Information coherency maintenance systems and methods

Information

  • Patent Grant
  • 9824009
  • Patent Number
    9,824,009
  • Date Filed
    Friday, December 21, 2012
    11 years ago
  • Date Issued
    Tuesday, November 21, 2017
    7 years ago
Abstract
Systems and methods for coherency maintenance are presented. The systems and methods include utilization of multiple information state tracking approaches or protocols at different memory or storage levels. In one embodiment, a first coherency maintenance approach (e.g., similar to a MESI protocol, etc.) can be implemented at one storage level while a second coherency maintenance approach (e.g., similar to a MOESI protocol, etc.) can be implemented at another storage level. Information at a particular storage level or tier can be tracked by a set of local state indications and a set of essence state indications. The essence state indication can be tracked “externally” from a storage layer or tier directory (e.g., in a directory of another cache level, in a hub between cache levels, etc.). One storage level can control operations based upon the local state indications and another storage level can control operations based in least in part upon an essence state indication.
Description
FIELD OF THE INVENTION

The present invention relates to information storage. In particular, the present invention relates to a system and method for tracking cache operations.


BACKGROUND OF THE INVENTION

Electronic systems and circuits have made a significant contribution towards the advancement of modern society and are utilized in a number of applications to achieve advantageous results. Numerous electronic technologies such as digital computers, calculators, audio devices, video equipment, and telephone systems have facilitated increased productivity and reduced costs in analyzing and communicating data in most areas of business, science, education and entertainment. These activities often involve storage of information. The manner in which the electronic devices perform storage operations can have a significant impact on performance and end results. However, traditional attempts at information storage have many limitations and can be very complex and complicated.


Many traditional memory approaches attempt to utilize levels or tiers of memory storage including caches, system memory and bulk memory and with the utilization of multiple levels it is important to maintain information coherency. There are many traditional attempts at cache coherence protocols. Some common cache coherence protocols are organized around simple states that cache lines can be in and the transitions between those states.


In a traditional MESI coherence protocol, cache lines can be one of the following states: Modified, Exclusive, Shared or Invalid. In a Modified state the line is exclusive to a particular cache and has been modified since it was fetched. Upon eviction, the cache line needs to be written back to a home location (e.g. DRAM). In an Exclusive state the cache lines are exclusive to the cache that has them in this state and can thereafter be modified. As there is no modified data, nothing needs to be written back on eviction. In a Shared state the cache lines contain data that other agents may have and if they do, it is the same data. As there is no modified data, nothing needs to be written back on eviction. In an Invalid state the cache line contains no valid data. The line can be re-allocated at will.


There is also a traditional MOESI coherence protocol. In addition to the MESI states, the MOESI protocol introduces the ‘Owned’ state, which is similar to Shared state except that the line must be written back to the home location upon eviction. The Owned state arises when a line is modified in some cache, and another agent requests it as shared. In a MESI system, the line would be written back to backing store and simultaneously supplied to the agent requesting it shared and transition to shared from the modified state in the original cache. In a MOESI system, the line is not written back, it is just supplied to the agent requesting it shared, but transitions to owned so that the original agent remembers to essentially write it back, although it is no longer allowed to write to it, as it is (potentially) shared with other agents.


Each traditional coherence protocol often has strengths and weaknesses compared to another coherence protocol and traditional approaches of using one coherence protocol are limited in overall efficiency. The MESI protocol is usually simpler to implement, as an agent only needs to write back a line if it has modified it (as indicated by it being in the M state). If a line is modified, it can also be written to, as the line is guaranteed to be exclusive. In the MOESI protocol, an agent has to write back a line if the line has been modified, even if the line can no longer be written to because the line is now in the owned state. Thus, the MOESI protocol includes distinguishing a state (e.g., Owned, etc.) that needs to be written back even though no new writes can be accepted to a line in that state. There are more variants of both protocols.


The MOESI protocol can avoid utilizing as much DRAM bandwidth as the MESI protocol in some situations. For example, when two agents are communicating with one of them writing the data occasionally and the other merely asking for an updated copy, the MOESI protocol typically involves less write backs and consumes less bandwidth to DRAM than the MESI protocol. Typically, in the MESI protocol, every such request for an updated copy would cause the line to be written back to DRAM. In the MOESI protocol, usually only the final eviction of the line by an agent that had modified it would cause DRAM bandwidth to be utilized.


SUMMARY

Systems and methods for coherency maintenance are presented. The systems and methods include utilization of multiple information state tracking approaches or protocols at different memory or storage levels. In one embodiment, a first coherency maintenance approach (e.g., similar to a MESI protocol, etc.) can be implemented at one storage level while a second coherency maintenance approach (e.g., similar to a MOESI protocol, etc.) can be implemented at another storage level. Information at a particular storage level or tier can be tracked by a set of local state indications and a set of essence state indications. The essence state indication can be tracked “externally” from a storage layer or tier directory (e.g., in a directory of another cache level, in a hub between cache levels, etc.). One storage level can control operations based upon the local state indications and another storage level can control operations based at least in part upon the essence state indications.


In one embodiment, a system comprises: a first level storage component in which a storage state indication is tracked externally; and a second level storage component for receiving information from the first level storage component and acting upon the information based at least in part on the storage state of information associated with the first level storage component. In one exemplary implementation, the externally tracked information includes additional information (e.g., more detailed information, refined information, etc.) than what first-level directories otherwise actually indicate (e.g., owned vs. shared). The state of information can be a state of a cache line and the storage state of the cache line can be tracked by the second level storage component. The storage state of the cache line can be tracked by a coherent hub. The first level storage component can be an L2 cache and the second level storage component can be an L3 cache. The storage state of the cache line in the L2 cache can be tracked by the L3 cache or the cache line can be tracked by a coherent hub. The L2 cache can consider the cache line in a MESI state and the L3 can actually track which lines have actually been written back to backing store. In one embodiment, on eviction of a cache line from the L2 cache the L3 cache actually propagates the cache line to the backing store if appropriate and does not propagate the cache line if not appropriate. The L3 can track extra states for each cache line and wherein the extra states indicate if a line is dirty and the L3 directory indicates that the line is to be written back.





DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and form a part of this specification, illustrate embodiments of the invention by way of example and not by way of limitation. The drawings referred to in this specification should be understood as not being drawn to scale except if specifically noted.



FIG. 1 is a block diagram of an exemplary memory architecture in accordance with one embodiment of the present invention.



FIG. 2 is flow diagram of exemplary method in accordance with one embodiment of the present invention.



FIG. 3 is a block diagram of an exemplary memory architecture in accordance with one embodiment of the present invention.



FIG. 4 is a block diagram of a computer system, one embodiment of a computer system upon which embodiments of the present invention can be implemented.





DETAILED DESCRIPTION

Reference will now be made in detail to the preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. While the invention will be described in conjunction with the preferred embodiments, it will be understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the invention as defined by the appended claims. Furthermore, in the following detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be obvious to one of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present invention.


Presented systems and methods can facilitate efficient information storage and tracking operations. The systems and methods include utilization of multiple information state tracking approaches or protocols at different memory or storage levels. Information stored at a particular storage level or tier (e.g., L2, L3, main memory, etc.) can be tracked with multiple different state indications and utilization of different sets of state indications can facilitate implementation of different coherency maintenance protocols at different storage or memory levels. In one exemplary implementation, a first coherency maintenance approach (e.g., similar to a MESI protocol, etc.) can be implemented at one storage level while a second coherency maintenance approach (e.g., similar to a MOESI protocol, etc.) can be implemented at another storage level.


In one embodiment, information at a particular storage level or tier is tracked by a set of local state indications and a set of essence state indications. The essence state indication can be tracked “externally” from a storage layer or tier directory (e.g., in a directory of another cache level, in a hub between cache levels, etc.). In one embodiment, the local state indication enables a simpler implementation (e.g., MESI protocol, simplified controller, etc.) at a local storage level while the essence state indication enables a higher performance implementation (e.g., MEOSI protocol, better bandwidth, etc.) at another storage level. The essence state indications can be associated with a more complete coherence state indication of information in a particular level (e.g., clean shared, dirty shared, etc.) and the local state indications can be associated with an expedient state indication in that particular level (e.g., shared, modified, etc.). Additional information on the essence state indication external tracking and the local state indication tracking is presented in following sections of the description.



FIG. 1 is a block diagram of exemplary memory architecture 100 in accordance with one embodiment of the present invention. In one embodiment, memory architecture 100 includes an information state external tracking memory system. Memory architecture 100 includes levels 105, 110, 120, 130, 140 and 150. Levels 105, 110, 120, 130, 140 and 150 are storage levels. In one exemplary implementation, storage level 105 can be considered a processing level (e.g., including registers, flip flops, etc.), storage levels 110, 120 and 130 can be considered a cache level (e.g., including L1 cache, L2 cache, L3 cache, etc.), storage level 140 can be considered a backing store or main memory level (e.g., RAM, DRAM, etc.) and storage level 150 can be considered bulk storage (e.g., hard disk, CD, etc.). The storage levels 105, 110, 120, 130, 140 include storages components 111, 121, 131, 141 and 151. In one embodiment, memory architecture 100 includes optional hub component 170


Information stored in components of memory architecture 100 can be associated with state indications. A state indication can include an indication of the status of information in a storage component (e.g., shared, modified, dirty, etc.). The status indication can be utilized to trigger or coordinate actions or processing that is to be performed related to the information (e.g., allocate a storage space, write back, not allocate, not write back, etc.). In one exemplary implementation, information in a storage component (e.g., cache, memory, etc) is associated with an essence state indication (e.g., owned, clean, dirty, modified, etc.) that is tracked externally. Information in the storage component can also be associated with a local state indication (e.g., shared, modified, etc.) that is tracked by a local directory.


In one embodiment, storage level 110 includes storage component 111 and an indication of the essence state of information associated with storage component 111 is tracked externally to storage component 111. An indication of the essence state of information associated with storage component 111 can be tracked by components in storage level 120. In one exemplary implementation, the essence state of information associated with storage component 111 is tracked by a hub (e.g., similar to hub component 170, etc.). It is appreciated a local state of information can be tracked by storage component 111 and can be different than the essence state of information associated with storage component 111 tracked externally from storage component 111.


Actions or operations in system 100 can be based upon storage states. In one embodiment, storage component 111 writes back information in various local states to level 120. However, storage space for the written back information is allocated in storage component 121 based upon the indication of the essence state tracked externally to storage component 111. In one embodiment, an essence state tracked externally to storage component 111 can be utilized to establish a local storage state for level 120 and information can also be written back from storage level 120 to storage level 130 accordingly. In one exemplary implementation, information tracked as shared locally in level 110 can be tracked externally by level 120 as owned and written back to level 130 in accordance with the owned state indication. It is appreciated a write back from one level to another level can occur at various times (e.g., written back as it is allocated in level 120, written back upon eviction from level 120, etc.).



FIG. 2 is flow diagram of exemplary method 200 in accordance with one embodiment of the present invention.


In block 210, an essence storage state indication and a local storage state indication are tracked. In one embodiment, information associated with a storage component included in one storage level is tracked externally from the storage level local state directory. In one embodiment, the storage levels can be cache levels and a local storage state of a cache line in a storage component can be tracked by the storage component as one status (e.g., shared, modified, etc.) and the essence state of the cache line can be tracked externally as a similar status or another status (e.g., owned, dirty, etc.).


In block 220, information in the one level storage component is acted upon at the one storage level based upon a local storage state indication. In one embodiment, the one level storage component writes back information in a plurality of storage states. In one exemplary implementation, in addition to information in a modified state, information in a shared state and exclusive state are also written back to another storage component in another storage level.


In block 230, the information received in the other storage component is acted upon based at least in part on the essence storage state of the information. In one embodiment, the other level storage component receives write backs from the one level storage component and acts upon the information, including disregarding extraneous write backs based upon the essence storage state and allocating storage space for remaining information. In one exemplary implementation, the other level storage component creates its own local state indication based at least in part upon an essence state indication and acts upon the information based upon its own local state indication (e.g., forward write backs to yet another storage level, etc.).


In one embodiment, a storage state indication tracked externally includes different information than what a storage state indication tracked internally otherwise indicates. In one exemplary implementation, externally tracked information includes additional information (e.g., more detailed information, refined information, etc.) than what first-level directories otherwise actually indicate (e.g., owned vs. shared). The externally tracked information can include information established by combining the information across multiple first-levels and keeping a history of how the first levels got to the current state. A conventional a single first-level approach can not typically conveniently track this additional information as it does not know what the other first-levels are up to or what they've done. A first coherency maintenance approach (e.g., similar to MESI, etc.) can be implemented at the first level storage component while the storage state indication tracked externally is compatible with a second coherency maintenance approach (e.g. similar to MOESI, etc.), and the second coherency maintenance approach is implemented at the second level storage component.


It is appreciated that the presented systems and methods can be readily implemented in a variety of configurations and environments. There can be a plurality of peer storage components in a similar storage level of a storage architecture. The tracking of an essence state can be implemented at least in part by a write-back write-allocate exclusive next-level component. There can different types of coherency protocols implemented at different storage levels. In one exemplary implementation, a first protocol can be similar to a MESI coherence protocol except modified to write back information in a plurality of different states (e.g., shared and exclusive in addition to modified, etc.) upon eviction and the second protocol can be similar to a MOESI coherence protocol. The storage component can be a cache component at a cache memory architecture level.



FIG. 3 is a block diagram of an exemplary memory architecture 300 in accordance with one embodiment of the present invention. Memory architecture 300 includes processing components 310 (e.g., registers, flip flops, etc.), level one (L1) cache 320, level two (L2) cache 330, level three (L3) cache 340, main memory 350 and optional bulk memory 370. Processing component 310 is coupled to L1 cache 320 which is couple to L2 which in turn is coupled to L3 cache 340. L3 cache is coupled to main memory 350 which in turn can be coupled to optional bulk memory 370. In one embodiment, level one cache 320 can include a level one cache controller 321, level two cache 330 can include a level two cache controller 331, level three cache 340 can include a level three cache controller 341. The cache controllers can include directories for tracking status indications.


The components of system 300 can cooperatively operate to implement multiple storage levels. In one embodiment, an L3 cache includes a line if it is not contained in an L2 cache. When an L2 cache requests a line, the result can be a hit or a miss. If the result is a hit in the L3 cache, the line is sent to the L2 cache and invalidated in the L3 cache. If the result is a miss in the L3 cache, the request is sent to memory, and the response is sent to the L2 cache without allocating a line in the L3 cache. Lines in the L3 cache are allocated upon eviction from the L2 cache. The L2 cache writes back cache lines in various states (e.g., modified, shared, exclusive, etc.) which facilitates allocation of unmodified (e.g. read-only, etc.) data that would otherwise not be allocated in the L3 cache and would have to be re-requested from memory.


In one embodiment, when the L3 cache receives an eviction from the L2 cache (e.g., which include information about whether the line was modified by the L2 cache or not, etc.), the L3 cache allocates the line. The L3 cache can replace a line already in the L3 cache. The replaced line can be evicted to another memory level (e.g., DRAM, backing store, etc.) if appropriate (e.g., if modified, owned, etc.).


In one exemplary implementation, tracking the essence state externally facilitates preservation of an exclusive property. In one embodiment, the L3 cache can track the line state of the lines in various L2 caches. In one exemplary implementation, if a line is shared in several L2 caches, then all but the last eviction from an L2 cache is ignored by the L3 cache. This can facilitate avoidance of a duplication of the line between the L3 cache and the remaining L2 caches with the line that could otherwise occur if a line in the L3 cache is allocated when each one of the L2 caches evicts the “shared” line. Without the present system duplication avoidance features, a duplication may otherwise lead the L3 cache to become no longer exclusive with respect to the L2 caches and also effectively diminish the capacity of the L3 cache,


In one embodiment, the L3 has directories that track the state of the line in the various L2 caches and the L3 cache implements an Owned state (e.g., similar to MOESI protocols, etc.) without modifying the L2 caches (e.g., similar to MESI protocols, etc.) beyond the modification to have the L2 caches evict clean lines to the L3 cache for allocation in the L3 cache. The duplicate directories for the L2 caches in the L3 cache can track whether the line has been modified by any of the caches since it was last fetched from DRAM, and even though several of the L2s may have the line in the shared state, the external duplicate directories can track that the line has been modified and when evicted (from the L3) it needs to be written back to its home, rather than silently invalidated.


In one embodiment, the external duplicate directories for the L2 cache can distinguish between a ‘clean shared’ state, which indicates that the line need not be written back to DRAM if evicted, and a ‘dirty shared’ state which indicates that it has, at some point, been modified since it was fetched from DRAM and hence ultimately needs to be written back. When the last L2 cache writes back a ‘dirty shared’ line to the L3, the L3 can allocate it in the modified state in the L3 so that it is written back to DRAM if evicted from the L3, even though the actual L2 cache evicting that the line thinks that it was merely shared (and clean). However, if when the last L2 writes back a ‘clean shared’ line to the L3, the L3 can allocate it in the shared state (or unmodified state), meaning that it need not be written back to DRAM if evicted from the L3.


In one embodiment, DRAM bandwidth savings similar to a MOESI protocol implemented at the L2 level, without significantly changing the L2 caches that would otherwise be involved with a MESI protocol. In one exemplary implementation, an L2 cache is similar to a MESI protocol except for an elegant modification to write back or out lines in a variety of states upon eviction so that they can be allocated in the L3 as necessary. There can be additional bandwidth between the L2 caches and the L3 cache when such lines are shared, as only the last eviction from an L2 cache really needs to send the line to the L3 cache. However, as the majority of lines are often present in only one agent, the additional bandwidth (e.g., to the L3 cache and not to DRAM, etc.) is typically small and often on-die with far higher available bandwidth than off-die when going to DRAM. Thus, it can be important to conserve or reduce consumption of DRAM bandwidth as compare to conventional approaches, even if on-die bandwidth is not conserved or reduced as on-die bandwidth is often more available or plentiful. Even thought there may be additional bandwidth consumption, the L2s caches and controllers can be kept relatively simple (e.g., implement a relatively simple protocol, implement a protocol similar to MESI, etc.). It is appreciated that while much of the detailed description was described in term of L2 and L3 caches, the approach can be utilized and implemented in a variety of configurations with a variety of different storage configurations. In one exemplary implementation, the peer cache or lower level cache can be an L1 cache and the write-back write-allocate exclusive next-level cache can be an L2 cache.


It is appreciated that a reference to a first level storage or cache and a second level storage or cache can be utilized to indicate that the levels are different with respect to one another rather than an absolute position in a hierarchy. For example, in memory architecture 300, L1 cache can be a first level with respect to a second level L2 cache and while L2 cache can be a first level with respect to a second level L3 cache. In one embodiment, a first level storage component can be an L2 cache and a second level storage component can be an L3 cache. The storage state of the cache line in the L2 cache can be tracked by various components. The storage state of the cache line in the L2 cache can be tracked by the L3 cache. The storage state of the cache line in L2 can be tracked by a coherent hub.


While many of the embodiments are described with caches and tracking on a single die or chip, it is appreciated the present systems and methods can be utilized in a various configurations. In one embodiment, the systems and methods can be flexibly scaled up. In one exemplary implementation, components can be distributed on different chips. A coherent hub that externally tracking storage states can be on a different die or chip. There can be multiple CPUs each with different L2s in different dies that use a shared memory as backing store. The externally tracking of the cache line states of the L2s can be in various components (e.g., a coherent hub on a die in a network, a component or L3 not necessarily on the same die as an L2, etc.).



FIG. 4 is a block diagram of a computer system 400, one embodiment of a computer system upon which embodiments of the present invention can be implemented. Computer system 400 includes central processor unit 401, main memory 402 (e.g., random access memory), chip set 420 with north bridge 421 and south bridge 425, removable data storage device 404, input device 407, signal communications port 408, and graphics subsystem 450 which is coupled to display 470. Computer system 440 includes several busses for communicatively coupling the components of computer system 400. Communication bus 491 (e.g., a front side bus) couples north bridge 421 of chipset 420 to central processor unit 401. Communication bus 492 (e.g., a main memory bus) couples north bridge 421 of chipset 420 to main memory 402. Communication bus 493 (e.g., the Advanced Graphics Port interface) couples north bridge of chipset 420 to graphic subsystem 450. Communication buses 494-497 (e.g., a PCI bus) couple south bridge 425 of chip set 420 to removable data storage device 404, input device 407, signal communications port 408 respectively. Graphics subsystem 450 includes graphics processor 451, memory management unit 455 and graphics buffer 459.


The components of computer system 400 cooperatively operate to perform a variety of processing tasks and facilitate efficient memory accesses. Communications bus 491, 492, 493, 494, 495 and 497 communicate information. Central processor 401 processes information. Main memory 402 stores information and instructions for the central processor 401. Removable data storage device 404 also stores information and instructions (e.g., functioning as a large information reservoir). Input device 407 provides a mechanism for inputting information and/or for pointing to or highlighting information on display 470. Signal communication port 408 provides a communication interface to exterior devices (e.g., an interface with a network). Display device 470 displays information in accordance with data stored in frame buffer 459. Graphics processor 451 processes graphics commands from central processor 401 and provides the resulting data to graphics buffers 459 for storage and retrieval by display monitor 470. Memory management unit 455 handles the memory access requests between graphics processor 451 and graphics buffers 459. It is appreciated that similar memory management units can be implemented to facilitate efficient and independent access requests to other memory components of computer system 400, including main memory 402 and bulk data storage 404.


It is appreciated that the present invention can be implemented in a variety of embodiments. In one exemplary implementation the present invention can be utilized in processing systems utilized to provide a variety of graphics applications including video games. For example, the present invention can be utilized in a game console, personal computer, personal digital assistant, cell phone or any number of platforms for implementing a video game. It is also appreciated that references to video game application implementations are exemplary and the present invention is not limited to these implementations.


Again, it is appreciated that while much of the detailed description was described in terms of L2 and L3 caches, the present approach can be utilized and implemented in a variety of configurations with a variety of different storage configurations. In one embodiment, complexity is introduced only at the L3, which can be an optional component of the system.


Portions of the detailed description are presented and discussed in terms of a method. Although steps and sequencing thereof are disclosed in figures herein describing the operations of this method, such steps and sequencing are exemplary. Embodiments are well suited to performing various other steps or variations of the steps recited in the flowchart of the figure herein, and in a sequence other than that depicted and described herein.


Some portions of the detailed description are presented in terms of procedures, steps, logic blocks, processing, and other symbolic representations of operations on data bits that can be performed within a computer memory. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. A procedure, computer-executed step, logic block, process, etc., is here, and generally, conceived to be a self-consistent sequence of steps or instructions leading to a desired result. The steps include physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical, magnetic, optical or quantum signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.


It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout, discussions utilizing terms such as “processing”, “computing”, “calculating”, “determining”, “displaying”, “accessing,” “writing,” “including,” “storing,” “transmitting,” “traversing,” “associating,” “identifying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.


Some embodiments may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types. Typically the functionality of the program modules may be combined or distributed as desired in various embodiments.


The foregoing descriptions of specific embodiments of the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the Claims appended hereto and their equivalents.

Claims
  • 1. A system comprising: a first level storage component in which a storage state indication is tracked externally, wherein a first coherency maintenance approach is implemented at the first level storage component while the storage state indication tracked externally is compatible with a second coherency maintenance approach, wherein the first level storage component is an L2 cache; anda second level storage component for receiving information from the first level storage component and acting upon the information based at least in part on the storage state of information associated with the first level storage component, wherein the second coherency maintenance approach is implemented at the second level storage component, wherein the second level storage component is an L3 cache.
  • 2. The storage system of claim 1 wherein the state information is the state of a cache line.
  • 3. The storage system of claim 2 wherein the storage state of the cache line is tracked by the second level storage component.
  • 4. The storage system of claim 2 wherein the storage state of the cache line is tracked by a coherent hub.
  • 5. The storage system of claim 2 wherein the storage state of the cache line in the L2 cache is tracked by the L3 cache.
  • 6. The storage system of claim 2 wherein the storage state of the cache line is tracked by a coherent hub.
  • 7. The storage system of claim 2 wherein the L2 cache considers the cache line in a MESI state and the L3 cache actually tracks which lines have actually been written back to backing store.
  • 8. The storage system of claim 2 wherein on eviction of a cache line from the L2 cache, the L3 cache actually propagates the cache line to the backing store if appropriate and does not propagate the cache line if not appropriate.
  • 9. The storage system of claim 2 wherein the L3 cache tracks extra states for each cache line and wherein the extra states indicate if a line in the L2 cache is dirty and a directory of the L3 cache indicates that the line is to be written back.
  • 10. A method: tracking and storing a storage state of information associated with a first storage component included in a first storage level externally, wherein a first coherency maintenance approach is implemented at the first storage level while the storage state indication tracked externally is compatible with a second coherency maintenance approach, wherein the first coherency maintenance approach is different than the second coherency maintenance approach;acting on the information in the first storage component based upon a local storage state indication, wherein the local storage state indication is based upon the first coherency maintenance approach; andacting upon the information received in a second storage component based at least in part on the storage state of the information, wherein the second storage component is included in a second storage level, wherein the second coherency maintenance approach is implemented at the second storage level, and the first storage component is architecturally closer to a processor than the second storage component.
  • 11. The method of claim 10 wherein the first storage component does not keep track of an owned state.
  • 12. The method of claim 10 wherein the second storage component receives write backs from the first storage component and disregards extraneous write backs based upon the storage state.
  • 13. The method of claim 10 wherein the second level storage component forwards write backs received from the storage component in accordance with the storage state.
  • 14. A system comprising a first level cache storage component in which a storage state indication is tracked externally, wherein a first coherency maintenance approach is implemented at the first level cache storage component while the storage state indication tracked externally is compatible with a second coherency maintenance approach, wherein the storage state indication indicates whether a cache line is in a clean shared state or a dirty shared state; anda second level cache storage component for receiving information from the first level storage cache storage component and acting upon the information based at least in part on the storage state of information associated with the first level cache storage component, wherein the second coherency maintenance approach is implemented at the second level cache storage component, wherein the second level cache storage component allocates the dirty shared cache line in a modified state in the second level cache storage component so that the dirty shared cache line is written back to a third level storage component if evicted from the second level cache storage component.
  • 15. The system of claim 14 wherein the dirty shared cache line is written back to the third level storage component if evicted from the second level cache even though one of the plurality of first level caches evicting the dirty shared cache line treats the dirty as a shared cache line that is merely shared and clean.
  • 16. The system of claim 14 wherein a first level cache storage component writes back a clean shared line to the second level cache storage component and the second level cache storage component allocates it in the shared state or unmodified state, meaning that it need not be written back to DRAM if evicted from the second level cache storage component.
  • 17. The system of claim 14 wherein the first level cache storage component also write back exclusive cache lines and unmodified cache lines.
  • 18. The system of claim 14 wherein the second level cache storage component is a write-back write-allocate exclusive next-level cache.
  • 19. The system of claim 14 wherein the second level cache storage component lines are allocated upon eviction from the first level cache storage component.
US Referenced Citations (137)
Number Name Date Kind
4620217 Songer Oct 1986 A
4648045 Demetrescu Mar 1987 A
4700319 Steiner Oct 1987 A
4862392 Steiner Aug 1989 A
4901224 Ewert Feb 1990 A
5185856 Alcorn et al. Feb 1993 A
5268995 Diefendorff et al. Dec 1993 A
5285323 Hetherington et al. Feb 1994 A
5357604 San et al. Oct 1994 A
5392393 Deering Feb 1995 A
5487022 Simpson et al. Jan 1996 A
5488687 Rich Jan 1996 A
5491496 Tomiyasu Feb 1996 A
5577213 Avery et al. Nov 1996 A
5579473 Schlapp et al. Nov 1996 A
5579476 Cheng et al. Nov 1996 A
5581721 Wada et al. Dec 1996 A
5600584 Schlafly Feb 1997 A
5604824 Chui et al. Feb 1997 A
5613050 Hochmuth et al. Mar 1997 A
5655132 Watson Aug 1997 A
5701444 Baldwin Dec 1997 A
5764228 Baldwin Jun 1998 A
5777628 Buck-Gengler Jul 1998 A
5831640 Wang et al. Nov 1998 A
5850572 Dierke Dec 1998 A
5864342 Kajiya et al. Jan 1999 A
5941940 Prasad et al. Aug 1999 A
5995121 Alcorn et al. Nov 1999 A
6115047 Deering Sep 2000 A
6166743 Tanaka Dec 2000 A
6173366 Thayer et al. Jan 2001 B1
6222550 Rosman et al. Apr 2001 B1
6229553 Duluk, Jr. et al. May 2001 B1
6259460 Gossett et al. Jul 2001 B1
6288730 Duluk, Jr. et al. Sep 2001 B1
6333744 Kirk et al. Dec 2001 B1
6345339 Arimilli et al. Feb 2002 B1
6351806 Wyland Feb 2002 B1
6353439 Lindholm et al. Mar 2002 B1
6407740 Chan Jun 2002 B1
6411130 Gater Jun 2002 B1
6411301 Parikh et al. Jun 2002 B1
6417851 Lindholm et al. Jul 2002 B1
6466222 Kao et al. Oct 2002 B1
6483516 Tischler Nov 2002 B1
6496537 Kranawetter et al. Dec 2002 B1
6525737 Duluk, Jr. et al. Feb 2003 B1
6526430 Hung et al. Feb 2003 B1
6542971 Reed Apr 2003 B1
6557022 Sih et al. Apr 2003 B1
6597363 Duluk, Jr. et al. Jul 2003 B1
6604188 Coon et al. Aug 2003 B1
6624818 Mantor et al. Sep 2003 B1
6636221 Morein Oct 2003 B1
6664958 Lather et al. Dec 2003 B1
6717577 Cheng et al. Apr 2004 B1
6718542 Kosche et al. Apr 2004 B1
6731288 Parsons et al. May 2004 B2
6734861 Van Dyke et al. May 2004 B1
6778181 Kilgariff et al. Aug 2004 B1
6806886 Zatz Oct 2004 B1
6839828 Gschwind et al. Jan 2005 B2
6924808 Kurihara et al. Aug 2005 B2
6947053 Malka et al. Sep 2005 B2
6980209 Donham et al. Dec 2005 B1
6980222 Marion et al. Dec 2005 B2
6999100 Leather et al. Feb 2006 B1
7034828 Drebin et al. Apr 2006 B1
7106336 Hutchins Sep 2006 B1
7158141 Chung et al. Jan 2007 B2
7187383 Kent Mar 2007 B2
7257814 Melvin et al. Aug 2007 B1
7280112 Hutchins Oct 2007 B1
7298375 Hutchins Nov 2007 B1
7430654 Huang et al. Sep 2008 B2
7450120 Hakura et al. Nov 2008 B1
7477260 Nordquist Jan 2009 B1
7659909 Hutchins Feb 2010 B1
7710427 Hutchins et al. May 2010 B1
7928990 Jiao et al. Apr 2011 B2
7941645 Riach et al. May 2011 B1
7969446 Hutchins et al. Jun 2011 B2
8537168 Steiner et al. Sep 2013 B1
8773447 Donham Jul 2014 B1
8860722 Cabral et al. Oct 2014 B2
9183607 Mahan et al. Nov 2015 B1
9411595 Rozas Aug 2016 B2
20020105519 Lindholm et al. Aug 2002 A1
20020126126 Baldwin Sep 2002 A1
20020129223 Takayama et al. Sep 2002 A1
20020169942 Sugimoto Nov 2002 A1
20030038810 Emberling Feb 2003 A1
20030115233 Hou et al. Jun 2003 A1
20030164840 O'Driscoll Sep 2003 A1
20030189565 Lindholm et al. Oct 2003 A1
20040012597 Zatz et al. Jan 2004 A1
20040012599 Laws Jan 2004 A1
20040012600 Deering et al. Jan 2004 A1
20040024260 Winkler et al. Feb 2004 A1
20040100474 Demers et al. May 2004 A1
20040114813 Boliek et al. Jun 2004 A1
20040119710 Piazza et al. Jun 2004 A1
20040126035 Kyo Jul 2004 A1
20040130552 Duluk, Jr. et al. Jul 2004 A1
20040194084 Matsunami et al. Sep 2004 A1
20040246260 Kim et al. Dec 2004 A1
20050086644 Chkodrov et al. Apr 2005 A1
20050122330 Boyd et al. Jun 2005 A1
20050134588 Aila et al. Jun 2005 A1
20050135433 Chang et al. Jun 2005 A1
20050162436 Van Hook et al. Jul 2005 A1
20050223195 Kawaguchi Oct 2005 A1
20050231506 Simpson et al. Oct 2005 A1
20050237337 Leather et al. Oct 2005 A1
20050253873 Hutchins et al. Nov 2005 A1
20050275657 Hutchins et al. Dec 2005 A1
20050280655 Hutchins et al. Dec 2005 A1
20060007234 Hutchins et al. Jan 2006 A1
20060028469 Engel Feb 2006 A1
20060152519 Hutchins et al. Jul 2006 A1
20060155964 Totsuka Jul 2006 A1
20060177122 Yasue Aug 2006 A1
20060268005 Hutchins et al. Nov 2006 A1
20060288195 Ma et al. Dec 2006 A1
20070030278 Prokopenko et al. Feb 2007 A1
20070165029 Lee et al. Jul 2007 A1
20070236495 Gruber et al. Oct 2007 A1
20070279408 Zheng et al. Dec 2007 A1
20070285427 Morein et al. Dec 2007 A1
20070288902 Lev et al. Dec 2007 A1
20090248983 Offen et al. Oct 2009 A1
20100023707 Hohmuth et al. Jan 2010 A1
20100211933 Kiel et al. Aug 2010 A1
20130103912 Jones et al. Apr 2013 A1
20140181404 Chaudhary et al. Jun 2014 A1
20140372990 Strauss Dec 2014 A1
Foreign Referenced Citations (16)
Number Date Country
1954338 May 2004 CN
101091203 May 2004 CN
1665165 May 2004 EP
1745434 May 2004 EP
1771824 May 2004 EP
05150979 Jun 1993 JP
11053187 Feb 1999 JP
2000047872 Feb 2000 JP
2002073330 Mar 2002 JP
2002171401 Jun 2002 JP
2004199222 Jul 2004 JP
2006196004 Jul 2006 JP
2005112592 May 2004 WO
2006007127 May 2004 WO
2005114582 Dec 2005 WO
2005114646 Dec 2005 WO
Non-Patent Literature Citations (13)
Entry
“Interleaved Memory.” Dec. 26, 2002. http://www.webopedia.com/TERM/I/interleaved—memory.html. Sep. 9, 2008, 3 pages.
Pirazzi, Chris. “Fields, F1/F2, Interleave, Field Dominance and More.” Nov. 4, 2001. http://lurkertech.com/lg/dominance.html. Sep. 9, 2008, 11 pages.
Hennessy, et al., Computer Organization and Design: The Hardware/Software Interface, 1997, Section 6.5 7 pages.
Hollasch; IEEE Standatd 754 Floating Point Numbers; http://steve.hollasch.net/cgindex/coding/ieeefloat.html; dated Feb. 24, 2005; retrieved Oct. 21, 2010 17 pages.
The Free Online Dictionary, Thesaurus and Encyclopedia, definition for cache; http://www.thefreedictionary.com/cache; retrieved Nov. 3, 2012, 3 pages.
Wolfe A, et al., “A Superscalar 3D graphics engine”, MICRO-32. Proceedings of the 32nd annual ACM/IEEE International Symposium on Microarchitecture. Haifa, Israel, Nov. 16-18, 1999; 12 pages.
Zaharieva-Stoyanova E I: “Data-flow analysis in superscalar computer architecture execution,” Tellecommunications in Modern Satellite, Cable and Broadcasting Services, 2003 4 pages.
“Sideband,” http://www.encyclopedia.com/html/s1/sideband.asp 2006, 4 pages.
Pixar, Inc.; PhotoRealistic RenderMan 3.9 Shading Language Extensions; Sep. 1999 20 pages.
Moller, et al.; Real-Time Rendering, 2nd ed., 2002, A K Peters Ltd., pp. 92-99, 2002.
PCT Notificaiton of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration. PCT/US05/17032; Applicant Nvida Corporation; dated Nov. 9, 2005.
PCT Notificaiton of Transmittal of the International Search Report or the Declaration. PCT/US05/17526; Applicant Hutchins, Edward A; dated Jan. 17, 2006.
PCT Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration. PCT/US05/17031; Applicant Nvida Corporation; dated Feb. 9, 2007.
Related Publications (1)
Number Date Country
20140181404 A1 Jun 2014 US