The Technology Behind Crusoe™ Processors: Low-Power X86-Compatible Processors Implemented with Code-Morphing™ Software”
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Green Destiny: a 240-Node Compute Cluster in One Cubic Meter
Green Destiny: A 240-Node Compute Cluster in One Cubic Meter Wu-chun (Wu) Feng Research & Development in Advanced Network Technology (RADIANT) Computer & Computational Sciences Division Los Alamos National Laboratory LA-UR 02-6127 Outline Where is Supercomputing? Architectures from the Top 500. Evaluating Supercomputers Metrics: Performance & Price/Performance An Alternative Flavor of Supercomputing Supercomputing in Small Spaces Æ Bladed Beowulf Architecture of a Bladed Beowulf Performance Metrics Benchmark Results Discussion & Status Conclusion Acknowledgements & Media Coverage Wu-chun Feng http://www.lanl.gov/radiant [email protected] http://sss.lanl.gov Flavors of Supercomputing (Picture Source: Thomas Sterling, Caltech & NASA JPL) Wu-chun Feng http://www.lanl.gov/radiant [email protected] http://sss.lanl.gov 500 400 SIMD Architectures from the 300 Top 500 Supercomputer List 200 100 0 ProcessorSingle Wu-chun Feng [email protected] Jun-93 Nov-93 Jun-94 MPP Nov-94 Jun-95 Nov-95 Jun-96 Constellation SMP Nov-96 Cluster Jun-97 http://www.lanl.gov/radiant Nov-97 http://sss.lanl.gov Jun-98 Nov-98 Jun-99 Nov-99 Jun-00 Nov-00 Jun-01 Nov-01 Jun-02 Metrics for Evaluating Supercomputers Performance Metric: Floating-Operations Per Second (FLOPS) Example: Japanese Earth Simulator Price/Performance Æ Cost Efficiency Metric: Cost / FLOPS Examples: SuperMike, GRAPE-5, Avalon. Wu-chun Feng http://www.lanl.gov/radiant [email protected] http://sss.lanl.gov Performance (At Any Cost) Japanese Earth Simulator ($400M) Performance Price/Perf Peak 40.00 Tflop $10.00/Mflop Linpack 35.86 Tflop $11.15/Mflop n-Body 29.50 Tflop $13.56/Mflop Climate 26.58 Tflop $15.05/Mflop Turbulence 16.40 Tflop $24.39/Mflop Fusion 14.90 Tflop $26.85/Mflop Wu-chun Feng http://www.lanl.gov/radiant [email protected] http://sss.lanl.gov Price/Performance Cost Efficiency LSU’s SuperMike Performance Price/Perf (2002: $2.8M) Linpack 2210 Gflops $1.27/Mflop U. -
Intermediate X86 Part 2
Intermediate x86 Part 2 Xeno Kovah – 2010 xkovah at gmail All materials are licensed under a Creative Commons “Share Alike” license. • http://creativecommons.org/licenses/by-sa/3.0/ 2 Paging • Previously we discussed how segmentation translates a logical address (segment selector + offset) into a 32 bit linear address. • When paging is disabled, linear addresses map 1:1 to physical addresses. • When paging is enabled, a linear address must be translated to determine the physical address it corresponds to. • It’s called “paging” because physical memory is divided into fixed size chunks called pages. • The analogy is to books in a library. When you need to find some information first you go to the library where you look up the relevant book, then you select the book and look up a specific page, from there you maybe look for a specific specific sentence …or “word”? ;) • The internets ruined the analogy! 3 Notes and Terminology • All of the figures or references to the manual in this section refer to the Nov 2008 manual (available in the class materials). This is because I think the manuals <= 2008 organized and presented much clearer than >= 2009 manuals. • When I refer to a “frame” it means “a page- sized chunk of physical memory” • When paging is enabled, a “linear address” is the same thing as a “virtual memory ” “ ” address or virtual address 4 The terrifying truth revealed! And now you knowAHHHHHHHH!!!…the rest of the story.(Nah, Good it’s not so bad day. :)) 5 Virtual Memory • When paging is enabled, the 32 bit linear address space can be mapped to a physical address space less than 32 bits. -
Service Manual
, , , , , www.sonyweb.co.uk , www.sonyweb.co.uk , , www.sonyweb.co.uk , www.sonyweb.co.uk , , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , SERVICE MANUAL www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk Ver 1-2002J www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk www.sonyweb.co.uk , , Revision History www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , PCG-GRV550 www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk , , Lineup : PCG-GRV550 www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk For American Area www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk -
Multiprocessing Contents
Multiprocessing Contents 1 Multiprocessing 1 1.1 Pre-history .............................................. 1 1.2 Key topics ............................................... 1 1.2.1 Processor symmetry ...................................... 1 1.2.2 Instruction and data streams ................................. 1 1.2.3 Processor coupling ...................................... 2 1.2.4 Multiprocessor Communication Architecture ......................... 2 1.3 Flynn’s taxonomy ........................................... 2 1.3.1 SISD multiprocessing ..................................... 2 1.3.2 SIMD multiprocessing .................................... 2 1.3.3 MISD multiprocessing .................................... 3 1.3.4 MIMD multiprocessing .................................... 3 1.4 See also ................................................ 3 1.5 References ............................................... 3 2 Computer multitasking 5 2.1 Multiprogramming .......................................... 5 2.2 Cooperative multitasking ....................................... 6 2.3 Preemptive multitasking ....................................... 6 2.4 Real time ............................................... 7 2.5 Multithreading ............................................ 7 2.6 Memory protection .......................................... 7 2.7 Memory swapping .......................................... 7 2.8 Programming ............................................. 7 2.9 See also ................................................ 8 2.10 References ............................................. -
Memorandum in Opposition to Hewlett-Packard Company's Motion to Quash Intel's Subpoena Duces Tecum
ORIGINAL UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION ) In the Matter of ) ) DOCKET NO. 9341 INTEL. CORPORATION, ) a corporation ) PUBLIC ) .' ) MEMORANDUM IN OPPOSITION TO HEWLETT -PACKARD COMPANY'S MOTION TO QUASH INTEL'S SUBPOENA DUCES TECUM Intel Corporation ("Intel") submits this memorandum in opposition to Hewlett-Packard Company's ("HP") motion to quash Intel's subpoena duces tecum issued on March 11,2010 ("Subpoena"). HP's motion should be denied, and it should be ordered to comply with Intel's Subpoena, as narrowed by Intel's April 19,2010 letter. Intel's Subpoena seeks documents necessary to defend against Complaint Counsel's broad allegations and claimed relief. The Complaint alleges that Intel engaged in unfair business practices that maintained its monopoly over central processing units ("CPUs") and threatened to give it a monopoly over graphics processing units ("GPUs"). See CompI. iiii 2-28. Complaint Counsel's Interrogatory Answers state that it views HP, the world's largest manufacturer of personal computers, as a centerpiece of its case. See, e.g., Complaint Counsel's Resp. and Obj. to Respondent's First Set ofInterrogatories Nos. 7-8 (attached as Exhibit A). Complaint Counsel intends to call eight HP witnesses at trial on topics crossing virtually all of HP' s business lines, including its purchases ofCPUs for its commercial desktop, commercial notebook, and server businesses. See Complaint Counsel's May 5, 2010 Revised Preliminary Witness List (attached as Exhibit B). Complaint Counsel may also call HP witnesses on other topics, including its PUBLIC FTC Docket No. 9341 Memorandum in Opposition to Hewlett-Packard Company's Motion to Quash Intel's Subpoena Duces Tecum USIDOCS 7544743\'1 assessment and purchases of GPUs and chipsets and evaluation of compilers, benchmarks, interface standards, and standard-setting bodies. -
X86 Memory Protection and Translation
2/5/20 COMP 790: OS Implementation COMP 790: OS Implementation Logical Diagram Binary Memory x86 Memory Protection and Threads Formats Allocators Translation User System Calls Kernel Don Porter RCU File System Networking Sync Memory Device CPU Today’s Management Drivers Scheduler Lecture Hardware Interrupts Disk Net Consistency 1 Today’s Lecture: Focus on Hardware ABI 2 1 2 COMP 790: OS Implementation COMP 790: OS Implementation Lecture Goal Undergrad Review • Understand the hardware tools available on a • What is: modern x86 processor for manipulating and – Virtual memory? protecting memory – Segmentation? • Lab 2: You will program this hardware – Paging? • Apologies: Material can be a bit dry, but important – Plus, slides will be good reference • But, cool tech tricks: – How does thread-local storage (TLS) work? – An actual (and tough) Microsoft interview question 3 4 3 4 COMP 790: OS Implementation COMP 790: OS Implementation Memory Mapping Two System Goals 1) Provide an abstraction of contiguous, isolated virtual Process 1 Process 2 memory to a program Virtual Memory Virtual Memory 2) Prevent illegal operations // Program expects (*x) – Prevent access to other application or OS memory 0x1000 Only one physical 0x1000 address 0x1000!! // to always be at – Detect failures early (e.g., segfault on address 0) // address 0x1000 – More recently, prevent exploits that try to execute int *x = 0x1000; program data 0x1000 Physical Memory 5 6 5 6 1 2/5/20 COMP 790: OS Implementation COMP 790: OS Implementation Outline x86 Processor Modes • x86 -
The Technology Behind Crusoe™ Processors
The Technology Behind Crusoe™ Processors Low-power x86-Compatible Processors Implemented with Code Morphing™ Software Alexander Klaiber Transmeta Corporation January 2000 The Technology Behind Crusoe™ Processors Property of: Transmeta Corporation 3940 Freedom Circle Santa Clara, CA 95054 USA (408) 919-3000 http://www.transmeta.com The information contained in this document is provided solely for use in connection with Transmeta products, and Transmeta reserves all rights in and to such information and the products discussed herein. This document should not be construed as transferring or granting a license to any intellectual property rights, whether express, implied, arising through estoppel or otherwise. Except as may be agreed in writing by Transmeta, all Transmeta products are provided “as is” and without a warranty of any kind, and Transmeta hereby disclaims all warranties, express or implied, relating to Transmeta’s products, including, but not limited to, the implied warranties of merchantability, fitness for a particular purpose and non-infringement of third party intellectual property. Transmeta products may contain design defects or errors which may cause the products to deviate from published specifications, and Transmeta documents may contain inaccurate information. Transmeta makes no representations or warranties with respect to the accuracy or completeness of the information contained in this document, and Transmeta reserves the right to change product descriptions and product specifications at any time, without notice. Transmeta products have not been designed, tested, or manufactured for use in any application where failure, malfunction, or inaccuracy carries a risk of death, bodily injury, or damage to tangible property, including, but not limited to, use in factory control systems, medical devices or facilities, nuclear facilities, aircraft, watercraft or automobile navigation or communication, emergency systems, or other applications with a similar degree of potential hazard. -
USCOURTS-Ca9-09-35307-1.Pdf
Case: 09-35307 01/18/2011 ID: 7614842 DktEntry: 67 Page: 1 of 67 FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT VANESSA SIMMONDS, Plaintiff-Appellant, v. CREDIT SUISSE SECURITIES (USA) LLC; JPMORGAN CHASE & CO., a Delaware corporation, successor in interest to Hambrecht & Quist and Chase Securities Inc.; BANK OF No. 09-35262 AMERICA CORPORATION, a Delaware D.C. No. 2:07-cv- corporation, successor in interest 01549-JLR to Fleetboston Robertson Stephens, Inc.; ONVIA INC., a Delaware corporation formerly known as Onvia.com Inc.; ROBERTSON STEPHENS, INC.; J.P. MORGAN SECURITIES INC., Defendants-Appellees. In Re: SECTION 16(b) LITIGATION 821 Case: 09-35307 01/18/2011 ID: 7614842 DktEntry: 67 Page: 2 of 67 822 SIMMONDS v. CREDIT SUISSE SECURITIES VANESSA SIMMONDS, Plaintiff-Appellant, v. DEUTSCHE BANK SECURITIES INC.; FOUNDRY NETWORKS INC., Nominal No. 09-35280 Defendant, a Delaware D.C. Nos. corporation; MERRILL LYNCH 2:07-cv-01566-JLR PIERCE FENNER & SMITH 2:07-cv-01549-JLR INCORPORATED; J.P. MORGAN SECURITIES INC., Defendants-Appellees. In Re: SECTION 16(b) LITIGATION VANESSA SIMMONDS, Plaintiff-Appellant, v. MERRILL LYNCH & CO. INC., Defendant, and No. 09-35282 D.C. Nos. FINISAR CORPORATION, Nominal Defendant, a Delaware 2:07-cv-01567-JLR 2:07-cv-01549-JLR corporation; MERRILL LYNCH PIERCE FENNER & SMITH INCORPORATED; J.P. MORGAN SECURITIES INC., Defendants-Appellees. In Re: SECTION 16(b) LITIGATION Case: 09-35307 01/18/2011 ID: 7614842 DktEntry: 67 Page: 3 of 67 SIMMONDS v. CREDIT SUISSE SECURITIES 823 VANESSA SIMMONDS, Plaintiff-Appellant, v. MORGAN STANLEY & CO., No. 09-35285 INCORPORATED; LEHMAN BROTHERS, D.C. -
Operating Systems & Virtualisation Security Knowledge Area
Operating Systems & Virtualisation Security Knowledge Area Issue 1.0 Herbert Bos Vrije Universiteit Amsterdam EDITOR Andrew Martin Oxford University REVIEWERS Chris Dalton Hewlett Packard David Lie University of Toronto Gernot Heiser University of New South Wales Mathias Payer École Polytechnique Fédérale de Lausanne The Cyber Security Body Of Knowledge www.cybok.org COPYRIGHT © Crown Copyright, The National Cyber Security Centre 2019. This information is licensed under the Open Government Licence v3.0. To view this licence, visit: http://www.nationalarchives.gov.uk/doc/open-government-licence/ When you use this information under the Open Government Licence, you should include the following attribution: CyBOK © Crown Copyright, The National Cyber Security Centre 2018, li- censed under the Open Government Licence: http://www.nationalarchives.gov.uk/doc/open- government-licence/. The CyBOK project would like to understand how the CyBOK is being used and its uptake. The project would like organisations using, or intending to use, CyBOK for the purposes of education, training, course development, professional development etc. to contact it at con- [email protected] to let the project know how they are using CyBOK. Issue 1.0 is a stable public release of the Operating Systems & Virtualisation Security Knowl- edge Area. However, it should be noted that a fully-collated CyBOK document which includes all of the Knowledge Areas is anticipated to be released by the end of July 2019. This will likely include updated page layout and formatting of the individual Knowledge Areas KA Operating Systems & Virtualisation Security j October 2019 Page 1 The Cyber Security Body Of Knowledge www.cybok.org INTRODUCTION In this Knowledge Area, we introduce the principles, primitives and practices for ensuring se- curity at the operating system and hypervisor levels. -
Chapter 3 Protected-Mode Memory Management
CHAPTER 3 PROTECTED-MODE MEMORY MANAGEMENT This chapter describes the Intel 64 and IA-32 architecture’s protected-mode memory management facilities, including the physical memory requirements, segmentation mechanism, and paging mechanism. See also: Chapter 5, “Protection” (for a description of the processor’s protection mechanism) and Chapter 20, “8086 Emulation” (for a description of memory addressing protection in real-address and virtual-8086 modes). 3.1 MEMORY MANAGEMENT OVERVIEW The memory management facilities of the IA-32 architecture are divided into two parts: segmentation and paging. Segmentation provides a mechanism of isolating individual code, data, and stack modules so that multiple programs (or tasks) can run on the same processor without interfering with one another. Paging provides a mech- anism for implementing a conventional demand-paged, virtual-memory system where sections of a program’s execution environment are mapped into physical memory as needed. Paging can also be used to provide isolation between multiple tasks. When operating in protected mode, some form of segmentation must be used. There is no mode bit to disable segmentation. The use of paging, however, is optional. These two mechanisms (segmentation and paging) can be configured to support simple single-program (or single- task) systems, multitasking systems, or multiple-processor systems that used shared memory. As shown in Figure 3-1, segmentation provides a mechanism for dividing the processor’s addressable memory space (called the linear address space) into smaller protected address spaces called segments. Segments can be used to hold the code, data, and stack for a program or to hold system data structures (such as a TSS or LDT). -
TRANSMETA BREAKS X86 LOW-POWER BARRIER VLIW Chips Use Hardware-Assisted X86 Emulation by Tom R
MICROPROCESSOR www.MPRonline.com THE REPORTINSIDER’S GUIDE TO MICROPROCESSOR HARDWARE TRANSMETA BREAKS X86 LOW-POWER BARRIER VLIW Chips Use Hardware-Assisted x86 Emulation By Tom R. Halfhill {2/14/00-01} Like moths drawn to a flame, semiconductor startups seem to find the bright but dangerous glow of the x86 market irresistible. Never mind that companies as resourceful as AMD, Cen- taur, Cyrix, IBM, National Semiconductor, and Rise have all charred their wings in the fires of competition with Intel. More than 120 million x86 chips were with a software envelope that translates x86 binaries into sold in the profitable PC market last year, casting off a warmth native code at run time. that lures newly hatched companies from the darkness. While some companies have used the term “emula- The latest newcomer to emerge from its cocoon is tion” to describe the binary-translation process, Transmeta Transmeta. After nearly five years of unprecedented secrecy, founder Dave Ditzel shuns that term, preferring to describe the Santa Clara–based startup finally unveiled its pair of his company’s method of converting x86 instructions into x86-compatible Crusoe processors at a widely covered VLIW instructions as “code morphing” or simply “transla- media event near Silicon Valley last month. The event tion.” Sometimes this process is called dynamic binary received the same sort of overhyped coverage the U.S. Air recompilation. Transmeta’s code-morphing software cer- Force might attract by flinging open the gates to Area 51. A tainly is more advanced than old-fashioned emulators, large crowd of mainstream and business journalists were which slowly convert one type of binary executable into dazzled by marketing claims about “revolutionary” micro- another by translating one instruction at a time. -
X86 Memory Protection and Translation
x86 Memory Protection and Translation Don Porter CSE 506 Lecture Goal ò Understand the hardware tools available on a modern x86 processor for manipulating and protecting memory ò Lab 2: You will program this hardware ò Apologies: Material can be a bit dry, but important ò Plus, slides will be good reference ò But, cool tech tricks: ò How does thread-local storage (TLS) work? ò An actual (and tough) Microsoft interview question Undergrad Review ò What is: ò Virtual memory? ò Segmentation? ò Paging? Two System Goals 1) Provide an abstraction of contiguous, isolated virtual memory to a program 2) Prevent illegal operations ò Prevent access to other application or OS memory ò Detect failures early (e.g., segfault on address 0) ò More recently, prevent exploits that try to execute program data Outline ò x86 processor modes ò x86 segmentation ò x86 page tables ò Software vs. Hardware mechanisms ò Advanced Features ò Interesting applications/problems x86 Processor Modes ò Real mode – walks and talks like a really old x86 chip ò State at boot ò 20-bit address space, direct physical memory access ò Segmentation available (no paging) ò Protected mode – Standard 32-bit x86 mode ò Segmentation and paging ò Privilege levels (separate user and kernel) x86 Processor Modes ò Long mode – 64-bit mode (aka amd64, x86_64, etc.) ò Very similar to 32-bit mode (protected mode), but bigger ò Restrict segmentation use ò Garbage collect deprecated instructions ò Chips can still run in protected mode with old instructions Translation Overview 0xdeadbeef Segmentation 0x0eadbeef Paging 0x6eadbeef Virtual Address Linear Address Physical Address Protected/Long mode only ò Segmentation cannot be disabled! ò But can be a no-op (aka flat mode) x86 Segmentation ò A segment has: ò Base address (linear address) ò Length ò Type (code, data, etc).