Cache Memories CENG331 - Computer Organization Instructor: Murat Manguoglu(Section 1) Adapted from: and

Slides:



Advertisements
Similar presentations
CS492B Analysis of Concurrent Programs Memory Hierarchy Jaehyuk Huh Computer Science, KAIST Part of slides are based on CS:App from CMU.
Advertisements

Cache Performance 1 Computer Organization II © CS:APP & McQuain Cache Memory and Performance Many of the following slides are taken with.
CSE 490/590, Spring 2011 CSE 490/590 Computer Architecture Cache III Steve Ko Computer Sciences and Engineering University at Buffalo.
Example How are these parameters decided?. Row-Order storage main() { int i, j, a[3][4]={1,2,3,4,5,6,7,8,9,10,11,12}; for (i=0; i
Today Memory hierarchy, caches, locality Cache organization
CSE 490/590, Spring 2011 CSE 490/590 Computer Architecture Cache II Steve Ko Computer Sciences and Engineering University at Buffalo.
CSE 490/590, Spring 2011 CSE 490/590 Computer Architecture Cache IV Steve Ko Computer Sciences and Engineering University at Buffalo.
Carnegie Mellon 1 Cache Memories : Introduction to Computer Systems 10 th Lecture, Sep. 23, Instructors: Randy Bryant and Dave O’Hallaron.
February 9, 2010CS152, Spring 2010 CS 152 Computer Architecture and Engineering Lecture 7 - Memory Hierarchy-II Krste Asanovic Electrical Engineering and.
Memory System Performance October 29, 1998 Topics Impact of cache parameters Impact of memory reference patterns –matrix multiply –transpose –memory mountain.
February 9, 2011CS152, Spring 2011 CS 152 Computer Architecture and Engineering Lecture 7 - Memory Hierarchy-II Krste Asanovic Electrical Engineering and.
Cache Memories May 5, 2008 Topics Generic cache memory organization Direct mapped caches Set associative caches Impact of caches on performance EECS213.
Cache Memories February 24, 2004 Topics Generic cache memory organization Direct mapped caches Set associative caches Impact of caches on performance class13.ppt.
CS 152 Computer Architecture and Engineering Lecture 7 - Memory Hierarchy-II Krste Asanovic Electrical Engineering and Computer Sciences University of.
February 9, 2010CS152, Spring 2010 CS 152 Computer Architecture and Engineering Lecture 7 - Memory Hierarchy-II Krste Asanovic Electrical Engineering and.
CPSC 312 Cache Memories Slides Source: Bryant Topics Generic cache memory organization Direct mapped caches Set associative caches Impact of caches on.
Virtual Memory Topics Virtual Memory Access Page Table, TLB Programming for locality Memory Mountain Revisited.
Cache Memories Topics Generic cache memory organization Direct mapped caches Set associative caches Impact of caches on performance CS213.
CS 152 Computer Architecture and Engineering Lecture 7 - Memory Hierarchy-II Krste Asanovic Electrical Engineering and Computer Sciences University of.
February 11, 2010CS152, Spring 2010 CS 152 Computer Architecture and Engineering Lecture 8 - Memory Hierarchy-III Krste Asanovic Electrical Engineering.
Systems I Locality and Caching
ECE Dept., University of Toronto
1 Cache Memories Andrew Case Slides adapted from Jinyang Li, Randy Bryant and Dave O’Hallaron.
February 9, 2012CS152, Spring 2012 CS 152 Computer Architecture and Engineering Lecture 7 - Memory Hierarchy-II Krste Asanovic Electrical Engineering and.
– 1 – , F’02 Caching in a Memory Hierarchy Larger, slower, cheaper storage device at level k+1 is partitioned into blocks.
Lecture 13: Caching EEN 312: Processors: Hardware, Software, and Interfacing Department of Electrical and Computer Engineering Spring 2014, Dr. Rozier.
Lecture 20: Locality and Caching CS 2011 Fall 2014, Dr. Rozier.
Introduction to Computer Systems Topics: Theme Five great realities of computer systems (continued) “The class that bytes”
Code and Caches 1 Computer Organization II © CS:APP & McQuain Cache Memory and Performance Many of the following slides are taken with permission.
1 Seoul National University Cache Memories. 2 Seoul National University Cache Memories Cache memory organization and operation Performance impact of caches.
Memory Hierarchy II. – 2 – Last class Caches Direct mapped E=1 (One cache line per set) Each main memory address can be placed in exactly one place in.
1 Cache Memory. 2 Outline Cache mountain Matrix multiplication Suggested Reading: 6.6, 6.7.
Cache Memories February 28, 2002 Topics Generic cache memory organization Direct mapped caches Set associative caches Impact of caches on performance Reading:
Cache Memories Topics Generic cache-memory organization Direct-mapped caches Set-associative caches Impact of caches on performance CS 105 Tour of the.
Carnegie Mellon Introduction to Computer Systems /18-243, spring th Lecture, Feb. 19 th Instructors: Gregory Kesden and Markus Püschel.
Cache (Memory) Performance Optimization. Average memory access time = Hit time + Miss rate x Miss penalty To improve performance: reduce the miss rate.
1 Cache Memories. 2 Today Cache memory organization and operation Performance impact of caches  The memory mountain  Rearranging loops to improve spatial.
Lecture 5: Memory Performance. Types of Memory Registers L1 cache L2 cache L3 cache Main Memory Local Secondary Storage (local disks) Remote Secondary.
Cache Memories Topics Generic cache-memory organization Direct-mapped caches Set-associative caches Impact of caches on performance CS 105 Tour of the.
Cache Memories Topics Generic cache memory organization Direct mapped caches Set associative caches Impact of caches on performance cache.ppt CS 105 Tour.
Memory Hierarchy Computer Organization and Assembly Languages Yung-Yu Chuang 2007/01/08 with slides by CMU
Optimizing for the Memory Hierarchy Topics Impact of caches on performance Memory hierarchy considerations Systems I.
1 Writing Cache Friendly Code Make the common case go fast  Focus on the inner loops of the core functions Minimize the misses in the inner loops  Repeated.
Vassar College 1 Jason Waterman, CMPU 224: Computer Organization, Fall 2015 Cache Memories CMPU 224: Computer Organization Nov 19 th Fall 2015.
Carnegie Mellon 1 Bryant and O’Hallaron, Computer Systems: A Programmer’s Perspective, Third Edition Cache Memories CENG331 - Computer Organization Instructors:
CENG709 Computer Architecture and Operating Systems Lecture 7 - Memory Hierarchy-II Murat Manguoglu Department of Computer Engineering Middle East Technical.
Programming for Cache Performance Topics Impact of caches on performance Blocking Loop reordering.
Carnegie Mellon 1 Cache Memories Authors: Adapted from slides by Randy Bryant and Dave O’Hallaron.
Cache Memories.
CSE 351 Section 9 3/1/12.
Cache Memory and Performance
Optimization III: Cache Memories
Cache Memories CSE 238/2038/2138: Systems Programming
The Hardware/Software Interface CSE351 Winter 2013
Section 7: Memory and Caches
Today How’s Lab 3 going? HW 3 will be out today
CS 105 Tour of the Black Holes of Computing
The Memory Hierarchy : Memory Hierarchy - Cache
Authors: Adapted from slides by Randy Bryant and Dave O’Hallaron
Cache Memories Topics Cache memory organization Direct mapped caches
“The course that gives CMU its Zip!”
Memory Hierarchy II.
Krste Asanovic Electrical Engineering and Computer Sciences
Memory Hierarchy and Cache Memories CENG331 - Computer Organization
Cache Memories Professor Hugh C. Lauer CS-2011, Machine Organization and Assembly Language (Slides include copyright materials from Computer Systems:
Computer Organization and Assembly Languages Yung-Yu Chuang 2006/01/05
Cache Memories.
Cache Memory and Performance
Writing Cache Friendly Code

Presentation transcript:

Cache Memories CENG331 - Computer Organization Instructor: Murat Manguoglu(Section 1) Adapted from: and

Today Cache memory organization and operation Performance impact of caches  The memory mountain  Rearranging loops to improve spatial locality  Using blocking to improve temporal locality

Example Memory Hierarchy Regs L1 cache (SRAM) Main memory (DRAM) Local secondary storage (local disks) Larger, slower, and cheaper (per byte) storage devices Remote secondary storage (e.g., Web servers) Local disks hold files retrieved from disks on remote servers L2 cache (SRAM) L1 cache holds cache lines retrieved from the L2 cache. CPU registers hold words retrieved from the L1 cache. L2 cache holds cache lines retrieved from L3 cache L0: L1: L2: L3: L4: L5: Smaller, faster, and costlier (per byte) storage devices L3 cache (SRAM) L3 cache holds cache lines retrieved from main memory. L6: Main memory holds disk blocks retrieved from local disks.

General Cache Concept Cache Memory Larger, slower, cheaper memory viewed as partitioned into “blocks” Data is copied in block-sized transfer units Smaller, faster, more expensive memory caches a subset of the blocks

Cache Memories Cache memories are small, fast SRAM-based memories managed automatically in hardware  Hold frequently accessed blocks of main memory CPU looks first for data in cache, then in main memory Typical system structure: Main memory I/O bridge Bus interface ALU Register file CPU chip System busMemory bus Cache memory

Cache Algorithm (Read) Look at Processor Address, search cache tags to find match. Then either Found in cache a.k.a. HIT Return copy of data from cache Not in cache a.k.a. MISS Read block of data from Main Memory Wait … Return data to processor and update cache Q: Which line do we replace?

Placement Policy Set Number Cache Fully (2-way) Set Direct AssociativeAssociative Mapped anywhereanywhere in only into set 0 block 4 (12 mod 4) (12 mod 8) ………………………. 12 …………………………………………………31 Memory Block Number block 12 can be placed

Direct-Mapped Cache TagData Block V = Block Offset TagIndex t k b t HIT Data Word or Byte 2 k lines

Direct Map Address Selection higher-order vs. lower-order address bits TagData Block V = Block Offset Index t k b t HIT Data Word or Byte 2 k lines Tag

2-Way Set-Associative Cache

Fully Associative Cache

Replacement Policy In an associative cache, which block from a set should be evicted when the set becomes full? Random Least-Recently Used (LRU) LRU cache state must be updated on every access true implementation only feasible for small sets (2-way) pseudo-LRU binary tree often used for 4-8 way First-In, First-Out (FIFO) a.k.a. Round-Robin used in highly associative caches Not-Most-Recently Used (NMRU) FIFO with exception for most-recently used block or blocks Most Recently Used (?) This is a second-order effect. Why? Replacement only happens on misses

Word3Word0Word1Word2 Block Size and Spatial Locality Larger block size has distinct hardware advantages less tag overhead exploit fast burst transfers from DRAM exploit fast burst transfers over wide busses What are the disadvantages of increasing block size? block address offset b 2 b = block size a.k.a line size (in bytes) Split CPU address b bits 32-b bits Tag Block is unit of transfer between the cache and memory 4 word block, b=2 Fewer blocks => more conflicts. Can waste bandwidth.

What about writes? Multiple copies of data exist:  L1, L2, L3, Main Memory, Disk What to do on a write-hit?  Write-through (write immediately to memory)  Write-back (defer write to memory until replacement of line)  Need a dirty bit (line different from memory or not) What to do on a write-miss?  Write-allocate (load into cache, update line in cache)  Good if more writes to the location follow  No-write-allocate (writes straight to memory, does not load into cache) Typical  Write-through + No-write-allocate  Write-back + Write-allocate

Itanium-2 On-Chip Caches (Intel/HP, 2002) Level 1: 16KB, 4-way s.a., 64B line, quad-port (2 load+2 store), single cycle latency Level 2: 256KB, 4-way s.a, 128B line, quad-port (4 load or 4 store), five cycle latency Level 3: 3MB, 12-way s.a., 128B line, single 32B port, twelve cycle latency

Power 7 On-Chip Caches [IBM 2009] 32KB L1 I$/core 32KB L1 D$/core 3-cycle latency 256KB Unified L2$/core 8-cycle latency 32MB Unified Shared L3$ Embedded DRAM (eDRAM) 25-cycle latency to local slice

IBM z196 Mainframe Caches cores (4 cores/chip, 24 chips/system)  Out-of-order, 3-way 5.2GHz L1: 64KB I-$/core + 128KB D-$/core L2: 1.5MB private/core (144MB total) L3: 24MB shared/chip (eDRAM) (576MB total) L4: 768MB shared/system (eDRAM)

Intel Core i7 Cache Hierarchy Regs L1 d-cache L1 i-cache L2 unified cache Core 0 Regs L1 d-cache L1 i-cache L2 unified cache Core 3 … L3 unified cache (shared by all cores) Main memory Processor package L1 i-cache and d-cache: 32 KB, 8-way, Access: 4 cycles L2 unified cache: 256 KB, 8-way, Access: 10 cycles L3 unified cache: 8 MB, 16-way, Access: cycles Block size: 64 bytes for all caches.

Cache Performance Metrics Miss Rate  Fraction of memory references not found in cache (misses / accesses) = 1 – hit rate  Typical numbers (in percentages):  3-10% for L1  can be quite small (e.g., < 1%) for L2, depending on size, etc. Hit Time  Time to deliver a line in the cache to the processor  includes time to determine whether the line is in the cache  Typical numbers:  4 clock cycle for L1  10 clock cycles for L2 Miss Penalty  Additional time required because of a miss  typically cycles for main memory (Trend: increasing!)

Let’s think about those numbers Huge difference between a hit and a miss  Could be 100x, if just L1 and main memory Would you believe 99% hits is twice as good as 97%?  Consider: cache hit time of 1 cycle miss penalty of 100 cycles  Average access time: 97% hits: 1 cycle * 100 cycles = 4 cycles 99% hits: 1 cycle * 100 cycles = 2 cycles This is why “miss rate” is used instead of “hit rate”

Writing Cache Friendly Code Make the common case go fast  Focus on the inner loops of the core functions Minimize the misses in the inner loops  Repeated references to variables are good (temporal locality)  Stride-1 reference patterns are good (spatial locality) Key idea: Our qualitative notion of locality is quantified through our understanding of cache memories

Today Cache organization and operation Performance impact of caches  The memory mountain  Rearranging loops to improve spatial locality  Using blocking to improve temporal locality

The Memory Mountain Read throughput (read bandwidth)  Number of bytes read from memory per second (MB/s) Memory mountain: Measured read throughput as a function of spatial and temporal locality.  Compact way to characterize memory system performance.

Memory Mountain Test Function long data[MAXELEMS]; /* Global array to traverse */ /* test - Iterate over first "elems" elements of * array “data” with stride of "stride", using * using 4x4 loop unrolling. */ int test(int elems, int stride) { long i, sx2=stride*2, sx3=stride*3, sx4=stride*4; long acc0 = 0, acc1 = 0, acc2 = 0, acc3 = 0; long length = elems, limit = length - sx4; /* Combine 4 elements at a time */ for (i = 0; i < limit; i += sx4) { acc0 = acc0 + data[i]; acc1 = acc1 + data[i+stride]; acc2 = acc2 + data[i+sx2]; acc3 = acc3 + data[i+sx3]; } /* Finish any remaining elements */ for (; i < length; i++) { acc0 = acc0 + data[i]; } return ((acc0 + acc1) + (acc2 + acc3)); } Call test() with many combinations of elems and stride. For each elems and stride: 1. Call test() once to warm up the caches. 2. Call test() again and measure the read throughput(MB/s) mountain/mountain.c

The Memory Mountain Core i7 Haswell 2.1 GHz 32 KB L1 d-cache 256 KB L2 cache 8 MB L3 cache 64 B block size Slopes of spatial locality Ridges of temporal locality L1 Mem L2 L3 Aggressive prefetching

Today Cache organization and operation Performance impact of caches  The memory mountain  Rearranging loops to improve spatial locality  Using blocking to improve temporal locality

Matrix Multiplication Example Description:  Multiply N x N matrices  Matrix elements are double s (8 bytes)  O(N 3 ) total operations  N reads per source element  N values summed per destination  but may be able to hold in register /* ijk */ for (i=0; i<n; i++) { for (j=0; j<n; j++) { sum = 0.0; for (k=0; k<n; k++) sum += a[i][k] * b[k][j]; c[i][j] = sum; } /* ijk */ for (i=0; i<n; i++) { for (j=0; j<n; j++) { sum = 0.0; for (k=0; k<n; k++) sum += a[i][k] * b[k][j]; c[i][j] = sum; } Variable sum held in register matmult/mm.c

Miss Rate Analysis for Matrix Multiply Assume:  Block size = 32B (big enough for four doubles)  Matrix dimension (N) is very large  Approximate 1/N as 0.0  Cache is not even big enough to hold multiple rows Analysis Method:  Look at access pattern of inner loop A k i B k j C i j = x

Layout of C Arrays in Memory (review) C arrays allocated in row-major order  each row in contiguous memory locations Stepping through columns in one row:  for (i = 0; i < N; i++) sum += a[0][i];  accesses successive elements  if block size (B) > sizeof(a ij ) bytes, exploit spatial locality  miss rate = sizeof(a ij ) / B Stepping through rows in one column:  for (i = 0; i < n; i++) sum += a[i][0];  accesses distant elements  no spatial locality!  miss rate = 1 (i.e. 100%)

Matrix Multiplication (ijk) /* ijk */ for (i=0; i<n; i++) { for (j=0; j<n; j++) { sum = 0.0; for (k=0; k<n; k++) sum += a[i][k] * b[k][j]; c[i][j] = sum; } /* ijk */ for (i=0; i<n; i++) { for (j=0; j<n; j++) { sum = 0.0; for (k=0; k<n; k++) sum += a[i][k] * b[k][j]; c[i][j] = sum; } ABC (i,*) (*,j) (i,j) Inner loop: Column- wise Row-wiseFixed Misses per inner loop iteration: ABC matmult/mm.c

Matrix Multiplication (jik) /* jik */ for (j=0; j<n; j++) { for (i=0; i<n; i++) { sum = 0.0; for (k=0; k<n; k++) sum += a[i][k] * b[k][j]; c[i][j] = sum } /* jik */ for (j=0; j<n; j++) { for (i=0; i<n; i++) { sum = 0.0; for (k=0; k<n; k++) sum += a[i][k] * b[k][j]; c[i][j] = sum } ABC (i,*) (*,j) (i,j) Inner loop: Row-wiseColumn- wise Fixed Misses per inner loop iteration: ABC matmult/mm.c

Matrix Multiplication (kij) /* kij */ for (k=0; k<n; k++) { for (i=0; i<n; i++) { r = a[i][k]; for (j=0; j<n; j++) c[i][j] += r * b[k][j]; } /* kij */ for (k=0; k<n; k++) { for (i=0; i<n; i++) { r = a[i][k]; for (j=0; j<n; j++) c[i][j] += r * b[k][j]; } ABC (i,*) (i,k)(k,*) Inner loop: Row-wise Fixed Misses per inner loop iteration: ABC matmult/mm.c

Matrix Multiplication (ikj) /* ikj */ for (i=0; i<n; i++) { for (k=0; k<n; k++) { r = a[i][k]; for (j=0; j<n; j++) c[i][j] += r * b[k][j]; } /* ikj */ for (i=0; i<n; i++) { for (k=0; k<n; k++) { r = a[i][k]; for (j=0; j<n; j++) c[i][j] += r * b[k][j]; } ABC (i,*) (i,k)(k,*) Inner loop: Row-wise Fixed Misses per inner loop iteration: ABC matmult/mm.c

Matrix Multiplication (jki) /* jki */ for (j=0; j<n; j++) { for (k=0; k<n; k++) { r = b[k][j]; for (i=0; i<n; i++) c[i][j] += a[i][k] * r; } /* jki */ for (j=0; j<n; j++) { for (k=0; k<n; k++) { r = b[k][j]; for (i=0; i<n; i++) c[i][j] += a[i][k] * r; } ABC (*,j) (k,j) Inner loop: (*,k) Column- wise Column- wise Fixed Misses per inner loop iteration: ABC matmult/mm.c

Matrix Multiplication (kji) /* kji */ for (k=0; k<n; k++) { for (j=0; j<n; j++) { r = b[k][j]; for (i=0; i<n; i++) c[i][j] += a[i][k] * r; } /* kji */ for (k=0; k<n; k++) { for (j=0; j<n; j++) { r = b[k][j]; for (i=0; i<n; i++) c[i][j] += a[i][k] * r; } ABC (*,j) (k,j) Inner loop: (*,k) FixedColumn- wise Column- wise Misses per inner loop iteration: ABC matmult/mm.c

Summary of Matrix Multiplication ijk (& jik): 2 loads, 0 stores misses/iter = 1.25 kij (& ikj): 2 loads, 1 store misses/iter = 0.5 jki (& kji): 2 loads, 1 store misses/iter = 2.0 for (i=0; i<n; i++) { for (j=0; j<n; j++) { sum = 0.0; for (k=0; k<n; k++) sum += a[i][k] * b[k][j]; c[i][j] = sum; } for (k=0; k<n; k++) { for (i=0; i<n; i++) { r = a[i][k]; for (j=0; j<n; j++) c[i][j] += r * b[k][j]; } for (j=0; j<n; j++) { for (k=0; k<n; k++) { r = b[k][j]; for (i=0; i<n; i++) c[i][j] += a[i][k] * r; }

Core i7 Matrix Multiply Performance ijk / jik jki / kji kij / ikj

Today Cache organization and operation Performance impact of caches  The memory mountain  Rearranging loops to improve spatial locality  Using blocking to improve temporal locality

Example: Matrix Multiplication ab i j * c = c = (double *) calloc(sizeof(double), n*n); /* Multiply n x n matrices a and b */ void mmm(double *a, double *b, double *c, int n) { int i, j, k; for (i = 0; i < n; i++) for (j = 0; j < n; j++) for (k = 0; k < n; k++) c[i*n + j] += a[i*n + k] * b[k*n + j]; }

Cache Miss Analysis Assume:  Matrix elements are doubles  Cache block = 8 doubles  Cache size C << n (much smaller than n) First iteration:  n/8 + n = 9n/8 misses  Afterwards in cache: (schematic) * = n * = 8 wide

Cache Miss Analysis Assume:  Matrix elements are doubles  Cache block = 8 doubles  Cache size C << n (much smaller than n) Second iteration:  Again: n/8 + n = 9n/8 misses Total misses:  9n/8 * n 2 = (9/8) * n 3 n * = 8 wide

Blocked Matrix Multiplication c = (double *) calloc(sizeof(double), n*n); /* Multiply n x n matrices a and b */ void mmm(double *a, double *b, double *c, int n) { int i, j, k; for (i = 0; i < n; i+=B) for (j = 0; j < n; j+=B) for (k = 0; k < n; k+=B) /* B x B mini matrix multiplications */ for (i1 = i; i1 < i+B; i++) for (j1 = j; j1 < j+B; j++) for (k1 = k; k1 < k+B; k++) c[i1*n+j1] += a[i1*n + k1]*b[k1*n + j1]; } ab i1 j1 * c = c + Block size B x B matmult/bmm.c

Cache Miss Analysis Assume:  Cache block = 8 doubles  Cache size C << n (much smaller than n)  Three blocks fit into cache: 3B 2 < C First (block) iteration:  B 2 /8 misses for each block  2n/B * B 2 /8 = nB/4 (omitting matrix c)  Afterwards in cache (schematic) * = * = Block size B x B n/B blocks

Cache Miss Analysis Assume:  Cache block = 8 doubles  Cache size C << n (much smaller than n)  Three blocks fit into cache: 3B 2 < C Second (block) iteration:  Same as first iteration  2n/B * B 2 /8 = nB/4 Total misses:  nB/4 * (n/B) 2 = n 3 /(4B) * = Block size B x B n/B blocks

Blocking Summary No blocking: (9/8) * n 3 Blocking: 1/(4B) * n 3 Suggest largest possible block size B, but limit 3B 2 < C! Reason for dramatic difference:  Matrix multiplication has inherent temporal locality:  Input data: 3n 2, computation 2n 3  Every array elements used O(n) times!  But program has to be written properly

Prefetching Speculate on future instruction and data accesses and fetch them into cache(s)  Instruction accesses easier to predict than data accesses Varieties of prefetching  Hardware prefetching  Software prefetching  Mixed schemes What types of misses does prefetching affect?

Issues in Prefetching Usefulness – should produce hits Timeliness – not late and not too early Cache and bandwidth pollution L1 Data L1 Instruction Unified L2 Cache RF CPU Prefetched data

Hardware Instruction Prefetching Instruction prefetch in Alpha AXP  Fetch two blocks on a miss; the requested block (i) and the next consecutive block (i+1)  Requested block placed in cache, and next block in instruction stream buffer  If miss in cache but hit in stream buffer, move stream buffer block into cache and prefetch next block (i+2) L1 Instruction Unified L2 Cache RF CPU Stream Buffer Prefetched instruction block Req block Req block

Hardware Data Prefetching Prefetch-on-miss:  Prefetch b + 1 upon miss on b One Block Lookahead (OBL) scheme  Initiate prefetch for block b + 1 when block b is accessed  Why is this different from doubling block size?  Can extend to N-block lookahead Strided prefetch  If observe sequence of accesses to block b, b+N, b+2N, then prefetch b+3N etc. Example: IBM Power 5 [2003] supports eight independent streams of strided prefetch per processor, prefetching 12 lines ahead of current access

Software Prefetching for(i=0; i < N; i++) { prefetch( &a[i + 1] ); prefetch( &b[i + 1] ); SUM = SUM + a[i] * b[i]; }

Software Prefetching Issues Timing is the biggest issue, not predictability  If you prefetch very close to when the data is required, you might be too late  Prefetch too early, cause pollution  Estimate how long it will take for the data to come into L1, so we can set P appropriately  Why is this hard to do? for(i=0; i < N; i++) { prefetch( &a[i + P ] ); prefetch( &b[i + P ] ); SUM = SUM + a[i] * b[i]; } Must consider cost of prefetch instructions

Cache Summary Cache memories can have significant performance impact You can write your programs to exploit this!  Focus on the inner loops, where bulk of computations and memory accesses occur.  Try to maximize spatial locality by reading data objects with sequentially with stride 1.  Try to maximize temporal locality by using a data object as often as possible once it’s read from memory.

Acknowledgements These slides contain material developed and copyright by:  Arvind (MIT)  Krste Asanovic (MIT/UCB)  Joel Emer (Intel/MIT)  James Hoe (CMU)  John Kubiatowicz (UCB)  David Patterson (UCB) MIT material derived from course UCB material derived from course CS252