snoop_filter.hh (14005:6cad91d6136c) snoop_filter.hh (14122:11979370f6f8)
1/*
2 * Copyright (c) 2013-2016,2019 ARM Limited
3 * All rights reserved
4 *
5 * The license below extends only to copyright in the software and shall
6 * not be construed as granting a license to any other intellectual
7 * property including but not limited to intellectual property relating
8 * to a hardware implementation of the functionality of the software
9 * licensed hereunder. You may use the software subject to the license
10 * terms below provided that you ensure that this notice is replicated
11 * unmodified and in its entirety in all distributions of the software,
12 * modified or unmodified, in source code or in binary form.
13 *
14 * Redistribution and use in source and binary forms, with or without
15 * modification, are permitted provided that the following conditions are
16 * met: redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer;
18 * redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution;
21 * neither the name of the copyright holders nor the names of its
22 * contributors may be used to endorse or promote products derived from
23 * this software without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
26 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
27 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
28 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
29 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
30 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
31 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
35 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 *
37 * Authors: Stephan Diestelhorst
38 */
39
40/**
41 * @file
42 * Definition of a snoop filter.
43 */
44
45#ifndef __MEM_SNOOP_FILTER_HH__
46#define __MEM_SNOOP_FILTER_HH__
47
48#include <bitset>
49#include <unordered_map>
50#include <utility>
51
52#include "mem/packet.hh"
53#include "mem/port.hh"
54#include "mem/qport.hh"
55#include "params/SnoopFilter.hh"
56#include "sim/sim_object.hh"
57#include "sim/system.hh"
58
59/**
60 * This snoop filter keeps track of which connected port has a
61 * particular line of data. It can be queried (through lookup*) on
62 * memory requests from above (reads / writes / ...); and also from
63 * below (snoops). The snoop filter precisely knows about the location
64 * of lines "above" it through a map from cache line address to
65 * sharers/ports. The snoop filter ties into the flows of requests
66 * (when they succeed at the lower interface), regular responses from
67 * below and also responses from sideway's caches (in update*). This
68 * allows the snoop filter to model cache-line residency by snooping
69 * the messages.
70 *
71 * The tracking happens in two fields to be able to distinguish
72 * between in-flight requests (in requested) and already pulled in
73 * lines (in holder). This distinction is used for producing tighter
74 * assertions and tracking request completion. For safety, (requested
75 * | holder) should be notified and the requesting MSHRs will take
76 * care of ordering.
77 *
78 * Overall, some trickery is required because:
79 * (1) snoops are not followed by an ACK, but only evoke a response if
80 * they need to (hit dirty)
81 * (2) side-channel information is funnelled through direct modifications of
82 * pkt, instead of proper messages through the bus
83 * (3) there are no clean evict messages telling the snoop filter that a local,
84 * upper cache dropped a line, making the snoop filter pessimistic for now
85 * (4) ordering: there is no single point of order in the system. Instead,
86 * requesting MSHRs track order between local requests and remote snoops
87 */
88class SnoopFilter : public SimObject {
89 public:
90
91 // Change for systems with more than 256 ports tracked by this object
92 static const int SNOOP_MASK_SIZE = 256;
93
94 typedef std::vector<QueuedSlavePort*> SnoopList;
95
96 SnoopFilter (const SnoopFilterParams *p) :
1/*
2 * Copyright (c) 2013-2016,2019 ARM Limited
3 * All rights reserved
4 *
5 * The license below extends only to copyright in the software and shall
6 * not be construed as granting a license to any other intellectual
7 * property including but not limited to intellectual property relating
8 * to a hardware implementation of the functionality of the software
9 * licensed hereunder. You may use the software subject to the license
10 * terms below provided that you ensure that this notice is replicated
11 * unmodified and in its entirety in all distributions of the software,
12 * modified or unmodified, in source code or in binary form.
13 *
14 * Redistribution and use in source and binary forms, with or without
15 * modification, are permitted provided that the following conditions are
16 * met: redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer;
18 * redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution;
21 * neither the name of the copyright holders nor the names of its
22 * contributors may be used to endorse or promote products derived from
23 * this software without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
26 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
27 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
28 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
29 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
30 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
31 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
35 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 *
37 * Authors: Stephan Diestelhorst
38 */
39
40/**
41 * @file
42 * Definition of a snoop filter.
43 */
44
45#ifndef __MEM_SNOOP_FILTER_HH__
46#define __MEM_SNOOP_FILTER_HH__
47
48#include <bitset>
49#include <unordered_map>
50#include <utility>
51
52#include "mem/packet.hh"
53#include "mem/port.hh"
54#include "mem/qport.hh"
55#include "params/SnoopFilter.hh"
56#include "sim/sim_object.hh"
57#include "sim/system.hh"
58
59/**
60 * This snoop filter keeps track of which connected port has a
61 * particular line of data. It can be queried (through lookup*) on
62 * memory requests from above (reads / writes / ...); and also from
63 * below (snoops). The snoop filter precisely knows about the location
64 * of lines "above" it through a map from cache line address to
65 * sharers/ports. The snoop filter ties into the flows of requests
66 * (when they succeed at the lower interface), regular responses from
67 * below and also responses from sideway's caches (in update*). This
68 * allows the snoop filter to model cache-line residency by snooping
69 * the messages.
70 *
71 * The tracking happens in two fields to be able to distinguish
72 * between in-flight requests (in requested) and already pulled in
73 * lines (in holder). This distinction is used for producing tighter
74 * assertions and tracking request completion. For safety, (requested
75 * | holder) should be notified and the requesting MSHRs will take
76 * care of ordering.
77 *
78 * Overall, some trickery is required because:
79 * (1) snoops are not followed by an ACK, but only evoke a response if
80 * they need to (hit dirty)
81 * (2) side-channel information is funnelled through direct modifications of
82 * pkt, instead of proper messages through the bus
83 * (3) there are no clean evict messages telling the snoop filter that a local,
84 * upper cache dropped a line, making the snoop filter pessimistic for now
85 * (4) ordering: there is no single point of order in the system. Instead,
86 * requesting MSHRs track order between local requests and remote snoops
87 */
88class SnoopFilter : public SimObject {
89 public:
90
91 // Change for systems with more than 256 ports tracked by this object
92 static const int SNOOP_MASK_SIZE = 256;
93
94 typedef std::vector<QueuedSlavePort*> SnoopList;
95
96 SnoopFilter (const SnoopFilterParams *p) :
97 SimObject(p), reqLookupResult(cachedLocations.end()), retryItem{0, 0},
97 SimObject(p), reqLookupResult(cachedLocations.end()),
98 linesize(p->system->cacheLineSize()), lookupLatency(p->lookup_latency),
99 maxEntryCount(p->max_capacity / p->system->cacheLineSize())
100 {
101 }
102
103 /**
104 * Init a new snoop filter and tell it about all the slave ports
105 * of the enclosing bus.
106 *
107 * @param slave_ports Slave ports that the bus is attached to.
108 */
109 void setSlavePorts(const SnoopList& slave_ports) {
110 localSlavePortIds.resize(slave_ports.size(), InvalidPortID);
111
112 PortID id = 0;
113 for (const auto& p : slave_ports) {
114 // no need to track this port if it is not snooping
115 if (p->isSnooping()) {
116 slavePorts.push_back(p);
117 localSlavePortIds[p->getId()] = id++;
118 }
119 }
120
121 // make sure we can deal with this many ports
122 fatal_if(id > SNOOP_MASK_SIZE,
123 "Snoop filter only supports %d snooping ports, got %d\n",
124 SNOOP_MASK_SIZE, id);
125 }
126
127 /**
128 * Lookup a request (from a slave port) in the snoop filter and
129 * return a list of other slave ports that need forwarding of the
130 * resulting snoops. Additionally, update the tracking structures
131 * with new request information. Note that the caller must also
132 * call finishRequest once it is known if the request needs to
133 * retry or not.
134 *
135 * @param cpkt Pointer to the request packet. Not changed.
136 * @param slave_port Slave port where the request came from.
137 * @return Pair of a vector of snoop target ports and lookup latency.
138 */
139 std::pair<SnoopList, Cycles> lookupRequest(const Packet* cpkt,
140 const SlavePort& slave_port);
141
142 /**
143 * For an un-successful request, revert the change to the snoop
144 * filter. Also take care of erasing any null entries. This method
145 * relies on the result from lookupRequest being stored in
146 * reqLookupResult.
147 *
148 * @param will_retry This request will retry on this bus / snoop filter
149 * @param addr Packet address, merely for sanity checking
150 */
151 void finishRequest(bool will_retry, Addr addr, bool is_secure);
152
153 /**
154 * Handle an incoming snoop from below (the master port). These
155 * can upgrade the tracking logic and may also benefit from
156 * additional steering thanks to the snoop filter.
157 *
158 * @param cpkt Pointer to const Packet containing the snoop.
159 * @return Pair with a vector of SlavePorts that need snooping and a lookup
160 * latency.
161 */
162 std::pair<SnoopList, Cycles> lookupSnoop(const Packet* cpkt);
163
164 /**
165 * Let the snoop filter see any snoop responses that turn into
166 * request responses and indicate cache to cache transfers. These
167 * will update the corresponding state in the filter.
168 *
169 * @param cpkt Pointer to const Packet holding the snoop response.
170 * @param rsp_port SlavePort that sends the response.
171 * @param req_port SlavePort that made the original request and is the
172 * destination of the snoop response.
173 */
174 void updateSnoopResponse(const Packet *cpkt, const SlavePort& rsp_port,
175 const SlavePort& req_port);
176
177 /**
178 * Pass snoop responses that travel downward through the snoop
179 * filter and let them update the snoop filter state. No
180 * additional routing happens.
181 *
182 * @param cpkt Pointer to const Packet holding the snoop response.
183 * @param rsp_port SlavePort that sends the response.
184 * @param req_port MasterPort through which the response is forwarded.
185 */
186 void updateSnoopForward(const Packet *cpkt, const SlavePort& rsp_port,
187 const MasterPort& req_port);
188
189 /**
190 * Update the snoop filter with a response from below (outer /
191 * other cache, or memory) and update the tracking information in
192 * the snoop filter.
193 *
194 * @param cpkt Pointer to const Packet holding the snoop response.
195 * @param slave_port SlavePort that made the original request and
196 * is the target of this response.
197 */
198 void updateResponse(const Packet *cpkt, const SlavePort& slave_port);
199
200 virtual void regStats();
201
202 protected:
203
204 /**
205 * The underlying type for the bitmask we use for tracking. This
206 * limits the number of snooping ports supported per crossbar.
207 */
208 typedef std::bitset<SNOOP_MASK_SIZE> SnoopMask;
209
210 /**
211 * Per cache line item tracking a bitmask of SlavePorts who have an
212 * outstanding request to this line (requested) or already share a
213 * cache line with this address (holder).
214 */
215 struct SnoopItem {
216 SnoopMask requested;
217 SnoopMask holder;
218 };
219 /**
220 * HashMap of SnoopItems indexed by line address
221 */
222 typedef std::unordered_map<Addr, SnoopItem> SnoopFilterCache;
223
224 /**
225 * Simple factory methods for standard return values.
226 */
227 std::pair<SnoopList, Cycles> snoopAll(Cycles latency) const
228 {
229 return std::make_pair(slavePorts, latency);
230 }
231 std::pair<SnoopList, Cycles> snoopSelected(const SnoopList& slave_ports,
232 Cycles latency) const
233 {
234 return std::make_pair(slave_ports, latency);
235 }
236 std::pair<SnoopList, Cycles> snoopDown(Cycles latency) const
237 {
238 SnoopList empty;
239 return std::make_pair(empty , latency);
240 }
241
242 /**
243 * Convert a single port to a corresponding, one-hot bitmask
244 * @param port SlavePort that should be converted.
245 * @return One-hot bitmask corresponding to the port.
246 */
247 SnoopMask portToMask(const SlavePort& port) const;
248 /**
249 * Converts a bitmask of ports into the corresponing list of ports
250 * @param ports SnoopMask of the requested ports
251 * @return SnoopList containing all the requested SlavePorts
252 */
253 SnoopList maskToPortList(SnoopMask ports) const;
254
255 private:
256
257 /**
258 * Removes snoop filter items which have no requesters and no holders.
259 */
260 void eraseIfNullEntry(SnoopFilterCache::iterator& sf_it);
261
262 /** Simple hash set of cached addresses. */
263 SnoopFilterCache cachedLocations;
98 linesize(p->system->cacheLineSize()), lookupLatency(p->lookup_latency),
99 maxEntryCount(p->max_capacity / p->system->cacheLineSize())
100 {
101 }
102
103 /**
104 * Init a new snoop filter and tell it about all the slave ports
105 * of the enclosing bus.
106 *
107 * @param slave_ports Slave ports that the bus is attached to.
108 */
109 void setSlavePorts(const SnoopList& slave_ports) {
110 localSlavePortIds.resize(slave_ports.size(), InvalidPortID);
111
112 PortID id = 0;
113 for (const auto& p : slave_ports) {
114 // no need to track this port if it is not snooping
115 if (p->isSnooping()) {
116 slavePorts.push_back(p);
117 localSlavePortIds[p->getId()] = id++;
118 }
119 }
120
121 // make sure we can deal with this many ports
122 fatal_if(id > SNOOP_MASK_SIZE,
123 "Snoop filter only supports %d snooping ports, got %d\n",
124 SNOOP_MASK_SIZE, id);
125 }
126
127 /**
128 * Lookup a request (from a slave port) in the snoop filter and
129 * return a list of other slave ports that need forwarding of the
130 * resulting snoops. Additionally, update the tracking structures
131 * with new request information. Note that the caller must also
132 * call finishRequest once it is known if the request needs to
133 * retry or not.
134 *
135 * @param cpkt Pointer to the request packet. Not changed.
136 * @param slave_port Slave port where the request came from.
137 * @return Pair of a vector of snoop target ports and lookup latency.
138 */
139 std::pair<SnoopList, Cycles> lookupRequest(const Packet* cpkt,
140 const SlavePort& slave_port);
141
142 /**
143 * For an un-successful request, revert the change to the snoop
144 * filter. Also take care of erasing any null entries. This method
145 * relies on the result from lookupRequest being stored in
146 * reqLookupResult.
147 *
148 * @param will_retry This request will retry on this bus / snoop filter
149 * @param addr Packet address, merely for sanity checking
150 */
151 void finishRequest(bool will_retry, Addr addr, bool is_secure);
152
153 /**
154 * Handle an incoming snoop from below (the master port). These
155 * can upgrade the tracking logic and may also benefit from
156 * additional steering thanks to the snoop filter.
157 *
158 * @param cpkt Pointer to const Packet containing the snoop.
159 * @return Pair with a vector of SlavePorts that need snooping and a lookup
160 * latency.
161 */
162 std::pair<SnoopList, Cycles> lookupSnoop(const Packet* cpkt);
163
164 /**
165 * Let the snoop filter see any snoop responses that turn into
166 * request responses and indicate cache to cache transfers. These
167 * will update the corresponding state in the filter.
168 *
169 * @param cpkt Pointer to const Packet holding the snoop response.
170 * @param rsp_port SlavePort that sends the response.
171 * @param req_port SlavePort that made the original request and is the
172 * destination of the snoop response.
173 */
174 void updateSnoopResponse(const Packet *cpkt, const SlavePort& rsp_port,
175 const SlavePort& req_port);
176
177 /**
178 * Pass snoop responses that travel downward through the snoop
179 * filter and let them update the snoop filter state. No
180 * additional routing happens.
181 *
182 * @param cpkt Pointer to const Packet holding the snoop response.
183 * @param rsp_port SlavePort that sends the response.
184 * @param req_port MasterPort through which the response is forwarded.
185 */
186 void updateSnoopForward(const Packet *cpkt, const SlavePort& rsp_port,
187 const MasterPort& req_port);
188
189 /**
190 * Update the snoop filter with a response from below (outer /
191 * other cache, or memory) and update the tracking information in
192 * the snoop filter.
193 *
194 * @param cpkt Pointer to const Packet holding the snoop response.
195 * @param slave_port SlavePort that made the original request and
196 * is the target of this response.
197 */
198 void updateResponse(const Packet *cpkt, const SlavePort& slave_port);
199
200 virtual void regStats();
201
202 protected:
203
204 /**
205 * The underlying type for the bitmask we use for tracking. This
206 * limits the number of snooping ports supported per crossbar.
207 */
208 typedef std::bitset<SNOOP_MASK_SIZE> SnoopMask;
209
210 /**
211 * Per cache line item tracking a bitmask of SlavePorts who have an
212 * outstanding request to this line (requested) or already share a
213 * cache line with this address (holder).
214 */
215 struct SnoopItem {
216 SnoopMask requested;
217 SnoopMask holder;
218 };
219 /**
220 * HashMap of SnoopItems indexed by line address
221 */
222 typedef std::unordered_map<Addr, SnoopItem> SnoopFilterCache;
223
224 /**
225 * Simple factory methods for standard return values.
226 */
227 std::pair<SnoopList, Cycles> snoopAll(Cycles latency) const
228 {
229 return std::make_pair(slavePorts, latency);
230 }
231 std::pair<SnoopList, Cycles> snoopSelected(const SnoopList& slave_ports,
232 Cycles latency) const
233 {
234 return std::make_pair(slave_ports, latency);
235 }
236 std::pair<SnoopList, Cycles> snoopDown(Cycles latency) const
237 {
238 SnoopList empty;
239 return std::make_pair(empty , latency);
240 }
241
242 /**
243 * Convert a single port to a corresponding, one-hot bitmask
244 * @param port SlavePort that should be converted.
245 * @return One-hot bitmask corresponding to the port.
246 */
247 SnoopMask portToMask(const SlavePort& port) const;
248 /**
249 * Converts a bitmask of ports into the corresponing list of ports
250 * @param ports SnoopMask of the requested ports
251 * @return SnoopList containing all the requested SlavePorts
252 */
253 SnoopList maskToPortList(SnoopMask ports) const;
254
255 private:
256
257 /**
258 * Removes snoop filter items which have no requesters and no holders.
259 */
260 void eraseIfNullEntry(SnoopFilterCache::iterator& sf_it);
261
262 /** Simple hash set of cached addresses. */
263 SnoopFilterCache cachedLocations;
264
264 /**
265 /**
265 * Iterator used to store the result from lookupRequest until we
266 * call finishRequest.
266 * A request lookup must be followed by a call to finishRequest to inform
267 * the operation's success. If a retry is needed, however, all changes
268 * made to the snoop filter while performing the lookup must be undone.
269 * This structure keeps track of the state previous to such changes.
267 */
270 */
268 SnoopFilterCache::iterator reqLookupResult;
269 /**
270 * Variable to temporarily store value of snoopfilter entry
271 * incase finishRequest needs to undo changes made in lookupRequest
272 * (because of crossbar retry)
273 */
274 SnoopItem retryItem;
271 struct ReqLookupResult {
272 /** Iterator used to store the result from lookupRequest. */
273 SnoopFilterCache::iterator it;
274
275 /**
276 * Variable to temporarily store value of snoopfilter entry
277 * in case finishRequest needs to undo changes made in lookupRequest
278 * (because of crossbar retry)
279 */
280 SnoopItem retryItem;
281
282 /**
283 * The constructor must be informed of the internal cache's end
284 * iterator, so do not allow the compiler to implictly define it.
285 *
286 * @param end_it Iterator to the end of the internal cache.
287 */
288 ReqLookupResult(SnoopFilterCache::iterator end_it)
289 : it(end_it), retryItem{0, 0}
290 {
291 }
292 ReqLookupResult() = delete;
293 } reqLookupResult;
294
275 /** List of all attached snooping slave ports. */
276 SnoopList slavePorts;
277 /** Track the mapping from port ids to the local mask ids. */
278 std::vector<PortID> localSlavePortIds;
279 /** Cache line size. */
280 const unsigned linesize;
281 /** Latency for doing a lookup in the filter */
282 const Cycles lookupLatency;
283 /** Max capacity in terms of cache blocks tracked, for sanity checking */
284 const unsigned maxEntryCount;
285
286 /**
287 * Use the lower bits of the address to keep track of the line status
288 */
289 enum LineStatus {
290 /** block holds data from the secure memory space */
291 LineSecure = 0x01,
292 };
293
294 /** Statistics */
295 Stats::Scalar totRequests;
296 Stats::Scalar hitSingleRequests;
297 Stats::Scalar hitMultiRequests;
298
299 Stats::Scalar totSnoops;
300 Stats::Scalar hitSingleSnoops;
301 Stats::Scalar hitMultiSnoops;
302};
303
304inline SnoopFilter::SnoopMask
305SnoopFilter::portToMask(const SlavePort& port) const
306{
307 assert(port.getId() != InvalidPortID);
308 // if this is not a snooping port, return a zero mask
309 return !port.isSnooping() ? 0 :
310 ((SnoopMask)1) << localSlavePortIds[port.getId()];
311}
312
313inline SnoopFilter::SnoopList
314SnoopFilter::maskToPortList(SnoopMask port_mask) const
315{
316 SnoopList res;
317 for (const auto& p : slavePorts)
318 if ((port_mask & portToMask(*p)).any())
319 res.push_back(p);
320 return res;
321}
322
323#endif // __MEM_SNOOP_FILTER_HH__
295 /** List of all attached snooping slave ports. */
296 SnoopList slavePorts;
297 /** Track the mapping from port ids to the local mask ids. */
298 std::vector<PortID> localSlavePortIds;
299 /** Cache line size. */
300 const unsigned linesize;
301 /** Latency for doing a lookup in the filter */
302 const Cycles lookupLatency;
303 /** Max capacity in terms of cache blocks tracked, for sanity checking */
304 const unsigned maxEntryCount;
305
306 /**
307 * Use the lower bits of the address to keep track of the line status
308 */
309 enum LineStatus {
310 /** block holds data from the secure memory space */
311 LineSecure = 0x01,
312 };
313
314 /** Statistics */
315 Stats::Scalar totRequests;
316 Stats::Scalar hitSingleRequests;
317 Stats::Scalar hitMultiRequests;
318
319 Stats::Scalar totSnoops;
320 Stats::Scalar hitSingleSnoops;
321 Stats::Scalar hitMultiSnoops;
322};
323
324inline SnoopFilter::SnoopMask
325SnoopFilter::portToMask(const SlavePort& port) const
326{
327 assert(port.getId() != InvalidPortID);
328 // if this is not a snooping port, return a zero mask
329 return !port.isSnooping() ? 0 :
330 ((SnoopMask)1) << localSlavePortIds[port.getId()];
331}
332
333inline SnoopFilter::SnoopList
334SnoopFilter::maskToPortList(SnoopMask port_mask) const
335{
336 SnoopList res;
337 for (const auto& p : slavePorts)
338 if ((port_mask & portToMask(*p)).any())
339 res.push_back(p);
340 return res;
341}
342
343#endif // __MEM_SNOOP_FILTER_HH__