09.08.2013 Views

Design and Verification of Adaptive Cache Coherence Protocols ...

Design and Verification of Adaptive Cache Coherence Protocols ...

Design and Verification of Adaptive Cache Coherence Protocols ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

WP Imperative Rule CRF Rules<br />

IP1 (Loadl-on-Clean) CRF-Loadl<br />

IP2 (Loadl-on-Dirty) CRF-Loadl<br />

IP3 (Storel-on-Clean) CRF-Storel<br />

IP4 (Storel-on-Dirty) CRF-Storel<br />

IP5 (Commit-on-Clean) CRF-Commit<br />

IP6 (Commit-on-Invalid) CRF-Commit<br />

IP7 (Reconcile-on-Dirty) CRF-Reconcile<br />

IP8 (Reconcile-on-Clean) CRF-Purge + CRF-Reconcile + CRF-<strong>Cache</strong><br />

IP9 (Reconcile-on-Invalid) CRF-Reconcile, or<br />

CRF-Purge + CRF-Reconcile + CRF-<strong>Cache</strong><br />

IC1 (C-Send-Purge) CRF-Purge<br />

IC2 (C-Send-Wb)<br />

IC3 (C-Receive-WbAck)<br />

IC4 (C-Receive-FlushAck)<br />

IC5 (C-Receive-<strong>Cache</strong>)<br />

IM1 (M-Send-<strong>Cache</strong>) CRF-<strong>Cache</strong><br />

IM2 (M-Receive-Purge)<br />

IM3 (M-Receive-Wb)<br />

IM4 (M-Send-FlushAck) CRF-Writeback + CRF-Purge<br />

IM5 (M-Send-WbAck) CRF-Writeback<br />

Message-<strong>Cache</strong>-to-Mem<br />

Message-Mem-to-<strong>Cache</strong><br />

Figure 5.8: Simulation <strong>of</strong> WP in CRF<br />

If Rule IM4 (M-Send-FlushAck) applies, then<br />

Cell(a,-,T[ ,(id ,v)jsm]) 2 Mem(s1) ^<br />

Cell(a,v,T[ ,sm]) 2 Mem(s2) ^ Msg(H,id ,FlushAck,a) 2 Mout(s2)<br />

) Msg(H,id ,<strong>Cache</strong>,a,-) =2 MoutCin id(s2) (Lemma 15 )<br />

) Cell(a,v,Dirty) 2 <strong>Cache</strong> id(dr(s1)) ^ (Lemma 23 )<br />

a =2 dr(s2) ^ (Lemma 23 )<br />

Cell(a,v,T[-, ]) 2 Mem(dr(s2)) (Lemma 22 )<br />

) f(s1) ! f(s2) (CRF-Writeback & CRF-Purge )<br />

If Rule IM5 (M-Send-WbAck) applies, then<br />

Cell(a,-,T[ ,(id ,v)]) 2 Mem(s1) ^<br />

Cell(a,v,T[id , ]) 2 Mem(s2) ^ Msg(H,id ,WbAck,a) 2 Mout(s2)<br />

) Cell(a,v,Dirty) 2 <strong>Cache</strong> id(dr(s1)) ^ (Lemma 23 )<br />

Cell(a,v,Clean) 2 <strong>Cache</strong> id(dr(s2)) ^ (Lemma 23 )<br />

Cell(a,v,T[-, ]) 2 Mem(dr(s2)) (Lemma 22 )<br />

) f(s1) ! f(s2) (CRF-Writeback )<br />

Draining Rules<br />

If Rule IC2 (C-Send-Wb), IC3 (C-Receive-WbAck), IC4 (C-Receive-FlushAck), IC5 (C-Receive-<br />

<strong>Cache</strong>), IM2 (M-Receive-Purge), IM3 (M-Receive-Wb), Message-<strong>Cache</strong>-to-Mem or Message-Memto-<strong>Cache</strong><br />

applies, then<br />

f(s1) =f(s2) (Since the rule or its backward version is a draining rule)<br />

Figure 5.8 summarizes the simulation pro<strong>of</strong>. 2<br />

103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!