The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
International Symposium on Code Generation and Optimization (CGO 2011) 2011
DOI: 10.1109/cgo.2011.5764671
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic register promotion of stack variables

Abstract: Dynamic Binary Translation (DBT) has been widely used in various applications. Although new architectures and micro-architectures often create performance opportunities for programmers and compilers, such performance opportunities may not be exploited by legacy executables. For example, the additional general purpose and XMM registers in the Intel64 architecture do not benefit the IA-32 binaries. In this paper, we designed and developed a DBT system to dynamically promote stack variables in the source binaries… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Ubiquitous memory introspection [33] detects frequently-stalling loads and adds prefetch instructions. [19] translates x86 binaries to x86-64, using the additional registers to promote stack variables. We perform much higher-level optimizations on our lifted stencils.…”
Section: Related Workmentioning
confidence: 99%
“…Ubiquitous memory introspection [33] detects frequently-stalling loads and adds prefetch instructions. [19] translates x86 binaries to x86-64, using the additional registers to promote stack variables. We perform much higher-level optimizations on our lifted stencils.…”
Section: Related Workmentioning
confidence: 99%
“…Jianjun et al [28] promote stack variables to registers dynamically, relying on hardware mechanism for memory disambiguation. In contrast, we provide theoretical formulations for symbol promotion without any hardware support.…”
Section: Related Workmentioning
confidence: 99%
“…However, they did not explain the details of their algorithm. Li et al [11] used a similar technique to detect accesses to aliased stack slots. In fact, pointer barrierization will not work correctly on objects in the heap if internal pointers and atomic instructions are ignored.…”
Section: Related Workmentioning
confidence: 99%