Operation tables for scheduling in the presence of incomplete bypassing

  • Authors:
  • Aviral Shrivastava;Eugene Earlie;Nikil Dutt;Alex Nicolau

  • Affiliations:
  • University of California, Irvine, CA;Intel Labs, Hudson, MA;University of California, Irvine, CA;University of California, Irvine, CA

  • Venue:
  • Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing has significant impact on cycle time, area, and power consumption of the processor. Due to the strict constraints on performance, cost and power consumption in embedded processors, architects need to evaluate and implement incomplete register bypassing mechanisms. However traditional data hazard detection and/or avoidance techniques used in retargetable schedulers break down in the presence of incomplete bypassing. In this paper, we present the concept of Operation Tables, which can be used to detect data hazards, even in the presence of incomplete bypassing. Furthermore our technique integrates the detection of both data, as well as resource hazards, and can be easily employed in a compiler to generate better schedules. Our experimental results on the popular Intel XScale embedded processor platform show that even with a simple intra-basic block scheduling technique, we achieve upto 20% performance improvement over fully optimized GCC generated code on embedded applications from the MiBench suite.