Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protecting the footprint of memory transactions from victimization

a technology for protecting the footprint of memory transactions, applied in the field of data processing, can solve the problems of aborting and possibly restarting transactions, no means to ensure, and performance cost of lock acquisition

Inactive Publication Date: 2015-02-19
GLOBALFOUNDRIES INC
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent is related to a processing unit that includes a cache memory. The cache memory is organized in groups called congruence classes. When the cache receives a memory access request that specifies a specific cache line, the cache checks if it already has that line in its cache. If there is, it updates the order in which the cache lines are replaced. This way, the cache can improve its performance by replacing cache lines that are less likely to be needed in the future.

Problems solved by technology

A conflict occurs between two memory accesses when they are to the same memory location and at least one of them is a write and there is no means to ensure the ordering in which those accesses occur.
These include, among others, (1) the possibility of deadlock when a given thread holds more than one lock and prevents the forward progress of other threads and (2) the performance cost of lock acquisition when the lock may not have been strictly necessary because no conflicting accesses would have occurred to the shared data.
If a conflict occurs in the transaction footprint, the transaction is aborted and possibly restarted.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protecting the footprint of memory transactions from victimization
  • Protecting the footprint of memory transactions from victimization
  • Protecting the footprint of memory transactions from victimization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]With reference now to the figures, wherein like reference numerals refer to like and corresponding parts throughout, and in particular with reference to FIG. 1, there is illustrated a high level block diagram depicting an exemplary data processing system 100 in accordance with one embodiment. In the depicted embodiment, data processing system 100 is a cache coherent symmetric multiprocessor (SMP) data processing system including multiple processing nodes 102a, 102b for processing data and instructions. Processing nodes 102 are coupled to a system interconnect 110 for conveying address, data and control information. System interconnect 110 may be implemented, for example, as a bused interconnect, a switched interconnect or a hybrid interconnect.

[0032]In the depicted embodiment, each processing node 102 is realized as a multi-chip module (MCM) containing four processing units 104a-104d, each preferably realized as a respective integrated circuit. The processing units 104 within ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A processing unit includes a processor core and a cache memory. Entries in the cache memory are grouped in multiple congruence classes. The cache memory includes tracking logic that tracks a transaction footprint including cache line(s) accessed by transactional memory access request(s) of a memory transaction. The cache memory, responsive to receiving a memory access request that specifies a target cache line having a target address that maps to a congruence class, forms a working set of ways in the congruence class containing cache line(s) within the transaction footprint and updates a replacement order of the cache lines in the congruence class. Based on membership of the at least one cache line in the working set, the update promotes at least one cache line that is not the target cache line to a replacement order position in which the at least one cache line is less likely to be replaced.

Description

PRIORITY CLAIM[0001]This application is a continuation of U.S. patent application Ser. No. 13 / 967,853 entitled “PROTECTING THE FOOTPRINT OF MEMORY TRANSACTIONS FROM VICTIMIZATION,” filed on Aug. 15, 2013, the disclosure of which is incorporated herein by reference in its entirety for all purposes.BACKGROUND OF THE INVENTION[0002]The present invention relates generally to data processing and, in particular, to storage accesses to the distributed shared memory system of a data processing system.[0003]A conventional multiprocessor (MP) computer system, such as a server computer system, includes multiple processing units all coupled to a system interconnect, which typically comprises one or more address, data and control buses. Coupled to the system interconnect is a system memory, which represents the lowest level of volatile memory in the multiprocessor computer system and which generally is accessible for read and write access by all processing units. In order to reduce access latenc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F9/46G06F12/08
CPCG06F12/0802G06F9/467G06F12/0815G06F12/0864G06F12/123
Inventor GHAI, SANJEEVGUTHRIE, GUY L.JACKSON, JONATHAN R.WILLIAMS, DEREK E.
Owner GLOBALFOUNDRIES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products