Counter-based victim selection in a cache memory

ABSTRACT

A set-associative cache memory includes a bank of counters including a respective one of a plurality of counters for each cache line stored in a plurality of congruence classes of the cache memory. Prior to receiving a memory access request that maps to a particular congruence class of the cache memory, the cache memory pre-selects a first victim cache line stored in a particular entry of a particular congruence class for eviction based on at least a counter value of the victim cache line. In response to receiving a memory access request that maps to the particular congruence class and that misses, the cache memory evicts the pre-selected first victim cache line from the particular entry, installs a new cache line in the particular entry, and pre-selects a second victim cache line from the particular congruence class based on at least a counter value of the second victim cache line.

BACKGROUND OF THE INVENTION

The present invention relates in general to data processing and, inparticular, to counter-based selection of a victim for replacement froma cache memory.

A conventional symmetric multiprocessor (SMP) computer system, such as aserver computer system, includes multiple processing units all coupledto a system interconnect, which typically comprises one or more address,data and control buses. Coupled to the system interconnect is a systemmemory, which represents the lowest level of memory in themultiprocessor computer system and which generally is accessible forread and write access by all processing units. In order to reduce accesslatency to instructions and data residing in the system memory, eachprocessing unit is typically further supported by a respectivemulti-level cache hierarchy, the lower level(s) of which may be privateto or shared by one or more processor cores.

In such systems, the caches of the processing units are typicallyimplemented as set-associative caches, which map cache lines of data toparticular congruence classes within the caches based on a predeterminedset of bits within the real memory addresses of the cache lines. Eachcaches typically selects which of the multiple data granules in each ofcongruence class to evict based on a selected eviction policy, such asmost recently used (MRU), least recently used (LRU) or the like.

BRIEF SUMMARY

In one embodiment, a set-associative cache memory includes a pluralityof congruence classes each including multiple entries for storing cachelines of data. A respective one of a plurality of counters is maintainedfor each cache line stored in the multiple entries. In response to amemory access request, the cache memory selects a victim cache linestored in a particular entry of a particular congruence class foreviction from the cache memory by reference to at least a counter valueof the victim cache line. The cache memory also receives a new cacheline of data for insertion into the particular entry and an indicationof a coherence state of the new cache line at a data source from whichthe cache memory received the new cache line. The cache memory installsthe new cache line in the particular entry and sets an initial countervalue of the counter for the new cache line based on the receivedindication of the coherence state at the data source.

In one embodiment, the cache memory alternatively or additionallyreceives in conjunction with the new cache line an indication of adistance from the cache memory to a data source from which the cachememory received the new cache line. In this embodiment, the cache memorysets the initial counter value of the counter for the new cache linebased on at least the received indication of the distance.

In one embodiment, a set-associative cache memory includes a bank ofcounters including a respective one of a plurality of counters for eachcache line stored in a plurality of congruence classes of the cachememory. Prior to receiving a memory access request that maps to aparticular congruence class of the cache memory, the cache memorypre-selects a first victim cache line stored in a particular entry of aparticular congruence class for eviction based on at least a countervalue of the victim cache line. In response to receiving a memory accessrequest that maps to the particular congruence class and that misses,the cache memory evicts the pre-selected first victim cache line fromthe particular entry, installs a new cache line in the particular entry,and pre-selects a second victim cache line from the particularcongruence class based on at least a counter value of the second victimcache line.

In one embodiment, a set-associative cache memory has a plurality ofcongruence classes each including multiple entries for storing cachelines of data. The cache memory includes a bank of counters, whichincludes a respective one of a plurality of counters for each cache linestored in the plurality of congruence classes. The cache memory selectsvictim cache lines for eviction from the cache memory by reference tocounter values of counters within the bank of counters. A dynamicdistribution of counter values of counters within the bank of countersis determined. In response, an amount counter values of counters withinthe bank of counters are adjusted on a cache miss is adjusted based onthe dynamic distribution of the counter values.

All objects, features, and advantages of the present invention willbecome apparent in the following detailed written description.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 is a high level block diagram of an exemplary processing unit inaccordance with the present invention;

FIG. 2 is a high level block diagram of an exemplary data processingsystem in formed of processing units as shown in FIG. 1;

FIG. 3 is a time-space diagram of an exemplary operation on theinterconnect fabric of the data processing system of FIG. 2, whichincludes a request phase, a partial response phase and a combinedresponse phase;

FIG. 4 is a time-space diagram of an exemplary operation of system-widescope within the data processing system of FIG. 2;

FIG. 5 illustrates an exemplary embodiment of a lower level cache, suchas an L2 cache;

FIG. 6 is a high level block diagram of replacement logic in accordancewith an embodiment of the present invention;

FIG. 7 is a high level logical flowchart of an exemplary method ofinitializing a bank of replacement logic counters corresponding toentries of the congruence classes of a set-associative cache inaccordance with an embodiment of the present invention;

FIG. 8 is a high level logical flowchart of an exemplary method ofmanaging a bank of replacement logic counters in accordance with anembodiment of the present invention;

FIG. 9 is a high level logical flowchart of an exemplary method ofmanaging a bank of replacement logic counters in accordance with anotherembodiment of the present invention;

FIG. 10 is a block diagram of count value adjustment (CVA) logic inaccordance with one embodiment; and

FIG. 11 illustrates an exemplary design process.

DETAILED DESCRIPTION

With reference now to the figures and, in particular, with reference toFIG. 1, there is illustrated a high level block diagram of an exemplaryembodiment of a processing unit 100 for a multiprocessor data processingsystem in accordance with the present invention. In the depictedembodiment, processing unit 100 is a single integrated circuit includingmultiple processor cores 102 a, . . . , 102 k for independentlyprocessing instructions and data. Each processor core 102 includes atleast an instruction sequencing unit (ISU) 104 for fetching and orderinginstructions for execution and one or more execution units 106 forexecuting instructions. The instructions executed by execution units 106may include, for example, fixed and floating point arithmeticinstructions, logical instructions, and memory access instructions thatrequest read or write access to a memory block. In at least someembodiments, each processor core 102 is multithreaded and can supportsimultaneous execution of multiple hardware threads of execution.

The operation of each processor core 102 a, . . . , 102 k is supportedby a multi-level memory hierarchy having at its lowest level one or moreshared system memories 132 (only one of which is shown in FIG. 1). Asdepicted, processing unit 100 includes an integrated memory controller(IMC) 124 that controls read and write access to system memory 132 inresponse to requests received from processor cores 102 a, 102 k andoperations snooped on an interconnect fabric (described below) by IMC124.

In the illustrative embodiment, the memory hierarchy of processing unit100 includes at its upper levels one or more levels of cache memory. Inthe depicted example, the cache memory hierarchy of processing unit 100includes a store-through level one (L1) cache 108 within and private toeach processor core 102 a, 102 k and a respective store-in level two(L2) cache 110 for each of processor cores 102. Although the illustratedcache hierarchy includes only two levels of cache, those skilled in theart will appreciate that alternative embodiments may include additionallevels (L3, L4, etc.) of on-chip or off-chip in-line or lookaside cache,which may be fully inclusive, partially inclusive, or non-inclusive ofthe contents the upper levels of cache. Further, in some embodiments,one or more levels of cache may be shared by multiple processor cores102. For example, in one embodiment, each vertical cache hierarchyadditionally includes an L3 cache configured as a victim cache that ispopulated with cache lines evicted from one or more higher level L2caches.

As further shown in FIG. 1, processing unit 100 includes integratedinterconnect logic 120 by which processing unit 100 may be coupled tothe interconnect fabric as part of a larger multiprocessor dataprocessing system. In the depicted embodiment, interconnect logic 120supports an arbitrary number t1 of “first tier” interconnect links,which in this case include in-bound and out-bound X, Y and Z links.Interconnect logic 120 further supports an arbitrary number t2 of secondtier links, designated in FIG. 1 as in-bound and out-bound A and Blinks. With these first and second tier links, each processing unit 100may be coupled for bi-directional communication to up to t1/2+t2/2 (inthis case, five) other processing units 100. Interconnect logic 120includes request logic 121 a, partial response logic 121 b, combinedresponse logic 121 c and data logic 121 d for processing and forwardinginformation during different phases of operations on the interconnectfabric.

Each processing unit 100 further includes an instance of response logic122, which implements a portion of a distributed coherency signalingmechanism that maintains cache coherency between the cache hierarchy ofprocessing unit 100 and those of other processing units 100. Finally,each processing unit 100 includes an integrated I/O (input/output)controller 128 supporting the attachment of one or more I/O devices 130,such as Electrically Erasable Programmable Read Only Memory (EEPROM),Field Programmable Gate Array (FPGA), etc. I/O controller 128 may issueoperations and receive data on the X, Y, Z, A and B links.

Referring now to FIG. 2, there is depicted a block diagram of anexemplary embodiment of a data processing system 200 formed of multipleprocessing units 100 as shown in FIG. 1. As shown, data processingsystem 200 includes eight processing nodes 202 a 0-202 d 0 and 202 a1-202 d 1, which in the depicted embodiment, are each realized as amulti-chip module (MCM) comprising a package containing four processingunits 100. The processing units 100 within each processing node 202 arecoupled for point-to-point communication by the processing units' X, Y,and Z links, as shown. Each processing unit 100 may be further coupledto processing units 100 in two different processing nodes 202 forpoint-to-point communication by the processing units' A and B links.Although illustrated in FIG. 2 with a double-headed arrow, it should beunderstood that each pair of X, Y, Z, A and B links are preferably (butnot necessarily) implemented as two uni-directional links, rather thanas a bi-directional link.

General expressions for forming the topology shown in FIG. 2 can begiven as follows:

-   -   Node[I][K].chip[J].link[K] connects to        Node[J][K].chip[I].link[K], for all I≠J; and    -   Node[I][K].chip[I].link[K] connects to Node[I][not        K].chip[I].link[not K]; and    -   Node[I][K].chip[I].link[not K] connects either to:        -   (1) Nothing in reserved for future expansion; or        -   (2) Node[extra][not K].chip[I].link[K], in case in which all            links are fully utilized (i.e., nine 8-way nodes forming a            72-way system); and        -   where I and J belong to the set {a, b, c, d} and K belongs            to the set {A,B}.

Of course, alternative expressions can be defined to form otherfunctionally equivalent topologies. Moreover, it should be appreciatedthat the depicted topology is representative but not exhaustive of dataprocessing system topologies embodying the present invention and thatother topologies are possible. In such alternative topologies, forexample, the number of first tier and second tier links coupled to eachprocessing unit 100 can be an arbitrary number, and the number ofprocessing nodes 202 within each tier (i.e., I) need not equal thenumber of processing units 100 per processing node 100 (i.e., J).Moreover, in some implementations, the topology may not be fullypopulated in that some of processing nodes 202 or individual processingunits 100 may be absent, disabled (e.g., for power management orworkload reasons), or otherwise non-functional (e.g., due to a hardwareerror).

Even though fully connected in the manner shown in FIG. 2, allprocessing nodes 202 need not communicate each operation on theinterconnect fabric to all other processing nodes 202. In particular,processing units 100 may broadcast operations with a scope limited totheir own processing node 202 or with a larger scope, such as asystem-wide scope including all processing nodes 202.

Those skilled in the art will appreciate that data processing system 200can include many additional unillustrated components, such asinterconnect bridges, non-volatile storage, ports for connection tonetworks or attached devices, etc. Because such additional componentsare not necessary for an understanding of the present invention, theyare not illustrated in FIG. 2 or discussed further herein.

Referring now to FIG. 3, there is depicted a time-space diagram of anexemplary operation on the interconnect fabric of data processing system200 of FIG. 2. The operation begins when a master 300 (e.g., an L2 cache110 or an I/O controller 128) issues a request 302 on the interconnectfabric. Request 302 preferably includes at least a transaction type(ttype) indicating a type of desired memory access and a resourceidentifier (e.g., target real address) indicating a resource to beaccessed by the request. Common types of requests preferably includethose set forth below in Table I.

TABLE I Request Description READ Requests a copy of the image of amemory block for query purposes RWITM (Read- Requests a unique copy ofthe image of a With-Intent- memory block with the intent To-Modify) toupdate (modify) it and requires destruction of other copies, if anyDCLAIM (Data Requests authority to promote an existing Claim) query-onlycopy of memory block to a unique copy with the intent to update (modify)it and requires destruction of other copies, if any DCBZ Requestsauthority to create a new unique (Data Cache copy of a memory blockwithout regard Block Zero) to its present state and subsequently modifyits contents; requires destruction of other copies, if any CASTOUTCopies the image of a memory block from a higher level of memory to alower level of memory in preparation for the destruction of the higherlevel copy WRITE Requests authority to create a new unique copy of amemory block without regard to its present state and immediately copythe image of the memory block from a higher level memory to a lowerlevel memory in preparation for the destruction of the higher level copyPARTIAL Requests authority to create a new unique copy WRITE of apartial memory block without regard to its present state and immediatelycopy the image of the partial memory block from a higher level memory toa lower level memory in preparation for the destruction of the higherlevel copy

Request 302 is received by snoopers 304 a-304 n, for example, L2 caches110 and IMCs 124, distributed throughout data processing system 200. Ingeneral, with some exceptions, an L2 cache 110 that serves as master 300does not also snoop the same request 302 (i.e., there is generally noself-snooping) because a request 302 is generally transmitted on theinterconnect fabric only if the request 302 cannot be servicedinternally by a processing unit 100. As indicated in FIG. 3, the request302 may be received by the various snoopers 304 at different times.

Each snoopers 304 that receives and processes request 302 preferablyprovides a respective partial response 306 representing the response ofat least that snooper 304 to request 302. An IMC 124 determines itspartial response 306 to provide based, for example, upon whether the IMC124 is responsible for the target real address specified by request 302and whether the IMC 124 has resources available to service the request302. An L2 cache 110 that is one of snoopers 304 may determine itspartial response 306 based on, for example, the availability of its L2cache directory 114, the availability of a snoop logic instance tohandle the request, and the coherence state associated with the targetreal address in its directory.

FIG. 3 illustrates an exemplary format for the partial responses 306 ofsnoopers 304 a-304 n. In this example, each partial response 306includes at least a snooper (SN) state field 307 and may optionallyinclude one or more additional fields, such as a location (LOC) field308 and a source type (SRC) field 309. SN state field 307 indicates thecoherence state, if applicable, at the SN 304 providing the partialresponse 306. Because IMCs 124 have no coherence state to report, the SNstate field 307 of partial responses 306 provided by IMCs 124 may be setto a predetermined value (e.g., all zeroes). LOC field 308, if present,further indicates a location of the snooper 304 within the topology ofdata processing system 200. In various embodiments, the location ofsnooper 304 can be indicated in absolute or relative terms, and further,can be specified utilizing an index to a topology data structure, whichmay be stored in each processing unit 102 at system bring up. Forexample, an absolute location can be specified by indicating anidentifier of a processing node 202 and a position (A, B, C or D) of therelevant processing unit 100 within the identified processing node 202.A relative location within the topology can simply be indicated as “innode” (i.e., within the same processing node 202 as master 300) or “notin node” (i.e., within a different processing node 202 than master 300).Of course, additional levels of granularity can be employed, such as “innode group” (e.g., in the same group of two or four nodes as the master300) and “not in node group.” One advantage of this relative metric oflocation is that the location information can be accumulated within apartial response 306 as it traverses the interconnect fabric on its wayfrom a snooper 304 to response logic 122 by having interconnect logic120 set bits in partial response 306 as node or node group boundariesare crossed. SRC field 309, if present, indicates the device type (e.g.,system memory 132, a cache (e.g., another L2 cache 110 or lower levelcache), or I/O device 130) providing the partial response 306.

The partial responses 306 of snoopers 304 are logically combined eitherin stages or all at once by one or more instances of response logic 122to determine a combined response (CR) 310 of data processing system 200to request 302. In one preferred embodiment, which will be assumedhereinafter, the instance of response logic 122 responsible forgenerating combined response 310 is located in the processing unit 100that issued request 302. Response logic 122 provides combined response310 to master 300 and snoopers 304 via the interconnect fabric toindicate the overall response of data processing system 200 (e.g.,success, failure, retry, etc.) to request 302. If the CR 310 indicatessuccess of request 302, CR 310 may indicate, for example, a data sourcefor a requested memory block, a cache state in which the requestedmemory block is to be cached by master 300, and whether “cleanup”operations invalidating the requested memory block in one or more L2caches 110 are required. In addition, if a snooper 304 is to supply datain response to request 302, the combined response 310 may include thecontents of one or more of SN state field 307, LOC field 308 and/or SRCfield 309 of the snooper 304 that is designated by the combined response310 as the data source for the requested memory block.

In response to receipt of combined response 310, one or more of master300 and snoopers 304 typically perform one or more operations in orderto service request 302. These operations may include supplying data tomaster 300, invalidating or otherwise updating the coherency state ofdata cached in one or more caches, performing castout operations,writing back data to a system memory 132, etc. If required by request302, a requested or target memory block may be transmitted to or frommaster 300 before or after the generation of combined response 310 byresponse logic 122. As indicated in FIG. 3, if a target memory block issupplied by one of snoopers 304 n to master 300 in response to request302, the data tenure 314 includes data field 320 containing the targetmemory block. In addition, data tenure 314 may optionally furtherinclude a SN state field 316 indicating the coherence state, ifapplicable, at the SN 304 n providing the target memory block, a LOCfield 317 specifying the location of snooper 304 n, and a SRC field 318indicating the type of the source device. It will be appreciated that insome embodiments, the additional information indicated by fields 316-318of data tenure 314 may be communicated to master 300 in both data tenure314 and combined response 310, in only one of data tenure 314 andcombined response 310, or partially in data tenure 314 and partially incombined response 310.

In cases like that illustrated in which data tenure 314 is received bymaster 300 prior to combined response 310, receiving an early indicationof the coherence state in SN state field 316 enables master 300 to beginprocessing the target memory block prior to receipt of combined response310 as the combined response 310 that will eventually be received canoften be inferred by master 300 from the coherence state in SN statefield 316.

The partial response 306 of a snooper 304 to a request 302 and theoperations performed by the snooper 304 in response to the request 302and/or its combined response 310 can be described with reference towhether that snooper 304 is a Highest Point of Coherency (HPC), a LowestPoint of Coherency (LPC), or neither with respect to the request addressspecified by the request 302. An LPC is defined herein as a memorydevice or I/O device that serves as the repository for a memory block.In the absence of a HPC for the memory block, the LPC holds the trueimage of the memory block and has authority to grant or deny requests togenerate an additional cached copy of the memory block. For a typicalrequest in the data processing system embodiment of FIGS. 1 and 2, theLPC will be the IMC 124 for the system memory 132 holding the referencedmemory block. An HPC is defined herein as a uniquely identified devicethat caches a true image of the memory block (which may or may not beconsistent with the corresponding memory block at the LPC) and has theauthority to grant or deny a request to modify the memory block.Descriptively, the HPC may also provide a copy of the memory block to amaster 300. Thus, for a typical request in the data processing systemembodiment of FIGS. 1 and 2, the HPC, if any, will be an L2 cache 110.Although other indicators may be utilized to designate an HPC for amemory block, a preferred embodiment of the present invention designatesthe HPC, if any, for a memory block utilizing selected cache coherencystate(s) within the directory of an L2 cache 110.

Still referring to FIG. 3, the HPC, if any, for a memory blockreferenced in a request 302, or in the absence of an HPC, the LPC of thememory block, preferably has the responsibility of protecting thetransfer of ownership of a memory block, if necessary, in response to arequest 302. In the exemplary scenario shown in FIG. 3, a snooper 304 nat the HPC (or in the absence of an HPC, the LPC) for the memory blockspecified by the request address of request 302 protects the transfer ofownership of the requested memory block to master 300 during aprotection window 312 a that extends from the time that snooper 304 ndetermines its partial response 306 until snooper 304 n receivescombined response 310 and during a subsequent window extension 312 bextending a programmable time beyond receipt by snooper 304 n ofcombined response 310. During protection window 312 a and windowextension 312 b, snooper 304 n protects the transfer of ownership byproviding partial responses 306 to other requests specifying the samerequest address that prevent other masters from obtaining ownership(e.g., a retry partial response) until ownership has been successfullytransferred to master 300. Master 300 likewise initiates a protectionwindow 313 to protect its ownership of the memory block requested inrequest 302 following receipt of combined response 310.

Because snoopers 304 all have limited resources for handling the CPU andI/O requests described above, several different levels of partialresponses and corresponding CRs are possible. For example, if an IMC 124that is responsible for a requested memory block has a queue availableto handle a request, the IMC 124 may respond with a partial responseindicating that it is able to serve as the LPC for the request. If, onthe other hand, the IMC 124 has no queue available to handle therequest, the IMC 124 may respond with a partial response indicating thatis the LPC for the memory block, but is unable to currently service therequest. Similarly, a snooper 116 in an L2 cache 110 may require anavailable instance of snoop logic and access to its cache directory inorder to handle a request. Absence of access to either (or both) ofthese resources results in a partial response (and corresponding CR)signaling an inability to service the request due to absence of arequired resource.

Referring now to FIG. 4, there is illustrated a time-space diagram of anexemplary operation flow of an operation of system-wide scope in dataprocessing system 200 of FIG. 2. In FIG. 4, the various processing units100 within data processing system 200 are tagged with two locationalidentifiers—a first identifying the processing node 202 to which theprocessing unit 100 belongs and a second identifying the particularprocessing unit 100 within the processing node 202. Thus, for example,processing unit 100 a 0 c refers to processing unit 100 c of processingnode 202 a 0. In addition, each processing unit 100 is tagged with afunctional identifier indicating its function relative to the otherprocessing units 100 participating in the operation. These functionalidentifiers include: (1) local master (LM), which designates theprocessing unit 100 that originates the operation, (2) local hub (LH),which designates a processing unit 100 that is in the same processingnode 202 as the local master and that is responsible for transmittingthe operation to another processing node 202 (a local master can also bea local hub), (3) remote hub (RH), which designates a processing unit100 that is in a different processing node 202 than the local master andthat is responsible to distribute the operation to other processingunits 100 in its processing node 202, and (4) remote leaf (RL), whichdesignates a processing unit 100 that is in a different processing node202 from the local master and that is not a remote hub.

As shown in FIG. 4, the exemplary operation has at least three phases asdescribed above with reference to FIG. 3, namely, a request (or address)phase, a partial response (Presp) phase, and a combined response (Cresp)phase. These three phases preferably occur in the foregoing order and donot overlap. The operation may additionally have a data phase, which mayoptionally overlap with any of the request, partial response andcombined response phases.

The request phase begins when a local master 100 a 0 c (i.e., processingunit 100 c of processing node 202 a 0) performs a synchronized broadcastof a request, for example, a read request, to each of the local hubs 100a 0 a, 100 a 0 b, 100 a 0 c and 100 a 0 d within its processing node 202a 0. It should be noted that the list of local hubs includes local hub100 a 0 c, which is also the local master. This internal transmission isadvantageously employed to synchronize the operation of local hub 100 a0 c with local hubs 100 a 0 a, 100 a 0 b and 100 a 0 d so that thetiming constraints applicable to operations on the interconnect fabriccan be more easily satisfied.

In response to receiving the request, each local hub 100 that is coupledto a remote hub 100 by its A or B links transmits the operation to itsremote hub(s) 100. Thus, local hub 100 a 0 a makes no transmission ofthe operation on its outbound A link, but transmits the operation viaits outbound B link to a remote hub within processing node 202 a 1.Local hubs 100 a 0 b, 100 a 0 c and 100 a 0 d transmit the operation viatheir respective outbound A and B links to remote hubs in processingnodes 202 b 0 and 202 b 1, processing nodes 202 c 0 and 202 c 1, andprocessing nodes 202 d 0 and 202 d 1, respectively. Each remote hub 100receiving the operation in turn transmits the operation to each remoteleaf 100 in its processing node 202. Thus, for example, local hub 100 b0 a transmits the operation to remote leaves 100 b 0 b, 100 b 0 c and100 b 0 d. In this manner, the operation is efficiently broadcast to allprocessing units 100 within data processing system 200 utilizingtransmission over no more than three links.

Following the request phase, the partial response (Presp) phase occurs.In the partial response phase, each remote leaf 100 evaluates theoperation and provides its partial response to the operation to itsrespective remote hub 100. For example, remote leaves 100 b 0 b, 100 b 0c and 100 b 0 d transmit their respective partial responses to remotehub 100 b 0 a. Each remote hub 100 in turn transmits these partialresponses, as well as its own partial response, to a respective one oflocal hubs 100 a 0 a, 100 a 0 b, 100 a 0 c and 100 a 0 d. Local hubs 100a 0 a, 100 a 0 b, 100 a 0 c and 100 a 0 d then broadcast these partialresponses, as well as their own partial responses, to each local hub 100in processing node 202 a 0. The broadcast of partial responses by thelocal hubs 100 within processing node 202 a 0 includes, for timingreasons, the self-broadcast by each local hub 100 of its own partialresponse.

As will be appreciated, the collection of partial responses in themanner shown can be implemented in a number of different ways. Forexample, it is possible to communicate an individual partial responseback to each local hub from each other local hub, remote hub and remoteleaf. Alternatively, for greater efficiency, it may be desirable toaccumulate partial responses as they are communicated back to the localhubs. In order to ensure that the effect of each partial response isaccurately communicated back to local hubs 100, it is preferred that thepartial responses be accumulated, if at all, in a non-destructivemanner, for example, utilizing a logical OR function and an encoding inwhich no relevant information is lost when subjected to such a function(e.g., a “one-hot” encoding).

Response logic 122 at each local hub 100 within processing node 202 a 0compiles the partial responses of the other processing units 100 toobtain a combined response representing the system-wide response to therequest. Local hubs 100 a 0 a-100 a 0 d then broadcast the combinedresponse to all processing units 100 following the same paths ofdistribution as employed for the request phase. Thus, the combinedresponse is first broadcast to remote hubs 100, which in turn transmitthe combined response to each remote leaf 100 within their respectiveprocessing nodes 202. For example, remote hub 100 a 0 b transmits thecombined response to remote hub 100 b 0 a, which in turn transmits thecombined response to remote leaves 100 b 0 b, 100 b 0 c and 100 b 0 d.

As noted above, servicing the operation may require an additional dataphase. For example, if the operation is a read-type operation, such as aread or RWITM operation, remote leaf 100 b 0 d may source the requestedmemory block to local master 100 a 0 c via the links connecting remoteleaf 100 b 0 d to remote hub 100 b 0 a, remote hub 100 b 0 a to localhub 100 a 0 b, and local hub 100 a 0 b to local master 100 a 0 c.Conversely, if the operation is a write-type operation, for example, acache castout operation writing a modified memory block back to thesystem memory 132 of remote leaf 100 b 0 b, the memory block istransmitted via the links connecting local master 100 a 0 c to local hub100 a 0 b, local hub 100 a 0 b to remote hub 100 b 0 a, and remote hub100 b 0 a to remote leaf 100 b 0 b.

Of course, the operation depicted in FIG. 4 is merely exemplary of themyriad of possible system-wide operations that may occur concurrently ina multiprocessor data processing system such as data processing system200.

With reference now to FIG. 5, there is illustrated an exemplaryembodiment of a lower level store-in cache (e.g., L2 cache 110) inaccordance with one embodiment. In the embodiment of FIG. 5, L2 cache110 includes a cache array 502 and a L2 directory 508 of the contents ofcache array 502. Assuming cache array 502 and L2 directory 508 areset-associative as is conventional, storage locations in system memories108 are mapped to particular congruence classes within cache array 502utilizing predetermined index bits within system memory (real)addresses. The particular memory blocks stored within the cache lines ofcache array 502 are recorded in L2 directory 508, which contains onedirectory entry for each cache line. While not expressly depicted inFIG. 5, it will be understood by those skilled in the art that eachdirectory entry in cache directory 508 includes various fields, forexample, a tag field that identifies the real address of the memoryblock held in the corresponding cache line of cache array 502, a statefield that indicates the coherence state of the cache line, andinclusivity bits indicating whether the memory block is held in theassociated L1 cache 212.

The replacement of cache lines from entries of cache array 502 (andreplacement of associated entries in directory 508) is managed byreplacement logic 507, which implements (and in some embodiments,selectively implements) a desired replacement policy, such as LRU (LeastRecently Used), MRU (Most Recently Used), etc. Although replacementlogic 507 is illustrated in FIG. 5 as separate from directory 508, inother embodiments replacement logic 507 can be implemented as part ofdirectory 508. An exemplary counter-based embodiment of replacementlogic 507 is described below in greater detail with reference to FIG. 6.

L2 cache 110 additionally includes an L2 STQ 504 that temporarilybuffers at least store-type requests and synchronization (barrier)requests received from the associated processor core 102. In at leastone embodiment, L2 STQ 504 is a unified store queue that buffersrequests generated by all hardware threads of the affiliated processorcore 102.

L2 cache 110 also includes snooper logic 513 including multiple (e.g.,16 or 32) snoop machines 511 a-511 m for servicing remote memory accessrequests originating from processor cores 102 other than the affiliatedprocessor core 200. Each snoop machine 511 can independently andconcurrently handle a remote memory access request “snooped” frominterconnect fabric 514. As will be appreciated, the servicing of memoryaccess requests by L2 cache 110 may require the replacement orinvalidation of memory blocks within cache array 502. Accordingly, L2cache 110 additionally includes castout logic 515 including multiple CO(castout) machines 510 a-510 n that manage the removal and writeback ofdata granules from L2 cache 110 to system memories 132. L2 cache 110additionally includes master logic 509 including multiple (e.g., 16 or32) read-claim (RC) machines 512 a-512 n for independently andconcurrently servicing load-type (LD) and store-type (ST) requestsreceived from the affiliated processor core 200.

L2 cache 110 also includes an RC queue 520 and a CPI (castout pushintervention) queue 518 that respectively buffer data being insertedinto and removed from the cache array 502. RC queue 520 includes anumber of buffer entries that each individually correspond to aparticular one of RC machines 512 such that each RC machine 512 that isdispatched retrieves data from only the designated buffer entry.Similarly, CPI queue 518 includes a number of buffer entries that eachindividually correspond to a particular one of the castout machines 510and snoop machines 511, such that each CO machine 510 and each snoopmachine 511 that is dispatched controls data transfer from itsrespective designated CPI buffer entry.

Each RC machine 512 also has assigned to it a respective one of multipleRC data (RCDAT) buffers 522 for buffering a memory block read from cachearray 502 and/or received from interconnect fabric 514 via reload bus523. The RCDAT buffer 522 assigned to each RC machine 512 is preferablyconstructed with connections and functionality corresponding to thememory access requests that may be serviced by the associated RC machine512. At least some of RCDAT buffers 522 have an associated store datamultiplexer M4 that selects data bytes from among its inputs forbuffering in the RCDAT buffer 522 in response to unillustrated selectsignals.

The operation of L2 cache 110 is managed by a cache controller, which inthe embodiment of FIG. 5 includes an arbiter 505 and associatedselection logic represented by multiplexers M1 and M2. Multiplexer M1orders the presentation to arbiter 505 and multiplexer M2 of load-typeand store-type requests received from the associated processor core 200.Multiplexer M2 additionally receives via snoop bus 526 requests of otherprocessor cores 200 snooped from local interconnect 114. Based onselection inputs provided by arbiter 505 determined on a desiredarbitration policy, multiplexer M2 selects among the various memoryaccess requests, including local load-type and store-type requests andremote read and write requests, presented to it, and forwards theselected requests to a dispatch pipeline 506 where each request isprocessed with respect to directory 508 and cache array 502 over a givennumber of cycles.

In operation, L2 STQ 504 receives processor store-type and barrierrequests from the affiliated processor core 200. If a barrier request isreceived in L2 STQ 504, L2 STQ 504 may order older requests precedingthe barrier request and younger requests following the barrier request.From L2 STQ 504, store data of store requests are transmitted to storedata multiplexer M4 via data path 524, and store requests are passed tomultiplexer M1. Multiplexer M1 also receives as inputs load requestsfrom processor core 200 and directory write requests from RC machines512. In response to unillustrated select signals generated by the cachecontroller, multiplexer M1 selects one of its input requests to forwardto arbiter 505 and multiplexer M2, which additionally receives as aninput remote requests received from local interconnect 514 via snoop bus526. Arbiter 505 schedules local and remote memory access requests forprocessing in dispatch pipeline 506 and, based upon the scheduling,generates a sequence of select signals 528. In response to selectsignals 528 generated by arbiter 505, multiplexer M2 selects either alocal request received from multiplexer M1 or a remote request snoopedfrom interconnect fabric 514 as the next memory access request to beprocessed in dispatch pipeline 506.

Each memory access request selected for processing in dispatch pipeline506 by arbiter 505 is placed by multiplexer M2 into dispatch pipeline506. Dispatch pipeline 506 preferably is implemented as a fixed durationpipeline in which each of multiple possible overlapping requests isprocessed for a predetermined number of clock cycles. For example,dispatch pipeline 506 may process each memory access request for fourcycles.

During a first cycle of processing within dispatch pipeline 506, a1-cycle directory read is performed utilizing the request address todetermine if the request address hits or misses in directory 508, and ifthe memory address hits, the coherence state of the memory block withindirectory 508. The directory information, which includes a hit/missindication and the coherence state of the memory block, is returned bydirectory 508 to dispatch pipeline 506 in a subsequent cycle, such asthe fourth cycle. As will be appreciated, no action is generally takenwithin an L2 cache 110 in response to miss on a remote memory accessrequest; such remote memory requests are accordingly discarded fromdispatch pipeline 506. However, in the event of a hit or miss on a localmemory access request or a hit on a remote memory access request, L2cache 110 will service the memory access request, which for requeststhat cannot be serviced entirely within processing unit 100, may entailcommunication on interconnect fabric 514 via interconnect logic 120.

At a predetermined time during processing of the memory access requestwithin dispatch pipeline 506, arbiter 505 transmits the request addressto cache array 502 via address and control path 530 to initiate a cacheread of the memory block specified by the request address. A cache readtakes 2 cycles in one exemplary embodiment. The memory block read fromcache array 502 is transmitted via data path 542 to error correctingcode (ECC) logic 544, which checks the memory block for errors and, ifpossible, corrects any detected errors. For processor load requests, thememory block is also transmitted to load data multiplexer M3 via datapath 540 for forwarding to the affiliated processor core 200.

At the last cycle of the processing of a memory access request withindispatch pipeline 506, dispatch pipeline 506 make a dispatchdetermination. For example, dispatch pipeline 506 may make the dispatchdetermination based upon a number of criteria, including (1) thepresence of an address collision between the request address and aprevious request address currently being processed by a castout machine510, snoop machine 511 or RC machine 512, (2) the directory information,and (3) availability of an appropriate RC machine 512, snoop machine 511and/or CO machine 510 to process the memory access request. If dispatchpipeline 506 makes a dispatch determination that the memory accessrequest is to be dispatched, the memory access request is dispatchedfrom dispatch pipeline 506 to an RC machine 512 or a snoop machine 511,as appropriate. If the memory access request fails dispatch, the failureis signaled to the requestor (e.g., local or remote processor core 200)by a retry response. The requestor may subsequently retry the failedmemory access request, if necessary.

While an RC machine 512 is processing a local memory access request, theRC machine 512 has a busy status and is not available to service anotherrequest. While an RC machine 512 has a busy status, the RC machine 512may perform a directory write to update the relevant entry of directory508, if necessary. In addition, the RC machine 512 may perform a cachewrite to update the relevant cache line of cache array 502. A directorywrite and a cache write may be scheduled by arbiter 505 during anyinterval in which dispatch pipeline 506 is not already processing otherrequests according to the fixed scheduling of directory reads and cachereads. When all operations for the given request have been completed,the RC machine 512 returns to an unbusy state.

Referring now to FIG. 6, there is depicted a high level block diagram ofreplacement logic 507 in accordance with an embodiment of the presentinvention. In the illustrated embodiment, replacement logic 507 includesa counter bank 600, which includes a respective counter 602 (4-7 bits inone example) for each entry (and thus the cache line it contains) incache array 502. The counters 602 corresponding to the cache entriesforming a congruence class form a counter group 604 (which in anexemplary implementation may include 8 or 16 counters 602). As explainedbelow, the counter values of the counters 602 forming a counter group604 are utilized to select a victim cache line for eviction andreplacement in the congruence class corresponding to that counter group604.

Counter bank 600 is managed by replacement logic (RL) controller 610. RLcontroller 610 has a number of functions, the first of which is settinginitial values of counters 602 when the associated cache lines areinstalled in the entries of directory 508 and cache array 502 of L2cache 110. As indicated in FIG. 6, RL controller 610 receives one ormore inputs upon which RL controller 610 can base the initial values ofcounters 602 set when the associated cache lines are installed in L2cache 110. These inputs can include a source type indicating the type ofsource device that sourced the cache line (e.g., system memory 132, L2cache 110, a lower level cache in the vertical cache hierarchysupporting the same processor core 102, or I/O device 130), thetransaction type (ttype) by which the cache line was acquired, alocation of the source device and/or the topological distance to thesource device, and/or the coherence state, if any, of the cache line atthe snooper that served as a data source for the cache line. A secondfunction of RL controller 610, and specifically, of counter valueadjustment (CVA) logic 620 is updating the values of counters 602 inresponse to accesses by the associated processor core 102 to entries ofL2 cache 110. A third function of RL controller 610 is selecting andindicating a victim entry of the congruence class corresponding to eachcounter group 604.

As indicated by dashed line illustration, RL controller 610 mayoptionally further include a topology data structure 622 As discussedbelow, in some embodiments RL controller 610 may utilize topology datastructure to determine a distance from L2 cache 110 to a snooper 304based on a reported location of the snooper 304.

With reference now to FIG. 7, there is illustrated a high level logicalflowchart of an exemplary method of initializing a counter group 604 inaccordance with an embodiment of the present invention. As with theother logical flowcharts presented herein, steps are depicted in logicalrather than strictly chronological order; consequently, in someembodiments, some of the illustrated steps may be performed in adifferent order than illustrated or concurrently. The illustratedprocess may be performed by each RL controller 610, for example, duringthe bring up of data processing system 200.

The process begins at block 700 and then proceeds to block 702, whichillustrates an RL controller 610 initializing one counter 602 in eachcounter group 604 to a “select” counter value, that is, a value at whichthe corresponding entry in cache array 502 will be selected as the nextvictim to be evicted from the associated congruence class. In addition,at block 704, RL controller 610 initializes all counters 602 in eachcounter group 604 besides those initialized at block 702 to a countervalue adjacent to the “select” counter value. For example, inembodiments in which RL controller 610 uses the counter 602 having thelowest counter value in each counter group 604 to select the victimentry to be evicted from the corresponding congruence class, RLcontroller 610 sets counters 602 corresponding to non-victim entries toa value that is one greater than the “select” counter value. Inalternative embodiments in which RL controller 610 uses the counter 602having the highest counter value in each counter group 604 to select thevictim entry to be evicted from the corresponding congruence class, RLcontroller 610 sets counters 602 corresponding to non-victim entries toa value that is one less than the “select” counter value. Thereafter,the process of FIG. 7 ends at block 706.

Referring to FIG. 8, there is depicted a high level logical flowchart ofan exemplary method of managing a bank of replacement logic counters inaccordance with an embodiment of the present invention. The depictedprocess can be performed, for example, by RL controller 610 to implementan LRU replacement policy.

The process of FIG. 8 begins at block 800, for example, in response toL2 cache 110 receiving a memory access request from the associatedprocessor core 102 and processing it in dispatch pipeline 506. Theprocess then proceeds from block 800 to block 802, which illustrates RLcontroller 610 determining if the target real address of the memoryaccess request received at block 800 resulted in a hit in the localdirectory 508. If not (i.e., the target real address of the memoryaccess request missed in directory 508), the process passes from block802 to block 810, which is described below. If, however, the target realaddress of the memory access request hit is directory 508, the processproceeds from block 802 to block 804.

Block 804 illustrates RL controller 610 advancing the counter value ofthe counter 602 corresponding to the member of the congruence class forwhich the hit occurred. In embodiments in which RL controller 610 usesthe lowest counter value to select the victim entry, advancing thecounter 602 at block 804 entails increasing the counter value of the hitentry by a selected amount. In alternative embodiments in which RLcontroller 610 uses the highest counter value to select the victimentry, advancing the counter 602 at block 804 entails decreasing thecounter value by a selected amount. As indicated at block 806 usingdashed line illustration, RL controller 610 may also optionally adjustcounter values of counters 602 associated with other (i.e., non-hit)entries of the congruence class in which the hit occurred. Inembodiments in which RL controller 610 uses the lowest counter value toselect the victim entry, adjusting the counters 602 at block 806 entailsdecreasing the counter values by a selected amount. In alternativeembodiments in which RL controller 610 uses the highest counter value toselect the victim entry, adjusting the counters 602 at block 806 entailsincreasing the counter values by a selected amount. The adjustment ofcounter values for non-hit members of the congruence class reflects thegeneral decrease of temporal locality as time elapses. Following block806, the process of FIG. 8 ends at block 820.

Referring now to block 810, in response to the target real address ofthe memory access request missing in directory 508, RL controller 610selects a victim entry from the relevant congruence class, for example,by selecting the entry corresponding to the counter 602 with theoutlying counter value in the relevant counter group 604. In embodimentsin which RL controller 610 uses the lowest counter values to select thevictim entry, selecting the entry with the outlying counter valueentails selecting the entry corresponding to the counter 602 having thelowest value. In alternative embodiments in which RL controller 610 usesthe highest counter value to select the victim entry, selecting theentry with the outlying counter value entails selecting the entrycorresponding to the counter 602 having the highest value. In cases inwhich two or more counter values are the same, the victim entry can beselected randomly from among those entries having the common lowest (orhighest) counter values. At block 810, RL controller 610 also initiatescastout of the victim entry to system memory 132, if necessary, forexample, by placing a castout request into dispatch pipeline 506 thatwill be serviced by one of castout machines 510. RL controller 610 maydetermine whether or not castout of the victim entry is required, forexample, based on the coherence state of the victim entry indicated bydirectory 508. For example, in one exemplary embodiment, if thecoherence state indicates that the victim entry holds a unique copy ofthe cache line that is modified with respect to system memory 132, RLcontroller 610 determines that castout is necessary, and, if thecoherence state does not so indicate, RL controller 610 determines thatcastout is not necessary.

At block 812, RL controller 610 additionally sets the initial countervalue for the new or replacement entry (which replaces the counter valueof the victim entry selected at block 810) to be inserted into thecongruence class in place of the victim entry. As indicated in block812, RL controller 610 preferably determines the initial counter valuefor the new entry based on one or more inputs, including the transactiontype (ttype) of the memory access request utilized to obtain the cacheline for the new entry, the source type that responded to the memoryaccess request to provide the cache line for the new entry (e.g., acache at a lower level of the cache hierarchy, a cache at the same levelof the cache hierarchy (e.g., another L2 cache 110), a system memory132, an I/O device 130), a distance between the source device and the L2cache 110, and the coherence state, if any, of the cache line at thesource device.

For example, in one embodiment, RL controller 610 determines the initialcounter value based either solely on the source type or based on thesource type and one or more additional input(s), where the source typein indicated to L2 cache 110 by combined response 310 and/or data tenure314. In one exemplary implementation in which the lowest counter valueis utilized to select the victim entry, RL controller 610 assigns afirst higher initial counter value if the source type indicates arelatively higher latency source (e.g., system memory 132/memorycontroller 124 or I/O device 130) and assigns a second lower initialcounter value if the source type indicates a relatively lower latencysource (e.g., another cache at the same level of the cache hierarchy ora lower level cache). It should be understood that although twodifferent initial counter values are employed in this example, in otherimplementations additional initial counter values could be employed forselected one(s) of the source types.

As another example, in one embodiment, RL controller 610 determines theinitial counter value based either solely on the transaction type orbased on the transaction type and one or more additional input(s). Inexemplary implementation in which the lowest counter value is utilizedto select a victim entry, RL controller 610 assigns a first higherinitial counter value if the transaction type is a RWITM, DCLAIM orother transaction type that requests an exclusive copy of the cache lineand assigns a second lower initial counter value if the transaction typeis READ or other transaction type that does not request an exclusivecopy of the cache line. It should be understood that although twodifferent initial counter values are employed in this example, in otherimplementations additional initial counter values could be employed forselected one(s) of the transaction types (e.g., RWITM and DCLAIM can beassociated with different initial counter values).

As yet another example, in one embodiment, RL controller 610 determinesthe initial counter value based either solely on the distance to thesource device or based on the distance and one or more additionalinput(s). In on exemplary implementation in which the lowest countervalue is utilized to select a victim entry, RL controller 610 assignsthe initial counter value based on distance measured by a number ofinterconnect “hops” between the source device and the processing unit100 containing the L2 cache 110. For example, according to this measureof distance, the distance between processor unit 100 d of processingnode 202 b 0 and processing unit 100 c of processing node 202 a 0 is 3.In some embodiments, RL controller 610 can determine the topologicaldistance from its own known location and the source device locationreported in combined response 310 and/or data tenure 314 based ondistance information recorded in an optional topology data structure622. In other embodiments, the distance can be computed elsewhere in thesystem (e.g., by response logic 122) and reported to RL controller 610(e.g., in combined response 310). It should be appreciated that in someembodiments, each different distance may have its own respective initialcounter value; however, in other embodiments, ranges including multipledistances may be assigned common initial counter values.

In other embodiments, replacement logic 610 can employ other metrics ofdistance. For example, distance can simply be “in node” (i.e., withinthe same processing node 202) or “not in node” (i.e., within a differentprocessing node 202). Of course, additional levels of granularity can beemployed, such as “in node”, “in node group” (e.g., in a group of two orfour nodes), and “not in node group.” One advantage of this relativemetric of distance is that the distance can be accumulated within thepartial response 306 as it traverses the interconnect fabric on its wayto response logic 122 by having interconnect logic 120 set bits inpartial response 306 as node or node group boundaries are crossed.Consequently, RL controller 610 need not compute the distance andtopology data structure 622 can be omitted.

In yet another example, RL controller 610 determines the initial countervalue for the replacement entry of the congruence class based eithersolely on the snooper coherence state reported in combined response 310and/or data tenure 314 or based on the snooper coherence state and oneor more additional input(s). In one exemplary implementation in whichthe lowest counter value is utilized to select a victim entry, RLcontroller 610 assigns a first higher initial counter value if thesnooper coherence state indicates that the snooper, prior to the memoryaccess request, held an exclusive copy of the cache line and assigns thecounter 602 a second lower initial counter value if the snoopercoherence state indicates that the snooper, prior to the memory accessrequest, did not hold an exclusive copy of the cache line. It should beunderstood that although two different initial counter values areemployed in this example, in other implementations additional initialcounter values could be employed for different ones of a plurality ofpossible coherence states for the cache line (e.g., for a coherencestate that indicates the cache line is both modified and shared oranother coherence state that indicates the cache line is a unique copyand unmodified).

Still referring to FIG. 8, at block 814 RL controller 610 adjustscounter values of counters 602 in the selected counter group 604 otherthan the counter 602 that was initialized at block 812. In embodimentsin which RL controller 610 uses the lowest counter value in a countergroup 604 to select the victim entry, adjusting the counters values atblock 814 entails decreasing such counter values by a selected amount.In alternative embodiments in which RL controller 610 uses the highestcounter value in a counter group 604 to select the victim entry of thecorresponding congruence class, adjusting the counter values at block814 entails increasing such counter values by a selected amount.Following block 814, the process of FIG. 8 ends at block 820.

In at least some embodiments, it is desirable to further reduce thetiming impact of the determination of a victim entry to be replaced in acongruence class by removing this determination from the critical timingpath between the determination that a miss has occurred in a congruenceclass and installation of a new entry in the congruence class. One wayof reducing the timing impact of this determination is by predeterminingthe victim entry of a congruence class in advance of determination of amiss in the congruence class, as is discussed below with respect to FIG.9.

With reference now to FIG. 9, there is illustrated a high level logicalflowchart of an exemplary method of managing a bank of replacement logiccounters in accordance with another embodiment of the present invention.The depicted process can be performed, for example, by RL controller 610of an L2 cache 110.

The process of FIG. 9 begins at block 900, for example, in response toan L2 cache 110 receiving a memory access request from the associatedprocessor core 102 and processing it in its dispatch pipeline 506. Insome embodiments, the process passes from block 900 directly to block902, omitting block 901. In other embodiments, the process passes tooptional block 901, which is described below with to the embodiments ofCVA logic 620 described below with reference to FIG. 10. Block 902illustrates RL controller 610 determining if the target real address ofthe memory access request resulted in a hit in the local directory 508.If not (i.e., the target real address of the memory access requestmissed in directory 508), the process passes from block 902 to block910, which is described below. If, however, the target real address ofthe memory access request hit in directory 508, the process proceeds toblock 904.

Block 904 illustrates RL controller 610 advancing the counter value ofthe counter 602 corresponding to the entry of the congruence class inwhich the hit occurred. In embodiments in which RL controller 610 usesthe lowest counter value in a counter group 604 to select a victim entryof the corresponding congruence class, advancing the counter 602 atblock 904 entails increasing the counter value of the counter 602corresponding to the hit entry by a selected amount. In alternativeembodiments in which RL controller 610 uses the highest count value in acounter group 604 to select the victim entry of the correspondingcongruence class, advancing the counter 602 at block 904 entailsdecreasing the counter value of the counter 602 corresponding to the hitentry by a selected amount. As indicated at block 906 by dashed lineillustration, RL controller 610 may also optionally adjust countervalues of counters 602 associated with other non-hit entries of thecounter group 604 corresponding to the congruence class in which the hitoccurred. In embodiments in which RL controller 610 uses the lowestcounter value in the counter group 604 to select the victim entry of thecorresponding congruence class, adjusting the counter values at block906 entails decreasing the counter values by a selected amount. Inalternative embodiments in which RL controller 610 uses the highestcounter value in a counter group 604 to select the victim entry of thecorresponding congruence class, adjusting the counter values at block906 entails increasing the counter values by a selected amount. Theadjustment of counter values for non-hit members of the congruence classreflects the general decrease of temporal locality as time elapses. Inorder to facilitate predetermination of a victim entry, it is preferredthat, if necessary, the counter 602 of at least one non-hit entry isprevented from being adjusted to the “select” counter value at block906. Following block 906, the process of FIG. 9 ends at block 920.

Referring now to block 910, in response to the target real address ofthe memory access request missing in directory 508, RL controller 610initiates, if necessary, castout of the predetermined victim entry ofthe relevant congruence class to system memory 132, for example, byplacing a castout request into dispatch pipeline 506 that will beserviced by one of castout machines 510. RL controller 610 may determinewhether or not castout of the predetermined victim entry is required,for example, based on the coherence state of the predetermined victimentry indicated by directory 508. For example, if the coherence stateindicates that the predetermined victim entry holds a unique copy of thecache line and modified with respect to system memory 132, RL controller610 determines that a castout of the predetermined victim entry isnecessary, and, if the coherence state indicates otherwise, RLcontroller 610 determines that a castout of the predetermined victimentry is not necessary. As noted above, by predetermining the victimentry of the congruence class, no determination of the current victimentry to be evicted need be made following the miss determination atblock 902.

At block 912, RL controller 610 additionally sets the initial countervalue for the counter 602 corresponding to the new or replacementcongruence class entry to be inserted into the congruence class in placeof the predetermined victim entry. As indicated in block 912, RLcontroller 610 preferably determines the initial counter value for thenew entry based on one or more inputs, as discussed in detail above withreference to block 810 of FIG. 8.

The process then proceeds from block 912 to block 913, which illustratesRL controller 610 predetermining a victim entry from the relevantcongruence class, for example, by selecting (in one embodiment) theentry associated with a counter 602 with an outlying counter value inthe relevant counter group 604. In embodiments in which RL controller610 uses the lowest counter value to select the victim entry, selectingthe entry with the outlying counter value at block 913 entails selectingthe entry corresponding to the lowest valued counter 602 of the countergroup 604. In alternative embodiments in which RL controller 610 usesthe highest counter values in the counter group 604 to select the victimentry, the selection depicted at block 913 entails selecting the entrycorresponding to the highest valued counter 602 in the counter group604. Again, in cases in which two or more counter values are the same,the predetermined victim can be chosen randomly from among those entrieshaving common lowest (or highest) counter values. Once the predeterminedvictim entry is selected, the counter value of the corresponding counter602 is set to the “select” value (e.g., the minimum counter value of0b00..0).

At block 914 RL controller 610 additionally adjusts counter values ofcounters 602 in the counter group 604 corresponding to members of thecongruence class that are neither the immediately previous victim entrythat was replaced at block 912 nor the predetermined victim entry. Inembodiments in which RL controller 610 uses the lowest counter value toselect the victim entry, adjusting the counters 602 at block 914 entailsdecreasing such counter values by a predetermined amount. In alternativeembodiments in which RL controller 610 uses the highest counter value toselect the victim entry, adjusting the counters 602 at block 914 entailsincreasing such counter values by a predetermined amount. In order tofacilitate predetermination of a victim entry, it is preferred that, ifnecessary, the counters 602 of the adjusted entries are prevented frombeing adjusted to the “select” counter value at block 914. Followingblock 914, the process of FIG. 9 ends at block 920.

Referring now to FIG. 10, there is depicted a block diagram of countervalue adjustment (CVA) logic 620 in accordance with one embodiment. Inthis embodiment, CVA logic 620 includes an above counter 1000 and abelow counter 1002, which may be, for example, between 16 and 24 bits inlength. Above counter 1000 accumulates a number of counters 602 acrosscounter bank 600 whose values are greater than a midpoint of the maximumcount value that can be represented by counters 602, and below counter1000 accumulates a number of counters 602 across counter bank 600 whosevalues are less than a midpoint of the maximum count value that can berepresented by counters 602.

Counters 1000-1002 are coupled to difference logic 1004, whichcalculates the difference between the counter values of counters1000-1002. In some embodiments, difference logic 1004 may optionallydrop (i.e., truncate) a predetermined number of lower order bits (e.g.,8) prior to determining the difference in counter values. The differencebetween the counter values of above counter 1000 and below counter 1002determined by difference logic 1004 provides an approximation of thedistribution of the counter values within counter bank 600.

In other embodiments in which it is desirable for CVA logic 620 todetermine the distribution of counter values in counter bank 600 withgreater accuracy, CVA logic 620 may implement additional above and belowcounters for one or more counter groups 604, for example, one abovecounter and one below counter per counter group 604. In this case, thedifference logic 1004 would compute one difference per counter group604, thus providing a more accurate approximation of the distribution ofcounter values within counter bank 600.

In these various possible embodiments, each above counter 1000 and eachbelow counter 1002 is preferably prevented for overflowing andunderflowing. In one embodiment, CVA logic 620 prevents counter overflowby periodically (i.e., at even time intervals) dividing the countervalues of each above counter 1000 and each below counter 1002 by apredetermined divisor, such as 2 or 4, where the result of such divisionis thresholded at zero to prevent underflow. In other embodiments, CVAlogic 620 prevents overflow of above counter(s) 1000 and belowcounter(s) 1002 by alternatively or additionally dividing the countervalues based on the number of times an above/below counter pair isaccessed and/or based on one of the counter values of the above counter1000 or below counter 1002 reaching a threshold value (e.g., the maximumpossible counter value).

As further illustrated in FIG. 10, difference logic 1004 provides thedifference it calculates to hit advancement logic 1000, miss adjustmentlogic 1102 and, in some embodiments, to optional hit adjustment logic1106. Hit advancement logic 1100 determines the amount a counter valueof the counter 602 corresponding to the hit entry of the congruenceclass is advanced at block 904 of FIG. 9, miss adjustment logic 1102determines the amount the counters 602 corresponding to the non-hitentries of the congruence class are adjusted at block 914 of FIG. 9, andhit adjustment logic 1106, if implemented, determines the amount thecounters 602 corresponding to the non-hit entries of the congruenceclass are adjusted at optional block 906 of FIG. 9.

Referring again to FIG. 9, at block 901 CVA logic 620 computes thenumber of counters 602 within the relevant counter group 604 (i.e., theone corresponding to the congruence class to which the target realaddress of the memory access request maps) that have counter valuesabove the counter midpoint value and adds this number to above counter1000. Similarly, CVA logic 620 computes the number of counters 602within the counter group 604 that have counter values below the countermidpoint value and adds this number to below counter 1002. Based on theupdated values of above counter 1000 and below counter 1002, differencelogic 1004 computes a new difference that approximates the distributionof counter values across counter bank 600.

If the difference determined at block 901 indicates the counter value ofabove counter 1000 is greater than the counter value of below counter1002 (or in some embodiments, greater than the counter value of belowcounter 1002 by at least a threshold amount), CVA logic 620 determinesthat counter bank 600 is skewed toward higher count values. If, on theother hand, the difference determined at block 901 indicates the countervalue of above counter 1000 is less than the counter value of belowcounter 1002 (or in some embodiments, less than the counter value ofbelow counter 1002 by at least a threshold amount), CVA logic 620determines that counter bank 600 is skewed toward lower count values.

As further indicated at block 901, in response to determining thatcounter bank 600 is skewed either toward higher count values or towardlower count values, hit advancement logic 1100 of CVA logic 620 mayadaptively change the amount by which counter values are advanced atblock 904 and/or one or both of miss adjustment logic 1102 and hitadjustment logic 1106 may adaptively change the amount by which countervalues are adjusted at block 914 and block 906. For example, in anembodiment in which the lowest count value in a counter group 604 isutilized to select the victim entry of the corresponding congruenceclass, if CVA logic 620 determines that counter bank 600 is skewedtoward higher count values, hit advancement logic 1100 may decrease theamount by which a counter value is advanced at block 904 and/or one orboth of miss adjustment logic 1102 and hit adjustment logic 1106 mayincrease the amount by which a counter value is reduced at block 914and/or block 906. Similarly, in this embodiment, if CVA logic 620determines that counter bank 600 is skewed toward lower count values,hit advancement logic 1100 may increase the amount by which a countervalue is advanced at block 904 and/or one or both of miss adjustmentlogic 1102 and hit adjustment logic 1106 may decrease the amount bywhich a counter value is reduced at block 914 and/or block 906.

The present invention recognizes that in at least some operatingscenarios, the dynamic range of counters 602 may be small enough suchthat, if the counters 602 are updated on all hits and on all misses, thecounter values will tend to be tightly grouped at or near either themaximum or minimum counter value. In such cases, counter values will notbe as effective a guide as desired in the selection of victim entries,and victim selection will, in the extreme case, tend toward beingperformed on a random basis. Accordingly, in at least some embodiments,it is preferred if CVA logic 620 updates counter values of counters 602less frequently than on each memory access of the associated processorcore 102. In one such embodiment, each of hit advancement logic 1100,miss adjustment logic 1102 and hit adjustment logic 1106 applies aseparate probability filter that causes the counter value(s) of therelevant counters 602 to be updated less frequently than every hit ormiss. In one particular example, hit advancement logic 1100 advances thecounter value of the counter 602 corresponding to a hit entry every Khits, miss adjustment logic 1102 adjusts the counter values of thecounters 602 corresponding to non-victim entries every L misses, and hitadjustment logic 1106, if present, adjusts the counter values of thecounters 602 corresponding to non-hit entries every M hits, where K, Land M are independently adjusted integers equal or greater than 2.

Although the embodiments of FIG. 10 have been described with specificreference to the process of FIG. 9, it will be appreciated that theseembodiments can additionally be employed in the process of FIG. 8.

Referring now to FIG. 11, there is depicted a block diagram of anexemplary design flow 1100 used for example, in semiconductor IC logicdesign, simulation, test, layout, and manufacture. Design flow 1100includes processes, machines and/or mechanisms for processing designstructures or devices to generate logically or otherwise functionallyequivalent representations of the design structures and/or devicesdescribed above and shown in the figures. The design structuresprocessed and/or generated by design flow 1100 may be encoded onmachine-readable transmission or storage media to include data and/orinstructions that when executed or otherwise processed on a dataprocessing system generate a logically, structurally, mechanically, orotherwise functionally equivalent representation of hardware components,circuits, devices, or systems. Machines include, but are not limited to,any machine used in an IC design process, such as designing,manufacturing, or simulating a circuit, component, device, or system.For example, machines may include: lithography machines, machines and/orequipment for generating masks (e.g. e-beam writers), computers orequipment for simulating design structures, any apparatus used in themanufacturing or test process, or any machines for programmingfunctionally equivalent representations of the design structures intoany medium (e.g. a machine for programming a programmable gate array).

Design flow 1100 may vary depending on the type of representation beingdesigned. For example, a design flow 1100 for building an applicationspecific IC (ASIC) may differ from a design flow 1100 for designing astandard component or from a design flow 1100 for instantiating thedesign into a programmable array, for example a programmable gate array(PGA) or a field programmable gate array (FPGA) offered by Altera® Inc.or Xilinx® Inc.

FIG. 11 illustrates multiple such design structures including an inputdesign structure 1120 that is preferably processed by a design process1110. Design structure 1120 may be a logical simulation design structuregenerated and processed by design process 1110 to produce a logicallyequivalent functional representation of a hardware device. Designstructure 1120 may also or alternatively comprise data and/or programinstructions that when processed by design process 1110, generate afunctional representation of the physical structure of a hardwaredevice. Whether representing functional and/or structural designfeatures, design structure 1120 may be generated using electroniccomputer-aided design (ECAD) such as implemented by a coredeveloper/designer. When encoded on a machine-readable datatransmission, gate array, or storage medium, design structure 1120 maybe accessed and processed by one or more hardware and/or softwaremodules within design process 1110 to simulate or otherwise functionallyrepresent an electronic component, circuit, electronic or logic module,apparatus, device, or system such as those shown in the figures. Assuch, design structure 1120 may comprise files or other data structuresincluding human and/or machine-readable source code, compiledstructures, and computer-executable code structures that when processedby a design or simulation data processing system, functionally simulateor otherwise represent circuits or other levels of hardware logicdesign. Such data structures may include hardware-description language(HDL) design entities or other data structures conforming to and/orcompatible with lower-level HDL design languages such as Verilog andVHDL, and/or higher level design languages such as C or C++.

Design process 1110 preferably employs and incorporates hardware and/orsoftware modules for synthesizing, translating, or otherwise processinga design/simulation functional equivalent of the components, circuits,devices, or logic structures shown in the figures to generate a netlist1180 which may contain design structures such as design structure 1120.Netlist 1180 may comprise, for example, compiled or otherwise processeddata structures representing a list of wires, discrete components, logicgates, control circuits, I/O devices, models, etc. that describes theconnections to other elements and circuits in an integrated circuitdesign. Netlist 1180 may be synthesized using an iterative process inwhich netlist 1180 is resynthesized one or more times depending ondesign specifications and parameters for the device. As with otherdesign structure types described herein, netlist 1180 may be recorded ona machine-readable storage medium or programmed into a programmable gatearray. The medium may be a non-volatile storage medium such as amagnetic or optical disk drive, a programmable gate array, a compactflash, or other flash memory. Additionally, or in the alternative, themedium may be a system or cache memory, or buffer space.

Design process 1110 may include hardware and software modules forprocessing a variety of input data structure types including netlist1180. Such data structure types may reside, for example, within libraryelements 1130 and include a set of commonly used elements, circuits, anddevices, including models, layouts, and symbolic representations, for agiven manufacturing technology (e.g., different technology nodes, 32 nm,45 nm, 90 nm, etc.). The data structure types may further include designspecifications 1140, characterization data 1150, verification data 1160,design rules 1170, and test data files 1185 which may include input testpatterns, output test results, and other testing information. Designprocess 1110 may further include, for example, standard mechanicaldesign processes such as stress analysis, thermal analysis, mechanicalevent simulation, process simulation for operations such as casting,molding, and die press forming, etc. One of ordinary skill in the art ofmechanical design can appreciate the extent of possible mechanicaldesign tools and applications used in design process 1110 withoutdeviating from the scope and spirit of the invention. Design process1110 may also include modules for performing standard circuit designprocesses such as timing analysis, verification, design rule checking,place and route operations, etc.

Design process 1110 employs and incorporates logic and physical designtools such as HDL compilers and simulation model build tools to processdesign structure 1120 together with some or all of the depictedsupporting data structures along with any additional mechanical designor data (if applicable), to generate a second design structure 1190.Design structure 1190 resides on a storage medium or programmable gatearray in a data format used for the exchange of data of mechanicaldevices and structures (e.g., information stored in a IGES, DXF,Parasolid XT, JT, DRG, or any other suitable format for storing orrendering such mechanical design structures). Similar to designstructure 1120, design structure 1190 preferably comprises one or morefiles, data structures, or other computer-encoded data or instructionsthat reside on transmission or data storage media and that whenprocessed by an ECAD system generate a logically or otherwisefunctionally equivalent form of one or more of the embodiments of theinvention shown in the figures. In one embodiment, design structure 1190may comprise a compiled, executable HDL simulation model thatfunctionally simulates the devices shown in the figures.

Design structure 1190 may also employ a data format used for theexchange of layout data of integrated circuits and/or symbolic dataformat (e.g., information stored in a GDSII (GDS2), GL1, OASIS, mapfiles, or any other suitable format for storing such design datastructures). Design structure 1190 may comprise information such as, forexample, symbolic data, map files, test data files, design contentfiles, manufacturing data, layout parameters, wires, levels of metal,vias, shapes, data for routing through the manufacturing line, and anyother data required by a manufacturer or other designer/developer toproduce a device or structure as described above and shown in thefigures. Design structure 1190 may then proceed to a stage 1195 where,for example, design structure 1190: proceeds to tape-out, is released tomanufacturing, is released to a mask house, is sent to another designhouse, is sent back to the customer, etc.

As has been described, in at least one embodiment, a set-associativecache memory includes a plurality of congruence classes each includingmultiple entries for storing cache lines of data. A respective one of aplurality of counters is maintained for each cache line stored in themultiple entries. In response to a memory access request, the cachememory selects a victim cache line stored in a particular entry of aparticular congruence class for eviction from the cache memory byreference to at least a counter value of the victim cache line. Thecache memory also receives a new cache line of data for insertion intothe particular entry and an indication of a coherence state of the newcache line at a data source from which the cache memory received the newcache line. The cache memory installs the new cache line in theparticular entry and sets an initial counter value of the counter forthe new cache line based on the received indication of the coherencestate at the data source.

In one embodiment, the cache memory alternatively or additionallyreceives in conjunction with the new cache line an indication of adistance from the cache memory to a data source from which the cachememory received the new cache line. In this embodiment, the cache memorysets the initial counter value of the counter for the new cache linebased on at least the received indication of the distance.

In one embodiment, a set-associative cache memory includes a bank ofcounters including a respective one of a plurality of counters for eachcache line stored in a plurality of congruence classes of the cachememory. Prior to receiving a memory access request that maps to aparticular congruence class of the cache memory, the cache memorypre-selects a first victim cache line stored in a particular entry of aparticular congruence class for eviction based on at least a countervalue of the victim cache line. In response to receiving a memory accessrequest that maps to the particular congruence class and that misses,the cache memory evicts the pre-selected first victim cache line fromthe particular entry, installs a new cache line in the particular entry,and pre-selects a second victim cache line from the particularcongruence class based on at least a counter value of the second victimcache line.

In one embodiment, a set-associative cache memory has a plurality ofcongruence classes each including multiple entries for storing cachelines of data. The cache memory includes a bank of counters, whichincludes a respective one of a plurality of counters for each cache linestored in the plurality of congruence classes. The cache memory selectsvictim cache lines for eviction from the cache memory by reference tocounter values of counters within the bank of counters. A dynamicdistribution of counter values of counters within the bank of countersis determined. In response, an amount counter values of counters withinthe bank of counters are adjusted on a cache miss is adjusted based onthe dynamic distribution of the counter values.

While various embodiments have been particularly shown and described, itwill be understood by those skilled in the art that various changes inform and detail may be made therein without departing from the spiritand scope of the appended claims and these alternate implementations allfall within the scope of the appended claims. For example, althoughembodiments have been described with reference to an L2 cache, it shouldbe appreciated that the described inventions can also be applied to anyother level of cache memory (e.g., to an L3 victim cache). Further,although aspects have been described with respect to a computer systemexecuting program code that directs the functions of the presentinvention, it should be understood that present invention mayalternatively be implemented as a program product including acomputer-readable storage device storing program code that can beprocessed by a processor of a data processing system to cause the dataprocessing system to perform the described functions. Thecomputer-readable storage device can include volatile or non-volatilememory, an optical or magnetic disk, or the like, but excludesnon-statutory subject matter, such as propagating signals per se,transmission media per se, and forms of energy per se.

As an example, the program product may include data and/or instructionsthat when executed or otherwise processed on a data processing systemgenerate a logically, structurally, or otherwise functionally equivalentrepresentation (including a simulation model) of hardware components,circuits, devices, or systems disclosed herein. Such data and/orinstructions may include hardware-description language (HDL) designentities or other data structures conforming to and/or compatible withlower-level HDL design languages such as Verilog and VHDL, and/or higherlevel design languages such as C or C++. Furthermore, the data and/orinstructions may also employ a data format used for the exchange oflayout data of integrated circuits and/or symbolic data format (e.g.information stored in a GDSII (GDS2), GL1, OASIS, map files, or anyother suitable format for storing such design data structures).

What is claimed is:
 1. A method in a data processing system, the methodcomprising: in a set-associative cache memory having a plurality ofcongruence classes each including multiple entries for storing cachelines of data, maintaining a bank of counters including a respective oneof a plurality of counters for each cache line stored in the pluralityof congruence classes; prior to receiving a memory access request thatspecifies a target address that maps to a particular congruence class ofthe cache memory, the cache memory pre-selecting for eviction from thecache memory only one single first victim cache line out of all cachelines in the particular congruence class based on at least a countervalue of the victim cache line, wherein the pre-selected first victimcache line is stored in a particular entry of the particular congruenceclass; in response to receiving the memory access request that specifiesthe target address that maps to the particular congruence class of thecache memory and that misses in the cache memory: the cache memoryevicting the pre-selected first victim cache line from the particularentry and installing a new cache line in the particular entry; the cachememory pre-selecting, from among all the cache lines in the particularcongruence class, only one single fixed second victim cache line to beevicted from the particular congruence class on a next miss to theparticular congruence class regardless of any intervening accessesbetween the memory access request and the next miss, wherein thepre-selecting the second victim cache line includes pre-selecting thesecond victim cache line based on at least a counter value of the secondvictim cache line; adjusting counter values of counters of cache linesin the particular congruence class to make the cache lines more likelyto be subsequently selected as a victim cache line; and adapting anamount counter values of counters are adjusted on a cache miss based ona dynamic distribution, at a given time, of the counter values acrossthe bank of counters.
 2. The method of claim 1, wherein pre-selectingthe second victim cache line includes setting a counter associated withthe second victim cache line to a predetermined counter valueidentifying the second victim cache line as a victim cache line.
 3. Themethod of claim 1, and further comprising the cache memory setting aninitial counter value for the new cache line based on at least onefactor from a set including a device type of a data source of the newcache line, a transaction type of the memory access request, a coherencestate of the new cache line at the data source, a topological locationof the data source within the data processing system, and a topologicaldistance between the data source and the cache memory.
 4. The method ofclaim 1, wherein the cache memory is a lower level victim cache.
 5. Aprocessing unit for a data processing system, comprising: a processorcore; and a set-associative cache memory coupled to the processor core,wherein the cache memory includes: a plurality of congruence classeseach including multiple entries for storing cache lines of data;replacement logic including: a counter bank including a respective oneof a plurality of counters for each cache line stored in the pluralityof congruence classes; a replacement logic controller configured toperform: prior to receiving a memory access request that specifies atarget address that maps to a particular congruence class of the cachememory, the cache memory pre-selecting for eviction from the particularcongruence class only one single first victim cache line out of allcache lines in the particular congruence class based on at least acounter value of the victim cache line, wherein the pre-selected firstvictim cache line is stored in a particular entry of the particularcongruence class; in response to the cache memory receiving the memoryaccess request that specifies the target address that maps to theparticular congruence class of the cache memory, that misses in thecache memory, and that causes the cache memory to evict the pre-selectedfirst victim cache line from the particular entry and install a newcache line in the particular entry:  pre-selecting, from among all thecache lines in the particular congruence class, only one single fixedsecond victim cache line to be evicted from the particular congruenceclass on a next miss to the particular congruence class regardless ofany intervening accesses between the memory access request and the nextmiss, wherein the pre-selecting the second victim cache line includespre-selecting the second victim cache line based on at least a countervalue of the second victim cache line;  adjusting counter values ofcounters of cache lines in the particular congruence class to make thecache lines more likely to be subsequently selected as a victim cacheline; and adapting an amount counter values of counters are adjusted ona cache miss based on a dynamic distribution, at a given time, of thecounter values across the bank of counters.
 6. The processing unit ofclaim 5, wherein pre-selecting the second victim cache line includessetting a counter associated with the second victim cache line to apredetermined counter value identifying the second victim cache line asa victim cache line.
 7. The processing unit of claim 5, wherein thereplacement logic controller is further configured to perform: the cachememory setting an initial counter value for the new cache line based onat least one factor from a set including a device type of a data sourceof the new cache line, a transaction type of the memory access request,a coherence state of the new cache line at the data source, atopological location of the data source within the data processingsystem, and a topological distance between the data source and the cachememory.
 8. The processing unit of claim 5, wherein the cache memory is alower level victim cache.
 9. A design structure tangibly embodied in amachine-readable storage device for designing, manufacturing, or testingan integrated circuit, the design structure comprising: a processingunit for a data processing system, comprising: a processor core; and aset-associative cache memory coupled to the processor core, wherein thecache memory includes: a plurality of congruence classes each includingmultiple entries for storing cache lines of data; replacement logicincluding: a counter bank including a respective one of a plurality ofcounters for each cache line stored in the plurality of congruenceclasses; a replacement logic controller configured to perform:  prior toreceiving a memory access request that specifies a target address thatmaps to a particular congruence class of the cache memory, the cachememory pre-selecting for eviction from the particular congruence classonly one single first victim cache line out of all cache lines in theparticular congruence class based on at least a counter value of thevictim cache line, wherein the pre-selected first victim cache line isstored in a particular entry of the particular congruence class;  inresponse to the cache memory receiving the memory access request thatspecifies the target address that maps to the particular congruenceclass of the cache memory, that misses in the cache memory, and thatcauses the cache memory to evict the pre-selected first victim cacheline from the particular entry and install a new cache line in theparticular entry:  pre-selecting, from among all the cache lines in theparticular congruence class, only one single fixed second victim cacheline to be evicted from the particular congruence class on a next missto the particular congruence class regardless of any interveningaccesses between the memory access request and the next miss, whereinthe pre-selecting the second victim cache line includes pre-selectingthe second victim cache line based on at least a counter value of thesecond victim cache line;  adjusting counter values of counters of cachelines in the particular congruence class to make the cache lines morelikely to be subsequently selected as a victim cache line; and  adaptingan amount counter values of counters are adjusted on a cache miss basedon a dynamic distribution, at a given time, of the counter values acrossthe bank of counters.
 10. The design structure of claim 9, whereinpre-selecting the second victim cache line includes setting a counterassociated with the second victim cache line to a predetermined countervalue identifying the second victim cache line as a victim cache line.11. The design structure of claim 9, wherein the replacement logiccontroller is further configured to perform: the cache memory setting aninitial counter value for the new cache line based on at least onefactor from a set including a device type of a data source of the newcache line, a transaction type of the memory access request, a coherencestate of the new cache line at the data source, a topological locationof the data source within the data processing system, and a topologicaldistance between the data source and the cache memory.
 12. The designstructure of claim 9, wherein the cache memory is a lower level victimcache.