chap2.5 - Chapter 2 (Cont IV): Further Techniques for...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 2 (Cont IV): urther Techniques for Further Techniques for Exploiting ILP Copyright Josep Torrellas 1999, 2001, 2002 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
oftware Pipelining Software Pipelining • Code reorganization technique to uncover parallelism • Idea: each iteration contains instructions from several different iterations in the original loop • The reason: separate the dependent instructions that occur within a single loop iteration • We need some start-up code before the loop begins and some code to finish up after the loop is completed Copyright Josep Torrellas 1999, 2001, 2002 2
Background image of page 2
oftware Pipelining Software Pipelining igure 6 of Third Edition Figure 4.6 of Third Edition Copyright Josep Torrellas 1999, 2001, 2002 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Software Pipelining Loop: LD F0,0(R1) DDD F4 F0 F2 i: LD F0,0(R1) ADDD F4,F0,F2 SD F4,0(R1) ADDUI R1,R1,#- It i: ADDD F4,F0,F2 SD F4,0(R1) DADDUI R1,R1,# 8 BNE R1,R2,Loop It I+1: LD F0,0(R1) ADDD F4,F0,F2 SD F4,0(R1) It I+2: LD F0,0(R1) Loop: SD F4,16(R1) ;stores into M[i] ADDD F4,F0,F2 ; adds to M[i-1] ADDD F4,F0,F2 SD F4,0(R1) LD F0,0(R1) ; loads M[i-2] DADDUI R1,R1,#-8 NE R1R2L Copyright Josep Torrellas 1999, 2001, 2002 4 BNE R1,R2,Loop
Background image of page 4
oftware Pipelining Software Pipelining •E v e r y 5 cycles, we get a result (ignoring the startup and cleanup portions) • Notice that there are no true dependences
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/18/2010 for the course CS 433 taught by Professor Harrison during the Fall '08 term at University of Illinois, Urbana Champaign.

Page1 / 12

chap2.5 - Chapter 2 (Cont IV): Further Techniques for...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online