snoop_filter.cc (12352:3bddc8785a99) snoop_filter.cc (12353:5650eb170bfb)
1/*
2 * Copyright (c) 2013-2017 ARM Limited
3 * All rights reserved
4 *
5 * The license below extends only to copyright in the software and shall
6 * not be construed as granting a license to any other intellectual
7 * property including but not limited to intellectual property relating
8 * to a hardware implementation of the functionality of the software
9 * licensed hereunder. You may use the software subject to the license
10 * terms below provided that you ensure that this notice is replicated
11 * unmodified and in its entirety in all distributions of the software,
12 * modified or unmodified, in source code or in binary form.
13 *
14 * Redistribution and use in source and binary forms, with or without
15 * modification, are permitted provided that the following conditions are
16 * met: redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer;
18 * redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution;
21 * neither the name of the copyright holders nor the names of its
22 * contributors may be used to endorse or promote products derived from
23 * this software without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
26 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
27 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
28 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
29 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
30 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
31 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
35 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 *
37 * Authors: Stephan Diestelhorst
38 */
39
40/**
41 * @file
42 * Implementation of a snoop filter.
43 */
44
45#include "mem/snoop_filter.hh"
46
47#include "base/logging.hh"
48#include "base/trace.hh"
49#include "debug/SnoopFilter.hh"
50#include "sim/system.hh"
51
52void
53SnoopFilter::eraseIfNullEntry(SnoopFilterCache::iterator& sf_it)
54{
55 SnoopItem& sf_item = sf_it->second;
56 if (!(sf_item.requested | sf_item.holder)) {
57 cachedLocations.erase(sf_it);
58 DPRINTF(SnoopFilter, "%s: Removed SF entry.\n",
59 __func__);
60 }
61}
62
63std::pair<SnoopFilter::SnoopList, Cycles>
64SnoopFilter::lookupRequest(const Packet* cpkt, const SlavePort& slave_port)
65{
66 DPRINTF(SnoopFilter, "%s: src %s packet %s\n", __func__,
67 slave_port.name(), cpkt->print());
68
69 // check if the packet came from a cache
70 bool allocate = !cpkt->req->isUncacheable() && slave_port.isSnooping() &&
71 cpkt->fromCache();
72 Addr line_addr = cpkt->getBlockAddr(linesize);
73 if (cpkt->isSecure()) {
74 line_addr |= LineSecure;
75 }
76 SnoopMask req_port = portToMask(slave_port);
77 reqLookupResult = cachedLocations.find(line_addr);
78 bool is_hit = (reqLookupResult != cachedLocations.end());
79
80 // If the snoop filter has no entry, and we should not allocate,
81 // do not create a new snoop filter entry, simply return a NULL
82 // portlist.
83 if (!is_hit && !allocate)
84 return snoopDown(lookupLatency);
85
86 // If no hit in snoop filter create a new element and update iterator
87 if (!is_hit)
88 reqLookupResult = cachedLocations.emplace(line_addr, SnoopItem()).first;
89 SnoopItem& sf_item = reqLookupResult->second;
90 SnoopMask interested = sf_item.holder | sf_item.requested;
91
92 // Store unmodified value of snoop filter item in temp storage in
93 // case we need to revert because of a send retry in
94 // updateRequest.
95 retryItem = sf_item;
96
97 totRequests++;
98 if (is_hit) {
99 // Single bit set -> value is a power of two
100 if (isPow2(interested))
101 hitSingleRequests++;
102 else
103 hitMultiRequests++;
104 }
105
106 DPRINTF(SnoopFilter, "%s: SF value %x.%x\n",
107 __func__, sf_item.requested, sf_item.holder);
108
109 // If we are not allocating, we are done
110 if (!allocate)
111 return snoopSelected(maskToPortList(interested & ~req_port),
112 lookupLatency);
113
114 if (cpkt->needsResponse()) {
115 if (!cpkt->cacheResponding()) {
116 // Max one request per address per port
117 panic_if(sf_item.requested & req_port, "double request :( " \
118 "SF value %x.%x\n", sf_item.requested, sf_item.holder);
119
120 // Mark in-flight requests to distinguish later on
121 sf_item.requested |= req_port;
122 DPRINTF(SnoopFilter, "%s: new SF value %x.%x\n",
123 __func__, sf_item.requested, sf_item.holder);
124 } else {
125 // NOTE: The memInhibit might have been asserted by a cache closer
126 // to the CPU, already -> the response will not be seen by this
127 // filter -> we do not need to keep the in-flight request, but make
128 // sure that we know that that cluster has a copy
129 panic_if(!(sf_item.holder & req_port), "Need to hold the value!");
130 DPRINTF(SnoopFilter,
131 "%s: not marking request. SF value %x.%x\n",
132 __func__, sf_item.requested, sf_item.holder);
133 }
134 } else { // if (!cpkt->needsResponse())
135 assert(cpkt->isEviction());
136 // make sure that the sender actually had the line
137 panic_if(!(sf_item.holder & req_port), "requester %x is not a " \
138 "holder :( SF value %x.%x\n", req_port,
139 sf_item.requested, sf_item.holder);
140 // CleanEvicts and Writebacks -> the sender and all caches above
141 // it may not have the line anymore.
142 if (!cpkt->isBlockCached()) {
143 sf_item.holder &= ~req_port;
144 DPRINTF(SnoopFilter, "%s: new SF value %x.%x\n",
145 __func__, sf_item.requested, sf_item.holder);
146 }
147 }
148
149 return snoopSelected(maskToPortList(interested & ~req_port), lookupLatency);
150}
151
152void
153SnoopFilter::finishRequest(bool will_retry, Addr addr, bool is_secure)
154{
155 if (reqLookupResult != cachedLocations.end()) {
156 // since we rely on the caller, do a basic check to ensure
157 // that finishRequest is being called following lookupRequest
158 Addr line_addr = (addr & ~(Addr(linesize - 1)));
159 if (is_secure) {
160 line_addr |= LineSecure;
161 }
162 assert(reqLookupResult->first == line_addr);
163 if (will_retry) {
164 // Undo any changes made in lookupRequest to the snoop filter
165 // entry if the request will come again. retryItem holds
166 // the previous value of the snoopfilter entry.
167 reqLookupResult->second = retryItem;
168
169 DPRINTF(SnoopFilter, "%s: restored SF value %x.%x\n",
170 __func__, retryItem.requested, retryItem.holder);
171 }
172
173 eraseIfNullEntry(reqLookupResult);
174 }
175}
176
177std::pair<SnoopFilter::SnoopList, Cycles>
178SnoopFilter::lookupSnoop(const Packet* cpkt)
179{
180 DPRINTF(SnoopFilter, "%s: packet %s\n", __func__, cpkt->print());
181
182 assert(cpkt->isRequest());
183
184 Addr line_addr = cpkt->getBlockAddr(linesize);
185 if (cpkt->isSecure()) {
186 line_addr |= LineSecure;
187 }
188 auto sf_it = cachedLocations.find(line_addr);
189 bool is_hit = (sf_it != cachedLocations.end());
190
191 panic_if(!is_hit && (cachedLocations.size() >= maxEntryCount),
192 "snoop filter exceeded capacity of %d cache blocks\n",
193 maxEntryCount);
194
195 // If the snoop filter has no entry, simply return a NULL
196 // portlist, there is no point creating an entry only to remove it
197 // later
198 if (!is_hit)
199 return snoopDown(lookupLatency);
200
201 SnoopItem& sf_item = sf_it->second;
202
203 DPRINTF(SnoopFilter, "%s: old SF value %x.%x\n",
204 __func__, sf_item.requested, sf_item.holder);
205
206 SnoopMask interested = (sf_item.holder | sf_item.requested);
207
208 totSnoops++;
209 // Single bit set -> value is a power of two
210 if (isPow2(interested))
211 hitSingleSnoops++;
212 else
213 hitMultiSnoops++;
214
215 // ReadEx and Writes require both invalidation and exlusivity, while reads
216 // require neither. Writebacks on the other hand require exclusivity but
217 // not the invalidation. Previously Writebacks did not generate upward
218 // snoops so this was never an issue. Now that Writebacks generate snoops
219 // we need a special case for Writebacks. Additionally cache maintenance
220 // operations can generate snoops as they clean and/or invalidate all
221 // caches down to the specified point of reference.
222 assert(cpkt->isWriteback() || cpkt->req->isUncacheable() ||
223 (cpkt->isInvalidate() == cpkt->needsWritable()) ||
224 cpkt->req->isCacheMaintenance());
225 if (cpkt->isInvalidate() && !sf_item.requested) {
226 // Early clear of the holder, if no other request is currently going on
227 // @todo: This should possibly be updated even though we do not filter
228 // upward snoops
229 sf_item.holder = 0;
230 }
231
232 eraseIfNullEntry(sf_it);
233 DPRINTF(SnoopFilter, "%s: new SF value %x.%x interest: %x \n",
234 __func__, sf_item.requested, sf_item.holder, interested);
235
236 return snoopSelected(maskToPortList(interested), lookupLatency);
237}
238
239void
240SnoopFilter::updateSnoopResponse(const Packet* cpkt,
241 const SlavePort& rsp_port,
242 const SlavePort& req_port)
243{
244 DPRINTF(SnoopFilter, "%s: rsp %s req %s packet %s\n",
245 __func__, rsp_port.name(), req_port.name(), cpkt->print());
246
247 assert(cpkt->isResponse());
248 assert(cpkt->cacheResponding());
249
250 // if this snoop response is due to an uncacheable request, or is
251 // being turned into a normal response, there is nothing more to
252 // do
253 if (cpkt->req->isUncacheable() || !req_port.isSnooping()) {
254 return;
255 }
256
257 Addr line_addr = cpkt->getBlockAddr(linesize);
258 if (cpkt->isSecure()) {
259 line_addr |= LineSecure;
260 }
261 SnoopMask rsp_mask = portToMask(rsp_port);
262 SnoopMask req_mask = portToMask(req_port);
263 SnoopItem& sf_item = cachedLocations[line_addr];
264
265 DPRINTF(SnoopFilter, "%s: old SF value %x.%x\n",
266 __func__, sf_item.requested, sf_item.holder);
267
268 // The source should have the line
269 panic_if(!(sf_item.holder & rsp_mask), "SF value %x.%x does not have "\
270 "the line\n", sf_item.requested, sf_item.holder);
271
272 // The destination should have had a request in
273 panic_if(!(sf_item.requested & req_mask), "SF value %x.%x missing "\
274 "the original request\n", sf_item.requested, sf_item.holder);
275
276 // If the snoop response has no sharers the line is passed in
277 // Modified state, and we know that there are no other copies, or
278 // they will all be invalidated imminently
279 if (!cpkt->hasSharers()) {
280 DPRINTF(SnoopFilter,
281 "%s: dropping %x because non-shared snoop "
282 "response SF val: %x.%x\n", __func__, rsp_mask,
283 sf_item.requested, sf_item.holder);
284 sf_item.holder = 0;
285 }
286 assert(!cpkt->isWriteback());
287 // @todo Deal with invalidating responses
288 sf_item.holder |= req_mask;
289 sf_item.requested &= ~req_mask;
290 assert(sf_item.requested | sf_item.holder);
291 DPRINTF(SnoopFilter, "%s: new SF value %x.%x\n",
292 __func__, sf_item.requested, sf_item.holder);
293}
294
295void
296SnoopFilter::updateSnoopForward(const Packet* cpkt,
297 const SlavePort& rsp_port, const MasterPort& req_port)
298{
299 DPRINTF(SnoopFilter, "%s: rsp %s req %s packet %s\n",
300 __func__, rsp_port.name(), req_port.name(), cpkt->print());
301
302 assert(cpkt->isResponse());
303 assert(cpkt->cacheResponding());
304
305 Addr line_addr = cpkt->getBlockAddr(linesize);
306 if (cpkt->isSecure()) {
307 line_addr |= LineSecure;
308 }
309 auto sf_it = cachedLocations.find(line_addr);
310 bool is_hit = sf_it != cachedLocations.end();
311
312 // Nothing to do if it is not a hit
313 if (!is_hit)
314 return;
315
316 SnoopItem& sf_item = sf_it->second;
317
318 DPRINTF(SnoopFilter, "%s: old SF value %x.%x\n",
319 __func__, sf_item.requested, sf_item.holder);
320
321 // If the snoop response has no sharers the line is passed in
322 // Modified state, and we know that there are no other copies, or
323 // they will all be invalidated imminently
324 if (!cpkt->hasSharers()) {
325 sf_item.holder = 0;
326 }
327 DPRINTF(SnoopFilter, "%s: new SF value %x.%x\n",
328 __func__, sf_item.requested, sf_item.holder);
329 eraseIfNullEntry(sf_it);
330
331}
332
333void
334SnoopFilter::updateResponse(const Packet* cpkt, const SlavePort& slave_port)
335{
336 DPRINTF(SnoopFilter, "%s: src %s packet %s\n",
337 __func__, slave_port.name(), cpkt->print());
338
339 assert(cpkt->isResponse());
340
341 // we only allocate if the packet actually came from a cache, but
342 // start by checking if the port is snooping
343 if (cpkt->req->isUncacheable() || !slave_port.isSnooping())
344 return;
345
346 // next check if we actually allocated an entry
347 Addr line_addr = cpkt->getBlockAddr(linesize);
348 if (cpkt->isSecure()) {
349 line_addr |= LineSecure;
350 }
351 auto sf_it = cachedLocations.find(line_addr);
352 if (sf_it == cachedLocations.end())
353 return;
354
355 SnoopMask slave_mask = portToMask(slave_port);
356 SnoopItem& sf_item = sf_it->second;
357
358 DPRINTF(SnoopFilter, "%s: old SF value %x.%x\n",
359 __func__, sf_item.requested, sf_item.holder);
360
361 // Make sure we have seen the actual request, too
362 panic_if(!(sf_item.requested & slave_mask), "SF value %x.%x missing "\
363 "request bit\n", sf_item.requested, sf_item.holder);
364
1/*
2 * Copyright (c) 2013-2017 ARM Limited
3 * All rights reserved
4 *
5 * The license below extends only to copyright in the software and shall
6 * not be construed as granting a license to any other intellectual
7 * property including but not limited to intellectual property relating
8 * to a hardware implementation of the functionality of the software
9 * licensed hereunder. You may use the software subject to the license
10 * terms below provided that you ensure that this notice is replicated
11 * unmodified and in its entirety in all distributions of the software,
12 * modified or unmodified, in source code or in binary form.
13 *
14 * Redistribution and use in source and binary forms, with or without
15 * modification, are permitted provided that the following conditions are
16 * met: redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer;
18 * redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution;
21 * neither the name of the copyright holders nor the names of its
22 * contributors may be used to endorse or promote products derived from
23 * this software without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
26 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
27 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
28 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
29 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
30 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
31 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
35 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 *
37 * Authors: Stephan Diestelhorst
38 */
39
40/**
41 * @file
42 * Implementation of a snoop filter.
43 */
44
45#include "mem/snoop_filter.hh"
46
47#include "base/logging.hh"
48#include "base/trace.hh"
49#include "debug/SnoopFilter.hh"
50#include "sim/system.hh"
51
52void
53SnoopFilter::eraseIfNullEntry(SnoopFilterCache::iterator& sf_it)
54{
55 SnoopItem& sf_item = sf_it->second;
56 if (!(sf_item.requested | sf_item.holder)) {
57 cachedLocations.erase(sf_it);
58 DPRINTF(SnoopFilter, "%s: Removed SF entry.\n",
59 __func__);
60 }
61}
62
63std::pair<SnoopFilter::SnoopList, Cycles>
64SnoopFilter::lookupRequest(const Packet* cpkt, const SlavePort& slave_port)
65{
66 DPRINTF(SnoopFilter, "%s: src %s packet %s\n", __func__,
67 slave_port.name(), cpkt->print());
68
69 // check if the packet came from a cache
70 bool allocate = !cpkt->req->isUncacheable() && slave_port.isSnooping() &&
71 cpkt->fromCache();
72 Addr line_addr = cpkt->getBlockAddr(linesize);
73 if (cpkt->isSecure()) {
74 line_addr |= LineSecure;
75 }
76 SnoopMask req_port = portToMask(slave_port);
77 reqLookupResult = cachedLocations.find(line_addr);
78 bool is_hit = (reqLookupResult != cachedLocations.end());
79
80 // If the snoop filter has no entry, and we should not allocate,
81 // do not create a new snoop filter entry, simply return a NULL
82 // portlist.
83 if (!is_hit && !allocate)
84 return snoopDown(lookupLatency);
85
86 // If no hit in snoop filter create a new element and update iterator
87 if (!is_hit)
88 reqLookupResult = cachedLocations.emplace(line_addr, SnoopItem()).first;
89 SnoopItem& sf_item = reqLookupResult->second;
90 SnoopMask interested = sf_item.holder | sf_item.requested;
91
92 // Store unmodified value of snoop filter item in temp storage in
93 // case we need to revert because of a send retry in
94 // updateRequest.
95 retryItem = sf_item;
96
97 totRequests++;
98 if (is_hit) {
99 // Single bit set -> value is a power of two
100 if (isPow2(interested))
101 hitSingleRequests++;
102 else
103 hitMultiRequests++;
104 }
105
106 DPRINTF(SnoopFilter, "%s: SF value %x.%x\n",
107 __func__, sf_item.requested, sf_item.holder);
108
109 // If we are not allocating, we are done
110 if (!allocate)
111 return snoopSelected(maskToPortList(interested & ~req_port),
112 lookupLatency);
113
114 if (cpkt->needsResponse()) {
115 if (!cpkt->cacheResponding()) {
116 // Max one request per address per port
117 panic_if(sf_item.requested & req_port, "double request :( " \
118 "SF value %x.%x\n", sf_item.requested, sf_item.holder);
119
120 // Mark in-flight requests to distinguish later on
121 sf_item.requested |= req_port;
122 DPRINTF(SnoopFilter, "%s: new SF value %x.%x\n",
123 __func__, sf_item.requested, sf_item.holder);
124 } else {
125 // NOTE: The memInhibit might have been asserted by a cache closer
126 // to the CPU, already -> the response will not be seen by this
127 // filter -> we do not need to keep the in-flight request, but make
128 // sure that we know that that cluster has a copy
129 panic_if(!(sf_item.holder & req_port), "Need to hold the value!");
130 DPRINTF(SnoopFilter,
131 "%s: not marking request. SF value %x.%x\n",
132 __func__, sf_item.requested, sf_item.holder);
133 }
134 } else { // if (!cpkt->needsResponse())
135 assert(cpkt->isEviction());
136 // make sure that the sender actually had the line
137 panic_if(!(sf_item.holder & req_port), "requester %x is not a " \
138 "holder :( SF value %x.%x\n", req_port,
139 sf_item.requested, sf_item.holder);
140 // CleanEvicts and Writebacks -> the sender and all caches above
141 // it may not have the line anymore.
142 if (!cpkt->isBlockCached()) {
143 sf_item.holder &= ~req_port;
144 DPRINTF(SnoopFilter, "%s: new SF value %x.%x\n",
145 __func__, sf_item.requested, sf_item.holder);
146 }
147 }
148
149 return snoopSelected(maskToPortList(interested & ~req_port), lookupLatency);
150}
151
152void
153SnoopFilter::finishRequest(bool will_retry, Addr addr, bool is_secure)
154{
155 if (reqLookupResult != cachedLocations.end()) {
156 // since we rely on the caller, do a basic check to ensure
157 // that finishRequest is being called following lookupRequest
158 Addr line_addr = (addr & ~(Addr(linesize - 1)));
159 if (is_secure) {
160 line_addr |= LineSecure;
161 }
162 assert(reqLookupResult->first == line_addr);
163 if (will_retry) {
164 // Undo any changes made in lookupRequest to the snoop filter
165 // entry if the request will come again. retryItem holds
166 // the previous value of the snoopfilter entry.
167 reqLookupResult->second = retryItem;
168
169 DPRINTF(SnoopFilter, "%s: restored SF value %x.%x\n",
170 __func__, retryItem.requested, retryItem.holder);
171 }
172
173 eraseIfNullEntry(reqLookupResult);
174 }
175}
176
177std::pair<SnoopFilter::SnoopList, Cycles>
178SnoopFilter::lookupSnoop(const Packet* cpkt)
179{
180 DPRINTF(SnoopFilter, "%s: packet %s\n", __func__, cpkt->print());
181
182 assert(cpkt->isRequest());
183
184 Addr line_addr = cpkt->getBlockAddr(linesize);
185 if (cpkt->isSecure()) {
186 line_addr |= LineSecure;
187 }
188 auto sf_it = cachedLocations.find(line_addr);
189 bool is_hit = (sf_it != cachedLocations.end());
190
191 panic_if(!is_hit && (cachedLocations.size() >= maxEntryCount),
192 "snoop filter exceeded capacity of %d cache blocks\n",
193 maxEntryCount);
194
195 // If the snoop filter has no entry, simply return a NULL
196 // portlist, there is no point creating an entry only to remove it
197 // later
198 if (!is_hit)
199 return snoopDown(lookupLatency);
200
201 SnoopItem& sf_item = sf_it->second;
202
203 DPRINTF(SnoopFilter, "%s: old SF value %x.%x\n",
204 __func__, sf_item.requested, sf_item.holder);
205
206 SnoopMask interested = (sf_item.holder | sf_item.requested);
207
208 totSnoops++;
209 // Single bit set -> value is a power of two
210 if (isPow2(interested))
211 hitSingleSnoops++;
212 else
213 hitMultiSnoops++;
214
215 // ReadEx and Writes require both invalidation and exlusivity, while reads
216 // require neither. Writebacks on the other hand require exclusivity but
217 // not the invalidation. Previously Writebacks did not generate upward
218 // snoops so this was never an issue. Now that Writebacks generate snoops
219 // we need a special case for Writebacks. Additionally cache maintenance
220 // operations can generate snoops as they clean and/or invalidate all
221 // caches down to the specified point of reference.
222 assert(cpkt->isWriteback() || cpkt->req->isUncacheable() ||
223 (cpkt->isInvalidate() == cpkt->needsWritable()) ||
224 cpkt->req->isCacheMaintenance());
225 if (cpkt->isInvalidate() && !sf_item.requested) {
226 // Early clear of the holder, if no other request is currently going on
227 // @todo: This should possibly be updated even though we do not filter
228 // upward snoops
229 sf_item.holder = 0;
230 }
231
232 eraseIfNullEntry(sf_it);
233 DPRINTF(SnoopFilter, "%s: new SF value %x.%x interest: %x \n",
234 __func__, sf_item.requested, sf_item.holder, interested);
235
236 return snoopSelected(maskToPortList(interested), lookupLatency);
237}
238
239void
240SnoopFilter::updateSnoopResponse(const Packet* cpkt,
241 const SlavePort& rsp_port,
242 const SlavePort& req_port)
243{
244 DPRINTF(SnoopFilter, "%s: rsp %s req %s packet %s\n",
245 __func__, rsp_port.name(), req_port.name(), cpkt->print());
246
247 assert(cpkt->isResponse());
248 assert(cpkt->cacheResponding());
249
250 // if this snoop response is due to an uncacheable request, or is
251 // being turned into a normal response, there is nothing more to
252 // do
253 if (cpkt->req->isUncacheable() || !req_port.isSnooping()) {
254 return;
255 }
256
257 Addr line_addr = cpkt->getBlockAddr(linesize);
258 if (cpkt->isSecure()) {
259 line_addr |= LineSecure;
260 }
261 SnoopMask rsp_mask = portToMask(rsp_port);
262 SnoopMask req_mask = portToMask(req_port);
263 SnoopItem& sf_item = cachedLocations[line_addr];
264
265 DPRINTF(SnoopFilter, "%s: old SF value %x.%x\n",
266 __func__, sf_item.requested, sf_item.holder);
267
268 // The source should have the line
269 panic_if(!(sf_item.holder & rsp_mask), "SF value %x.%x does not have "\
270 "the line\n", sf_item.requested, sf_item.holder);
271
272 // The destination should have had a request in
273 panic_if(!(sf_item.requested & req_mask), "SF value %x.%x missing "\
274 "the original request\n", sf_item.requested, sf_item.holder);
275
276 // If the snoop response has no sharers the line is passed in
277 // Modified state, and we know that there are no other copies, or
278 // they will all be invalidated imminently
279 if (!cpkt->hasSharers()) {
280 DPRINTF(SnoopFilter,
281 "%s: dropping %x because non-shared snoop "
282 "response SF val: %x.%x\n", __func__, rsp_mask,
283 sf_item.requested, sf_item.holder);
284 sf_item.holder = 0;
285 }
286 assert(!cpkt->isWriteback());
287 // @todo Deal with invalidating responses
288 sf_item.holder |= req_mask;
289 sf_item.requested &= ~req_mask;
290 assert(sf_item.requested | sf_item.holder);
291 DPRINTF(SnoopFilter, "%s: new SF value %x.%x\n",
292 __func__, sf_item.requested, sf_item.holder);
293}
294
295void
296SnoopFilter::updateSnoopForward(const Packet* cpkt,
297 const SlavePort& rsp_port, const MasterPort& req_port)
298{
299 DPRINTF(SnoopFilter, "%s: rsp %s req %s packet %s\n",
300 __func__, rsp_port.name(), req_port.name(), cpkt->print());
301
302 assert(cpkt->isResponse());
303 assert(cpkt->cacheResponding());
304
305 Addr line_addr = cpkt->getBlockAddr(linesize);
306 if (cpkt->isSecure()) {
307 line_addr |= LineSecure;
308 }
309 auto sf_it = cachedLocations.find(line_addr);
310 bool is_hit = sf_it != cachedLocations.end();
311
312 // Nothing to do if it is not a hit
313 if (!is_hit)
314 return;
315
316 SnoopItem& sf_item = sf_it->second;
317
318 DPRINTF(SnoopFilter, "%s: old SF value %x.%x\n",
319 __func__, sf_item.requested, sf_item.holder);
320
321 // If the snoop response has no sharers the line is passed in
322 // Modified state, and we know that there are no other copies, or
323 // they will all be invalidated imminently
324 if (!cpkt->hasSharers()) {
325 sf_item.holder = 0;
326 }
327 DPRINTF(SnoopFilter, "%s: new SF value %x.%x\n",
328 __func__, sf_item.requested, sf_item.holder);
329 eraseIfNullEntry(sf_it);
330
331}
332
333void
334SnoopFilter::updateResponse(const Packet* cpkt, const SlavePort& slave_port)
335{
336 DPRINTF(SnoopFilter, "%s: src %s packet %s\n",
337 __func__, slave_port.name(), cpkt->print());
338
339 assert(cpkt->isResponse());
340
341 // we only allocate if the packet actually came from a cache, but
342 // start by checking if the port is snooping
343 if (cpkt->req->isUncacheable() || !slave_port.isSnooping())
344 return;
345
346 // next check if we actually allocated an entry
347 Addr line_addr = cpkt->getBlockAddr(linesize);
348 if (cpkt->isSecure()) {
349 line_addr |= LineSecure;
350 }
351 auto sf_it = cachedLocations.find(line_addr);
352 if (sf_it == cachedLocations.end())
353 return;
354
355 SnoopMask slave_mask = portToMask(slave_port);
356 SnoopItem& sf_item = sf_it->second;
357
358 DPRINTF(SnoopFilter, "%s: old SF value %x.%x\n",
359 __func__, sf_item.requested, sf_item.holder);
360
361 // Make sure we have seen the actual request, too
362 panic_if(!(sf_item.requested & slave_mask), "SF value %x.%x missing "\
363 "request bit\n", sf_item.requested, sf_item.holder);
364
365 // Update the residency of the cache line.
366 sf_item.holder |= slave_mask;
367 sf_item.requested &= ~slave_mask;
365 sf_item.requested &= ~slave_mask;
368 assert(sf_item.holder | sf_item.requested);
366 // Update the residency of the cache line.
367
368 if (cpkt->req->isCacheMaintenance()) {
369 // A cache clean response does not carry any data so it
370 // shouldn't change the holders, unless it is invalidating.
371 if (cpkt->isInvalidate()) {
372 sf_item.holder &= ~slave_mask;
373 }
374 eraseIfNullEntry(sf_it);
375 } else {
376 // Any other response implies that a cache above will have the
377 // block.
378 sf_item.holder |= slave_mask;
379 assert(sf_item.holder | sf_item.requested);
380 }
369 DPRINTF(SnoopFilter, "%s: new SF value %x.%x\n",
370 __func__, sf_item.requested, sf_item.holder);
371}
372
373void
374SnoopFilter::regStats()
375{
376 SimObject::regStats();
377
378 totRequests
379 .name(name() + ".tot_requests")
380 .desc("Total number of requests made to the snoop filter.");
381
382 hitSingleRequests
383 .name(name() + ".hit_single_requests")
384 .desc("Number of requests hitting in the snoop filter with a single "\
385 "holder of the requested data.");
386
387 hitMultiRequests
388 .name(name() + ".hit_multi_requests")
389 .desc("Number of requests hitting in the snoop filter with multiple "\
390 "(>1) holders of the requested data.");
391
392 totSnoops
393 .name(name() + ".tot_snoops")
394 .desc("Total number of snoops made to the snoop filter.");
395
396 hitSingleSnoops
397 .name(name() + ".hit_single_snoops")
398 .desc("Number of snoops hitting in the snoop filter with a single "\
399 "holder of the requested data.");
400
401 hitMultiSnoops
402 .name(name() + ".hit_multi_snoops")
403 .desc("Number of snoops hitting in the snoop filter with multiple "\
404 "(>1) holders of the requested data.");
405}
406
407SnoopFilter *
408SnoopFilterParams::create()
409{
410 return new SnoopFilter(this);
411}
381 DPRINTF(SnoopFilter, "%s: new SF value %x.%x\n",
382 __func__, sf_item.requested, sf_item.holder);
383}
384
385void
386SnoopFilter::regStats()
387{
388 SimObject::regStats();
389
390 totRequests
391 .name(name() + ".tot_requests")
392 .desc("Total number of requests made to the snoop filter.");
393
394 hitSingleRequests
395 .name(name() + ".hit_single_requests")
396 .desc("Number of requests hitting in the snoop filter with a single "\
397 "holder of the requested data.");
398
399 hitMultiRequests
400 .name(name() + ".hit_multi_requests")
401 .desc("Number of requests hitting in the snoop filter with multiple "\
402 "(>1) holders of the requested data.");
403
404 totSnoops
405 .name(name() + ".tot_snoops")
406 .desc("Total number of snoops made to the snoop filter.");
407
408 hitSingleSnoops
409 .name(name() + ".hit_single_snoops")
410 .desc("Number of snoops hitting in the snoop filter with a single "\
411 "holder of the requested data.");
412
413 hitMultiSnoops
414 .name(name() + ".hit_multi_snoops")
415 .desc("Number of snoops hitting in the snoop filter with multiple "\
416 "(>1) holders of the requested data.");
417}
418
419SnoopFilter *
420SnoopFilterParams::create()
421{
422 return new SnoopFilter(this);
423}