Read/Write Permission Bit Support for Efficient Hardware to Software Handover
First Claim
Patent Images
1. A method comprising:
- communicating with one or more other nodes in a system from a first node in the system in response to a trap experienced by a processor in the first node during a memory operation, wherein the trap is signalled in the processor in response to one or more permission bits stored with a cache line in a cache accessible during performance of the memory operation;
determining that the cache line is part of a memory transaction in a second node that is one of the other nodes, wherein a memory transaction comprises two or more memory operations that appear to execute atomically in isolation; and
resolving a conflict between the memory operation and the memory transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a method comprises communicating with one or more other nodes in a system from a first node in the system in response to a trap experienced by a processor in the first node during a memory operation, wherein the trap is signalled in the processor in response to one or more permission bits stored with a cache line in a cache accessible during performance of the memory operation; determining that the cache line is part of a memory transaction in a second node that is one of the other nodes, wherein a memory transaction comprises two or more memory operations that appear to execute atomically in isolation; and resolving a conflict between the memory operation and the memory transaction.
50 Citations
21 Claims
-
1. A method comprising:
-
communicating with one or more other nodes in a system from a first node in the system in response to a trap experienced by a processor in the first node during a memory operation, wherein the trap is signalled in the processor in response to one or more permission bits stored with a cache line in a cache accessible during performance of the memory operation;
determining that the cache line is part of a memory transaction in a second node that is one of the other nodes, wherein a memory transaction comprises two or more memory operations that appear to execute atomically in isolation; and
resolving a conflict between the memory operation and the memory transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer accessible storage medium store a plurality of instructions that are executable to perform a method comprising:
-
communicating with one or more other nodes in a system from a first node in the system in response to a trap experienced by a processor in the first node during a memory operation, wherein the trap is signalled in the processor in response to one or more permission bits stored with a cache line in a cache accessible during performance of the memory operation;
determining that the cache line is part of a memory transaction in a second node that is one of the other nodes, wherein a memory transaction comprises two or more memory operations that appear to execute atomically in isolation; and
resolving a conflict between the memory operation and the memory transaction. - View Dependent Claims (15, 16)
-
-
17. A cache comprising:
-
a tag memory configured to store a plurality of cache tags, wherein each cache tag corresponds to a respective cache line of data stored in the cache, and wherein each cache tag comprises one or more bits that indicate whether or not a memory operation to the respective cache line is to be trapped in a processor that performs the memory operation; and
a cache control unit coupled to the tag memory and configured to signal a trap for a memory operation responsive to the bits from the cache tag. - View Dependent Claims (18, 19, 20, 21)
-
Specification