Universal branch identifier for invalidation of speculative instructions

ABSTRACT

A system for speculative branch predictions. An embodiment of the system includes branch prediction logic, fetch logic, and branch identification logic. The branch prediction logic is configured to predict a branch path for a branch in an instruction stream. The fetch logic is coupled to the branch prediction logic. The fetch logic is configured to speculatively fetch an instruction corresponding to the predicted branch path. The branch identification logic is coupled to the branch prediction logic and the fetch logic. The branch identification logic is configured to mark the speculatively fetched instruction with a branch identifier using a universal branch identification format. The universal branch identification format includes a bit value at a bit position corresponding to the predicted branch path.

BACKGROUND

Many processors use some type of branch prediction to anticipate which instructions will be needed in a given instruction stream. Branch predictions are used to potentially increase the performance of the processor by speculatively fetching instructions that correspond to a predicted branch path. There are many conventional methods of predicting branch paths, speculatively fetching instructions, and resolving whether the predicted branch path is actually used or whether the predicted branch path is a misprediction.

If instructions for a predicted branch path are speculatively fetched, and the predicted branch path later turns out to be a mispredicted branch path, then there should be some way to invalidate the speculatively fetched instructions so that the pipeline resources can be allocated to other instructions. Although some conventional speculative instruction technologies use invalidation methods, these conventional invalidation methods are complex and difficult to implement or do not allow instant (atomic) invalidation of all mis-speculated instructions.

SUMMARY

Embodiments of a system are described. In one embodiment, the system is a system for speculative branch predictions. An embodiment of the system includes branch prediction logic, fetch logic, and branch identification logic. The branch prediction logic is configured to predict a branch path for a branch in an instruction stream. The fetch logic is coupled to the branch prediction logic. The fetch logic is configured to speculatively fetch an instruction corresponding to the predicted branch path. The branch identification logic is coupled to the branch prediction logic and the fetch logic. The branch identification logic is configured to mark the speculatively fetched instruction with a branch identifier using a universal branch identification format. The universal branch identification format includes a bit value at a bit position corresponding to the predicted branch path. Other embodiments of the system are also described.

Embodiments of a method are also described. In one embodiment, the method is a method for speculative branch predictions. An embodiment of the method includes predicting a branch path for a branch in an instruction stream, fetching an instruction corresponding to the predicted branch path, and marking the speculatively fetched instruction with a branch identifier using a universal branch identification format. The universal branch identification format includes a bit value at a bit position corresponding to the predicted branch path. Other embodiments of the method are also described.

Embodiments of a computer readable storage medium are also described. In one embodiment, the computer readable storage medium embodies a program of machine-readable instructions, executable by a digital processor, to perform operations to facilitate speculative instruction invalidation. The operations include an operation to fetch an instruction corresponding to a predicted branch path in an instruction stream. The operations also include an operation to mark the speculatively fetched instruction with a branch identifier using a universal branch identification format. The universal branch identification format includes a bit value at a bit position corresponding to the predicted branch path. The operations also include an operation to invalidate the speculatively fetched instruction in response to an invalidation command. The invalidation command includes the bit value at the bit position corresponding to the predicted branch path. Other embodiments of the computer readable storage medium are also described.

Other aspects and advantages of embodiments of the present invention will become apparent from the following detailed description, taken in conjunction with the accompanying drawings, illustrated by way of example of the principles of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts a schematic block diagram of one embodiment of a processor.

FIG. 2 depicts a schematic diagram of one embodiment of an instruction stream with multiple branches and predicted branch paths.

FIG. 3 depicts a schematic diagram of one embodiment of a universal branch identification format to identify a plurality of speculatively fetched instructions corresponding to different predicted branch paths.

FIG. 4 depicts a schematic diagram of one embodiment of an instruction identification table to identify a plurality of speculatively fetched instructions.

FIG. 5 depicts a schematic flow chart diagram of one embodiment of a method for assigning a universal branch identifier using the universal branch identification format of FIG. 3.

FIG. 6 depicts a schematic flow chart diagram of one embodiment of a method for branch resolution and flush command generation using the universal branch identification format of FIG. 3.

FIG. 7 depicts a schematic flow chart diagram of a more detailed embodiment of the instruction invalidation operation of the resolution method of FIG. 6.

Throughout the description, similar reference numbers may be used to identify similar elements.

DETAILED DESCRIPTION

FIG. 1 depicts a schematic block diagram of one embodiment of a processor 100. In one embodiment, the processor 100 implements a reduced instruction set computer (RISC) design. Additionally, the processor 100 may implement a design based on the MIPS instruction set architecture (ISA). However, alternative embodiments may implement other instruction set architectures. Moreover, other embodiments of the processor 100 may include fewer or more components than are shown in FIG. 1.

The illustrated processor 100 includes fetch logic 102, decode logic 104, and a scheduler 106. In general, the fetch logic 102 fetches instructions from a cache (not shown) at a specified address. Once an instruction is fetched at the specified address, the decode logic 104 manages the registers associated with the fetched instruction. The scheduler 106 then schedules each instruction for dispatch to an appropriate execution unit.

The illustrated processor 100 includes four execution units, including an arithmetic logic unit (ALU) 108, a floating point unit (FPU) 110, a load/store unit (LSU) 112, and a memory management unit (MMU) 114. Each of these execution units is coupled to the scheduler 106, which schedules instructions for execution by one of the execution units. Once an instruction is scheduled for execution, the instruction may be sent to the corresponding execution unit where it is stored in an instruction queue, or buffer.

A branch control unit 116 is also coupled to one or more of the execution units. In one embodiment, the branch control unit 116 manages speculatively fetched instructions related to predicted branch paths. In other words, the branch control unit 116 may control at least some of the operations of the execution units by flushing in-flight instructions.

In one embodiment, the branch control unit 116 includes various components such as branch prediction logic 120, instruction identification logic 122, and instruction invalidation logic 124. The branch control unit 116 also includes a branch checkpoint register 126. Other embodiments of the branch control unit 116 may include fewer or more logic components, as well as other components. For example, the branch control unit 116 may include a memory device (not shown). The branch checkpoint register 126 may be stored in the memory device of the branch control unit 116. Alternatively, the branch control unit 116 may be coupled to a local memory device such as the cache. Additionally, the branch control unit 116 may be directly or indirectly coupled to one or more of the fetch logic 102, the decode logic 104, and the scheduler 106.

In one embodiment, the branch prediction logic 120 is configured to predict a branch path for a branch in an instruction stream. One example of predicted branches in an instruction stream is shown in FIG. 2 and described in more detail below. Depending on the implementation of the branch prediction logic 120, the branch prediction logic 120 may implement one or more types of branch prediction. For example, the branch prediction logic 120 may implement static branch prediction, bimodal branch prediction, or another type of branch prediction. Once a branch path is predicted, the fetch logic 102 is configured to speculatively fetch an instruction corresponding to the predicted branch path.

In one embodiment, the instruction identification logic 122 is configured to mark the speculatively fetched instruction with a branch identifier using a universal branch identification format. The universal branch identification format includes a bit value at a bit position corresponding to the predicted branch path. In particular, the universal branch identification format assigns one bit position to each branch, and further assigns a bit value to each predicted branch path. For example, the bit value for a predicted branch path may be a logical high signal (e.g., a logical “1”) or a logical low signal (e.g., a logical “0”).

Other embodiments may be implemented in a multi-threaded system, in which multiple threads are fetched and/or executed in the pipeline of the processor 100 at the same time. In a multi-threaded system, the universal branch identification format also includes a thread identifier. In this way, a branch misprediction of one thread results in the invalidation of the instructions belonging to that thread, but not to other threads. The invalidation format is extended to include a thread ID in addition to the bit vector (i.e., the position and value). The comparators in the various execution units compare the thread identifiers to thread identifiers of an invalidation command. This facilitates limiting invalidation commands to particular threads, if necessary. In some embodiments, the bit vector is used without any change for the multi-threading environment. In another embodiment, the bit vector is partitioned into groups, each group corresponding to a particular thread. In this embodiment, the invalidation command does not need to be extended to include the thread ID. Additional details of an embodiment of the universal branch identification format are provided below with respect to the description of FIG. 3.

In one embodiment, the instruction invalidation logic 124 is configured to invalidate a speculatively fetched instruction in response to an invalidation command. The invalidation command may be generated, for example, in response to an occurrence of a mispredicted branch. Alternatively, the invalidation command may be generated in response to an occurrence of an exception or another type of event. If an instruction encounters an exception, the branch control unit 116 may wait for all previous instructions to complete and then issue a flush for the corresponding branch path. In this way, instructions before the exception are not necessarily flushed.

In one embodiment, the invalidation command includes a bit value at a bit position corresponding to a predicted branch path. Although the format and implementation of the invalidation command are described in more detail below, it should be noted that each of the execution units (i.e., the ALU 108, the FPU 110, the LSU 112, and the MMU 114) includes a comparator 118 to compare the invalidation command to the branch identifiers associated with each of the in-flight instructions in the corresponding instruction queues. In this way, the comparators 118 determine whether to invalidate any of the in-flight instructions, depending on whether the invalidation command matches any of the branch identifiers.

In one embodiment, the branch checkpoint register 126 is used to checkpoint the state of the processor 100 before a branch instruction. Although the branch checkpoint register 126 may be implemented in various configurations, some embodiments use the positions of the branches within the entries of the branch checkpoint register 126 as the position in the branch identifier. In this way, the allocation of a position for each branch is simple and does not necessitate additional logic.

FIG. 2 depicts a schematic diagram of one embodiment of an instruction stream 130 with multiple branches and predicted branch paths. Each non-branch instruction is designated as I_(i), with eight non-branch instructions I₀ through I₇ shown in the instruction stream 130. Each branch is designated as BR_(i), with three branches BR₀ through BR₂ shown in the instruction-stream 130. Each predicted branch path is designated with a solid arrow, while the branch paths not predicted are designated with dashed arrows.

In order to identify the various instructions of the instruction stream 130, the universal branch identification format may be used. In one embodiment, the universal branch identification format includes a bit position associated with each branch, and a bit value associated with each predicted branch path of the corresponding branch. In this way, each instruction in a predicted branch path can be assigned a branch identifier with the corresponding bit value at the corresponding bit position. For example, the instructions I₂ and I₃ in the predicted branch path from branch BR₀ may have associated branch identifiers with a bit value of “1” at the bit position “0.” In a similar manner, the instructions I₄ and I₅ in the predicted branch path from branch BR₁ may have associated branch identifiers with a bit value of “1” at the bit position “1.” Furthermore, the instructions I₆ and I₇ in the predicted branch path from branch BR₂ may have associated branch identifiers with a bit value of “1” at the bit position “2.”

FIG. 3 depicts a schematic diagram of one embodiment of a universal branch identification format 132 to identify a plurality of speculatively fetched instructions corresponding to different predicted branch paths. The illustrated universal branch identification format 132 includes three bit positions designated as position “0,” position “1,” and position “2.” These bit positions correspond to specific branches in the instruction stream 130. In particular, bit position “0” corresponds to branch BR₀, bit position “1” corresponds to branch BR₁, and bit position “2” corresponds to branch BR₂ of the instruction stream 130 shown in FIG. 2.

As an example, the bit value at the bit position “0” is a logical “1” to indicate that the corresponding speculative instruction is associated with the predicted branch path of branch BR₀. In contrast, the bit values at the bit positions “1” and “2” are logical “0” to indicate that the corresponding speculative instruction is not associated with the predicted branch paths of branches BR₁ and BR₂.

In this manner, the universal branch identification format 132 can be used for all of the instructions in the instruction stream 130 by simply changing the bit values at the corresponding bit positions. Where each bit position is used for at least one branch in the instruction stream 130, the universal branch identification format can identify at least n and up to 2n different predicted branch paths by using n bits. In particular, the universal branch prediction format can identify n unresolved branch paths using n bits by using each bit position for a single branch.

In some embodiments, the universal branch prediction format can identify 2n predicted branch paths using each bit position for two branches in the instruction stream 130. In order to use each bit position for two branches, the different branches assigned to the same bit position may be identified using different bit values. For example, a first predicted branch path for a branch assigned to bit position “0” may be indicated by a logical “1,” while a second predicted branch path for a second branch assigned to the same bit position may be indicated by a logical “0.” In this manner, the bit values may be reused using alternating bit values for different branches in the same instruction stream 130.

In some embodiments, a single bit position can be used to identify multiple predicted branch paths by logically inverting the old value and using the inverted value as the new value for a subsequent predicted branch path. All other bits in the branch identifier are kept the same. Additionally, some of the bits in the branch identifier may be unused. Unused bits are available to new branches. In some embodiments, these bits are treated as a “don't care.” However, the other bits correspond to parent branches, effectively allowing the new branches to “inherit” the bits of the old branches. As a result, it may be unnecessary to track the parent bit positions and values separately.

FIG. 4 depicts a schematic diagram of one embodiment of an instruction identification table 134 to identify a plurality of speculatively fetched instructions. In the illustrated embodiment, three bit positions are used to identify instructions associated with predicted branch paths of three branches in the instruction stream 130.

The instruction identification table 134 indicates that instructions I₂ and I₃, as well as branch instruction BR₁, are associated with the predicted branch path of the branch corresponding to position “0” (the rightmost bit position) because the bit value is “1” at bit position “0.” This relationship can be seen in the instruction stream 130 of FIG. 2.

Similarly, the instruction identification table 134 indicates that instructions I₄ and I₅, as well as branch instruction BR₂, are associated with the predicted branch path of the branch corresponding to position “1” (the center bit position) because the bit value is “1” at bit position “1.” The branch identifiers for instructions I₄, I₅, and BR₂ also indicate that these instructions are also associated with the predicted branch path of the branch corresponding to bit position “0.” This relationship is indicated by the underlined “1” in bit position “0.” The underlined values in the instruction identification table 134 indicate inherited bit values from previous predicted branch paths. The previous predicted branch paths also may be referred to as predicted parent branch paths. For example, the predicted branch path associated with branch BR₁ is a predicted parent branch path for the predicted branch path associated with branch BR₂.

The instruction identification table 134 also indicates that instructions I₆ and I₇ are associated with the predicted branch path of the branch corresponding to position “2” (the leftmost bit position) because the bit value is “1” at bit position “2.” The branch identifiers for instructions I₆ and I₇ also indicate that these instructions are also associated with the predicted parent branch paths of branches BR₀ and BR₁ corresponding to bit positions “0” and “1.”

In order to invalidate instructions corresponding to a predicted branch path (e.g., in response to a mispredicted branch), the instruction invalidation logic 124 may issue an invalidation command with a format of (pos, val), where pos designates the bit position corresponding to the predicted branch path, and val designates the bit value corresponding to the predicted branch path. Alternatively, in a multi-threading processor, the invalidation command may have a format of (threadID, pos, val) to indicate the thread identifier, as well. If the branch identifier is hard partitioned into multiple groups, then the thread ID may be omitted. In other embodiments, the instruction invalidation logic 124 may issue invalidation commands having other formats.

As an example, if the instruction invalidation logic 124 issues an invalidation command to invalidate, or flush, the instructions associated with the predicted branch path at branch BR₂, then the invalidation command may be formatted as (2, 1) to indicate that instructions with a bit value of“1” at the bit position “2” should be invalidated. Referring back to the instruction stream 130 of FIG. 2 and the instruction identification table 134 of FIG. 4, this invalidation command would invalidate instructions I₆ and I₇ because they each have a bit value of “1” at the bit position “2.”

As another example, if the instruction invalidation logic 124 issues an invalidation command to invalidate, or flush, the instructions associated with the predicted branch path at branch BR₁, then the invalidation command may be formatted as (1, 1) to indicate that instructions with a bit value of “1” at the bit position “1” should be invalidated. Referring back to the instruction stream 130 of FIG. 2 and the instruction identification table 134 of FIG. 4, this invalidation command would invalidate instructions I₄ through I₇, including branch instruction BR₂, because they each have a bit value of “1” at the bit position “1.” It should be noted that this invalidation command would invalidate instructions associated with predicted branch paths of both branches BR₁ and BR₂ because the predicted branch path of branch BR₁ is a predicted parent branch path of branch BR₂. As a result, all of the instructions I₄ through I₇ are dependent on the predicted branch path at branch BR₁, and instructions I₆ and I₇ include an inherited bit value of “1” at the bit position “1,” so the invalidation command would invalidate all of the instructions I₄ through I₇.

As another example, if the instruction invalidation logic 124 issues an invalidation command to invalidate, or flush, the instructions associated with the predicted branch path at branch BR₀, then the invalidation command may be formatted as (0, 1) to indicate that instructions with a bit value of “1” at the bit position “0” should be invalidated. Referring back to the instruction stream 130 of FIG. 2 and the instruction identification table 134 of FIG. 4, this invalidation command would invalidate instructions I₂ through I₇, including branch instructions BR₁ and BR₂, because they each have a bit value of “1” at the bit position “0.” It should be noted that this invalidation command would invalidate instructions associated with predicted branch paths of branches BR₀, BR₁, and BR₂ because the predicted branch path of branch BR₀ is a predicted parent branch path of branches BR₁ and BR₂. As a result, all of the instructions I₂ through I₇ are dependent on the predicted branch path at branch BR₀, and instructions I₄ through I₇ include an inherited bit value of “1” at the bit position “0,” so the invalidation command would invalidate all of the instructions I₂ through I₇.

It should be noted that some embodiments may store a representation of the instruction identification table 134 in a single memory location. In other embodiments, the information corresponding to the instruction identification table 134 may be distributed across or throughout the pipeline.

FIG. 5 depicts a schematic flow chart diagram of one embodiment of a method for assigning a universal branch identifier using the universal branch identification format of FIG. 3. Some embodiments of the assignment method 140 may be implemented in conjunction with the processor 100 shown in FIG. 1 and described above. Other embodiments of the assignment method 140 may be implemented in conjunction with other types of processors such as a multi-threaded processor.

In one embodiment, the bit value and bit position are initialized to default values such as (0,0). In the assignment method 140, the fetch logic 102 speculatively fetches 142 a next instruction for an instruction stream. Subsequently, the branch control unit 116 marks 144 the instruction with a current branch identifier using the universal branch identification format 132. In one embodiment, the branch control unit 116 invokes the instruction identification logic 122 to establish the instruction identification table 134, as described above, to record the branch identifier assigned to each instruction.

The branch control unit 116 then determines 146 if the fetched instruction is a branch instruction and, if not, returns to fetch 142 the next instruction in the instruction stream. Otherwise, if the fetched instruction is a branch instruction, then the branch control unit 116 takes 148 the existing branch identifiers and assigns 150 any unused bit position to the new branch. In one embodiment, the unused bit position may be a find first available in a particular order. Alternatively, the unused bit position may be any bit position regardless of the order of previously selected bit positions. Alternatively, this bit position may be the same as the position of the branch in the branch checkpoint register 126.

The branch identification logic 122 then inverts 152 the logical value of the newly assigned bit position to give the corresponding predicted branch path a unique value at that bit position. For example, if the bit value at the selected bit position is previously logical “0,” then the branch identification logic 122 inverts the logical value to a logical “1.” Alternatively, if the bit value at the selected bit position is previously logical “1,” then the branch identification logic 122 inverts the logical value to a logical “0.” The branch identification logic 122 then registers 154 the new bit position and bit value (i.e., the (pos, val) pair) as a branch identifier for subsequent use. This new (pos,val) pair is associated with the branch that caused it, although the branch itself inherits the old bit vector. The new (pos,val) pair is used in the invalidation command, should this branch mispredict. In one embodiment, the branch control unit 116 stores the updated branch identifier in a local memory device. The illustrated assignment method 140 then ends.

It should be noted that the branch identifier is updated, in one embodiment, so that only one bit value is changed at a time. All of the other bit values in the non-selected bit positions remain the same. Some of the bit positions might be unused because they either have not been assigned to a predicted branch path, yet, or the branches to which they were assigned have been resolved. These unused bits may be “don't cares.” The remaining bits belong to parent branches and, by keeping these bit values of the parent branches, allow the new branch identifier to inherit the proper bit values to indicate a branch dependency between two or more branch paths. In this way, an invalidation command to invalidate a instructions of a parent branch path may be extended to flush all child branches and related instructions.

FIG. 6 depicts a schematic flow chart diagram of one embodiment of a method for branch resolution and flush command generation using the universal branch identification format of FIG. 3. Some embodiments of the resolution method 160 may be implemented in conjunction with the processor 100 shown in FIG. 1 and described above. Other embodiments of the resolution method 160 may be implemented in conjunction with other types of processors such as a multi-threaded processor.

In the resolution method 160, a branch instruction is issued 162 and the branch is resolved 164. The branch control unit 116 then determines 166 if the resolved branch was mispredicted. If the resolved branch was mispredicted, then the branch invalidation logic 124 sends 168 an invalidation, or flush, command to one or more of the execution units. In one embodiment, the invalidation command uses the (pos,val) pair associated with it during the assigning process 140. In response, each execution unit flushes the instructions identified by the invalidation command. In some embodiments, the invalidation command facilitates an atomic flush. Additional exemplary details of the instruction invalidation operation 168 are shown in FIG. 7 and described below.

After the branch invalidation logic 124 sends the invalidation command, or if the branch control unit 116 determines 166 that the branch was not mispredicted, then the branch identification logic 122 releases 170 the bit position for the corresponding branch so that the bit position can be reused for a subsequent branch in the instruction stream 130. The depicted resolution method 160 then ends.

FIG. 7 depicts a schematic flow chart diagram of one embodiment of an invalidation method 180. In one embodiment, the invalidation method 180 is a more detailed embodiment of the instruction invalidation operation 168 of the resolution method 160 of FIG. 6. Some embodiments of the invalidation method 180 may be implemented in conjunction with the processor 100 shown in FIG. 1 and described above. Other embodiments of the invalidation method 180 may be implemented in conjunction with other types of processors such as a multi-threaded processor.

In the invalidation method 180, the instruction invalidation logic 124 generates an invalidation command to invalidate instructions associated with one or more predicted branch paths. Each execution unit receives 182 the invalidation command to invalidate at least one speculative instruction in the instruction stream 130. In one embodiment, the instruction invalidation logic 124 broadcasts the invalidation command to all of the execution units at approximately the same time. In a further embodiment, the instruction invalidation logic 124 sends the invalidation command to one of the execution units, and each execution unit serially passes the invalidation command to an adjacent execution unit until all of the execution units have received the invalidation command.

Once an execution unit receives the invalidation command, the execution unit identifies 184 a bit position and a bit value indicated by the command. In some embodiments, a single invalidation command may indicate multiple bit positions and/or multiple bit values. The execution unit then identifies 186 one or more in-flight instructions and, for each in-flight instruction, the comparator 118 of the corresponding execution unit compares 188 the bit position and bit value of the invalidation command with the bit positions and bit values of the identified in-flight instruction. If the comparator 118 determines 190 that the in-flight instruction has the same bit value at the same bit position as the invalidation command, then the execution unit invalidates 192 the in-flight instruction. Otherwise, the execution unit does not invalidate the in-flight instruction. In some embodiments, the comparator 118 also may determine if the correct thread is indicated.

The execution unit then determines 194 if there are more instructions to be compared and, if so, continues to compare the in-flight instructions with the invalidation command, as described above. In another embodiment, the execution unit may perform an atomic flush to invalidate, or flush, multiple instructions at approximately the same time. Once all of the indicated in-flight instructions have been invalidated, the illustrated instruction invalidation operation 156 then ends.

It should be noted that embodiments of the assignment method 140, the resolution method 160, and the invalidation method 180 may be implemented in software, firmware, hardware, or some combination thereof. Additionally, some embodiments of the assignment method 140, the resolution method 160, and the invalidation method 180 may be implemented using a hardware or software representation of one or more algorithms related to the operations described above. For example, software, hardware, or a combination of software and hardware may be implemented to make a branch prediction, mark each speculatively fetched instruction with a branch identifier, or compare the actual branch with the predicted branch.

Embodiments of the invention also may involve a number of functions to be performed by a computer processor such as a central processing unit (CPU), a graphics processing unit (GPU), or a microprocessor. The microprocessor may be a specialized or dedicated microprocessor that is configured to perform particular tasks by executing machine-readable software code that defines the particular tasks. The microprocessor also may be configured to operate and communicate with other devices such as direct memory access modules, memory storage devices, Internet related hardware, and other devices that relate to the transmission of data. The software code may be configured using software formats such as Java, C++, XML (Extensible Mark-up Language) and other languages that may be used to define functions that relate to operations of devices required to carry out the functional operations related described herein. The code may be written in different forms and styles, many of which are known to those skilled in the art. Different code formats, code configurations, styles and forms of software programs and other means of configuring code to define the operations of a microprocessor may be implemented.

Within the different types of computers, such as computer servers, that utilize the invention, there exist different types of memory devices for storing and retrieving information while performing some or all of the functions described herein. In some embodiments, the memory/storage device where data is stored may be a separate device that is external to the processor, or may be configured in a monolithic device, where the memory or storage device is located on the same integrated circuit, such as components connected on a single substrate. Cache memory devices are often included in computers for use by the CPU or GPU as a convenient storage location for information that is frequently stored and retrieved. Similarly, a persistent memory is also frequently used with such computers for maintaining information that is frequently retrieved by a central processing unit, but that is not often altered within the persistent memory, unlike the cache memory. Main memory is also usually included for storing and retrieving larger amounts of information such as data and software applications configured to perform certain functions when executed by the central processing unit. These memory devices may be configured as random access memory (RAM), static random access memory (SRAM), dynamic random access memory (DRAM), flash memory, and other memory storage devices that may be accessed by a central processing unit to store and retrieve information. Embodiments may be implemented with various memory and storage devices, as well as any commonly used protocol for storing and retrieving information to and from these memory devices respectively.

Although the operations of the method(s) herein are shown and described in a particular order, the order of the operations of each method may be altered so that certain operations may be performed in an inverse order or so that certain operations may be performed, at least in part, concurrently with other operations. In another embodiment, instructions or sub-operations of distinct operations may be implemented in an intermittent and/or alternating manner.

Although specific embodiments of the invention have been described and illustrated, the invention is not to be limited to the specific forms or arrangements of parts so described and illustrated. The scope of the invention is to be defined by the claims appended hereto and their equivalents. 

1. A system for speculative branch predictions, the system comprising: branch prediction logic to predict a branch path for a branch in an instruction stream; fetch logic coupled to the branch prediction logic, the fetch logic to speculatively fetch an instruction corresponding to the predicted branch path; and branch identification logic coupled to the branch prediction logic and the fetch logic, the branch identification logic to mark the speculatively fetched instruction with a branch identifier using a universal branch identification format, the universal branch identification format comprising a bit value at a bit position corresponding to the predicted branch path.
 2. The system according to claim 1, fiurther comprising branch invalidation logic coupled to the branch identification logic, the branch invalidation logic to invalidate the speculatively fetched instruction in response to an invalidation command comprising the bit value at the bit position corresponding to the predicted branch path.
 3. The system according to claim 2, the branch invalidation logic coupled to an execution unit comprising comparison logic, the comparison logic to compare the invalidation command to a plurality of branch identifiers associated with a plurality of in-flight instructions to determine whether to invalidate any of the plurality of in-flight instructions.
 4. The system according to claim 2, the invalidation command comprising a format of (pos, val), where pos designates the bit position corresponding to the predicted branch path, and val designates the bit value corresponding to the predicted branch path.
 5. The system according to claim 4, the invalidation command further comprising a thread identifier to designate a thread of a multi-threaded process, the designated thread corresponding to the predicted branch path.
 6. The system according to claim 2, the invalidation command associated with an occurrence of a mispredicted branch.
 7. The system according to claim 2, the invalidation command associated with an occurrence of an exception, the invalidated speculatively fetched instruction subsequent to an instruction associated with the occurrence of the exception.
 8. The system according to claim 1, the universal branch identification format further comprising a second bit value at a second bit position corresponding to a predicted parent branch path of a parent branch in the instruction stream.
 9. The system according to claim 1, further comprising a branch checkpoint register, the branch checkpoint register comprising a plurality of entries corresponding to a plurality of bit positions, including the bit position corresponding to the predicted branch path.
 10. The system according to claim 1, the branch identification logic further configured to randomly assign the bit position to the predicted branch path.
 11. The system according to claim 1, the branch identification logic further configured to implement a first find assignment routine to assign the bit position to the predicted branch path.
 12. The system according to claim 1, the universal branch identification format comprising n bit positions, including the bit position corresponding to the predicted branch path, where n designates a limit of fetched, unresolved branches in the instruction stream.
 13. The system according to claim 12, the n bit positions partitioned into groups, each group corresponding to a unique thread.
 14. The system according to claim 1, the universal branch identification format comprising n bit positions, including the bit position corresponding to the predicted branch path, where 2n designates a limit of identifiable branch paths.
 15. The system according to claim 14, the branch identification logic further configured to assign a second bit value to designate a second predicted branch path, the second bit value at the same bit position corresponding to the predicted branch path.
 16. The system according to claim 15, the branch identification logic further configured to invert the bit value to assign the second bit value at the same position for the second predicted branch path.
 17. A method for speculative branch predictions, the method comprising: predicting a branch path for a branch in an instruction stream; fetching an instruction corresponding to the predicted branch path; and marking the speculatively fetched instruction with a branch identifier using a universal branch identification format, the universal branch identification format comprising a bit value at a bit position corresponding to the predicted branch path.
 18. The method according to claim 17, invalidating the speculatively fetched instruction in response to an invalidation command comprising the bit value at the bit position corresponding to the predicted branch path.
 19. The method according to claim 18, further comprising comparing the invalidation command to a plurality of branch identifiers associated with a plurality of in-flight instructions to determine whether to invalidate any of the plurality of in-flight instructions.
 20. The method according to claim 18, further comprising invalidating the speculatively fetched instruction in response to an occurrence of a mispredicted branch.
 21. The method according to claim 18, further comprising invalidating the speculatively fetched instruction in response to an occurrence of an exception.
 22. The method according to claim 17, the universal branch identification format comprising a plurality of bit positions, including the bit position corresponding to the predicted branch path, each of the plurality of bit positions corresponding to at least one of a plurality of predicted branch paths of the instruction stream.
 23. The method according to claim 22, further comprising storing an instruction identification table comprising a plurality of speculatively fetched instructions and a corresponding plurality of branch identifiers.
 24. A computer readable storage medium embodying a program of machine-readable instructions, executable by a digital processor, to perform operations to facilitate speculative instruction invalidation, the operations comprising: fetch an instruction corresponding to a predicted branch path in an instruction stream; mark the speculatively fetched instruction with a branch identifier using a universal branch identification format, the universal branch identification format comprising a bit value at a bit position corresponding to the predicted branch path; and invalidate the speculatively fetched instruction in response to an invalidation command comprising the bit value at the bit position corresponding to the predicted branch path.
 25. The computer readable storage medium according to claim 24, the operations further comprising an operation to compare the invalidation command to a plurality of branch identifiers associated with a plurality of in-flight instructions to determine whether to invalidate any of the plurality of in-flight instructions.
 26. The computer readable storage medium according to claim 24, the operations further comprising an operation to generate the invalidation command in response to an occurrence of a mispredicted branch.
 27. The computer readable storage medium according to claim 24, the operations further comprising an operation to generate the invalidation command in response to an occurrence of an exception.
 28. The computer readable storage medium according to claim 24, the operations further comprising an operation to store an instruction identification table comprising a plurality of speculatively fetched instructions and a corresponding plurality of branch identifiers. 