没有合适的资源?快使用搜索试试~ 我知道了~
首页CCIX_Base_Specification_Revision1.1_Version1.0.pdf
资源详情
资源评论
资源推荐
September 6, 2019 © 2016-2019 CCIX Consortium, Inc. ALL RIGHTS RESERVED. CONFIDENTIAL 1 of 404
Cache Coherent Interconnect
for Accelerators
CCIX® Base Specification
Revision 1.1 Version 1.0
September 6, 2019
September 6, 2019 © 2016-2019 CCIX Consortium, Inc. ALL RIGHTS RESERVED. CONFIDENTIAL 2 of 404
LEGAL NOTICE
© 2016-2019 CCIX CONSORTIUM, INC. ALL RIGHTS RESERVED.
This CCIX Base Specification Revision 1.1 Version 1.0 (this “document”) is proprietary to CCIX Consortium, Inc. (sometimes also
referred to as “Company”) and/or its successors and assigns.
NOTICE TO USERS WHO ARE CCIX CONSORTIUM, INC. MEMBERS: 5
Members of CCIX Consortium, Inc. (“CCIX Member(s)”) may use and/or implement this CCIX Base Specification Revision 1.1
Version 1.0 subject, however, to the CCIX Member’s compliance with all of the terms and condition of the Company’s Intellectual
Property Policy, Bylaws, and all other Company policies and procedures (“CCIX Governing Documents”) and the CCIX Member’s
Participation Agreement.
Each CCIX Member hereby agrees that its use and/or implementation of this CCIX Base Specification Revision 1.1 Version 1.0 and/or 10
any of the specifications described herein are subject to the following additional terms and conditions:
(i) The Company takes no position regarding, and each CCIX Member is solely responsible for determining on its own, the existence,
validity, and/or scope of any intellectual property rights or any other rights (including without limitation any “Essential Claims”
under the Company’s Intellectual Property Policy) that any third party (including without limitation any other CCIX Member) may 15
own or otherwise hold which may (or may not) pertain to or cover any implementation or other use of this CCIX Base
Specification Revision 1.1 Version 1.0 or any specifications described herein.
(ii) Each CCIX Member is solely responsible for:
(a) determining whether any license or other consent (including without limitation any “FRAND License” under the Company’s
20
Intellectual Property Policy) from any third party (including without limitation from any other CCIX Member) is needed to
implement or otherwise use this CCIX Base Specification Revision 1.1 Version 1.0 or any of the specifications described
herein; and
(b) Negotiating and obtaining, for itself, any such license or other consent (including without limitation any “FRAND License”
under the Company’s Intellectual Property Policy) from any and all such third parties (including without limitation from other 25
CCIX Members).
NOTICE TO NON-MEMBERS OF CCIX CONSORTIUM, INC.:
If you are not a CCIX Member and you have obtained a copy of this document, you only have a right to review this document or make
reference to or cite this document. Any such references or citations to this document must acknowledge CCIX Consortium’s Inc.’s 30
copyright ownership of this document. The proper copyright citation or reference is as follows: “©2016-2019 CCIX CONSORTIUM,
INC. ALL RIGHTS RESERVED.” When making any such citation or reference to this document you are not permitted to revise, alter,
modify, make any derivatives of, or otherwise amend the referenced portion of this document in any way without the prior express written
permission of CCIX Consortium, Inc. Nothing contained in this document shall be deemed as granting (either expressly or impliedly) to
any party that is not a CCIX Member: (ii) any kind of license to implement or use this document or any specifications described therein or 35
any of its contents, or any kind of license in or to any other intellectual property owned or controlled by CCIX Consortium, Inc., including
without limitation any trademarks of CCIX Consortium, Inc.; or (ii) any benefits and/or rights as a CCIX Member under any CCIX
Governing Documents.
If you are not a CCIX Member but still elect to implement this document or any of the specifications described herein, you are hereby
given further notice that your election to do so does not give you any of the rights and/or protections of CCIX Members, including without 40
limitation any of the rights and/or protections of CCIX Members under the Company’s Intellectual Property Policy or other CCIX
Governing Documents.
LEGAL DISCLAIMERS FOR ALL PARTIES:
THIS DOCUMENT AND ALL SPECIFICATIONS AND/OR OTHER CONTENT PROVIDED HEREIN IS PROVIDED ON AN “AS
IS” BASIS. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, CCIX CONSORTIUM, INC. (ALONG WITH THE 45
CONTRIBUTORS TO THIS DOCUMENT) HEREBY DISCLAIM ALL REPRESENTATIONS, WARRANTIES AND/OR
COVENANTS, EITHER EXPRESS OR IMPLIED, STATUTORY OR AT COMMON LAW, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, VALIDITY,
AND/OR NONINFRINGEMENT. In the event this document makes any references (including without limitation any incorporation by
reference) to another party’s (“Third Party”) content or work, including without limitation any specifications or standards of a Third Party 50
(“Third Party Content”), you may need to independently obtain a license or other consent from that Third Party in order to have full rights
to implement or use that Third Party Content.
September 6, 2019 © 2016-2019 CCIX Consortium, Inc. ALL RIGHTS RESERVED. CONFIDENTIAL 3 of 404
Table of Contents
Chapter 1. Document Overview ................................................................................................................ 18
1.1
SPECIFICATION OBJECTIVE ......................................................................................................................... 18
1.2
TERMS AND ACRONYMS ........................................................................................................................... 18
1.3
REFERENCE DOCUMENTS .......................................................................................................................... 21
Chapter 2. CCIX Overview .......................................................................................................................... 22
2.1
INTRODUCTION ....................................................................................................................................... 22
2.2
TOPOLOGIES ........................................................................................................................................... 23
2.3
CCIX ARCHITECTURE MODEL ..................................................................................................................... 24
Components of the CCIX Architecture ........................................................................................ 25
Port Aggregation ......................................................................................................................... 27
CCIX Extended Data Rate Physical Layer ..................................................................................... 28
2.4
CCIX MANAGEMENT FRAMEWORK ............................................................................................................ 28
2.5
RAS ARCHITECTURE ................................................................................................................................. 28
2.6
ADDRESS TRANSLATION SERVICE ................................................................................................................ 28
2.7
SIGNALING HOSTS FROM ACCELERATORS ..................................................................................................... 29
2.8
ESTABLISHING TRUST WITH A CCIX ACCELERATOR ........................................................................................ 29
Chapter 3. Protocol Layer .......................................................................................................................... 30
3.1
INTRODUCTION ....................................................................................................................................... 30
CCIX Agents ................................................................................................................................. 30 5
Discovery and Enumeration ........................................................................................................ 32
Topologies ................................................................................................................................... 33
3.2
MESSAGE FIELDS ..................................................................................................................................... 34
Request Message ........................................................................................................................ 34
Snoop Message ........................................................................................................................... 36
Response Message ...................................................................................................................... 37 10
Field Descriptions ........................................................................................................................ 37
3.3
COHERENCE PROTOCOL ............................................................................................................................ 41
Cache States ................................................................................................................................ 41
Request Types ............................................................................................................................. 44
Request Responses ..................................................................................................................... 52
Snoop Requests ........................................................................................................................... 53 15
CCIX Base Specification Revision 1.1 Version 1.0 Table of Contents
September 6, 2019 © 2016-2019 CCIX Consortium, Inc. ALL RIGHTS RESERVED. CONFIDENTIAL 4 of 404
Snoop Responses ........................................................................................................................ 58
MiscOp Encoding ........................................................................................................................ 61
Protocol Error Report .................................................................................................................. 61
Request Cache State Transitions................................................................................................. 61
State Transitions at Snoopee ...................................................................................................... 64 5
Silent Cache State Transitions ................................................................................................... 66
Controlling the use of Evict and WriteEvictFull transactions .................................................... 67
Simultaneous Outstanding Requests ........................................................................................ 68
Request to Snoop Hazard ......................................................................................................... 68
3.4
TRANSACTION STRUCTURE ........................................................................................................................ 71
Request Transactions .................................................................................................................. 71 10
Snoop Transactions ..................................................................................................................... 75
3.5
ADDRESS, CONTROL, AND DATA ................................................................................................................. 77
Address and Data Alignment ...................................................................................................... 77
Request Attributes ...................................................................................................................... 77
Permitted Memory Type for Requests ....................................................................................... 79
Data and Byte Enables ................................................................................................................ 80 15
3.6 ORDERING .............................................................................................................................................. 84
Multi-copy Atomicity .................................................................................................................. 84
Completion Response and Ordering ........................................................................................... 84
CompAck ..................................................................................................................................... 85
Comp and Outstanding CompAck Dependency .......................................................................... 85
3.7
FLOW CONTROL AND PROTOCOL CREDITS ..................................................................................................... 85
Protocol Credits .......................................................................................................................... 85 20
Credit Exchange .......................................................................................................................... 87
3.8
MISCELLANEOUS MESSAGES ...................................................................................................................... 89
Uncredited Misc Messages ......................................................................................................... 90
Credited Misc Messages ............................................................................................................. 90
ID Namespace ............................................................................................................................. 90
Extension Fields in Misc Message ............................................................................................... 90 25
3.9 ERROR HANDLING .................................................................................................................................... 90
Error Classification ...................................................................................................................... 90
3.10
PACKET HEADER .................................................................................................................................... 91
Packet Header ........................................................................................................................... 91
CCIX Base Specification Revision 1.1 Version 1.0 Table of Contents
September 6, 2019 © 2016-2019 CCIX Consortium, Inc. ALL RIGHTS RESERVED. CONFIDENTIAL 5 of 404
Message Packing ....................................................................................................................... 94
3.11
MESSAGE FORMATS ............................................................................................................................... 95
Read Request ............................................................................................................................ 95
Write Request ........................................................................................................................... 95
Response without Data ............................................................................................................. 96
Response with Data .................................................................................................................. 97 5
Snoop ........................................................................................................................................ 97
Miscellaneous Message type .................................................................................................... 98
Request Chaining .................................................................................................................... 100
Snoop Chaining ....................................................................................................................... 100
Extension fields ....................................................................................................................... 101 10
3.12 OPTIONAL FEATURES AND PARAMETERS .................................................................................................. 103
CompAck Removal .................................................................................................................. 103
Partial Cache States ................................................................................................................ 104
Cache Line Size ........................................................................................................................ 104
Address Width......................................................................................................................... 104
Packet Header ......................................................................................................................... 104 15
Message Packing Enable ......................................................................................................... 104
Maximum Packet Size ............................................................................................................. 105
Summary of Properties ........................................................................................................... 105
3.13
MESSAGE ROUTING AND AGENT ID ASSIGNMENT ..................................................................................... 105
Message Routing ..................................................................................................................... 105
Broadcast Snoop Routing ........................................................................................................ 108 20
TxnID Assignment ................................................................................................................... 109
Agent ID .................................................................................................................................. 110
Target ID Determination ......................................................................................................... 110
Agent ID assignment Summary ............................................................................................... 110
3.14
MEMORY EXPANSION ........................................................................................................................... 111
Concurrent Memory Expansion .............................................................................................. 112 25
3.15 PORT AGGREGATION ............................................................................................................................ 113
Port Aggregation Routing ....................................................................................................... 114
3.16
TERMINOLOGY .................................................................................................................................... 114
3.17
TRANSACTION FLOW EXAMPLES ............................................................................................................. 117
Read Request with End-to-End CompAck ............................................................................... 118
剩余403页未读,继续阅读
彭本华
- 粉丝: 4
- 资源: 5
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- 2023年中国辣条食品行业创新及消费需求洞察报告.pptx
- 2023年半导体行业20强品牌.pptx
- 2023年全球电力行业评论.pptx
- 2023年全球网络安全现状-劳动力资源和网络运营的全球发展新态势.pptx
- 毕业设计-基于单片机的液体密度检测系统设计.doc
- 家用清扫机器人设计.doc
- 基于VB+数据库SQL的教师信息管理系统设计与实现 计算机专业设计范文模板参考资料.pdf
- 官塘驿林场林防火(资源监管)“空天地人”四位一体监测系统方案.doc
- 基于专利语义表征的技术预见方法及其应用.docx
- 浅谈电子商务的现状及发展趋势学习总结.doc
- 基于单片机的智能仓库温湿度控制系统 (2).pdf
- 基于SSM框架知识产权管理系统 (2).pdf
- 9年终工作总结新年计划PPT模板.pptx
- Hytera海能达CH04L01 说明书.pdf
- 数据中心运维操作标准及流程.pdf
- 报告模板 -成本分析与报告培训之三.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论1