xbar.cc revision 10414:3dabe649f1df
1/*
2 * Copyright (c) 2011-2014 ARM Limited
3 * All rights reserved
4 *
5 * The license below extends only to copyright in the software and shall
6 * not be construed as granting a license to any other intellectual
7 * property including but not limited to intellectual property relating
8 * to a hardware implementation of the functionality of the software
9 * licensed hereunder.  You may use the software subject to the license
10 * terms below provided that you ensure that this notice is replicated
11 * unmodified and in its entirety in all distributions of the software,
12 * modified or unmodified, in source code or in binary form.
13 *
14 * Copyright (c) 2006 The Regents of The University of Michigan
15 * All rights reserved.
16 *
17 * Redistribution and use in source and binary forms, with or without
18 * modification, are permitted provided that the following conditions are
19 * met: redistributions of source code must retain the above copyright
20 * notice, this list of conditions and the following disclaimer;
21 * redistributions in binary form must reproduce the above copyright
22 * notice, this list of conditions and the following disclaimer in the
23 * documentation and/or other materials provided with the distribution;
24 * neither the name of the copyright holders nor the names of its
25 * contributors may be used to endorse or promote products derived from
26 * this software without specific prior written permission.
27 *
28 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
29 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
30 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
31 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
32 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
33 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
34 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
35 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
36 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
37 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
38 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
39 *
40 * Authors: Ali Saidi
41 *          Andreas Hansson
42 *          William Wang
43 */
44
45/**
46 * @file
47 * Definition of a crossbar object.
48 */
49
50#include "base/misc.hh"
51#include "base/trace.hh"
52#include "debug/AddrRanges.hh"
53#include "debug/Drain.hh"
54#include "debug/XBar.hh"
55#include "mem/xbar.hh"
56
57BaseXBar::BaseXBar(const BaseXBarParams *p)
58    : MemObject(p),
59      headerCycles(p->header_cycles), width(p->width),
60      gotAddrRanges(p->port_default_connection_count +
61                          p->port_master_connection_count, false),
62      gotAllAddrRanges(false), defaultPortID(InvalidPortID),
63      useDefaultRange(p->use_default_range)
64{}
65
66BaseXBar::~BaseXBar()
67{
68    for (auto m: masterPorts)
69        delete m;
70
71    for (auto s: slavePorts)
72        delete s;
73}
74
75void
76BaseXBar::init()
77{
78}
79
80BaseMasterPort &
81BaseXBar::getMasterPort(const std::string &if_name, PortID idx)
82{
83    if (if_name == "master" && idx < masterPorts.size()) {
84        // the master port index translates directly to the vector position
85        return *masterPorts[idx];
86    } else  if (if_name == "default") {
87        return *masterPorts[defaultPortID];
88    } else {
89        return MemObject::getMasterPort(if_name, idx);
90    }
91}
92
93BaseSlavePort &
94BaseXBar::getSlavePort(const std::string &if_name, PortID idx)
95{
96    if (if_name == "slave" && idx < slavePorts.size()) {
97        // the slave port index translates directly to the vector position
98        return *slavePorts[idx];
99    } else {
100        return MemObject::getSlavePort(if_name, idx);
101    }
102}
103
104void
105BaseXBar::calcPacketTiming(PacketPtr pkt)
106{
107    // the crossbar will be called at a time that is not necessarily
108    // coinciding with its own clock, so start by determining how long
109    // until the next clock edge (could be zero)
110    Tick offset = clockEdge() - curTick();
111
112    // determine how many cycles are needed to send the data
113    unsigned dataCycles = pkt->hasData() ? divCeil(pkt->getSize(), width) : 0;
114
115    // before setting the bus delay fields of the packet, ensure that
116    // the delay from any previous crossbar has been accounted for
117    if (pkt->firstWordDelay != 0 || pkt->lastWordDelay != 0)
118        panic("Packet %s already has delay (%d, %d) that should be "
119              "accounted for.\n", pkt->cmdString(), pkt->firstWordDelay,
120              pkt->lastWordDelay);
121
122    // The first word will be delivered on the cycle after the header.
123    pkt->firstWordDelay = (headerCycles + 1) * clockPeriod() + offset;
124
125    // Note that currently lastWordDelay can be smaller than
126    // firstWordDelay if the packet has no data
127    pkt->lastWordDelay = (headerCycles + dataCycles) * clockPeriod() +
128        offset;
129}
130
131template <typename SrcType, typename DstType>
132BaseXBar::Layer<SrcType,DstType>::Layer(DstType& _port, BaseXBar& _xbar,
133                                       const std::string& _name) :
134    port(_port), xbar(_xbar), _name(_name), state(IDLE), drainManager(NULL),
135    waitingForPeer(NULL), releaseEvent(this)
136{
137}
138
139template <typename SrcType, typename DstType>
140void BaseXBar::Layer<SrcType,DstType>::occupyLayer(Tick until)
141{
142    // ensure the state is busy at this point, as the layer should
143    // transition from idle as soon as it has decided to forward the
144    // packet to prevent any follow-on calls to sendTiming seeing an
145    // unoccupied layer
146    assert(state == BUSY);
147
148    // until should never be 0 as express snoops never occupy the layer
149    assert(until != 0);
150    xbar.schedule(releaseEvent, until);
151
152    // account for the occupied ticks
153    occupancy += until - curTick();
154
155    DPRINTF(BaseXBar, "The crossbar layer is now busy from tick %d to %d\n",
156            curTick(), until);
157}
158
159template <typename SrcType, typename DstType>
160bool
161BaseXBar::Layer<SrcType,DstType>::tryTiming(SrcType* src_port)
162{
163    // if we are in the retry state, we will not see anything but the
164    // retrying port (or in the case of the snoop ports the snoop
165    // response port that mirrors the actual slave port) as we leave
166    // this state again in zero time if the peer does not immediately
167    // call the layer when receiving the retry
168
169    // first we see if the layer is busy, next we check if the
170    // destination port is already engaged in a transaction waiting
171    // for a retry from the peer
172    if (state == BUSY || waitingForPeer != NULL) {
173        // the port should not be waiting already
174        assert(std::find(waitingForLayer.begin(), waitingForLayer.end(),
175                         src_port) == waitingForLayer.end());
176
177        // put the port at the end of the retry list waiting for the
178        // layer to be freed up (and in the case of a busy peer, for
179        // that transaction to go through, and then the layer to free
180        // up)
181        waitingForLayer.push_back(src_port);
182        return false;
183    }
184
185    state = BUSY;
186
187    return true;
188}
189
190template <typename SrcType, typename DstType>
191void
192BaseXBar::Layer<SrcType,DstType>::succeededTiming(Tick busy_time)
193{
194    // we should have gone from idle or retry to busy in the tryTiming
195    // test
196    assert(state == BUSY);
197
198    // occupy the layer accordingly
199    occupyLayer(busy_time);
200}
201
202template <typename SrcType, typename DstType>
203void
204BaseXBar::Layer<SrcType,DstType>::failedTiming(SrcType* src_port,
205                                              Tick busy_time)
206{
207    // ensure no one got in between and tried to send something to
208    // this port
209    assert(waitingForPeer == NULL);
210
211    // if the source port is the current retrying one or not, we have
212    // failed in forwarding and should track that we are now waiting
213    // for the peer to send a retry
214    waitingForPeer = src_port;
215
216    // we should have gone from idle or retry to busy in the tryTiming
217    // test
218    assert(state == BUSY);
219
220    // occupy the bus accordingly
221    occupyLayer(busy_time);
222}
223
224template <typename SrcType, typename DstType>
225void
226BaseXBar::Layer<SrcType,DstType>::releaseLayer()
227{
228    // releasing the bus means we should now be idle
229    assert(state == BUSY);
230    assert(!releaseEvent.scheduled());
231
232    // update the state
233    state = IDLE;
234
235    // bus layer is now idle, so if someone is waiting we can retry
236    if (!waitingForLayer.empty()) {
237        // there is no point in sending a retry if someone is still
238        // waiting for the peer
239        if (waitingForPeer == NULL)
240            retryWaiting();
241    } else if (waitingForPeer == NULL && drainManager) {
242        DPRINTF(Drain, "Crossbar done draining, signaling drain manager\n");
243        //If we weren't able to drain before, do it now.
244        drainManager->signalDrainDone();
245        // Clear the drain event once we're done with it.
246        drainManager = NULL;
247    }
248}
249
250template <typename SrcType, typename DstType>
251void
252BaseXBar::Layer<SrcType,DstType>::retryWaiting()
253{
254    // this should never be called with no one waiting
255    assert(!waitingForLayer.empty());
256
257    // we always go to retrying from idle
258    assert(state == IDLE);
259
260    // update the state
261    state = RETRY;
262
263    // set the retrying port to the front of the retry list and pop it
264    // off the list
265    SrcType* retryingPort = waitingForLayer.front();
266    waitingForLayer.pop_front();
267
268    // tell the port to retry, which in some cases ends up calling the
269    // layer again
270    retryingPort->sendRetry();
271
272    // If the layer is still in the retry state, sendTiming wasn't
273    // called in zero time (e.g. the cache does this), burn a cycle
274    if (state == RETRY) {
275        // update the state to busy and reset the retrying port, we
276        // have done our bit and sent the retry
277        state = BUSY;
278
279        // occupy the crossbar layer until the next cycle ends
280        occupyLayer(xbar.clockEdge(Cycles(1)));
281    }
282}
283
284template <typename SrcType, typename DstType>
285void
286BaseXBar::Layer<SrcType,DstType>::recvRetry()
287{
288    // we should never get a retry without having failed to forward
289    // something to this port
290    assert(waitingForPeer != NULL);
291
292    // add the port where the failed packet originated to the front of
293    // the waiting ports for the layer, this allows us to call retry
294    // on the port immediately if the crossbar layer is idle
295    waitingForLayer.push_front(waitingForPeer);
296
297    // we are no longer waiting for the peer
298    waitingForPeer = NULL;
299
300    // if the layer is idle, retry this port straight away, if we
301    // are busy, then simply let the port wait for its turn
302    if (state == IDLE) {
303        retryWaiting();
304    } else {
305        assert(state == BUSY);
306    }
307}
308
309PortID
310BaseXBar::findPort(Addr addr)
311{
312    // we should never see any address lookups before we've got the
313    // ranges of all connected slave modules
314    assert(gotAllAddrRanges);
315
316    // Check the cache
317    PortID dest_id = checkPortCache(addr);
318    if (dest_id != InvalidPortID)
319        return dest_id;
320
321    // Check the address map interval tree
322    auto i = portMap.find(addr);
323    if (i != portMap.end()) {
324        dest_id = i->second;
325        updatePortCache(dest_id, i->first);
326        return dest_id;
327    }
328
329    // Check if this matches the default range
330    if (useDefaultRange) {
331        if (defaultRange.contains(addr)) {
332            DPRINTF(AddrRanges, "  found addr %#llx on default\n",
333                    addr);
334            return defaultPortID;
335        }
336    } else if (defaultPortID != InvalidPortID) {
337        DPRINTF(AddrRanges, "Unable to find destination for addr %#llx, "
338                "will use default port\n", addr);
339        return defaultPortID;
340    }
341
342    // we should use the range for the default port and it did not
343    // match, or the default port is not set
344    fatal("Unable to find destination for addr %#llx on %s\n", addr,
345          name());
346}
347
348/** Function called by the port when the crossbar is receiving a range change.*/
349void
350BaseXBar::recvRangeChange(PortID master_port_id)
351{
352    DPRINTF(AddrRanges, "Received range change from slave port %s\n",
353            masterPorts[master_port_id]->getSlavePort().name());
354
355    // remember that we got a range from this master port and thus the
356    // connected slave module
357    gotAddrRanges[master_port_id] = true;
358
359    // update the global flag
360    if (!gotAllAddrRanges) {
361        // take a logical AND of all the ports and see if we got
362        // ranges from everyone
363        gotAllAddrRanges = true;
364        std::vector<bool>::const_iterator r = gotAddrRanges.begin();
365        while (gotAllAddrRanges &&  r != gotAddrRanges.end()) {
366            gotAllAddrRanges &= *r++;
367        }
368        if (gotAllAddrRanges)
369            DPRINTF(AddrRanges, "Got address ranges from all slaves\n");
370    }
371
372    // note that we could get the range from the default port at any
373    // point in time, and we cannot assume that the default range is
374    // set before the other ones are, so we do additional checks once
375    // all ranges are provided
376    if (master_port_id == defaultPortID) {
377        // only update if we are indeed checking ranges for the
378        // default port since the port might not have a valid range
379        // otherwise
380        if (useDefaultRange) {
381            AddrRangeList ranges = masterPorts[master_port_id]->getAddrRanges();
382
383            if (ranges.size() != 1)
384                fatal("Crossbar %s may only have a single default range",
385                      name());
386
387            defaultRange = ranges.front();
388        }
389    } else {
390        // the ports are allowed to update their address ranges
391        // dynamically, so remove any existing entries
392        if (gotAddrRanges[master_port_id]) {
393            for (auto p = portMap.begin(); p != portMap.end(); ) {
394                if (p->second == master_port_id)
395                    // erasing invalidates the iterator, so advance it
396                    // before the deletion takes place
397                    portMap.erase(p++);
398                else
399                    p++;
400            }
401        }
402
403        AddrRangeList ranges = masterPorts[master_port_id]->getAddrRanges();
404
405        for (const auto& r: ranges) {
406            DPRINTF(AddrRanges, "Adding range %s for id %d\n",
407                    r.to_string(), master_port_id);
408            if (portMap.insert(r, master_port_id) == portMap.end()) {
409                PortID conflict_id = portMap.find(r)->second;
410                fatal("%s has two ports responding within range %s:\n\t%s\n\t%s\n",
411                      name(),
412                      r.to_string(),
413                      masterPorts[master_port_id]->getSlavePort().name(),
414                      masterPorts[conflict_id]->getSlavePort().name());
415            }
416        }
417    }
418
419    // if we have received ranges from all our neighbouring slave
420    // modules, go ahead and tell our connected master modules in
421    // turn, this effectively assumes a tree structure of the system
422    if (gotAllAddrRanges) {
423        DPRINTF(AddrRanges, "Aggregating address ranges\n");
424        xbarRanges.clear();
425
426        // start out with the default range
427        if (useDefaultRange) {
428            if (!gotAddrRanges[defaultPortID])
429                fatal("Crossbar %s uses default range, but none provided",
430                      name());
431
432            xbarRanges.push_back(defaultRange);
433            DPRINTF(AddrRanges, "-- Adding default %s\n",
434                    defaultRange.to_string());
435        }
436
437        // merge all interleaved ranges and add any range that is not
438        // a subset of the default range
439        std::vector<AddrRange> intlv_ranges;
440        for (const auto& r: portMap) {
441            // if the range is interleaved then save it for now
442            if (r.first.interleaved()) {
443                // if we already got interleaved ranges that are not
444                // part of the same range, then first do a merge
445                // before we add the new one
446                if (!intlv_ranges.empty() &&
447                    !intlv_ranges.back().mergesWith(r.first)) {
448                    DPRINTF(AddrRanges, "-- Merging range from %d ranges\n",
449                            intlv_ranges.size());
450                    AddrRange merged_range(intlv_ranges);
451                    // next decide if we keep the merged range or not
452                    if (!(useDefaultRange &&
453                          merged_range.isSubset(defaultRange))) {
454                        xbarRanges.push_back(merged_range);
455                        DPRINTF(AddrRanges, "-- Adding merged range %s\n",
456                                merged_range.to_string());
457                    }
458                    intlv_ranges.clear();
459                }
460                intlv_ranges.push_back(r.first);
461            } else {
462                // keep the current range if not a subset of the default
463                if (!(useDefaultRange &&
464                      r.first.isSubset(defaultRange))) {
465                    xbarRanges.push_back(r.first);
466                    DPRINTF(AddrRanges, "-- Adding range %s\n",
467                            r.first.to_string());
468                }
469            }
470        }
471
472        // if there is still interleaved ranges waiting to be merged,
473        // go ahead and do it
474        if (!intlv_ranges.empty()) {
475            DPRINTF(AddrRanges, "-- Merging range from %d ranges\n",
476                    intlv_ranges.size());
477            AddrRange merged_range(intlv_ranges);
478            if (!(useDefaultRange && merged_range.isSubset(defaultRange))) {
479                xbarRanges.push_back(merged_range);
480                DPRINTF(AddrRanges, "-- Adding merged range %s\n",
481                        merged_range.to_string());
482            }
483        }
484
485        // also check that no range partially overlaps with the
486        // default range, this has to be done after all ranges are set
487        // as there are no guarantees for when the default range is
488        // update with respect to the other ones
489        if (useDefaultRange) {
490            for (const auto& r: xbarRanges) {
491                // see if the new range is partially
492                // overlapping the default range
493                if (r.intersects(defaultRange) &&
494                    !r.isSubset(defaultRange))
495                    fatal("Range %s intersects the "                    \
496                          "default range of %s but is not a "           \
497                          "subset\n", r.to_string(), name());
498            }
499        }
500
501        // tell all our neighbouring master ports that our address
502        // ranges have changed
503        for (const auto& s: slavePorts)
504            s->sendRangeChange();
505    }
506
507    clearPortCache();
508}
509
510AddrRangeList
511BaseXBar::getAddrRanges() const
512{
513    // we should never be asked without first having sent a range
514    // change, and the latter is only done once we have all the ranges
515    // of the connected devices
516    assert(gotAllAddrRanges);
517
518    // at the moment, this never happens, as there are no cycles in
519    // the range queries and no devices on the master side of a crossbar
520    // (CPU, cache, bridge etc) actually care about the ranges of the
521    // ports they are connected to
522
523    DPRINTF(AddrRanges, "Received address range request\n");
524
525    return xbarRanges;
526}
527
528void
529BaseXBar::regStats()
530{
531    using namespace Stats;
532
533    transDist
534        .init(MemCmd::NUM_MEM_CMDS)
535        .name(name() + ".trans_dist")
536        .desc("Transaction distribution")
537        .flags(nozero);
538
539    // get the string representation of the commands
540    for (int i = 0; i < MemCmd::NUM_MEM_CMDS; i++) {
541        MemCmd cmd(i);
542        const std::string &cstr = cmd.toString();
543        transDist.subname(i, cstr);
544    }
545
546    pktCount
547        .init(slavePorts.size(), masterPorts.size())
548        .name(name() + ".pkt_count")
549        .desc("Packet count per connected master and slave (bytes)")
550        .flags(total | nozero | nonan);
551
552    pktSize
553        .init(slavePorts.size(), masterPorts.size())
554        .name(name() + ".pkt_size")
555        .desc("Cumulative packet size per connected master and slave (bytes)")
556        .flags(total | nozero | nonan);
557
558    // both the packet count and total size are two-dimensional
559    // vectors, indexed by slave port id and master port id, thus the
560    // neighbouring master and slave, they do not differentiate what
561    // came from the master and was forwarded to the slave (requests
562    // and snoop responses) and what came from the slave and was
563    // forwarded to the master (responses and snoop requests)
564    for (int i = 0; i < slavePorts.size(); i++) {
565        pktCount.subname(i, slavePorts[i]->getMasterPort().name());
566        pktSize.subname(i, slavePorts[i]->getMasterPort().name());
567        for (int j = 0; j < masterPorts.size(); j++) {
568            pktCount.ysubname(j, masterPorts[j]->getSlavePort().name());
569            pktSize.ysubname(j, masterPorts[j]->getSlavePort().name());
570        }
571    }
572}
573
574template <typename SrcType, typename DstType>
575unsigned int
576BaseXBar::Layer<SrcType,DstType>::drain(DrainManager *dm)
577{
578    //We should check that we're not "doing" anything, and that noone is
579    //waiting. We might be idle but have someone waiting if the device we
580    //contacted for a retry didn't actually retry.
581    if (state != IDLE) {
582        DPRINTF(Drain, "Crossbar not drained\n");
583        drainManager = dm;
584        return 1;
585    }
586    return 0;
587}
588
589template <typename SrcType, typename DstType>
590void
591BaseXBar::Layer<SrcType,DstType>::regStats()
592{
593    using namespace Stats;
594
595    occupancy
596        .name(name() + ".occupancy")
597        .desc("Layer occupancy (ticks)")
598        .flags(nozero);
599
600    utilization
601        .name(name() + ".utilization")
602        .desc("Layer utilization (%)")
603        .precision(1)
604        .flags(nozero);
605
606    utilization = 100 * occupancy / simTicks;
607}
608
609/**
610 * Crossbar layer template instantiations. Could be removed with _impl.hh
611 * file, but since there are only two given options (MasterPort and
612 * SlavePort) it seems a bit excessive at this point.
613 */
614template class BaseXBar::Layer<SlavePort,MasterPort>;
615template class BaseXBar::Layer<MasterPort,SlavePort>;
616