没有合适的资源?快使用搜索试试~ 我知道了~
首页CCIX_Base_Specification_Revision1.1_Version1.0.pdf
资源详情
资源评论
资源推荐
September 6, 2019 © 2016-2019 CCIX Consortium, Inc. ALL RIGHTS RESERVED. CONFIDENTIAL 1 of 404
Cache Coherent Interconnect
for Accelerators
CCIX® Base Specification
Revision 1.1 Version 1.0
September 6, 2019
September 6, 2019 © 2016-2019 CCIX Consortium, Inc. ALL RIGHTS RESERVED. CONFIDENTIAL 2 of 404
LEGAL NOTICE
© 2016-2019 CCIX CONSORTIUM, INC. ALL RIGHTS RESERVED.
This CCIX Base Specification Revision 1.1 Version 1.0 (this “document”) is proprietary to CCIX Consortium, Inc. (sometimes also
referred to as “Company”) and/or its successors and assigns.
NOTICE TO USERS WHO ARE CCIX CONSORTIUM, INC. MEMBERS: 5
Members of CCIX Consortium, Inc. (“CCIX Member(s)”) may use and/or implement this CCIX Base Specification Revision 1.1
Version 1.0 subject, however, to the CCIX Member’s compliance with all of the terms and condition of the Company’s Intellectual
Property Policy, Bylaws, and all other Company policies and procedures (“CCIX Governing Documents”) and the CCIX Member’s
Participation Agreement.
Each CCIX Member hereby agrees that its use and/or implementation of this CCIX Base Specification Revision 1.1 Version 1.0 and/or 10
any of the specifications described herein are subject to the following additional terms and conditions:
(i) The Company takes no position regarding, and each CCIX Member is solely responsible for determining on its own, the existence,
validity, and/or scope of any intellectual property rights or any other rights (including without limitation any “Essential Claims”
under the Company’s Intellectual Property Policy) that any third party (including without limitation any other CCIX Member) may 15
own or otherwise hold which may (or may not) pertain to or cover any implementation or other use of this CCIX Base
Specification Revision 1.1 Version 1.0 or any specifications described herein.
(ii) Each CCIX Member is solely responsible for:
(a) determining whether any license or other consent (including without limitation any “FRAND License” under the Company’s
20
Intellectual Property Policy) from any third party (including without limitation from any other CCIX Member) is needed to
implement or otherwise use this CCIX Base Specification Revision 1.1 Version 1.0 or any of the specifications described
herein; and
(b) Negotiating and obtaining, for itself, any such license or other consent (including without limitation any “FRAND License”
under the Company’s Intellectual Property Policy) from any and all such third parties (including without limitation from other 25
CCIX Members).
NOTICE TO NON-MEMBERS OF CCIX CONSORTIUM, INC.:
If you are not a CCIX Member and you have obtained a copy of this document, you only have a right to review this document or make
reference to or cite this document. Any such references or citations to this document must acknowledge CCIX Consortium’s Inc.’s 30
copyright ownership of this document. The proper copyright citation or reference is as follows: “©2016-2019 CCIX CONSORTIUM,
INC. ALL RIGHTS RESERVED.” When making any such citation or reference to this document you are not permitted to revise, alter,
modify, make any derivatives of, or otherwise amend the referenced portion of this document in any way without the prior express written
permission of CCIX Consortium, Inc. Nothing contained in this document shall be deemed as granting (either expressly or impliedly) to
any party that is not a CCIX Member: (ii) any kind of license to implement or use this document or any specifications described therein or 35
any of its contents, or any kind of license in or to any other intellectual property owned or controlled by CCIX Consortium, Inc., including
without limitation any trademarks of CCIX Consortium, Inc.; or (ii) any benefits and/or rights as a CCIX Member under any CCIX
Governing Documents.
If you are not a CCIX Member but still elect to implement this document or any of the specifications described herein, you are hereby
given further notice that your election to do so does not give you any of the rights and/or protections of CCIX Members, including without 40
limitation any of the rights and/or protections of CCIX Members under the Company’s Intellectual Property Policy or other CCIX
Governing Documents.
LEGAL DISCLAIMERS FOR ALL PARTIES:
THIS DOCUMENT AND ALL SPECIFICATIONS AND/OR OTHER CONTENT PROVIDED HEREIN IS PROVIDED ON AN “AS
IS” BASIS. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, CCIX CONSORTIUM, INC. (ALONG WITH THE 45
CONTRIBUTORS TO THIS DOCUMENT) HEREBY DISCLAIM ALL REPRESENTATIONS, WARRANTIES AND/OR
COVENANTS, EITHER EXPRESS OR IMPLIED, STATUTORY OR AT COMMON LAW, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, VALIDITY,
AND/OR NONINFRINGEMENT. In the event this document makes any references (including without limitation any incorporation by
reference) to another party’s (“Third Party”) content or work, including without limitation any specifications or standards of a Third Party 50
(“Third Party Content”), you may need to independently obtain a license or other consent from that Third Party in order to have full rights
to implement or use that Third Party Content.
September 6, 2019 © 2016-2019 CCIX Consortium, Inc. ALL RIGHTS RESERVED. CONFIDENTIAL 3 of 404
Table of Contents
Chapter 1. Document Overview ................................................................................................................ 18
1.1
SPECIFICATION OBJECTIVE ......................................................................................................................... 18
1.2
TERMS AND ACRONYMS ........................................................................................................................... 18
1.3
REFERENCE DOCUMENTS .......................................................................................................................... 21
Chapter 2. CCIX Overview .......................................................................................................................... 22
2.1
INTRODUCTION ....................................................................................................................................... 22
2.2
TOPOLOGIES ........................................................................................................................................... 23
2.3
CCIX ARCHITECTURE MODEL ..................................................................................................................... 24
Components of the CCIX Architecture ........................................................................................ 25
Port Aggregation ......................................................................................................................... 27
CCIX Extended Data Rate Physical Layer ..................................................................................... 28
2.4
CCIX MANAGEMENT FRAMEWORK ............................................................................................................ 28
2.5
RAS ARCHITECTURE ................................................................................................................................. 28
2.6
ADDRESS TRANSLATION SERVICE ................................................................................................................ 28
2.7
SIGNALING HOSTS FROM ACCELERATORS ..................................................................................................... 29
2.8
ESTABLISHING TRUST WITH A CCIX ACCELERATOR ........................................................................................ 29
Chapter 3. Protocol Layer .......................................................................................................................... 30
3.1
INTRODUCTION ....................................................................................................................................... 30
CCIX Agents ................................................................................................................................. 30 5
Discovery and Enumeration ........................................................................................................ 32
Topologies ................................................................................................................................... 33
3.2
MESSAGE FIELDS ..................................................................................................................................... 34
Request Message ........................................................................................................................ 34
Snoop Message ........................................................................................................................... 36
Response Message ...................................................................................................................... 37 10
Field Descriptions ........................................................................................................................ 37
3.3
COHERENCE PROTOCOL ............................................................................................................................ 41
Cache States ................................................................................................................................ 41
Request Types ............................................................................................................................. 44
Request Responses ..................................................................................................................... 52
Snoop Requests ........................................................................................................................... 53 15
CCIX Base Specification Revision 1.1 Version 1.0 Table of Contents
September 6, 2019 © 2016-2019 CCIX Consortium, Inc. ALL RIGHTS RESERVED. CONFIDENTIAL 4 of 404
Snoop Responses ........................................................................................................................ 58
MiscOp Encoding ........................................................................................................................ 61
Protocol Error Report .................................................................................................................. 61
Request Cache State Transitions................................................................................................. 61
State Transitions at Snoopee ...................................................................................................... 64 5
Silent Cache State Transitions ................................................................................................... 66
Controlling the use of Evict and WriteEvictFull transactions .................................................... 67
Simultaneous Outstanding Requests ........................................................................................ 68
Request to Snoop Hazard ......................................................................................................... 68
3.4
TRANSACTION STRUCTURE ........................................................................................................................ 71
Request Transactions .................................................................................................................. 71 10
Snoop Transactions ..................................................................................................................... 75
3.5
ADDRESS, CONTROL, AND DATA ................................................................................................................. 77
Address and Data Alignment ...................................................................................................... 77
Request Attributes ...................................................................................................................... 77
Permitted Memory Type for Requests ....................................................................................... 79
Data and Byte Enables ................................................................................................................ 80 15
3.6 ORDERING .............................................................................................................................................. 84
Multi-copy Atomicity .................................................................................................................. 84
Completion Response and Ordering ........................................................................................... 84
CompAck ..................................................................................................................................... 85
Comp and Outstanding CompAck Dependency .......................................................................... 85
3.7
FLOW CONTROL AND PROTOCOL CREDITS ..................................................................................................... 85
Protocol Credits .......................................................................................................................... 85 20
Credit Exchange .......................................................................................................................... 87
3.8
MISCELLANEOUS MESSAGES ...................................................................................................................... 89
Uncredited Misc Messages ......................................................................................................... 90
Credited Misc Messages ............................................................................................................. 90
ID Namespace ............................................................................................................................. 90
Extension Fields in Misc Message ............................................................................................... 90 25
3.9 ERROR HANDLING .................................................................................................................................... 90
Error Classification ...................................................................................................................... 90
3.10
PACKET HEADER .................................................................................................................................... 91
Packet Header ........................................................................................................................... 91
CCIX Base Specification Revision 1.1 Version 1.0 Table of Contents
September 6, 2019 © 2016-2019 CCIX Consortium, Inc. ALL RIGHTS RESERVED. CONFIDENTIAL 5 of 404
Message Packing ....................................................................................................................... 94
3.11
MESSAGE FORMATS ............................................................................................................................... 95
Read Request ............................................................................................................................ 95
Write Request ........................................................................................................................... 95
Response without Data ............................................................................................................. 96
Response with Data .................................................................................................................. 97 5
Snoop ........................................................................................................................................ 97
Miscellaneous Message type .................................................................................................... 98
Request Chaining .................................................................................................................... 100
Snoop Chaining ....................................................................................................................... 100
Extension fields ....................................................................................................................... 101 10
3.12 OPTIONAL FEATURES AND PARAMETERS .................................................................................................. 103
CompAck Removal .................................................................................................................. 103
Partial Cache States ................................................................................................................ 104
Cache Line Size ........................................................................................................................ 104
Address Width......................................................................................................................... 104
Packet Header ......................................................................................................................... 104 15
Message Packing Enable ......................................................................................................... 104
Maximum Packet Size ............................................................................................................. 105
Summary of Properties ........................................................................................................... 105
3.13
MESSAGE ROUTING AND AGENT ID ASSIGNMENT ..................................................................................... 105
Message Routing ..................................................................................................................... 105
Broadcast Snoop Routing ........................................................................................................ 108 20
TxnID Assignment ................................................................................................................... 109
Agent ID .................................................................................................................................. 110
Target ID Determination ......................................................................................................... 110
Agent ID assignment Summary ............................................................................................... 110
3.14
MEMORY EXPANSION ........................................................................................................................... 111
Concurrent Memory Expansion .............................................................................................. 112 25
3.15 PORT AGGREGATION ............................................................................................................................ 113
Port Aggregation Routing ....................................................................................................... 114
3.16
TERMINOLOGY .................................................................................................................................... 114
3.17
TRANSACTION FLOW EXAMPLES ............................................................................................................. 117
Read Request with End-to-End CompAck ............................................................................... 118
剩余403页未读,继续阅读
linshishan
- 粉丝: 0
- 资源: 7
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- stc12c5a60s2 例程
- Android通过全局变量传递数据
- c++校园超市商品信息管理系统课程设计说明书(含源代码) (2).pdf
- 建筑供配电系统相关课件.pptx
- 企业管理规章制度及管理模式.doc
- vb打开摄像头.doc
- 云计算-可信计算中认证协议改进方案.pdf
- [详细完整版]单片机编程4.ppt
- c语言常用算法.pdf
- c++经典程序代码大全.pdf
- 单片机数字时钟资料.doc
- 11项目管理前沿1.0.pptx
- 基于ssm的“魅力”繁峙宣传网站的设计与实现论文.doc
- 智慧交通综合解决方案.pptx
- 建筑防潮设计-PowerPointPresentati.pptx
- SPC统计过程控制程序.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0