1997 IEEE International Solids-State Circuits Conference. Digest of Technical Papers
DOI: 10.1109/isscc.1997.585464
|View full text |Cite
|
Sign up to set email alerts
|

A 5 ns store barrier cache with dynamic prediction of load/store conflicts in superscalar processors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…SMB-specific modifications are in bold. Table (LFST) maps each store PC to the SSN of its most recent dynamic instance 1 . This SMB implementation extends StoreSets by (i) adding to each SSIT entry an additional confidence counter that tracks the stability of the communicating store-load pair and (ii) extending the LFST to track not only the SSN of the most recent dynamic instance of each store PC, but also its input data physical register tag (dtag).…”
Section: Speculative Memory Bypassing (Smb)mentioning
confidence: 99%
See 2 more Smart Citations
“…SMB-specific modifications are in bold. Table (LFST) maps each store PC to the SSN of its most recent dynamic instance 1 . This SMB implementation extends StoreSets by (i) adding to each SSIT entry an additional confidence counter that tracks the stability of the communicating store-load pair and (ii) extending the LFST to track not only the SSN of the most recent dynamic instance of each store PC, but also its input data physical register tag (dtag).…”
Section: Speculative Memory Bypassing (Smb)mentioning
confidence: 99%
“…The load also writes its address into the load queue, to allow its address to be checked by older stores that have yet to execute. 1. As proposed, StoreSets uses the SSIT to map store and load PCs to Store Set IDs, and the LFST to map StoreSet IDs to store queue indices.…”
Section: Speculative Memory Bypassing (Smb)mentioning
confidence: 99%
See 1 more Smart Citation
“…The mis-speculation penalty includes the following three components: (1) The work thrown away to recover from the mis-speculation (which in the case of squash invalidation, i.e., invalidating all instructions after the miss-speculated load, may include unrelated computations). (2) The time, if any, required to perform the invalidation. Finally, (3) the opportunity cost associated with not executing some other instructions instead of the mispeculated load and the instructions that used erroneous data [19].…”
Section: Methods For Exploiting Load/store Parallelismmentioning
confidence: 99%
“…In this paper, we study a variety of dynamic, hardware-based methods. In particular, we consider methods that are derived from combinations of the following parameters: (1) whether an address-based scheduler is used, and (2) whether memory dependence speculation [7,11,1,15,19,4,28,9,2,33] is used. In an address-based scheduler, load and store addresses are used to determine memory dependences for guiding load execution.…”
Section: Introductionmentioning
confidence: 99%