Multi-component processor

ABSTRACT

A processor having a limited amount of local memory for storing code and/or data utilizes a program stored in external memory. The program stored in external memory is configured into blocks which can be loaded individually into the local memory for execution. Queuing the individual blocks of code allows the program to be executed by the processor and also facilitates loading of the subsequent code to the executed. A semaphore system can be utilized to indicate which blocks of local memory are available/unavailable. The system can support the interaction of multiple independent programs in external memory.

CROSS-REFERENCES TO RELATED APPLICATIONS

This application is a continuation of prior application Ser. No.09/678,857, filed Oct. 2, 2000 now U.S. Pat. No. 6,775,757, entitled“Multi-Component Processor” which claims the benefit of U.S. ApplicationNo. 60/170,668 filed Dec. 14, 1999, entitled “Multi-Component Decoding”and U.S. Application No. 60/170,607 filed Dec. 14, 1999, entitled“Method of Processing Data,” which are both hereby incorporated byreference.

BACKGROUND

This invention relates generally to the implementation of complexcomputations in an environment that has limited storage and executionresources. More particularly, this invention relates to processors whichare required to execute complex algorithms and which have limitedmemory, such as random access memory (RAM).

In the audio/video field, complex algorithms must often be performed todecompress and manipulate audio and video data so that the data can bebroadcast in real time. For example, use of MPEG protocols to transmitdata requires that header information be removed from the payload databefore the payload data can be displayed or played. Similarly, wheredata is compressed, the data must be decompressed so that it can be putto use. In addition data is often manipulated to achieve some sort ofeffect, such as an enhanced audio or video effect. For example, where achange in color tone or contrast is desired, video data can be changed.Where a change in audio quality is desired, the audio data can bemanipulated. Thus, a variety of processes can be performed on audio andvideo data. Nevertheless, it comes at a cost of time and resources.

When complex algorithms are implemented, they require a great deal ofresources. Namely, they often require that a long sequence ofinstructions be implemented by a computer program, e.g., tens ofthousands of different instructions. They also often require a greatdeal of memory for the storage of operands and data. Hence, when thesealgorithms are to be implemented by a standalone device such as amicroprocessor or a set-top box in which memory for the storage ofinstructions and memory for the storage of data is limited, it becomesextremely difficult to implement the algorithms.

In addition, it is often necessary to mix and match different algorithms(e.g., MPEG) decoding with Prologic processing or DTS decoding withsmall speaker adjustments). Furthermore, it is inevitable thatadditional algorithms will be created in the future which will need tobe able to interact with present algorithms. Thus, there is a need for awell-defined way in which the older algorithms can be implemented tointeract with future additions.

Thus, there is a need for a device which is capable of allowingcomplicated mathematical algorithms to be performed while utilizing alimited amount of on-board random access memory by a processor. There isalso a need for a system that allows portions of code for an algorithmto be moved into memory of a processor in an organized manner such thatthe disadvantages outlined above can be overcome. Similarly, there is aneed for a system that permits a microprocessor to implement the codefor an algorithm that cannot be stored completely by the local memory ofthe microprocessor in a time efficient manner. Another need is for asystem that provides a framework that defines a manner in whichalgorithms are interchangeable into memory. Similarly, there is a needfor a well-defined system in which new algorithms can be implementedwith existing algorithms.

SUMMARY

One embodiment of the invention provides for an apparatus having aprocessor operable to process code and data; a first local memory of theprocessor; a second local memory of the processor; a third memoryseparate from the first and second local memory; wherein the first andsecond local memories are configured into predefined memory units thatcan accept contents of the code stored in the third memory.

Another embodiment of the invention provides a method, as well asprogram means for performing the functions of the method, of providing aprocessor operable for processing data, such as processing audio data;organizing a program of code into blocks of code which can individuallybe inserted into the processor's local memory; and operating on theindividual blocks of code as they are moved into local memory.

Another embodiment of the invention allows for more than one algorithmto be implemented sequentially, for example, a Karaoke Echo processingalgorithm followed by a reverberation algorithm in regard to audio data.Such an embodiment can load the blocks of code of the algorithms andexecute them until an algorithm is finished processing; as space in thelocal memory becomes available prior to the final execution of 4 firstalgorithm, a first block of code for the second algorithm can be loadedinto’ the local memory.

Other and further advantages and features of the invention will beapparent to those skilled in the art from a consideration of thefollowing description taken in conjunction with the accompanyingdrawings wherein certain methods of and apparatuses for practicing theinvention are illustrated. However, it is to be understood that theinvention is not limited to the details disclosed but includes all suchvariations and Modifications as fall within the spirit of the inventionand the scope of the appended claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows-a block diagram of a consumer device having a processorwith local memory divided into blocks of memory as well as reservedmemory.

FIGS. 2 a and 2 b show a flow diagram for implementing an algorithmstored in external memory by loading it a block at a time into localmemory.

FIGS. 3 a and 3 b show a flow diagram for implementing an algorithmstored in external memory in which more than one algorithm isimplemented by loading (them into local memory a block at a time.

FIGS. 4 a, 4 b, and 4 c show a flow diagram for implementing anembodiment of the invention.

DESCRIPTION

Referring now to the figures and more particularly to FIG. 1 anapparatus for one embodiment of the invention can be seen. FIG. 1 isshown as a common consumer electronic device 100, such as a set-top boxwhich receives audio and video data from a cable company. It couldeasily be any device which accepts audio or video data, such as a DVDprogram, from a source. The set-top box shown in FIG. 1 utilizes aprocessor 102 and external memory 110. The external memory can be SDRAMor alternative types of memory as would be understood by those ofordinary skill in the art. The processor 102 is shown as having a CPU104 and local memory 106 and 108. Local memory is memory that isactually part of the processor rather than being separate from theprocessor. Hence, the access time is significantly faster.

The local memory blocks 106 and 108 in FIG. 1 are shown as divided intosections. Local memory 106 is preferably 8 kilobytes in size, but largeror smaller sizes could be used. To implement the preferred embodiment ofthe invention, half of this memory is utilized for loading code storedexternal from the processor 102. The remaining half is reserved so thatthe support code for the invention can be stored there. Similarly, localmemory block 108 is preferably approximately 8 kilobytes in size. Threekilobytes of the local memory block 108 are held in reserve for theinvention's variable storage while 5 kilobytes are used to store data.The portions of memory blocks 106 and 1.08 that are used for code anddata respectively are partitioned or segmented into units. Hence, localmemory block 106 is considered to have 4 “slots” or units of memory of 1kilobyte in size. Similarly, local memory block 108 is considered tohave 5 “slots” or units of memory of 1 kilobyte in size. Note that theinvention can operate with different $lot counts and sizes; hence block106 could have 8 blocks of size 512 bytes. The local memory blocks 106and 108 are accessible by the CPU 104 of the processor via a bus (notshown). A register 150, designated as “R31” is shown as part of CPU 104.Such a register can be utilized to store a flag or “semaphore.”Individual bit locations of the register can be associated with the codeand data segments in local memory 106 and 108. In this way, differentroutines keep track of whether a segment of local memory is occupied,being loaded, available for loading new code or data, etc. In addition,CPU registers, such as R3 1, can be accessed more rapidly than RAMvariables.

FIG. 1 also shows an external memory 110, i.e., memory separate from theprocessor. External memory 110 is preferably synchronized dynamic randomaccess memory (SDRAM) coupled to processor 102. However, it isenvisioned that this external memory could take the form of other memorydevices as well. Furthermore, while the memory is shown as being locatedwithin electronic device 100, in some embodiments it might be preferableto locate it external from such a device. External memory 110 is Shownstoring code for several algorithms. Namely, a Discrete Cosine Transform(DCT) algorithm is shown stored in a memory block 112 as divided into 4segments of code, DCT1, DCT2, DCT3, and DCT4. Similarly, an AC-3 routineis shown stored in memory block 114 as code segments AC-3 #1, AC-3 #2,AC-3 #3, and AC-3 #4. Memory blocks 116 and 118 are shown storing codefor Fast Fourier Transform (FFT) and an Echo special effects algorithm,respectively. For example, while the code stored in memory 112 wouldnormally be considered just a DCT routine, it is segmented into foursegments or blocks so that each block can fit into the limited memorycapacity of processor 102, namely into the available slots of localmemory 106 and 108 depending on whether code or data is beingtransferred, respectively.

FIGS. 2A and 2B show a flow chart 200 that demonstrates a method forimplementing an embodiment of the invention. In FIG. 2, a processor isprovided with local memory 204. This local memory of the processor ispartitioned into predetermined blocks or segments for storing code fromexternal memory 208. Similarly, the local memory of the processor isalso partitioned into predetermined blocks or segments for storing datafrom external memory 212. While it is preferable to make the blocks ofequivalent size, this is not required.

A program which is to be utilized by the processor, such as a DiscreteCosine Transform (DCT) routine or a Reverberation routine can be storedin external memory. Such program routines are often required to processa datastream, such as an MPEG datastream received by a DVD player.Because such programs cannot be loaded in their entirety into thelimited local memory of the processor, such as a processor having only 8kilobytes of local memory for code and 8 kilobytes of local memory fordata, the program routines are organized into blocks or segments of code216. These smaller blocks of code can be loaded into the limited localmemory. Once the various routines are partitioned into blocks, a firstblock of code from a routine is loaded into the local memory 220.Additional blocks of code are then loaded as well 224. While it is notnecessary to do so, it is preferable to fill the designated space of thelocal memory with the blocks of code until the designated space is full.A block of code need not necessarily be sized so small that it can onlyfill a single block-of the local memory. It may be sized larger, e.g.,to occupy two or more blocks of the local memory. However, such a codeblock should not be larger than the largest space available in the localmemory that is designated for storing code input from external memory.

Once a first block of code has been loaded and its load semaphore hasbeen checked, it is executed 228. It is not necessary to wait untilother blocks of code have been loaded; however, it is preferred to loadthe second block of code to be executed before the first block of codecompletes its execution in order not to waste time in making 4transition to execution of the second block of code. A determination isultimately made that the first block of code has completed its execution232. At this point, a flag or semaphore can be set indicating that thememory space in local memory where the first block of code resides isavailable 236. Such a flag can be located in register R31 of FIG. 1.Such a register has a 32 bit size. These bits are preferably assigned tocode or data blocks rather than to specific memory slots. In fact analgorithm with more than 32 blocks would need to reuse these semaphores.The re-use restriction means that blocks that might be loaded at thesame time cannot use the same semaphore. Since algorithms typicallyprocess sequentially, it is possible to determine which blocks will notoccupy memory at the same time.

To safely complete the transition from one algorithm to anotheralgorithm, a convention is required, since different algorithms do nothave specific knowledge of each other's semaphore usage. Two possiblemethods for assigning semaphores to avoid inter-algorithm conflicts area “slot-based” method and an “order-based” method. In the slot-basedmethod, one assigns three semaphores to each slot. This allows up to 3blocks to be loaded in each slot and prevents conflicts betweenalgorithms because a new algorithm will not load until the full slot isavailable. In an “order-based” method, four semaphores are used by thefirst four blocks of an algorithm and another four are used by the lastfour of the algorithm. Since these are separate sets, the algorithmswill not conflict. Under this method, each algorithm would need at least8 blocks.

When the first block of code is completed with its execution, theprocessor begins execution of the second block of code—which by thatpoint should be stored in local memory 240. Furthermore, the processorcan check the value of register R31 via a transfer routine and see whichflags indicate available space in local memory. When a flag indicatesthat a block of local memory is available, an additional block of codeis loaded into that block of local memory, e.g., where the first blockof code resides 244. Once the determination is made to load this newblock of code into the available space in local memory, the flagassociated with the new block in register R31 is altered to indicatethat the space is no longer available 248. When the load completes, theR31 semaphore is altered to indicate that the block is ready to execute.This process is then repeated until the algorithm completes itsexecution.

It is noted that even when a first algorithm is being processed by theprocessor that code for a second algorithm can be loaded into localmemory. The second algorithm does not need to know any of thespecifications of the first algorithm. Rather, the flags, maintained inregister R31 for example, are used to indicate when blocks of code fromthe second algorithm can be loaded into the local memory. Thisfacilitates the implementation of many different algorithms withoutrequiring the different algorithms to know anything about the otheralgorithms. Furthermore, it provides a framework which allows theimplementation of algorithms that will be developed in the future.

FIGS. 3 a and 3 b demonstrate one embodiment in which more than onealgorithm is implemented by the processor. In the flow chart 300 ofFIGS. 3 a and 3 b, a processor is provided coupled to a local memory304. Code for several algorithms are stored in external memory 308. Forexample, these algorithms might be a FFT, DCT, Echo effect,Reverberation effect, or any other algorithm to process the data. Inthis embodiment, the local memory is again segmented into memory blocks312. These memory blocks can be of a predefined size. Furthermore, asection of the local memory is configured to store flags for the variousblocks of the local memory 316. Alternatively, a register of theprocessor or other storage unit could be utilized to store the flags.Each of the algorithms is subdivided into portions or blocks that can beloaded into the available space in local memory. These subdivisions arethan put into a queue 320 so that they can be loaded into local memoryand processed. This is accomplished by loading the first block ofalgorithm code into local memory 324 and setting the flag correspondingwith that block of local memory 328. Then additional blocks of code areloaded 332 and the flags corresponding with their local memory locationsare also set. As code is completely executed, the executed code isreplaced with unexecuted code from the queue 334. The algorithm isexecuted until some slots will no longer be used by the currentalgorithm 336. The queue of the next algorithm is then activated 340.Ultimately, a determination is made that the final blocks of a firstalgorithm have executed 344. Then, the queue for a succeeding algorithmcan be preloaded into the local memory by initially loading at least afirst block of code 348. A test is conducted to confirm that code foranother algorithm has been loaded 352. If another algorithm has loaded,then the queue is deactivated 356 and the code for the algorithm isexecuted until some local memory slots will no longer be utilized 336.In this way, the data can continue to be processed with little or nodelay.

The following example will help to illustrate the invention further.This example is directed toward an Audio Decoder for decoding audioinformation. In this example, audio information is received as adatastream formatted for use by a DVD player.

First, it should be understood that an “audio frame” is an atomic unitof a compressed audio format. In other words an audio decoder can alwaysdecode a valid frame in its own format, but might produce an error whendealing with a partial frame. In common formats such as AC-3 or MPEG,audio frames have a few characteristics that allow a kind of randomaccess into a compressed stream.

-   1. A frame begins with an unusual bit pattern so that it is easy to    scan a stream for the next frame.-   2. All frames in a stream have essentially the same length and    produce the same number of samples when decoded. This produces a    direct relationship between data size and audio duration.

Because of this, an Audio Decoder at the highest level is just aninitialization routine followed by a loop that decodes frames one at atime. Because the invention supports optional plugins, the act ofdecoding a single frame can be a little more complex:

-   1. The audio decoder converts one compressed frame into M channels    of PCM data consisting of N 32-bit samples.-   2. An optional plug-in takes the M channels of N samples and    reprocesses them into K channels of N 32-bit samples. In other    words, a plug-in can modify the original samples and might    reorganize them into new channels, too.-   3. After the decoded samples are prepared for output, the audio    decoder can process the next frame by looping back to step 1.

Audio decoders and plug-ins execute entirely in the processor. Whilethey can save and retrieve data in external memory, they cannot modifyit outside of the processor. Inside the processor, Audio Decoders andPlug-ins only have about 4.5K of instruction memory and 5.5K of datamemory. This makes it advisable to partition the code and data of anAudio Decoder or Plug-in into smaller stand-alone units called overlays.

To show how algorithm partitioning translates into overlays, thisexample will be presented based loosely on AC-3. Functionally, thisAudio Decoder breaks down to the following stages:

-   1. Initialize-   2. Find Beginning of Next Frame-   3. Build exponent tables from input (six channels)-   4. Build mantissa tables from input (six channels)-   5. For each of the six channels: do a Discrete Cosine Transform    (DCT), followed by a Fast Fourier Transform (FFT), followed by    another DCT and topped off with a Downmix of the six channels to two-   6. Apply any additional algorithms (e.g., Karaoke)-   7. Output the Final Downmixed Channels-   8. If there is more data to decode, go to step 2.

Each step can vary widely in the amounts of code and data needed—notethat step five has to cycle through three subtasks. For this example,assume that each frame generates 256 32-bit samples for each of the sixchannels. This means that each kind of array (e.g., exponent, mantissa,PCM) requires 1K bytes. With this in mind, Table 1 would be a plausiblelist of each Stage's memory requirements.

TABLE 1 Stage Code Size Data Size Initialization 1.5K .5K  Find Frame .3K .1K  Exponents 3.8K 8K Mantissas 2.5K 8K First DCT  .8K 2K FFT 1.5K3K Second DCT   1K 2K Downmix   1K 3K

TABLE 2 Name Size From Stage init ex 1.5K Initialization exp1 ex  .9KFind Frame and first part of Exponents exp2 ex   1K Exponents, secondpart exp3 ex 1.3K Exponents, third part exp4 ex  .9K Exponents, fourthpart, mnt1 ex 1.5K Mantissas, first part mnt2 ex   1K Mantissas, secondpart dct1 ex  .8K First DCT fft1 ex  .5K FFT, first part fft2 ex 1.5KFFT, second part dct2 ex 1.5K Second DCT dmix ex   1K Downmix

TABLE 3 Line # Active 000-1ff 200-3ff 400-5ff 600-7ff 800-9ff a00bffC00-dff e00-fff. 1 init_ex init_ex init_ex init_ex 2 exp1_ex exp1_exexp1_ex exp2_ex exp2_ex exp3_ex exp3_ex exp3_ex 3 exp2_ex exp4_exexp4_ex exp2_ex exp2_ex exp3_ex exp3_ex exp3_ex 4 exp3_ex exp4_exexp4_ex exp3_ex exp3_ex exp3_ex 5 exp4_ex exp4_ex exp4_ex mnt1_exmnt1_ex mnt1_ex mnt2_ex mnt2_ex mnt2_ex 6 mnt1_ex dct1_ex dct1_exmnt1_ex mnt1_ex mnt1_ex mnt2_ex mnt2_ex mnt2_ex 7 mnt2_ex dct1_exdct1_ex fft1_ex mnt2_ex mnt2_ex mnt2_ex 8 dct1_ex dct1_ex dct1_exfft1_ex dmix_ex dmix_ex fft2_ex M2_.ex fft2_ex 9 fft1_ex dct2_ex dct2_exfft1_ex dmix_ex drnix-ex fft2_ex fft2_ex fft2_ex 10 fft2_ex dct2_exdct2_ex fft1_ex dmix_ex dmix-ex fft2_ex fft2_ex fft2_ex 11 dct2_exdct2_ex dct2_ex fft1_ex dmix_ex dmix_ex fft2_ex fft2_ex fft2_ex 12dmix_ex dct1_ex dct1_ex fft1_ex dmix_ex dmix_ex fft2_ex fft2_ex fft2_.exRepeat lines 8-12 four times to do channels 2, 3, 4, 5 28 dct1_exdct1_ex dct1_ex fft1_ex dmix_ex dmix_ex fft2_ex fft2_ex fft2_ex 29fft1_ex dct2_ex dct2_ex fft1_ex dmix_ex dmix_ex ff2_ex fft2_ex fft2_ex30 fft2_ex dct2_ex dct2_ex dmix_ex dmix_ex fft2_ex fft2_ex fft2_ex 431dct2_ex dct2_ex dct2_ex dmix_ex dmix_ex out_ex out.ex out_ex 32 dmix_exexp1_ex exp1_ex dmix_ex dmix_ex out_ex out_ex out_ex 33 out_ex exp1_exexp1_ex exp2_ex exp2_ex out_ex out_ex out_ex

TABLE 4 Stage Code Size Data Size Output/End of Data Check 1K 4K

The Audio Decoder starts out with 4.5K of instruction RAM and 5.5K ofdata RAM. Typically, it will allocate 0.5K of code space to the MainLoop and 1.5K of the data space to internal variables. This effectivelyleaves 4K of instruction RAM and 4K of data RAM for overlays.

The Data Overlays are more straightforward than the Code Overlaysbecause the data is already split into 1K arrays (with an occasional 2Kintermediate calculation array). The code can be written to swap theseunits in and out of local memory. The only problem arises when acalculation needs more than 4K of data present (e.g., if the contents offour 1K arrays are used to build a new 1K array). In this case, the‘loop would have to be written to do the calculation from a smallerbuffer, perhap doing two sets of 128 values instead of all 256 at once.As noted earlier, code overlays are most efficient when they executelong enough to allow the next code overlay to load. Therefore, it isbest to keep overlays to an average of 1K bytes and to try to avoidgoing over 2K bytes. Therefore, assume these guidelines were used tobreak up the various stages of the Audio Decoder example into overlaysas shown in Table 2. Another issue is the destination of Code Overlays.Since they are not relocatable, it is important that the last overlaysin a loop clear out in an order that allows efficient reloading of theoverlays needed at the start of a loop. In addition, the processordestination of a Code Overlay should be aligned at a 256-byte boundarybecause this makes it easier to analyze the overlay process.

Table 3 represents the order of Code Overlay execution and those partsof the 4K of instruction RAM that are used in the various stages of thealgorithm. Out_ex shows how a second algorithm's overlays co-exist withthose of the first. The column labeled “Active” identifies the codeoverlay that is executing while the memory is assigned as laid out inthe rest of the row. Note that only the “Active” Overlay has to beresident. The remaining overlays of a row can be present, partiallyloaded, or yet to be loaded. They are listed in order to show whatmemory has been reserved by Code’ Overlay calls made from previouslyexecuted overlays. (Note: in this sample in Table 3, the minimum memoryunit is shown as 512 bytes instead of 256.)

The transition from the first to the second line of the table is a mod.for all of the other transitions, so it is useful to cover it in somedetail. Initialization overlays, such as init ex, are always loaded intothe upper memory area because that leaves space for the code to preloadsome of the first overlays. Because init ex leaves 2.5K, takes calls toload exp1 ex and exp2 ex. When init ex is ready to exit, it performs aroutine that releases init ex, loads exp3 ex into the space itpreviously occupied, waits for the event that declares exp 1 ex hasloaded and goes to exp 1 ex's entry point. When exp 1_ex begins, exp1_ex is fully transferred, exp2 ex may or may not be fully transferredand exp3 ex probably hasn't begun transferring.

After out ex is done in line 33, it can load exp3 ex and start executingthe next frame with the code in line 2. So, this example meets theminimum requirement of loop repetition. However, it could still be mademore efficient. For example, line 4 has 1.5K of memory with no pendingOverlay load. If exp3 ex and exp4 ex execute quickly, there might be await for mnt1_ex before going to line 6. This can actually be fixedquite easily by shifting the start point of exp3 ex from 800 to a00.Then mnt1_ex could be loaded one step earlier.

In order to illustrate how different algorithms interact, refer to line29 of (Table 3. After the fft1_ex block finishes, its execution area isno longer required by the audio decoder algorithm. So, some code wouldbe added to fft1_ex to enable the output algorithm's queue and to setthe flags to indicate its former memory space is available. In steps29-32, a routine is used to exit fft1_ex, fft2_ex, dct2_ex and dmix_ex.This routine would check whether out_ex can be loaded. In this example,out ex would start loading, when fft2_ex finishes in step 30. Ifbackground hardware and software handle the load, (speed is gainedbecause out ex_loads while dct2_ex executes in parallel.

In Table 4, an output algorithm is shown. Because the output algorithmhas only one element, its queue can be used to preload the startingoverlays of the audio decoder algorithm as seen in lines 32 and 33 ofTable 3.

The above example serves to illustrate how the invention could be usedas a specific audio decoder interacting with a general output algorithm.However, it could also be utilized in processing data in otherapplications, as well. For example, it would similarly be applicable forthe processing of video information, such as the information received bya DVD player or set-top box.

Another embodiment of the invention can be seen with reference to FIGS.4 a, 4 b, and 4 c. As has been described above, a semaphore system canbe utilized to indicate when code or data stored in a local memory of aprocessor can be implemented or written over. Thus, such a semaphoresystem is capable of allowing two different programs determine when thememory is available. Thus, a first program that actually utilizes thecode or data stored in local memory can access the semaphore system tosee when it is acceptable to use the code or data stored in localmemory. Similarly, a background program which loads code or data intolocal memory from external memory can rely on the semaphore system todetermine when the local memory is available for such storing of code ordata. Thus, such a semaphore system is utilizable by two differentprograms.

FIGS. 4 a, 4 b, and 4 c illustrate a flow chart 400 for accomplishing anembodiment of the invention. In FIG. 4 a, a processor is provided 404.The processor can be any type of processor, such as a microprocessor. Inblock 408, a local memory having a plurality of memory segments wherecode or data can be stored is provided. Thus, this would be the localinternal memory of the processor that could be logically, segmented by aprogrammer prior to coding a program, as explained above.

In block 412, a storage location is provided for storing semaphorevalues. Each semaphore value is associated with one of the memorysegments and operable to indicate whether the associated memory segmentcontains code or data that is available for use. Thus, a register of aprocessor or a scalar accessible by the processor could be utilized forholding the semaphore values. For example, each bit of a register couldindicate the status of a memory segment. Thus, for a 32 bit register, 32segments of local memory could be represented. Alternatively, otherstorage locations could be utilized as well, as alternatives to the useof a single register. Similarly, an entire register need not beutilized. In the example illustrated earlier, only 8 bits of a registerwould be needed to coincide with the 4 storage locations for data and 4storage locations for code in the local memory of the processor.

In block 416 of FIG. 4 a, a first program operable to access thesemaphore values is provided. The first program could be a routine thatis located in reserved memory of the processor. Thus, by being stored ina reserved section of local (memory of the processor, it would not bewritten over with new code or data. The first program would be operableto access the code or data stored in local memory of the processor andimplement that accessed code or data. Thus, if code operable toimplement a portion of the FFT program were stored in local memory ofthe processor, the first program would be operable to access the localmemory and begin implementing that FFT code. Similarly, the firstprogram would be operable to access any data stored in the local memory.

In block 420 of FIG. 4 a, a second program operable to access thesemaphore values is provided. The second program could be a programresponsible for loading new blocks of code or data that will be used bythe first program. Thus, the second program could load code or data fromexternal memory into internal memory. To know when it was acceptable toload code or data into local memory, the second program would need toknow the status of the various memory segments. Thus, by accessing thesemaphore value for a segment, the second program could determineavailability. It is also envisioned that the second program couldperform other functions.

In block 424, the first program accesses one of the semaphore values,e.g., a first semaphore value. By associating a predetermined meaningwith a semaphore value, the processor can determine the status of amemory segment in local memory by comparing the actual value of thesemaphore with a lookup list of predetermined semaphore values. Thus, in428, a determination can be made as to whether the code or data in thememory segment that is associated with the first semaphore value isavailable for use. For example, if the first 8 bits of a register of amicroprocessor are used, a value of “1” could be utilized to indicatethat any code or data stored in that memory segment is available for useby the first program. Similarly a “0” could indicate that the secondprogram is allowed to store code or data in that memory segment.

If in block 428 a memory segment is not available for use by the firstprogram, the “NO” branch of the flowchart shows that the test can bemade again at a later time. In other words, a typical implementationwould execute the next segment of application code and would test thesemaphore again after that segment has been completed. However, if thecode or data in the memory segment is available, then the “YES” branchindicates that block 432 can be implemented.

In block 432 of FIG. 4 a, the first program is utilized to implement thecode or data stored in the memory segment associated with the firstsemaphore. Thus, for example, if the code or data is for use as part ofan FFT or DCT routine, the processor can’, access it and implement thatportion of the routine.

In FIG. 4 b, the flow chart continues with block 436. In block 436, thefirst semaphore value is altered so as to indicate that the memorysegment of the local memory associated with the first semaphore value isavailable for having code or data (stored in that associated memorysegment. Thus, for example, the processor can access the register wheresemaphore values are held and alter the semaphore value corresponding tothe segment of memory accessed in block 432. That is to say, after thecode or data is utilized by the first program, the semaphore value canbe changed to reflect that the memory segment is now available for a newblock of code or data.

In block 440, the first semaphore value is accessed by the secondprogram. As explained earlier, the second program might be a program totransfer code or data from external memory to local memory. For example,it could be a program stored in a reserved section of local memory foruse by the processor to instruct a direct memory access (DMA) routine tocopy code or data from external memory to local memory. Once copied intolocal memory, the processor could implement the code or data through useof the first program. Again, in block 440, the accessing of a firstsemaphore value with the second program could be accomplished, forexample, by accessing the register which stores the semaphore values andhaving a table lookup that associates addresses in local memory with aparticular bit of the register.

In block 444, a determination is made as to whether the memory segmentassociated with the first semaphore value is available to have code ordata stored therein. For example, if the value of “0” for a bit in aregister is preassigned to be indicative that code or data can be copiedinto the corresponding local memory section, then the processor candetermine that a value of “0” for a semaphore means that the memorysegment is available. If the memory segment is not available, the “NO”branch indicates that the memory segment can be checked at a later pointin time. Otherwise, if the memory segment is determined to be available,block 448 can be implemented.

In block 448, the second program is utilized to store code or data in amemory segment associated with a first semaphore value. Thus, if thesemaphore associated with a memory segment indicates that the memorysegment is available to receive new code or data, then the secondprogram can copy code or data into that internal memory location, e.g.,from external memory. Block 452 shows completing the storing of code ordata in the memory segment associated with the first semaphore value.

FIG. 4 c illustrates in block 456 that the first semaphore value can bealtered to indicate that the code or data in the memory segmentassociated with the first semaphore value is available for use. Thus,the second program or a routine called by the second program, e.g., aDMA transfer routine, can alter the value of the bit in a registerassociated with a memory segment to indicate that the code or data inthat segment is now ready for use by the processor. Thus, such analteration could be used to indicate to the first program that the codeor data in a memory segment is available for use.

While this embodiment of the invention has been described with referenceto a first semaphore, it could be applied to a plurality of semaphoresin a concurrent manner. Thus, several semaphores could be altered by thefirst program and then later altered by the second program, or viceversa. Furthermore, in loading and using memory segments, the processcould be implemented repeatedly to allow the processor to load data andcode into local memory and then utilize that data or code, followed byanother cycle.

In addition to embodiments where the invention is accomplished byhardware, it is also noted that these embodiments can be accomplishedthrough the use of an article of manufacture comprised of a computerusable medium having a computer readable program code embodied therein,which causes the enablement of the functions and/or fabrication of thehardware disclosed in this specification. For example, this might beaccomplished through the use of hardware description language (HDL),register transfer language (RTL), VERILOG, VHDL, or similar programmingtools, as one of ordinary skill in the art would understand. Therefore,it is desired that the embodiments expressed above also be consideredprotected by this patent in their program code means as well.

It is also noted that many of the structures and acts recited herein canbe recited as means for performing a function or steps for performing afunction, respectively. Therefore, it should be understood that suchlanguage is entitled to cover all (such structures or acts disclosedwithin this specification and their equivalents.

For related subject matter concerning this invention, reference is madeto U.S. patent application Ser. No. 09/671,932, entitled “Method andApparatus for Multi-Part Processing of Program Code by a SingleProcessor”, Ser. No. 09/672,517 entitled “Multi-Component Processor”and, Ser. No. 09/678,898 entitled “Method and Apparatus for ProcessingData with Semaphores,” which are hereby incorporated by reference.

It is thought that the apparatuses and methods of the embodiments of thepresent invention and many of its attendant advantages will beunderstood from this specification and it will be apparent that variouschanges may be made in the form, construction and arrangement of theparts thereof without departing from the spirit and scope of theinvention or sacrificing all of its material advantages, the from hereinbefore described being merely exemplary embodiments thereof.

1. A method of processing in a computing system having a processor witha local memory for storing code capable of concurrent DMA transfers andan external memory for use by the processor, comprising: configuringsaid local memory into a plurality of blocks of memory; segmenting aprogram of code into blocks of code in a first order wherein each ofsaid blocks can be stored in an associated one of said blocks of memory;determining which blocks of code are safe to load into the blocks ofmemory; and based upon the determining, loading the blocks of code in asecond order, wherein the second order provides a fastest execution ofthe program of code.
 2. The method as recited in claim 1, furthercomprising: storing a first block of code in a memory space in at leastone block of memory of said local memory; storing a second block of codein said local memory; and when said first block of code is completelystored into said local memory, initiating execution of said first blockof code.
 3. The method as recited in claim 2, further comprising:determining that at least one block of code in said local memory hascompleted execution; and replacing said executed block of code withanother block of code.
 4. The method as recited in claim 3, furthercomprising: determining that at least one memory space of said localmemory is available; and storing a first block of code from a secondprogram in said available memory space of said local memory while saidfirst program code is still executing.
 5. The method as recited in claim1, further comprising: utilizing a semaphore to indicate when saidmemory space of said local memory is available.
 6. The method as recitedin claim 5, wherein the semaphore is one of a set of semaphores.
 7. Themethod as recited in claim 1, wherein the computing system is selectedfrom a group that includes a DVD player, a set top box, and a videoprocessor unit.
 8. Computer program product for use with a computingsystem with a local memory for storing code capable of concurrent DMAtransfers and an external memory for use by a processor, the computerprogram product embodied in a computer readable storage medium havinginstructions executable by the processor that causing the computingsystem to execute a method comprising: configuring the local memory intoa plurality of blocks of memory; segmenting a program of code intoblocks of code in a first order wherein each of the blocks can be storedin an associated one of the blocks of memory; determining which blocksof code are safe to load into the blocks of memory; loading the blocksof code in a second order, wherein the second order provides a fastestexecution of the program of code based upon the determining.
 9. Computerprogram product as recited in claim 8, further comprising: based uponthe determining, storing a first block of code in a memory space in atleast one block of memory of said local memory; storing a second blockof code in said local memory based upon the determining; and initiatingexecution of said first block of code when said first block of code iscompletely stored into said local memory.
 10. Computer program productas recited in claim 9, further comprising: computer code for determiningthat at least one block of code in said local memory has completedexecution; and computer code for replacing said executed block of codewith another block of code.
 11. Computer program product as recited inclaim 10, further comprising: computer code for determining that atleast one memory space of said local memory is available; and computercode for storing a first block of code from a second program in saidavailable memory space of said local memory while said first programcode is still executing.
 12. Computer program product as recited inclaim 8, further comprising: computer code for utilizing a semaphore toindicate when said memory space of said local memory is available. 13.Computer program product as recited in claim 12, wherein the semaphoreis one of a set of semaphores.
 14. Computer program product as recitedin claim 8, wherein the computing system is selected from a group thatincludes a DVD player, a set top box, and a video processor unit.