By: Jonathan Kang (johnbk.delete@this.gmail.com), September 16, 2007 6:42 pm
Room: Moderated Discussions
A very nice article. Thank you for taking the time to write this.
One thing that drew my attention was remote prefetching. In the article, you covered the situation when a remote device would write to a processor cache directly. Even though this goes through the processor itself, doesn't this introduce situations where cache thrashing could occur?
Suppose the processor switches context during a "DMA" write. Is there a special cache tag that denotes that such regions shall not be touched?
Also interesting would be how complicated prefetch "patterns" could be.
One thing that drew my attention was remote prefetching. In the article, you covered the situation when a remote device would write to a processor cache directly. Even though this goes through the processor itself, doesn't this introduce situations where cache thrashing could occur?
Suppose the processor switches context during a "DMA" write. Is there a special cache tag that denotes that such regions shall not be touched?
Also interesting would be how complicated prefetch "patterns" could be.