Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Compiler Optimization Method for Eliminating Redundant Memory Access Operations

A memory access and optimization method technology, applied in the computer field, can solve problems such as reducing program performance and increasing program memory access time, and achieves the effect of improving program performance and reducing memory access time.

Inactive Publication Date: 2017-03-29
NANYANG INST OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to ensure the correctness of the binary code, the compiler often generates more memory access instructions based on conservative alias analysis, which seriously increases the memory access time of the program and reduces the performance of the program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Compiler Optimization Method for Eliminating Redundant Memory Access Operations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] A compiling optimization method for eliminating redundant memory access operations of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0014] A compilation and optimization method for eliminating redundant memory access operations of the present invention, see figure 1 , this method is used in a system with inaccurate alias information and a Load / Store architecture for memory access. It is an optimization method that can eliminate redundant load instructions. The method includes the following steps:

[0015] ⑴. Perform a simple data flow analysis on the program in units of basic blocks, and obtain the use-definition chain of data access, that is, the U-D chain;

[0016] ⑵. Forward traversal of the instruction chain in units of basic blocks. If the memory load Load instruction is detected, then the access usage-definition chain finds its definition instruction. If the instruction has an alias ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a complier optimization method for eliminating redundant storage access operations. The method is used in a system with inaccurate alias information and a Load / Store framework for access and storage, and is a lightweight-based data flow analysis method. The method comprises the steps of judging whether Load instructions are redundant or not at the code generation stage according to specific Store-Load instruction sequence characteristics, and deleting the redundant Load instructions according to characteristics of a predecessor instruction or converting the redundant Load instructions into copying instructions with smaller cost or bit extraction instructions. According to the complier optimization method for eliminating the redundant storage access operations, the redundant access and storage instructions can be eliminated, the access and storage time of a program is greatly reduced, the program performance is improved, meanwhile, more program optimization opportunities are revealed, and the program performance is improved.

Description

technical field [0001] The invention relates to the technical field of computers, and relates to a compilation optimization method for eliminating redundant memory access operations. Background technique [0002] Computer memory access instructions load the data stored in the memory into physical registers, and its execution time is often ten to dozens of times that of an ordinary instruction. When the compiler generates binary code for the program, it always tries to generate the least memory access instructions, which will reduce the memory access time of the program and improve the execution efficiency of the program. However, with the widespread use of aliases and pointers in modern programming languages, compilers often lack sufficient alias information when performing memory access optimization. In order to ensure the correctness of the binary code, the compiler often generates more memory access instructions based on conservative alias analysis, which seriously incre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/45
Inventor 杨磊王萍肖东岳韩峰胡可
Owner NANYANG INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products