Instruction Set Architecture

Total Page:16

File Type:pdf, Size:1020Kb

Instruction Set Architecture Instruction Set Architecture • Specification of a microprocessor design ECE473 Computer Architecture and • Interface between human and machine’s functionality Organization HLL Front-end compiler Instruction Set Architecture IR Exposed to software Backend compiler (e.g. code generator, scheduler, IR optimizer) ISA Lecturer: Prof. Yifeng Zhu Binary execution, Transparent microarchitecture, to software Fall, 2007 dynamic optimizer HW Packaging, cooling Portions of these slides are derived from: ECE473 1 ECE473 2 Dave Patterson © UCB Instruction Set Architecture ISA State • What states are there? – User-level • Defines what state exists » Registers • General purpose • Defines what operations exist on that state • Program counter (PC) • Memory • Addressing/Indexing • Typically implies a sequential ordering – Other – Classic serial fetch-execute (von Neuman) » Virtual memory support (TLB, page descriptors, …) » Kernel (special registers, memory) » I/O ECE473 3 ECE473 4 Operand Locations in Four ISA Classes Manipulating the State GPR • Must have instructions that – Access state (read and write) – Implement control flow (jump, branch, etc.) – Perform ALU operations (add, multiply, etc.) • Largest difference among instructions is in how you access your state – Operand location » stack, memory, register – Addressing modes » computing the location (addresses) of the state ECE473 5 ECE473 6 Code Sequence C = A + B for Four Instruction Sets CISC vs. RISC (1970s – 80s) Stack Accumulator Register Register (load- CISC RISC (register-memory) store) Push A Load A Load R1, A Load R1,A IBM VAX Xerox IBM Berkeley Stanford Push B Add B Add R1, B Load R2, B 370/168 11/780 Dorado 801 RISC1 MIPS Year 1973 1978 1978 1980 1981 1983 Add Store C Store C, R1 Add R3, R1, R2 introduced Pop C Store C, R3 # 208 303 270 120 39 55 instructions Microcode 54KB 61KB 17KB 0 0 0 Instruction 2 to 6 B 2 to 57 B 1 to 3 B 4B 4B 4B size Execution Reg-reg Reg-reg Stack Reg-reg Reg-reg Reg-reg model Reg-mem Reg-mem Mem-mem Mem- mem memory memory Source: Andy Tanenbaum’s Structured Computer Organization 7 8 ECE473 acc = acc + mem[C] R1 = R1 + mem[C] R3 = R1 + R2 ECE473 From CISC to RISC IA32 (x86) Processor Design Defined by Colwell et al. 85 • For CISC to weed out misleadings – Memory are expensive and CISC RISC slow back then • Intel P6/Netburst or AMD Athlon – Reduce Semantic Gap by Variable length instructions Fixed-length instructions, single- Cramming more functions cycle operation – CISCy skin (x86 ISA) into one instruction – Using microcode ROM Abundant instructions and Fewer instructions and – RISCy heart (μROM) for “complex” addressing modes addressing modes operations » Each x86 instruction is translated into “micro-op”(μop) or “MacroOP” or “RISC-op” on-the-fly • Justification for RISC Longer decoding Easier decoding » Internal microarchitecture resembles RISC design – Complex apps are mostly Contain mem-to-mem Load/store architecture composed of simple operations philosophy assignments Use on-core microcode No microinstructions, directly » Processor dynamically reschedule based on μops – RAM speed catching up executed by HW logic – Compiler (human) getting smarter and sophisticated Closer semantic gap (shift Needs smart compilers, more – Frequency↑⇒ shorter pipe complexity to microcode) compiler effort stages, more pipelineable IBM 360, DEC VAX, Intel IA32, IBM 801, MIPS, RISC I, IBM Mot 68030 RS6000, Sun Sparc ECE473 9 ECE473 10 64-bit Extensions to IA32 X86 is a big stack of cruft… But it gets the job done! CPU architect IA32+64-bit exts IA32 (Taken from Bob Colwell’s Eckert-Mauchly Award Talk, ISCA 2005) ECE473 11.
Recommended publications
  • A Developer's Guide to the POWER Architecture
    http://www.ibm.com/developerworks/linux/library/l-powarch/ 7/26/2011 10:53 AM English Sign in (or register) Technical topics Evaluation software Community Events A developer's guide to the POWER architecture POWER programming by the book Brett Olsson , Processor architect, IBM Anthony Marsala , Software engineer, IBM Summary: POWER® processors are found in everything from supercomputers to game consoles and from servers to cell phones -- and they all share a common architecture. This introduction to the PowerPC application-level programming model will give you an overview of the instruction set, important registers, and other details necessary for developing reliable, high performing POWER applications and maintaining code compatibility among processors. Date: 30 Mar 2004 Level: Intermediate Also available in: Japanese Activity: 22383 views Comments: The POWER architecture and the application-level programming model are common across all branches of the POWER architecture family tree. For detailed information, see the product user's manuals available in the IBM® POWER Web site technical library (see Resources for a link). The POWER architecture is a Reduced Instruction Set Computer (RISC) architecture, with over two hundred defined instructions. POWER is RISC in that most instructions execute in a single cycle and typically perform a single operation (such as loading storage to a register, or storing a register to memory). The POWER architecture is broken up into three levels, or "books." By segmenting the architecture in this way, code compatibility can be maintained across implementations while leaving room for implementations to choose levels of complexity for price/performances trade-offs. The levels are: Book I.
    [Show full text]
  • I.T.S.O. Powerpc an Inside View
    SG24-4299-00 PowerPC An Inside View IBM SG24-4299-00 PowerPC An Inside View Take Note! Before using this information and the product it supports, be sure to read the general information under “Special Notices” on page xiii. First Edition (September 1995) This edition applies to the IBM PC PowerPC hardware and software products currently announced at the date of publication. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address given below. An ITSO Technical Bulletin Evaluation Form for reader′s feedback appears facing Chapter 1. If the form has been removed, comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JLPC Building 014 Internal Zip 5220 1000 NW 51st Street Boca Raton, Florida 33431-1328 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1995. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Abstract This document provides technical details on the PowerPC technology. It focuses on the features and advantages of the PowerPC Architecture and includes an historical overview of the development of the reduced instruction set computer (RISC) technology. It also describes in detail the IBM Power Series product family based on PowerPC technology, including IBM Personal Computer Power Series 830 and 850 and IBM ThinkPad Power Series 820 and 850.
    [Show full text]
  • RISC Computers
    Reduced Instruction Set Computers Prof. Vojin G. Oklobdzija University of California Keywords: IBM 801; RISC; computer architecture; Load/Store architecture; instruction sets; pipelining; super-scalar machines; super-pipeline machines; optimizing compiler; Branch and Execute; Delayed Branch; Definitions Main features of RISC architecture Analysis of RISC and what makes RISC What brings performance to RISC Going beyond one instruction per cycle Issues in super-scalar machines 1. Architecture The term Computer Architecture was first defined in the paper by Amdahl, Blaauw and Brooks of IBM Corporation announcing IBM System/360 computer family on April 7, 1964 [1]. On that day IBM Corporation introduced, in the words of IBM spokesman, "the most important product announcement that this corporation has made in its history". Computer architecture was defined as the attributes of a computer seen by the machine language programmer as described in the Principles of Operation. IBM referred to the Principles of Operation as a definition of the machine which enables machine language programmer to write functionally correct, time independent programs that would run across a number of implementations of that particular architecture. The architecture specification covers: all functions of the machine that are observable by the program [2]. On the other hand Principles of Operation. are used to define the functions that the implementation should provide. In order to be functionally correct it is necessary that the implementation conforms to the Principles of Operation. Principles of Operation document defines computer architecture which includes: • Instruction set • Instruction format • Operation codes • Addressing modes • All registers and memory locations that may be directly manipulated or tested by a machine language program • Formats for data representation Machine Implementation was defined as the actual system organization and hardware structure encompassing the major functional units, data paths, and control.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Dynamicsilicon Gilder Publishing, LLC
    Written by Published by Nick Tredennick DynamicSilicon Gilder Publishing, LLC Vol. 2, No. 9 The Investor's Guide to Breakthrough Micro Devices September 2002 Lessons From the PC he worldwide market for personal computers has grown to 135 million units annually. Personal com- puters represent half of the worldwide revenue for semiconductors. In July of this year, PC makers Tshipped their billionth PC. I trace the story of the personal computer (PC) from its beginning. The lessons from the PC apply to contemporary products such as switches, routers, network processors, microprocessors, and cell phones. The story doesn’t repeat exactly because semiconductor-process advances change the rules. PC beginnings Intel introduced the first commercial microprocessor in 1971. The first microprocessors were designed solely as cost-effective substitutes for numerous chips in bills of material. But it wasn’t long before micro- processors became central processing units in small computer systems. The first advertisement for a micro- processor-based computer appeared in March 1974. Soon, companies, such as Scelbi Computer Consulting, MITS, and IMSAI, offered kit computers. Apple Computer incorporated in January 1977 and introduced the Apple II computer in April. The Apple II came fully assembled, which, together with the invention of the spreadsheet, changed the personal computer from a kit hobby to a personal business machine. In 1981, IBM legitimized personal computers by introducing the IBM Personal Computer. Once endorsed by IBM, many businesses bought personal computers. Even though it came out in August, IBM sold 15,000 units that year. Apple had a four-year head start. When IBM debuted its personal computer, the Apple II dom- inated the market.
    [Show full text]
  • Oral History of David (Dave) Ditzel
    Oral History of David (Dave) Ditzel Interviewed by: Kevin Krewell Recorded: July 31, 2015 Mountain View, California CHM Reference number: X7554.2016 © 2015 Computer History Museum Oral History of David (Dave) Ditzel Kevin Krewell: Hi, I'd like to introduce myself. I'm Kevin Krewell. I'm a member of the Semiconductor SIG at the Computer History Museum. Today is July 31st, 2015. We are at the Computer History Museum, and we're about to interview Dave Ditzel, who's probably best known as the founder of Transmeta. But, also an early researcher in RISC processor design at UC Berkeley. He's also worked at ATT Bell Labs, and at Sun Microsystems. Those are probably his most well-known attributes, or his well-known jobs. Dave Ditzel: And even at Intel. That was a surprise to people. Krewell: And Intel, but that's probably less well known. Most people were surprised when-- Ditzel: I wasn't allowed to talk about what I was doing there. Krewell: --I don't know if you still can. Ditzel: A little bit. Krewell: So, let's start off with a little background on Dave, and then we'll work into his history, fascinating history actually. But we're going to start off just a little bit about family background. Why don't just give us a little growing up, and where you born and raised, and how you started life. Ditzel: Generally, I grew up in the Midwest, Missouri and Iowa. My father was a chemical engineer, well trained, university-educated parents, encouraged me to read.
    [Show full text]
  • ISA Supplement
    Lecture 04: ISA Principles Supplements CSE 564 Computer Architecture Summer 2017 Department of Computer Science and Engineering Yonghong Yan [email protected] www.secs.oakland.edu/~yan 1 Contents 1. Introduc@on 2. ClAssifying Instruc@on Set Architectures 3. Memory Addressing 4. Type and Size of Operands 5. Operaons in the Instrucon Set 6. Instruc@ons for Control Flow 7. Encoding an Instruc@on Set 8. CrosscuMng Issues: The Role of Compilers 9. RISC-V ISA • Supplements 2 Lecture 03 Supplements • MIPS ISA • RISC vs CISC • Compiler compilaon stages • ISA Historical – Appendix L • Comparison of ISA – Appendix K 3 PuMng it All together: the MIPS Architecture(A simple 64-bit load-store architecture) • Use general-purpose registers with a load-store architecture • Support these addressing modes:displacement(with address offset of 12-16bits), immediate (size 8-16bits), and register indirect. • Support these data sizes and types: 8-, 16-, and 64- integers and 64-bit IEEE 754 floang-point numbers. 4 PuMng it all together:the MIPS Architecture(A simple 64-bit load-store architecture) • Support these simple instrucGons:load, store, add, subtract, move register-register, and shi\. • Compare equal, compare not equal, compare less, branch, jump, call, and return. • Use fixed instrucGon encoding if interested in performance, and use variable instrucGon encoding if interested in code size. 5 MIPS emphAsized • A simple load-store instrucGon set • Design for pipelining efficiency • Efficiency as a compiler target. 6 Instruc@on lAyout for MIPS 7 The loAd And store
    [Show full text]
  • RISC Architecture
    REDUCED INSTRUCTION SET COMPUTERS Prof. Vojin G. Oklobdzija Integration Berkeley, CA 94708 Keywords: IBM 801; RISC; computer architecture; Load/Store Architecture; instruction sets; pipelining; super-scalar machines; super-pipeline machines; optimizing compiler; Branch and Execute; Delayed Branch; Cache; Harvard Architecture; Delayed Load; Super-Scalar; Super-Pipelined. Fall 1999 1. ARCHITECTURE The term Computer Architecture was first defined in the paper by Amdahl, Blaauw and Brooks of International Business Machines (IBM) Corporation announcing IBM System/360 computer family on April 7, 1964 [1,17]. On that day IBM Corporation introduced, in the words of IBM spokesman, "the most important product announcement that this corporation has made in its history". Computer architecture was defined as the attributes of a computer seen by the machine language programmer as described in the Principles of Operation. IBM referred to the Principles of Operation as a definition of the machine which enables machine language programmer to write functionally correct, time independent programs that would run across a number of implementations of that particular architecture. The architecture specification covers: all functions of the machine that are observable by the program [2]. On the other hand Principles of Operation. are used to define the functions that the implementation should provide. In order to be functionally correct it is necessary that the implementation conforms to the Principles of Operation. Principles of Operation document defines computer architecture which includes: • Instruction set • Instruction format • Operation codes • Addressing modes • All registers and memory locations that may be directly manipulated or tested by a machine language program • Formats for data representation Machine Implementation was defined as the actual system organization and hardware structure encompassing the major functional units, data paths, and control.
    [Show full text]
  • Brief History of Microprogramming
    Microprogramming History -- Mark Smotherman A Brief History of Microprogramming Mark Smotherman Last updated: October 2012 Summary: Microprogramming is a technique to implement the control logic necessary to execute instructions within a processor. It relies on fetching low-level microinstructions from a control store and deriving the appropriate control signals as well as microprogram sequencing information from each microinstruction. Definitions and Example Although loose usage has sometimes equated the term "microprogramming" with the idea of "programming a microcomputer", this is not the standard definition. Rather, microprogramming is a systematic technique for implementing the control logic of a computer's central processing unit. It is a form of stored-program logic that substitutes for hardwired control circuitry. The central processing unit in a computer system is composed of a data path and a control unit. The data path includes registers, function units such as shifters and ALUs (arithmetic and logic units), internal processor busses and paths, and interface units for main memory and I/O busses. The control unit governs the series of steps taken by the data path during the execution of a user- visible instruction, or macroinstruction (e.g., load, add, store). Each action of the datapath is called a register transfer and involves the transfer of information within the data path, possibly including the transformation of data, address, or instruction bits by the function units. A register transfer is accomplished by gating out (sending) register contents onto internal processor busses, selecting the operation of ALUs, shifters, etc., through which that information might pass, and gating in (receiving) new values for one or more registers.
    [Show full text]
  • Reduced Instruction Set Computers
    ARTICLES REDUCED INSTRUCTION SET COMPUTERS Reduced instruction set computers aim for both simplicity in hardware and synergy between architectures and compilers. Optimizing compilers are used to compile programming languages down to instructions that are as unencumbered as microinstructions in a large virtual address space, and to make the instruction cycle time as fast as possible. DAVID A. PATTERSON As circuit technologies reduce the relative cost of proc- called a microinstruction, and the contents are essen- essing and memory, instruction sets that are too com- tially an interpreter, programmed in microinstructions. plex become a distinct liability to performance. The The main memories of these computers were magnetic designers of reduced instruction set computers (RISCs) core memories, the small control memories of which strive for both simplicity in hardware and synergy be- were usually 10 times faster than core. tween architecture and compilers, in order to stream- Minicomputer manufacturers tend to follow the lead line processing as much as possible. Early experience of mainframe manufacturers, especially when the indicates that RISCs can in fact run much faster than mainframe manufacturer is IBM, and so microprogram- more conventionally designed machines. ming caught on quickly. The rapid growth of semicon- ductor memories also speeded this trend. In the early BACKGROUND 1970s. for example, 8192 bits of read-only memory The IBM System/360, first introduced in 1964, was the (ROM) took up no more space than 8 bits of register. real beginning of modern computer architecture. Al- Eventually, minicomputers using core main memory though computers in the System/360 “family” provided and semiconductor control memory became standard in a different level of performance for a different price, all the minicomputer industry.
    [Show full text]
  • The International Journal of Science & Technoledge
    The International Journal Of Science & Technoledge(ISSN 2321 – 919X) www.theijst.com THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE A 64-Bit RISC Processor Design and Implementation Using VHDL Andrew Obida Yoila Teacher, Government Senior Secondary School, Minjibir Kano State, Nigeria Abstract: In this paper design and implementation of 64-bit RISC processor using VHDL is presented. The main idea is its history; architecture design, its data part, and how the instruction set are introduced. The structure of the design control using VHDL which means Vhsic Hardware Descriptive Language an industry standard language used to describe hardware from the abstract to concrete level and it’s verified on the XILINX ISE simulator. This processor is design for a specific application anywhere automation and control is necessary such as in bottle industries and control robotic program, Automatic teller machines (ATM) machines etc. also the 64 bit can also link vast amount of memory almost up to 16 Exabyte. 1. Introduction In today technology digital hardware plays a very important role in field of electronic and computer engineering products today. Due to fast growing and competition in the technological world and rapid rise of transistor demand and speediness of joined circuits and steeps declines of the price cause by the improvement in micro-electronics application Machineries. The introduction of computer to the society has affected so many things in the society in which almost all problems can be solve using computers. Many industries today are requesting for system developers that have the skills and technical knowhow of designing the program logics. VHDL is one of the most popular design applications used by designer to implement such task.
    [Show full text]
  • RISC, CISC, and ISA Variations
    RISC, CISC, and ISA Variations CS 3410 Computer System Organization & Programming These slides are the product of many rounds of teaching CS 3410 by Professors Weatherspoon, Bala, Bracy, and Sirer. iClicker Question (first alone, then pairs) Which is not considered part of the ISA? A. There is a control delay slot. B. The number of inputs each instruction can have. C. Load-use stalls will not be detected by the processor. D. The number of cycles it takes to execute a multiply. E. Each instruction is encoded in 32 bits. 2 Big Picture: Where are we now? compute jump/branch targets A memory register alu D D file B +4 addr PC B control din dout M inst memory extend new imm forward pc unit detect hazard Write Fetch Decode ctrl Execute ctrl Memory ctrl Back IF/ID ID/EX EX/MEM MEM/WB 3 Big Picture: Where are we going? C int x = 10; compiler x = x + 15; MIPS addi r5, r0, 10 r0 = 0 assembly addi r5, r5, 15 r5 = r0 + 10 assembler r5 = r15 + 15 addi r0 r5 10 machine 00100000000001010000000000001010 code 00100000101001010000000000001111 loader CPU Circuits 32 RF 32 Gates A B Transistors Silicon 4 Big Picture: Where are we going? C int x = 10; x = 2 * x + 15; compiler High Level MIPS addi r5, r0, 10 Languages muli r5, r5, 2 assembly addi r5, r5, 15 assembler 00100000000001010000000000001010 machine 00000000000001010010100001000000 code 00100000101001010000000000001111 loader Instruction Set CPU Architecture (ISA) Circuits Gates Transistors Silicon 5 Goals for Today Instruction Set Architectures • ISA Variations, and CISC vs RISC • Peek inside some
    [Show full text]