Multiple variable cache replacement policy

ABSTRACT

A method for selecting a candidate to mark as overwritable in the event of a cache miss while attempting to avoid a write back operation. The method includes associating a set of data with the cache access request, each datum of the set is associated with a way, then choosing an invalid way among the set. Where no invalid ways exist among the set, the next step is determining a way that is not most recently used among the set. Next, the method determines whether a shared resource is crowded . When the shared resource is not crowded, the not most recently used way is chosen as the candidate. Where the shared resource is crowded, the next step is to determine whether the not most recently used way differs from an associated source in the memory and where the not most recently used way is the same as an associated source in the memory, the not most recently used way is chosen as the candidate. Where the not most recently used way differs from an associated source in the memory, the candidate is chosen as the way among the set that does not differ from an associated source in the memory. Where all ways among the set differ from respective sources in the memory, the not most recently used way is chosen as the candidate and the not most recently used way is stored in the shared resource.

CROSS-REFERENCE TO RELATED APPLICATION

[0001] This application relates to U.S. Pat. application Ser. No. 09/204,480, filed Dec. 12, 1998, and entitled, “A Multiple-Thread Processor for Threaded Software Applications,” and naming Marc Tremblay and William Joy as inventors, the application being incorporated herein by reference in its entirety.

BACKGROUND

[0002] 1. Field of the Invention

[0003] The invention relates to processor caches and more particularly to determining which data in a cache to overwrite or write back in the event of a cache miss.

[0004] 2. Discussion of Related Art

[0005] Processors have attained widespread use throughout many industries. A goal of any processor is to process information quickly. One technique which is used to increase the speed with which the processor processes information is to provide the processor with an architecture which includes a fast local memory called a cache. Another technique which is used to increase the speed with which the processor processes information is to provide a processor architecture with multiple processing units.

[0006] A cache is used by the processor to temporarily store instructions and data. A cache which stores both instructions and data is referred to as a unified cache; a cache which stores only instructions is an instruction cache, and a cache which stores only data is a data cache. Providing a processor architecture with either a unified cache or an instruction cache and a data cache is a matter of design choice.

[0007] A factor in the performance of the processor is the probability that a processor-requested data item is already in the cache. When a processor attempts to access an item of information, it is either present in the cache or not. If present, a cache “hit” occurs. If the item is not in the cache when requested by the processor, a cache “miss” occurs. It is desirable when designing a cache system to achieve a high cache hit rate, or “hit ratio”.

[0008] After a cache miss occurs, the information requested by the processor must then be retrieved from memory and brought into the cache so that it may be accessed by the processor. A search for an item of information that is not stored in the cache after a cache miss usually results in an expensive and time-consuming effort to retrieve the item of information from the main memory of the system. To maximize the number of cache hits, data that is likely to be referenced in the near future operation of the processor is stored in the cache. Two common strategies for maximizing cache hits are storing the most recently referenced data and storing the most commonly referenced data.

[0009] In most existing systems, a cache is subdivided into sets of cache line slots. When each set contains only one line, then each main memory line can only be stored in one specific line slot in the cache. This is called direct mapping. In contrast, each set in most modern processors contains a number of lines. Because each set contains several lines, a main memory line mapped to a given set may be stored in any of the lines, or “ways”, in the set.

[0010] When a cache miss occurs, the line of memory containing the missing item is loaded into the cache, replacing another cache line. This process is called cache replacement. In a direct mapping system, each line from main memory is restricted to be placed in a single line slot in the cache. This direct mapping approach simplifies the cache replacement process, but tends to limit the hit ratio due to the lack of flexibility with line mapping. In contrast, flexibility of line mapping, and therefore a higher hit ratio, can be achieved by increasing the level of associativity. Increased associativity means that the number of lines per set is increased so that each line in main memory can be placed in any of the line slots (“ways”) within the set. During cache replacement, one of the lines in the set must be replaced. The method for deciding which line in the set is to be replaced after a cache miss is called a cache replacement policy.

[0011] Several conventional cache replacement policies for selecting a datum in the cache to overwrite include Random, Least-Recently Used (LRU), Pseudo-LRU, and Not-Most-Recently-Used (NMRU). Random is the simplest cache replacement policy to implement, since the line to be replaced in the set is chosen at random. The LRU method is more complex, as it requires a logic circuit to keep track of actual access of each line in the set by the processor. According to the LRU algorithm, if a line has not been accessed recently, chances are that it will not be accessed any more, and therefore it is a good candidate for replacement. Another replacement policy, NMRU, keeps track of the most recently accessed line. This most recently accessed line is not chosen for replacement, since the principle of spatial locality says that there is a high probability that, once an information item is accessed, other nearby items in the same line will be accessed in the near future. The NMRU method requires a logic circuit to keep track of the most recently accessed line within a set. In all cache replacement policies, the line selected for replacement may be referred to as a “candidate”.

[0012] Once a candidate is selected, further processing must occur in the cache in order to ensure the preservation of memory coherency. If the contents of the candidate has been altered in the cache since it was retrieved from memory, then the candidate is “dirty” and a memory incoherency exists. Before the contents of the dirty candidate can be replaced with the new information requested by the processor, the current contents of the dirty candidate must be updated to memory. This operation is called a “write back” operation. While the implementation of such a scheme allows reduced bus traffic because multiple changes to a cache line need be loaded into memory only when the cache line is about to be replaced, a drawback to the write back operation is delay. That is, access to the cache is slowed or even halted during a write back operation.

SUMMARY

[0013] A method selects a candidate to mark as overwritable in the event of a cache miss while attempting to avoid a write back operation. The selection includes associating a set of data with the cache access request, each datum of the set is associated with a way, then choosing an invalid way among the set. Where no invalid ways exist among the set, the processor next determines a way that is not most recently used among the set. Next, the method determines whether a shared resource is crowded. When the shared resource is not crowded, the not most recently used way is chosen as the candidate. Where the shared resource is crowded, the method next determines whether the not most recently used way differs from an associated source in the memory and where the not most recently used way is the same as an associated source in the memory, the not most recently used way is chosen as the candidate.

[0014] In one embodiment, the method for selecting a candidate to mark as overwritable in the event of a cache miss includes receiving the cache access requests, where the request is associated with a main memory address, determining whether the contents of the main memory address are present in a data cache, when the access “misses”, associating the main memory address with a set within the data cache, determining whether any way in the set is invalid, and choosing an invalid way, if one exists, as the candidate. If no invalid way exists, a cache replacement policy is applied to select a way as a preliminary candidate. The cache replacement policy is based on the state of at least one affected resource, such as the “crowded” state of a write back buffer, the state of a cross bar switch, or the state of a memory controller buffer.

[0015] When the shared resource is a write back buffer, when the not most recently used way differs from an associated source in the memory, the candidate is chosen as the way among the set that does not differ from an associated source in the memory. Where all ways among the set differ from respective sources in the memory, the not most recently used way is chosen as the candidate and the not most recently used way is stored in the write back buffer.

[0016] When the back buffer is crowded, one embodiment determines whether the preliminary candidate is dirty. Where the write back buffer is not crowded or the write back buffer is crowded and the preliminary candidate is not dirty, the preliminary candidate is chosen as the candidate. Where, however, the write back buffer is crowded and the preliminary candidate is dirty, then the contents of the preliminary candidate are stored in the write back buffer and the preliminary candidate is chosen s the candidate.

[0017] In one embodiment, all or some of the method described above is implemented in a computer system having a data cache that is shared by a plurality of processing units.

[0018] The present invention will be more fully understood in light of the following detailed description taken together with the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

[0019]FIG. 1 shows a computer system in accordance with an embodiment of the present invention.

[0020]FIG. 2 shows a block diagram of a data cache unit of the computer system of FIG. 1.

[0021]FIG. 3 shows a sample status word.

[0022]FIG. 4 shows a block diagram of a shared write back buffer of the data cache unit of FIG. 2.

[0023]FIG. 5 shows a block diagram of a selection circuit of the data cache unit of FIG. 2.

[0024]FIG. 6 shows two logical banks of a data array of the data cache unit of FIG. 2.

[0025]FIG. 7 shows one embodiment of a cache replacement operation.

[0026]FIG. 8 shows one embodiment of an arbitration circuit.

[0027] The use of the same reference numbers in different figures indicates the same or like elements.

DETAILED DESCRIPTION

[0028] The present invention relates to a multi-variable cache replacement policy that takes information in addition to the state of the cache into account. As with many prior art cache replacement policies, the status of the requested set is taken into account. Status bits indicate the state of the set, including which ways are available to be overwritten (i.e., invalid), which ways have recently been used for a cache miss, and which ways are “dirty” and therefore are candidates for a write back operation. In addition, the present invention also takes into account the state of the machine outside the cache. That is, the present invention also factors into the replacement policy the state of resources that are affected by the replacement policy. In the preferred embodiment, this is accomplished by factoring into the replacement policy whether the write back buffer is crowded. This allows more efficiency than prior art systems. If the write back buffer is crowded, a dirty way is not selected unless there are no nondirty candidates. Triggering of a write back operation is thus prevented until both the write back buffer is crowded and all ways in the set are both valid and dirty. In alternative embodiments, the state of other resources, such as a cross bar switch, memory controller, and memory controller buffers may be factored into the replacement policy. The following sets forth a detailed description of a mode for carrying out the invention. The description is intended to be illustrative of the invention and should not be taken to be limiting.

[0029]FIG. 1 shows a computer system 100 in accordance with the present invention. Computer system 100 includes a data cache unit (DCU) 102 coupled to first processing unit 104 (MPU0) and second processing unit 106 (MPU 1). While the preferred embodiment includes two processing units, the invention may include a plurality of any number of processing units. The units included in this plurality, such as first processing unit 104 and second processing unit 106 may be media processor units. For example, U.S. application No. 09/204,480 filed by inventors Marc Tremblay and William Joy, entitled “Multiple-Tread Processor for Threaded Software Applications”, which is hereby incorporated by reference, sets forth a media processor unit in accordance with the invention.

[0030]FIG. 1 illustrates that the data cache unit 102 is coupled to each MPU as well as to main memory. First processing unit 104 is coupled to data cache unit 102 via a 64-bit data path, a 32-bit address path, a retry path and a hit path. Second processing unit 106 is also coupled to data cache unit 102 via a 64-bit data path, a 32-bit address path, a retry path and a hit path. The data cache unit 102 is coupled to a conventional main memory 108 by conventional bus 110. More specifically, data cache unit 102 is coupled to bus 110 via a 64-bit data-in path, as well as a 64-bit data-out path, and a 27-bit buffer flush address path.

[0031]FIG. 2 illustrates in greater detail the data cache unit 102, which stores data for faster access by first processing unit 104 and second processing unit 106 than would be possible by accessing main memory 108. FIG. 2 shows that data cache unit 102 comprises data array 202, status array 204, directory array 206, fill buffer 208, shared write back buffer 210, and selection circuit 212. Each of these constituents of the data cache unit 102 is discussed in further detail below. Data array 202 is discussed first, followed by discussions of directory array 206, status array 204, selection circuit 212, fill buffer 208, and write back buffer 210.

[0032]FIG. 2 illustrates that data array 202 receives a 32-bit address signal (add_MPUO) from first processing unit 104, a 32-bit address signal (add₁₃ MPU1) from second processing unit 106, and a 256-bit data signal from fill buffer 208. Data array 202 also receives first and second hit signals from directory array 206 (hit0, hit1). Data array 202 provides a 64-bit data signal to first processing unit 104 (datum0) and a 64-bit data signal to second processing unit 106 (datum1). Data array 202 also provides the 64-bit data signal datum0 and the 64-bit data signal datum 1 to write back buffer 210.

[0033] Data array 202 stores the data of data cache unit 102. In the preferred embodiment, data array 202 includes four logical banks 240 a-240 d, each bank storing 128 lines of 256 bits. A suitable implementation of a logical bank 240 is a static random access memory (SRAM). FIG. 2 shows that data array 202 also comprises two multiplexers 230 a, 230 b. The operation of data array 202 is described in more detail below.

[0034] Regarding the directory array 206, FIG. 2 illustrates that directory array 206 receives the 32-bit address signal (add_MPUO) from first processing unit 104 and the 32-bit address signal (add_MPU1) from second processing unit 106. Directory array 206 also receives the first and second 15-bit status signals from status array 204 (status0, status1). Directory array 206 provides first and second hit signals to data array 202. Directory array 206 also provides first and second data-out signals containing a tag address (rdata0, rdata1) to write back buffer 210.

[0035] Directory array 206 stores addresses of data stored in a corresponding location within data array 202 of data cache unit 102. Directory array 206 includes four logical banks 260 a-260 d that each stores 128 20-bit wide lines, where the 20-bits correspond to the 20 more significant bits of the 32-bit address. A datum is stored in a predetermined location within one of the four logical banks 260 a-260 d. Each of the four predetermined locations is labeled a “way”. A “set” includes the four possible “ways” in which a datum can be stored. A suitable implementation of a logical bank 260 is a static random access memory (SRAM). FIG. 2 shows that directory array 206 also includes two comparators 270 a, 270 b. The operation of directory array 206 is described in more detail below.

[0036] Turning now to the status array, FIG. 2 illustrates that status array 204 receives the 32-bit address signal (add_MPU0) from first processing unit 104 and the 32-bit address signal (add_MPU1) from second processing unit 106. Status array 204 also receives first and second 15-bit status signals from selection circuit 212 (status0, status1). Status array 204 provides valid bits to the directory array 206. Status array 204 also provides a first and second . 15-bit status signal (status0, status1 ). to selection circuit 212.

[0037] Status array 204 stores status words that include information concerning each “way” of data array 202. Status array 204 includes one or more logical banks 250 for storing 128 status words that are 15 bits each. A suitable implementation of a logical bank 250 is a static random access memory (SRAM). The operation of status array 204 is described in more detail later.

[0038] Still referring to FIG. 2, our discussion of the data cache unit 102 constituents turns to the selection circuit 212. Selection circuit 212 generates a new 15-bit status word to be updated a cycle after every load/store access and stored in the status array 204. (FIG. 3 illustrates the format of the 15-bit status word, as is discussed immediately below.) The selection circuit 212 also generates the victim number for cache replacement and indicates if the candidate is dirty, signifying that the candidate's current data must be loaded into the write back buffer before it is overwritten. FIG. 2 illustrates that the selection circuit 212 receives from the status array 204 the status word for the access. The selection circuit then modifies the status word. For example, the dirty bit may need to be set (on a store hit), the replacement bits may need to be updated and the valid bit may need to be cleared. The updated status word 300 is then set back to the status array.

[0039]FIG. 3 shows a sample status word 300. Status word 300 is a 15-bit word that indicates lock status, a reference way, whether each of four ways, 0-3, has been utilized on a previous cache miss, whether each of the four ways is dirty, and whether each of the four ways is valid. More specifically, bits R1 and R2 represent the reference way to be used by the selection circuit 212 to implement the cache replacement algorithm, as discussed below. For instance, in a NMRU cache replacement policy, bits R1 and R2 would contain the most-recently-used way for a particular set. In a LRU cache replacement policy, bits R1 and R2 would contain the least-recently-used way. Bits M0-M3 indicate whether the corresponding way has already been taken due to a cache miss. This M indicator simplifies the victim number generation logic in the cache replacement algorithm. Bits V0-V3 indicate whether the corresponding way is valid. An invalid way is a way that is free of meaningful data and therefore is a likely candidate to be overwritten on a cache miss. In other words, no new data has been fetched into an invalid way since that way was last flushed to memory. Bits D0-D3 indicate whether the corresponding way is dirty. That is, not only does that way contain meaningful data, but the data has been changed since it was retrieved from memory, and a memory incoherency therefore exists. Bit L, the lock bit, indicates that the cache line is locked in place and cannot be moved. The lock bit is set, for example, upon an atomic load hit. Setting the lock bit operates to disable any access to the set until the lock bit is reset.

[0040] Selection circuit 212 of data cache unit 102 implements a cache replacement policy by changing the “miss” bit in the appropriate status word to reflect which “way” is a candidate for replacement. Selection circuit 212 receives status words associated with requested data from status array 204 and provides an updated status word to status array 204 where applicable.

[0041]FIG. 5 shows a block diagram of selection circuit 212 which updates the status array 204 and implements the multi-variable replacement policy 700 of the present invention to generate a victim (or “candidate”) number to be used for cache overwrite upon a cache miss. Selection circuit 212 receives the 15-bit status0 signal and the 15-bit status1 signal from the status array 204 as well as the full bits f1, f2 from the write back buffer 210. Selection circuit 212 also receives as control inputs a miss0 and miss1 signal. These 4-bit miss signals are logical inversions of the hit0 and hit1 signals that are sent from the directory array 206 to the data array 202. Another input that the selection circuit 212 is a fill buffer status from the fill buffer 208. Selection circuit 212 provides an updated 15-bit status0 signal and an updated 15-bit status 1 signal to status array 204. The operation of selection circuit 212 will be discussed in more detail below. The fill buffer 208, the next constituent of the data cache unit 102 to be discussed, is used when a cache miss occurs. A cache miss occurs when the line of memory requested by a processor MPU0, MPU1 is not already in the data cache unit 102. Fill buffer 208 receives the 32-bit address signal (add_MPU0) from first processing unit 104 and the 32-bit address signal (add_MPU1) from second processing unit 106. Fill buffer 208 receives a 64-bit data signal from main memory 108 and holds the data from main memory 108 that is to be stored in the data cache unit 102. FIG. 2 illustrates that fill buffer 208 includes a data register 220 that stores data to be written into data array 202. Data register 220 stores 256 bits of data. Fill buffer 208 provides the 256-bit data signal to data array 202. Fill buffer 208 also sends a 64-bit data signal, data_MPUO, and a second 64-bit data signal, data_MPU1, to the data array 202. Finally, fill buffer 208 also provides a fill buffer hit status to the data array 202 and to the selection circuit 212.

[0042]FIG. 2 further illustrates that fill buffer 208 also includes an address register 222 that stores addresses and certain status bits associated with data to be written into the data array. Address register also stores the “way” to which the data is to be stored in the data array. The operation of fill buffer 208 is described in more detail below.

[0043] Finally, our discussion of the data cache unit 102 constituents turns to the write back buffer 210. Write back buffer 210 serves, when a cache miss occurs, as a temporary place holder for dirty blocks until they can be pushed to memory. A “dirty” block is a block whose contents have been modified since the block was last obtained from main memory 108. Before a dirty block is stored in the write back buffer 210, the selection circuit 212 assigns it a “victim” number that is stored in the status word 300 (see M0, M1, M2, M3 in FIG. 3, discussed below). A victim number is the particular way chosen, according to the cache replacement policy, to be the place holder on a cache miss for a given set. Once a dirty block is “victimized”, then data may be read out of the dirty victim and latched into the write back buffer 210. FIG. 2 illustrates that the write back buffer 210 receives from the data array 202 a 64-bit data signal (datum0) associated with first processing unit 104 and also receives from the data array 202 a 64-bit data signal (datum1) associated with second processing unit 106. The write back buffer also receives from the directory array 206 a data-out signal (rdata0) for first processing unit 104 and a data-out signal (rdata1) for second processing unit 106. The data-out signals (rdata0, rdata1) contain the tag address of the dirty block. FIG. 2 illustrates that the write back buffer 210 also receives a set_addr signal for each processing unit 104, 106, which indicates the set address for the dirty block. The set_addr signals are made up of all or part of the bits present in add_MPU0 and add_MPU1.

[0044]FIG. 4 shows a block diagram of shared write back buffer 210. The write back buffer is shared by MPU0 104 and MPU1 106 (as is illustrated in FIG. 2) because there is only one write back buffer 210 in the data cache unit 102. FIG. 4 illustrates that the shared write back buffer 210 includes address bank 402, data bank 404, and selector circuit 406, which is controlled by the cache control logic (not shown). Data bank 404 of shared write back buffer 210 comprises two entries, each entry consisting of a cache-line-sized data register 404 a, 404 b. In the preferred embodiment, each data register 404 a, 404 b stores 256 bits of data that it receives from the data array 202. Similarly, address bank 402 of the write back buffer 210 also comprises two entries 402 a, 402 b, with each entry able to store the address of a dirty candidate that should be written back to main memory 108. One skilled in the art will recognize that the architecture of a write back buffer may have many variations and should not be limited to the physical implementation depicted in FIG. 4. A write back buffer can have several levels. For instance, a shared write back buffer could be implemented in multiple levels, instead of the two-entry address bank 402 and data bank 404 illustrated in FIG. 4, with each MPU 104, 106 having a lower-level separate buffer that communicates with a higher-level shared buffer. Similarly, a shared write back buffer could have a shared write back buffer communicating with a lower-level split write back buffer Furthermore, one skilled in the art will realize that, although the buffer components 404 a, 404 b, 404 a, 404 b, 406 are logically connected, they need not necessarily reside physically adjacent to each other within the processor architecture. (As an analogous example, one should note that, in the preferred embodiment, the fill buffer data registers 222 a, 222 b illustrated in FIG. 2 are logically associated with the fill buffer 208, but they are physically partitioned as part of the data array 202.)

[0045] Address entries 402 a, 402 b further include an f bit, f1 and f2, respectively, that indicates whether each respective address entry 402 a, 402 b is full. For example, if both f1 and f2 contain a value of binary one, then write back buffer 210 is full. The f1 and f2 bits are set by control logic associated with the write back buffer 210. Shared write back buffer 210 provides signal “full” to the selection circuit 212 for use in the cache replacement policy described in more detail below.

[0046] The present invention's use of a single shared write buffer 210 comprising multiple data registers 404 a, 404 b and address entries 402 a, 402 b departs from prior art data cache units that contain a separate write back buffer allocated to each processor. The preferred embodiment of the present invention, with its shared write back buffer 210, provides for more efficient usage of the data registers 404 a, 404 b. Because write back operations slow or halt the operation of the data cache unit 102, providing a shared write back buffer 210 reduces delays in the operation of the data cache unit 102 by reducing write back operations. For instance, in a prior art system, when a first processor causes a write of a first data word to an associated first write back buffer but the associated first write back buffer is filled to capacity, a data word stored in the first write back buffer is written back to memory. In contrast, FIG. 4 illustrates that the present invention provides a second register 404 b with capacity to store a data word. Applying the above example to the present invention, the write back operation could be avoided by writing the first data word to the second data register 404 b. If both entries of the write back buffer 210 is full, then it operates in a first-in-first-out (FIFO) fashion. A data word that arrives when the write back buffer 210 is full causes write back buffer 210 to write the oldest data word stored in the write back buffer back to main memory 108.

[0047] A further advantage of the shared write back buffer design of the present invention is that it requires less hardware compared to that necessary for systems comprising separate write back buffers for each processor. A single write back buffer 210 allows use of a single line to connect the write back buffer 210 to memory 108 and eliminates the need for logic to coordinate the access of multiple buffers to memory. In other words, the shared write back buffer 210 requires no logic to coordinate which write back buffer writes to memory at a given time.

[0048] Still referring to FIG. 4, control logic associated with the write back buffer 210 implements the buffer 210 as a circular queue to effect the FIFO operation discussed above. This control logic, labeled in FIG. 4 as selector circuit 406, comprises address selector circuit 406 a and data selector circuit 406 d. Address selector circuit 406 a determines which address bank 402 to store an incoming address. Data selector circuit 406 d determines in which data bank 404 an incoming data word is stored.

[0049] The present invention requires that the above-described constituent components of the data cache unit 102 perform various functions. Two of these functions are the hit/miss calculation and application of the cache replacement policy when a miss occurs. To aid the discussion of these functions, FIG. 6 shows portions of the data cache unit 102: directory array 206, data array 202, and status array 204. While each data array 202 includes four logical banks 240 a-240 d in the preferred embodiment, FIG. 6 shows only two logical banks 240 a and 240 b for clarity of illustration. Similarly, although the preferred embodiment of directory array 206 comprises four logical banks 260 a-260 d, only two, 260 a and 260 b, are shown in FIG. 6.

[0050] The hit/miss logic is triggered by a request for load or store access from the MPU 104, 106 to the data cache unit 102. When a load or store access is requested by an MPU 104, 106, the MPU must specify an address for the memory location to be accessed. FIG. 6 illustrates that MPUO and MPU1 each provide a 32-bit main memory address (respectively, “add_MPUO” and “add_MPU1”) to directory array 206, data array 202, and status array 204. In this example, a data word having a unique main memory address can be stored in only a single set but among any of two ways. Each main memory address is converted into a set number, either a 0 or 1, in a conventional manner. In response to the set number, each of the two logical banks 240 a, 240 b of data array 202 provide data to respective multiplexers 230 a and 230 b, corresponding to data requested by respective MPU0 and MPU1. Simultaneously, in response to the set number, each of the two logical banks, 260 a and 260 b, of directory array 206 provide two main memory addresses (so-called “directory addresses”) to respective comparators 270 a and 270 b.

[0051] Status array 204 provides to comparators 270 a and 270 b a “valid0” signal for data accesses by MPUO and a “valid1” signal for data accesses by MPU1. A high value on these signals indicates that the respective way is valid and therefore is not a good candidate to be overwritten. Signals “valid0” and “valid1” are derived from a status word, shown in FIG. 3, that indicates information about each way of each set.

[0052] When a comparator 270 a, 270 b receives a matching “add_MPUO” and directory address as well as “valid0” indicating the way is valid, is issues signal “hit0” to multiplexer 230 a of data array 206 to select an output from the two logical banks 240 a and 240 b of data array 202 to provide to MPU0 104. A similar operation occurs for MPU1 106, where the comparator 270 a, 270 b that receives a matching “add_MPU1” and directory address as well as “valid1” indicating the way is valid, issues signal “hit1” to multiplexer 230 b to select an output from the two logical banks 240 a, 240 b of data array 202 to provide to MPU1 106.

[0053] Directory array 206 also provides a positive “cache_hit0” signal or “cache_hit1” signal (shown in FIG. 1) to the respective MPU0 104 or MPU1 106 to indicate to the requesting MPU that a cache hit has occurred. Otherwise, directory array 206 indicates to the requesting MPU that the requested data word is not present in data cache unit 102 (i.e., a cache miss) through a low value of signal “cache_hit0” or “cache_hit1”.

[0054]FIG. 7 illustrates the cache replacement policy 700 that is performed by the selection circuit 212 at the same time that the data cache unit 102 performs the above-described hit/miss logic. The two functions are performed in parallel so that the victim number will be available in the case of a cache miss. The policy 700 is a process that selects a way to serve as a candidate to be overwritten, while attempting to avoid writing a dirty candidate into the write back buffer 210. In alternative embodiments, the policy 700 may take the condition of other shared resources into account when selecting a way to serve as a candidate to be overwritten. The preferred embodiment considers the state of the write back buffer 210 because, where the write back 210 buffer is crowded, writing a dirty candidate into the write back buffer 210 triggers a time-consuming write back operation. Selection circuit 212 determines dirty candidates for the first processing unit 104 and the second processing unit 106 simultaneously.

[0055] Still referring to FIG. 7, a request from an MPU 104, 106 to access the cache triggers performance of the cache replacement policy 700. The initial step 702 in the process is to determine whether all four ways corresponding to the address associated with the potential miss are valid. The selection circuit 212 accomplishes this by accessing the status word of FIG. 3, which indicates which ways for a particular set are valid. If a way is valid, it is not as good a candidate for being overwritten as a way that does not contain meaningful data. Thus, if any ways associated with the set of interest are not valid, then the selection circuit 212 selects an invalid way in step 703 as a candidate to be overwritten in a subsequent cache store. Choosing the candidate in 703 includes analyzing the highest way number (3) to the lowest way number (0) and selecting the highest way number that is marked as invalid in the status word. The process then ends at completion step 704.

[0056] If all ways are valid, then the data cache unit 102 has no choice but to overwrite a valid way in the case of a miss. In such case, it is preferable to select a way that will not trigger a write back operation. In other words, it is preferable to select a valid way that is not dirty. To do so, the selection circuit 212 first performs any traditional cache replacement algorithm in step 705, such as the NMRU algorithm. To facilitate step 705, Bits R1 and R2 of the status word of FIG. 3 together represent a reference way, with 00 in bits R1 and R2 representing the least significant way and 11 representing the most significant way. For instance, to apply the NMRU algorithm, bits R1 and R2 represent the most recently accessed way. To apply the LRU algorithm, bits R1 and R2 represent the least recently used way.

[0057]FIG. 7 shows that, once the potential candidate is identified by step 705, step 706 determines whether the write back buffer is crowded. This determination is made by the selection circuit 212, which analyzes the full signal provided by the write back buffer 210 and also analyzes other indicators of crowdedness, such as unacceptably long cycle time to load the write back buffer 210. If the write back buffer 210 is crowded, then the selection circuit 212 determines in step 708 whether the potential candidate identified in step 705 is dirty. One skilled in the art will recognize that the order of steps 705, 706, and 708 are not critical. Rather, any combination of steps may be performed, as long as the combination selects a candidate and determines whether (candidate is dirty) AND (write buffer is full). In alternative embodiments, one might perform step 706 before 708. In another alternative embodiment, one might check if the write buffer is crowded 706 before applying the cache replacement algorithm.

[0058] If the shared write back buffer 210 is not full, then the process 700 ends at completion step 707. In such case, a write back operation will not be triggered because a candidate has been identified, and there is room in write back buffer 210 if the candidate should prove to be dirty. If, on the other hand, the write back buffer is crowded, then additional processing must be performed if the candidate identified in step 705 is dirty. Accordingly, FIG. 7 illustrates that the selection circuit 212 determines whether the candidate is dirty in step 708, which is only performed after a candidate has been selected in step 705 AND the selection circuit 212 has determined in step 706 that the write back buffer 210 is crowded. To determine whether a candidate is dirty, the data cache unit 201 determines whether the candidate differs from its parent with the same address in main or secondary memory. If they differ, then the candidate is “dirty” and the parent must be replaced with the dirty candidate in a write back operation. The corresponding status word status0 or status1 indicates which ways are “dirty”by bits D0-D3. If the candidate is not dirty, then the process completes at completion step 707 because the parent need not be updated. The candidate is that identified during determination step 705.

[0059]FIG. 7 illustrates that, if the candidate is identified as dirty in step 708, the selection circuit attempts to identify a non-dirty candidate in order to avoid triggering a write back operation. FIG. 7 illustrates that, if a dirty candidate has been identified AND the write back buffer 210 is crowded, then the selection circuit 212 checks in step 709 to determine if a non-dirty candidate exists for the set. The “dirty” bits D0-D3 for other three ways of the dirty candidate are examined in step 709 to determine whether the remaining three ways are dirty. If any non-dirty ways exist, one is chosen as the candidate and the process 700 ends at completion step 710. The dirty candidate becomes a non-candidate, thus avoiding storage of a dirty candidate into write back buffer 210, which would trigger a write back operation where shared write back buffer 210 is crowded.

[0060] But if all ways are dirty and the write back buffer is crowded, then the dirty candidate chosen in step 705 is as good a choice as any and no new candidate is chosen. This will result in the dirty candidate being overwritten with the new data selected by the processor, so the current contents of the candidate is therefore stored in the write back buffer 210 in step 711. If shared write back buffer 210 is full, then the contents of the write back buffer are written back to their associated main memory locations and subsequently the dirty candidate is placed into the write back buffer.

[0061] After the candidate is chosen, selection circuit 212 updates the status word associated with the candidate to indicate a miss in the way of the candidate. Setting the miss bit for a particular way indicates that the way was chosen as the candidate for a prior cache miss. Selection circuit 212 generates the 4-bit signals “miss0” and “miss1” to indicate which way associated with addresses provided by respective MPU0 and MPU1 are to be marked as a miss. Selection circuit 212 implements process 700 of FIG. 7.

[0062] Selection circuit 212 receives the miss signal “miss0” and alters the status word of the candidate associated with MPU0 so that appropriate miss bit M0, M1, M2, or M3 is set according to which way “miss0” represents. Similarly, selection circuit 212 responds to the miss signal “miss1” by altering the status word of the candidate associated with MPU1 so that appropriate miss bit M0, M1, M2, or M3 is set according to which way “miss1” represents. The status words provided by selection circuit 212 to status array 204 overwrite status words corresponding to “add_MPU0” and “add_MPU1” that caused the cache miss.

[0063] Referring to FIG. 2, the updated status words status0 and status1 are routed to the status array 204. Subsequently, the candidate chosen during execution of the cache replacement policy 700 is overwritten in a cache refill operation. Fill buffer 208 stores data written into the data cache unit 102 on a cache miss. Fill buffer 208 writes the data to the appropriate location in data array 202 depending on an associated way and associated main memory address. Using the way candidate determined in the cache replacement policy 700, data from the bottom (i.e., “first in”) entry of the appropriate address register 222 is written to the data array 202. Subsequently, the miss bit in the status word associated with the overwritten data word is returned to 0 to indicate no miss is associated with the data word.

[0064]FIGS. 1 and 2 illustrate that MPU0 104 and MPU1 106 share fill buffer 208, write back buffer 210, and the other resources making up the data cache unit 102. This scheme makes it is possible for multiple processing units, such as MPU0 104 and MPU1 106, to request access to the same resource, or storage space within the same resource. When the multiple processing units request access to the same resource during the same cycle, the requests are said to “collide,” creating a collision. In other words, a “collision” occurs when two processing units attempt to access the same resource during the same cycle. The contention that results in a collision can occur, for instance, when multiple processors try to access the fill buffer 208 during the same cycle, when multiple processors attempt to access the shared write-back buffer 210 during the same cycle, and when multiple processors attempt to write to the same memory address (or cache line) or perform a BLKZERO instruction on the same cache line during the same cycle. A collision can also occur when, for instance, during the same cycle, one processing unit attempts to store to an address in a resource of the data cache unit 102 and another processing unit attempts to perform a load from the same location. As another example, a collision can also occur when both processing units attempt to perform a load access to the same address. In this situation, the value of add_MPU0 and add_MPU1 is the address at issue, as is any subset thereof (such as, for instance, the set address contained in add_MPU0 or add_MPU1). Although it would not at first appear that a collision could occur on a load operation, since a load does not write to memory, the collision occurs in the updating of the status words. The status words are updated for load operations, and if two processors attempt to write to the same status word during the same cycle, a collision will occur.

[0065]FIG. 8 shows an arbitration circuit 800 that enables the data cache unit 102 to efficiently handle colliding requests to access a shared resource from multiple processing units. The arbitration circuit 800, for use by or within data cache unit 102, includes an arbitration protocol circuit 802 and a retry signal generator 804. The arbitration protocol circuit 802 resolves which processing unit may obtain access to the contention resource when a collision occurs.

[0066] For example, MPU0 104 and MPU1 106 may trigger a cache miss and have dirty candidates to store in the write back buffer 210. In such case, the arbitration protocol circuit 802 receives signals “address_valid0” and “address_valid1” from respective processing units. Signals “address_valid0” and “address_valid1” represent whether addresses provided by respective processing units are valid. The address_valid indicators notify the arbitration protocol circuit 802 that it is necessary to “arbitrate” simultaneous processor requests for access to the same resource. That is, the arbitration protocol circuit 802 must determine which processor's request will be honored during the applicable cycle. This type of collision is detected by the arbitration protocol circuit 802 by making a comparison of add_MPU0 and add_MPU1, or a subset of the bits therein, when address_valid0 and address_valid1 are both set. If the address bits indicate that each processor is attempting to access the same address, and the addresses are valid, then arbitration is necessary.

[0067] The arbitration protocol circuit 802 can also detect a second type of collision. In some cases, a collision occurs regardless of the values of the MPU address values. When two processors attempt to access the write buffer or fill buffer during the same cycle, a collision occurs. It is not necessary to compare the two MPU address values in such case. Instead, the arbitration protocol circuit 802 receives a transaction-type indicator from each processing unit. If the transaction-type indicators indicate that multiple processing units have attempted to access the write buffer or fill buffer during the same cycle, a collision has occurred regardless of the MPU address values.

[0068] After making its determination that a collision has occurred, the arbitration policy circuit makes a determination as to which processor will be allowed to make the requested access. The default arbitration protocol implemented in the preferred embodiment of the arbitration protocol circuit 802, in order to determine which processor will receive the requested access, is discussed in further detail below. After it has made the determination of which processor will receive the requested access, the arbitration protocol circuit 802 generates 2-bit signals “prefer0” and “prefer1” that respectively represent which processor's attempted access will be preferred during the applicable cycle. Prefer0 is designed to be the logical complement of prefer1, and vice versa, such that both should never be set at the same time. The value for the preferred MPU is the opposite of the value for the non-preferred MPU. These “prefer0” and “prefer1” indicators are retained by the arbitration protocol circuit 802 for its next iteration, to help determine which processing unit should be favored on the next collision. Arbitration protocol circuit 802 provides signals “prefer0” and “prefer1” to the retry signal generator 804.

[0069] Retry signal generator 804 generates signals “retry0” and “retry1” based on the value of the “prefer0” and “prefer1” indicators. If the “prefer” indicator for an MPU indicates that the MPU's requested access will be honored in the applicable cycle, then no retry is necessary, and the retry signal generator 804 will so indicate with the appropriate “prefer” indicator. In contrast, the retry signal generator 804 indicates with the value of the “retry” indicator to the non-preferred MPU that a retry is necessary. Indication that a retry is necessary notifies the non-preferred processing unit to ignore data returned in response to the attempted data cache unit 102 access and to retry the load or store access.

[0070] Regarding the arbitration protocol, the present invention implements in the arbitration protocol circuit 802 a default arbitration protocol for store collisions to the fill buffer 208, an arbitration protocol for store collisions to the shared write back buffer 210, an arbitration protocol for load collisions, and an arbitration protocol for load/store collisions. The arbitration protocol circuit 802 performs one of the policies based on the values of transaction type indicators received by the arbitration circuit 800 from each processing unit 104, 106. These default policies, described below, are not strict “fairness” policies, because they do not necessarily prefer the processing unit that was non-preferred on the last collision. Instead, the arbitration protocol circuit 802 usually attempts to prefer the processing unit that has been non-preferred more often than the other processing unit (except that loads are always preferred over stores). This preference is implemented by performing a repeated selection pattern where each processing unit is preferred during a predetermined number of sequential collisions. The default policies described below are programmable and therefore may be altered to adjust the default policy, implement a strict fairness policy, or implement any other preferable arbitration protocol.

[0071] Arbitration circuit 800 includes an arbitration protocol for attempts by multiple processing units to load from the same address space in data cache unit 102 during the same cycle. In such case, the arbitration protocol circuit 802 allows the first processing unit 104 access in the desired address space in a predetermined number of sequential collisions (M) and allows the second processing unit 106 access to the desired address space in a predetermined number of sequentially-following collisions (N). In the preferred embodiment, the first processing unit receives access to the desired address space in the first and second sequential collisions (i.e., M=2), with the second processing unit gaining access to the desired address space in the third and fourth sequential collisions (i.e., N=2). In the first and second simultaneous attempts to load from the same address space in data cache unit 102 by the first and second processing units, the first processing unit 104 is allowed to load requested data. The retry generator 804 supplies “retry1” signal to MPU1, informing MPU1 to retry the access and to ignore the data returned in response to the attempted access of the data cache unit. In the sequentially following third and fourth colliding attempts to load from the same address space in data cache unit 102 by the first and second processing units 104, 106, second processing unit 106 is allowed to load requested data and retry generator 804 supplies a “retry0” signal to the first processing unit 104, informing the first processing unit 104 to retry the access and to ignore data returned in response to the attempted access of the data cache unit.

[0072] Arbitration circuit 800 also includes an arbitration protocol to resolve collisions involving stores to the data register of fill buffer 208. Where the first processing unit 104 and the second processing unit 106 both request during the same cycle that main memory 108 write data to the data register of fill buffer 208, the arbitration protocol favors the first processing unit in N sequential collisions and the second processing unit 106 in the following M sequential collisions. Again, in the preferred embodiment, M and N are equal to two (2). For example, in first and second colliding requests to write to the data register of fill buffer 208 by first and second processing units, the request by the first processing unit 104 is allowed. The retry generator 804 provides signal “retry1” to the second processing unit 106 informing the second processing unit 106 to retry the write. In sequentially following third and fourth colliding requests to write to the data register of fill buffer 208 by the first and second processing units 104, 106, the request by the second processing unit 106 is allowed and the retry generator 804 supplies a “retry0” signal to the first processing unit 104, informing the first processing unit 104 to retry the write operation.

[0073] Arbitration circuit 800 also includes an arbitration protocol to resolve collisions involving stores to shared write back buffer 210. Where MPU0 and MPU1 trigger a cache miss and require that a dirty candidate be stored in write back buffer 210, the fairness protocol favors the first processing unit 104 in M sequential collisions and the second processing unit 106 in the following N sequential collisions. In the preferred embodiment, M and N are equal to two (2). For example, in first and second colliding requests by the first and second processing units 104, 106 to store dirty candidates in shared write back buffer 210, the first processing unit's 104 dirty candidate is stored. The retry generator 804 provides signal “retry1” to MPU1 informing the second processing unit 106 to retry the storage request. In sequentially-following third and fourth colliding requests by the first and second processing unit 104, 106 to store dirty candidates in shared write back buffer 210, the second processing unit's 106 dirty candidate is stored. The retry generator 804 provides signal “retry0” to the first processing unit 104 informing the first processing unit 104 to retry the storage request.

[0074] There are also instances where the first and second processing units 104, 106 both attempt during the same cycle to store and load to the same location in shared write back buffer 210, fill buffer 208, or other location in the data cache unit 102. Load and store operations cannot be performed to the same location simultaneously. In such cases, load operations are favored over store operations and the processing unit that requests a store operation will be told to retry through the “retry” signal generated by the retry generator 804. Load operations occur much more frequently than store operations. Thus load operations are favored over store operations to minimize delays in the operation of the data cache unit 102.

OTHER EMBODIMENTS

[0075] The above-described embodiments of the present invention are illustrative and not limiting. It will thus be obvious to those skilled in the art that various changes and modifications may be made without departing from this invention in its broader aspects.

[0076] For example, the fill buffer and data array can store larger or smaller amounts of data than in the specific embodiments disclosed. Also for example, more media processor units may share use of the data cache unit. Also for example, the discussed connections are descriptive and do not limit other connections or other size connections within system 100.

[0077] As another example, the shared resources considered in the cache replacement policy are not limited to the write back buffer. In addition to, or instead of, the write back buffer, other shared resources that may be considered include a cross bar switch, memory controller, and memory controller buffers. 

What is claimed is:
 1. A method for selecting a candidate to mark as overwritable in the event of a cache miss, comprising: receiving a cache access request, wherein said cache access request is associated with a main memory address; determining whether the contents of said main memory address are present in a data cache; associating, when the contents of said main memory address are not present in said data cache, said main memory address with a set within said data cache, wherein said set includes a plurality of ways; determining whether any of said plurality of ways is an invalid way; choosing, when said invalid way exists, said invalid way as the candidate; where no said invalid way exists among said set, applying a cache replacement policy to select a way among said set as a preliminary candidate, wherein said cache replacement policy is based on the state of at least one affected resource.
 2. The method of claim 1 wherein said at least one affected resource comprises a cross bar switch.
 3. The method of claim 1 wherein said at least one affected resource comprises a memory controller.
 4. The method of claim 1 wherein said at least one affected resource comprises a memory controller buffer.
 5. The method of claim 1 wherein said at least one affected resource comprises a write back buffer.
 6. The method of claim 5 wherein said cache replacement policy comprises: determining whether said write back buffer is crowded; where said write back buffer is crowded, determining whether said preliminary candidate is dirty; where (said write back buffer is not crowded) OR (said write back buffer is crowded AND said preliminary candidate is not dirty), choosing said preliminary candidate as the candidate; and where said write back buffer is crowded and said preliminary candidate is dirty, storing the contents of said preliminary candidate in said write back buffer and choosing said preliminary candidate as the candidate.
 7. A computer system for selecting a candidate to mark as overwritable in the event of a cache miss comprising: a main memory; a data cache that is shared by a plurality of processing units; an address input for receiving a main memory address in said main memory; a hit/miss circuit that determines whether the contents of said main memory address are present in said data cache; a cache control circuit that associates said main memory address with a set within said data cache when the contents of said main memory address are not present in said data cache, wherein said set includes a plurality of ways; an invalidity circuit that determines whether any of said plurality of ways is an invalid way and that selects said invalid way as the candidate; a cache replacement circuit that, where no invalid ways exist among said set, applies a cache replacement policy to select a way among said set as a preliminary candidate, wherein said cache replacement policy is based on the state of at least one affected resource.
 8. The computer system of claim 7 wherein said at least one affected resource comprises a cross bar switch.
 9. The computer system of claim 7 wherein said at least one affected resource comprises a memory controller.
 10. The computer system of claim 7 wherein said at least one affected resource comprises a memory controller buffer.
 11. The computer system of claim 7 wherein said at least one affected resource comprises a write back buffer.
 12. The computer system of claim 11 wherein said cache replacement circuit comprises: logic that determines whether said write back buffer is crowded; logic that determines, where said write back buffer is crowded, whether said preliminary candidate is dirty; logic that selects said preliminary candidate as the candidate when (said write back buffer is not crowded) OR (said write back buffer is crowded AND said preliminary candidate is not dirty); and logic that stores the contents of said preliminary candidate in said write back buffer and selects said preliminary candidate as the candidate, when said write back buffer is crowded and said preliminary candidate is dirty.
 13. A circuit that selects a candidate to mark as overwritable in the event of a cache miss, comprising: logic that receives a cache access request, wherein said cache access request is associated with a main memory address; logic that determines whether the contents of said main memory address are present in a data cache; logic that associates, when the contents of said main memory address are not present in said data cache, said main memory address with a set within said data cache, wherein said set includes a plurality of ways; logic that determines whether any of said plurality of ways is an invalid way; logic that selects, if said invalid way exists, said invalid way as the candidate; where no said invalid way exists among said set, performing a cache replacement logic to select a way among said set as a preliminary candidate, wherein said cache replacement logic is based on the state of at least one affected resource.
 14. The circuit of claim 13 wherein said at least one affected resource comprises a cross bar switch.
 15. The circuit of claim 13 wherein said at least one affected resource comprises a memory controller.
 16. The circuit of claim 13 wherein said at least one affected resource comprises a memory controller buffer.
 17. The circuit of claim 13 wherein said at least one affected resource comprises a write back buffer.
 18. The circuit of claim 17 wherein said cache replacement logic comprises: logic that determines whether said write back buffer is crowded; logic that determines, when said write back buffer is crowded, whether said preliminary candidate is dirty; logic that selects, where (said write back buffer is not crowded) OR (said write back buffer is crowded AND said preliminary candidate is not dirty), said preliminary candidate as the candidate; and logic that stores, where said write back buffer is crowded and said preliminary candidate is dirty, the contents of said preliminary candidate in said write back buffer and that selects said preliminary candidate as the candidate. 