeks the requested information from the system 352 via the processor bus 356. It will be appreciated that the processor architecture depicted in
The central processing unit 300 includes an embodiment of the memory management processor 360 of the present invention. The memory management processor 360 is coupled with the execution pipeline 312 and the internal bus 320. So coupled, the memory management processor 360 can exploit a reference table contained within object code. The preparation of a suitable reference table is described in filed U.S. patent application Ser. No. 10/192,923 by Klein entitled “METHOD AND SYSTEM FOR GENERATING OBJECT CODE TO FACILITATE PREDICTIVE MEMORY RETRIEVAL.” In a preferred embodiment, and as further described below, the reference table will be indicated by a signature which will signify to the memory controller 324 that the reference table should be routed to the memory management processor 360. In a preferred embodiment, the memory management processor 360 will incorporate a reference table buffer (not shown) to store reference tables as they are received via the internal bus 320. As the object code for new programs or new routines are received by the central processing unit 300, the memory controller 324 can route any new or additional reference tables to the memory management processor 360.
If no references have yet been retrieved, the memory management processor 360 (
Returning to
After the jump instruction 512, which is ignored by a computing system equipped with an embodiment of the present invention, a signature 516 identifies to an embodiment of the present invention that this is a suitable reference table 508. The first substantive entry in the reference table 520 is “DDW OFFSET JUMP1,” which reserves a double data word at an offset position within the table for the reference JUMP1. JUMP1 is a reference invoked by a first conditional branch instruction 524 appearing in the instruction section 504 of the routine 500. This branch reference is identified by a compiler designed to take advantage of embodiments of the present invention. Accordingly, for the reference JUMP1 in the table 508, an address space a double data word in length is reserved in the table at 520. Similarly, the table entry 528 is to reserve in the table 508 a double data word address space for JUMP2, a reference invoked by a second conditional branch instruction 532 in the instructions 504. Appearing next in the table 508 is an entry 536 reserving a double data word address space for dataref, which is a data reference made by instruction 540. Next, table entry 544 reserves a double data word address space for CALL1, which is the address of a routine call invoked by CALL instruction 548. The last table entry 552 is a final double data word table entry for JUMP3, the address of a branch address invoked in the last conditional branch instruction 556.
There are three things to note about this table 508. First, the double data word designation appears because, in the system for which the routine 500 has been compiled, the system has an address range defined by an address a double data word in size. Second, the designation OFFSET signifies that the address to be entered is an offset address, not an absolute address. As is known in the art, the designation offset allows the program, as it is being loaded into memory, to resolve offset addresses relative to an initial address. As a result, this program can be loaded anywhere in the system's memory.
Third, this table 508 is what is stored in a reference table buffer in a memory management processor 360 (
Similarly, for example, upon parsing the execution pipeline 312 (
In fact, if a sufficient number of processing cycles pass between the time the memory management processor 360 (
It is to be understood that, even though various embodiments and advantages of the present invention have been set forth in the foregoing description, the above disclosure is illustrative only. Changes may be made in detail, and yet remain within the broad principles of the invention. For example, a memory management processor could be external to the central processor, where it could receive and parse instructions before they reach the processor. This and other embodiments could make use of and fall within the principles of the invention.
This application is a continuation of U.S. patent application Ser. No. 12/361,400, filed Jan. 28, 2009, which is a continuation of U.S. patent application Ser. No. 11/240,099 filed Sep. 30, 2005, U.S. Pat. No. 7,490,210, which is a continuation of U.S. patent application Ser. No. 10/192,957, filed Jul. 11, 2002, U.S. Pat. No. 6,954,836. These applications and patents are incorporated by reference herein in their entirety and for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
4205370 | Hirtle | May 1980 | A |
4734852 | Johnson et al. | Mar 1988 | A |
4763245 | Emma et al. | Aug 1988 | A |
4853840 | Shibuya | Aug 1989 | A |
4984154 | Hanatani et al. | Jan 1991 | A |
5201039 | Sakamura | Apr 1993 | A |
5327562 | Adcock | Jul 1994 | A |
5339431 | Rupp et al. | Aug 1994 | A |
5367703 | Levitan | Nov 1994 | A |
5381548 | Matsuo | Jan 1995 | A |
5442756 | Grochowski et al. | Aug 1995 | A |
5454117 | Puziol et al. | Sep 1995 | A |
5528750 | Lubart et al. | Jun 1996 | A |
5588137 | Yoneda et al. | Dec 1996 | A |
5659752 | Heisch et al. | Aug 1997 | A |
5659753 | Murphy et al. | Aug 1997 | A |
5671416 | Elson | Sep 1997 | A |
5680622 | Even | Oct 1997 | A |
5701490 | Safonov | Dec 1997 | A |
5836014 | Faiman, Jr. | Nov 1998 | A |
5848269 | Hara | Dec 1998 | A |
5875325 | Talcott | Feb 1999 | A |
5920722 | Damron | Jul 1999 | A |
5935241 | Shiell et al. | Aug 1999 | A |
5978587 | Baisley et al. | Nov 1999 | A |
6016547 | Ono | Jan 2000 | A |
6047362 | Zucker | Apr 2000 | A |
6049667 | Bates | Apr 2000 | A |
6081887 | Steely, Jr. et al. | Jun 2000 | A |
6094729 | Mann | Jul 2000 | A |
6199202 | Coutant et al. | Mar 2001 | B1 |
6292866 | Zaiki et al. | Sep 2001 | B1 |
6292934 | Davidson et al. | Sep 2001 | B1 |
6317872 | Gee et al. | Nov 2001 | B1 |
6351848 | Chessin | Feb 2002 | B1 |
6457174 | Kuroda et al. | Sep 2002 | B1 |
6463523 | Kessler et al. | Oct 2002 | B1 |
6467035 | Tate et al. | Oct 2002 | B2 |
6490658 | Ahmed et al. | Dec 2002 | B1 |
RE38104 | Gosling | Apr 2003 | E |
6564313 | Kashyap | May 2003 | B1 |
6678817 | Dua et al. | Jan 2004 | B1 |
6697971 | Dwyer | Feb 2004 | B1 |
6704858 | Sugimoto | Mar 2004 | B1 |
6766443 | Sinharoy | Jul 2004 | B2 |
6807548 | Kemper | Oct 2004 | B1 |
6823446 | Sinharoy | Nov 2004 | B1 |
6907520 | Parady | Jun 2005 | B2 |
6931504 | Wolczoko et al. | Aug 2005 | B2 |
6954836 | Klein | Oct 2005 | B2 |
7024663 | Klein | Apr 2006 | B2 |
7152229 | Chong et al. | Dec 2006 | B2 |
7165169 | Henry et al. | Jan 2007 | B2 |
7203925 | Michael et al. | Apr 2007 | B1 |
7490210 | Klein | Feb 2009 | B2 |
7657723 | Klein | Feb 2010 | B2 |
20020091915 | Parady | Jul 2002 | A1 |
20020194464 | Henry et al. | Dec 2002 | A1 |
20020194465 | Sinharoy | Dec 2002 | A1 |
20030159128 | Kunzler | Aug 2003 | A1 |
20040010777 | Klein | Jan 2004 | A1 |
20060031822 | Klein | Feb 2006 | A1 |
20060130023 | Klein | Jun 2006 | A1 |
20110055527 | Klein | Mar 2011 | A1 |
Entry |
---|
Jacob B.L. et al., “A Look at Several Memory Management Units, TLB-Refill Mechanisms, and Page Table Organizations”, University of Maryland, University of Michigan, ACM, 1998. pp. 295-306. |
Jong, G. et al., “Background Memory Management for Dynamic Data Structure Intensive Processing Systems”, IEEE, 1995. pp. 515-520. |
Appel, Andrew W. et al., “Virtual Memory Primitives for User Programs”, [Online], ACM 1991, pp. 96-107, [Retrieved from Internet on Jun. 9, 2015], <https://delivery.acm.org/10.1145/110000/106984/p96-appel.pdf>. |
Davidson, Jack et al., “Code Selection through Object Code Optimization”, [Online], Nov. 1984, pp. 505-526, [Retrieved from Internet on Feb. 6, 2013], <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.140.2150&rep=rep1&type=pdf>. |
Egger, Bernhard et al., “Scratchpad Memory Management for Portable Systems with a Memory Management Unit”, [Online], 2006, pp. 321-330, [Retrieved from Internet on Jun. 9, 2015], <http://delivery.acm.org/10.1145/1180000/1176933/p321-egger.pdf>. |
Gao, Hongliang et al., “Address-Branch Correlation: A Novel Locality for Long-Latency Hard-to-Predict Branches”, [Onlin], IEEE 2008, pp. 74-85, [Retrieved from Internet on Feb. 6, 2013], <http://www.eecs.ucf.edu/˜zhou/hpca08—ieee.pfd>. |
Jimenez, Daniel, “Code Placement for Improving Dynamic Branch Prediction Accuracy”, [Online], ACM 2005, pp. 1-10, [Retrieved from Internet on Feb. 6, 2013], <http://pdf.aminer.org/000/542/659/code—placement—for—improving—dynamic—branch—prediction—accuracy.pdf>. |
Milenkovic, Milena et al., “Using Instruction Block Signatures to Counter Code Injection Attacks”, ACM SIGARCH Computer Architecture News, vol. 33, No. 1, Mar. 2005 |
Teller, Patricia J., “Translation-Lookaside Buffer Consistency”, [Online], IEEE 1990, pp. 26-36, [Retrieved from Internet on Jun. 9, 2015], <https://cs.uwaterloo.ca/˜brecht/courses/702/Possible- Readings/multiprocessor/tlb-consistency-computer-1990.pdf>. |
Number | Date | Country | |
---|---|---|---|
20100115221 A1 | May 2010 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12361400 | Jan 2009 | US |
Child | 12685477 | US | |
Parent | 11240099 | Sep 2005 | US |
Child | 12361400 | US | |
Parent | 10192957 | Jul 2002 | US |
Child | 11240099 | US |