Centralized distribution of multicast requests in a data processing system

    公开(公告)号:US12056050B2

    公开(公告)日:2024-08-06

    申请号:US18086501

    申请日:2022-12-21

    摘要: A data processing system includes a master, a central request agent, and a plurality of snoopers communicatively coupled to a system fabric for communicating requests subject to retry. The master issues on the system fabric a multicast request intended for the plurality of snoopers. The central request agent receives the multicast request on the system fabric, assigns the multicast request to a particular state machine among a plurality of state machines in the central request agent, and provides the master a coherence response indicating successful completion of the multicast request. The central request agent repetitively issues on the system fabric a multicast request in association with a machine identifier identifying the particular state machine until a coherence response indicates the multicast request is successfully received by all of the plurality of snoopers.

    VOLATILE MEMORY TO NON-VOLATILE MEMORY INTERFACE FOR POWER MANAGEMENT

    公开(公告)号:US20240248620A1

    公开(公告)日:2024-07-25

    申请号:US18619046

    申请日:2024-03-27

    IPC分类号: G06F3/06 G06F12/0804

    摘要: Systems, methods, and apparatus related to a memory system that manages an interface for a volatile memory device and a non-volatile memory device to control memory system power. In one approach, a controller evaluates a demand on memory performance. If the demand of a current computation task needed by the host is high, a DRAM device is powered-up to meet the demand. Otherwise, if the non-volatile memory device is adequate to meet the demand, the DRAM memory is partially or fully-powered down to save power. In another approach, a task performed for a host device uses one or more resources of a first memory device (e.g., DRAM). A performance capability of a second memory device (e.g., NVRAM) is determined. A controller of the memory system determines whether the performance capability of the second memory device is adequate to service the task. In response to determining that the performance capability is adequate, the controller changes a mode of operation of the memory system so that one or more resources of the second memory device are used to service the task.

    CENTRALIZED DISTRIBUTION OF MULTICAST REQUESTS IN A DATA PROCESSING SYSTEM

    公开(公告)号:US20240211398A1

    公开(公告)日:2024-06-27

    申请号:US18086501

    申请日:2022-12-21

    摘要: A data processing system includes a master, a central request agent, and a plurality of snoopers communicatively coupled to a system fabric for communicating requests subject to retry. The master issues on the system fabric a multicast request intended for the plurality of snoopers. The central request agent receives the multicast request on the system fabric, assigns the multicast request to a particular state machine among a plurality of state machines in the central request agent, and provides the master a coherence response indicating successful completion of the multicast request. The central request agent repetitively issues on the system fabric a multicast request in association with a machine identifier identifying the particular state machine until a coherence response indicates the multicast request is successfully received by all of the plurality of snoopers.

    METHODS AND APPARATUS FOR EVICTION IN DUAL DATAPATH VICTIM CACHE SYSTEM

    公开(公告)号:US20240095164A1

    公开(公告)日:2024-03-21

    申请号:US17945242

    申请日:2022-09-15

    IPC分类号: G06F12/0802

    CPC分类号: G06F12/0802 G06F2212/603

    摘要: Methods, apparatus, systems and articles of manufacture are disclosed to evict in a dual datapath victim cache system. An example apparatus includes a cache storage, a cache controller operable to receive a first memory operation and a second memory operation concurrently, comparison logic operable to identify if the first and second memory operations missed in the cache storage, and a replacement policy component operable to, when at least one of the first and second memory operations corresponds to a miss in the cache storage, reserve an entry in the cache storage to evict based on the first and second memory operations.

    TECHNIQUES FOR RUNTIME PROTOCOL CONFORMANCE CACHE FOR THIRD PARTY APPLICATIONS

    公开(公告)号:US20230393980A1

    公开(公告)日:2023-12-07

    申请号:US18085475

    申请日:2022-12-20

    申请人: APPLE INC.

    IPC分类号: G06F12/0802 G06F16/22

    摘要: Techniques may include receiving a first request for a conformance check for a conformance pair, the conformance pair include a variable type and a particular protocol. The first request can identifying a first pointer. The technique can include determining a conformance check result is not cached for the conformance pair using the first pointer. In response to determining that the conformance check result is not cached for a variable, the electronic device may include performing the conformance check for the conformance pair and storing a result of the conformance check in an index table in persistent memory in association with at least a portion of bits in the first pointer. The technique can include referencing the index table on subsequent requests for a conformance check.