US20040111656A1 - Computer processor read/alter/rewrite optimization cache invalidate signals - Google Patents

Computer processor read/alter/rewrite optimization cache invalidate signals Download PDF

Info

Publication number
US20040111656A1
US20040111656A1 US10/692,101 US69210103A US2004111656A1 US 20040111656 A1 US20040111656 A1 US 20040111656A1 US 69210103 A US69210103 A US 69210103A US 2004111656 A1 US2004111656 A1 US 2004111656A1
Authority
US
United States
Prior art keywords
memory
cache
instruction
word
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/692,101
Inventor
Bruce Hayden
William A. Shelly
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/692,101 priority Critical patent/US20040111656A1/en
Publication of US20040111656A1 publication Critical patent/US20040111656A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/14Handling requests for interconnection or transfer
    • G06F13/16Handling requests for interconnection or transfer for access to memory bus
    • G06F13/1605Handling requests for interconnection or transfer for access to memory bus based on arbitration
    • G06F13/1652Handling requests for interconnection or transfer for access to memory bus based on arbitration in a multiprocessor architecture
    • G06F13/1663Access to shared memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
    • G06F12/0806Multiuser, multiprocessor or multiprocessing cache systems
    • G06F12/0815Cache consistency protocols

Definitions

  • the present invention generally relates to data processing systems, and more specifically to techniques to detect changes by one processor to memory by another processor.
  • Data processing systems invariably require that resources be shared among different processes, activities, or tasks in the case of multiprogrammed systems and among different processors in the case of multiprocessor systems. Such sharing is often not obvious within user programs. However, it is a necessity in operating systems, and is quite common in utility programs such as database and communications managers. For example, a dispatch queue is typically shared among multiple processors in a multiprocessor system. This provides a mechanism that allows each processor to select the highest priority task in the dispatch queue to execute. Numerous other operating systems tables are typically shared among different processes, activities, tasks, and processors
  • Serialization of access to shared resources in a multiprocessor system is controlled through mutual exclusion. This is typically implemented utilizing some sort of hardware gating or semaphores. Gating works by having a process, activity, or task “close” or “lock” a “gate” or “lock” before accessing the shared resource. Then, the “gate” or “lock” is “opened” or “unlocked” after the process, activity, or task is done accessing the shared resource. Both the gate closing and opening are typically atomic memory operations on multiprocessor systems.
  • queued gates There are typically two different types of gates: queued gates and spin gates. Semaphores are examples of queued gates. When a process, activity, or task attempts to “close” a queued gate that is already closed, that process, activity, or task is placed on a queue for that gate, and is dequeued and activated when the gate is subsequently opened by some other process, activity, or task. Queued gates are typically found in situations where the exclusive resource time is quite lengthy, especially in comparison with the time required to dispatch another process, activity, or task.
  • the second type of gate is a “spin” gate.
  • spin gate When a process, activity, or task attempts to “close” a spin gate that is already closed, a tight loop is entered where the processor attempting to close the spin gate keeps executing the “close” instruction until it ultimately is opened by another processor or the processor decides to quite trying.
  • spin gates assume a multiprocessor system since the processor “spinning” trying to “close” the spin gate is depending on another processor to “open” the gate.
  • Spin gates are typically found in situations where the exclusive resource time is fairly short, especially in comparison with the time required to dispatch another process, activity, or task. They are especially prevalent in time critical situations.
  • the instructions utilized to open and close gates typically execute utilizing atomic memory operations.
  • Such atomic memory modification instructions are found in most every architecture supporting multiple processors, especially when the processors share memory.
  • Some architectures utilize compare-and-swap or compare-and-exchange instructions (see FIGS. 10 and 11) to “close” gates.
  • the Unisys 1100/2200 series of computers utilizes Test Set and Skip (TSS) and Test Clear and Skip (TCS) to close and open spin gates.
  • the GCOS® 8 architecture produced by the assignee herein utilizes a Set Zero and Negative Indicators and Clear (SZNC) instruction to “close” a spin gate and a Store Instruction Counter plus 2 (STC2) instruction to subsequently “open” the spin gate.
  • SZNC sets the Zero and Negative indicators based on the current value of the gate being “closed”. It then clears (or zeros) the gate.
  • the next instruction executed is typically a branch instruction that repeats executing the SZNC instruction if the gate being closed was already clear (or contained zero). Thus, the SZNC instruction will be executed repeatedly as long as the spin gate is closed, as indicated by having a zero value.
  • the gate is opened by another processor by storing some non-zero value in the gate cell.
  • execution of the STC2 instruction to “open” a gate guarantees that the “opened” gate will contain a non-zero value.
  • a cache siphon is where the cache copy of a block of memory is moved from one cache memory to another.
  • the block of memory can “ping pong” back and forth between the processors as each processor siphons the block of memory containing the gate into its own cache memory in order to try to close the gate.
  • processors In the typical processor architecture, processors repeatedly attempt to close gates or otherwise modify directly shared data until that processor can change that shared data as required. For example, in the case of gates, one processor will bang on the gate until it is opened by another processor.
  • FIG. 1 is a block diagram illustrating a General Purpose Computer, in accordance with the present invention
  • FIG. 2 is a block diagram of a more detailed view of a multiprocessor data processing system, in accordance with the present invention.
  • FIG. 3 is a block diagram illustrating a pair of processor (CPU) modules as shown in FIG. 2;
  • FIG. 4 is a block diagram of a processor shown in FIG. 3;
  • FIG. 5 is a block diagram of an AX unit in the processor shown in FIG. 4;
  • FIG. 6 is a flowchart of a Wait for Change Instruction, in accordance with a preferred embodiment of the present invention.
  • FIG. 7 is a flowchart of a Wait for Change Instruction, in accordance with an alternate embodiment of the present invention.
  • FIG. 8 is a flowchart of a Lock Instruction, in accordance with a preferred embodiment of the present invention.
  • FIG. 9 is a flowchart of a Lock Instruction, in accordance with an alternate embodiment of the present invention.
  • FIG. 10 is a block diagram that illustrates operation of a Compare and Exchange type of instruction
  • FIG. 11 is a flowchart that illustrates operation of a Compare and Exchange type of instruction.
  • FIG. 12 is a flowchart illustrating usage of a Wait for Change instruction with a Compare and Exchange instruction, in accordance with a preferred embodiment of the present invention.
  • a plurality of processors in a data processing system share a common memory through which they communicate and share resources.
  • one processor needs to wait for another processor to modify a specified location in memory, such as unlocking a lock.
  • Memory and bus traffic are minimized during this waiting by first reading and testing the memory location. Then, the memory location is not read and tested again until the local copy of the cache line containing that memory location is invalidated by another processor.
  • This feature is utilized both for a Lock instruction and a Wait for Change instruction, both of which utilize a timer parameter for specifying a maximum number of cycles to wait for another processor to modify the specified location in memory.
  • bus will be used to refer to a plurality of signals or conductors which may be used to transfer one or more various types of information, such as data, addresses, control, or status.
  • assert and “negate” will be used when referring to the rendering of a signal, status bit, or similar apparatus into its logically true or logically false state, respectively. If the logically true state is a logic level one, the logically false state will be a logic level zero. And if the logically true state is a logic level zero, the logically false state will be a logic level one.
  • gate and lock are used interchangeably herein.
  • the terms “close” and “lock” as applied to gates or locks are used interchangeably herein.
  • the terms “open” and “unlock” as applied to gates or locks are used interchangeably herein.
  • exclusive access to a shared resource is provided by “closing” or “locking” a “gate” or “lock” before accessing the shared resource. Then, the “gate” or “lock” is “opened” or “unlocked” after accessing the shared resource, allowing another task, activity, process, or processor to access the shared resource.
  • FIG. 1 is a block diagram illustrating a General Purpose Computer 20 .
  • the General Purpose Computer 20 has a Computer Processor 22 , and Memory 24 , connected by a Bus 26 .
  • Memory 24 is a relatively high speed machine readable medium and includes Volatile Memories such as DRAM, and SRAM, and Non-Volatile Memories such as, ROM, FLASH, EPROM, EEPROM, and bubble memory.
  • Volatile Memories such as DRAM, and SRAM
  • Non-Volatile Memories such as, ROM, FLASH, EPROM, EEPROM, and bubble memory.
  • Secondary Storage 30 also connected to the Bus are Secondary Storage 30 , External Storage 32 , output devices such as a monitor 34 , input devices such as a keyboard 36 (with mouse 37 ), and printers 38 .
  • Secondary Storage 30 includes machine-readable media such as hard disk drives, magnetic drum, and bubble memory.
  • External Storage 32 includes machine-readable media such as floppy disks, removable hard drives, magnetic tape, CD-ROM, and even other computers, possibly connected via a communications line 28 .
  • the distinction drawn here between Secondary Storage 30 and External Storage 32 is primarily for convenience in describing the invention. As such, it should be appreciated that there is substantial functional overlap between these elements.
  • Computer software such test programs, operating systems, and user programs can be stored in a Computer Software Storage Medium, such as memory 24 , Secondary Storage 30 , and External Storage 32 .
  • Executable versions of computer software 33 can be read from a Non-Volatile Storage Medium such as External Storage 32 , Secondary Storage 30 , and Non-Volatile Memory and loaded for execution directly into Volatile Memory, executed directly out of Non-Volatile Memory, or stored on the Secondary Storage 30 prior to loading into Volatile Memory for execution.
  • a Non-Volatile Storage Medium such as External Storage 32 , Secondary Storage 30 , and Non-Volatile Memory and loaded for execution directly into Volatile Memory, executed directly out of Non-Volatile Memory, or stored on the Secondary Storage 30 prior to loading into Volatile Memory for execution.
  • FIG. 2 is a block diagram of a more detailed view of a multiprocessor data processing system, in accordance with the present invention.
  • the multiprocessor data processing system 80 comprises a plurality of modules coupled together via an intramodule bus 82 controlled by a storage control unit 86 .
  • each such module 84 , 88 , 90 is contained on a single board, with the boards connecting into a backplane.
  • the backplane includes the intramodule bus 82 .
  • sixteen modules are shown.
  • the system includes four (4) processor (“CPU”) modules 90 , four (4) Input/Output (“IOU”) modules 88 , and eight (8) memory (“MMU”) modules 84 .
  • CPU processor
  • IOU Input/Output
  • MMU memory
  • Each of the four Input/Output (“IOU”) modules 88 is shown coupled to secondary storage 30 . This is representative of the function of such IOU modules 88 .
  • Each IOU module 88 will typically contain a plurality of IOU processors (not shown).
  • Each of the eight memory modules 84 contains memory 24 and a memory controller (not shown).
  • This memory 24 (see FIG. 1) is typically Dynamic Random Access Memory (DRAM). Large quantities of such memory 24 are typically supported.
  • DRAM Dynamic Random Access Memory
  • FIG. 2 is also shown in FIG. 2 a Clock Management Unit 98 , which supplies a standard clock signal 99 to the remainder of the system 80 . As clock signals are ubiquitous in digital computer architectures, the clock signal 99 will not be shown further herein except where relevant. Note also that in the preferred embodiment, multiple Clock Management Units 98 are utilized to provide a redundant clock signal 99 .
  • FIG. 3 is a block diagram illustrating a pair of processor (CPU) modules 90 as shown in FIG. 2.
  • the two CPU modules 90 are coupled together and communicate over the intramodule bus 82 .
  • the CPU modules 90 each contain a plurality of processors (CPU) 92 and a Level 2 (L2) cache memory system 94 shared among the processors 92 .
  • each processor (CPU) module 90 contains up to four (4) processors (CPU) 92 .
  • the processors 92 and their L2 cache memory system 94 are coupled together and communicate over an intraprocessor bus 96 .
  • the Level 2 (L2) cache memory system 94 is shared among the processors 92 in a CPU module 90 .
  • the L2 cache memory system 94 maintains cache copies of data loaded into those processors 92 .
  • the cache memory system 94 is considered here a Level 2 cache and is coupled to and communicates with the storage control system (SCU) 86 over the intramodule bus 82 in order to maintain cache coherency between Level 2 (L2) cache memories 94 in each of the processor (CPU) modules 90 , as well as between cache Level 1 (L1) cache memories 256 in each of the processors 92 , and on the IOU modules 88 .
  • SCU storage control system
  • the SCU 86 also maintains coherency between the various cache memories 94 , 256 , and the typically slower speed memory in the MMU modules 84 .
  • a single block of memory or cache line will be owned for update by a single cache or memory at potentially each level in the memory hierarchy.
  • a given memory block or cache line may be owned by one Level 1 (L1) cache 256 , by one Level 2 (L2) cache 94 , and by one MMU 84 .
  • L1 cache 256 Level 1
  • L2 cache 94 Level 2 cache 94
  • MMU 84 MMU 84
  • a cache line can be held for read (only) by multiple caches in the hierarchy.
  • FIG. 4 is a block diagram of a processor 92 shown in FIG. 3.
  • the processor 92 communicates with the bus 96 utilizing a bus interface 78 .
  • the bus interface is bidirectionally coupled to a unified local (level 2 or L2) cache 256 .
  • Cache memories such as this unified local cache 256 , are typically constructed as high speed Static Random Access Memories (SRAM).
  • SRAM Static Random Access Memories
  • the local cache 256 is incorporated on the same integrated circuit as the remainder of the processor 92 .
  • the local cache 256 is the primary block that interfaces with the bus interface 78 . Data and instructions are loaded via the bus 96 into the local cache 256 , and data is written back from the local cache 256 via the bus 96 . Implementations which separately cache instructions and data do not modify this embodiment.
  • the local cache 256 is bidirectionally coupled to an AX module 260 .
  • the AX unit 260 provides the bulk of the functionality of the processor 92 , including instruction decode.
  • the AX unit 260 is bidirectionally coupled to and controls execution of a floating point (FP) unit 268 and a decimal/numeric (DN) unit 262 .
  • FP floating point
  • DN decimal/numeric
  • the floating-point unit 268 performs both floating-point operations, and fixed-point multiplications and divisions. It is bidirectionally coupled to the local cache 256 .
  • the decimal/numeric (DN) unit 262 performs decimal and string operations. It is bidirectionally coupled to the local cache 256 , allowing it to operate relatively autonomously from the AX unit 260 . Rather, once decimal or string operations are initiated in the DN unit 262 , the DN unit 262 is driven by operand availability in the local cache 256 .
  • FIG. 5 is a block diagram of an AX unit 260 in the processor 92 shown in FIG. 4.
  • the AX unit 260 comprises a Microprogram Control Section (MPS) unit 280 , an Auxiliary Operations Section (XOPS) 282 , a Basic Operations Section (BOPS) 284 , a Safe Store Buffer (SSB) 286 , an Address Preparation (AP) section 288 , and a NSA Virtual Segment Section 290 .
  • the MPS 280 is bidirectionally coupled to and receives instructions from the local cache 256 .
  • the MPS 280 performs instruction decode and provides microprogram control of the processor 92 .
  • the microprogram control utilizes a microengine executing microcode 281 stored in both dynamic and static memories in response to the execution of program instructions.
  • the MPS 280 is bidirectionally coupled to and controls operation of the Auxiliary Operations Section (XOPS) 282 , the Basic Operations Section (BOPS) 284 , the floating point (FP) unit 268 , the decimal/numeric (DN) unit 262 (not shown here), the Address Preparation (AP) section 288 , and the NSA Virtual Segment Section 290 .
  • the Basic Operations Section (BOPS) 284 is used to perform fixed point arithmetic, logical, and shift operations.
  • the Auxiliary Operations Section (XOPS) 282 performs most other operations.
  • the Address Preparation (AP) section 288 forms effective memory addresses utilizing virtual memory address translations.
  • the NSA Virtual Segment Section 290 is bidirectionally coupled to and operates in conjunction with the AP section 288 , in order to detect addressing violations.
  • the Safe Store Buffer (SSB) 286 stores the current status of the processor 92 environment, including user and segment registers, for the purpose of changing processor state.
  • the SSB 286 is coupled to and receives signals from the BOPS 284 , the AP section 288 , the MPS 280 , and the NSA 290 .
  • the SSB 286 is bidirectionally coupled to the local cache 256 , allowing SSB 286 frames to be pushed out to local cache 256 when entering a new processor environment, and pulled back from local cache 256 when returning to an old processor environment.
  • L2 cache 94 caches lines of memory from the MMU modules 84 .
  • the access can be either read-only or read/write.
  • the L2 cache 94 line of memory may be a copy of the same cache line in another L2 cache 94 .
  • read/write access requires exclusive control of the block (or line) of memory.
  • acquiring read/write access is termed “read-alter-rewrite” (RAR) access.
  • the cache line is not in a processor's L2 cache memory 94 , but is rather located in another L2 cache memory 94 in another processor module 90 , it is “siphoned” into the processor's L2 cache memory 94 .
  • the L2 caches 94 communicate across the system bus 82 utilizing a MESI bus protocol. This is described in more detail starting on page 168 of Pfister.
  • the cache coherence architecture is similar to the snoopy cache architecture described starting at page 166 in Pfister. As noted above, “siphoning” is when one processor pulls a cache block or line into either its L1 cache memory 256 , or its L2 cache memory 94 .
  • a first solution to these excessive gate siphons is to implement “friendly” gating.
  • “friendly” gating a test is first made whether or not the spin gate is open. This gate “snooping” only requires read-only access to the block of memory or cache line containing the spin gate. A read-only copy of the cache line containing the gate can be made from the cache line in another cache memory 94 , 256 and retained in the Level 1 (L1) cache 256 of the processor 92 until the cache line is updated by the opening processor 92 . This update will cause the local read-only copy of cache line containing the gate to be invalidated. Then, if the spin gate is determined to be open, an attempt is made to actually close the spin gate. This requires read/write (RAW) access. This method significantly reduces the number of RAW cache siphons required since the RAW cache siphons are suppressed whenever the spin gate is determined by the gate “snoop” to be already closed.
  • RAW read/write
  • FIG. 6 is a flowchart of a Wait for Change (or Wait until Change) Instruction, in accordance with a preferred embodiment of the present invention.
  • the Wait for Change Instruction delays execution of the processor on which the instruction has been executed until either a specified location in memory (Word# 1 ) has been changed, or the number of cycles specified by a timer or counter has been exhausted.
  • the instruction is initiated utilizing two or more registers and the address of a location in memory (Word# 1 ).
  • a first register (Reg# 1 ) contains the contents to be compared to the word in memory (Word# 1 ).
  • the contents of that memory location (Word# 1 ) upon completion of the instruction execution is returned in the second register (Reg# 2 ).
  • a third register may be utilized to provide a repeat or cycle count.
  • a fourth register may be utilized in alternate embodiments to contain a mask.
  • the flowchart starts by entering a first loop, which begins by reading the specified Word from memory into a second register (Reg# 2 ), step 102 .
  • the word just read from memory is then compared to the contents of a first register (Reg# 1 ), step 104 . If the word read from the memory differs from the contents of the first register (Reg# 1 ), step 104 , instruction execution is complete, and success is indicated, step 106 .
  • step 104 a second loop is entered, which starts by testing whether the processor has received a signal from the cache system invalidating the cache line in which the Word in memory is located, step 114 . If the cache invalidate signal has been received, step 114 , the instruction repeats the first loop, starting with reading the word from memory into the second register (Reg# 2 ), step 102 . Otherwise, if the cache line invalidate signal has not been received, step 114 , a counter is decremented, step 108 , and tested, step 110 . If the counter is not exhausted, step 110 , the second loop is repeated, starting with the test for receipt of the cache line invalidate signal, step 114 . Otherwise, when the counter is exhausted, the instruction exits, indicating failure, step 112 .
  • instruction success, step 106 , or failure, step 112 is indicated by setting or clearing a condition code bit or flag. This condition code bit can then be tested with a conditional branch instruction in order to determine what action to taken (see FIG. 12 below).
  • the contents of the two registers (Reg#1, Reg# 2 ) can be compared. In that case, if the two registers have the same contents, the instruction failed.
  • the repeat count is returned in the register that it was provided in, and if not exhausted, instruction failure is indicated. This embodiment, and any others that return the remainder of the timer or repeat count in the original repeat count register, has an advantage that it can be interrupted and restarted safely.
  • a signal is generated by preferably the level 1 (L1) cache 256 indicating that the cache system has invalidated the cache line containing the location being monitored for change (Word# 1 ).
  • the processor will typically read a copy of the word (Word# 1 ) from a read-only copy of the cache line containing the word in its L1 cache 256 , step 102 .
  • step 104 the contents of that word (Word# 1 ) from the read-only L1 cache 256 copy of that word do not differ from the first register (Reg# 1 ) when tested, step 104 , the contents of that word (Word# 1 ) will not differ until the read-only copy of the cache line containing that word (Word# 1 ) is invalidated by a write into a word in that cache line by another processor 92 .
  • this functionality is obtained by reading the appropriate L1 cache 256 tags to determine whether the cache line containing that word (Word# 1 ) has been invalidated, or through receipt of a cache invalidate signal from another processor 92 , or from a level 2 (L2 ) cache 94 .
  • this functionality is obtained by use and testing of a special signal or receipt of special cache commands from either an L1 cache 256 , or a L2 cache 94 .
  • only specified bits of the first register (Reg# 1 ) are compared to the corresponding bits in the word to be tested (Word# 1 ). This would typically be done by specify a mask in a mask register, which mask is ANDed to both the first register (Reg# 1 ) and the contents of the word (Word# 1 ) before being compared.
  • the mask can be provided as either another register specified explicitly or implicitly in the instruction, or as a fixed mask register.
  • register R1 is a repeat register utilized in steps 108 and 110
  • register R2 is a mask register ANDed to both operands before making the comparison in step 104 .
  • this instruction can be combined (see FIG. 12) with a Compare and Exchange instruction (see FIGS. 10 and 11) to provide most gating functions.
  • FIG. 7 is a flowchart of a Wait for Change Instruction, in accordance with an alternate embodiment of the present invention. It has identical parameters and register usages as the preferred embodiment of the instruction shown in FIG. 6. However, the testing of the cache line invalidate signal in step 114 is eliminated. Thus, this instruction can be implemented in processors that do not have potential access to such a cache line invalidate signal.
  • the instruction starts by reading the word (Word# 1 ) from memory into the second register (Reg# 2 ), step 102 .
  • the word just read from memory, step 102 is compared to the contents of the first register (Reg# 1 ), step 104 . If the word just read from memory (Word# 1 ) is different from the contents of the first register (Reg# 1 ), step 104 , the instruction exits, indicating success, step 106 .
  • step 108 the counter is decremented, step 108 , and tested for exhaustion, step 110 . If the counter is exhausted, step 110 , the instruction exits, indicating failure, step 112 . Otherwise, the instruction loops, starting at reading the word from memory (Word# 1 ) into the second register (Reg# 2 ), step 102 .
  • FIG. 8 is a flowchart of a Lock Instruction, in accordance with a preferred embodiment of the present invention.
  • the Lock Instruction delays execution of the processor on which the instruction has been executed until either a gate in memory (Word# 1 ) has been locked by this processor 92 , or the number of cycles specified by a timer or counter parameter has been exhausted.
  • the instruction is initiated providing the address of a location in memory (Word# 1 ) for the gate.
  • a first register may be utilized to provide a repeat or cycle count.
  • the instruction starts by entering a first loop which starts by reading the gate word (Word# 1 ) from memory, step 122 . If the word is locked, step 124 , a second loop is entered, which starts by testing whether a cache invalidate signal has been received for the cache line containing the gate word, step 126 . If the cache invalidate signal has not bee received, step 126 , a counter is decremented, step 128 , and tested for exhaustion, step 130 . If the counter has not been exhausted, step 130 , the second loop is repeated, starting with the testing for the cache invalidate signal in step 126 . Otherwise, the instruction exits, indicating failure, step 132 .
  • step 124 the cache line containing the gate word is acquired with write permission, step 123 .
  • the gate word is then read from memory (Word# 1 ), step 124 , and tested for being locked, step 136 . If the gate is not locked, step 136 , the gate word is written back to memory locked, step 138 .
  • the instruction then exits, indicating success, step 139 .
  • step 136 the second loop is entered, starting preferably with decrementing the counter, step 128 , or alternatively, testing for having received a cache line invalidate signal or command, step 126 .
  • FIG. 9 is a flowchart of a Lock Instruction, in accordance with an alternate embodiment of the present invention. It is identical with the preferred embodiment shown in FIG. 8, except that the testing for receipt of a cache line invalidate signal or command, step 126 is eliminated.
  • the instruction starts by entering a first loop which starts by reading the specified gate word (Word# 1 ) from memory, step 122 , and testing it for being locked, step 124 . If the gate word is locked, step 124 , the counter is decremented, step 128 , the counter is tested for exhaustion, step 130 , and if exhausted, the instruction exits indicating failure, step 132 . Otherwise, if the gate word is determined to be unlocked, step 124 , the flowchart is identical to the flowchart in FIG. 8, with the proviso that if the attempt to lock the gate word (Word# 1 ) fails, step 136 , the counter is decremented, step 128 , and tested for exhaustion, step 130 .
  • FIGS. would appear to imply sequential operation. However, this is for illustrative purposes only. In the preferred embodiment, these instructions would be implemented as microcode 281 . As such, some of the functions required for the execution of these instructions would typically be done in parallel.
  • the counter (or timer) is decremented once per cycle. Ignoring instruction setup time, the timing of the remainder of the instruction steps utilize the parallelism noted above to conform to this requirement.
  • the counter or timer value for these instructions provides a time, typically defined in terms of machine cycles, in which the instruction attempts to perform its designated function. Use of this timer value prevents “hanging” a processor when the action it is awaiting by another processor never occurs. For example, a lock may never be unlocked.
  • a prespecified counter or timer value can be utilized to specify that the instruction is not to be timed.
  • These instructions will typically be utilized primarily by operating system functions. They may be executed with interrupts locked out. However, they may also be executed with interrupts enabled. By providing the remaining counter or timer value in the register in which it was originally provided to the instruction, these instructions can be easily restarted after interrupt processing, even if other tasks have executed during that time.
  • the timer or counter value would preferably be specified for the instructions in a register.
  • the register may be explicitly or implicitly specified within the encoding of the instruction, or it may be a fixed repeat register, such as the use of the R1 repeat register utilized by the Unisys 1100/2200 architecture.
  • FIG. 10 is a block diagram that illustrates operation of a Compare and Exchange type of instruction.
  • FIG. 11 is a flowchart that illustrates operation of a Compare and Exchange type of instruction.
  • a value in a first register (Register A) 52 is compared 62 with a word in memory 56 , step 72 . If the word in memory 56 matches 62 the word in Register A 52 , step 74 , the contents of a second register (Register B) 54 are written 64 to the memory word 56 in the same uninterrupted single memory cycle, step 76 . If the contents of the memory word 56 do not match the contents of Register A 52 , step 74 , the contents of the memory word 56 are written 68 into that Register A 52 , step 78 .
  • a ZF flag in a status register is set if the word in memory 56 matches 62 the word in register A 52 , and is cleared if the word in memory 56 does not match 62 the word in register A 52 . This flag may be used by subsequent conditional branch instructions.
  • FIG. 12 is a flowchart illustrating usage of a Wait for Change instruction with a Compare and Exchange instruction, in accordance with a preferred embodiment of the present invention.
  • the flowchart starts by reading a specified word (Word# 1 ) into a first register (Reg# 1 ), step 142 .
  • a loop is then entered, which starts with modifying the contents of the first register (Reg# 1 ) into a second register (Reg# 2 ), step 144 .
  • a compare and exchange instruction (see FIG. 11) is then executed, step 146 , attempting to atomically read/alter/rewrite the contents of the second register (Reg# 2 ) if equal to the contents of the specified word (Word# 1 ) in memory, step 146 .
  • the contents of the specified word in memory (Word# 1 ) are preferably returned in the first register (Reg# 1 ).
  • step 148 The success of the compare and exchange instruction is then tested, step 148 , and if successful, the flowchart exits indicating success, step 149 . Otherwise, when the compare and exchange instruction failed, step 148 , a Wait for Change instruction (see FIG. 6) is executed, step 152 , utilizing the second register (Reg# 2 ) and the first register (Reg# 1 ). The Wait for Change instruction terminates when either the specified word (Word# 1 ) differs from the contents of the second register (Reg# 2 ), or the counter is exhausted.
  • step 154 Success of the Wait for Change instruction is then tested, step 154 , and if successful, indicating that the specified word in memory (Word# 1 ) has been changed, the loop is repeated, starting with modifying the first register (Reg# 1 ) into the second register (Reg# 2 ), step 144 .
  • the flow chart exits, indicating failure, step 159 .
  • the flowchart in FIG. 12 illustrates a methodology to efficiently update a specified location in memory (Word# 1 ) when waiting for another processor to modify the location.
  • the amount of bus and cache traffic is significantly reduced by only reading the word from memory when the cache line containing it has been invalidated. This methodology can be easily modified for use with gate locking and unlocking.

Abstract

A plurality of processors in a data processing system share a common memory through which they communicate and share resources. When sharing resources, one processor needs to wait for another processor to modify a specified location in memory, such as unlocking a lock. Memory and bus traffic are minimized during this waiting by first reading and testing the memory location. Then, the memory location is not read and tested again until the local copy of the cache line containing that memory location is invalidated by another processor. This feature is utilized both for a Lock instruction and a Wait for Change instruction, both of which utilize a timer parameter for specifying a maximum number of cycles to wait for another processor to modify the specified location in memory.

Description

    CROSS REFERENCE TO RELATED APPLICATION
  • This application is a Divisional of our copending patent application. assigned to the assignee hereof:[0001]
  • “COMPUTER PROCESSOR READ/ALTER/REWRITE OPTIMIZATION CACHE INVALIDATE SIGNALS” by Bruce E. Hayden et al, filed Jan. 3, 2001, with application Ser. No. 09/752,924.[0002]
  • This application is related to our copending patent applications assigned to the assignee hereof:[0003]
  • “GATE CLOSE FAILURE NOTIFICATION FOR FAIR GATING IN A NONUNIFORM MEMORY ARCHITECTURE DATA PROCESSING SYSTEM” by William A. Shelly et al., filed Sep. 30, 1999, with Ser. No. 09/409,456; and [0004]
  • “GATE CLOSE BALKING FOR FAIR GATING IN A NONUNIFORM MEMORY ARCHITECTURE DATA PROCESSING SYSTEM” by David A. Egolfet al., filed Sep. 30, 1999, with Ser. No. 09/409,811.[0005]
  • FIELD OF THE INVENTION
  • The present invention generally relates to data processing systems, and more specifically to techniques to detect changes by one processor to memory by another processor. [0006]
  • BACKGROUND OF THE INVENTION
  • Data processing systems invariably require that resources be shared among different processes, activities, or tasks in the case of multiprogrammed systems and among different processors in the case of multiprocessor systems. Such sharing is often not obvious within user programs. However, it is a necessity in operating systems, and is quite common in utility programs such as database and communications managers. For example, a dispatch queue is typically shared among multiple processors in a multiprocessor system. This provides a mechanism that allows each processor to select the highest priority task in the dispatch queue to execute. Numerous other operating systems tables are typically shared among different processes, activities, tasks, and processors [0007]
  • Serialization of access to shared resources in a multiprocessor system is controlled through mutual exclusion. This is typically implemented utilizing some sort of hardware gating or semaphores. Gating works by having a process, activity, or task “close” or “lock” a “gate” or “lock” before accessing the shared resource. Then, the “gate” or “lock” is “opened” or “unlocked” after the process, activity, or task is done accessing the shared resource. Both the gate closing and opening are typically atomic memory operations on multiprocessor systems. [0008]
  • There are typically two different types of gates: queued gates and spin gates. Semaphores are examples of queued gates. When a process, activity, or task attempts to “close” a queued gate that is already closed, that process, activity, or task is placed on a queue for that gate, and is dequeued and activated when the gate is subsequently opened by some other process, activity, or task. Queued gates are typically found in situations where the exclusive resource time is quite lengthy, especially in comparison with the time required to dispatch another process, activity, or task. [0009]
  • The second type of gate is a “spin” gate. When a process, activity, or task attempts to “close” a spin gate that is already closed, a tight loop is entered where the processor attempting to close the spin gate keeps executing the “close” instruction until it ultimately is opened by another processor or the processor decides to quite trying. Note that “spin” gates assume a multiprocessor system since the processor “spinning” trying to “close” the spin gate is depending on another processor to “open” the gate. Spin gates are typically found in situations where the exclusive resource time is fairly short, especially in comparison with the time required to dispatch another process, activity, or task. They are especially prevalent in time critical situations. [0010]
  • As noted above, the instructions utilized to open and close gates, in particular spin gates, typically execute utilizing atomic memory operations. Such atomic memory modification instructions are found in most every architecture supporting multiple processors, especially when the processors share memory. Some architectures utilize compare-and-swap or compare-and-exchange instructions (see FIGS. 10 and 11) to “close” gates. The Unisys 1100/2200 series of computers utilizes Test Set and Skip (TSS) and Test Clear and Skip (TCS) to close and open spin gates. [0011]
  • The GCOS® 8 architecture produced by the assignee herein utilizes a Set Zero and Negative Indicators and Clear (SZNC) instruction to “close” a spin gate and a Store Instruction Counter plus 2 (STC2) instruction to subsequently “open” the spin gate. The SZNC sets the Zero and Negative indicators based on the current value of the gate being “closed”. It then clears (or zeros) the gate. The next instruction executed is typically a branch instruction that repeats executing the SZNC instruction if the gate being closed was already clear (or contained zero). Thus, the SZNC instruction will be executed repeatedly as long as the spin gate is closed, as indicated by having a zero value. The gate is opened by another processor by storing some non-zero value in the gate cell. In the [0012] GCOS 8 architecture, execution of the STC2 instruction to “open” a gate guarantees that the “opened” gate will contain a non-zero value.
  • One problem that occurs whenever resources are shared between and among processors is that of cache ownership of directly shared data, including locks. [0013]
  • A cache siphon is where the cache copy of a block of memory is moved from one cache memory to another. When more than one processor is trying to get write access to the same word or block of memory containing a gate at the same time to close the gate, the block of memory can “ping pong” back and forth between the processors as each processor siphons the block of memory containing the gate into its own cache memory in order to try to close the gate. [0014]
  • Another problem that arises when directly sharing resources is that in the typical processor architecture, processors repeatedly attempt to close gates or otherwise modify directly shared data until that processor can change that shared data as required. For example, in the case of gates, one processor will bang on the gate until it is opened by another processor. [0015]
  • At first glance this may not seem like a problem since the processor “banging” at a lock cannot do anything else anyway until it succeeds in getting the gate locked. However, this constant “banging” on the gate does introduce significant overhead in bus and cache traffic. It would thus be advantageous to reduce this bus and cache traffic when one processor is waiting for another processor to modify a shared location in memory.[0016]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The features and advantages of the present invention will be more clearly understood from the following detailed description taken in conjunction with the accompanying FIGURES where like numerals refer to like and corresponding parts and in which: [0017]
  • FIG. 1 is a block diagram illustrating a General Purpose Computer, in accordance with the present invention; [0018]
  • FIG. 2 is a block diagram of a more detailed view of a multiprocessor data processing system, in accordance with the present invention; [0019]
  • FIG. 3 is a block diagram illustrating a pair of processor (CPU) modules as shown in FIG. 2; [0020]
  • FIG. 4 is a block diagram of a processor shown in FIG. 3; [0021]
  • FIG. 5 is a block diagram of an AX unit in the processor shown in FIG. 4; [0022]
  • FIG. 6 is a flowchart of a Wait for Change Instruction, in accordance with a preferred embodiment of the present invention; [0023]
  • FIG. 7 is a flowchart of a Wait for Change Instruction, in accordance with an alternate embodiment of the present invention; [0024]
  • FIG. 8 is a flowchart of a Lock Instruction, in accordance with a preferred embodiment of the present invention; [0025]
  • FIG. 9 is a flowchart of a Lock Instruction, in accordance with an alternate embodiment of the present invention; [0026]
  • FIG. 10 is a block diagram that illustrates operation of a Compare and Exchange type of instruction; [0027]
  • FIG. 11 is a flowchart that illustrates operation of a Compare and Exchange type of instruction; and [0028]
  • FIG. 12 is a flowchart illustrating usage of a Wait for Change instruction with a Compare and Exchange instruction, in accordance with a preferred embodiment of the present invention.[0029]
  • DETAILED DESCRIPTION
  • A plurality of processors in a data processing system share a common memory through which they communicate and share resources. When sharing resources, one processor needs to wait for another processor to modify a specified location in memory, such as unlocking a lock. Memory and bus traffic are minimized during this waiting by first reading and testing the memory location. Then, the memory location is not read and tested again until the local copy of the cache line containing that memory location is invalidated by another processor. This feature is utilized both for a Lock instruction and a Wait for Change instruction, both of which utilize a timer parameter for specifying a maximum number of cycles to wait for another processor to modify the specified location in memory. [0030]
  • In the following description, numerous specific details are set forth such as specific word or byte lengths, etc. to provide a thorough understanding of the present invention. However, it will be obvious to those skilled in the art that the present invention may be practiced without such specific details. In other instances, circuits have been shown in block diagram form in order not to obscure the present invention in unnecessary detail. For the most part, details concerning timing considerations and the like have been omitted inasmuch as such details are not necessary to obtain a complete understanding of the present invention and are within the skills of persons of ordinary skill in the relevant art. [0031]
  • The term “bus” will be used to refer to a plurality of signals or conductors which may be used to transfer one or more various types of information, such as data, addresses, control, or status. The terms “assert” and “negate” will be used when referring to the rendering of a signal, status bit, or similar apparatus into its logically true or logically false state, respectively. If the logically true state is a logic level one, the logically false state will be a logic level zero. And if the logically true state is a logic level zero, the logically false state will be a logic level one. [0032]
  • The term “gate” and “lock” are used interchangeably herein. The terms “close” and “lock” as applied to gates or locks are used interchangeably herein. The terms “open” and “unlock” as applied to gates or locks are used interchangeably herein. In a typical situation in a data processing system, exclusive access to a shared resource is provided by “closing” or “locking” a “gate” or “lock” before accessing the shared resource. Then, the “gate” or “lock” is “opened” or “unlocked” after accessing the shared resource, allowing another task, activity, process, or processor to access the shared resource. [0033]
  • FIG. 1 is a block diagram illustrating a [0034] General Purpose Computer 20. The General Purpose Computer 20 has a Computer Processor 22, and Memory 24, connected by a Bus 26. Memory 24 is a relatively high speed machine readable medium and includes Volatile Memories such as DRAM, and SRAM, and Non-Volatile Memories such as, ROM, FLASH, EPROM, EEPROM, and bubble memory. Also connected to the Bus are Secondary Storage 30, External Storage 32, output devices such as a monitor 34, input devices such as a keyboard 36 (with mouse 37), and printers 38. Secondary Storage 30 includes machine-readable media such as hard disk drives, magnetic drum, and bubble memory. External Storage 32 includes machine-readable media such as floppy disks, removable hard drives, magnetic tape, CD-ROM, and even other computers, possibly connected via a communications line 28. The distinction drawn here between Secondary Storage 30 and External Storage 32 is primarily for convenience in describing the invention. As such, it should be appreciated that there is substantial functional overlap between these elements. Computer software such test programs, operating systems, and user programs can be stored in a Computer Software Storage Medium, such as memory 24, Secondary Storage 30, and External Storage 32. Executable versions of computer software 33, can be read from a Non-Volatile Storage Medium such as External Storage 32, Secondary Storage 30, and Non-Volatile Memory and loaded for execution directly into Volatile Memory, executed directly out of Non-Volatile Memory, or stored on the Secondary Storage 30 prior to loading into Volatile Memory for execution.
  • FIG. 2 is a block diagram of a more detailed view of a multiprocessor data processing system, in accordance with the present invention. The multiprocessor data processing system [0035] 80 comprises a plurality of modules coupled together via an intramodule bus 82 controlled by a storage control unit 86. In the preferred embodiment, each such module 84, 88, 90 is contained on a single board, with the boards connecting into a backplane. The backplane includes the intramodule bus 82. In the representative data processing system 80 shown in FIG. 2, sixteen modules are shown. The system includes four (4) processor (“CPU”) modules 90, four (4) Input/Output (“IOU”) modules 88, and eight (8) memory (“MMU”) modules 84. Each of the four Input/Output (“IOU”) modules 88 is shown coupled to secondary storage 30. This is representative of the function of such IOU modules 88. Each IOU module 88 will typically contain a plurality of IOU processors (not shown). Each of the eight memory modules 84 contains memory 24 and a memory controller (not shown). This memory 24 (see FIG. 1) is typically Dynamic Random Access Memory (DRAM). Large quantities of such memory 24 are typically supported. Also shown in FIG. 2 is a Clock Management Unit 98, which supplies a standard clock signal 99 to the remainder of the system 80. As clock signals are ubiquitous in digital computer architectures, the clock signal 99 will not be shown further herein except where relevant. Note also that in the preferred embodiment, multiple Clock Management Units 98 are utilized to provide a redundant clock signal 99.
  • FIG. 3 is a block diagram illustrating a pair of processor (CPU) [0036] modules 90 as shown in FIG. 2. The two CPU modules 90 are coupled together and communicate over the intramodule bus 82. The CPU modules 90 each contain a plurality of processors (CPU) 92 and a Level 2 (L2) cache memory system 94 shared among the processors 92. In the preferred embodiment, each processor (CPU) module 90 contains up to four (4) processors (CPU) 92. The processors 92 and their L2 cache memory system 94 are coupled together and communicate over an intraprocessor bus 96.
  • The Level 2 (L2) [0037] cache memory system 94 is shared among the processors 92 in a CPU module 90. The L2 cache memory system 94 maintains cache copies of data loaded into those processors 92. The cache memory system 94 is considered here a Level 2 cache and is coupled to and communicates with the storage control system (SCU) 86 over the intramodule bus 82 in order to maintain cache coherency between Level 2 (L2) cache memories 94 in each of the processor (CPU) modules 90, as well as between cache Level 1 (L1) cache memories 256 in each of the processors 92, and on the IOU modules 88. The SCU 86 also maintains coherency between the various cache memories 94, 256, and the typically slower speed memory in the MMU modules 84. In the preferred embodiment, a single block of memory or cache line will be owned for update by a single cache or memory at potentially each level in the memory hierarchy. Thus, a given memory block or cache line may be owned by one Level 1 (L1) cache 256, by one Level 2 (L2) cache 94, and by one MMU 84. However note that that a cache line can be held for read (only) by multiple caches in the hierarchy.
  • FIG. 4 is a block diagram of a [0038] processor 92 shown in FIG. 3. The processor 92 communicates with the bus 96 utilizing a bus interface 78. The bus interface is bidirectionally coupled to a unified local (level 2 or L2) cache 256. Cache memories, such as this unified local cache 256, are typically constructed as high speed Static Random Access Memories (SRAM). In the preferred embodiment, the local cache 256 is incorporated on the same integrated circuit as the remainder of the processor 92. The local cache 256 is the primary block that interfaces with the bus interface 78. Data and instructions are loaded via the bus 96 into the local cache 256, and data is written back from the local cache 256 via the bus 96. Implementations which separately cache instructions and data do not modify this embodiment.
  • The [0039] local cache 256 is bidirectionally coupled to an AX module 260. The AX unit 260 provides the bulk of the functionality of the processor 92, including instruction decode. The AX unit 260 is bidirectionally coupled to and controls execution of a floating point (FP) unit 268 and a decimal/numeric (DN) unit 262. In the preferred embodiment, the floating-point unit 268 performs both floating-point operations, and fixed-point multiplications and divisions. It is bidirectionally coupled to the local cache 256. The decimal/numeric (DN) unit 262 performs decimal and string operations. It is bidirectionally coupled to the local cache 256, allowing it to operate relatively autonomously from the AX unit 260. Rather, once decimal or string operations are initiated in the DN unit 262, the DN unit 262 is driven by operand availability in the local cache 256.
  • FIG. 5 is a block diagram of an [0040] AX unit 260 in the processor 92 shown in FIG. 4. The AX unit 260 comprises a Microprogram Control Section (MPS) unit 280, an Auxiliary Operations Section (XOPS) 282, a Basic Operations Section (BOPS) 284, a Safe Store Buffer (SSB) 286, an Address Preparation (AP) section 288, and a NSA Virtual Segment Section 290. The MPS 280 is bidirectionally coupled to and receives instructions from the local cache 256. The MPS 280 performs instruction decode and provides microprogram control of the processor 92. The microprogram control utilizes a microengine executing microcode 281 stored in both dynamic and static memories in response to the execution of program instructions. The MPS 280 is bidirectionally coupled to and controls operation of the Auxiliary Operations Section (XOPS) 282, the Basic Operations Section (BOPS) 284, the floating point (FP) unit 268, the decimal/numeric (DN) unit 262 (not shown here), the Address Preparation (AP) section 288, and the NSA Virtual Segment Section 290. The Basic Operations Section (BOPS) 284 is used to perform fixed point arithmetic, logical, and shift operations. The Auxiliary Operations Section (XOPS) 282 performs most other operations. The Address Preparation (AP) section 288 forms effective memory addresses utilizing virtual memory address translations. The NSA Virtual Segment Section 290 is bidirectionally coupled to and operates in conjunction with the AP section 288, in order to detect addressing violations.
  • The Safe Store Buffer (SSB) [0041] 286 stores the current status of the processor 92 environment, including user and segment registers, for the purpose of changing processor state. The SSB 286 is coupled to and receives signals from the BOPS 284, the AP section 288, the MPS 280, and the NSA 290. The SSB 286 is bidirectionally coupled to the local cache 256, allowing SSB 286 frames to be pushed out to local cache 256 when entering a new processor environment, and pulled back from local cache 256 when returning to an old processor environment.
  • Returning to FIG. 3, in the preferred embodiment up to four [0042] processors 92 share a Level 2 or “L2” cache 94 in each processor (CPU) module 90. The L2 cache 94 caches lines of memory from the MMU modules 84. The access can be either read-only or read/write. In the case of read-only access, the L2 cache 94 line of memory may be a copy of the same cache line in another L2 cache 94. However, read/write access requires exclusive control of the block (or line) of memory. In the preferred embodiment, acquiring read/write access is termed “read-alter-rewrite” (RAR) access. If the cache line is not in a processor's L2 cache memory 94, but is rather located in another L2 cache memory 94 in another processor module 90, it is “siphoned” into the processor's L2 cache memory 94. The L2 caches 94 communicate across the system bus 82 utilizing a MESI bus protocol. This is described in more detail starting on page 168 of Pfister. The cache coherence architecture is similar to the snoopy cache architecture described starting at page 166 in Pfister. As noted above, “siphoning” is when one processor pulls a cache block or line into either its L1 cache memory 256, or its L2 cache memory 94.
  • In the prior art, whenever a [0043] processor 92 attempted to close a spin gate, it would acquire read/write (Read/Alter/Write or RAW) access to the block of memory containing the spin gate. Similarly, whenever a processor 92 would open a spin gate, it would also acquire read/write (or RAW) access to the block containing the spin gate. When a gate is in heavy use, multiple processors may repeatedly attempt to shut it while it is closed by yet another processor. Each such attempt to close the gate employs a read/write operation. This results in too much cache siphon activity since each gate test must acquire write permission to the cache line.
  • A first solution to these excessive gate siphons is to implement “friendly” gating. In “friendly” gating, a test is first made whether or not the spin gate is open. This gate “snooping” only requires read-only access to the block of memory or cache line containing the spin gate. A read-only copy of the cache line containing the gate can be made from the cache line in another [0044] cache memory 94, 256 and retained in the Level 1 (L1) cache 256 of the processor 92 until the cache line is updated by the opening processor 92. This update will cause the local read-only copy of cache line containing the gate to be invalidated. Then, if the spin gate is determined to be open, an attempt is made to actually close the spin gate. This requires read/write (RAW) access. This method significantly reduces the number of RAW cache siphons required since the RAW cache siphons are suppressed whenever the spin gate is determined by the gate “snoop” to be already closed.
  • FIG. 6 is a flowchart of a Wait for Change (or Wait until Change) Instruction, in accordance with a preferred embodiment of the present invention. The Wait for Change Instruction delays execution of the processor on which the instruction has been executed until either a specified location in memory (Word#[0045] 1) has been changed, or the number of cycles specified by a timer or counter has been exhausted. The instruction is initiated utilizing two or more registers and the address of a location in memory (Word#1). A first register (Reg#1) contains the contents to be compared to the word in memory (Word#1). The contents of that memory location (Word#1) upon completion of the instruction execution is returned in the second register (Reg#2). A third register may be utilized to provide a repeat or cycle count. A fourth register may be utilized in alternate embodiments to contain a mask.
  • The flowchart starts by entering a first loop, which begins by reading the specified Word from memory into a second register (Reg#[0046] 2), step 102. The word just read from memory is then compared to the contents of a first register (Reg#1), step 104. If the word read from the memory differs from the contents of the first register (Reg#1), step 104, instruction execution is complete, and success is indicated, step 106.
  • If the word read from memory is equal to the contents of the first register, step [0047] 104, a second loop is entered, which starts by testing whether the processor has received a signal from the cache system invalidating the cache line in which the Word in memory is located, step 114. If the cache invalidate signal has been received, step 114, the instruction repeats the first loop, starting with reading the word from memory into the second register (Reg#2), step 102. Otherwise, if the cache line invalidate signal has not been received, step 114, a counter is decremented, step 108, and tested, step 110. If the counter is not exhausted, step 110, the second loop is repeated, starting with the test for receipt of the cache line invalidate signal, step 114. Otherwise, when the counter is exhausted, the instruction exits, indicating failure, step 112.
  • In the preferred embodiment, instruction success, [0048] step 106, or failure, step 112, is indicated by setting or clearing a condition code bit or flag. This condition code bit can then be tested with a conditional branch instruction in order to determine what action to taken (see FIG. 12 below). Alternatively, the contents of the two registers (Reg#1, Reg#2) can be compared. In that case, if the two registers have the same contents, the instruction failed. In another embodiment, the repeat count is returned in the register that it was provided in, and if not exhausted, instruction failure is indicated. This embodiment, and any others that return the remainder of the timer or repeat count in the original repeat count register, has an advantage that it can be interrupted and restarted safely.
  • In the preferred embodiment, a signal is generated by preferably the level 1 (L1) [0049] cache 256 indicating that the cache system has invalidated the cache line containing the location being monitored for change (Word#1). The processor will typically read a copy of the word (Word#1) from a read-only copy of the cache line containing the word in its L1 cache 256, step 102. If the contents of that word (Word#1) from the read-only L1 cache 256 copy of that word do not differ from the first register (Reg#1) when tested, step 104, the contents of that word (Word#1) will not differ until the read-only copy of the cache line containing that word (Word#1) is invalidated by a write into a word in that cache line by another processor 92. In alternate embodiments, this functionality is obtained by reading the appropriate L1 cache 256 tags to determine whether the cache line containing that word (Word#1) has been invalidated, or through receipt of a cache invalidate signal from another processor 92, or from a level 2 (L2 ) cache 94. In other embodiments, this functionality is obtained by use and testing of a special signal or receipt of special cache commands from either an L1 cache 256, or a L2 cache 94.
  • In an alternate embodiment, only specified bits of the first register (Reg#[0050] 1) are compared to the corresponding bits in the word to be tested (Word#1). This would typically be done by specify a mask in a mask register, which mask is ANDed to both the first register (Reg#1) and the contents of the word (Word#1) before being compared. The mask can be provided as either another register specified explicitly or implicitly in the instruction, or as a fixed mask register. For example, in the Unisys 1100/2200 architecture, register R1 is a repeat register utilized in steps 108 and 110, while register R2 is a mask register ANDed to both operands before making the comparison in step 104. By use of such a mask, this instruction can be combined (see FIG. 12) with a Compare and Exchange instruction (see FIGS. 10 and 11) to provide most gating functions.
  • FIG. 7 is a flowchart of a Wait for Change Instruction, in accordance with an alternate embodiment of the present invention. It has identical parameters and register usages as the preferred embodiment of the instruction shown in FIG. 6. However, the testing of the cache line invalidate signal in [0051] step 114 is eliminated. Thus, this instruction can be implemented in processors that do not have potential access to such a cache line invalidate signal.
  • The instruction starts by reading the word (Word#[0052] 1) from memory into the second register (Reg#2), step 102. The word just read from memory, step 102, is compared to the contents of the first register (Reg#1), step 104. If the word just read from memory (Word#1) is different from the contents of the first register (Reg#1), step 104, the instruction exits, indicating success, step 106.
  • Alternatively, the counter is decremented, [0053] step 108, and tested for exhaustion, step 110. If the counter is exhausted, step 110, the instruction exits, indicating failure, step 112. Otherwise, the instruction loops, starting at reading the word from memory (Word#1) into the second register (Reg#2), step 102.
  • FIG. 8 is a flowchart of a Lock Instruction, in accordance with a preferred embodiment of the present invention. The Lock Instruction delays execution of the processor on which the instruction has been executed until either a gate in memory (Word#[0054] 1) has been locked by this processor 92, or the number of cycles specified by a timer or counter parameter has been exhausted. The instruction is initiated providing the address of a location in memory (Word#1) for the gate. A first register may be utilized to provide a repeat or cycle count.
  • The instruction starts by entering a first loop which starts by reading the gate word (Word#[0055] 1) from memory, step 122. If the word is locked, step 124, a second loop is entered, which starts by testing whether a cache invalidate signal has been received for the cache line containing the gate word, step 126. If the cache invalidate signal has not bee received, step 126, a counter is decremented, step 128, and tested for exhaustion, step 130. If the counter has not been exhausted, step 130, the second loop is repeated, starting with the testing for the cache invalidate signal in step 126. Otherwise, the instruction exits, indicating failure, step 132.
  • If the gate in [0056] Word# 1 is unlocked, step 124, the cache line containing the gate word is acquired with write permission, step 123. The gate word is then read from memory (Word#1), step 124, and tested for being locked, step 136. If the gate is not locked, step 136, the gate word is written back to memory locked, step 138. The instruction then exits, indicating success, step 139.
  • However, if the gate word was determined to now be locked, [0057] step 136, the second loop is entered, starting preferably with decrementing the counter, step 128, or alternatively, testing for having received a cache line invalidate signal or command, step 126.
  • FIG. 9 is a flowchart of a Lock Instruction, in accordance with an alternate embodiment of the present invention. It is identical with the preferred embodiment shown in FIG. 8, except that the testing for receipt of a cache line invalidate signal or command, [0058] step 126 is eliminated.
  • Thus, the instruction starts by entering a first loop which starts by reading the specified gate word (Word#[0059] 1) from memory, step 122, and testing it for being locked, step 124. If the gate word is locked, step 124, the counter is decremented, step 128, the counter is tested for exhaustion, step 130, and if exhausted, the instruction exits indicating failure, step 132. Otherwise, if the gate word is determined to be unlocked, step 124, the flowchart is identical to the flowchart in FIG. 8, with the proviso that if the attempt to lock the gate word (Word#1) fails, step 136, the counter is decremented, step 128, and tested for exhaustion, step 130.
  • The previous FIGS. would appear to imply sequential operation. However, this is for illustrative purposes only. In the preferred embodiment, these instructions would be implemented as [0060] microcode 281. As such, some of the functions required for the execution of these instructions would typically be done in parallel.
  • Similarly, the previous FIGS. would seem to imply that multiple instruction cycles are executed. Again, this is for ease of illustration. In the preferred embodiment, the counter (or timer) is decremented once per cycle. Ignoring instruction setup time, the timing of the remainder of the instruction steps utilize the parallelism noted above to conform to this requirement. Thus, the counter or timer value for these instructions provides a time, typically defined in terms of machine cycles, in which the instruction attempts to perform its designated function. Use of this timer value prevents “hanging” a processor when the action it is awaiting by another processor never occurs. For example, a lock may never be unlocked. However, in alternate embodiments, a prespecified counter or timer value can be utilized to specify that the instruction is not to be timed. [0061]
  • These instructions will typically be utilized primarily by operating system functions. They may be executed with interrupts locked out. However, they may also be executed with interrupts enabled. By providing the remaining counter or timer value in the register in which it was originally provided to the instruction, these instructions can be easily restarted after interrupt processing, even if other tasks have executed during that time. [0062]
  • As with the mask register disclosed above, the timer or counter value would preferably be specified for the instructions in a register. The register may be explicitly or implicitly specified within the encoding of the instruction, or it may be a fixed repeat register, such as the use of the R1 repeat register utilized by the Unisys 1100/2200 architecture. [0063]
  • FIG. 10 is a block diagram that illustrates operation of a Compare and Exchange type of instruction. FIG. 11 is a flowchart that illustrates operation of a Compare and Exchange type of instruction. A value in a first register (Register A) [0064] 52 is compared 62 with a word in memory 56, step 72. If the word in memory 56 matches 62 the word in Register A 52, step 74, the contents of a second register (Register B) 54 are written 64 to the memory word 56 in the same uninterrupted single memory cycle, step 76. If the contents of the memory word 56 do not match the contents of Register A 52, step 74, the contents of the memory word 56 are written 68 into that Register A 52, step 78. In the case of the Intel IA-32 CMPXCHG8B instruction referenced above, a ZF flag in a status register is set if the word in memory 56 matches 62 the word in register A 52, and is cleared if the word in memory 56 does not match 62 the word in register A 52. This flag may be used by subsequent conditional branch instructions.
  • FIG. 12 is a flowchart illustrating usage of a Wait for Change instruction with a Compare and Exchange instruction, in accordance with a preferred embodiment of the present invention. The flowchart starts by reading a specified word (Word#[0065] 1) into a first register (Reg#1), step 142. A loop is then entered, which starts with modifying the contents of the first register (Reg#1) into a second register (Reg#2), step 144. A compare and exchange instruction (see FIG. 11) is then executed, step 146, attempting to atomically read/alter/rewrite the contents of the second register (Reg#2) if equal to the contents of the specified word (Word#1) in memory, step 146. The contents of the specified word in memory (Word#1) are preferably returned in the first register (Reg#1).
  • The success of the compare and exchange instruction is then tested, [0066] step 148, and if successful, the flowchart exits indicating success, step 149. Otherwise, when the compare and exchange instruction failed, step 148, a Wait for Change instruction (see FIG. 6) is executed, step 152, utilizing the second register (Reg#2) and the first register (Reg#1). The Wait for Change instruction terminates when either the specified word (Word#1) differs from the contents of the second register (Reg#2), or the counter is exhausted. Success of the Wait for Change instruction is then tested, step 154, and if successful, indicating that the specified word in memory (Word#1) has been changed, the loop is repeated, starting with modifying the first register (Reg#1) into the second register (Reg#2), step 144. Alternatively, when the Wait for Change counter has been exhausted, the flow chart exits, indicating failure, step 159.
  • The flowchart in FIG. 12 illustrates a methodology to efficiently update a specified location in memory (Word#[0067] 1) when waiting for another processor to modify the location. The amount of bus and cache traffic is significantly reduced by only reading the word from memory when the cache line containing it has been invalidated. This methodology can be easily modified for use with gate locking and unlocking.
  • Those skilled in the art will recognize that modifications and variations can be made without departing from the spirit of the invention. Therefore, it is intended that this invention encompass all such variations and modifications as fall within the scope of the appended claims. [0068]
  • Claim elements and steps herein have been numbered and/or lettered solely as an aid in readability and understanding. As such, the numbering and/or lettering in itself is not intended to and should not be taken to indicate the ordering of elements and/or steps in the claims. [0069]

Claims (4)

What is claimed is:
1. A processor comprising:
A) a first register;
B) a means for decoding a Wait for Change instruction; and
C) a means for executing a Wait for Change instruction in response to decoding the Wait for Change instruction, wherein:
execution of the Wait for Change instruction terminates when either a contents of a specified location in a memory differs from a contents of the first register or a specified time period has elapsed.
2. The processor in claim 1 wherein:
means (C) comprises:
1) a means for comparing the specified location in the memory to the contents of the first register;
2) a means for receiving a cache invalidate signal; and
3) a means for waiting for the cache invalidate signal for a cache line that includes the specified location in the memory when the comparing in means (1) fails.
3. A processor comprising:
A) a means for decoding a Lock instruction; and
B) a means for executing a Lock instruction in response to decoding the Lock instruction, wherein:
execution of the Lock instruction terminates when either a lock value is written to a specified location in a memory overwriting a non-lock value in the specified location or a specified time period has elapsed.
4. The processor in claim 3 wherein: means (B) comprises:
1) a means for testing the specified location in the memory for containing the non-lock value;
2) a means for writing the lock value to the specified location in the memory when the specified location in the memory contains the non-lock value;
3) a means for receiving a cache invalidate signal; and
4) a means for waiting for the cache invalidate signal for a cache line that includes the specified location in the memory when the testing in means (1) fails.
US10/692,101 2001-01-03 2003-10-23 Computer processor read/alter/rewrite optimization cache invalidate signals Abandoned US20040111656A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/692,101 US20040111656A1 (en) 2001-01-03 2003-10-23 Computer processor read/alter/rewrite optimization cache invalidate signals

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/752,924 US6754859B2 (en) 2001-01-03 2001-01-03 Computer processor read/alter/rewrite optimization cache invalidate signals
US10/692,101 US20040111656A1 (en) 2001-01-03 2003-10-23 Computer processor read/alter/rewrite optimization cache invalidate signals

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/752,924 Division US6754859B2 (en) 2001-01-03 2001-01-03 Computer processor read/alter/rewrite optimization cache invalidate signals

Publications (1)

Publication Number Publication Date
US20040111656A1 true US20040111656A1 (en) 2004-06-10

Family

ID=25028451

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/752,924 Expired - Lifetime US6754859B2 (en) 2001-01-03 2001-01-03 Computer processor read/alter/rewrite optimization cache invalidate signals
US10/692,101 Abandoned US20040111656A1 (en) 2001-01-03 2003-10-23 Computer processor read/alter/rewrite optimization cache invalidate signals

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/752,924 Expired - Lifetime US6754859B2 (en) 2001-01-03 2001-01-03 Computer processor read/alter/rewrite optimization cache invalidate signals

Country Status (1)

Country Link
US (2) US6754859B2 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060156291A1 (en) * 2005-01-12 2006-07-13 Dell Products L.P. System and method for managing processor execution in a multiprocessor system
US20090024877A1 (en) * 2007-07-18 2009-01-22 Shubhodeep Roy Choudhury System and Method for Creating Different Start Cache and Bus States Using Multiple Test Patterns for Processor Design Verification and Validation
US20090024873A1 (en) * 2007-07-18 2009-01-22 Sandip Bag System and Method for Increasing Error Checking Performance by Calculating CRC Calculations After Multiple Test Patterns for Processor Design Verification and Validation
US20090024892A1 (en) * 2007-07-18 2009-01-22 Vinod Bussa System and Method of Testing using Test Pattern Re-Execution in Varying Timing Scenarios for Processor Design Verification and Validation
US20090024876A1 (en) * 2007-07-18 2009-01-22 Sampan Arora System and Method for Verification of Cache Snoop Logic and Coherency Between Instruction & Data Caches for Processor Design Verification and Validation
US20090024894A1 (en) * 2007-07-18 2009-01-22 International Business Machines Corporation System and method for predicting iwarx and stwcx instructions in test pattern generation and simulation for processor design verification/validation in interrupt mode
US20090024886A1 (en) * 2007-07-18 2009-01-22 Sampan Arora System and Method for Predicting lwarx and stwcx Instructions in Test Pattern Generation and Simulation for Processor Design Verification and Validation
US20100023697A1 (en) * 2008-07-25 2010-01-28 International Business Machines Corporation Testing Real Page Number Bits in a Cache Directory

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3598282B2 (en) * 2000-09-07 2004-12-08 株式会社ソニー・コンピュータエンタテインメント Computer, control method thereof, and recording medium recording the control method
US6754859B2 (en) * 2001-01-03 2004-06-22 Bull Hn Information Systems Inc. Computer processor read/alter/rewrite optimization cache invalidate signals
US20040037227A1 (en) * 2002-08-20 2004-02-26 Kuo-Hung Shih Circuit for enhancing scan testing capability of a digital IC tester
US6868483B2 (en) * 2002-09-26 2005-03-15 Bull Hn Information Systems Inc. Balanced access to prevent gateword dominance in a multiprocessor write-into-cache environment
US6970977B2 (en) * 2003-03-31 2005-11-29 Bull Hn Information Systems Inc. Equal access to prevent gateword dominance in a multiprocessor write-into-cache environment
US6973539B2 (en) * 2003-04-30 2005-12-06 Bull Hn Information Systems Inc. Multiprocessor write-into-cache system incorporating efficient access to a plurality of gatewords
US7571354B2 (en) * 2003-05-09 2009-08-04 Sun Microsystems, Inc. System and method for request routing
US20050022202A1 (en) * 2003-07-09 2005-01-27 Sun Microsystems, Inc. Request failover mechanism for a load balancing system
US20060253844A1 (en) 2005-04-21 2006-11-09 Holt John M Computer architecture and method of operation for multi-computer distributed processing with initialization of objects
US20060095483A1 (en) * 2004-04-23 2006-05-04 Waratek Pty Limited Modified computer architecture with finalization of objects
US7844665B2 (en) 2004-04-23 2010-11-30 Waratek Pty Ltd. Modified computer architecture having coordinated deletion of corresponding replicated memory locations among plural computers
US20080126503A1 (en) * 2006-10-05 2008-05-29 Holt John M Contention resolution with echo cancellation
US7962697B2 (en) * 2006-10-05 2011-06-14 Waratek Pty Limited Contention detection
US20080127213A1 (en) * 2006-10-05 2008-05-29 Holt John M Contention resolution with counter rollover
WO2008040075A1 (en) * 2006-10-05 2008-04-10 Waratek Pty Limited Contention detection with modified message format
US7949837B2 (en) * 2006-10-05 2011-05-24 Waratek Pty Ltd. Contention detection and resolution
AU2007304895A1 (en) * 2006-10-05 2008-04-10 Waratek Pty Limited Advanced contention detection
US20080250221A1 (en) * 2006-10-09 2008-10-09 Holt John M Contention detection with data consolidation
US8738860B1 (en) 2010-10-25 2014-05-27 Tilera Corporation Computing in parallel processing environments
US10761925B2 (en) * 2015-03-24 2020-09-01 Nxp Usa, Inc. Multi-channel network-on-a-chip
FR3092677B1 (en) * 2019-02-11 2021-01-22 Commissariat Energie Atomique PROCESS FOR MANAGING A CACHE MEMORY OF AN ELECTRONIC COMPUTER

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6754859B2 (en) * 2001-01-03 2004-06-22 Bull Hn Information Systems Inc. Computer processor read/alter/rewrite optimization cache invalidate signals

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5517626A (en) * 1990-05-07 1996-05-14 S3, Incorporated Open high speed bus for microcomputer system
US5265232A (en) * 1991-04-03 1993-11-23 International Business Machines Corporation Coherence control by data invalidation in selected processor caches without broadcasting to processor caches not having the data
JP2532194B2 (en) * 1992-03-30 1996-09-11 インターナショナル・ビジネス・マシーンズ・コーポレイション A data processing system having a message routing function between a processor and a coupling function.
US5519839A (en) * 1992-10-02 1996-05-21 Compaq Computer Corp. Double buffering operations between the memory bus and the expansion bus of a computer system
US5524208A (en) * 1994-06-09 1996-06-04 Dell Usa, L.P. Method and apparatus for performing cache snoop testing using DMA cycles in a computer system
US5996061A (en) * 1997-06-25 1999-11-30 Sun Microsystems, Inc. Method for invalidating data identified by software compiler

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6754859B2 (en) * 2001-01-03 2004-06-22 Bull Hn Information Systems Inc. Computer processor read/alter/rewrite optimization cache invalidate signals

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060156291A1 (en) * 2005-01-12 2006-07-13 Dell Products L.P. System and method for managing processor execution in a multiprocessor system
US20090024886A1 (en) * 2007-07-18 2009-01-22 Sampan Arora System and Method for Predicting lwarx and stwcx Instructions in Test Pattern Generation and Simulation for Processor Design Verification and Validation
US7739570B2 (en) 2007-07-18 2010-06-15 International Business Machines Corporation System and method for increasing error checking performance by calculating CRC calculations after multiple test patterns for processor design verification and validation
US20090024892A1 (en) * 2007-07-18 2009-01-22 Vinod Bussa System and Method of Testing using Test Pattern Re-Execution in Varying Timing Scenarios for Processor Design Verification and Validation
US20090024876A1 (en) * 2007-07-18 2009-01-22 Sampan Arora System and Method for Verification of Cache Snoop Logic and Coherency Between Instruction & Data Caches for Processor Design Verification and Validation
US20090024894A1 (en) * 2007-07-18 2009-01-22 International Business Machines Corporation System and method for predicting iwarx and stwcx instructions in test pattern generation and simulation for processor design verification/validation in interrupt mode
US20090024877A1 (en) * 2007-07-18 2009-01-22 Shubhodeep Roy Choudhury System and Method for Creating Different Start Cache and Bus States Using Multiple Test Patterns for Processor Design Verification and Validation
US7647539B2 (en) 2007-07-18 2010-01-12 International Business Machines Corporation System and method of testing using test pattern re-execution in varying timing scenarios for processor design verification and validation
US8127192B2 (en) 2007-07-18 2012-02-28 International Business Machines Corporation Predicting lwarx and stwcx instructions in test pattern generation and simulation for processor design verification/validation in interrupt mode
US7661023B2 (en) * 2007-07-18 2010-02-09 International Business Machines Corporation System and method for verification of cache snoop logic and coherency between instruction & data caches for processor design verification and validation
US7689886B2 (en) 2007-07-18 2010-03-30 International Business Machines Corporation System and method for predicting lwarx and stwcx instructions in test pattern generation and simulation for processor design verification and validation
US20090024873A1 (en) * 2007-07-18 2009-01-22 Sandip Bag System and Method for Increasing Error Checking Performance by Calculating CRC Calculations After Multiple Test Patterns for Processor Design Verification and Validation
US7747908B2 (en) 2007-07-18 2010-06-29 International Business Machines Corporation System and method for creating different start cache and bus states using multiple test patterns for processor design verification and validation
US20100023697A1 (en) * 2008-07-25 2010-01-28 International Business Machines Corporation Testing Real Page Number Bits in a Cache Directory
US8185694B2 (en) 2008-07-25 2012-05-22 International Business Machines Corporation Testing real page number bits in a cache directory

Also Published As

Publication number Publication date
US20020087925A1 (en) 2002-07-04
US6754859B2 (en) 2004-06-22

Similar Documents

Publication Publication Date Title
US6754859B2 (en) Computer processor read/alter/rewrite optimization cache invalidate signals
TWI476595B (en) Registering a user-handler in hardware for transactional memory event handling
TWI434214B (en) Apparatus, processor, system, and method for extending cache coherency to hold buffered data
US8688917B2 (en) Read and write monitoring attributes in transactional memory (TM) systems
US6665783B2 (en) Memory-to-memory copy and compare/exchange instructions to support non-blocking synchronization schemes
US8190859B2 (en) Critical section detection and prediction mechanism for hardware lock elision
JP4764430B2 (en) Transaction-based shared data operations in a multiprocessor environment
JP4982375B2 (en) Sharing a monitored cache line across multiple cores
US5890200A (en) Method and apparatus for maintaining cache coherency in a computer system with a highly pipelined bus and multiple conflicting snoop requests
Stone et al. Multiple reservations and the Oklahoma update
US8706982B2 (en) Mechanisms for strong atomicity in a transactional memory system
KR20120096588A (en) Synchronizing simd vectors
US10768680B2 (en) Hardware apparatuses and methods to perform transactional power management
EP1329804B1 (en) Mechanism for processing speculative LL and SC instructions in a pipelined processor
US20020083278A1 (en) Method and data processing system for performing atomic multiple word writes
US6484272B1 (en) Gate close balking for fair gating in a nonuniform memory architecture data processing system
US6480973B1 (en) Gate close failure notification for fair gating in a nonuniform memory architecture data processing system
Stone et al. Storage in the power PC
CN110764880A (en) Three-state control method based on atomic operation

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: EXPRESSLY ABANDONED -- DURING EXAMINATION