2009
DOI: 10.1145/1582710.1582712
|View full text |Cite
|
Sign up to set email alerts
|

Checkpoint allocation and release

Abstract: Out-of-order speculative processors need a bookkeeping method to recover from incorrect speculation. In recent years, several microarchitectures that employ checkpoints have been proposed, either extending the reorder buffer or entirely replacing it. This work presents an in-dept-study of checkpointing in checkpoint-based microarchitectures, from the desired content of a checkpoint, via implementation trade-offs, and to checkpoint allocation and release policies. A major contribution of the article is a novel … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 44 publications
(39 reference statements)
0
4
0
Order By: Relevance
“…al. [9] propose a similar checkpointing scheme. They take checkpoints more frequently when mispredictions are frequent, and vice versa.…”
Section: Related Workmentioning
confidence: 99%
“…al. [9] propose a similar checkpointing scheme. They take checkpoints more frequently when mispredictions are frequent, and vice versa.…”
Section: Related Workmentioning
confidence: 99%
“…Their mechanism can reuse the results of instructions and the outcome of branches obtained during the first run. They then designed an enhanced checkpoint allocation algorithm [41] which would allocate checkpoints according to dynamic events, such as second-level cache misses and rollback history.…”
Section: Checkpointing Architecturesmentioning
confidence: 99%
“…When a misprediction is detected, the flush tag of the mispredicted branch is broadcast through the entire pipeline to selectively eliminate the dependent instructions. Golander et al uses checkpoint tags, instead of branch flush tags, to selectively flush misprediction dependent instructions [52]. Their mechanism has to broadcast all of the checkpoint tags following the misprediction sequentially as each tag can only control the instructions in its own section.…”
Section: Analysis and Related Workmentioning
confidence: 99%
“…If predictions are going well, the window size is dynamically expanded and the misprediction recovery scheme switches to using checkpoints.Golander et. al [17]. propose a similar scheme without an ROB utilizing checkpointing.…”
mentioning
confidence: 99%