Secure, Precise, and Fast Floating-Point Operations on X86 Processors

Total Page:16

File Type:pdf, Size:1020Kb

Secure, Precise, and Fast Floating-Point Operations on X86 Processors Secure, Precise, and Fast Floating-Point Operations on x86 Processors Ashay Rane, Calvin Lin Mohit Tiwari Department of Computer Science Dept. of Electrical and Computer Engineering The University of Texas at Austin The University of Texas at Austin fashay, ling @cs.utexas.edu [email protected] Abstract Zero Normal Subnormal Infinity NaN 7 11 153 7 7 Floating-point computations introduce several side chan- nels. This paper describes the first solution that closes Table 1: Latency (in cycles) of the SQRTSS instruction for these side channels while preserving the precision of various operands. non-secure executions. Our solution exploits micro- architectural features of the x86 architecture along with novel compilation techniques to provide low overhead. Both x861 and ARM2 provide variable-latency Because of the details of x86 execution, the evaluation floating-point instructions. This variable latency stems of floating-point side channel defenses is quite involved, from the desire to have graceful floating-point arithmetic but we show that our solution is secure, precise, and fast. behavior, which, as we explain in Section 3, requires the Our solution closes more side channels than any prior so- use of so-called subnormal values [8], which are pro- lution. Despite the added security, our solution does not cessed using special algorithms. Since subnormal values compromise on the precision of the floating-point oper- are rare, hardware vendors typically support such values ations. Finally, for a set of microkernels, our solution is in microcode, so as not to slow down the common case. an order of magnitude more efficient than the previous The resulting difference in instruction latency creates a solution. timing side channel, which has been used to infer cross- origin data in browsers and to break differential privacy guarantees of a remote database [3]. 1 Introduction However, variable latency floating-point instructions represent only a part of the problem, since higher level To secure our computer systems, considerable effort has floating-point operations, such as sine and cosine, are been devoted to techniques such as encryption, access typically implemented in software. Thus, the implemen- control, and information flow analysis. Unfortunately, tation of these floating-point operations can leak secret these mechanisms can often be subverted through the use information through other side channels as well. De- of side channels, in which an adversary, with the knowl- pending on the secret values, programs can throw excep- edge of the program, monitors the program’s execution tions, thereby leaking the presence of abnormal inputs to infer secret values. These side channels are signifi- through termination. Programs can also contain condi- cant because they have been used to discover encryption tional branches, which can leak secrets through the in- keys in AES [26], RSA [27], and the Diffie-Hellman key struction pointer, branch predictor, or memory access exchange protocol [14], thereby rendering these sophis- count. Finally, programs that index into lookup tables ticated schemes useless. can leak secrets through the memory address trace. Numerous side channels exist, including instruction To prevent information leaks in both floating-point in- and data caches [27, 26], branch predictors [2], mem- structions and floating-point software, a strong solution ory usage [12, 35], execution time [31, 4], heat [22], should ensure at least four key properties, which cor- power [15], and electromagnetic radiation [9], but one respond to the side channels that we discussed above: particularly insidious side channel arises from the exe- cution of variable-latency floating-point instructions [3, 1http://www.agner.org/optimize/instruction tables.pdf 10], in which an instruction’s latency varies widely de- 2http://infocenter.arm.com/help/index.jsp?topic=/com. pending on its operands, as shown in Table 1. arm.doc.ddi0344k/ch16s07s01.html (1) fixed-time operations that are independent of secret floating-point operations, Escort is 16× faster than values, (2) disabled exceptions, (3) sequential control the previous solution [3]. flow, and (4) uniform data accesses that are independent of the value of secret variables. Previous solutions [3, 5] 5. As an ancillary contribution, we introduce a are inadequate because they do not ensure all four prop- methodology for evaluating the precision and se- erties, are slow, are orders of magnitude less precise, or curity of floating-point operations, which is fraught are difficult to implement. with subtleties. This paper presents a novel solution that closes side The rest of this paper is organized as follows. Sec- channels arising from both hardware and software im- tion 2 describes our threat model, related work, and sys- plementations of floating point operations, providing all tem guarantees. We provide background in Section 3 be- four properties mentioned above. Our compiler-based fore presenting our solution in Section 4. We evaluate solution has two components. our solution in Sections 5–7 . Finally, we conclude in The first component creates building blocks of ele- Section 8. mentary floating-point operations for instructions that are natively supported by the hardware (addition, subtrac- tion, multiplication, division, square root, and type con- 2 Threat Model and Related Work version). Our solution leverages unused SIMD lanes so that fast operations on normal operands are accompanied This section begins by describing our threat model, by slower dummy computations on subnormal operands, which shapes our subsequent discussion of related work yielding a consistent yet low instruction latency for all and of Escort’s security guarantees. types of operands. The second component is a software library of higher- Threat Model. Our goal is to prevent secret floating- level floating-point operations like sine and cosine. point operands from leaking to untrusted principals that The key to creating this second component is a new either read digital signals from the processor’s pins or code transformation that produces fixed-latency func- that are co-resident processes. tions through normalized control flows and data access We assume that the adversary is either an external en- patterns. Code generated by our compiler closes digital tity that monitors observation-based side channels (e.g. side-channels, which have been defined to be those side time [14], memory address trace [11], or the /proc channels that carry information over discrete bits [28]. pseudo-filesystem [12]) or a co-resident process/VM that Whereas previous work in closing digital side channels monitors contention-based side channels (e.g. cache [27] employs a runtime system [28], our solution shifts much or branch predictor state [2]). of the work to compile time, yielding a significantly For off-chip observation-based channels, we assume smaller runtime overhead. that the processor resides in a sealed and tamper-proof This paper makes the following contributions: chip that prevents the adversary from measuring physi- cal side channels like heat, power, electromagnetic radi- 1. We present a novel compiler-based system, called ation, etc. We assume that the CPU encrypts data trans- Escort, for closing digital side channels that arise ferred to and from DRAM. All components other than from the processing of floating-point instructions. the processor are untrusted, and we assume that the ad- versary can observe and tamper with any digital signal. 2. Secure: We demonstrate that our solution is secure For on-chip contention-based channels, we assume that not just against timing but also against digital side the OS is trusted and does not leak the victim process’s channels. We demonstrate Escort’s capabilities by secret information. We also assume that the adversary defeating a machine-learning side-channel attack, cannot observe or change the victim process’s register by defending against a timing attack on the Firefox contents. Our trusted computing base includes the com- web browser, by conducting extensive performance pilation toolchain. measurements on an x86 processor, and by verify- ing our solution’s code using typing rules. Side-Channel Defenses. Decades of prior research 3. Precise: We show that Escort provides precision have produced numerous defenses against side channels, that is identical to that of the standard C math li- the vast majority of which close only a limited number brary. By contrast, the previous solution’s precision of side channels with a single solution. For instance, is off by several million floating-point values. numerous solutions exist that close only the cache side channel [6, 36, 39, 37, 16] or only the address-trace 4. Fast: We show that our solution is fast. On a side channel [33, 20, 32, 29]. Raccoon [28] is the first set of micro-benchmarks that exercise elementary solution that closes a broad class of side channels—in particular, the set of digital side channels—with a sin- does transform loops that leak information through trip gle solution. Similar to Raccoon, Escort also closes counts. Escort is unable to handle programs contain- digital side channels with a single solution, but unlike ing irreducible control flow graphs (CFGs), but standard Raccoon, Escort focuses on closing floating-point digi- compiler transformations [24] can transform irreducible tal side channels, which can arise from variable latency CFGs into reducible CFGs. Escort assumes that the in- floating-point instructions and from software implemen- put program does not use vector instructions, does not tations of floating-point libraries, in which points-to set exhibit undefined behavior, does not terminate abnor- sizes are typically small. Given Escort’s narrower focus mally through exceptions, and is free of race conditions. on floating-point computations, Escort is faster than Rac- Given a program that abides by these limitations, Es- coon by an order of magnitude. cort guarantees that the transformed code produces iden- tical results as the original program, does not leak se- crets through timing or digital side channels, and that the Timing Side-Channel Defenses.
Recommended publications
  • IEEE Standard 754 for Binary Floating-Point Arithmetic
    Work in Progress: Lecture Notes on the Status of IEEE 754 October 1, 1997 3:36 am Lecture Notes on the Status of IEEE Standard 754 for Binary Floating-Point Arithmetic Prof. W. Kahan Elect. Eng. & Computer Science University of California Berkeley CA 94720-1776 Introduction: Twenty years ago anarchy threatened floating-point arithmetic. Over a dozen commercially significant arithmetics boasted diverse wordsizes, precisions, rounding procedures and over/underflow behaviors, and more were in the works. “Portable” software intended to reconcile that numerical diversity had become unbearably costly to develop. Thirteen years ago, when IEEE 754 became official, major microprocessor manufacturers had already adopted it despite the challenge it posed to implementors. With unprecedented altruism, hardware designers had risen to its challenge in the belief that they would ease and encourage a vast burgeoning of numerical software. They did succeed to a considerable extent. Anyway, rounding anomalies that preoccupied all of us in the 1970s afflict only CRAY X-MPs — J90s now. Now atrophy threatens features of IEEE 754 caught in a vicious circle: Those features lack support in programming languages and compilers, so those features are mishandled and/or practically unusable, so those features are little known and less in demand, and so those features lack support in programming languages and compilers. To help break that circle, those features are discussed in these notes under the following headings: Representable Numbers, Normal and Subnormal, Infinite
    [Show full text]
  • SPARC Assembly Language Reference Manual
    SPARC Assembly Language Reference Manual 2550 Garcia Avenue Mountain View, CA 94043 U.S.A. A Sun Microsystems, Inc. Business 1995 Sun Microsystems, Inc. 2550 Garcia Avenue, Mountain View, California 94043-1100 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Portions of this product may be derived from the UNIX® system, licensed from UNIX Systems Laboratories, Inc., a wholly owned subsidiary of Novell, Inc., and from the Berkeley 4.3 BSD system, licensed from the University of California. Third-party software, including font technology in this product, is protected by copyright and licensed from Sun’s Suppliers. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications. TRADEMARKS Sun, Sun Microsystems, the Sun logo, SunSoft, the SunSoft logo, Solaris, SunOS, OpenWindows, DeskSet, ONC, ONC+, and NFS are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd. OPEN LOOK is a registered trademark of Novell, Inc.
    [Show full text]
  • X86-64 Machine-Level Programming∗
    x86-64 Machine-Level Programming∗ Randal E. Bryant David R. O'Hallaron September 9, 2005 Intel’s IA32 instruction set architecture (ISA), colloquially known as “x86”, is the dominant instruction format for the world’s computers. IA32 is the platform of choice for most Windows and Linux machines. The ISA we use today was defined in 1985 with the introduction of the i386 microprocessor, extending the 16-bit instruction set defined by the original 8086 to 32 bits. Even though subsequent processor generations have introduced new instruction types and formats, many compilers, including GCC, have avoided using these features in the interest of maintaining backward compatibility. A shift is underway to a 64-bit version of the Intel instruction set. Originally developed by Advanced Micro Devices (AMD) and named x86-64, it is now supported by high end processors from AMD (who now call it AMD64) and by Intel, who refer to it as EM64T. Most people still refer to it as “x86-64,” and we follow this convention. Newer versions of Linux and GCC support this extension. In making this switch, the developers of GCC saw an opportunity to also make use of some of the instruction-set features that had been added in more recent generations of IA32 processors. This combination of new hardware and revised compiler makes x86-64 code substantially different in form and in performance than IA32 code. In creating the 64-bit extension, the AMD engineers also adopted some of the features found in reduced-instruction set computers (RISC) [7] that made them the favored targets for optimizing compilers.
    [Show full text]
  • FPGA Based Quadruple Precision Floating Point Arithmetic for Scientific Computations
    International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970) Volume-2 Number-3 Issue-5 September-2012 FPGA Based Quadruple Precision Floating Point Arithmetic for Scientific Computations 1Mamidi Nagaraju, 2Geedimatla Shekar 1Department of ECE, VLSI Lab, National Institute of Technology (NIT), Calicut, Kerala, India 2Asst.Professor, Department of ECE, Amrita Vishwa Vidyapeetham University Amritapuri, Kerala, India Abstract amounts, and fractions are essential to many computations. Floating-point arithmetic lies at the In this project we explore the capability and heart of computer graphics cards, physics engines, flexibility of FPGA solutions in a sense to simulations and many models of the natural world. accelerate scientific computing applications which Floating-point computations suffer from errors due to require very high precision arithmetic, based on rounding and quantization. Fast computers let IEEE 754 standard 128-bit floating-point number programmers write numerically intensive programs, representations. Field Programmable Gate Arrays but computed results can be far from the true results (FPGA) is increasingly being used to design high due to the accumulation of errors in arithmetic end computationally intense microprocessors operations. Implementing floating-point arithmetic in capable of handling floating point mathematical hardware can solve two separate problems. First, it operations. Quadruple Precision Floating-Point greatly speeds up floating-point arithmetic and Arithmetic is important in computational fluid calculations. Implementing a floating-point dynamics and physical modelling, which require instruction will require at a generous estimate at least accurate numerical computations. However, twenty integer instructions, many of them conditional modern computers perform binary arithmetic, operations, and even if the instructions are executed which has flaws in representing and rounding the on an architecture which goes to great lengths to numbers.
    [Show full text]
  • X86 Intrinsics Cheat Sheet Jan Finis [email protected]
    x86 Intrinsics Cheat Sheet Jan Finis [email protected] Bit Operations Conversions Boolean Logic Bit Shifting & Rotation Packed Conversions Convert all elements in a packed SSE register Reinterpet Casts Rounding Arithmetic Logic Shift Convert Float See also: Conversion to int Rotate Left/ Pack With S/D/I32 performs rounding implicitly Bool XOR Bool AND Bool NOT AND Bool OR Right Sign Extend Zero Extend 128bit Cast Shift Right Left/Right ≤64 16bit ↔ 32bit Saturation Conversion 128 SSE SSE SSE SSE Round up SSE2 xor SSE2 and SSE2 andnot SSE2 or SSE2 sra[i] SSE2 sl/rl[i] x86 _[l]rot[w]l/r CVT16 cvtX_Y SSE4.1 cvtX_Y SSE4.1 cvtX_Y SSE2 castX_Y si128,ps[SSE],pd si128,ps[SSE],pd si128,ps[SSE],pd si128,ps[SSE],pd epi16-64 epi16-64 (u16-64) ph ↔ ps SSE2 pack[u]s epi8-32 epu8-32 → epi8-32 SSE2 cvt[t]X_Y si128,ps/d (ceiling) mi xor_si128(mi a,mi b) mi and_si128(mi a,mi b) mi andnot_si128(mi a,mi b) mi or_si128(mi a,mi b) NOTE: Shifts elements right NOTE: Shifts elements left/ NOTE: Rotates bits in a left/ NOTE: Converts between 4x epi16,epi32 NOTE: Sign extends each NOTE: Zero extends each epi32,ps/d NOTE: Reinterpret casts !a & b while shifting in sign bits. right while shifting in zeros. right by a number of bits 16 bit floats and 4x 32 bit element from X to Y. Y must element from X to Y. Y must from X to Y. No operation is SSE4.1 ceil NOTE: Packs ints from two NOTE: Converts packed generated.
    [Show full text]
  • Powerpc User Instruction Set Architecture Book I Version 2.01
    PowerPC User Instruction Set Architecture Book I Version 2.01 September 2003 Manager: Joe Wetzel/Poughkeepsie/IBM Technical Content: Ed Silha/Austin/IBM Cathy May/Watson/IBM Brad Frey/Austin/IBM The following paragraph does not apply to the United Kingdom or any country or state where such provisions are inconsistent with local law. The specifications in this manual are subject to change without notice. This manual is provided “AS IS”. Interna- tional Business Machines Corp. makes no warranty of any kind, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. International Business Machines Corp. does not warrant that the contents of this publication or the accompanying source code examples, whether individually or as one or more groups, will meet your requirements or that the publication or the accompanying source code examples are error-free. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. Address comments to IBM Corporation, Internal Zip 9630, 11400 Burnett Road, Austin, Texas 78758-3493. IBM may use or distribute whatever information you supply in any way it believes appropriate without incurring any obligation to you. The following terms are trademarks of the International Business Machines Corporation in the United States and/or other countries: IBM PowerPC RISC/System 6000 POWER POWER2 POWER4 POWER4+ IBM System/370 Notice to U.S. Government Users—Documentation Related to Restricted Rights—Use, duplication or disclosure is subject to restrictions set fourth in GSA ADP Schedule Contract with IBM Corporation.
    [Show full text]
  • UM0434 E200z3 Powerpc Core Reference Manual
    UM0434 e200z3 PowerPC core Reference manual Introduction The primary objective of this user’s manual is to describe the functionality of the e200z3 embedded microprocessor core for software and hardware developers. This book is intended as a companion to the EREF: A Programmer's Reference Manual for Freescale Book E Processors (hereafter referred to as EREF). Book E is a PowerPC™ architecture definition for embedded processors that ensures binary compatibility with the user-instruction set architecture (UISA) portion of the PowerPC architecture as it was jointly developed by Apple, IBM, and Motorola (referred to as the AIM architecture). This document distinguishes among the three levels of the architectural and implementation definition, as follows: ● The Book E architecture—Book E defines a set of user-level instructions and registers that are drawn from the user instruction set architecture (UISA) portion of the AIM definition PowerPC architecture. Book E also includes numerous supervisor-level registers and instructions as they were defined in the AIM version of the PowerPC architecture for the virtual environment architecture (VEA) and the operating environment architecture (OEA). Because the operating system resources (such as the MMU and interrupts) defined by Book E differ greatly from those defined by the AIM architecture, Book E introduces many new registers and instructions. ● Freescale Book E implementation standards (EIS)—In many cases, the Book E architecture definition provides a general framework, leaving specific details up to the implementation. To ensure consistency among its Book E implementations, Freescale has defined implementation standards that provide an additional layer of architecture between Book E and the actual devices.
    [Show full text]
  • Why Transcendentals and Arbitrary Precision?
    Why transcendentals and arbitrary precision? Paul Zimmermann, December 15th, 2005 Why transcendentals and arbitrary precision? IEEE 754 Revision Committee, December 15th, 2005 Why Transcendentals? Why transcendentals and arbitrary precision? IEEE 754 Revision Committee, December 15th, 2005 Some transcendentals today Opteron, Linux 2.6.12, gcc 4.0.1, libc 2.3.5: Testing function atan for exponent 0. rounding mode GMP_RNDU: 1.507141 ulp(s) for x=5.27348750514293418412e-01 wrong DR: x=8.71159292701253917812e-01 [-0.505215] Testing function cbrt for exponent 0. rounding mode GMP_RNDN: wrong monotonicity for x=8.90550497574918109578e-01 f(x-)=9.62098454219197263271e-01 not <= f(x)=9.62098454219197152248e-01 Why transcendentals and arbitrary precision? IEEE 754 Revision Committee, December 15th, 2005 Sparc, SunOS 5.7, cc Sun WorkShop 6: Testing function exp for exponent 0. rounding mode GMP_RNDN: 0.659120 ulp(s) for x=9.43344491255437844757e-01 rounding mode GMP_RNDU: wrong DR: x=5.33824498679617898134e-01 [-0.295496] Testing function pow for exponents 0 and 0. rounding mode GMP_RNDN: -0.522792 ulp(s) for x=9.91109071895216686698e-01 t=6.06627312254989226048e-01 Testing function tanh for exponent 0. rounding mode GMP_RNDN: 1.771299 ulp(s) for x=5.19240368581155742334e-01 Why transcendentals and arbitrary precision? IEEE 754 Revision Committee, December 15th, 2005 MIPS R16000, IRIX64 6.5, gcc 3.3: Testing function tan for exponent 10. rounding mode GMP_RNDZ: -6.143332 ulp(s) for x=5.25427198389763360000e+02 wrong DR: x=7.56078520967298570000e+02 [-4.523771] Itanium 1, Linux 2.4.20, gcc 3.2.3, libc 2.2.5: Testing function gamma for exponent 7.
    [Show full text]
  • Fpnew: an Open-Source Multi-Format Floating-Point Unit Architecture For
    1 FPnew: An Open-Source Multi-Format Floating-Point Unit Architecture for Energy-Proportional Transprecision Computing Stefan Mach, Fabian Schuiki, Florian Zaruba, Student Member, IEEE, and Luca Benini, Fellow, IEEE Abstract—The slowdown of Moore’s law and the power wall Internet of Things (IoT) domain. In this environment, achiev- necessitates a shift towards finely tunable precision (a.k.a. trans- ing high energy efficiency in numerical computations requires precision) computing to reduce energy footprint. Hence, we need architectures and circuits which are fine-tunable in terms of circuits capable of performing floating-point operations on a wide range of precisions with high energy-proportionality. We precision and performance. Such circuits can minimize the present FPnew, a highly configurable open-source transprecision energy cost per operation by adapting both performance and floating-point unit (TP-FPU) capable of supporting a wide precision to the application requirements in an agile way. The range of standard and custom FP formats. To demonstrate the paradigm of “transprecision computing” [1] aims at creating flexibility and efficiency of FPnew in general-purpose processor a holistic framework ranging from algorithms and software architectures, we extend the RISC-V ISA with operations on half-precision, bfloat16, and an 8bit FP format, as well as SIMD down to hardware and circuits which offer many knobs to vectors and multi-format operations. Integrated into a 32-bit fine-tune workloads. RISC-V core, our TP-FPU can speed up execution of mixed- The most flexible and dynamic way of performing nu- precision applications by 1.67x w.r.t.
    [Show full text]
  • SPARC Joint Programming Specification 1 Implementation Supplement: Sun Ultrasparc III
    SPARC Joint Programming Specification 1 Implementation Supplement: Sun UltraSPARC III Sun Microsystems Proprietary/Need-to-Know JRC Contributed Material Working Draft 1.0.5, 10 Sep 2002 Part No.: 806-6754-1 Working Draft 1.0.5, 10 Sep 2002 Copyright 2001 Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto, California 94303 U.S.A. All rights reserved. Portions of this document are protected by copyright 1994 SPARC International, Inc. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, SunSoft, SunDocs, SunExpress, and Solaris are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry.
    [Show full text]
  • Release Notes
    Interactive Session Recorder Release Notes Release 6.2 F20208-05 January 2021 Interactive Session Recorder Release Notes, Release 6.2 F20208-05 Copyright © 2014, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Floating Point Exception Tracking and NAN Propagation
    Floating point exception tracking and NAN propagation By Agner Fog. Technical University of Denmark. © 2018-2020 CC-BY. Last updated 2020-04-27. Abstract The most common methods for detecting floating point errors are based on exception trapping or a global status register. These methods are inefficient in modern systems that use out-of-order parallelism and single-instruction-multiple-data (SIMD) parallelism for improving performance. It is argued that a method based on NAN propagation is more efficient and deterministic. Problems with NAN propagation in current systems are discussed. Examples of implementation in the C++ vector class library and in an experimental instruction set named ForwardCom are presented. The IEEE-754 standard for floating point arithmetic may need adjustment to accommodate the needs of modern forms of parallelism. Contents 1 Introduction ....................................................................................................................... 1 2 Exception trapping ............................................................................................................. 2 3 Using a status register ....................................................................................................... 3 4 Using errno ........................................................................................................................ 3 5 Parallel error detection ...................................................................................................... 3 6 Propagation of INF and NAN
    [Show full text]