ASYMMETRIC MEMORY TAG ACCESS AND DESIGN
First Claim
Patent Images
1. A method of accessing tag information in a memory line, comprising:
- determining, by a computing core, an operation to perform on at least one memory line of a memory, the at least one memory line comprising;
(i) an address portion comprising one or more address bits indicative of an address of an associated cache line, and (ii) a flag portion comprising one or more flag bits indicative of whether the associated cache line is;
(i) valid or invalid, and (ii) dirty or not dirty, wherein each of the flag portion and the address portion are accessible by the computing core independent of the other via separate instances of hardware; and
performing the operation by accessing, by the computing core, only the flag portion of the at least one memory line independent of the address portion of the at least one memory line.
1 Assignment
0 Petitions
Accused Products
Abstract
Various aspects are described herein. In some aspects, the disclosure provides techniques for accessing tag information in a memory line. The techniques include determining an operation to perform on at least one memory line of a memory. The techniques further include performing the operation by accessing only a portion of the at least one memory line, wherein the only the portion of the at least one memory line comprises one or more flag bits that are independently accessible from remaining bits of the at least one memory line.
-
Citations
21 Claims
-
1. A method of accessing tag information in a memory line, comprising:
-
determining, by a computing core, an operation to perform on at least one memory line of a memory, the at least one memory line comprising;
(i) an address portion comprising one or more address bits indicative of an address of an associated cache line, and (ii) a flag portion comprising one or more flag bits indicative of whether the associated cache line is;
(i) valid or invalid, and (ii) dirty or not dirty, wherein each of the flag portion and the address portion are accessible by the computing core independent of the other via separate instances of hardware; andperforming the operation by accessing, by the computing core, only the flag portion of the at least one memory line independent of the address portion of the at least one memory line. - View Dependent Claims (3, 4, 5, 6, 7, 21)
-
-
2. (canceled)
-
8. A computing device, comprising:
-
at least one computing core; and a memory associated with the at least one computing core, wherein the memory comprises at least one memory line, wherein the at least one computing core is configured to; determine an operation to perform on the at least one memory line, the at least one memory line comprising;
(i) an address portion comprising one or more address bits indicative of an address of an associated cache line, and (ii) a flag portion comprising one or more flag bits indicative of whether the associated cache line is;
(i) valid or invalid, and (ii) dirty or not dirty, wherein each of the flag portion and the address portion are accessible by the computing core independent of the other via separate instances of hardware; andperform the operation by accessing only the flag portion of the at least one memory line independent of the address portion of the at least one memory line. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
9. (canceled)
-
15. A non-transitory computer readable medium that includes instructions that when executed by a computing core causes the computing core to perform a method of accessing tag information in a memory line, the method comprising:
-
determining an operation to perform on at least one memory line of a memory, the at least one memory line comprising;
(i) an address portion comprising one or more address bits of an associated cache line, and (ii) a flag portion comprising one or more flag bits indicative of whether the associated cache line is;
(i) valid or invalid, and (ii) dirty or not dirty, wherein each of the flag portion and the address portion are accessible by the computing core independent of the other via separate instances of hardware; andperforming the operation by accessing only the flag portion of the at least one memory line independent of the address portion of the at least one memory line. - View Dependent Claims (17, 18, 19, 20)
-
-
16. (canceled)
Specification