SPARC T4™ Supplement to the Oracle SPARC Architecture 2011

Total Page:16

File Type:pdf, Size:1020Kb

SPARC T4™ Supplement to the Oracle SPARC Architecture 2011 SPARC T4™ Supplement to the Oracle SPARC Architecture 2011 Draft D0.4, 14 Feb 2012 Privilege Levels: Privileged and Nonprivileged Distribution: Public Part No.No: 950-5766-00 ReleaseRevision: 1.0, Draft 2002 D0.4, 14 Feb 2012 Oracle Corporation 4150 Network Circle Santa Clara, CA 95054 U.S.A. 650-960-1300 2 SPARC T4 Supplement • Draft D0.4, 14 Feb 2012 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. UNIX is a registered trademark licensed through X/Open Company, Ltd. 4 SPARC T4 Supplement • Draft D0.4, 14 Feb 2012 Contents 1 SPARC T4 Basics . 1 1.1 Background . 1 1.2 SPARC T4 Overview . 2 1.3 SPARC T4 Components . 3 1.3.1 SPARC Physical Core . 3 1.3.2 L3 Cache. 5 2 Data Formats . 1 3 Registers . 1 3.1 Floating-Point State Register (FSR) . 1 3.2 Ancillary State Registers (ASRs) . 1 3.2.1 Tick Register (TICK) . 2 3.2.2 Program Counter (PC) . 2 3.2.3 Floating-Point Registers State Register (FPRS) . 3 3.2.4 General Status Register (GSR) . 3 3.2.5 Software Interrupt Register (SOFTINT). 3 3.2.6 System Tick Register (STICK) . 3 3.2.7 System Tick Compare Register (STICK_CMPR). 4 3.2.8 Compatibility Feature Register (CFR) . 5 3.2.9 Pause (PAUSE) . 7 3.3 Privileged PR State Registers . 7 3.3.1 Trap State Register (TSTATE) . 8 3.3.2 Processor State Register (PSTATE) . 8 3.3.3 Trap Level Register (TL). 9 3.3.4 Current Window Pointer (CWP) Register . 9 3.3.5 Global Level Register (GL) . 9 4 Instruction Formats . 1 5 Instruction Definitions . 1 5.1 Instruction Set Summary . 1 5.2 SPARC T4-Specific Instructions . 7 5.3 PREFETCH/PREFETCHA . 7 5.4 WRPAUSE . 8 5.5 Block Load and Store Instructions . 10 5.5.1 Block Initializing Store ASIs . 13 5.6 Integer Multiply-Add . 15 5.8 AES Operations (4 operand) . 17 5.9 AES Operations (3 operand) . 17 5.10 DES Operations (4 operand) . 17 5.11 DES Operations (2 operand) . 18 5.12 Camellia Operations (4 operand) . 18 5 5.13 Camellia Operations (3 Operand). 18 5.14 Hash Operations . 18 5.15 CRC32C Operation (3 operand) . 19 5.16 MPMUL . 19 5.17 MONTMUL . 19 5.18 MONTSQR . 19 6 Traps. 1 6.1 Trap Levels. 1 6.2 Trap Behavior . 1 7 Interrupt Handling . 1 7.1 CPU Interrupt Registers. 1 7.1.1 Interrupt Queue Registers . 1 8 Memory Models . 1 8.1 Supported Memory Models . 1 8.1.1 TSO . 2 8.1.2 RMO . 2 9 Address Spaces and ASIs . 1 9.1 Address Translation . 1 9.2 Address Spaces . 1 9.2.1 SPARC T4 supports a 52-bit virtual address space. 52-bit Virtual and Real Address Spaces 1 9.3 Alternate Address Spaces . 2 9.3.1 ASI_REAL, ASI_REAL_LITTLE, ASI_REAL_IO, and ASI_REAL_IO_LITTLE 8 9.3.2 ASI_SCRATCHPAD. 8 10 Performance Instrumentation . 1 10.1 SPARC Performance Instrumentation Counter. 1 11 Implementation Dependencies . 1 11.1 SPARC V9 General Information . 1 11.1.1 Level-2 Compliance (Impdep #1). 1 11.1.2 Unimplemented Opcodes, ASIs, and ILLTRAP . 1 11.1.3 Trap Levels (Impdep #37, 38, 39, 40, 114, 115) . 1 11.1.4 Trap Handling (Impdep #16, 32, 33, 35, 36, 44) . 1 11.1.5 Secure Software . 2 11.1.6 Address Masking (Impdep #125). 2 11.2 SPARC V9 Integer Operations. 2 11.2.1 Integer Register File and Window Control Registers (Impdep #2) 2 11.2.2 Clean Window Handling (Impdep #102) . 2 11.2.3 Integer Multiply and Divide. 2 11.2.4 MULScc . 3 11.3 SPARC V9 Floating-Point Operations . 3 11.3.1 Overflow, Underflow, and Inexact Traps (Impdep #3,.
Recommended publications
  • Installation and Upgrade General Checklist Report
    VeritasTM Services and Operations Readiness Tools Installation and Upgrade Checklist Report for Storage Foundation for Sybase 5.1, Solaris 10, SPARC Index Back to top Important Notes System requirements Product documentation Patches for Storage Foundation for Sybase and Platform Platform configuration Host bus adapter (HBA) parameters and switch parameters Operations Manager Array Support Libraries (ASLs) Additional tasks to consider Important Notes Back to top Array Support Libraries (ASLs) When installing Veritas products, please be aware that ASLs updates are not included in the patches update bundle. Please go to the Array Support Libraries (ASLs) to get the latest updates for your disk arrays. System requirements Back to top Required number of CPUs: 1 Required disk space: Partitions Minimum space required Maximum space required Recommended space /opt 102 MB 441 MB 327 MB /root 52 MB 53 MB 52 MB /usr 154 MB 154 MB 154 MB /var 1 MB 1 MB 1 MB Supported architectures: SPARC M5 series [1][2] SPARC M6 series [1][2] SPARC T3 series [2] SPARC T4 series [2][3] SPARC T5 series [2][4] SPARC64 X+ series SPARC64-V series SPARC64-VI series 1 of 9 VeritasTM Services and Operations Readiness Tools SPARC64-VII/VII+ series SPARC64-X series UltraSPARC II series UltraSPARC III series UltraSPARC IV series UltraSPARC T1 series [2] UltraSPARC T2/T2+ series [2] 1. A minimum version of Storage Foundation 5.1SP1RP3, and Solaris 10 1/13 are required for support. 2. Oracle VM Server for SPARC supported. See the following TechNote: http://www.veritas.com/docs/DOC4397. 3. Installation of Storage Foundation products may encounter issue on Oracle T4 servers, see TechNote http://www.veritas.com/docs/TECH177307.
    [Show full text]
  • SPARC S7 Servers
    Oracle’s SPARC S7 Servers Technical Overview Rainer Schott Oracle Systems Sales Consulting September 2016 Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 3 • App Data Integrity SPARC @ Oracle Including • DB Query Acceleration Software in Silicon } • Inline Decompression 7 Processors in 6 Years • More…. 2010 2011 2013 2013 2013 2015 2016 SPARC T3 SPARC T4 SPARC T5 SPARC M5 SPARC M6 SPARC M7 SPARC S7 16 x 2nd Gen cores 8 x 3rd Gen Cores 16 x 3rd Gen Cores 16x 3 rd Gen Cores 12 x 3rd Gen Cores 32 x 4th Gen Cores 8 x 4th Gen Cores 4MB L3 Cache 4MB L3 Cache 8MB L3 Cache 48MB L3 Cache 48MB L3 Cache 64MB L3 Cache 16MB L3 cache 1.65 GHz 3.0 GHz 3.6 GHz 3.6 GHz 3.6 GHz 4.1 GHz 4.5 GHz Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Oracle Confidential Advancing the State-of-the-Art M7 Microprocessor – World’s First Implementation of Software Features in Silicon • SQL in Silicon – High-Speed Memory Decompression… – Accelerates In-Memory Database • Always-On Security in Silicon – Memory intrusion detection • High-Speed Encryption – Near zero performance impact Copyright © 2016, Oracle and/or its affiliates.
    [Show full text]
  • 2. Instruction Set Architecture
    !1 2. ISA Gebotys ECE 222 2. Instruction Set Architecture “Ideally, your initial instruction set should be an exemplar, …” " Instruction set architecture (ISA) defines the interface between the hardware and software# " instruction set is the language of the computer# " RISCV instructions are 32-bits, instruction[31:0]# " RISC-V assembly1 language notation # " uses 64-bit registers, 64-bits refer to double word, 32-bits refers to word (8-bits is byte).# " there are 32 registers, namely x0-x31, where x0 is always zero # " to perform arithmetic operations (add, sub, shift, logical) data must always be in registers # " the number of variables in programs is typically larger than 32, hence ‘less frequently used’ [or those used later] variables are ‘spilled’ into memory [spilling registers]# " registers are faster and more energy e$cient than memory# " for embedded applications where code size is important, a 16-bit instruction set exists, RISC-V compressed (e.g. others exist also ARM Thumb and Thumb2)# " byte addressing is used, little endian (where address of 64-bit word refers to address of ‘little' or rightmost byte, [containing bit 0 of word]) so sequential double word accesses di%er by 8 e.g. byte address 0 holds the first double word and byte address 8 holds next double word. (Byte addressing allows the supports of two byte instructions)# " memory contains 261 memory words - using load/store instructions e.g. 64-bits available (bits 63 downto 0, 3 of those bits are used for byte addressing, leaving 61 bits)# " Program counter register (PC)
    [Show full text]
  • How the SPARC T4 Processor Optimizes Throughput Capacity: a Case Study
    An Oracle Technical White Paper April 2012 How the SPARC T4 Processor Optimizes Throughput Capacity: A Case Study How the SPARCT4 Processor Optimizes Throughput Capacity: A Case Study Introduction ....................................................................................... 1 Summary of the Performance Results ............................................... 4 Performance Characteristics of the CSP1 and CSP2 Programs ........ 5 The UltraSPARC T2+ Pipeline Architecture ................................... 5 Instruction Scheduling Analysis for the CSP1 Program on the UltraSPARC T2+ Processor .......................................................... 6 Instruction Scheduling Analysis for the CSP2 Program on the UltraSPARC T2+ Processor .......................................................... 9 UltraSPARC T2+ Performance Results ........................................... 10 Test Framework........................................................................... 10 UltraSPARC T2+ Performance Results for the CSP1 Program .... 11 UltraSPARC T2+ Performance Results for the CSP2 Program .... 12 SPARC T4 Performance Results ..................................................... 13 Summary of the SPARC T4 Core Architecture ............................ 13 Test Framework........................................................................... 15 Cycle Count Estimates and Performance Results for the CSP1 Program on the SPARC T4 Processor ......................................... 15 Cycle Count Estimates and Performance Results for the
    [Show full text]
  • Exploiting Branch Target Injection Jann Horn, Google Project Zero
    Exploiting Branch Target Injection Jann Horn, Google Project Zero 1 Outline ● Introduction ● Reverse-engineering branch prediction ● Leaking host memory from KVM 2 Disclaimer ● I haven't worked in CPU design ● I don't really understand how CPUs work ● Large parts of this talk are based on guesses ● This isn't necessarily how all CPUs work 3 Variants overview Spectre Meltdown ● CVE-2017-5753 ● CVE-2017-5715 ● CVE-2017-5754 ● Variant 1 ● Variant 2 ● Variant 3 ● Bounds Check ● Branch Target ● Rogue Data Cache Bypass Injection Load ● Primarily affects ● Primarily affects ● Affects kernels (and interpreters/JITs kernels/hypervisors architecturally equivalent software) 4 Performance ● Modern consumer CPU clock rates: ~4GHz ● Memory is slow: ~170 clock cycles latency on my machine ➢ CPU needs to work around high memory access latencies ● Adding parallelism is easier than making processing faster ➢ CPU needs to do things in parallel for performance ● Performance optimizations can lead to security issues! 5 Performance Optimization Resources ● everyone wants programs to run fast ➢ processor vendors want application authors to be able to write fast code ● architectural behavior requires architecture documentation; performance optimization requires microarchitecture documentation ➢ if you want information about microarchitecture, read performance optimization guides ● Intel: https://software.intel.com/en-us/articles/intel-sdm#optimization ("optimization reference manual") ● AMD: https://developer.amd.com/resources/developer-guides-manuals/ ("Software Optimization Guide") 6 (vaguely based on optimization manuals) Out-of-order execution front end out-of-order engine port (scheduler, renaming, ...) port instruction stream add rax, 9 add rax, 8 inc rbx port inc rbx sub rax, rbx mov [rcx], rax port cmp rax, 16 ..
    [Show full text]
  • SPARC Enterprise Oracle VM Server for SPARC Important Information
    SPARC Enterprise Oracle VM Server for SPARC Important Information C120-E618-06EN October 2012 Copyright © 2007, 2012, Oracle and/or its affiliates and FUJITSU LIMITED. All rights reserved. Oracle and/or its affiliates and Fujitsu Limited each own or control intellectual property rights relating to products and technology described in this document, and such products, technology and this document are protected by copyright laws, patents, and other intellectual property laws and international treaties. This document and the product and technology to which it pertains are distributed under licenses restricting their use, copying, distribution, and decompilation. No part of such product or technology, or of this document, may be reproduced in any form by any means without prior written authorization of Oracle and/or its affiliates and Fujitsu Limited, and their applicable licensors, if any. The furnishings of this document to you does not give you any rights or licenses, express or implied, with respect to the product or technology to which it pertains, and this document does not contain or represent any commitment of any kind on the part of Oracle or Fujitsu Limited, or any affiliate of either of them. This document and the product and technology described in this document may incorporate third-party intellectual property copyrighted by and/or licensed from the suppliers to Oracle and/or its affiliates and Fujitsu Limited, including software and font technology. Per the terms of the GPL or LGPL, a copy of the source code governed by the GPL or LGPL, as applicable, is available upon request by the End User.
    [Show full text]
  • Implementing Elliptic Curve Cryptography (A Narrow Survey)
    Implementing Elliptic Curve Cryptography (a narrow survey) Institute of Computing – UNICAMP Campinas, Brazil April 2005 Darrel Hankerson Auburn University Implementing ECC – 1/110 Overview Objective: sample selected topics of practical interest. Talk will favor: I Software solutions on general-purpose processors rather than dedicated hardware. I Techniques with broad applicability. I Methods targeted to standardized curves. Goals: I Present proposed methods in context. I Limit coverage of technical details (but “implementing” necessarily involves platform considerations). Implementing ECC – 2/110 Focus: higher-performance processors “Higher-performance” includes processors commonly associated with workstations, but also found in surprisingly small portable devices. Sun and IBM workstations RIM pager circa 1999 SPARC or Intel x86 (Pentium) Intel x86 (custom 386) 256 MB – 8 GB 2 MB “disk”, 304 KB RAM 0.5 GHz – 3 GHz 10 MHz, single AA battery heats entire building fits in shirt pocket Implementing ECC – 3/110 Optimizing ECC Elliptic Curve Digital Signature Algorithm (ECDSA) Random number Big number and Curve generation modular arithmetic arithmetic Fq field arithmetic General categories of optimization efforts: 1. Field-level optimizations. 2. Curve-level optimizations. 3. Protocol-level optimizations. Constraints: security requirements, hardware limitations, bandwidth, interoperability, and patents. Implementing ECC – 4/110 Optimizing ECC... 1. Field-level optimizations. I Choose fields with fast multiplication and inversion. I Use special-purpose hardware (cryptographic coprocessors, DSP, floating-point, SIMD). 2. Curve-level optimizations. I Reduce the number of point additions (windowing). I Reduce the number of field inversions (projective coords). I Replace point doubles (endomorphism methods). 3. Protocol-level optimizations. I Develop efficient protocols. I Choose methods and protocols that favor your computations or hardware.
    [Show full text]
  • Oracle's SPARC T5-2, SPARC T5-4, SPARC T5-8, and SPARC T5-1B Server Architecture Oracle's SPARC T5-2, SPARC T5-4, SPARC T5-8, and SPARC T5-1B Server Architecture
    An Oracle White Paper February 2014 Oracle's SPARC T5-2, SPARC T5-4, SPARC T5-8, and SPARC T5-1B Server Architecture Oracle's SPARC T5-2, SPARC T5-4, SPARC T5-8, and SPARC T5-1B Server Architecture Introduction ....................................................................................... 1 Comparison of SPARC T5–Based Server Features........................... 2 SPARC T5 Processor ........................................................................ 3 Taking Oracle’s Multicore/Multithreaded Design to the Next Level 5 SPARC T5 Processor Architecture ................................................ 6 SPARC T5 Processor Cache Architecture ..................................... 8 SPARC T5 Core Architecture ........................................................ 9 Oracle Solaris for Multicore Scalability............................................. 16 Oracle Solaris 11 Operating System ................................................ 18 Oracle Solaris Predictive Self Healing, Fault Management Architecture, and Service Management Facility ....................................................... 19 Oracle Solaris Cryptographic Frameworks................................... 19 End-to-End Virtualization Technology .............................................. 19 A Multithreaded Hypervisor ......................................................... 20 Oracle VM Server for SPARC ...................................................... 20 Oracle Solaris Zones ................................................................... 21 Enterprise-Class
    [Show full text]
  • Simty: Generalized SIMT Execution on RISC-V Caroline Collange
    Simty: generalized SIMT execution on RISC-V Caroline Collange To cite this version: Caroline Collange. Simty: generalized SIMT execution on RISC-V. CARRV 2017: First Work- shop on Computer Architecture Research with RISC-V, Oct 2017, Boston, United States. pp.6, 10.1145/nnnnnnn.nnnnnnn. hal-01622208 HAL Id: hal-01622208 https://hal.inria.fr/hal-01622208 Submitted on 7 Oct 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Simty: generalized SIMT execution on RISC-V Caroline Collange Inria [email protected] ABSTRACT and programming languages to target GPU-like SIMT cores. Be- We present Simty, a massively multi-threaded RISC-V processor side simplifying software layers, the unification of CPU and GPU core that acts as a proof of concept for dynamic inter-thread vector- instruction sets eases prototyping and debugging of parallel pro- ization at the micro-architecture level. Simty runs groups of scalar grams. We have implemented Simty in synthesizable VHDL and threads executing SPMD code in lockstep, and assembles SIMD synthesized it for an FPGA target. instructions dynamically across threads. Unlike existing SIMD or We present our approach to generalizing the SIMT model in SIMT processors like GPUs or vector processors, Simty vector- Section 2, then describe Simty’s microarchitecture is Section 3, and izes scalar general-purpose binaries.
    [Show full text]
  • Exploiting Simple Analytical Models for Modeling Hardware Accelerators
    Exploiting Simple Analytical Models for Modeling Hardware Accelerators by Muhammad Shoaib Bin Altaf A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Electrical & Computer Engineering) at the UNIVERSITY OF WISCONSIN–MADISON 2016 Date of final oral examination: 12/08/2016 The dissertation is approved by the following members of the Final Oral Committee: Mark Hill, Professor, Computer Science Mikko Lipasti, Professor, Electrical & Computer Engineering Karthikeyan Sankaralingam, Associate Professor, Computer Science Michael Swift, Associate Professor, Computer Science David Wood, Professor, Computer Science © Copyright by Muhammad Shoaib Bin Altaf 2016 All Rights Reserved i To my parents Tehseen Kausar and Sheikh Altaf Hussain, and my wife Iram Majeed for their love and support. ii acknowledgments I consider myself fortunate enough to work under the guidance of my advisor, David Wood. I would not have completed my thesis without his support. Working with David, can be a challenge in the beginning and you take time in getting settled with his unique style of mentoring. He gave me the freedom to choose a problem of my own choice but made sure that I stayed on the right path. He has a knack for communicating ideas succinctly, and expects (and forces) his students to develop the same. Thanks to David, I consider myself a better writer and researcher. Thanks David. I am also thankful to my committee members for providing useful feedback and com- ments on my work. Mark Hill encouraged and showed excitement about the modeling framework right form the beginning. His advice on making slides has helped me become a better presenter.
    [Show full text]
  • Table of Contents
    1 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Eine phatastische Reise ins Innere der Hardware Franz Haberhauer Stefan Hinker Oracle Hardware in 3D 5 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. T5 and M5 PCIe Carrier Card . Supports standard low-profile PCIe cards Air Flow PCIe Retimer x16 Connector (x8 electrical) 6 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. PCIe Data Paths: Full System . Two root complexes per T5 processor . Each PCIe port on a T5 processor controls a single PCIe slot 7 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. T5-2 Block Diagram DIMM DIMM DIMM DIMM DIMM DIMM DIMM DIMM DIMM DIMM DIMM DIMM DIMM DIMM DIMM DIMM BoB BoB BoB BoB BoB BoB BoB BoB BoB BoB BoB BoB BoB BoB BoB BoB T5-0 T5-1 CPU CPU TPM Host & CPU PCIe Debug CPU PCIe Debug Data Flash DC/DCs 0 1 Port DC/DCs 0 1 Port x8 x8 FPGA x8 x4 x8 x1 HDD0 DBG SAS/SATA x1 HDD0 IO Controller x4 x4 PCIe PCIe SP Module HDD0 get rid of all inside x8 x8 SAS/SATA smallSwitch boxes 0 Switch 1 FRUID HDD0 IO Controller Sideband Mgmt DRAM HDD0 USB 1.1 Keyboard Mouse Service SPI x8 USB 3.0 x8 USB 2.0 Storage Flash HDD0 Host Processor SATA DVD NAND USB 2.0 Hub USB USB 3.0 USB Internal USB Hub VGA VGA REAR IO Board USB2 USB3 VGA USB0 USB1 VGA Serial Enet Quad 10Gig Enet DB15 Mgmt Mgmt Slot 2 (8) 2 Slot (8) 3 Slot (8) 4 Slot (8) 5 Slot (8) 6 Slot (8) 7 Slot (8) 8 Slot Slot 1 (8) 1 Slot 10/100 FAN BOARD REAR IO 8 Copyright © 2013, Oracle and/or its affiliates.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]