Design and Verification of Adaptive Cache Coherence Protocols ...
Design and Verification of Adaptive Cache Coherence Protocols ...
Design and Verification of Adaptive Cache Coherence Protocols ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
WP Imperative Rule CRF Rules<br />
IP1 (Loadl-on-Clean) CRF-Loadl<br />
IP2 (Loadl-on-Dirty) CRF-Loadl<br />
IP3 (Storel-on-Clean) CRF-Storel<br />
IP4 (Storel-on-Dirty) CRF-Storel<br />
IP5 (Commit-on-Clean) CRF-Commit<br />
IP6 (Commit-on-Invalid) CRF-Commit<br />
IP7 (Reconcile-on-Dirty) CRF-Reconcile<br />
IP8 (Reconcile-on-Clean) CRF-Purge + CRF-Reconcile + CRF-<strong>Cache</strong><br />
IP9 (Reconcile-on-Invalid) CRF-Reconcile, or<br />
CRF-Purge + CRF-Reconcile + CRF-<strong>Cache</strong><br />
IC1 (C-Send-Purge) CRF-Purge<br />
IC2 (C-Send-Wb)<br />
IC3 (C-Receive-WbAck)<br />
IC4 (C-Receive-FlushAck)<br />
IC5 (C-Receive-<strong>Cache</strong>)<br />
IM1 (M-Send-<strong>Cache</strong>) CRF-<strong>Cache</strong><br />
IM2 (M-Receive-Purge)<br />
IM3 (M-Receive-Wb)<br />
IM4 (M-Send-FlushAck) CRF-Writeback + CRF-Purge<br />
IM5 (M-Send-WbAck) CRF-Writeback<br />
Message-<strong>Cache</strong>-to-Mem<br />
Message-Mem-to-<strong>Cache</strong><br />
Figure 5.8: Simulation <strong>of</strong> WP in CRF<br />
If Rule IM4 (M-Send-FlushAck) applies, then<br />
Cell(a,-,T[ ,(id ,v)jsm]) 2 Mem(s1) ^<br />
Cell(a,v,T[ ,sm]) 2 Mem(s2) ^ Msg(H,id ,FlushAck,a) 2 Mout(s2)<br />
) Msg(H,id ,<strong>Cache</strong>,a,-) =2 MoutCin id(s2) (Lemma 15 )<br />
) Cell(a,v,Dirty) 2 <strong>Cache</strong> id(dr(s1)) ^ (Lemma 23 )<br />
a =2 dr(s2) ^ (Lemma 23 )<br />
Cell(a,v,T[-, ]) 2 Mem(dr(s2)) (Lemma 22 )<br />
) f(s1) ! f(s2) (CRF-Writeback & CRF-Purge )<br />
If Rule IM5 (M-Send-WbAck) applies, then<br />
Cell(a,-,T[ ,(id ,v)]) 2 Mem(s1) ^<br />
Cell(a,v,T[id , ]) 2 Mem(s2) ^ Msg(H,id ,WbAck,a) 2 Mout(s2)<br />
) Cell(a,v,Dirty) 2 <strong>Cache</strong> id(dr(s1)) ^ (Lemma 23 )<br />
Cell(a,v,Clean) 2 <strong>Cache</strong> id(dr(s2)) ^ (Lemma 23 )<br />
Cell(a,v,T[-, ]) 2 Mem(dr(s2)) (Lemma 22 )<br />
) f(s1) ! f(s2) (CRF-Writeback )<br />
Draining Rules<br />
If Rule IC2 (C-Send-Wb), IC3 (C-Receive-WbAck), IC4 (C-Receive-FlushAck), IC5 (C-Receive-<br />
<strong>Cache</strong>), IM2 (M-Receive-Purge), IM3 (M-Receive-Wb), Message-<strong>Cache</strong>-to-Mem or Message-Memto-<strong>Cache</strong><br />
applies, then<br />
f(s1) =f(s2) (Since the rule or its backward version is a draining rule)<br />
Figure 5.8 summarizes the simulation pro<strong>of</strong>. 2<br />
103