Method and system for supporting multiprocessor TLB-purge instructions using directed write transactions

ABSTRACT

A method and system for purging translation lookaside buffers (TLB) of a computer system are described. Directed write transactions can be used to avoid deadlock and avoid the need for additional bridge buffers. Broadcast emulation can be achieved by linking the nodes in a doubly-linked list and having neighboring nodes notify each other of changes in TLB entries.

BACKGROUND

[0001] The present invention relates generally to multiprocessor systems and, more particularly, to systems and techniques for maintaining translation lookaside buffers (TLBs) in multiprocessor systems.

[0002] As the performance demands on personal computers continue to increase at a meteoric pace, processors have been developed which operate at higher and higher clock speeds. The instruction sets used to control these processors have been pared down (e.g., RISC architecture) to make them more efficient. Processor improvements alone, however, are insufficient to provide the greater performance required by computer users. The other computer subsystems which support the processor, e.g., interconnects, I/O devices and memory devices, must also be designed to operate at higher speeds and support greater bandwidth. In addition to improved performance, cost has always been an issue with computer users. Thus, system designers are faced with the dual challenges of improving performance while remaining competitive on a cost basis.

[0003] Early personal computers typically included a central processing unit (CPU), some type of memory and one or more input/output (I/O) devices. One of the common cost/performance design tradeoffs referred to above involves the consideration of how much main memory to provide to a computer. Considering current consumer desire for multimedia applications, many personal computers are designed with large amounts of main memory, e.g., 32 MB RAM. However, RAM chips are expensive and, therefore, techniques have been developed to obtain greater performance from a given memory capacity.

[0004] One such technique, which is well known to those skilled in the art, is the use of virtual memory. Virtual memory is based on the concept that, when running a program, the entire program need not be loaded into main memory at one time. Instead, the computer's operating system loads sections of the program into main memory from a secondary storage device (e.g., a hard disk drive) as needed for execution. To make this scheme viable, the operating system maintains tables which keep track of where each section of the program resides in main memory and secondary storage. As a result of executing a program in this way, the program's logical addresses no longer correspond to physical addresses in main memory. To handle this situation the CPU maps the program's effective or virtual addresses into their corresponding physical addresses.

[0005] The sections of the program which are manipulated by the CPU in the manner described above are commonly referred to as “pages”. As part of the mapping process, the CPU maintains a page table which contains various information associated with the program's pages. For example, a page table entry can contain a validity bit, which indicates whether the page associated with this particular entry is currently stored in main memory, and a dirty bit which indicates whether the program has modified the page.

[0006] Many systems store the page table in main memory. Thus, accessing a page potentially requires two main memory accesses: a first to determine the location of a particular page and a second to access that page. To reduce the overhead associated with this activity, some systems provide a special cache memory, known as a translation lookaside buffer (TLB), which holds page table entries for the most recently accessed pages that are currently stored in main memory. The CPU forwards virtual addresses to the TLB which produces a physical page location indication if it holds an entry for the page of interest. Otherwise, the CPU consults the page table in main memory to obtain access information for this page. When a page is removed from main memory, for example, a TLB entry (if one exists) associated with that page is purged.

[0007] The advent of multiprocessor architectures for personal computers is a recent trend in the design of these systems, intended to satisfy consumers' demand for ever faster and more powerful personal computers. In a typical multiprocessor computer system each of the processors may share one or more resources. Note, for example, the multiprocessor system depicted in FIG. 1. Therein, an exemplary multiprocessor system 5 is illustrated having seven nodes including a first CPU 10, a bridge 12 for connecting the system 5 to other I/O devices 13, first and second memory devices 14 and 16, a frame buffer 18 for supplying information to a monitor, a direct memory access (DMA) device 20 for communicating with a storage device or a network and a second CPU 22 having an SRAM device 24 connected thereto. According to the conventional paradigm, these nodes would be interconnected by a bus 26. Caches can be provided as shown to isolate some of the devices from the bus and to merge plural, small bus accesses into larger, cache-line sized accesses.

[0008] As multiprocessor systems grow more complex, i.e., are designed with more and more nodes, adapting the bus-type interconnect to handle the increased complexity becomes problematic. For example, capacitive loading associated with the conductive traces on the motherboard which form the bus becomes a limiting factor with respect to the speed at which the bus can be driven. Thus, an alternative interconnect architecture is desirable.

[0009] One type of proposed interconnect architecture for multiprocessor personal computer systems replaces the bus with a plurality of unidirectional point-to-point links and uses packet data techniques to transfer information. FIGS. 2(a) and 2(b) conceptualize the difference. FIG. 2(a) depicts four of the nodes from FIG. 1 interconnected via a conventional bus. FIG. 2(b) illustrates the same four nodes interconnected via unidirectional point-to-point links 30, 32, 34 and 36. These links can be used to provide bus-like functionality by connecting the links into a ring (which structure is sometimes referred to herein as a “ringlet”) and having each node pass-through packets addressed to other nodes. Ringlets overcome the aforementioned drawback of conventional bus-type interconnects since their individual links can be clocked at high speeds regardless of the total number of nodes which are linked together.

[0010] Like single processor systems, multiprocessor systems can use virtual memory techniques to enhance memory performance. Thus, each processor in the multiprocessor system may have its own TLB, which creates the potential for noncoherency between the various TLB caches. For example, if the first CPU 10 changes an entry, e.g., marks that entry invalid or changes a page address, in its TLB (not shown in FIG. 1), then it would be desirable to update the corresponding entry in the TLB of the second CPU 22.

[0011] Conventionally, multiprocessor systems have accomplished this task by broadcasting special TLB-purge instructions on the device interconnect which identify the virtual address that should be invalidated. This conventional mechanism for maintaining coherence between the various processors in a multiprocessor system has several drawbacks. For example, the broadcast TLB solution lacks robustness since no positive feedback is provided by the recipient CPUs that the TLB purge was received and performed. More specifically, these conventional solutions simply provided the recipient CPUs with a “wired-OR” busy signal line that was driven when the CPU was busy. If the broadcasting CPU didn't see a busy signal, it presumed that the TLB purge was received and performed, which assumption may be inaccurate.

[0012] A second drawback associated with these conventional TLB-purge solutions involves the manner in which read/write dependencies are handled, particularly in conjunction with bridges between different systems. Consider the situation where, for example, a CPU has a pending read transaction at the time that the TLB-purge command is broadcast. In this situation, the recipient CPU will assert a busy signal and complete its read transaction, whereupon the TLB-purge command is rebroadcast. This functionality becomes more complicated where the TLB-purge is also communicated across a bridge to CPUs residing on an adjacent interconnect. Bridges use queues to transfer commands and data between the adjacent systems, typically one queue for requests and one for responses. However, attempting to queue TLB-purge broadcast commands among the requests or responses in a bridge queue would result in deadlock. Additional queues could be added to the bridges solely to support TLB-purge broadcasts, however this would undesirably add to the cost of bridges and would not solve the aforedescribed robustness problem.

[0013] Accordingly, it would be desirable to provide a more robust mechanism for purging TLBs in a multiprocessor system that also does not require special bridge queues.

SUMMARY

[0014] These and other drawbacks and limitations of conventional TLB-purge schemes and systems are overcome according to exemplary embodiments of the present invention. According to one exemplary embodiment, directed write transactions are used to purge TLB entries. For example, when a node (e.g., a processor) modifies an entry in its TLB, it broadcasts a TLB invalidate request transaction which includes an identity of the TLB entry to be purged and a callback address. When the recipient nodes have completed the purging operation, each node sends a directed write transaction to the call back address. The call back address can be used as a counter to record the number of confirmations received. The node which sent the broadcast can monitor the call back address to determine if all of the recipient nodes have confirmed the TLB purge command and, as necessary, can rebroadcast this command.

[0015] According to another exemplary embodiment, broadcast functionality can be emulated for systems that don't support broadcast commands. For example, the nodes can be linked using a doubly-linked list implemented as a calling-list register in each node. When a node modifies its TLB entry, that node sends a directed write command to the entry (or entries) in its calling-list register informing this node or nodes of the change. This node (or nodes) in turn sends a message to those node(s) identified in its calling-list register, and so on until the end of the chain is reached. At this time, confirmation messages can be sent back through the list until the originating node receives the confirmation(s).

BRIEF DESCRIPTION OF THE DRAWINGS

[0016] The foregoing, and other, objects, features and advantages of the present invention will be more readily understood upon reading the following detailed description in conjunction with the drawings in which:

[0017]FIG. 1 is a block diagram of an exemplary multiprocessor system;

[0018] FIGS. 2(a) and 2(b) are block diagrams of multinode systems which conceptually illustrate the difference between bus-type interconnects and ringlet-type interconnects;

[0019]FIG. 3 is a block diagram representation of an exemplary multiprocessor system including TLBs and a bridge which interconnects different systems;

[0020]FIG. 4 illustrates a portion of a TLB-purge command according to an exemplary embodiment of the present invention;

[0021]FIG. 5 illustrates another multiprocessor system used to describe a second exemplary embodiment of the present invention;

[0022]FIG. 6 depicts the multiprocessor system of FIG. 5 as a doubly-linked list; and

[0023]FIG. 7 is a state diagram associated with the operation of one of the processors in FIGS. 5 and 6 operating in accordance with the second exemplary embodiment of the present invention.

DETAILED DESCRIPTION

[0024] To provide some context within which to describe exemplary systems and techniques for handling TLB-purging according to the present invention, exemplary embodiments will now be described with respect to FIGS. 3-7. To simplify the following discussions, although the exemplary multiprocessor systems used herein do depict a bus-type of interconnect, those skilled in the art will appreciate that the present invention can be used with any type of interconnect, e.g., a ringlet.

[0025] In FIG. 3, an exemplary system is depicted including three CPUs 40, 42 and 44 and a memory device 46 interconnected via a local bus 48. The local bus 48 is connected to another CPU 50 by bridge 52. Each CPU 40, 42, 44 and 50 has its own TLB as shown. Suppose that CPU 40 invalidates an entry in its TLB and then wants to inform the other CPUs 42, 44 and 50 of this action to maintain TLB coherency. Exemplary embodiments of the present invention provide this functionality in a robust manner while avoiding the deadlock problems associated with communicating this information. e.g., over bridge 52.

[0026] According to a first exemplary embodiment, this can be accomplished by using separate transactions to accomplish, first, the TLB purge and, second, positive feedback from each purging CPU which indicates that the TLB purge has been performed. For example, CPU 40 can transmit a TLB purge command, e.g., in the form of a data packet, which includes, among other fields, those shown in FIG. 4. Therein, the TLB purge command includes a first field 60 which identifies the TLB entry to be purged by its associated virtual address. Additionally, the TLB purge command includes a second field 62 which identifies a call back address to which each of the recipient CPUs respond after they have performed the TLB purge, as will be described in more detail below. TLB purge commands according to this exemplary embodiment of the present invention can be issued using standard write commands or, when supported, more efficient move commands having two values transmitted in the payload thereof, so that the bridge 52 does not need to have additional queues associated with a special TLB purge command to avoid deadlock. For the purposes of illustrating exemplary embodiments of the present invention, WRITE commands will be described, however those skilled in the art will also appreciate that MOVE commands could be substituted therefore.

[0027] After the recipient CPUs 42, 44 and 50 receive the TLB purge command from CPU 40, they await resolution of any pending read and/or write transactions associated with the virtual address 60 identified in the TLB purge command. Then, after invalidating the TLB entry associated with that virtual address, each of CPUs 42, 44 and 50 initiate another write transaction directed to the address specified in call back address field 62. This address can, for example, identify a memory location in memory device 46 that functions as a register 64, which register is monitored by the initiating CPU 40. At the start of the TLB purge process, register 64 may be set to a count value (which count value can be set at system initialization) that identifies the number of CPUs from which TLB purge confirmations are expected. In this case, register 64 would have an initial count value of three.

[0028] Thus, when confirming the performance of the TLB purge requested by CPU 40, CPU 42 would send a write command to the call back address identified in field 62, e.g., a fetch and decrement command, that reduces the count value by 1. If CPU 40 notes that the count value has not reached zero within some predetermined time, i.e., indicating that at least one recipient has not confirmed TLB purge performance, then CPU 40 can restart the TLB purge sequence by retransmitting the TLB purge command for this entry. Those skilled in the art will appreciate that the operation of register 64 as a counter can be implemented in many alternative ways such that an initiating processor can determine if all of the other processors have confirmed purging their TLBs, e.g., by starting with a count value of zero and specifying that each confirming processor will send a write command that increments the counter. The foregoing exemplary embodiment teaches a technique for adding robustness to broadcast TLB purge commands and avoiding bridge-created deadlock situations. Some system interconnect devices many not support broadcast functionality in general and broadcast TLB-purge commands specifically. According to exemplary embodiments of the present invention, therefore, it may be desirable to emulate broadcast functionality using a sequence of directed transactions. This emulation is facilitated using calling-list registers. Consider the exemplary node topology of FIG. 5 including four CPUs 70-76, two bridges 78 and 80 and a memory device 82 interconnected by bus 84. If bus 84 does not support broadcast TLB-purge commands, this exemplary embodiment provides for calling registers which operate to create a doubly-linked list, e.g., a linear list or a binary tree, of the nodes to which a broadcast TLB-purge command would be directed as illustrated, for example, in FIG. 6. Thus, each node's calling register will store the identity of the upstream and downstream nodes to which it is to pass commands associated with a TLB-purge command as described below.

[0029] According to this exemplary embodiment of the present invention, TLB-purge commands are implemented as a two-phase sequence. During the first phase, a plurality of write or move commands will be promulgated through the nodes using the doubly-linked list created by the calling registers. For example, suppose that CPU 74 invalidates an entry in its TLB. Then, CPU 74 initiates two WRITE transactions to the nodes listed in its calling register, i.e., one for CPU 76 and one for CPU 72, which identify the virtual address of the associated TLB entry to be invalidated. The WRITE command will target a first predetermined memory location in the processor node which is dedicated for TLB-purge transactions, such that the processor interprets a write to this first predetermined memory location as an instruction to purge the TLB entry associated with the value written to this memory location. This message is then forwarded by CPU 72 onto CPU 70, which is identified in its call-list register. The first phase is completed when the ends of the list are reached, e.g., when the message reaches CPUs 70 and 76.

[0030] The second phase provides confirmation of the TLB-purge from each processor. The head/tail entries in the list, e.g., CPUs 70 and 76, each generate a new WRITE command directed to a second predetermined memory location. This new WRITE or MOVE command is sent to the processor, i.e., in this case “neighboring” CPUs 74 and 72, respectively, identified by the call-list. Processors which were recipients of the original WRITE command will, after purging their own TLB entry (if any), forward the confirmation message to the next downstream processor. When the initiating CPU, in this case CPU 74, receives a write to the second predetermined memory location from both CPU 76 and CPU 72, it will interpret these two transactions as a complete confirmation of its TLB-purge command.

[0031] From the perspective of processor 72, the foregoing exemplary embodiment can be visualized as having certain states associated with the TLB-purge sequence as seen in FIG. 7. Therein, processor 72 is initially in an IDLE state wherein it has not received any transactions with respect to the first predetermined memory location that has been reserved for requesting a TLB-purge. Then, upon receipt of a WRITE directed to that first predetermined memory location, processor 72 will transition to a SEND state, at which time it will forward the WRITE command to the processor identified in its call-list. After forwarding the message, processor 72 will then enter a WAIT state. During this time, processor 72 will resolve any read/write dependencies associated with the requested purging of a TLB entry and await confirmation from the processor to which it forwarded the first message. Upon receipt of the WRITE command which changes the value stored at the second predetermined memory location, the processor 72 will forward this message if it has resolved any read/write dependencies and completed its own TLB purge. Otherwise, it will delay forwarding the message until these criteria are satisfied.

[0032] By using standard write transactions directed to special memory offsets within the processor, these exemplary embodiments of the present invention avoid the need for additional bridge queues. Moreover, the inventive techniques support a wide range of vendor-dependent special purpose features, allowing heterogenous CPU architectures, which may have distinct TLB management structures, to be easily supported. Further, like the earlier described exemplary embodiments, those described with respect to FIGS. 5-7 also provide a robust, positive confirmation regarding the performance of TLB purges.

[0033] The above-described exemplary embodiments are intended to be illustrative in all respects, rather than restrictive, of the present invention. Thus the present invention is capable of many variations in detailed implementation that can be derived from the description contained herein by a person skilled in the art. All such variations and modifications are considered to be within the scope and spirit of the present invention as defined by the following claims. 

What is claimed:
 1. A computer-readable medium containing a computer program for purging translation lookaside buffers (TLBs) of a computer system that includes a plurality of interconnected nodes each having a TLB for storing virtual memory address conversion information, wherein the computer program performs the steps of: storing an identity of at least one other interconnected node in a calling-list register, wherein each of the plurality of interconnected nodes has a calling-list register, and wherein the identity of the at least one other interconnected node stored in each calling-list register is different for each calling-list register; modifying an entry in the TLB of a first node of the plurality of interconnected nodes; informing, by the first node, a second node of the plurality of interconnected nodes having an identity of the second node stored in the calling-list register of the first node of the modified entry; informing, by the second node, a third node of the plurality of interconnected nodes having an identity of the third node stored in the calling-list register of the second node of the modified entry; sending a confirmation message from the third node to the second node having an identity stored in the calling-list register of the third node after the entry has been modified; and sending a confirmation message from the second node to the first node having an identity stored in the calling-list register of the second node after the entry has been modified.
 2. The computer-readable medium of claim 1, wherein the computer system does not support functionality to broadcast a command, from one of the plurality of interconnected nodes, to modify a corresponding TLB entry in TLBs of other of the plurality of interconnected nodes.
 3. The computer-readable medium of claim 1, wherein the first node, the second node and the third node are neighboring nodes.
 4. The computer-readable medium of claim 1, wherein the plurality of interconnected nodes are connected in a ring using a plurality of point-to-point links.
 5. The computer-readable medium of claim 1, wherein one of the plurality of interconnected nodes is a central processing unit.
 6. The computer-readable medium of claim 1, wherein each calling-list register is a doubly-linked list containing two node entries.
 7. The computer-readable medium of claim 1, wherein the first node informs the second node by sending a command to the second node and the second node informs the third node by sending the command to the third node, wherein the command includes a virtual address of the entry to be modified in the second node and the third node.
 8. The computer-readable medium of claim 6, wherein the second node modifies the entry in the second node and the third node modifies the entry in the third node when a predetermined memory location in the second node and the third node is updated with the virtual address of the entry to be modified.
 9. The computer-readable medium of claim 1, wherein the confirmation message includes a command to modify a predetermined memory location in the first node and the second node.
 10. The computer-readable medium of claim 1, wherein the computer program performs the step of: inhibiting the sending of the confirmation message from the second node to the first node until the third node modifies the entry in the third node.
 11. A computer-readable medium containing a computer program for purging translation lookaside buffers (TLBs) in a network system having a plurality of nodes that are connected in an arrangement that does not support broadcast TLB-purge commands, wherein the computer program performs the steps of: storing, in each node, the identity of at least one neighboring node in the network; invalidating a TLB entry in a first node; sending a command from the first node to a second node, whose identity is stored in the first node, to perform a write transaction at a first predetermined memory location; initiating a TLB-purging operation at the second node in response to receipt of the command; sending a command from the second node to a third node, whose identity is stored in the second node, to perform a write transaction at the first predetermined memory location, in response to receipt of the command from the first node; initiating a TLB-purging operation at the third node in response to receipt of the command from the second node; upon completion of the TLB-purging operation at the third node, sending a command to the second node to perform a write transaction at a second predetermined memory location; and sending a command from the second node to the first node, in response to receipt of the command from the third node, to perform a write transaction at the second predetermined memory location, to thereby confirm completion of the TLB-purging operation.
 12. The computer-readable medium of claim 11, wherein the computer program performs the step of: inhibiting the sending of the write command from the second node to the first node until the TLB-purging operation is completed at the second node.
 13. The computer-readable medium of claim 11, wherein the identities are stored in a respective call-list at each node.
 14. The computer-readable medium of claim 13, wherein each call-list is a doubly-linked list containing two node entries.
 15. The computer-readable medium of claim 11, wherein the plurality of nodes are connected in a ring using a plurality of point-to-point links.
 16. The computer-readable medium of claim 11, wherein one of the plurality of nodes is a central processing unit. 