Apparatuses and methods for generating a suppressed address trace

ABSTRACT

Methods and apparatuses for generating a suppressed address trace are described. In some embodiments, a processor includes a trace generator having a trace suppressor that outputs a suppressed address trace for instructions executed by the processor. In some embodiments, a method to generate a suppressed address trace for a processor includes generating a suppressed address trace of executed instructions from a trace suppressor of a trace generator of the processor.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present patent application is a continuation application claimingpriority from U.S. patent application Ser. No. 14/327,375 filed Jul. 9,2014, and titled: “Apparatuses and Methods for Generating a SuppressedAddress Trace”, which is incorporated herein by reference in itsentirety.

FIELD OF INVENTION

The field of invention relates generally to a computer processor trace,and, more specifically, to generating a suppressed address trace.

BACKGROUND

A processor, or set of processors, executes instructions from aninstruction set, e.g., the instruction set architecture (ISA). Theinstruction set is the part of the computer architecture related toprogramming, and generally include the native data types, instructions,register architecture, addressing modes, memory architecture, interruptand exception handling, and external input and output (I/O). It shouldbe noted that the term instruction herein may refer to amacro-instruction, e.g., an instruction that is provided to theprocessor for execution, or to a micro-instruction, e.g., an instructionthat results from a processor's decoder decoding macro-instructions.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is illustrated by way of example and notlimitation in the figures of the accompanying drawings, in which likereferences indicate similar elements and in which:

FIG. 1 illustrates a block diagram of an exemplary computerarchitecture.

FIG. 2 illustrates an embodiment of a flow diagram of a suppressedaddress trace.

FIG. 3 illustrates an embodiment of a flow diagram of a suppressedaddress trace.

FIG. 4 illustrates an embodiment of a flow diagram of a suppressedaddress trace.

FIGS. 5(A)-5(B) illustrate exemplary executions of suppressed addresstraces.

FIG. 6 illustrates a block diagram of an exemplary architecture using atrace generator.

FIG. 7 is a block diagram of a register architecture 700 according toone embodiment of the invention.

FIG. 8A is a block diagram illustrating both an exemplary in-orderpipeline and an exemplary register renaming, out-of-orderissue/execution pipeline according to embodiments of the invention.

FIG. 8B is a block diagram illustrating both an exemplary embodiment ofan in-order architecture core and an exemplary register renaming,out-of-order issue/execution architecture core to be included in aprocessor according to embodiments of the invention.

FIG. 9A is a block diagram of a single processor core, along with itsconnection to the on-die interconnect network and with its local subsetof the Level 2 (L2) cache, according to embodiments of the invention.

FIG. 9B is an expanded view of part of the processor core in FIG. 9Aaccording to embodiments of the invention.

FIG. 10 is a block diagram of a processor that may have more than onecore, may have an integrated memory controller, and may have integratedgraphics according to embodiments of the invention.

FIG. 11 is a block diagram of a first more specific exemplary system inaccordance with an embodiment of the present invention.

FIG. 12 is a block diagram of a second more specific exemplary system inaccordance with an embodiment of the present invention.

FIG. 13 is a block diagram of a System on a Chip in accordance with anembodiment of the present invention.

DETAILED DESCRIPTION

In the following description, numerous specific details are set forth.However, it is understood that embodiments of the invention may bepracticed without these specific details. In other instances, well-knowncircuits, structures and techniques have not been shown in detail inorder not to obscure the understanding of this description.

References in the specification to “one embodiment,” “an embodiment,”“an example embodiment,” etc., indicate that the embodiment describedmay include a particular feature, structure, or characteristic, butevery embodiment may not necessarily include the particular feature,structure, or characteristic. Moreover, such phrases are not necessarilyreferring to the same embodiment. Further, when a particular feature,structure, or characteristic is described in connection with anembodiment, it is submitted that it is within the knowledge of oneskilled in the art to affect such feature, structure, or characteristicin connection with other embodiments whether or not explicitlydescribed.

OVERVIEW

The ISA is distinguished from the microarchitecture, which is theinternal design of the processor implementing the ISA. Processors withdifferent microarchitectures can share a common instruction set. Forexample, Intel® processors, e.g., Intel® Core™ processors, and AdvancedMicro Devices, Inc. of Sunnyvale Calif. processors implement nearlyidentical versions of the x86 instruction set (with some extensionshaving been added to newer versions), but have different internaldesigns. For example, the same register architecture of the ISA may beimplemented in different ways in different micro-architectures usingwell known techniques, including dedicated physical registers, one ormore dynamically allocated physical registers using a register renamingmechanism, e.g., the use of a Register Alias Table (RAT), a re-orderbuffer (ROB) and a retirement register file; the use of multiple mapsand a pool of registers, etc. Unless otherwise specified, the phrasesregister architecture, register file, and register refer to that whichis visible to the software and/or programmer and the manner in whichinstructions specify registers. Where specificity is desired, theadjective logical, architectural, or software visible will be used toindicate registers/files in the register architecture, while differentadjectives will be used to designate registers in a givenmicro-architecture (e.g., physical register, reorder buffer, retirementregister, or register pool).

An instruction set includes one or more instruction formats. A giveninstruction format defines various fields (number of bits, location ofbits) to specify, among other things, the operation to be performed andthe operand(s) on which that operation is to be performed. A giveninstruction is generally expressed using a given instruction format andspecifies the operation and the operands. An instruction stream is aspecific sequence of instructions, where each instruction in thesequence is an occurrence of an instruction in an instruction format.

Scientific, financial, auto-vectorized general purpose, RMS(recognition, mining, and synthesis)/visual and multimedia applications(e.g., 2D/3D graphics, image processing, videocompression/decompression, voice recognition algorithms and audiomanipulation) often require the same operation to be performed on alarge number of data items (referred to as “data parallelism”). SingleInstruction Multiple Data (SIMD) refers to a type of instruction thatcauses a processor to perform the same operation on multiple data items.SIMD technology is especially suited to processors that can logicallydivide the bits in a register into a number of fixed-sized dataelements, each of which represents a separate value. For example, thebits in a 64-bit register may be specified as a source operand to beoperated on as four separate 16-bit data elements, each of whichrepresents a separate 16-bit value. As another example, the bits in a256-bit register may be specified as a source operand to be operated onas four separate 64-bit packed data elements (quad-word (Q) size dataelements), eight separate 32-bit packed data elements (double word (D)size data elements), sixteen separate 16-bit packed data elements (word(W) size data elements), or thirty-two separate 8-bit data elements(byte (B) size data elements). This type of data is referred to as thepacked data type or vector data type, and operands of this data type arereferred to as packed data operands or vector operands. In other words,a packed data item or vector refers to a sequence of packed dataelements; and a packed data operand or a vector operand is a source ordestination operand of a SIMD instruction (also known as a packed datainstruction or a vector instruction).

By way of example, one type of SIMD instruction specifies a singlevector operation to be performed on two source vector operands in avertical fashion to generate a destination vector operand (also referredto as a result vector operand) of the same size, with the same number ofdata elements, and in the same data element order. The data elements inthe source vector operands are referred to as source data elements,while the data elements in the destination vector operand are referredto a destination or result data elements. These source vector operandsare of the same size and contain data elements of the same width, andthus they contain the same number of data elements. The source dataelements in the same bit positions in the two source vector operandsform pairs of data elements (also referred to as corresponding dataelements; that is, the data element in data element position 0 of eachsource operand correspond, the data element in data element position 1of each source operand correspond, and so on). The operation specifiedby that SIMD instruction is performed separately on each of these pairsof source data elements to generate a matching number of result dataelements, and thus each pair of source data elements has a correspondingresult data element. Since the operation is vertical and since theresult vector operand is the same size, has the same number of dataelements, and the result data elements are stored in the same dataelement order as the source vector operands, the result data elementsare in the same bit positions of the result vector operand as theircorresponding pair of source data elements in the source vectoroperands. In addition to this exemplary type of SIMD instruction, thereare a variety of other types of SIMD instructions (e.g., that have onlyone or has more than two source vector operands; that operate in ahorizontal fashion; that generate a result vector operand that is of adifferent size, that have a different size of data elements, and/or thathave a different data element order). It should be understood that theterm destination vector operand (or destination operand) is defined asthe direct result of performing the operation specified by aninstruction, including the storage of that destination operand at alocation (be it a register or at a memory address specified by thatinstruction) so that it may be accessed as a source operand by anotherinstruction (by specification of that same location by the anotherinstruction.

The instruction set architecture may include at least some SIMDinstructions that specify vector operations and that have fields toselect source registers and/or destination registers from these vectorregisters (an exemplary SIMD instruction may specify a vector operationto be performed on the contents of one or more of the vector registers,and the result of that vector operation to be stored in one of thevector registers). Different embodiments of the invention may havedifferent sized vector registers and support more/less/different sizeddata elements.

The size of the multi-bit data elements specified by a SIMD instruction(e.g., byte, word, double word, quad word) determines the bit locationsof the “data element positions” within a vector register, and the sizeof the vector operand determines the number of data elements. A packeddata element refers to the data stored in a particular position. Inother words, depending on the size of the data elements in thedestination operand and the size of the destination operand (the totalnumber of bits in the destination operand) (or put another way,depending on the size of the destination operand and the number of dataelements within the destination operand), the bit locations of themulti-bit data element positions within the resulting vector operandchange (e.g., if the destination for the resulting vector operand is avector register (in this discussion vector registers and packed dataelement registers are used interchangeably), then the bit locations ofthe multi-bit data element positions within the destination vectorregister change). For example, the bit locations of the multi-bit dataelements are different between a vector operation that operates on32-bit data elements (data element position 0 occupies bit locations31:0, data element position 1 occupies bit locations 63:32, and so on)and a vector operation that operates on 64-bit data elements (dataelement position 0 occupies bit locations 63:0, data element position 1occupies bit locations 127:64, and so on). Data element sizes of 8-bitbytes (B), 16-bit words (W), 32-bit doublewords (D) or single precisionfloating point, and 64-bit quadwords (Q) or double precision floatingpoint are considered, although other widths are also possible.

Exemplary Computer Architecture

A processor, such as those discussed herein, generally executesinstructions that operate (e.g., add, move, etc.) on operands. Aprocessor trace allows the output (e.g., for viewing) of the activity ofthe processor. For example, a processor trace may capture informationabout software execution on each hardware thread (e.g., using dedicatedhardware facilities) so that after execution completes a user orsoftware can process the captured trace data and/or reconstruct theexact program flow.

The captured processor trace may be collected in data packets, e.g., oneor more packets for each instruction executed. The processor trace(e.g., the data set) may include control flow tracing, which includes intheir packets the timing and program flow information (e.g. branchtargets, branch taken/not taken indications) and program-induced moderelated information (e.g., state transitions). These packets may bebuffered internally (e.g., in the processor) before being outputted. Theprocessor trace (e.g., the outputted data set) may be outputted bywriting it to a file, e.g., to memory, and/or to a port, such as theJoint Test Action Group-Debug Port (JTAG-DP). The processor trace may bebuffered internally before being suppressed and then sent to a file,e.g., to memory, and/or to a port. In one embodiment, the processoraddress trace is outputted to a debugger or performance profiler. Theprocessor trace may include data value (DV) tracing and/or data addresstracing, such as data linear addresses (DLAs). The processor trace mayinclude data value (DV) tracing packets and/or data address tracingpackets, such as data linear address (DLA) packets. The data value anddata address trace (e.g., packets) created by a program's memoryaccesses (e.g., a read or a write) may create an undesirably largeprocessor trace output, e.g., data set. The data address or addressesaccessed by an instruction may create an undesirably large sized addresstrace (e.g., packet of data) of a processor trace. In one embodiment, aprocessor trace (e.g., an outputted data set that includes DV and DLApackets) is over sixty-three times the size (e.g., in bits) of aprocessor trace output that includes only control flow packets.Suppression may occur before a packet is generated (e.g. not includingan address in the packet at all and with or without a trace [e.g.,packet] being buffered internally).

FIG. 1 is a block diagram of an exemplary computer architecture 100.Other system designs and configurations known in the arts for laptops,desktops, handheld PCs, personal digital assistants, engineeringworkstations, servers, network devices, network hubs, switches, embeddedprocessors, digital signal processors (DSPs), graphics devices, videogame devices, set-top boxes, micro controllers, cell phones, portablemedia players, hand held devices, and various other electronic deviceshaving a processor are also suitable for a suppressed address trace. Ingeneral, a huge variety of systems or electronic devices capable ofincorporating a processor and/or other execution logic as disclosedherein are generally suitable for a suppressed address trace.

System 100 is in accordance with one embodiment of the presentinvention. The system 100 includes one or more processors 110, 115,which are coupled to a controller hub 120. In one embodiment thecontroller hub 120 includes a graphics memory controller hub (GMCH) 190and an Input/Output Hub (IOH) 150 (which may be on separate chips); theGMCH 190 includes memory and graphics controllers to which are coupledmemory 140 and a coprocessor 145; the IOH 150 is couples input/output(I/O) devices 160 to the GMCH 190. Alternatively, one or both of thememory and graphics controllers are integrated within the processor (asdescribed herein), the memory 140 and the coprocessor 145 are coupleddirectly to the processor 110, and the controller hub 120 in a singlechip with the IOH 150.

The optional nature of additional processors 115 is denoted in FIG. 1with broken lines. Each processor 110, 115 may include one or more ofthe processing cores (110A), e.g., as described herein, and may be someversion of the processor 1100.

The memory 140 may be, for example, dynamic random access memory (DRAM),phase change memory (PCM), or a combination of the two. For at least oneembodiment, the controller hub 120 communicates with the processor(s)110, 115 via a multi-drop bus, such as a frontside bus (FSB),point-to-point interface such as QuickPath Interconnect (QPI), orsimilar connection 195.

In one embodiment, the coprocessor 145 is a special-purpose processor,such as, for example, a high-throughput many integrated core (MIC)processor, a network or communication processor, compression engine,graphics processor, GPGPU, embedded processor, or the like. In oneembodiment, controller hub 120 may include an integrated graphicsaccelerator.

There can be a variety of differences between the physical resources110, 115 in terms of a spectrum of metrics of merit includingarchitectural, microarchitectural, thermal, power consumptioncharacteristics, and the like.

In one embodiment, the processor 110 executes instructions that controldata processing operations of a general type. Embedded within theinstructions may be coprocessor instructions. The processor 110recognizes these coprocessor instructions as being of a type that shouldbe executed by the attached coprocessor 145. Accordingly, the processor110 issues these coprocessor instructions (or control signalsrepresenting coprocessor instructions) on a coprocessor bus or otherinterconnect, to coprocessor 145. Coprocessor(s) 145 accept and executethe received coprocessor instructions.

Processor 110 includes a hardware trace generator 125. This tracegenerator 125, while illustrated as being external to a core 110A, insome embodiments is internal to the core 110A. Hardware trace generatormay generate a processor trace, e.g., as discussed herein. In oneembodiment, hardware trace generator includes a trace suppressor tooutput a suppressed address trace of an executed instruction(s). Tracesuppressor may be (e.g., hardware) logic to suppress a processor (e.g.,address) trace. As used herein, a processor trace (e.g., address trace)may refer to a generated or outputted packet or packets of trace data,e.g., DV and/or DLA packets. Trace suppressor may be software code tosuppress a processor trace. In one embodiment, trace suppressorcompresses the address data (e.g., the addresses of each operand) of theprocessor trace. Trace suppression may be used, for example, to reducethe bandwidth required to transmit the trace and/or the storage requiredto store the trace. Additionally or alternatively, a trace suppressorremoves data generated during a processor trace operation (e.g., beforebeing output to a user and/or to an analyzing program) such that nooutput is generated for a particular operation and/or instruction in theoutputted data trace, e.g., as described further in reference to FIGS.5A-5B below. Trace generator (e.g., trace suppressor) may be hardware,software, firmware, or any combination thereof. For example, tracegenerator may include software, such as stored as trace generatorroutine 140A, to generate a suppressed trace as discussed herein. In oneembodiment, trace generator includes trace suppressor software stored inmemory to generate a suppressed trace as discussed herein. Tracegenerator routine 140A may be separate from any software being traced bythe trace generator. A suppressed data trace generally refers to a setof data from a processor trace that is smaller in size than theunsuppressed data trace, e.g., via removal of certain address data asdisclosed herein. In certain embodiments, suppression includes therebeing no output (e.g., no packet outputted) for suppressible, executedinstructions. While in other embodiments, suppression includesoutputting a smaller packet relative to an unsuppressed packet, forexample, the suppressed output being a header byte(s) with no payload ora different (non-header) packet that indicates that this memoryaddress(es) was suppressed but does not include the address(es) itself.

FIG. 2 illustrates an embodiment of a flow diagram of a suppressedaddress trace 200, e.g., within a processor. As depicted, an instructionis fetched 201, e.g., by a hardware instruction fetch unit. A fetchedinstruction is then decoded 202, e.g., by a hardware instruction decodeunit. The decoded, fetched instruction is then executed 203, e.g., by ahardware execution unit. The executed instruction is then written back204, for example, when the returned results are retired, e.g., by ahardware retirement unit. If there are any suppressible addresses (205),for example if there are any (i) relative addresses, such as aninstruction accessing an address that references (e.g., with or withouta specified offset) an address register (e.g., a register containing anaddress) or an instruction accessing an unchanged (e.g., unchanged sincethe address was previously outputted in a processor trace) register or(ii) accessing an absolute address (e.g., a global variable, localvariable, or constant), then that address or addresses may besuppressed. Suppression (206) may include the generation of a suppressedaddress trace having no output for the unchanged register (e.g.,removing from the address trace the address contained in the registersuch that there is no corresponding output) or for the relative address(e.g., removing from the address trace the relative address such thatthere is no corresponding output) and/or outputting a register hintpacket. In one embodiment, the register hint packet includes at leastone bit where a low value (e.g., 0) thereof means the register accessedin that executed instruction was unchanged (e.g., unchanged since theaddress was previously outputted in a processor trace) register.Alternatively, the register hint packet may include at least one bitwhere a high value (e.g., 1) thereof means the register accessed in thatexecuted instruction was unchanged (e.g., unchanged since the addresswas previously outputted in a processor trace) register. In certainembodiments, the system or user will recognize a register hint bit isset (e.g., as a 0 or 1 as noted immediately above) to indicate anunchanged register, and the system or user may ascertain the addressesin that unchanged register from a previous output thereof (e.g., from anunsuppressed address trace packet or portion).

Suppression (206) may include the generation of a suppressed addresstrace packet including (e.g., only) the virtual address accessed by anexecuted instruction and a flag (e.g., a bit or bits) set to indicatethe executed instruction accessed a register. An example of this isincluded below. A subsequently executed instruction that accessed thesame, unchanged register may then only output a register hint packet,e.g., as described herein. Suppression (206) may include the generationof a suppressed address trace packet including the virtual addressaccessed by an executed instruction or a flag (e.g., a bit or bits) setto indicate the executed instruction accessed a register. A suppressedaddress trace packet may include the segment base, for example, ifmemory segmentation of the Intel® x86 instruction set architecture isused. Suppression (206) may include the generation of a suppressedaddress trace packet including (e.g., only) the linear address (e.g.,equal to the virtual address plus a segment base) accessed by anexecuted instruction and a flag (e.g., a bit or bits) set to indicatethe executed instruction accessed a register.

In one embodiment, an address in a register is not suppressed when aregister is initially (e.g., in a section of code) accessed, but theaddress is suppressed in subsequent accesses that utilize that register.For example, in such an embodiment a decoder may determine the registervalue from the address rather than outputting a register hint packet.

In another embodiment, the register hint packet is the address stored inthe address register. In yet another embodiment, the register hintpacket is a compressed packet (e.g., a one byte (8 bits) packet insteadof a 16, 32, 64 bits or greater sized address packet) that ispredetermined to refer to that register, for example, outputting (e.g.,a one byte packet indicating) the register name such as RAX (64 bits ofstorage), EAX (32 bits of storage), or AX (16 bits of storage). Theoutputted register name may be a predetermined address (e.g., of fewerbits than the address contained in the register) such that the system oruser will recognize the address as indicating that an instructionaccessed a specific register, but not outputting the contents of thatspecific register. That is, the output may be the name of the registerand not the contents of the register. Suppression may include thesuppressed address trace having no output for the absolute address(e.g., removing from the address trace the absolute address, such as thevariable name or constant name (or the virtual address thereof), so thatthere is no corresponding output).

Although the checking of whether any addresses are suppressible 205 isdepicted as after the write back 204, this disclosure is not so limited.For example, the checking 205 may occur after the execution 203. Thedata trace 207, e.g., a suppressed address trace, may then be outputted.Data trace may only include a suppressed address trace and no data valuetrace.

FIG. 3 illustrates an embodiment of a flow diagram of a suppressedaddress trace 300, e.g., within a processor. As depicted, an instructionis fetched 301, e.g., by a hardware instruction fetch unit. A fetchedinstruction is then decoded 302, e.g., by a hardware instruction decodeunit. The decoded, fetched instruction is then executed 303, e.g., by ahardware execution unit. The executed instruction is then written back304, for example, when the returned results are retired, e.g., by ahardware retirement unit. If there are any absolute addresses, such asan executed instruction accessing an absolute memory address (e.g., aglobal variable, local variable, or constant) 305, then that address oraddresses may be suppressed. Suppression may include the suppressedaddress trace having no output for the absolute address, e.g., removingfrom the address trace the absolute address, such as the variable nameor constant name, such that there is no corresponding output.

Although the checking of whether any addresses are absolute 305 isdepicted as occurring after the write back 304, this disclosure is notso limited. For example, the checking 305 may occur after the execution303. The data trace 307, e.g., including a suppressed address trace, maythen be outputted.

FIG. 4 illustrates an embodiment of a flow diagram of a suppressedaddress trace 400, e.g., within a processor. As depicted, an instructionis fetched 401, e.g., by a hardware instruction fetch unit. A fetchedinstruction is then decoded 402, e.g., by a hardware instruction decodeunit. The decoded, fetched instruction is then executed 403, e.g., by ahardware execution unit. The executed instruction is then written back404, for example, when the returned results are retired, e.g., by ahardware retirement unit. If there are any registers reused, such as anexecuted instruction accessing an unchanged (e.g., unchanged since thecontent (e.g., address) was outputted in a processor trace) register405, then the address or addresses in the register may be suppressed.Suppression may include the suppressed address trace having no outputfor the unchanged register (e.g., removing from the address trace theaddress contained in the register such that there is no correspondingoutput) and/or outputting a register hint packet. Suppression mayinclude sending, e.g., as a register hint packet, a data linear address(DLA) packet (e.g., the same number of bits as a non-suppressed DLApacket), but that replaces the address (e.g., the actual DLA is notincluded) with a single (e.g., address suppressed) bit set (e.g., to 1)to indicate suppression based on register reuse. That is, suppressionmay include outputting a DLA packet with the payload being a single orplurality of bits set to indicate suppression and not including theaddress. A register hint packet may be outputted instead of outputtingthe address in the register and/or instead of outputting a relativeaddress that referenced (e.g., read from) the register. In oneembodiment, the register hint packet is the address (e.g., value) storedin the address register. In another embodiment, the register hint packetis a compressed packet (e.g., a one byte packet) that is predeterminedto refer to that register, for example, outputting a bit(s) thatindicate an unchanged register was accessed (e.g., so that the system oruser may ascertain the addresses in that unchanged register from aprevious output thereof, e.g., from an unsuppressed address trace packetor portion) and/or outputting the register name such as RAX (64 bits ofstorage), EAX (32 bits of storage), or AX (16 bits of storage). Theoutputted register name may be a predetermined address such that thesystem or user will recognize the address as indicating that aninstruction accessed a specific register, but not outputting thecontents of that specific register. That is, referring to the name ofthe register and not the contents of the register.

Although the checking of whether any registers are reused 405 isdepicted as after the write back 404, this disclosure is not so limited.For example, the checking 405 may occur after the execution 403. Thedata trace 407, e.g., including a suppressed address trace, may then beoutputted.

An apparatus, e.g., a processor, may include logic to achieve any of thedisclosure herein. A processor may utilize logic to execute any single,combination, or all of the methods discussed herein, for example, logicto execute the flow diagrams in FIGS. 2, 3, and/or 4.

FIGS. 5(A)-(B) illustrate exemplary executions of suppressed addresstraces for a sample set of code (e.g., a stream of instructions)501-525. This exemplary section of code uses a mixture of register basedaccesses (e.g., accessing address registers) and a few global variableaddresses encoded into an instruction. FIGS. 5(A)-(B) illustrate threeseparate address traces marked with (1), (2), and (3), respectively:where (1) is no suppression of the address trace, (2) is suppression inthe address trace of absolute addresses, and (3) is outputting registerbased hints for reused registers in the address trace as well assuppression in the address trace of absolute addresses. These traces arefurther simplified to only consider data linear addresses (DLAs) and toignore data value (DV) tracing. (Note: the following assumes that thetrace falls through each conditional jump and we do not account for thepacket size of tracing the instruction itself). The unsuppressed packetsconsidered here are a 1 byte header packet along with the full linearaddress of 8 bytes, which means each packet will be 9 bytes. In oneembodiment, a suppressed address trace includes only outputting theheader packet (e.g., for a suppressible address) and not the full linear(e.g., virtual) address when certain conditions are met, e.g., as inFIGS. 2, 3, and/or 4. In one embodiment, the header packet (e.g., theonly packet outputted into the address trace for that executedinstruction) includes the virtual address accessed and a flag (e.g., abit or bits) set to indicate the executed instruction accessed aregister (e.g., a register whose contents were not previously outputtedinto the address trace). In one embodiment, the header packet (e.g., theonly packet outputted into the address trace for that executedinstruction) includes the virtual address accessed or a flag (e.g., abit or bits) set to indicate the executed instruction accessed aregister (e.g., a register whose contents were not previously outputtedinto the address trace). In one embodiment, the header packet issuppressed to not include leading zeroes (e.g. if the address is only 4byte then only send out 4 bytes of linear address instead of a largerthan 4 byte full address). The outputted, suppressed address trace insuch an embodiment may include the unsuppressed size of the linearaddress (e.g. as part of the header packet).

For all instructions here, note that reference character (1) refers toan address trace with no suppression, such that any address accessed isfully outputted into the address trace. One may assume a segment base ofzero here, although the disclosure is not so limited. Turning to themove instruction (“mov”) at line 501 of the sample 23 instruction tracein FIGS. 5(A)-5(B), first note that the “qword ptr” is a quad word(i.e., 64 bits) that points to (e.g., begins) at the address indicatedat the relative address given by adding the address register contents ofRCX and 18h (here, h means that 18 is in the hexadecimal numeral system)within the square brackets. Address register RCX contains (e.g., stores)the address 0x7F0000 here, so the qword to be moved into RDX is thatwhich is stored at a location in memory beginning with 0x7F0000 plus18h, that is, at memory location 0x7F0018. As another example, theunsuppressed address trace (1) for the move instruction at line 502outputs the address 0x7F0000 here as that instruction accessed the qwordstored at a location in memory beginning with 0x7F0000. As one ofordinary skill in the art appreciates, the above similarly applies tothe remaining instructions.

At line 501, consider that the address contained in register RCX has notbeen previously outputted (e.g., that the address trace is beginning atline/instruction 501). For suppressed address trace (2), i.e.,suppression in the address trace of absolute addresses, there are noabsolute addresses in this instruction, so no suppression of the addresstrace such that trace (1) and (2) are the same, i.e., 0x7F0018 which isthe relative address accessed by the instruction. For suppressed addresstrace (3), i.e., outputting in the address trace of register based hints(such as the address stored in the address register) for reusedregisters as well as suppression in the address trace of absoluteaddresses, the address 0x7F0000 contained in register RCX is output as aregister hint packet (e.g., as a hint to a user and/or code that arelative address in that instruction referenced, e.g., utilized, thataddress register) because the address 0x7F0000 has not been previouslyoutputted into this trace. The instructions may be run in order or outof order, e.g., as is discussed herein.

Move instruction 502 also accesses a qword being pointed to by theaddress stored in register RCX, to move that qword into register RAX.For suppressed address trace (2), there are no absolute addresses inthis instruction so no suppression of the address trace such that trace(1) and (2) are the same, i.e., 0x7F0000, which is the address inregister RCX that is accessed by the instruction. For suppressed addresstrace (3), no data (e.g., no packet) is output into the data trace(i.e., there is suppression) for the address 0x7F0000 contained inregister RCX as it was previously output into the address trace in (3)of instruction 501, that is, because the address 0x7F0000 in RCX waspreviously outputted into this trace and the value in register RCX hasnot changed relative to the value of RCX in instruction 501 (e.g., thevalue is the same in the current instruction as at the end of theexecution of previous instruction 501).

Exclusive OR (XOR) instruction 503 does not access an address, it merelyXORs the contents of register ESI with itself and stores the result backinto ESI so no address trace (1)-(3) is generated.

Subtract instruction 504 accesses a qword being pointed to by theaddress 0x7F60000 stored in register RDX plus 21B0h, i.e., 0x7F621B0,which is the relative address accessed by the instruction. The qword issubtracted from the value in RAX and the result stored into RAX. Forsuppressed address trace (2), there are no absolute addresses in thisinstruction so no suppression of the address trace such that trace (1)and (2) are the same, i.e., 0x7F621B0, which is the relative addressfrom adding 21B0h to the value in register RDX. For suppressed addresstrace (3), the address 0x7F60000 contained in register RDX is output asa register hint packet (e.g., as a hint to a user and/or code that arelative address in that instruction referenced, e.g., utilized, thataddress register) because the address 0x7F60000 from register RDX hasnot been previously outputted into this trace.

Move instruction 505 does not access an address, it merely moves thecontents of register RCX to RBX so no address trace (1)-(3) isgenerated.

Move instruction 506 moves the value in register RAX into the quad word(i.e., 64 bits) that begins at the address indicated at the relativeaddress given by adding the 0x7F60000 address stored in RDX and 0A20h(again, h means in the hexadecimal numeral system), i.e., the qword thatbegins at address 0x7F60A20. For suppressed address trace (2), there areno absolute addresses in this instruction, so no suppression of theaddress trace such that trace (1) and (2) are the same, i.e., 0x7F60A20,which is the relative address accessed by the instruction. Forsuppressed address trace (3), no data (e.g., no packet) is output intothe data trace (i.e., there is suppression) for the address 0x7F60000contained in register RDX as it was previously output into the addresstrace in (3) of instruction 504, that is, because the address 0x7F60000in RDX was previously outputted into this trace and the value inregister RDX has not changed relative to the value of RDX in instruction504 (e.g., the value is the same in the current instruction as at theend of the execution of previous instruction 504).

Move instruction 507 moves the quad word (i.e., 64 bits) that begins atthe address indicated at the relative address given by adding the0x7F0000 address stored in RCX and 10h, i.e., the qword that begins ataddress 0x7F0010. For suppressed address trace (2), there are noabsolute addresses in this instruction, so no suppression of the addresstrace such that trace (1) and (2) are the same, i.e., 0x7F0010, which isthe relative address accessed by the instruction. For suppressed addresstrace (3), no data (e.g., no packet) is output into the data trace(i.e., there is suppression) for the address 0x7F0000 contained inregister RCX as it was previously output into the address trace in (3)of instruction 501, that is, because the address 0x7F0000 in RCX waspreviously outputted into this trace and the value in register RCX hasnot changed relative to the value of RCX in instruction 501 (e.g., thevalue is the same in the current instruction as at the end of theexecution of previous instruction 501).

Compare instruction (“cmp”) 508 accesses a dword (i.e., a double word of32 bits) being pointed to by the address stored in the code as theglobal variable named “GlobalVariableOne”. It then subtracts the valuein register ESI from the dword. For (1), the address for“GlobalVariableOne” is output into the address trace. For suppressedaddress trace (2), there is an absolute address in this instruction sono data (e.g., no packet) is output into the data trace (i.e., there issuppression) for the address for “GlobalVariableOne”. For suppressedaddress trace (3), there is also no access of an (e.g., unchanged)address contained in a register, in addition to there being an absoluteaddress in this instruction, so no data (e.g., no packet) is output intothe data trace (i.e., there is suppression) for this instruction undersuppressed traces (2) and (3).

Jump if below or equal instruction (“jbe”) 509 does not access anaddress, it merely jumps to the labeled FirstBranch line of the code ifthe first operand was less than or equal to the second operand in thecompare instruction 508, so no address trace (1)-(3) is generated.

Move instruction 510 accesses a dword being pointed to by the addressstored as the global variable named “GlobalVariableTwo”. It then movesthat dword into register EDI. For (1), the address for“GlobalVariableTwo” is output into the address trace. For suppressedaddress trace (2), there is an absolute address in this instruction sono data (e.g., no packet) is output into the data trace (i.e., there issuppression) for the address for “GlobalVariableTwo”. For suppressedaddress trace (3), there is also no access of an (e.g., unchanged)address contained in a register, in addition to there being an absoluteaddress in this instruction, so no data (e.g., no packet) is output intothe data trace (i.e., there is suppression) for this instruction undersuppressed traces (2) and (3).

Move instruction 511 accesses a qword being pointed to by the address0x61F000 stored in register RBX plus 18h, i.e., 0x61F018, which is therelative address accessed by the instruction. The qword is then movedinto register RCX. For suppressed address trace (2), there are noabsolute addresses in this instruction so no suppression of the addresstrace such that trace (1) and (2) are the same, i.e., 0x61F018, which isthe relative address referencing, e.g., accessing, register RBX that isaccessed by this instruction. For suppressed address trace (3), theaddress 0x61F000 contained in register RBX is output as a register hintpacket (e.g., as a hint to a user and/or code that a relative address inthat instruction referenced, e.g., utilized, that address register)because the address 0x61F000 from register RBX has not been previouslyoutputted into this trace.

Compare instruction 512 accesses a qword (i.e., a quad word of 64 bits)that begins at the address indicated at the relative address given byadding the 0x7F0000 value stored in register RCX and the 100h (again, hmeans in the hexadecimal numeral system) value stored in register RDI,i.e., the qword that begins at address 0x7F0100. It then subtracts theimmediate value of zero (i.e., 0) from the qword. For (1), (2), and (3)the relative address of 0x7F0100 is output. In this embodiment, forsuppressed trace (2) there are no absolute addresses in thisinstruction, so no suppression of the address trace such that trace (1)and (2) are the same. For suppressed trace (3), there are two registersutilized to generate the relative address such that a single registerhint packet might not allow ascertainment of which register the registerhint packet refers. Accordingly, in such embodiments using a complexaddress (e.g., using more than one register to determine the address),the address may not be suppressed as illustrated in (3) here. In oneembodiment, an address is suppressed when it is a simple address, e.g.,not accessing more than one register.

Instruction jump when equal (“je”) 513 does not access an address, itmerely jumps to the labeled FirstSkip line of the code if the firstoperand was equal to the second operand in the compare instruction 512,so no address trace (1)-(3) is generated.

Move instruction 514 accesses a qword (i.e., a quad word of 64 bits)that begins at the address indicated at the relative address given byadding the 0x7F0000 value stored in register RCX and the 100h (again, hmeans in the hexadecimal numeral system) value stored in register RDI,i.e., the qword that begins at address 0x7F0100. It then moves the qwordto register RCX. For (1), (2), and (3) the relative address of 0x7F0100is output. In this embodiment, for suppressed trace (2) there are noabsolute addresses in this instruction, so no suppression of the addresstrace such that trace (1) and (2) are the same. For suppressed trace(3), there are two registers utilized to generate the relative addresssuch that a single register hint packet might not allow ascertainment ofwhich register the register hint packet refers. Accordingly, in suchembodiments using a complex address (e.g., using more than one registerto determine the address), the address may not be suppressed asillustrated in (3) here.

Move instruction 515 accesses a qword being pointed (e.g., beginningwith) at by the address stored in register RBX, to move that qword intoregister RAX. For suppressed address trace (2), there are no absoluteaddresses in this instruction so no suppression of the address tracesuch that trace (1) and (2) are the same, i.e., 0x61F000, which is theaddress in register RBX that is accessed by the instruction. Forsuppressed address trace (3), no data (e.g., no packet) is output intothe data trace (i.e., there is suppression) for the address 0x61F000contained in register RBX as it was previously output into the addresstrace as a register hint packet in (3) of instruction 511 that is,because the address 0x61F000 in RBX was previously outputted into thistrace and the value in register RBX has not changed relative to thevalue of RBX in instruction 511 (e.g., the value is the same in thecurrent instruction as at the end of the execution of previousinstruction 511).

Compare instruction 516 accesses a qword (i.e., a quad word of 64 bits)that begins at the address indicated at the relative address given byadding the 0x7F0000 value stored in register RCX and the 8 immediatevalue, i.e., the qword that begins at address 0x7F0008. It thensubtracts the value in register RAX (i.e., 0x61F000) from the qword. Forsuppressed address trace (2), there are no absolute addresses in thisinstruction so no suppression of the address trace such that trace (1)and (2) are the same, i.e., 0x7F0008, which is the relative addressaccessed by the instruction. For suppressed address trace (3), no data(e.g., no packet) is output into the data trace (i.e., there issuppression) for the address 0x7F0000 contained in register RCX as itwas previously output into the address trace in (3) of instruction 501that is, because the address 0x7F0000 in RCX was previously outputtedinto this trace and the value in register RCX has not changed relativeto the value of RCX in instruction 501 (e.g., the value is the same inthe current instruction as at the end of the execution of previousinstruction 501).

Instruction jump when not equal (“jne”) 517 does not access an address,it merely jumps to the labeled FirstSkip line of the code if the firstoperand was not equal to the second operand in the compare instruction516, so no address trace (1)-(3) is generated.

Line 518 is the FirstBranch label for the code, e.g., identifying whereinstruction 509 will jump if the conditions for the jbe 509 are met, sono address trace (1)-(3) is generated since no addresses are accessed.

Move instruction 519 moves the quad word that begins at the addressindicated at the relative address given by adding the 0x61F000 addressstored in RBX and the immediate value of 18h, i.e., the qword thatbegins at address 0x61F018, into register RAX. For suppressed addresstrace (2), there are no absolute addresses in this instruction, so nosuppression of the address trace such that trace (1) and (2) are thesame, i.e., 0x61F018, which is the relative address accessed by theinstruction. For suppressed address trace (3), no data (e.g., no packet)is output into the data trace (i.e., there is suppression) for theaddress 0x61F000 contained in register RBX as it was previously outputinto the address trace in (3) of instruction 511, that is, because theaddress 0x61F000 in RBX was previously outputted into this trace and thevalue in register RBX has not changed relative to the value of RBX ininstruction 511 (e.g., the value is the same in the current instructionas at the end of the execution of previous instruction 511).

Move instruction 520 moves the value in register ESI into a dword beingpointed to by the address 0x51500000 stored in register RAX plus 0A28h,i.e., 0x51500A28, which is the relative address accessed by theinstruction. For suppressed address trace (2), there are no absoluteaddresses in this instruction so no suppression of the address tracesuch that trace (1) and (2) are the same, i.e., 0x51500A28, which is therelative address referencing register RAX that is accessed by thisinstruction. For suppressed address trace (3), the address 0x51500000contained in register RAX is output as a register hint packet (e.g., asa hint to a user and/or code that a relative address in that instructionreferenced, e.g., utilized, that address register) because the address0x51500000 from register RAX has not been previously outputted into thistrace.

Move instruction 521 moves the quad word that begins at the addressindicated at the relative address given by adding the 0x61F000 addressstored in RBX and 20h, i.e., the qword that begins at address 0x61F020.For suppressed address trace (2), there are no absolute addresses inthis instruction, so no suppression of the address trace such that trace(1) and (2) are the same, i.e., 0x61F020, which is the relative addressaccessed by the instruction. For suppressed address trace (3), no data(e.g., no packet) is output into the data trace (i.e., there issuppression) for the address 0x61F000 contained in register RBX as itwas previously output into the address trace in (3) of instruction 511,that is, because the address 0x61F000 in RBX was previously outputtedinto this trace and the value in register RBX has not changed relativeto the value of RBX in instruction 511 (e.g., the value is the same inthe current instruction as at the end of the execution of previousinstruction 511).

Move instruction 522 moves the quad word that begins at the addressindicated at the relative address given by adding the 0x61F000 addressstored in RBX and 18h, i.e., the qword that begins at address 0x61F018.For suppressed address trace (2), there are no absolute addresses inthis instruction, so no suppression of the address trace such that trace(1) and (2) are the same, i.e., 0x61F018, which is the relative addressaccessed by the instruction. For suppressed address trace (3), no data(e.g., no packet) is output into the data trace (i.e., there issuppression) for the address 0x61F000 contained in register RBX as itwas previously output into the address trace in (3) of instruction 511,that is, because the address 0x61F000 in RBX was previously outputtedinto this trace and the value in register RBX has not changed relativeto the value of RBX in instruction 511 (e.g., the value is the same inthe current instruction as at the end of the execution of previousinstruction 511).

Move instruction 523 accesses a qword being pointed (e.g., beginningwith) at by the address stored in register RAX, to move that qword intoregister RCX. For suppressed address trace (2), there are no absoluteaddresses in this instruction so no suppression of the address tracesuch that trace (1) and (2) are the same, i.e., 0x51500000, which is theaddress in register RAX that is accessed by the instruction. Forsuppressed address trace (3), no data (e.g., no packet) is output intothe data trace (i.e., there is suppression) for the address 0x51500000contained in register RAX as it was previously output into the addresstrace in (3) of instruction 520 as a register hint packet, that is,because the address 0x51500000 in RAX was previously outputted into thistrace and the value in register RAX has not changed relative to thevalue of RAX in instruction 520 (e.g., the value is the same in thecurrent instruction as at the end of the execution of previousinstruction 520).

Instruction 524 adds the value in register RDX and the immediate valueof 0A20h, so no address trace (1)-(3) is generated as no addresses areaccessed (e.g., no address is pulled from a register or memorylocation).

Line 525 is the FirstSkip label for the code, e.g., identifying whereinstructions 513 and 517 will jump if the conditions for a jump is met,so no address trace (1)-(3) is generated since no addresses areaccessed.

A summary of the statistics for the above address traces is in “Table 1:Address Traces” below. Particularly, note the total data space savingsfor suppressed trace (3) generates only 65% of the original,unsuppressed address trace (1). A smaller sized trace may allow fasteroutput of the trace, e.g., faster writing to a file, e.g., to memory,and/or to a port.

TABLE 1 Address Traces Number of Number of Number of Total BytesPossible Packets Packets Packets Output with Method to Output OutputSuppressed Suppression (1) No 17 17 0 153 Bytes Suppression (2) Absolute17 15 2 135 Bytes Address Suppression (3) Absolute 17 6 11  54 BytesAddress Suppression and Register Hint

In one embodiment, a trace suppressor outputs a suppressed address traceof executed instructions. The suppressed address trace may include anoutput packet containing the (e.g., virtual) address stored in theaddress register that is accessed by a first executed instruction. Theoutput packet may include a register hint packet that includes aregister flag indicating that a register was accessed. A second executedinstruction may access the same address register as in the firstexecuted instruction, and if the address stored in the address registeris unchanged relative to the first instruction, the suppressed addresstrace may include no output for the second executed instruction.Additionally or alternatively, a second executed instruction may accessa relative address referencing the same address register as in the firstexecuted instruction, and if the address stored in the address registeris unchanged relative to the first instruction, the output packet of thesuppressed address trace may include a register hint packet for thesecond executed instruction. A first executed instruction may access anaddress register, and the suppressed address trace may include aregister hint packet of the output packet outputted for the firstexecuted instruction.

For example, note the three segments of executed instruction examplesbelow in Tables 2-4 and the corresponding suppressed output packets.Note the virtual addresses (VA) used below are examples and any size orformat of address may be used (including with or without a segmentbase). Output Packet may be one byte or a plurality of bytes. A registerflag may indicate that an instruction accessed an (e.g., address)register. Register flag in the Output Packet may include a bit or bit(s)that correspond to that instruction accessing a register, e.g., a bit ofbits that are predetermined to indicate a register access. In oneembodiment, the register flag is the first or last bit of the outputpacket.

Table 2 below illustrates an embodiment where: for the first instruction(move instruction MOV [EAX]) the output packet of the suppressed traceincludes the virtual address (e.g., 1000 here) since this is the firsttime in this section of code that register EAX has been accessed. Aregister flag, e.g., as discussed above, is also set to indicate that aregister was accessed by the first instruction. The second instruction(MOV EBX) also accesses register EAX, whose contents are unchangedrelative to its contents as outputted for the first instruction, so thatthe virtual address and the register flag are not outputted, instead aone byte hint packet is outputted wherein at least one of the bits ofthe byte are set to indicate the contents of the register are unchangedrelative to its contents as outputted for the previous (e.g., first)instruction. This indicates to a system or user to look at the previous(e.g., trace) output for that address, e.g., without generating anunsuppressed address trace. Instruction three (MOV ECX) also accessesregister EAX, whose contents are unchanged relative to its contents asoutputted for the first instruction, so that the virtual address and theregister flag are not outputted, instead a one byte hint packet isoutputted wherein at least one of the bits of the byte are set toindicate the contents of the register are unchanged relative to itscontents as outputted for the previous (e.g., first) instruction. Thisindicates to a system or user to look at the previous output for theaddress, e.g., without generating an unsuppressed address trace.Instruction four (MOV [EDX]) accesses a new register (e.g., EDX here),such that the output packet of the suppressed trace includes the virtualaddress (e.g., 1000 here) as this is the first time in this section ofcode that register EAX has been accessed. A register flag, e.g., asdiscussed above, is also set to indicate that a register was accessed bythe fourth instruction. In such an embodiment, a register hint packet isoutput for each instruction that is suppressed.

TABLE 2 Instruction Output Packet MOV [EAX], 1 Virtual Address (VA):1000 and a Register Flag MOV EBX, [EAX + 100] 1 Byte Register Hintpacket MOV ECX, [EAX + 200] 1 Byte Register Hint packet MOV [EDX], 3 VA:2000 and a Register Flag

Table 3 below illustrates an embodiment where the first fourinstructions are the same as those in Table 2. However, in instructiontwo in Table 3, there is no outputted packet (e.g., no register hintpacket is outputted), instead the subsequent instructions (e.g., inorder) are checked to see if the same (or previously outputted andunchanged register value) register is accessed and additional bits areset (e.g., in a counter). Here, a first bit is set to serve as aregister hint packet but it is not output immediately after thatinstruction. Instruction three also access register EAX (havingunchanged contents relative to the first instruction) so a second bit isset to serve as a register hint packet. As instruction four does notaccess the same, unchanged register, the register hint packet is thenoutput with two bits set. Accordingly, if more than two consecutiveinstructions accessed an unchanged (relative to the immediatelypreviously outputted value) register, then the same number of bits maybe set to serve as a register hint packet when output. For example, seein instruction seven, a register hint packet is output as the previousthree (e.g., including the immediately previous executed instruction MOVEBI) all accessed unchanged registers EAX and EDX. In such anembodiment, certain instructions may not include an outputted OutputPacket, and instead a register hint packet may be output with a bit setfor each instruction that accessed a previously outputted, unchangedregister. Such a register hint packet may be output immediately previousto the next instruction that accesses a changed value (e.g., new)register, for example, as in Table 3.

TABLE 3 Instruction Output Packet MOV [EAX], 1   VA: 1000 and a RegisterFlag MOV EBX, [EAX + 100]   {no output} MOV ECX, [EAX + 200]   RegisterHint packet with 2 bits set,   rest are clear. MOV [EDX], 3   VA: 2000and a Register Flag MOV ESI, [EAX + 300] {no output} MOV EDI, [EDX +400] {no output} MOV EBI, [EAX + 400] Register Hint packet with 3 bitsset, rest are clear. MOV [ECX], 3 VA: 3000 and a Register FlagTable 4 below illustrates an embodiment where all eight instructions arethe same as those in Table 3. The first time a register with a currentvalue that has not been previously outputted is accessed as ininstruction one (MOV [EAX]), the Output Packet was outputted as per theexamples in Tables 2 and 3 above. However, instead of outputting aregister hint packet after an instruction accesses an unchanged value(e.g., previously outputted) register as in instruction two (MOV EBX),the trace (e.g., from trace suppressor) includes an Output Packet thatis output after a subsequent section of code is executed. As shown here,the register hint packet includes a bit for each corresponding, executedinstruction such that a set bit (e.g., a 1) corresponds to a previouslyoutput and since unchanged register value and a cleared bit (e.g., a 0)corresponds to a new value for that register or a first use of a newregister, although the opposite convention may be used.

A 7 bit register hint packet is illustrated here, however any number ofbits may be used. Register hint packet is illustrated as a plurality ofbits, with each bit being set meaning a suppressed address for arespective instruction and each bit being clear meaning a not suppressedaddress for a respective instruction. Such a hint packet may be referredto as an “ASNS” (Address Suppressed or Not Suppressed) packet. Althoughthe suppressed Output Packet is shown as being output immediately afterthe last instruction (e.g., instruction eight MOV [ECX]) in a section ofcode, the output may occur at any time, e.g., at or after a set numberof processor cycles or at or after a set number of instructions havebeen executed (e.g., continually generate outputs after 8, 16, 32, 64,etc. instructions are executed). Additionally, after the subsequentsection of code is executed, an output packet may also be output, e.g.,in Table 4: the subsequent output packets for (i) virtual address (VA)2000 and a Register Flag corresponding to the MOV [EDX] instruction and(ii) the VA: 3000 and a Register Flag corresponding to the MOV [ECX]instruction were outputted. The register hint packet(s) may be outputbefore or after the output of the subsequent output packet(s). In suchan embodiment, a register hint packet may be output at intervals thatinclude a change in the value of a register and/or a use of a new (e.g.,not yet outputted) register. This may include the output of such aregister hint packet (which may be one byte or multiple bytes) for aplurality of executed instructions and output packets of the virtualaddresses (e.g., 2000 and 3000 here) since this is the first time inthis section of code that address registers EDX and ECX have beenaccessed. A register flag, e.g., as discussed above, may also be set toindicate that a register was accessed by that instruction, e.g., asshown in Table 4 below.

TABLE 4 Instruction Output Packet MOV [EAX], 1   VA: 1000 and a RegisterFlag MOV EBX, [EAX + 100]   {no output yet} MOV ECX, [EAX + 200]   {nooutput yet} MOV [EDX], 3 {no output yet} MOV ESI, [EAX + 300] {no outputyet} MOV EDI, [EDX + 400] {no output yet} MOV EBI, [EAX + 400] {nooutput yet} MOV [ECX], 3 Register Hint packet:  bit 0: set(corresponding to the MOV EBX instruction)  bit 1: set (corresponding tothe MOV ECX instruction)  bit 2: clear (corresponding to the MOV [EDX]instruction)  bit 3: set (corresponding to the MOV ESI instruction)  bit4: set (corresponding to the MOV EDI instruction)  bit 5: set(corresponding to the MOV EBI instruction)  bit 6: clear (correspondingto the MOV [ECX] instruction) VA: 2000 and a Register Flag(corresponding to the MOV [EDX] instruction) VA: 3000 and a RegisterFlag (corresponding to the MOV [ECX] instruction)

In one embodiment, a processor includes a hardware execution unit toexecute instructions, a hardware retirement unit to retire executedinstructions, and a trace generator having a trace suppressor to outputa suppressed address trace of the executed instructions. In anotherembodiment, a processor includes a core and a trace generator having atrace suppressor to output a suppressed address trace of executedinstructions. A (e.g., suppressed) address trace may be outputted beforeor after the executed instructions to be traced are retired. A firstexecuted instruction may access an address register and the suppressedaddress trace includes an address stored in the address registeroutputted for the first executed instruction. A second executedinstruction may access the same address register, the address stored inthe address register is unchanged relative to the first instruction, andthe suppressed address trace includes no output or a suppressed outputfor the second executed instruction. In one embodiment, the value in theregister accessed by the second instruction is unchanged relative to thevalue in that same register previously accessed by first instruction.Access here may include reading of a value from the register or memorylocation. In one embodiment, e.g., wherein a first executed instructionaccessed an address register, the suppressed address trace may includethe address stored in the register or the address that was accessed. Inthe latter case, the decoder (e.g., hardware and/or software) maydetermine the value in the register. For example, if [ECX+018h] isaccessed by an instruction and ECX holds 0x11000, then the suppressedaddress trace may include a packet output with a value of 0x11018. Insuch an embodiment, the decoder may determine the register value usingthe previous trace information and the disassembled binary code.

A second executed instruction may access a relative address referencingthe address register, the address stored in the address register isunchanged relative to the first instruction, and the suppressed addresstrace includes a register hint packet outputted for the second executedinstruction. The second instruction can execute after the firstinstruction, or the instructions may execute out of order. A registerhint packet may include the address stored in the address register.

A first executed instruction may access a relative address referencingan address register, and the suppressed address trace includes aregister hint packet outputted for the first executed instruction. Aregister hint packet may include an address stored in the addressregister. A processor may include a trace suppressor that selectivelydoes not output data or only outputs compressed data in a suppressedaddress trace for any executed instruction that accessed an absolutememory address. A retirement unit of a processor may include a re-orderbuffer.

A memory address may be main memory or cache memory. A memory may beabsolute. Memory may include any machine-readable storage media havingan address, and may include, without limitation, non-transitory,tangible arrangements of articles manufactured or formed by a machine ordevice, including storage media such as hard disks, any other type ofdisk including floppy disks, optical disks, compact disk read-onlymemories (CD-ROMs), compact disk rewritables (CD-RWs), andmagneto-optical disks, semiconductor devices such as read-only memories(ROMs), random access memories (RAMs) such as dynamic random accessmemories (DRAMs), static random access memories (SRAMs), erasableprogrammable read-only memories (EPROMs), flash memories, electricallyerasable programmable read-only memories (EEPROMs), phase change memory(PCM), magnetic or optical cards, or any other type of media suitablefor storing electronic instructions.

In one embodiment, a method to generate a suppressed address trace for aprocessor includes executing instructions with a hardware execution unitof the processor, retiring executed instructions with a hardwareretirement unit of the processor, and generating the suppressed addresstrace of the executed instructions from a trace suppressor of a tracegenerator of the processor. In another embodiment, a method to generatea suppressed address trace for a processor includes executinginstructions in a core of the processor, and generating the suppressedaddress trace of the executed instructions from a trace suppressor of atrace generator of the processor. An (e.g., suppressed) address tracemay be outputted before or after the executed instructions to be tracedare retired. The method may include, wherein a first executedinstruction accessed an address register, generating the suppressedaddress trace comprises outputting an address stored in the addressregister for the first executed instruction. The method may include,wherein a second executed instruction accessed the address register andthe address stored in the address register is unchanged relative to thefirst instruction, generating the suppressed address trace by outputtingno data (e.g., no output) for the second executed instruction. Themethod may include executing the first instruction before or after thesecond executed instruction. The method may include, wherein a secondexecuted instruction accessed a relative address referencing the addressregister and the address stored in the address register is unchangedrelative to the first instruction, generating the suppressed addresstrace comprises outputting a register hint packet for the secondexecuted instruction. A register hint packet including (e.g., onlyincluding) the address stored in the address register may be outputtedin the suppressed address trace. The method may include, wherein a firstexecuted instruction accessed a relative address referencing an addressregister, generating the suppressed address trace by outputting aregister hint packet for the first executed instruction. The registerhint packet may include (e.g., only include) an address stored in theaddress register. A method may include, wherein at least one executedinstruction accessed an absolute memory address, generating thesuppressed address trace by outputting no data (e.g., no output) for theat least one executed instruction. Generating a suppressed address tracemay include no trace being output for an executed instruction, e.g., asabove, or a reduced trace being output for an executed instruction, suchas only outputting a register hint packet that has a suppressed address,e.g., as above.

In one embodiment, a machine readable storage medium includes code that,when executed, causes a machine to perform any single or combination ofthe above methods.

In another embodiment, a non-transitory machine readable storage mediumhas instructions that, when executed, causes a machine to perform amethod that includes generating a suppressed address trace of executedinstructions from a trace suppressor of a trace generator of aprocessor. The non-transitory machine readable storage medium, wherein afirst executed instruction accessed an address register, whereingenerating the suppressed address trace includes outputting an addressstored in the address register for the first executed instruction. Thenon-transitory machine readable storage medium, wherein a secondexecuted instruction accessed the address register and the addressstored in the address register is unchanged relative to the firstinstruction, wherein generating the suppressed address trace includesoutputting (e.g., not producing) no output for the second executedinstruction or a suppressed output. The non-transitory machine readablestorage medium of claim 23, wherein a second executed instructionaccessed a relative address referencing the address register, theaddress stored in the address register is unchanged relative to thefirst instruction, and generating the suppressed address trace comprisesoutputting a register hint packet for the second executed instruction.The non-transitory machine readable storage medium, wherein the registerhint packet includes the address stored in the address register. Thenon-transitory machine readable storage medium, wherein a first executedinstruction accessed a relative address referencing an address register,wherein generating the suppressed address trace includes outputting aregister hint packet for the first executed instruction. Thenon-transitory machine readable storage medium wherein the register hintpacket comprises an address stored in the address register. Thenon-transitory machine readable storage medium, wherein at least oneexecuted instruction accessed an absolute memory address, and generatingthe suppressed address trace includes no output for the at least oneexecuted instruction or a suppressed output.

In one embodiment, a processor includes means to execute instructions,means to retire executed instructions, and means to generate asuppressed address trace of the executed instructions. In anotherembodiment, a processor includes means to execute instructions and meansto generate a suppressed address trace of the executed instructions. Themeans to generate the suppressed address trace may include means toselectively output an address stored in an address register accessed byan executed instruction. The means to generate the suppressed addresstrace may include means to not output data for an address stored in anaddress register accessed by an executed instruction. The means togenerate the suppressed address trace may include means to selectivelyoutput an absolute memory address accessed by an executed instruction.The means to generate the suppressed address trace may include means tonot output data for an absolute memory address accessed by an executedinstruction. The means to generate the suppressed address trace mayinclude means to output a register hint packet for an executedinstruction that accessed a relative address referencing an addressregister. The means to generate the suppressed address trace comprisesmeans to not output data for an executed instruction that accessed arelative address referencing an address register.

FIG. 6 illustrates a block diagram of an exemplary architecture using atrace generator 125. Depicted retirement unit 601 retires an executedinstruction and sends the information about the retired instruction tothe trace generator 125. Particularly, the retired instruction'sinformation is sent to a trace packet generator 603 of the tracegenerator 125 that generates the (e.g., address) trace and a tracepacket suppressor 605 of the trace generator 125 to suppress the tracepacket and output a suppressed (e.g., address) trace of the executedinstruction into memory 607.

Exemplary Register Architecture

FIG. 7 is a block diagram of a register architecture 700 according toone embodiment of the invention. In the embodiment illustrated, thereare 32 vector registers 710 that are 512 bits wide; these registers arereferenced as zmm0 through zmm31. The lower order 256 bits of the lower16 zmm registers are overlaid on registers ymm0-16. The lower order 128bits of the lower 16 zmm registers (the lower order 128 bits of the ymmregisters) are overlaid on registers xmm0-15.

In other words, the vector length field selects between a maximum lengthand one or more other shorter lengths, where each such shorter length ishalf the length of the preceding length; and instructions templateswithout the vector length field operate on the maximum vector length.Further, in one embodiment, the class B instruction templates of thespecific vector friendly instruction format operate on packed or scalarsingle/double-precision floating point data and packed or scalar integerdata. Scalar operations are operations performed on the lowest orderdata element position in an zmm/ymm/xmm register; the higher order dataelement positions are either left the same as they were prior to theinstruction or zeroed depending on the embodiment.

Write mask registers 715—in the embodiment illustrated, there are 8write mask registers (k0 through k7), each 64 bits in size. In analternate embodiment, the write mask registers 715 are 16 bits in size.As previously described, in one embodiment of the invention, the vectormask register k0 cannot be used as a write mask; when the encoding thatwould normally indicate k0 is used for a write mask, it selects ahardwired write mask of 0xFFFF, effectively disabling write masking forthat instruction.

General-purpose registers 725—in the embodiment illustrated, there aresixteen 64-bit general-purpose registers that are used along with theexisting x86 addressing modes to address memory operands. Theseregisters are referenced by the names RAX, RBX, RCX, RDX, RBP, RSI, RDI,RSP, and R8 through R15.

Scalar floating point stack register file (x87 stack) 745, on which isaliased the MMX packed integer flat register file 750—in the embodimentillustrated, the x87 stack is an eight-element stack used to performscalar floating-point operations on 32/64/80-bit floating point datausing the x87 instruction set extension; while the MMX registers areused to perform operations on 64-bit packed integer data, as well as tohold operands for some operations performed between the MMX and XMMregisters.

Alternative embodiments of the invention may use wider or narrowerregisters. Additionally, alternative embodiments of the invention mayuse more, less, or different register files and registers.

Exemplary Core Architectures, Processors, and Computer Architectures

Processor cores may be implemented in different ways, for differentpurposes, and in different processors. For instance, implementations ofsuch cores may include: 1) a general purpose in-order core intended forgeneral-purpose computing; 2) a high performance general purposeout-of-order core intended for general-purpose computing; 3) a specialpurpose core intended primarily for graphics and/or scientific(throughput) computing. Implementations of different processors mayinclude: 1) a CPU including one or more general purpose in-order coresintended for general-purpose computing and/or one or more generalpurpose out-of-order cores intended for general-purpose computing; and2) a coprocessor including one or more special purpose cores intendedprimarily for graphics and/or scientific (throughput). Such differentprocessors lead to different computer system architectures, which mayinclude: 1) the coprocessor on a separate chip from the CPU; 2) thecoprocessor on a separate die in the same package as a CPU; 3) thecoprocessor on the same die as a CPU (in which case, such a coprocessoris sometimes referred to as special purpose logic, such as integratedgraphics and/or scientific (throughput) logic, or as special purposecores); and 4) a system on a chip that may include on the same die thedescribed CPU (sometimes referred to as the application core(s) orapplication processor(s)), the above described coprocessor, andadditional functionality. Exemplary core architectures are describednext, followed by descriptions of exemplary processors and computerarchitectures.

Exemplary Core Architectures In-Order and Out-of-Order Core BlockDiagram

FIG. 8A is a block diagram illustrating both an exemplary in-orderpipeline and an exemplary register renaming, out-of-orderissue/execution pipeline according to embodiments of the invention. FIG.8B is a block diagram illustrating both an exemplary embodiment of anin-order architecture core and an exemplary register renaming,out-of-order issue/execution architecture core to be included in aprocessor according to embodiments of the invention. The solid linedboxes in FIGS. 8A-B illustrate the in-order pipeline and in-order core,while the optional addition of the dashed lined boxes illustrates theregister renaming, out-of-order issue/execution pipeline and core. Giventhat the in-order aspect is a subset of the out-of-order aspect, theout-of-order aspect will be described.

In FIG. 8A, a processor pipeline 800 includes a fetch stage 802, alength decode stage 804, a decode stage 806, an allocation stage 808, arenaming stage 810, a scheduling (also known as a dispatch or issue)stage 812, a register read/memory read stage 814, an execute stage 816,a write back/memory write stage 818, an exception handling stage 822,and a commit stage 824.

FIG. 8B shows processor core 890 including a front end unit 830 coupledto an execution engine unit 850, and both are coupled to a memory unit870. The core 890 may be a reduced instruction set computing (RISC)core, a complex instruction set computing (CISC) core, a very longinstruction word (VLIW) core, or a hybrid or alternative core type. Asyet another option, the core 890 may be a special-purpose core, such as,for example, a network or communication core, compression engine,coprocessor core, general purpose computing graphics processing unit(GPGPU) core, graphics core, or the like.

The front end unit 830 includes a branch prediction unit 832 coupled toan instruction cache unit 834, which is coupled to an instructiontranslation lookaside buffer (TLB) 836, which is coupled to aninstruction fetch unit 838, which is coupled to a decode unit 840. Thedecode unit 840 (or decoder) may decode instructions, and generate as anoutput one or more micro-operations, micro-code entry points,microinstructions, other instructions, or other control signals, whichare decoded from, or which otherwise reflect, or are derived from, theoriginal instructions. The decode unit 840 may be implemented usingvarious different mechanisms. Examples of suitable mechanisms include,but are not limited to, look-up tables, hardware implementations,programmable logic arrays (PLAs), microcode read only memories (ROMs),etc. In one embodiment, the core 890 includes a microcode ROM or othermedium that stores microcode for certain macroinstructions (e.g., indecode unit 840 or otherwise within the front end unit 830). The decodeunit 840 is coupled to a rename/allocator unit 852 in the executionengine unit 850.

The execution engine unit 850 includes the rename/allocator unit 852coupled to a retirement unit 854 and a set of one or more schedulerunit(s) 856. The scheduler unit(s) 856 represents any number ofdifferent schedulers, including reservations stations, centralinstruction window, etc. The scheduler unit(s) 856 is coupled to thephysical register file(s) unit(s) 858. Each of the physical registerfile(s) units 858 represents one or more physical register files,different ones of which store one or more different data types, such asscalar integer, scalar floating point, packed integer, packed floatingpoint, vector integer, vector floating point, status (e.g., aninstruction pointer that is the address of the next instruction to beexecuted), etc. In one embodiment, the physical register file(s) unit858 comprises a vector registers unit, a write mask registers unit, anda scalar registers unit. These register units may provide architecturalvector registers, vector mask registers, and general purpose registers.The physical register file(s) unit(s) 858 is overlapped by theretirement unit 854 to illustrate various ways in which registerrenaming and out-of-order execution may be implemented (e.g., using areorder buffer(s) and a retirement register file(s); using a futurefile(s), a history buffer(s), and a retirement register file(s); using aregister maps and a pool of registers; etc.). The retirement unit 854and the physical register file(s) unit(s) 858 are coupled to theexecution cluster(s) 860. The execution cluster(s) 860 includes a set ofone or more execution units 862 and a set of one or more memory accessunits 864. The execution units 862 may perform various operations (e.g.,shifts, addition, subtraction, multiplication) and on various types ofdata (e.g., scalar floating point, packed integer, packed floatingpoint, vector integer, vector floating point). While some embodimentsmay include a number of execution units dedicated to specific functionsor sets of functions, other embodiments may include only one executionunit or multiple execution units that all perform all functions. Thescheduler unit(s) 856, physical register file(s) unit(s) 858, andexecution cluster(s) 860 are shown as being possibly plural becausecertain embodiments create separate pipelines for certain types ofdata/operations (e.g., a scalar integer pipeline, a scalar floatingpoint/packed integer/packed floating point/vector integer/vectorfloating point pipeline, and/or a memory access pipeline that each havetheir own scheduler unit, physical register file(s) unit, and/orexecution cluster—and in the case of a separate memory access pipeline,certain embodiments are implemented in which only the execution clusterof this pipeline has the memory access unit(s) 864). It should also beunderstood that where separate pipelines are used, one or more of thesepipelines may be out-of-order issue/execution and the rest in-order.

The set of memory access units 864 is coupled to the memory unit 870,which includes a data TLB unit 872 coupled to a data cache unit 874coupled to a level 2 (L2) cache unit 876. In one exemplary embodiment,the memory access units 864 may include a load unit, a store addressunit, and a store data unit, each of which is coupled to the data TLBunit 872 in the memory unit 870. The instruction cache unit 834 isfurther coupled to a level 2 (L2) cache unit 876 in the memory unit 870.The L2 cache unit 876 is coupled to one or more other levels of cacheand eventually to a main memory.

By way of example, the exemplary register renaming, out-of-orderissue/execution core architecture may implement the pipeline 800 asfollows: 1) the instruction fetch 838 performs the fetch and lengthdecoding stages 802 and 804; 2) the decode unit 840 performs the decodestage 806; 3) the rename/allocator unit 852 performs the allocationstage 808 and renaming stage 810; 4) the scheduler unit(s) 856 performsthe schedule stage 812; 5) the physical register file(s) unit(s) 858 andthe memory unit 870 perform the register read/memory read stage 814; theexecution cluster 860 perform the execute stage 816; 6) the memory unit870 and the physical register file(s) unit(s) 858 perform the writeback/memory write stage 818; 7) various units may be involved in theexception handling stage 822; and 8) the retirement unit 854 and thephysical register file(s) unit(s) 858 perform the commit stage 824.

The core 890 may support one or more instructions sets (e.g., the x86instruction set (with some extensions that have been added with newerversions); the MIPS instruction set of MIPS Technologies of Sunnyvale,Calif.; the ARM instruction set (with optional additional extensionssuch as NEON) of ARM Holdings of Sunnyvale, Calif.), including theinstruction(s) described herein. In one embodiment, the core 890includes logic to support a packed data instruction set extension (e.g.,AVX1, AVX2), thereby allowing the operations used by many multimediaapplications to be performed using packed data.

It should be understood that the core may support multithreading(executing two or more parallel sets of operations or threads), and maydo so in a variety of ways including time sliced multithreading,simultaneous multithreading (where a single physical core provides alogical core for each of the threads that physical core issimultaneously multithreading), or a combination thereof (e.g., timesliced fetching and decoding and simultaneous multithreading thereaftersuch as in the Intel® Hyper-Threading technology).

While register renaming is described in the context of out-of-orderexecution, it should be understood that register renaming may be used inan in-order architecture. While the illustrated embodiment of theprocessor also includes separate instruction and data cache units834/874 and a shared L2 cache unit 876, alternative embodiments may havea single internal cache for both instructions and data, such as, forexample, a Level 1 (L1) internal cache, or multiple levels of internalcache. In some embodiments, the system may include a combination of aninternal cache and an external cache that is external to the core and/orthe processor. Alternatively, all of the cache may be external to thecore and/or the processor.

Specific Exemplary in-Order Core Architecture

FIGS. 9A-B illustrate a block diagram of a more specific exemplaryin-order core architecture, which core would be one of several logicblocks (including other cores of the same type and/or different types)in a chip. The logic blocks communicate through a high-bandwidthinterconnect network (e.g., a ring network) with some fixed functionlogic, memory I/O interfaces, and other necessary I/O logic, dependingon the application.

FIG. 9A is a block diagram of a single processor core, along with itsconnection to the on-die interconnect network 902 and with its localsubset of the Level 2 (L2) cache 904, according to embodiments of theinvention. In one embodiment, an instruction decoder 900 supports thex86 instruction set with a packed data instruction set extension. An L1cache 906 allows low-latency accesses to cache memory into the scalarand vector units. While in one embodiment (to simplify the design), ascalar unit 908 and a vector unit 910 use separate register sets(respectively, scalar registers 912 and vector registers 914) and datatransferred between them is written to memory and then read back in froma level 1 (L1) cache 906, alternative embodiments of the invention mayuse a different approach (e.g., use a single register set or include acommunication path that allow data to be transferred between the tworegister files without being written and read back).

The local subset of the L2 cache 904 is part of a global L2 cache thatis divided into separate local subsets, one per processor core. Eachprocessor core has a direct access path to its own local subset of theL2 cache 904. Data read by a processor core is stored in its L2 cachesubset 904 and can be accessed quickly, in parallel with other processorcores accessing their own local L2 cache subsets. Data written by aprocessor core is stored in its own L2 cache subset 904 and is flushedfrom other subsets, if necessary. The ring network ensures coherency forshared data. The ring network is bi-directional to allow agents such asprocessor cores, L2 caches and other logic blocks to communicate witheach other within the chip. Each ring data-path is 912-bits wide perdirection.

FIG. 9B is an expanded view of part of the processor core in FIG. 9Aaccording to embodiments of the invention. FIG. 9B includes an L1 datacache 906A part of the L1 cache 904, as well as more detail regardingthe vector unit 910 and the vector registers 914. Specifically, thevector unit 910 is a 16-wide vector processing unit (VPU) (see the16-wide ALU 928), which executes one or more of integer,single-precision float, and double-precision float instructions. The VPUsupports swizzling the register inputs with swizzle unit 920, numericconversion with numeric convert units 922A-B, and replication withreplication unit 924 on the memory input. Write mask registers 926 allowpredicating resulting vector writes.

A trace generator may be included in a processor and/or core, forexample, the processor(s) and/or core(s) in FIGS. 10-13.

Processor with Integrated Memory Controller and Graphics

FIG. 10 is a block diagram of a processor 1000 that may have more thanone core, may have an integrated memory controller, and may haveintegrated graphics according to embodiments of the invention. The solidlined boxes in FIG. 10 illustrate a processor 1000 with a single core1002A, a system agent 1010, a set of one or more bus controller units1016, while the optional addition of the dashed lined boxes illustratesan alternative processor 1000 with multiple cores 1002A-N, a set of oneor more integrated memory controller unit(s) 1014 in the system agentunit 1010, and special purpose logic 1008.

Thus, different implementations of the processor 1000 may include: 1) aCPU with the special purpose logic 1008 being integrated graphics and/orscientific (throughput) logic (which may include one or more cores), andthe cores 1002A-N being one or more general purpose cores (e.g., generalpurpose in-order cores, general purpose out-of-order cores, acombination of the two); 2) a coprocessor with the cores 1002A-N being alarge number of special purpose cores intended primarily for graphicsand/or scientific (throughput); and 3) a coprocessor with the cores1002A-N being a large number of general purpose in-order cores. Thus,the processor 1000 may be a general-purpose processor, coprocessor orspecial-purpose processor, such as, for example, a network orcommunication processor, compression engine, graphics processor, GPGPU(general purpose graphics processing unit), a high-throughput manyintegrated core (MIC) coprocessor (including 30 or more cores), embeddedprocessor, or the like. The processor may be implemented on one or morechips. The processor 1000 may be a part of and/or may be implemented onone or more substrates using any of a number of process technologies,such as, for example, BiCMOS, CMOS, or NMOS.

The memory hierarchy includes one or more levels of cache within thecores, a set or one or more shared cache units 1006, and external memory(not shown) coupled to the set of integrated memory controller units1014. The set of shared cache units 1006 may include one or moremid-level caches, such as level 2 (L2), level 3 (L3), level 4 (L4), orother levels of cache, a last level cache (LLC), and/or combinationsthereof. While in one embodiment a ring based interconnect unit 1012interconnects the integrated graphics logic 1008, the set of sharedcache units 1006, and the system agent unit 1010/integrated memorycontroller unit(s) 1014, alternative embodiments may use any number ofwell-known techniques for interconnecting such units. In one embodiment,coherency is maintained between one or more cache units 1006 and cores1002-A-N.

In some embodiments, one or more of the cores 1002A-N are capable ofmulti-threading. The system agent 1010 includes those componentscoordinating and operating cores 1002A-N. The system agent unit 1010 mayinclude for example a power control unit (PCU) and a display unit. ThePCU may be or include logic and components needed for regulating thepower state of the cores 1002A-N and the integrated graphics logic 1008.The display unit is for driving one or more externally connecteddisplays.

The cores 1002A-N may be homogenous or heterogeneous in terms ofarchitecture instruction set; that is, two or more of the cores 1002A-Nmay be capable of execution the same instruction set, while others maybe capable of executing only a subset of that instruction set or adifferent instruction set.

Exemplary Computer Architectures

Referring now to FIG. 11, shown is a block diagram of a first morespecific exemplary system 1100 in accordance with an embodiment of thepresent invention. As shown in FIG. 11, multiprocessor system 1100 is apoint-to-point interconnect system, land includes a first processor 1170and a second processor 1180 coupled via a point-to-point interconnect1150. Each of processors 1170 and 1180 may be some version of theprocessor 1000. In one embodiment of the invention, processors 1170 and1180 are respectively processors 110 and 115, while coprocessor 1138 iscoprocessor 145. In another embodiment, processors 1170 and 1180 arerespectively processor 110 coprocessor 145.

Processors 1170 and 1180 are shown including integrated memorycontroller (IMC) units 1172 and 1182, respectively. As noted above,processor may include a trace generator. Processor 1170 also includes aspart of its bus controller units point-to-point (P-P) interfaces 1176and 1178; similarly, second processor 1180 includes P-P interfaces 1186and 1188. Processors 1170, 1180 may exchange information via apoint-to-point (P-P) interface 1150 using P-P interface circuits 1178,1188. As shown in FIG. 11, IMCs 1172 and 1182 couple the processors torespective memories, namely a memory 1132 and a memory 1134, which maybe portions of main memory locally attached to the respectiveprocessors.

Processors 1170, 1180 may each exchange information with a chipset 1190via individual P-P interfaces 1152, 1154 using point to point interfacecircuits 1176, 1194, 1186, and 1198. Chipset 1190 may optionallyexchange information with the coprocessor 1138 via a high-performanceinterface 1139. In one embodiment, the coprocessor 1138 is aspecial-purpose processor, such as, for example, a high-throughput MICprocessor, a network or communication processor, compression engine,graphics processor, GPGPU, embedded processor, or the like.

A shared cache (not shown) may be included in either processor oroutside of both processors, yet connected with the processors via P-Pinterconnect, such that either or both processors' local cacheinformation may be stored in the shared cache if a processor is placedinto a low power mode.

Chipset 1190 may be coupled to a first bus 1116 via an interface 1196.In one embodiment, first bus 1116 may be a Peripheral ComponentInterconnect (PCI) bus, or a bus such as a PCI Express bus or anotherthird generation I/O interconnect bus, although the scope of the presentdisclosure is not so limited.

As shown in FIG. 11, various I/O devices 1114 may be coupled to firstbus 1116, along with a bus bridge 1118 which couples first bus 1116 to asecond bus 1120. In one embodiment, one or more additional processor(s)1115, such as coprocessors, high-throughput MIC processors, GPGPU's,accelerators (such as, e.g., graphics accelerators or digital signalprocessing (DSP) units), field programmable gate arrays, or any otherprocessor, are coupled to first bus 1116. In one embodiment, second bus1120 may be a low pin count (LPC) bus. Various devices may be coupled toa second bus 1120 including, for example, a keyboard and/or mouse 1122,communication devices 1127 and a storage unit 1128 such as a disk driveor other mass storage device which may include instructions/code anddata 1130, in one embodiment. Further, an audio I/O 1124 may be coupledto the second bus 1120. Note that other architectures are possible. Forexample, instead of the point-to-point architecture of FIG. 11, a systemmay implement a multi-drop bus or other such architecture.

Referring now to FIG. 12, shown is a block diagram of a second morespecific exemplary system 1200 in accordance with an embodiment of thepresent invention. Like elements in FIGS. 11 and 12 bear like referencenumerals, and certain aspects of FIG. 11 have been omitted from FIG. 12in order to avoid obscuring other aspects of FIG. 12.

FIG. 12 illustrates that the processors 1170, 1180 may includeintegrated memory and I/O control logic (“CL”) 1172 and 1182,respectively. Thus, the CL 1172, 1182 include integrated memorycontroller units and include I/O control logic. FIG. 12 illustrates thatnot only are the memories 1132, 1134 coupled to the CL 1172, 1182, butalso that I/O devices 1214 are also coupled to the control logic 1172,1182. Legacy I/O devices 1215 are coupled to the chipset 1190.

Referring now to FIG. 13, shown is a block diagram of a System on a Chip(SoC) 1400 in accordance with an embodiment of the present disclosure.Similar elements in FIG. 10 bear like reference numerals. Also, dashedlined boxes are optional features on more advanced SoCs. In FIG. 13, aninterconnect unit(s) 1302 is coupled to: an application processor 1310which includes a set of one or more cores 202A-N and shared cacheunit(s) 1006; a system agent unit 1010; a bus controller unit(s) 1016;an integrated memory controller unit(s) 1014; a set or one or morecoprocessors 1320 which may include integrated graphics logic, an imageprocessor, an audio processor, and a video processor; an static randomaccess memory (SRAM) unit 1330; a direct memory access (DMA) unit 1332;and a display unit 1340 for coupling to one or more external displays.In one embodiment, the coprocessor(s) 1320 include a special-purposeprocessor, such as, for example, a network or communication processor,compression engine, GPGPU, a high-throughput MIC processor, embeddedprocessor, or the like.

Embodiments of the mechanisms disclosed herein may be implemented inhardware, software, firmware, or a combination of such implementationapproaches. Embodiments of the invention may be implemented as computerprograms or program code executing on programmable systems comprising atleast one processor, a storage system (including volatile andnon-volatile memory and/or storage elements), at least one input device,and at least one output device.

Program code, such as code 1130 illustrated in FIG. 11, may be appliedto input instructions to perform the functions described herein andgenerate output information. The output information may be applied toone or more output devices, in known fashion. For purposes of thisapplication, a processing system includes any system that has aprocessor, such as, for example; a digital signal processor (DSP), amicrocontroller, an application specific integrated circuit (ASIC), or amicroprocessor.

The program code may be implemented in a high level procedural or objectoriented programming language to communicate with a processing system.The program code may also be implemented in assembly or machinelanguage, if desired. In fact, the mechanisms described herein are notlimited in scope to any particular programming language. In any case,the language may be a compiled or interpreted language.

One or more aspects of at least one embodiment may be implemented byrepresentative instructions stored on a machine-readable medium whichrepresents various logic within the processor, which when read by amachine causes the machine to fabricate logic to perform the techniquesdescribed herein. Such representations, known as “IP cores” may bestored on a tangible, machine readable medium and supplied to variouscustomers or manufacturing facilities to load into the fabricationmachines that actually make the logic or processor.

Such machine-readable storage media may include, without limitation,non-transitory, tangible arrangements of articles manufactured or formedby a machine or device, including storage media such as hard disks, anyother type of disk including floppy disks, optical disks, compact diskread-only memories (CD-ROMs), compact disk rewritables (CD-RWs), andmagneto-optical disks, semiconductor devices such as read-only memories(ROMs), random access memories (RAMs) such as dynamic random accessmemories (DRAMs), static random access memories (SRAMs), erasableprogrammable read-only memories (EPROMs), flash memories, electricallyerasable programmable read-only memories (EEPROMs), phase change memory(PCM), magnetic or optical cards, or any other type of media suitablefor storing electronic instructions.

Accordingly, embodiments of the invention also include non-transitory,tangible machine-readable media containing instructions or containingdesign data, such as Hardware Description Language (HDL), which definesstructures, circuits, apparatuses, processors and/or system featuresdescribed herein. Such embodiments may also be referred to as programproducts.

Emulation (Including Binary Translation, Code Morphine, Etc.)

In some cases, an instruction converter may be used to convert aninstruction from a source instruction set to a target instruction set.For example, the instruction converter may translate (e.g., using staticbinary translation, dynamic binary translation including dynamiccompilation), morph, emulate, or otherwise convert an instruction to oneor more other instructions to be processed by the core. The instructionconverter may be implemented in software, hardware, firmware, or acombination thereof. The instruction converter may be on processor, offprocessor, or part on and part off processor.

What is claimed is:
 1. A processor comprising: a hardware execution unitto execute instructions; a hardware retirement unit to retire executedinstructions; and a trace generator having a trace suppressor to outputa suppressed address trace of the executed instructions.
 2. Theprocessor of claim 1, wherein a first executed instruction accessed anaddress register and the suppressed address trace comprises an addressstored in the address register outputted for the first executedinstruction.
 3. The processor of claim 2, wherein a second executedinstruction accessed the address register, the address stored in theaddress register is unchanged relative to the first instruction, and thesuppressed address trace comprises no output for the second executedinstruction.
 4. The processor of claim 2, wherein a second executedinstruction accessed a relative address referencing the addressregister, the address stored in the address register is unchangedrelative to the first instruction, and the suppressed address tracecomprises a register hint packet outputted for the second executedinstruction.
 5. The processor of claim 4, wherein the register hintpacket comprises the address stored in the address register.
 6. Theprocessor of claim 1, wherein a first executed instruction accessed arelative address referencing an address register, and the suppressedaddress trace comprises a register hint packet outputted for the firstexecuted instruction.
 7. The processor of claim 6, wherein the registerhint packet comprises an address stored in the address register.
 8. Theprocessor of claim 1, wherein at least one executed instruction accessedan absolute memory address, and the suppressed address trace comprisesno output for the at least one executed instruction.
 9. The processor ofclaim 1, wherein the retirement unit comprises a re-order buffer.
 10. Amethod to generate a suppressed address trace for a processorcomprising: executing instructions with a hardware execution unit of theprocessor; retiring executed instructions with a hardware retirementunit of the processor; and generating the suppressed address trace ofthe executed instructions from a trace suppressor of a trace generatorof the processor.
 11. The method of claim 10, wherein a first executedinstruction accessed an address register, and generating the suppressedaddress trace comprises outputting an address stored in the addressregister for the first executed instruction.
 12. The method of claim 11,wherein a second executed instruction accessed the address register, theaddress stored in the address register is unchanged relative to thefirst instruction, and generating the suppressed address trace comprisesno output for the second executed instruction.
 13. The method of claim12, wherein the first executed instruction is executed before the secondexecuted instruction.
 14. The method of claim 11, wherein a secondexecuted instruction accessed a relative address referencing the addressregister, the address stored in the address register is unchangedrelative to the first instruction, and generating the suppressed addresstrace comprises outputting a register hint packet for the secondexecuted instruction.
 15. The method of claim 14, wherein the firstexecuted instruction is executed before the second executed instruction.16. The method of claim 14, wherein the register hint packet comprisesthe address stored in the address register.
 17. The method of claim 10,wherein a first executed instruction accessed a relative addressreferencing an address register, and generating the suppressed addresstrace comprises outputting a register hint packet for the first executedinstruction.
 18. The method of claim 17, wherein the register hintpacket comprises an address stored in the address register.
 19. Themethod of claim 10, wherein at least one executed instruction accessedan absolute memory address, and generating the suppressed address tracecomprises no output for the at least one executed instruction.
 20. Anon-transitory machine readable storage medium having instructions that,when executed, causes a machine to perform a method comprising:generating a suppressed address trace of executed instructions from atrace suppressor of a trace generator of a processor.