Run-time cache bypassing

Teresa L. Johnson, Daniel A. Connors, Matthew C. Merten, Wen Mei W. Hwu

Research output: Contribution to journalArticle

Abstract

The growing disparity between processor and memory performance has made cache misses increasingly expensive. Additionally, data and instruction caches are not always used efficiently, resulting in large numbers of cache misses. Therefore, the importance of cache performance improvements at each level of the memory hierarchy will continue to grow. In numeric programs, there are several known compiler techniques for optimizing data cache performance. However, integer (nonnumeric) programs often have irregular access patterns that are more difficult for the compiler to optimize. In the past, cache management techniques such as cache bypassing were implemented manually at the machine-language-programming level. As the available chip area grows, it makes sense to spend more resources to allow intelligent control over the cache management. In this paper, we present an approach to improving cache effectiveness, taking advantage of the growing chip area, utilizing run-time adaptive cache management techniques, optimizing both performance and cost of implementation. Specifically, we are aiming to increase data cache effectiveness for integer programs. We propose a microarchitecture scheme where the hardware determines data placement within the cache hierarchy based on dynamic referencing behavior. This scheme is fully compatible with existing Instruction Set Architectures. This paper examines the theoretical upper bounds on the cache hit ratio that cache bypassing can provide for integer applications, including several Windows applications with OS activity. Then, detailed trace-driven simulations of the integer applications are used to show that the implementation described in this paper can achieve performance close to that of the upper bound.

Original languageEnglish (US)
Pages (from-to)1338-1354
Number of pages17
JournalIEEE Transactions on Computers
Volume48
Issue number12
DOIs
StatePublished - Dec 1 1999

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Hardware and Architecture
  • Computational Theory and Mathematics

Fingerprint Dive into the research topics of 'Run-time cache bypassing'. Together they form a unique fingerprint.

  • Cite this

    Johnson, T. L., Connors, D. A., Merten, M. C., & Hwu, W. M. W. (1999). Run-time cache bypassing. IEEE Transactions on Computers, 48(12), 1338-1354. https://doi.org/10.1109/12.817393