t81-foundation

RFC-0051: Deterministic Heterogeneous Acceleration


Summary

This RFC defines how T81 may use heterogeneous acceleration, including GPU and other non-CPU execution targets, without violating deterministic-surface guarantees. It constrains the classes of kernels, memory transfer rules, scheduling behavior, reduction semantics, fallback rules, and promotion requirements for accelerator-backed execution.

Motivation

Acceleration pressure will eventually push T81 beyond scalar, SWAR, and SIMD CPU execution. Without a governance contract, GPU or heterogeneous support would create a large nondeterminism aperture:

T81 can support heterogeneous execution only if the architecture treats it as a governed backend class rather than a performance-only feature.

Proposal

1. Accelerator Backends Are Governed Execution Backends

Any heterogeneous accelerator path is a governed execution backend under RFC-0042.

It is not automatically:

It must earn equivalence and promotion explicitly.

2. Allowed Accelerator Classes

This RFC allows future accelerator backends only for workloads that can define:

Example classes that may become eligible:

Example classes that are not eligible by default:

3. Canonical Memory Transfer Rules

All host↔accelerator movement must be deterministic and explicitly modeled.

Requirements:

4. Kernel Launch and Scheduling Semantics

Accelerator launches must obey RFC-0046 ordering rules.

This means:

5. Reduction and Cross-Workgroup Constraints

Reductions are the highest-risk accelerator surface.

Allowed only if:

Forbidden:

6. Trace and Policy Semantics

Accelerator execution must remain semantically observable at the T81 level.

Requirements:

7. Fault, Fallback, and Availability Rules

Accelerator surfaces must define:

Allowed responses:

Forbidden:

8. DCP Boundary Rule

Accelerator backends are governed non-DCP by default.

They may only become Verified / DCP eligible if:

9. Vendor-Neutral Semantic Layer

The T81 architecture must define accelerator semantics above any vendor API.

Vendor APIs such as:

are implementation mechanisms only. No public deterministic claim may depend on vendor-specific semantic wording.

10. Relation to Vector and JIT RFCs

Determinism / Safety Considerations

Determinism considerations:

Safety considerations:

Compatibility

This RFC is additive. It does not require introducing accelerator backends now.

Compatibility rules:

Implementation Plan

  1. Define accelerator backend registration and classification as governed non-DCP by default.
  2. Add explicit transfer, fallback, and trace semantics for any first accelerator prototype.
  3. Build RFC-0043 conformance matrices that compare scalar CPU against accelerator results.
  4. Add vendor/driver support policy and exclusion rules.
  5. Promote only narrowly scoped kernels after proof and governance review.

Open Questions

Acceptance Criteria

Implementation Record (2026-03-22)

All acceptance criteria are satisfied as of this date.

AC1 — Accelerator execution explicitly classified as governed non-DCP by default: spec/tisc-spec.md §5.2.5 (“Heterogeneous Acceleration Governance (RFC-0051)”) is a normative section stating: “Any heterogeneous accelerator execution path … is classified as governed non-DCP by default” and “No accelerator backend is automatically DCP-eligible, semantically trusted, or interchangeable with verified CPU backends.” docs/governance/DETERMINISM_SURFACE_REGISTRY.md §4 (“Experimental / Planned”) was updated to add an explicit “External Hardware Accelerators (governed non-DCP)” entry citing RFC-0051 §1 and spec/tisc-spec.md §5.2.5.

AC2 — Kernel classes, transfer semantics, fallback behavior, and reduction constraints normatively defined: spec/tisc-spec.md §5.2.5 contains four normative subsections covering each topic: “Allowed Accelerator Kernel Classes” enumerates eligible and ineligible classes with rationale; “Memory Transfer Rules” specifies six required canonical-serialization and visibility conditions; “Kernel Launch and Scheduling Semantics” states the RFC-0046 ordering requirement for launch order, completion order, and async/sync fallback parity; “Reduction and Cross-Workgroup Constraints” defines the two allowed paths (explicit order or proven-equivalent regrouping) and forbids unordered accumulation. The “Fault, Fallback, and Availability” subsection defines required behavior for all four failure modes.

AC3 — RFC-0042, RFC-0043, RFC-0045, RFC-0046, and RFC-0048 cross-referenced as binding constraints: spec/tisc-spec.md §5.2.5 “Binding Cross-References” subsection explicitly lists RFC-0042, RFC-0043, RFC-0045, RFC-0046, and RFC-0048 as binding constraints and states: “An accelerator backend may not relax any rule established by those RFCs.” Each subsection also cross-references its governing companion RFC inline (RFC-0045 for memory transfer, RFC-0046 for scheduling, RFC-0049 for arithmetic oracle in reductions).

AC4 — No accelerator path may be promoted without explicit conformance and boundary updates: spec/tisc-spec.md §5.2.5 “DCP Promotion Gate” enumerates five mandatory conditions (scalar-oracle equivalence via RFC-0042, memory audit via RFC-0045, scheduling audit via RFC-0046, cross-vendor conformance evidence via RFC-0043, and public boundary docs via RFC-0048) and states: “Until all five conditions are met, the surface MUST remain governed non-DCP.” The registry entry reinforces this: the governed non-DCP classification is permanent until an explicit promotion path satisfies all five gates.