Roadmap. Java: Assembly language: OS: Machine code: Computer system:

Similar documents
Computer Systems CSE 410 Autumn Memory Organiza:on and Caches

Caches Spring 2016 May 4: Caches 1

Lecture 15: Caches and Optimization Computer Architecture and Systems Programming ( )

Systems Programming and Computer Architecture ( ) Timothy Roscoe

Roadmap. Java: Assembly language: OS: Machine code: Computer system:

CS 240 Stage 3 Abstractions for Practical Systems

Problem: Processor Memory BoJleneck

Agenda Cache memory organization and operation Chapter 6 Performance impact of caches Cache Memories

Today. Cache Memories. General Cache Concept. General Cache Organization (S, E, B) Cache Memories. Example Memory Hierarchy Smaller, faster,

Cache Memories /18-213/15-513: Introduction to Computer Systems 12 th Lecture, October 5, Today s Instructor: Phil Gibbons

CS241 Computer Organization Spring Principle of Locality

Denison University. Cache Memories. CS-281: Introduction to Computer Systems. Instructor: Thomas C. Bressoud

Today Cache memory organization and operation Performance impact of caches

Problem: Processor- Memory Bo<leneck

Cache memories are small, fast SRAM based memories managed automatically in hardware.

Caches III CSE 351 Spring

General Cache Mechanics. Memory Hierarchy: Cache. Cache Hit. Cache Miss CPU. Cache. Memory CPU CPU. Cache. Cache. Memory. Memory

+ Random-Access Memory (RAM)

Caches III. CSE 351 Spring Instructor: Ruth Anderson

CS3350B Computer Architecture

Locality. CS429: Computer Organization and Architecture. Locality Example 2. Locality Example

Cache Memories. From Bryant and O Hallaron, Computer Systems. A Programmer s Perspective. Chapter 6.

Caches II CSE 351 Spring #include <yoda.h> int is_try(int do_flag) { return!(do_flag!do_flag); }

Kathryn Chan, Kevin Bi, Ryan Wong, Waylon Huang, Xinyu Sui

The Hardware/So<ware Interface CSE351 Winter 2013

Memory Hierarchy. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

Types of Cache Misses. The Hardware/So<ware Interface CSE351 Winter Cache Read. General Cache OrganizaJon (S, E, B) Memory and Caches II

Cache memories are small, fast SRAM-based memories managed automatically in hardware. Hold frequently accessed blocks of main memory

211: Computer Architecture Summer 2016

Carnegie Mellon. Cache Memories

Caches III. CSE 351 Winter Instructor: Mark Wyse

CS 33. Caches. CS33 Intro to Computer Systems XVIII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.

Cache Memories. Topics. Next time. Generic cache memory organization Direct mapped caches Set associative caches Impact of caches on performance

How to Write Fast Numerical Code

Read-only memory (ROM): programmed during production Programmable ROM (PROM): can be programmed once SRAM (Static RAM)

Caches II. CSE 351 Autumn Instructor: Justin Hsia

How to Write Fast Numerical Code

Carnegie Mellon. Cache Memories. Computer Architecture. Instructor: Norbert Lu1enberger. based on the book by Randy Bryant and Dave O Hallaron

Carnegie Mellon. Cache Lab. Recitation 7: Oct 11 th, 2016

Last class. Caches. Direct mapped

Cache Memories. Andrew Case. Slides adapted from Jinyang Li, Randy Bryant and Dave O Hallaron

Virtual Memory I. CSE 351 Spring Instructor: Ruth Anderson

Cache Memories : Introduc on to Computer Systems 12 th Lecture, October 6th, Instructor: Randy Bryant.

Memory hierarchies: caches and their impact on the running time

Page 1. Multilevel Memories (Improving performance using a little cash )

Memory Hierarchy. Computer Systems Organization (Spring 2017) CSCI-UA 201, Section 3. Instructor: Joanna Klukowska

Lecture 12. Memory Design & Caches, part 2. Christos Kozyrakis Stanford University

CMPSC 311- Introduction to Systems Programming Module: Caching

Memory Hierarchy. Cache Memory Organization and Access. General Cache Concept. Example Memory Hierarchy Smaller, faster,

Memory Management! How the hardware and OS give application pgms:" The illusion of a large contiguous address space" Protection against each other"

Cache Memories October 8, 2007

Caches III. CSE 351 Autumn Instructor: Justin Hsia

Memory Management. Goals of this Lecture. Motivation for Memory Hierarchy

F28HS Hardware-Software Interface: Systems Programming

Computer Architecture and System Software Lecture 09: Memory Hierarchy. Instructor: Rob Bergen Applied Computer Science University of Winnipeg

Memory Management! Goals of this Lecture!

Random-Access Memory (RAM) Systemprogrammering 2007 Föreläsning 4 Virtual Memory. Locality. The CPU-Memory Gap. Topics

Random-Access Memory (RAM) Systemprogrammering 2009 Föreläsning 4 Virtual Memory. Locality. The CPU-Memory Gap. Topics! The memory hierarchy

CS 33. Architecture and Optimization (3) CS33 Intro to Computer Systems XVI 1 Copyright 2018 Thomas W. Doeppner. All rights reserved.

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 26, FALL 2012

Why memory hierarchy? Memory hierarchy. Memory hierarchy goals. CS2410: Computer Architecture. L1 cache design. Sangyeun Cho

CSE 431 Computer Architecture Fall Chapter 5A: Exploiting the Memory Hierarchy, Part 1

Computer Systems. Memory Hierarchy. Han, Hwansoo

CISC 360. Cache Memories Nov 25, 2008

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 26, SPRING 2013

CMPSC 311- Introduction to Systems Programming Module: Caching

Cache Memories. EL2010 Organisasi dan Arsitektur Sistem Komputer Sekolah Teknik Elektro dan Informatika ITB 2010

Memory Hierarchy. Announcement. Computer system model. Reference

Cache Wrap Up, System Control Flow

Example. How are these parameters decided?

CS161 Design and Architecture of Computer Systems. Cache $$$$$

Giving credit where credit is due

CS 61C: Great Ideas in Computer Architecture. Direct Mapped Caches

CISC 360. The Memory Hierarchy Nov 13, 2008

CS 261 Fall Caching. Mike Lam, Professor. (get it??)

CSCI-UA.0201 Computer Systems Organization Memory Hierarchy

Roadmap. Java: Assembly language: OS: Machine code: Computer system:

Giving credit where credit is due

The Memory Hierarchy /18-213/15-513: Introduction to Computer Systems 11 th Lecture, October 3, Today s Instructor: Phil Gibbons

Virtual Memory I. CSE 351 Winter Instructor: Mark Wyse

CS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2014 Lecture 14

Advanced Memory Organizations

Caches Concepts Review

Caches II. CSE 351 Spring Instructor: Ruth Anderson

Chapter 5. Large and Fast: Exploiting Memory Hierarchy

Chapter 5. Large and Fast: Exploiting Memory Hierarchy

Random-Access Memory (RAM) Lecture 13 The Memory Hierarchy. Conventional DRAM Organization. SRAM vs DRAM Summary. Topics. d x w DRAM: Key features

LECTURE 11. Memory Hierarchy

Random-Access Memory (RAM) CISC 360. The Memory Hierarchy Nov 24, Conventional DRAM Organization. SRAM vs DRAM Summary.

Cache Lab Implementation and Blocking

Memory Hierarchies &

CS3350B Computer Architecture

Chapter 6 Caches. Computer System. Alpha Chip Photo. Topics. Memory Hierarchy Locality of Reference SRAM Caches Direct Mapped Associative

Key features. ! RAM is packaged as a chip.! Basic storage unit is a cell (one bit per cell).! Multiple RAM chips form a memory.

Introduction to OpenMP. Lecture 10: Caches

Memory Hierarchy. Instructor: Adam C. Champion, Ph.D. CSE 2431: Introduction to Operating Systems Reading: Chap. 6, [CSAPP]

Plot SIZE. How will execution time grow with SIZE? Actual Data. int array[size]; int A = 0;

Foundations of Computer Systems

Donn Morrison Department of Computer Science. TDT4255 Memory hierarchies

CS356: Discussion #9 Memory Hierarchy and Caches. Marco Paolieri Illustrations from CS:APP3e textbook

Transcription:

Roadmap C: car *c = malloc(sizeof(car)); c->miles = 100; c->gals = 17; float mpg = get_mpg(c); free(c); Assembly language: Machine code: get_mpg: pushq movq... popq ret %rbp %rsp, %rbp %rbp 0111010000011000 100011010000010000000010 1000100111000010 110000011111101000011111 Java: Car c = new Car(); c.setmiles(100); c.setgals(17); float mpg = c.getmpg(); OS: Memory & data Integers & floats Machine code & C x86 assembly Procedures & stacks Arrays & structs Memory & caches Processes Virtual memory Memory allocation Java vs. C Computer system: 1

How does execution time grow with SIZE? int array[size]; int A = 0; for (int i = 0 ; i < 200000 ; ++ i) { for (int j = 0 ; j < SIZE ; ++ j) { A += array[j]; } } TIME Plot SIZE 2

Time University of Washington Actual Data SIZE 3

Making memory accesses fast! Cache basics Principle of locality Memory hierarchies Cache organization Program optimizations that consider caches 4

Problem: Processor-Memory Bottleneck Processor performance doubled about every 18 months CPU Reg Bus bandwidth evolved much slower Main Memory Core 2 Duo: Can process at least 256 Bytes/cycle Core 2 Duo: Bandwidth 2 Bytes/cycle Latency 100 cycles cycle = single fixed-time machine step Problem: lots of waiting on memory 5

Problem: Processor-Memory Bottleneck Processor performance doubled about every 18 months CPU Reg Cache Bus bandwidth evolved much slower Main Memory Core 2 Duo: Can process at least 256 Bytes/cycle Core 2 Duo: Bandwidth 2 Bytes/cycle Latency 100 cycles cycle = single fixed-time machine step Solution: caches 6

Cache English definition: a hidden storage space for provisions, weapons, and/or treasures CSE definition: computer memory with short access time used for the storage of frequently or recently used instructions or data (i-cache and d-cache) more generally, used to optimize data transfers between system elements with different characteristics (network interface cache, I/O cache, etc.) 7

General Cache Mechanics Cache 7 9 14 3 Smaller, faster, more expensive memory. Caches a subset of the blocks (a.k.a. lines) Data is copied in block-sized transfer units Memory 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Larger, slower, cheaper memory. Viewed as partitioned into blocks or lines 8

General Cache Concepts: Hit Request: 14 Data in block b is needed Cache 7 9 14 3 Block b is in cache: Hit! Memory 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 9

General Cache Concepts: Miss Cache Request: 12 7 12 9 14 3 Data in block b is needed Block b is not in cache: Miss! 12 Request: 12 Block b is fetched from memory Memory 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Block b is stored in cache Placement policy: determines where b goes Replacement policy: determines which block gets evicted (victim) 10

Why Caches Work Locality: Programs tend to use data and instructions with addresses near or equal to those they have used recently 11

Why Caches Work Locality: Programs tend to use data and instructions with addresses near or equal to those they have used recently Temporal locality: Recently referenced items are likely to be referenced again in the near future block Why is this important? 12

Why Caches Work Locality: Programs tend to use data and instructions with addresses near or equal to those they have used recently Temporal locality: Recently referenced items are likely to be referenced again in the near future block Spatial locality? 13

Why Caches Work Locality: Programs tend to use data and instructions with addresses near or equal to those they have used recently Temporal locality: Recently referenced items are likely to be referenced again in the near future Spatial locality: Items with nearby addresses tend to be referenced close together in time block block How do caches take advantage of this? 14

Example: Any Locality? sum = 0; for (i = 0; i < n; i++) sum += a[i]; return sum; 15

Example: Any Locality? sum = 0; for (i = 0; i < n; i++) sum += a[i]; return sum; Data: Temporal: sum referenced in each iteration Spatial: array a[] accessed in stride-1 pattern Instructions: Temporal: cycle through loop repeatedly Spatial: reference instructions in sequence Being able to assess the locality of code is a crucial skill for a programmer 16

Locality Example #1 int sum_array_rows(int a[m][n]) { int i, j, sum = 0; } for (i = 0; i < M; i++) for (j = 0; j < N; j++) sum += a[i][j]; return sum; a[0][0] a[0][1] a[0][2] a[0][3] a[1][0] a[1][1] a[1][2] a[1][3] a[2][0] a[2][1] a[2][2] a[2][3] 17

Locality Example #1 int sum_array_rows(int a[m][n]) { int i, j, sum = 0; } a [0] [0] for (i = 0; i < M; i++) for (j = 0; j < N; j++) sum += a[i][j]; return sum; Layout in Memory a [0] [1] a [0] [2] a [0] [3] a 5 a [1] [1] [0] [1] a [1] [2] a [1] [3] 76 92 108 76 is just one possible starting address of array a a a 0 5 a [2] [2] [2] [0] [1] [2] a [2] [3] M = 3, N=4 a[0][0] a[0][1] a[0][2] a[0][3] a[1][0] a[1][1] a[1][2] a[1][3] a[2][0] a[2][1] a[2][2] a[2][3] Order Accessed 1: a[0][0] 2: a[0][1] 3: a[0][2] 4: a[0][3] 5: a[1][0] 6: a[1][1] 7: a[1][2] 8: a[1][3] 9: a[2][0] 10: a[2][1] 11: a[2][2] 12: a[2][3] stride-1 18

Locality Example #2 int sum_array_cols(int a[m][n]) { int i, j, sum = 0; } for (j = 0; j < N; j++) for (i = 0; i < M; i++) sum += a[i][j]; return sum; a[0][0] a[0][1] a[0][2] a[0][3] a[1][0] a[1][1] a[1][2] a[1][3] a[2][0] a[2][1] a[2][2] a[2][3] 19

Locality Example #2 int sum_array_cols(int a[m][n]) { int i, j, sum = 0; } a [0] [0] for (j = 0; j < N; j++) for (i = 0; i < M; i++) sum += a[i][j]; return sum; Layout in Memory a [0] [1] a [0] [2] a [0] [3] a 5 a [1] [1] [0] [1] a [1] [2] a [1] [3] 76 92 108 a a 0 5 a [2] [2] [2] [0] [1] [2] a [2] [3] M = 3, N=4 a[0][0] a[0][1] a[0][2] a[0][3] a[1][0] a[1][1] a[1][2] a[1][3] a[2][0] a[2][1] a[2][2] a[2][3] Order Accessed 1: a[0][0] 2: a[1][0] 3: a[2][0] 4: a[0][1] 5: a[1][1] 6: a[2][1] 7: a[0][2] 8: a[1][2] 9: a[2][2] 10: a[0][3] 11: a[1][3] 12: a[2][3] stride-n 20

Locality Example #3 int sum_array_3d(int a[m][n][l]) { int i, j, k, sum = 0; } for (i = 0; i < N; i++) for (j = 0; j < L; j++) for (k = 0; k < M; k++) sum += a[k][i][j]; return sum; What is wrong with this code? How can it be fixed? 21

Locality Example #3 int sum_array_3d(int a[m][n][l]) { int i, j, k, sum = 0; } for (i = 0; i < N; i++) for (j = 0; j < L; j++) for (k = 0; k < M; k++) sum += a[k][i][j]; return sum; What is wrong with this code? How can it be fixed? Layout in Memory (for M =?, N = 3, L=4) a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a [0] [0] [0] [0] [0] [0] [0] [0] [0] [0] [0] [0][1] [1] [1] [1] [1] [1] [1] [1] [1] [1] [1] [1][2] [2] [2] [2] [2] [2] [2] [2] [2] [2] [2] [2] 5 0 5 [0] [0] [0] [0] [1] 5 0 5 [1] [1] [1] [2] [2] [2] [2][0] [0] [0] [0] [1] [1] [1] [1] [2] [2] [2] [2][0] [0] [0] [0] [1] 5 0 5 [1] [1] [1] [2] [2] [2] [2] [0] [1] [2] [3] [0] [1] [2] [3] [0][1] [2] [3][0] [1] [2] [3] [0] [1] [2] [3] [0][1] [2] [3][0] [1] [2] [3] [0] [1] [2] [3] [0][1] [2] [3] 76 92 108 22

Making memory accesses fast! Cache basics Principle of locality Memory hierarchies Cache organization Program optimizations that consider caches 23

Cost of Cache Misses Huge difference between a hit and a miss Could be 100x, if just L1 and main memory Would you believe 99% hits is twice as good as 97%? Consider: Cache hit time of 1 cycle Miss penalty of 100 cycles cycle = single fixed-time machine step 24

Cost of Cache Misses Huge difference between a hit and a miss Could be 100x, if just L1 and main memory Would you believe 99% hits is twice as good as 97%? Consider: Cache hit time of 1 cycle Miss penalty of 100 cycles Average access time: check the cache every time 97% hits: 1 cycle + 0.03 * 100 cycles = 4 cycles 99% hits: 1 cycle + 0.01 * 100 cycles = 2 cycles cycle = single fixed-time machine step This is why miss rate is used instead of hit rate 25

Cache Performance Metrics Miss Rate Fraction of memory references not found in cache (misses / accesses) = 1 - hit rate Typical numbers (in percentages): 3% - 10% for L1 Can be quite small (e.g., < 1%) for L2, depending on size, etc. Hit Time Time to deliver a line in the cache to the processor Includes time to determine whether the line is in the cache Typical hit times: 4 clock cycles for L1; 10 clock cycles for L2 Miss Penalty Additional time required because of a miss Typically 50-200 cycles for missing in L2 & going to main memory (Trend: increasing!) 26

Can we have more than one cache? Why would we want to do that? 27

Memory Hierarchies Some fundamental and enduring properties of hardware and software systems: Faster storage technologies almost always cost more per byte and have lower capacity The gaps between memory technology speeds are widening True for: registers cache, cache DRAM, DRAM disk, etc. Well-written programs tend to exhibit good locality These properties complement each other beautifully They suggest an approach for organizing memory and storage systems known as a memory hierarchy 28

An Example Memory Hierarchy Smaller, faster, costlier per byte registers on-chip L1 cache (SRAM) off-chip L2 cache (SRAM) CPU registers hold words retrieved from L1 cache L1 cache holds cache lines retrieved from L2 cache L2 cache holds cache lines retrieved from main memory Larger, slower, cheaper per byte main memory (DRAM) local secondary storage (local disks) remote secondary storage (distributed file systems, web servers) Main memory holds disk blocks retrieved from local disks Local disks hold files retrieved from disks on remote network servers 29

An Example Memory Hierarchy Smaller, faster, costlier per byte registers on-chip L1 cache (SRAM) off-chip L2 cache (SRAM) explicitly program-controlled (e.g. refer to exactly %rax, %rbx) program sees memory ; hardware manages caching transparently Larger, slower, cheaper per byte main memory (DRAM) local secondary storage (local disks) remote secondary storage (distributed file systems, web servers) 30

Memory Hierarchies Fundamental idea of a memory hierarchy: For each level k, the faster, smaller device at level k serves as a cache for the larger, slower device at level k+1. Why do memory hierarchies work? Because of locality, programs tend to access the data at level k more often than they access the data at level k+1. Thus, the storage at level k+1 can be slower, and thus larger and cheaper per bit. Big Idea: The memory hierarchy creates a large pool of storage that costs as much as the cheap storage near the bottom, but that serves data to programs at the rate of the fast storage near the top. 31

Intel Core i7 Cache Hierarchy Processor package Core 0 Regs Core 3 Regs L1 i-cache and d-cache: 32 KB, 8-way, Access: 4 cycles L1 d-cache L1 i-cache L1 d-cache L1 i-cache L2 unified cache: 256 KB, 8-way, Access: 11 cycles L2 unified cache L2 unified cache L3 unified cache: 8 MB, 16-way, Access: 30-40 cycles L3 unified cache (shared by all cores) Block size: 64 bytes for all caches. Main memory 32

Making memory accesses fast! Cache basics Principle of locality Memory hierarchies Cache organization Program optimizations that consider caches 33

Cache Organization Where should data go in the cache? We need a mapping from memory addresses to specific locations in the cache to make checking the cache for an address fast Otherwise each memory access requires searching the entire cache (slow!) What is a data structure that provides fast lookup? 34

Aside: Hash Tables for Fast Lookup Insert: 5 27 34 1002 119 0 1 2 3 4 5 6 7 8 9 35

Aside: Hash Tables for Fast Lookup Insert: 000001 000101 110011 101010 100111 0 1 2 3 4 5 6 7 000 001 010 011 100 101 110 111 36

Where should we put data in the cache? Memory Cache 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 How can we compute this mapping? Index 00 01 10 11 Data address mod cache size same as low-order log 2 (cache size) bits 37

Where should we put data in the cache? Memory Cache 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 Index 00 01 10 11 Data Collision. Hmm.. The cache might get confused later! Why? And how do we solve that? 38

Use tags to record which location is cached Memory Cache 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 Index 00 01 10 11 Tag 00?? 01 01 Data tag = rest of address bits 39

What s a cache block? (or cache line) 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 Byte Address 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Block (line) number 0 1 2 3 4 5 6 7 block/line size =? Index 0 1 2 3 00 01 10 11 typical block/line sizes: 32 bytes, 64 bytes 40

A puzzle. What can you infer from this: Cache starts empty Access (addr, hit/miss) stream: (10, miss), (11, hit), (12, miss) 41

A puzzle. What can you infer from this: Cache starts empty Access (addr, hit/miss) stream: (10, miss), (11, hit), (12, miss) block size >= 2 bytes block size < 8 bytes 42

Problems with direct mapped caches? direct mapped: Each memory address can be mapped to exactly one index in the cache. What happens if a program uses addresses 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 2, 6, 2, 6, 2,? 00 2 and 6 conflict Memory Address Index 01 10 11 43

Associativity What if we could store data in any place in the cache? 44

Associativity Set 0 1 2 3 4 5 6 7 What if we could store data in any place in the cache? That might slow down caches (more complicated hardware), so we do something in between. Each address maps to exactly one set. 1-way 8 sets, 1 block each Set 0 1 2 3 2-way 4 sets, 2 blocks each Set 0 1 4-way 2 sets, 4 blocks each Set 0 8-way 1 set, 8 blocks direct mapped fully associative 45

Now how do I know where data goes? m-bit Address (m-k-n) bits Tag k bits Index n-bit Block Offset 46

What s a cache block? (or cache line) 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 Byte Address 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Block (line) number 0 1 2 3 4 5 6 7 block/line size =? Index 0 1 2 3 00 01 10 11 typical block/line sizes: 32 bytes, 64 bytes 47

Now how do I know where data goes? m-bit Address (m-k-n) bits Tag k bits Index n-bit Block Offset Our example used a 2 2 -block cache with 2 1 bytes per block. Where would 13 (1101) be stored? 4-bit Address? bits? bits?-bits Block Offset 48

Example placement in set-associative caches Where would data from address 0x1833 be placed? Block size is 16 bytes. 0x1833 in binary is 00...0110000 011 0011. m-bit Address (m-k-n) bits Tag k bits Index n-bit Block Offset k =? k =? k =? 1-way associativity 8 sets, 1 block each Set 0 1 2 3 4 5 6 7 2-way associativity 4 sets, 2 blocks each Set 0 1 2 3 4-way associativity 2 sets, 4 blocks each Set 0 1 49

Example placement in set-associative caches Where would data from address 0x1833 be placed? Block size is 16 bytes. 0x1833 in binary is 00...0110000 011 0011. m-bit Address (m-k-4) bits Tag k bits Index 4-bit Block Offset k = 3 k = 2 k = 1 1-way associativity 8 sets, 1 block each Set 0 1 2 3 4 5 6 7 2-way associativity 4 sets, 2 blocks each Set 0 1 2 3 4-way associativity 2 sets, 4 blocks each Set 0 1 50

Block replacement Any empty block in the correct set may be used for storing data. If there are no empty blocks, which one should we replace? 1-way associativity 8 sets, 1 block each Set 0 1 2 3 4 5 6 7 2-way associativity 4 sets, 2 blocks each Set 0 1 2 3 4-way associativity 2 sets, 4 blocks each Set 0 1 51

Block replacement Replace something, of course, but what? 1-way associativity 8 sets, 1 block each Set 0 1 2 3 4 5 6 7 2-way associativity 4 sets, 2 blocks each Set 0 1 2 3 4-way associativity 2 sets, 4 blocks each Set 0 1 52

Block replacement Replace something, of course, but what? Obvious for direct-mapped caches, what about set-associative? 1-way associativity 8 sets, 1 block each Set 0 1 2 3 4 5 6 7 2-way associativity 4 sets, 2 blocks each Set 0 1 2 3 4-way associativity 2 sets, 4 blocks each Set 0 1 53

Block replacement Replace something, of course, but what? Caches typically use something close to least recently used (LRU) (hardware usually implements not most recently used ) 1-way associativity 8 sets, 1 block each Set 0 1 2 3 4 5 6 7 2-way associativity 4 sets, 2 blocks each Set 0 1 2 3 4-way associativity 2 sets, 4 blocks each Set 0 1 54

Another puzzle. What can you infer from this: Cache starts empty Access (addr, hit/miss) stream (10, miss); (12, miss); (10, miss) 55

Another puzzle. What can you infer from this: Cache starts empty Access (addr, hit/miss) stream (10, miss); (12, miss); (10, miss) 12 is not in the same block as 10 12 s block replaced 10 s block direct-mapped cache 56

General Cache Organization (S, E, B) E = 2 e lines per set (we say E-way ) set line S = 2 s sets v tag 0 1 2 B-1 cache size: S x E x B data bytes valid bit B = 2 b bytes of data per cache line (the data block) 57

Cache Read E = 2 e lines per set Locate set Check if any line in set has matching tag Yes + line valid: hit Locate data starting at offset Address of byte in memory: t bits s bits b bits S = 2 s sets tag set index block offset data begins at this offset v tag 0 1 2 B-1 valid bit B = 2 b bytes of data per cache line (the data block) 58

Example: Direct-Mapped Cache (E = 1) Direct-mapped: One line per set Assume: cache block size 8 bytes v tag 0 1 2 3 4 5 6 7 Address of int: t bits 0 01 100 S = 2 s sets v tag 0 1 2 3 4 5 6 7 v tag 0 1 2 3 4 5 6 7 find set v tag 0 1 2 3 4 5 6 7 59

Example: Direct-Mapped Cache (E = 1) Direct-mapped: One line per set Assume: cache block size 8 bytes valid? + match?: yes = hit Address of int: t bits 0 01 100 v tag 0 1 2 3 4 5 6 7 block offset 60

Example: Direct-Mapped Cache (E = 1) Direct-mapped: One line per set Assume: cache block size 8 bytes valid? + match?: yes = hit Address of int: t bits 0 01 100 v tag 0 1 2 3 4 5 6 7 block offset int (4 Bytes) is here No match: old line is evicted and replaced 61

E-way Set-Associative Cache (Here: E = 2) E = 2: Two lines per set Assume: cache block size 8 bytes Address of short int: t bits 0 01 100 v tag 0 1 2 3 4 5 6 7 v tag 0 1 2 3 4 5 6 7 v tag 0 1 2 3 4 5 6 7 v tag 0 1 2 3 4 5 6 7 find set v tag 0 1 2 3 4 5 6 7 v tag 0 1 2 3 4 5 6 7 v tag 0 1 2 3 4 5 6 7 v tag 0 1 2 3 4 5 6 7 64

E-way Set-Associative Cache (Here: E = 2) E = 2: Two lines per set Assume: cache block size 8 bytes compare both Address of short int: t bits 0 01 100 valid? + match: yes = hit tag v tag 0 1 2 3 4 5 6 7 v tag 0 1 2 3 4 5 6 7 block offset 65

E-way Set-Associative Cache (Here: E = 2) E = 2: Two lines per set Assume: cache block size 8 bytes compare both Address of short int: t bits 0 01 100 valid? + match: yes = hit v tag 0 1 2 3 4 5 6 7 v tag 0 1 2 3 4 5 6 7 block offset short int (2 Bytes) is here No match: One line in set is selected for eviction and replacement Replacement policies: random, least recently used (LRU), 66

Types of Cache Misses Cold (compulsory) miss Occurs on first access to a block Conflict miss Conflict misses occur when the cache is large enough, but multiple data objects all map to the same slot e.g., referencing blocks 0, 8, 0, 8,... would miss every time direct-mapped caches have more conflict misses than n-way set-associative (where n is a power of 2 and n > 1) Capacity miss Occurs when the set of active cache blocks (the working set) is larger than the cache (just won t fit) 68

What about writes? Multiple copies of data exist: L1, L2, possibly L3, main memory What is the main problem with that? 69

What about writes? Multiple copies of data exist: L1, L2, possibly L3, main memory What to do on a write-hit? Write-through: write immediately to memory, all caches in between. Write-back: defer write to memory until line is evicted (replaced) Need a dirty bit to indicate if line is different from memory or not What to do on a write-miss? Write-allocate( fetch on write ): load into cache, update line in cache. Good if more writes or reads to the location follow No-write-allocate( write around ): just write immediately to memory. Typical caches: Write-back + Write-allocate, usually Write-through + No-write-allocate, occasionally why? 70

Write-back, write-allocate example Contents of memory stored at address U Cache U 0xBEEF 0 dirty bit tag (there is only one set in this tiny cache, so the tag is the entire address!) Memory T U 0xCAFE 0xBEEF In this example we are sort of ignoring block offsets. Here a block holds 2 bytes (16 bits, 4 hex digits). Normally a block would be much bigger and thus there would be multiple items per block. While only one item in that block would be written at a time, the entire line would be brought into cache. 71

Write-back, write-allocate example mov 0xFACE, T Cache U 0xBEEF 0 dirty bit Memory T U 0xCAFE 0xBEEF 72

Write-back, write-allocate example mov 0xFACE, T Cache U T 0xCAFE 0xBEEF 0 dirty bit Step 1: Bring T into cache Memory T U 0xCAFE 0xBEEF 73

Write-back, write-allocate example mov 0xFACE, T Cache U T 0xCAFE 0xFACE 0xBEEF 01 dirty bit Memory T 0xCAFE Step 2: Write 0xFACE to cache only and set dirty bit. U 0xBEEF 74

Write-back, write-allocate example mov 0xFACE, T mov 0xFEED, T Cache U T 0xCAFE 0xFEED 0xFACE 0xBEEF 01 dirty bit Memory T 0xCAFE Write hit! Write 0xFEED to cache only U 0xBEEF 75

Write-back, write-allocate example mov 0xFACE, T mov 0xFEED, T mov U, %rax Cache U T 0xCAFE 0xFEED 0xFACE 0xBEEF 01 dirty bit Memory T U 0xCAFE 0xBEEF 76

Write-back, write-allocate example mov 0xFACE, T mov 0xFEED, T mov U, %rax Cache U 0xBEEF 0 dirty bit Memory T 0xFEED 1. Write T back to memory since it is dirty. 2. Bring U into the cache so we can copy it into %rax U 0xBEEF 77

Back to the Core i7 to look at ways Processor package Core 0 Regs Core 3 Regs L1 i-cache and d-cache: 32 KB, 8-way, Access: 4 cycles L1 d-cache L1 i-cache L1 d-cache L1 i-cache L2 unified cache: 256 KB, 8-way, Access: 11 cycles L2 unified cache L2 unified cache L3 unified cache: 8 MB, 16-way, Access: 30-40 cycles L3 unified cache (shared by all cores) Block size: 64 bytes for all caches. Main memory slower, but more likely to hit 78

Where else is caching used? 79

Software Caches are More Flexible Examples File system buffer caches, web browser caches, etc. Some design differences Almost always fully-associative so, no placement restrictions index structures like hash tables are common (for placement) Often use complex replacement policies misses are very expensive when disk or network involved worth thousands of cycles to avoid them Not necessarily constrained to single block transfers may fetch or write-back in larger units, opportunistically 80

Optimizations for the Memory Hierarchy Write code that has locality! Spatial: access data contiguously Temporal: make sure access to the same data is not too far apart in time How can you achieve locality? Proper choice of algorithm Loop transformations 81

Example: Matrix Multiplication c = (double *) calloc(sizeof(double), n*n); /* Multiply n x n matrices a and b */ void mmm(double *a, double *b, double *c, int n) { int i, j, k; for (i = 0; i < n; i++) for (j = 0; j < n; j++) for (k = 0; k < n; k++) c[i*n + j] += a[i*n + k]*b[k*n + j]; } i c j = i a * b j memory access pattern? 82

Cache Miss Analysis spatial locality: chunks of 8 items in a row in same cache line Assume: Matrix elements are doubles Cache block = 64 bytes = 8 doubles Cache size C << n (much smaller than n, not left-shifted by n) each item in column in different cache line First iteration: n/8 + n = 9n/8 misses (omitting matrix c) = n/8 misses * n n misses Afterwards in cache: (schematic) = * 8 doubles wide 83

Cache Miss Analysis Assume: Matrix elements are doubles Cache block = 64 bytes = 8 doubles Cache size C << n (much smaller than n) Other iterations: Again: n/8 + n = 9n/8 misses (omitting matrix c) = * n 8 wide Total misses: 9n/8 * n 2 = (9/8) * n 3 once per element 84

Blocked Matrix Multiplication c = (double *) calloc(sizeof(double), n*n); /* Multiply n x n matrices a and b */ void mmm(double *a, double *b, double *c, int n) { int i, j, k; for (i = 0; i < n; i+=b) for (j = 0; j < n; j+=b) for (k = 0; k < n; k+=b) /* B x B mini matrix multiplications */ for (i1 = i; i1 < i+b; i1++) for (j1 = j; j1 < j+b; j1++) for (k1 = k; k1 < k+b; k1++) c[i1*n + j1] += a[i1*n + k1]*b[k1*n + j1]; } j1 c = i1 a * b Block size B x B 85

Cache Miss Analysis Assume: Cache block = 64 bytes = 8 doubles Cache size C << n (much smaller than n) Three blocks fit into cache: 3B 2 < C First (block) iteration: B 2 /8 misses for each block 2n/B * B 2 /8 = nb/4 (omitting matrix c) n/b blocks per row, n/b blocks per column Afterwards in cache (schematic) B 2 elements per block, 8 per cache line = = * Block size B x B * n/b blocks 86

Cache Miss Analysis Assume: Cache block = 64 bytes = 8 doubles Cache size C << n (much smaller than n) Three blocks fit into cache: 3B 2 < C Other (block) iterations: Same as first iteration 2n/B * B 2 /8 = nb/4 = * n/b blocks Total misses: nb/4 * (n/b) 2 = n 3 /(4B) Block size B x B 87

Summary No blocking: (9/8) * n 3 Blocking: 1/(4B) * n 3 If B = 8 difference is 4 * 8 * 9 / 8 = 36x If B = 16 difference is 4 * 16 * 9 / 8 = 72x Suggests largest possible block size B, but limit 3B 2 < C! Reason for dramatic difference: Matrix multiplication has inherent temporal locality: Input data: 3n 2, computation 2n 3 Every array element used O(n) times! But program has to be written properly 88

Cache-Friendly Code Programmer can optimize for cache performance How data structures are organized How data are accessed Nested loop structure Blocking is a general technique All systems favor cache-friendly code Getting absolute optimum performance is very platform specific Cache sizes, line sizes, associativities, etc. Can get most of the advantage with generic code Keep working set reasonably small (temporal locality) Use small strides (spatial locality) Focus on inner loop code 89

Intel Core i7 Cache Hierarchy Processor package Core 0 Regs Core 3 Regs L1 i-cache and d-cache: 32 KB, 8-way, Access: 4 cycles L1 d-cache L1 i-cache L1 d-cache L1 i-cache L2 unified cache: 256 KB, 8-way, Access: 11 cycles L2 unified cache L2 unified cache L3 unified cache: 8 MB, 16-way, Access: 30-40 cycles L3 unified cache (shared by all cores) Block size: 64 bytes for all caches. Main memory 90

Read throughput (MB/s) University of Washington The Memory Mountain Aggressive prefetching 16000 14000 12000 10000 L1 Core i7 Haswell 2.1 GHz 32 KB L1 d-cache 256 KB L2 cache 8 MB L3 cache 64 B block size 8000 6000 4000 L2 Ridges of temporal locality Slopes of spatial locality 2000 0 s1 s3 s5 Stride (x8 bytes) s7 s9 L3 Mem 32m s11 128m 8m 2m 128k 512k Size (bytes) 32k 91