Memory Network Processor

ABSTRACT

A multi-processor system with processing elements, interspersed memory, and primary and secondary interconnection networks optimized for high performance and low power dissipation is disclosed. In the secondary network multiple message routing nodes are arranged in an interspersed fashion with multiple processors. A given message routing node may receive messages from other message nodes, and relay the received messages to destination message routing nodes using relative offsets included in the messages. The relative offset may specify a number of message nodes from the message node that originated a message to a destination message node.

PRIORITY INFORMATION

This application is a continuation of U.S. patent application Ser. No.16/931,864, entitled “Memory Network Processor” filed on Jul. 17, 2020,which is a continuation of U.S. application Ser. No. 16/178,738,entitled “Memory Network Processor” filed on Nov. 2, 2018, which claimsbenefit of priority to U.S. Application No. 62/581,512 entitled “MemoryNetwork Processor”, filed on Nov. 3, 2017, by Carl S. Dobbs, et al., thecontents of each of these applications being hereby incorporated byreference in its entirety.

INCORPORATION BY REFERENCE

U.S. Pat. No. 9,430,369 titled “Memory-Network Processor withProgrammable Optimizations” whose inventors are Michael B. Doerr, CarlS. Dobbs, Michael B. Solka, Michael R. Trocino, Kenneth R. Faulkner,Keith M. Bindloss, Sumeer Arya, John Mark Beardslee, and David A.Gibson, is hereby incorporated by reference in its entirety as thoughfully and completely set forth herein.

U.S. Pat. No. 9,424,441 titled “Multiprocessor fabric havingconfigurable communication that is selectively disabled for secureprocessing” whose inventors are Michael B. Doerr, Carl S. Dobbs, MichaelB. Solka, Michael R. Trocino, and and David A. Gibson, is herebyincorporated by reference in its entirety as though fully and completelyset forth herein.

TECHNICAL FIELD

This invention relates to multi-processor systems, and more particularlyto improvements in processor operation and execution.

DESCRIPTION OF THE RELATED ART

A primary objective of a generic hardware system is to achieveapplication specific (non-programmable) hardware performance whilepreserving full programmability. Historically, these two concepts arediametric extremes. Application specific hardware is a fixed hardwaresolution that performs specific functions in the most efficient waypossible. This is usually measured in terms of energy per function orenergy per operation(s) and in terms of function per (circuit) areawhich can be related to partial cost of a product. Cost of a chipproduct is made up of many factors including die area and final package.Cost should also take into consideration the entire ecosystem to developa product. This ecosystem cost is made up of the time to reduce aspecific application to a specific hardware solution, the number ofspecific hardware solutions required to make up an entire system, andthe time it takes to integrate all of the specific hardware solutionsthrough customized communication and memory structures, etc. Thus afully integrated solution is required to support all of the numerousspecific hardware solutions with their custom interconnect, resulting ina very large area requirement on a single chip die. Historically, thisprocess has resulted in solutions that are non-efficient in area,energy, and time-to-market.

When considering the world of programmability and the concept oftargeting hardware, the marketplace or landscape from a hardwarearchitectural and software development style perspective is representedby General Purpose Processors (GPPs) provided by Intel, AMD and ARM;Graphical Processing Units (GPUs) from NVIDIA and AMD; Digital SignalProcessors (DSPs) from Texas Instruments and Analog Devices; FieldProgrammable Gate Arrays (FPGAs) from Xilinx, Altera, etc.;Multi-Core/Many-Core Processors from Cavium and Tilera; and ApplicationSpecific Integrated Circuits (ASICs) or System On Chips (SoCs).

GPPs are for general purpose processing, that is, trying to be a jack ofall trades, based on old but proven hardware architecture thinking overmore than 40 years. Their mainstream purpose is running user interface(UI) and highly interactive UI intensive applications like MSWord,Excel, email, etc., with a supporting operating system (e.g. Windows andLinux). The hardware characteristics that impact power dissipation aremulti-level caches, complex hardware memory management units, largebuses, and large clocking structures. In summary, they dissipate a lotof power to perform these tasks. From the perspective of softwaredevelopment, it is considered the easiest software programming model totarget. This is from the perspective that the user is developing asingle thread that executes consecutively or serially. When parallelismor multiple hardware threads (greater than about four threads) areintroduced, the ability to program them efficiently becomes much harder.This is due to the fact that fundamentally the architecture was notdeveloped to support parallel thread operation, and as a result thehardware architecture requires a tremendous amount of overheadcomplexity to manage. The software programming model requires theintroduction of an API or language extensions in order to support thedefinition of multiple software threads. Although this does not have tobe complex, unfortunately current GPP hardware architectures requiresuch complexity.

At a high level, an API that has been extensively used with C, C++,Fortran, etc. for many years in every supercomputer in the world is theMPI (message passing interface) API, an industry standard since theearly 1990s. This is a very simple, well understood, API that does notrestrict the hardware implementation. The MPI API allows definition ofsoftware threads and communication in a manner that is independent ofhardware. This is different from OpenMP, Coarray Fortran, OpenCL, etc.and other language/APIs that inherently dictate an assumed underlyinghardware model, which thus restricts interpretation flexibility andcauses a forward compatibility issue. In other words, with these latterlanguages/APIs, the programmer is required to rewrite the program forevery new hardware platform targeted.

GPUs were historically developed for processing and targeting thedisplay of data. They are hardware architecturally constrained by theirout of core (external) memory model requirements and inner core memorymodel requirements. The out of core memory requires a GPP to place datain the GPUs memory space. The GPU then pulls in the data, operates on itin a pipeline fashion and then places it back in its external memoryspace. From here, the data can be sent to a display, or a GPP needs tomove the data out of the GPUs memory space to be used/stored further inoperation under general processing. Inefficiencies in the hardware aredue to (1) the support required to move data around to supportout-of-core hardware restrictions and (2) the limited inner-core memorystructure, where data is restricted to being processed in streamlinedpipelines—similar to deeply pipelined SIMD machines. The result is highpower utilization due to hardware inefficiencies to process data. Thesoftware programming models used are extremely hardware centric, OpenCL,CUDA, etc. and thus are complex to achieve efficiency and not veryportable, with code having to be re-written and re-structured whentrying to move to a new hardware target platform.

DSPs can be viewed as a GPP with an instruction set that has beenreduced and targeted for generic signal processing. They suffer from thesame cache, MMU, and bus woes of their big brother/sister GPP.Additionally, any really high throughput processing function such asViterbi/Turbo decoding or motion estimation has been reduced to an ASICaccelerator with limited capability, usually only supporting a limitedset of specific standards in the commercial marketplace. The programmingmodel is similar to the GPP when targeting a single hardware thread, butbecause of the signal processing instruction approach in execution unithardware, to achieve any high efficiency requires hand assembly offunctions or use of proprietary software libraries. When creating amultiple parallel DSP architecture, similar to the parallel GPPdiscussed above, the problems are further exacerbated.

FPGAs are a completely different hardware approach where the definitionof functionality can be done at a bit-level and communication betweenlogical functions is done through programmable wire structures. Thishardware approach introduces tremendous overhead and complexity. Due tothis, efficient programming is performed in a hardware programminglanguage such as Verilog or VHDL. The compilation process is much morecomplex due to programmable wiring and programmable logic introducingtiming closure hurdles, similar to what is required in an ASIC/SOC butwith a structured wire fabric. Power dissipation and performancethroughput on specific functions are obviously much better than a GPP orGPU when comparing only one function at a time due to the FPGA onlyperforming exactly what it is programmed for and nothing else. However,if all of the capabilities of the GPP were attempted to be implementedin the FPGA, it would obviously be much worse than the GPP. Thedifficulty of programming at the hardware level is obvious (for exampletiming closure). Programming an FPGA really is not “programming,” butrather it is logic/hardware design, and VHDL/Verilog are logic/hardwaredesign languages, not programming languages.

Almost all of the multi-core/many-core architectures are, from ahardware perspective, taking a core processor, the cache, MMU, buses,and all associated logic and replicating them on a die with acommunication bus/fabric around them. Examples of a multi-corearchitecture are IBM's Cell, Intel's and AMD's quad and N multi-cores,Cavium's and Tilera's products, a number of custom SoCs, etc. Inaddition, the power reduction achieved in multi-core architectures islargely insignificant. This result derives from the fact that themulti-core approach merely replicates the GPU approach. The only realpower saving in a multi-core architecture is a reduction in some IOdrivers which now are not needed since the cores are connected by anon-chip communication bus, whereas before they were on separate chips.Thus, the multi-core approach does not save much energy. Secondly, thesoftware programming model is not improved from the GPP discussed above.

The list of issues identified for the other approaches is why, forspecific markets, system developers commit to a custom chip that hasspecific GPPs, DSPs, and ASIC accelerators to form a system on a chip(SoC). A SoC provides programmability where needed and ASIC performancefor specific functions to balance power dissipation and cost. However,now the software programming model is even more complex than discussedunder the above programmable hardware solutions. In addition, SoCs mayresult in a loss of flexibility associated with a fully programmablesolution.

Common among all of these programmable hardware solutions is that thesoftware programming models represented today in the marketplace areoften focused on extrapolating the execution model and underlyinghardware architecture to more efficiently support more applications, notto become hardware independent.

OpenCL supports writing of kernels using the ANSI C programming languagewith some limitations and additions. It does not allow the use offunction pointers, recursion, bit fields, variable-length arrays, andstandard header files. The language is extended to support parallelismwith vector types and operations, synchronization, and functions to workwith work-items/groups. An application programming interface (API) isused to define and then control the platform. OpenCL, at a course-level,supports parallel computing using task-based and data-based parallelism.

Prior art approaches to development of software applications forparallel execution on multiprocessor systems generally require tradeoffsbetween ease of development and efficiency of parallel execution. Inother words, it has generally been the case that the easier thedevelopment process for the programmer, the more inefficiently theresulting executable program executes on hardware; and conversely, moreefficient execution has generally required significantly more effort byprogrammers, i.e., to design programs in greater detail to avoidinefficient processing and to use efficiency enhancing features of thetarget hardware.

Therefore, improved systems and methods are desired for facilitating thesoftware description of the application or system level view to drivethe software programming model and its subsequent use to target theexecution model and underlying hardware architecture. Improvements arealso desired which provide mechanisms that enable efficient programmableimplementation of applications through this process. The Message PassingInterface (MPI) is a standardized language-independent, scalable, andportable message-passing communications protocol API. The MPI API ismeant to provide essential virtual topology, synchronization, andcommunication functionality between a set of processes (that have beenmapped to nodes/servers/computer instances) in a language-independentway, with language-specific syntax (bindings). The MPI API standarddefines the syntax and semantics of a core of library routines thatinclude support for, but are not limited to, various behavior-definablepoint-to-point and collective/broadcast communication send/receiveoperations and synchronizing of processes. MPI is the dominant modelused in high-performance computing today. Greater progress toward higherperformance per Watt of power dissipation at the system level ispossible with many processing elements in close communication,distributed fast memory, and more sophisticated software developmenttools that divide the system into a hierarchy of modules. At the bottomof the hierarchy are tasks assigned to processing elements, supportingmemory, and flexible communication pathways acrossdynamically-configurable interconnection networks.

SUMMARY OF THE EMBODIMENTS

Various embodiments for a multi-processor integrated circuit thatincludes a plurality of message nodes are disclosed. Broadly speaking,the plurality of message nodes are coupled to a plurality of processorincluded in the multi-processor in an interspersed arrangement. Aparticular message node of the plurality of message nodes is configuredto receive a first message that includes a payload and routinginformation and select a different message node of the plurality ofmessage nodes based on the routing information and operationalinformation of the multi-processor. The particular message node is alsoconfigured to modify, based on the different message node, the routinginformation of the first message to generate a second message andforward the second message to the different message node.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts an embodiment of a multi-processor array.

FIG. 2 depicts an embodiment of a data path of a PE.

FIG. 3 is a block diagram of an embodiment of an instruction decoder.

FIG. 4 is a block diagram illustrating an embodiment of an addressgenerator.

FIG. 5 is a block diagram comparing programming models.

FIG. 6 illustrates a table depicting testing predicate flags.

FIG. 7 illustrates three tables depicting different conditionalinstructions.

FIG. 8 illustrates conditional block instructions.

FIG. 9 describes data path logic circuits.

FIG. 10 is a block diagram illustrating active logic circuits for aturbo instruction.

FIG. 11 is a block diagram illustrating active logic circuits for ahalf-turbo instruction.

FIG. 12 is a block diagram illustrating active logic circuits for a boxplus instruction.

FIG. 13 is a block diagram illustrating active logic circuits for a Max*instruction.

FIG. 14 is a block diagram illustrating active logic circuits foranother Max* instruction.

FIG. 15 depicts a logical overview of a message bus included in amulti-processor array.

FIG. 16 is a table depicting information to be programmed as part ofsending a message on a message bus.

FIG. 17 is a block diagram depicting a general interface of a messagebus node.

FIG. 18 is a block diagram illustrating internal components of a messagebus node.

FIG. 19 is a block diagram depicting an embodiment of a message busnetwork.

FIG. 20 is a block diagram depicting a HyperOp datapath.

FIG. 21 is a block diagram depicting programming models.

FIG. 22 depicts a flow diagram that illustrates an embodiment of amethod for operating a message node.

While the disclosure is susceptible to various modifications andalternative forms, specific embodiments thereof are shown by way ofexample in the drawings and will herein be described in detail. Itshould be understood, however, that the drawings and detaileddescription thereto are not intended to limit the disclosure to theparticular form illustrated, but on the contrary, the intention is tocover all modifications, equivalents and alternatives falling within thespirit and scope of the present disclosure as defined by the appendedclaims. The headings used herein are for organizational purposes onlyand are not meant to be used to limit the scope of the description. Asused throughout this application, the word “may” is used in a permissivesense (i.e., meaning having the potential to), rather than the mandatorysense (i.e., meaning must). Similarly, the words “include,” “including,”and “includes” mean including, but not limited to.

Flowchart diagrams are provided to illustrate exemplary embodiments, andare not intended to limit the disclosure to the particular stepsillustrated. In various embodiments, some of the method elements shownmay be performed concurrently, performed in a different order thanshown, or omitted. Additional method elements may also be performed asdesired.

Various units, circuits, or other components may be described as“configured to” perform a task or tasks. In such contexts, “configuredto” is a broad recitation of structure generally meaning “havingcircuitry that” performs the task or tasks during operation. As such,the unit/circuit/component can be configured to perform the task evenwhen the unit/circuit/component is not currently on. In general, thecircuitry that forms the structure corresponding to “configured to” mayinclude hardware circuits. Similarly, various units/circuits/componentsmay be described as performing a task or tasks, for convenience in thedescription. Such descriptions should be interpreted as including thephrase “configured to.” Reciting a unit/circuit/component that isconfigured to perform one or more tasks is expressly intended not toinvoke 35 U.S.C. § 112, paragraph six interpretation for thatunit/circuit/component. More generally, the recitation of any element isexpressly intended not to invoke 35 U.S.C. § 112, paragraph sixinterpretation for that element unless the language “means for” or “stepfor” is specifically recited.

DETAILED DESCRIPTION OF EMBODIMENTS

Turning to FIG. 1 a block diagram illustrating one embodiment of amulti-processor system (MPS) is depicted. In the illustrated embodiment,MPS 10 includes a plurality of processor elements (PEs) and a pluralityof data memory routers (DMRs), which may also be referred to asdynamically configurable communicators, or dynamically configurablecommunication elements, coupled to communicate data and instructionswith each other. As used herein, a PE may also be referred to as a PEnode, and a DMR may also be referred to as a DMR node.

A data path diagram for an embodiment of a dual/quad processing element(PE) and its local supporting memory (SM) for data is shown in FIG. 2 .The top left corner of FIG. 2 shows the Address Generator for the SM fordata (Data RAM), and the top right shows a register file and somecontrol registers for the Data Memory Router (DMR). A DMR is a node inan primary interconnection network (PIN) between PEs. A large MUX isused to switch the different data sources into the main input operandregisters, A, B, and C. Another large MUX switches the operand data tothe X and Y inputs of the arithmetic pipelines, DP1 and DP0. A thirdlarge MUX switches the arithmetic pipelines outputs Z1 and Z0 to datapaths D back to register files or Data RAM. Data RAM is shared withadjacent PE and access conflicts are arbitrated by hardware. Control ofthe pipelines comes from the instruction decode block in FIG. 3 .

Referring to the Address Generator in FIG. 4 , programmable arithmeticunits have been included to support sophisticated address calculationsthat may begin several operations ahead of address actual use. TheAddress Generator shown in FIG. 4 , includes three integer additionunits (AGU0, AGU1, and AGU2), a general purpose integer ALU (GALU) and abox for “Repeat H/W and Auto Incrementers”. Registers support nestedloops with up to eight indexes with independent base and stride values.Additional general purpose registers support the GALU and repeat unit.Output multiplexers support the routing of any computed address to theA, B or D address ports of the Data RAM.

Conditional execution of instructions is supported by executionregisters and predicate flags shown at the center of FIG. 2 . Makinginstruction execution depend on execution status and predicates is priorart. If all instructions finished after a specific number of clockcycles, every time, then conditional execution would likely not be abenefit. But in many cases a critical instruction can finish in fewerclock cycles, providing a result that the next instruction needs ormultiple instructions need. If these next instructions are conditionedto wait for a status bit, they may begin sooner in those cases. Apredicate is a few bits that may be used by conditional instructionsmore generally, not just to wait but also to select and branch. Someinstructions are also used to set/clear predicate values.

In various embodiments, PEs may support programs that intermix two typesof instructions, 64 bit and 128 bit. The shorter instructions supportAssembly language programming model as shown on the left of FIG. 5 ,below. This is useful to support legacy code and simpler compilers. Thelonger 128 bit instructions support the “HyperOp” programming modelshown on the right of FIG. 5 . The longer instructions are needed tomore precisely control the dual datapath hardware and make it moreefficient for signal processing, thus boosting performance for a givenpower dissipation (Pdiss), however, the programming needs to be moresophisticated.

In the PE architectures FIG. 2 , detailed scheduling of operationswithin each pipeline is defined by program compilation (in contrast withhardware-assisted scheduling in other architectures). However, PEinstructions are designed for conditional execution, wherein theconditions for execution depend on registered values of execution statusand predicates. In some cases, there are six predicates that appear inpairs, two pairs in each data path, and one pair in the addressgenerator. A single conditional instruction can access a single pair ofpredicates, but over more instructions all the predicates can beaccessed. In some embodiments, conditional execution may be used tooptimize PE performance in the dual pipeline or many-processor ICcontext. Conditional execution may, in various embodiments, improve theaverage speed/power ratio (also referred to as “speed/Pdiss ratio”),based on each application's algorithm flow structure details.

In various embodiments, the PEs included in the embodiment of FIG. 1 mayinclude the following features:

-   -   Two datapaths, each capable of (per cycle):        -   One/two 16×16 multiplies or one 32×16 multiply        -   One/two 16b add/subtracts or one 32b add/subtract        -   40b barrel shift        -   32b logic operation    -   40b accumulation, two 40b accumulators        -   Together the datapaths can perform (per cycle):        -   One 32×32 multiply or multiply-accumulate    -   One 32b floating point add/subtract/multiply        -   Three Address Generation Units (AGUs):        -   Three loads: srcA, srcB, srcC        -   Two loads and one store: srcA, srcB, dstD        -   Eight Base Registers and Eight Index Registers    -   GP Register File        -   32×16b registers, accessible as 16×32b registers or 8×64b            registers    -   Instruction Decode:        -   64b conventional assembly instructions        -   128b HyperOp instructions        -   IM provides 128b/cycle on any 64b alignment    -   Repeat loop hardware        -   Zero overhead looping        -   Supports three levels of nesting, using three primary index            regs        -   Auto-increment of four secondary base/index regs    -   Loop Buffer        -   Reduces instruction fetch power during inner loop[s]

There is repeat loop hardware built into the design to provide iterationof small sections of code. This hardware may include index counters,increment/dercrement logic, completion test and branch functions moreefficiently than execution of software instructions to do these“overhead” functions. Done properly this hardware removes theinstruction cycles to perform the overhead functions. Zero overheadlooping for up to three-levels of nesting may be provided using a REPEATinstruction which directly programs hardware state machines that executethe looping without software instructions for overhead functions.Indexing is managed automatically so that additional instructions areusually not required within the loop to manage the address calculationsof the operands. This allows for multiple arrays to be accessed andmanaged without additional instruction overhead in the loop, savingpower and providing better performance. In various embodiments, therepeat loop hardware may include:

-   -   Eight Base Registers B0 . . . B7        -   B0 in addressing modes yields a value of zero        -   B0 is used as Stack Pointer (SP Relative addressing modes)    -   Eight Index Registers I0 . . . I7        -   I0 in addressing modes yields a value of zero        -   I0 can be used as a temp register for other AGU arithmetic            (This is named GR0 in register map—not I0)    -   Seven Stride Registers S1 . . . S7        -   Sn used with In or Bn    -   Hardware support for 3 levels of repeat loop        -   Primary loop indexes are I1, I2, I3    -   Four additional incrementers for secondary indexes or base        registers        -   Index registers I4 . . . I7        -   Base registers B4 . . . B7        -   Increment by Stride registers S4 . . . S7        -   Start Address/Temp Registers T4 . . . T7

Repeat loops are controlled by the REPEAT instruction:

-   -   REPEAT is similar to the previous HyperX generation, with the        following improvements:    -   Primary loop indexes I1, I2, I3    -   Option to select up to 4 Base/Index registers to be incremented        at end of loop: I4/B4, I5/B5, I6/B6, I7/B7.    -   Repeat loop information is loaded into loop registers prior to        labels that define loop instructions.

The Repeat Buffer is an instruction FIFO for holding instructions thatcomprise repeat loops. The goal is to reduce instruction fetch powerconsumption during the most time consuming sections of code. Theallocation of the instructions to the buffer is determined at compiletime by the HyperX tools and is not left to the user to determine. It isdescribed here only to provide a basic understanding to the user. Themain features of the Repeat Buffer may include:

-   -   The group of instructions is determined by a REPEAT instruction        and its labels.    -   The repeat buffer usage is determined at compile time and        indicated in the REPEAT instruction by a flag.    -   The first instruction of every repeat loop is always loaded into        the repeat buffer for performance and power reasons.    -   The buffer can hold either 64b or 128b instructions.    -   A maximum of 12-64b entries is available. Two entries are used        for 128b instructions.    -   An entire loop must fit in the buffer in order for it to be used        for anything other than buffering the first instruction of the        loop.

The primary indexes (I1-I3) and the associated other control registersare used by the repeat hardware to control the loop operation. Inaddition to the primary hardware there is another set of registers thatcan be automatically managed by the repeat hardware for additionaladdress calculations by the AGUs. These extra registers are:

-   -   B4-B7—four additional BASE registers.    -   I4-I7—four additional INDEX registers.    -   S4-S7—four additional STRIDE registers.    -   T4-T7—four additional registers used to initialize either the        BASE or INDEX registers.

There are four additional adders available to perform additions on theseregisters. These adders can be controlled by instructions (INIT andINCR) or by the Auto Increment feature of the REPEAT instruction andhardware. Using the AUTOINC registers described elsewhere in thisdocument each primary REPEAT operation can be tied to also performaddress additions on one or more secondary INDEX or BASE registers.

Each adder can be used to add a given STRIDE (S4-S7) to either a samenumbered BASE (B4-B7) or the same numbered INDEX (I4-I7) to eachiteration through the loop for any primary index (I1-I3). In addition,whenever the top of loop indication causes the primary index to beloaded with a starting value the indicated AUTOINC BASE or INDEX will beloaded with the like numbered T register (T4-T7). This allows formultiple arrays to be accessed and managed without additionalinstruction overhead in the loop, saving power and providing betterperformance.

In various embodiments, conditional execution may be based on predicateflags. Such flags may include:

-   -   P0-P3:        -   set by DP test instructions        -   set according to DP timing    -   GP0 & GP1:        -   set by AGU test instructions (examples are shown in FIG. 6 )        -   set according to AGU timing

Predicate Flags are set using the TEST class of instructions whichperform the following:

-   -   Execute a TEST operation    -   Check for a resulting condition    -   Set the selected Predicate Flag

TABLE 1 AGU Test instructions Test Test Operation Conditions InstructionDescription Bit EQ, NE GTCMPB bit tcond Bit compare grA[bit] Compare grAgrB GPn with grB[bit], test for condition, set GPn to boolean TRUE/FALSEArithmetic LT, LE, GT, GTCMP tcond grA Arithmetic compare Compare GE,EQ, NE grB GPn grA with grB, test for condition, set GPn to booleanTRUE/FALSE Logical ZERO, GTAND tcond grA Logical AND grA with ANDNONZERO, grB GPn grB, test for condition, ALLONES set GPn to booleanTRUE/FALSE Logical ZERO, GTXOR tcond grA Logical XOR grA with XORNONZERO, grB GPn grB, test for condition, ALLONES set GPn to booleanTRUE/FALSE

TABLE 2 DP Test instructions Test Test Operation Conditions InstructionDescription Bit Compare EQ, NE TCMPB bit tcond Bit compare srcA [bit]with srcA srcB Pn srcB [bit], test for condition, set Pn to booleanTRUE/FALSE Arithmetic LT, LE, GT, GE, EQ, TCMP tcond srcA Arithmeticcompare Compare NE srcB Pn srcA with srcB, test for condition, set Pn toboolean TRUE/FALSE Logical AND ZERO, NONZERO, TAND tcond srcA LogicalAND srcA ALLONES srcB Pn with srcB, test for condition, set Pn toboolean TRUE/FALSE Logical XOR ZERO, NONZERO, TXOR tcond srcA LogicalXOR srcA with srcB, ALLONES srcB Pn test for condition, set Pn toboolean TRUE/FALSE Range In range TRANGE srcA srcB Test that srcA is inrange: Pn srcB.L <= srcA <= srcB.H, set Pn to Boolean TRUE/FALSE

Conditional instructions specify a test on a pair of predicate flags.For example:

-   -   GP0, GP1—used by AGU instructions    -   P0, P1—used by DP instructions, typically in DP0    -   P2, P3—used by DP instructions, typically in DP1

An example of testing the predicate flags is illustrated in FIG. 6 .Additionally, DP conditional instructions, AGU conditional instructions,and program flow instructions are illustrated in FIG. 7 .

Conditional block instructions are illustrated in FIG. 8 . Thedescription of instructions illustrated in FIG. 8 is simplified versionof the real operation. The STARTIF, ELSE, ENDIF instructions arenest-able; so there is a Condition Stack that holds the nested conditionstates. A STARTIF pushes the new condition state onto the ConditionStack, an ELSE toggles the current condition state (top of stack), anENDIF pops the Condition Stack. The current condition state may inhibitthe operations of STARTIF, ELSE and ENDIF.

Hyper-Ops may be executed in various ways. An example of hyper-opexecution is illustrated in Table 3.

TABLE 3 Hyper-Op Execution Predicate Conditional Operation Flags HyperOpSyntax Unconditionally execute all {|A| slotA; |B| slotB; |C| slotC;slots |DP0| slotDP0; |DP1| slotDP1;} {|A| slotA; |B| slotB; |DP0|slotDP0; |DP1| slotDP1; |D| slotD;} {|A| slotA; |B| slotB; |G| slotG;|DP0| slotDP0; |DP1| slotDP1;} {|A| slotA; |G| slotG; |DP0| slotDP0;|DP1| slotDP1; |D| slotD;} {|A| slotA; |G| slotG; |C| slotC; |DP0|slotDP0; |DP1| slotDP1;} Conditionally execute cond: {|A(cond)| slotA;|B(cond)| selected slots according to a GP0, slotB; |C(cond)| slotC;|DP0| single specified condition GP1 slotDP0; |DP1| slotDP1;} cond.Selection control for slots corresponding to: AG0, AG1, AG2.Unconditionally execute DP slots, but DP slots can execute CMOVinstructions with independent conditions cond0 and cond1. Only availablewhen no slotG instruction. Conditionally execute cond: {|A(cond)| slotA;|B| slotB; |C| selected slots according to a P0, P1 slotC; |DP0|slotDP0; |DP1| single specified condition slotDP1;} cond. Selectioncontrol for {|A(cond)| slotA; |B| slotB; slots corresponding to: |DP0|slotDP0; |DP1| slotDP1; AG0, AG1, AG2. |D(cond)| slotD;} Unconditionallyexecute {|A(cond)| slotA; |C| slotC; DP slots, but DP slots can |DP0|slotDP0; |DP1| slotDP1; execute CMOV instructions |D(cond)| slotD;} withindependent conditions cond0 and cond1. Only available when no slotGinstruction. Conditionally execute cond: {|A(cond)| slotA; |B| slotB;|C| selected slots according to a P2, P3 slotC; |DP0| slotDP0; |DP1|single specified condition slotDP1;} cond. Selection control for{|A(cond)| slotA; |B| slotB; slots corresponding to: |DP0| slotDP0;|DP1| slotDP1; AG0, AG1, AG2. D(cond) slotD;} Unconditionally execute{|A(cond)| slotA; |C| slotC; DP slots, but DP slots can |DP0| slotDP0;|DP1| slotDP1; execute CMOV instructions |D(cond)| slotD;} withindependent conditions cond0 and cond1. Only available when no slotGinstruction. Conditionally execute any cond0: {|A| slotA; |B| slotB; |C|slotC; DP instructions in DP slots, P0, P1 |DP0(cond0)| slotDP0; withindependent cond1: |DP1(cond1)| slotDP1;} conditions cond0 for DP0 P2,P3 {|A| slotA; |B| slotB; and cond1 DP1. |DP0(cond0)| slotDP0;Unconditionally execute all |DP1(cond1)| slotDP1; |D| other slots.slotD;} Only available when no {|A| slotA; |C| slotB; slotG instruction.|DP0(cond0)| slotDP0; |DP1(cond1)| slotDP1; |D| slotD;}

GPn are ready on the next cycle, therefore no branch prediction isrequired if a GTEST instruction is used to set these bits. However, if aGPn bit is being written by a MOV from a general purpose register thenit will be delayed and normal branch prediction is performed. Pn areready after five cycles, therefore branch prediction is required. Themisprediction penalty is 5-n cycles, where n is the number ofinstruction cycles between the test instruction and the branch. If thetest instruction can be moved forward in the code, n can be increasedand the misprediction penalty reduced, possibly to zero (0) cycles.

Because predicates are calculated using explicit instructions to setthem and are not modified by other instructions it is often possible toschedule code to greatly reduce any penalties associated withmispredicted branches. Branch prediction may be made static anddetermined at compile time based on industry standard heuristics forbranch probabilities.

The Hyper-Op mode may allow for instructions to be encoded where eachseparate part of the datapath is controlled by part of the instructionencoding. This allows more direct control of the parallelism of thehardware. The 128-bit Hyper-Op formats allow the parallelism depicted inTable 4.

TABLE 4 Hyper-Op Parallelism cond slotA slotB slotC slotG slotDPOslotDP1 slotD X X X X X X X X X X X X X X X X X X X X X X X X X X X X XX X X X

There are restrictions on which HyperOp instructions can execute inparallel in DP0 and DP1. Two HyperOp instructions can execute inparallel if they have the same latency. By definition, DP0 and DP1 slotscan always execute identical instructions in parallel (equivalent toSIMD). There are a few exceptions. Only a single FP instruction can runin both DP slots as hardware from both datapaths is used in thesecalculations. Note that while the SIMD form of executing the sameinstruction is supported, the usage model is much more flexible inallowing any two instructions that have the same latency to execute inparallel.

Address instructions happen during the FD pipeline stages, take 1 cycleand the results are available to be used by all load/store instructionsin the next cycle. In various embodiments, auto-increments and repeatsinclude reloads to reduce overhead.

Each DMR may have direct memory access (DMA) engines to supportmulti-point sources and multi-point destinations at the same time.Moreover, the complete state of each DMA engine may be captured andsaved in memory; this state information may be later retrieved torestart a DMA operation where it was interrupted. The ability to savethe state of a DMA configuration requires the PE to read up to 11 DMAregisters in order to obtain the entire state of the DMA. Many of theseregisters were internal DMA registers that were exposed to externalaccesses for the purpose of capturing state.

In order to save register space, the DMA could save its state to memoryin a compact form called a descriptor. The PE would specify the startinglocation of this descriptor, and the DMA and a modified push enginecould write the register data to memory starting at the specified memoryaddress. The push engine is a part of the DMA engine that is used toextend a routed message from one destination DMR to a second destinationDMR.

The push engine already has a state machine that steps through eachregister in the DMA in order to program it. This same mechanism can alsobe used to read registers. The read data would then need to be channeledinto the adjacent in-port module. A critical piece will be to tie anyDMA write stalls into the push engine. This may be done by gating theDMA stalls on the push engine's busy input signals.

The DMA wakeup can be used to signal to the PE that the descriptor hasbeen saved. At that point, the PE is free to swap tasks. Once the newtask has completed, the PE can point to the saved descriptor, and theDMA process will resume. In is noted that the router in-port or out-portwill need to be configured properly between task swaps.

Stores of accumulators have an optional post-shift right bypredetermined shift amounts. In various embodiment the following shiftamount are:

-   -   1: for averaging    -   8:    -   16: for storing ACCH=ACC[31:16]    -   15:

These values are stored in three shift fields that are used as indirectshift amounts. The three fields are signified in the HyperOp syntax asSHR1, SHR2, & SHR3 and refer to the shift value fields SHIFT_CTL1-3 inthe PE CONFIG. 1 register.

There are two types of Accumulator Pair: One accumulator from each DP(ACC2_ACC0, ACC2_ACC1, ACC3_ACC0, ACC3_ACC1) and two halves of anaccumulator, treated as SIMD 16b data (ACC0H_ACC0L, ACC1H_ACC1L,ACC2H_ACC2L, ACC3H_ACC3L). Store with post shift of an accumulator pairperforms independent shifts on each part of the accumulator pair,although the number of bit positions is the same. In the followingdescriptions the “tmp” designation is used to try to clarify thesemantics and is not an actual hardware register.

TABLE 5 Accumulator Pairs Instruction Operands Semantics DescriptionST16 ACCn, tmp[39:0] = Shift ACCn right by shr and [>>shr] dstDACCn[39:0] >> shr store dstD[15:0] = LS16b of shifted ACCn to tmp[15:0]dstD. ACCn = {ACC0 . . . ACC3} DST16 ACCPn, tmp0[39:0] = Shift eachaccumulator of [>>shr] dstD ACCPn[39:0] >> shr accumulator pair ACCPntmp1[39:0] = right by ACCPn′[39:0] >> shr shr. Store 32b dstD[15:0] =(LS16b:LS16b of tmp0[15:0] shifted ACCs) to dstD. dstD[31:16] =Independent 16b writes for tmp1[15:0] conditional (cond) slotD.Sign_extended. ACCPn = {ACC2_ACC0, ACC2_ACC1, ACC3_ACC0, ACC3_ACC1} ST32ACCn, tmp[39:0] = Shift ACCn right by shr and [>>shr] dstD ACCn[39:0] >>shr store dstD[31:0] = LS32b of shifted ACCn to tmp[31:0] dstD. ACCn ={ACC0 . . . ACC3}. Sign_extended DSTS32 ACCPn, tmp0[39:0] = Shift eachaccumulator of [>>shr] dstD ACCPn[39:0] >> shr accumulator pair ACCPntmp1[39:0] = right by ACCPn′[39:0] >> shr shr. Store 64b dstD[31:0] =(LS32b:LS32b of tmp0[31:0] shifted ACCs) to dstD. dstD[63:32] =dstD[63:32] tmp1[31:0] → DMRn[addr[13:0]] dstD[31:0] → DMRn′[addr[13:0]] Independent 32b writes for cond slotD. Sign_extended ACCPn= {ACC2_ACC0, ACC2_ACC1, ACC3_ACC0, ACC3_ACC1} STS64 ACCn, dstD[63:0] =Shift accumulator ACCn [>>shr] dstD sign_ext(ACCn right by [39:0] >>shr) shr. Store 40b ACC as 64b (zero ext) to dstD. Sign_extendeddstD[63:32] → DMRn [addr[13:0]] dstD[31:0] → DMRn′ [addr[13:0]] ACCn ={ACC0 . . . ACC3} Note: the >>shr syntax uses the names SHR1, SHR2, &SHR3 to point to the shift fields in PE_CONFiG1.

Shifting may also be done in split stores and loads. More shift optionsgenerally increases hardware power dissipation (Pdiss). In variousembodiments, shift-hardware design may be guided by selecting the mostneeded shift options for a given Pdiss budget. The most needed shiftoptions may be determined by analyzing application code and PEarchitecture. In some embodiments, for example where memories areword-addressed instead of byte addressed, the most need may be forshifts that align bytes to/from word boundaries.

In some embodiments, additional auxiliary compute units may be employedfor increased performance. A listing of possible auxiliary compute unitsis depicted in Table 6.

TABLE 6 Auxiliary Computer Units Instruction Operands SemanticsDescription DIV16U X, Y, Z Z[31:0] = X[15:0]/ Standard Divide-because itY[15:0] is iterative it does NOT have a throughput of 1. 16 bit mathresults in 16.16 result with MSW = quotient & LSW = remainder DIV32U X,Y, Z Z[31:0] = quotient Standard Divide-because (X[31:0]/Y[31:0]) it isiterative it does NOT have a throughput of 1. Result is 32 bit quotientSQRT16U X, Z Z[15:0] = 16b/32b Square Root. square_root(X[15:0]) Thesereturn 8.8 or 16.16 SQRT32U X, Z Z[31:0] = results where the high bitssquare_root(X[31:0]) are the integer and the low bits are the fraction.

HyperOp instructions—enable individual control of the dual data pathsusing static scheduling in the program compilation process. Theexecution threads are exposed to the compiler to let it staticallyschedule all operations. In comparison compilers for modern GPParchitectures put related instructions together in the machine code butthe fine detail of operation scheduling is done by (power consuming)hardware. Static scheduling saves considerable run-time Pdiss.

During transmission of data, imperfections in a system can result indistortion or degradation of transmitted signals. Such distortion ordegradation of the transmitted signal may result in values of data bitsbeing incorrect at a receiver circuit. To remediate such effects, insome embodiments, instructions have been included to support ForwardError Correction (FEC) encoding and decoding. FEC finds application indigital communications of all sorts, and other fields such as digitalrecording and playback from storage media. The basic idea is to take ablock of arbitrary input data and encode it with additional parity bitsin such a way as to enable bit error correction at the receiver orplayback electronics. The encoded block of data and parity bits iscalled an FEC frame. The FEC frame may be further processed by amodulator, then transmitted into a medium (wired, wireless, or a storagemedium).

At a receiver the signal is picked up by an antenna or transducer,amplified, demodulated, and sampled by an A to D converter (ADC). Thesignal in the media may have acquired interference, fading and echoes;and noise may have been added by the receiver. The output of the ADC isa sequence of digital samples. There are a variety of ways to take asequence of samples, obtain synchronization, and format them into a FECframe; but these are tangential to the FEC calculations and won't bedescribed here. Each bit position in the formatted FEC frame has adigital value that may be referred to as a soft bit, represented by thereal bits of an integer number in a digital system.

FEC decoding is the process of taking the soft bits in a formatted FECframe, computing bit-error corrections, applying them, and output of acorrected FEC frame. The objective of a FEC decoding algorithm is tooutput the most likely correct frame of data given knowledge of the waythe parity bits were generated. For FEC to work correctly, a particularFEC decoding scheme (parity bit use for error correction) must bematched to the FEC encoding scheme (parity bit generation).

Early success for FEC was achieved with Hamming, BCH, and Reed-Solomoncodes. Further successes were obtained with convolutional codes, andserial concatenation of convolutional codes with other codes. On thedecoding side the objective is to find the block of data that is mostlikely correct, given the received soft bits with noise-induced errors.This can be achieved in a single pass algorithm (Viterbi, etc.) or aniterated algorithm (Turbo, etc.).

FEC calculations involve comparing the probable correctness of the twochoices for the value of a binary bit, depending on the observedsequence of values from the sampler. A sequence of fluctuating valuesmay be treated as a random variable and so probability mathematics maybe applied. The main interest is whether a particular transmitted databit was a 1 or −1 given the values of the soft bits in the FEC frame. Alarge number of soft-decisions can be calculated before making a harddecision about the transmitted data. These soft decisions may becalculated by comparing probabilities and a popular way to do that andinclude the parity bits is to calculate a ratio of conditionalprobabilities referred to as a likelihood ratio (LR). The logarithm ofthe LR (LLR) is of particular interest because multiplications anddivisions are transformed to additions and subtractions, which in a PEwill calculate more quickly and are less prone to over- and under-flow.Consequently the FEC decoding can be computed with the values of LLRsstored in integers.

A log probability sum of products is also referred to as a MAX*operator. In various embodiments, the MAX* operator may perform in asimilar fashion to an add-compare-select (ACS) with offset instruction.It provides for the sum of products type operations for log domain mathon exponential probabilities. The symbolic form is often written:Max*(x0+y0, x1+y1).

In various embodiments, a PE implements such a function as:

Z[15:0]=MAX((X[15:0]+Y[15:0]),(X[31:16]+Y[31:16]))+TLUoffset

A double log probably sum of products instruction may be achieved bymodifying the operand usage slightly to provide a higher throughput formthat is useful for turbo operations. This one provides two results in asingle datapath of the form Max*(x1+y0, x0+y1): Max*(x0+y0, x1+y1).

In various embodiments, a PE implements such a function as:

Z[31:16]=MAX((X[31:16]+Y[15:0]),(X[15:0]+Y[31:16]))+TLUoffset

Z[15:0]=MAX((X[15:0]+Y[15:0]),(X[31:16]+Y[31:16]))+TLUoffset

Another form of the MAX* operations where 32-bits are produced perdatapath in the form of:

Max*(0,x1+y1)−Max*(x1,y1):Max*(0,x0+y0)−Max*(x0,y0)

In various embodiments, a PE implements such a function as:

Z[31:16]=MAX(0,(X[31:16]+Y[31:16]))+TLUoffset−(MAX(X[31:16],Y[31:16]))+TLUoffset)

Z[15:0]=MAX(0,(X[15:0]+Y[15:0]))+TLUoffset−(MAX(X[15:0],Y[15:0])+TLUoffset)

Another instruction may provide a double MAX* operation on two operandswith the value in the two accumulators in each datapath. It provides afast way to get the MAX* result on a large group of numbers by using theaccumulator much like the MAXAC instructions do. The two 16-bit resultsgo into the two accumulators. If using both datapaths then when theinput data is completed the 4 accumulators need MAX* operations run onthose values to get the final result. Symbolically, the equation appearsas:

ACC_(n+1)=Max*(ACC_(n+1), Max*(x1,y1)):ACC_(n)=Max*(ACC_(n),Max*(x0,y0))

A double of an accumulation form for the log probability sum of productsmay be achieved using:

ACC_(n+1)=Max*(ACC_(n+1) ,x0+y0):ACC_(n)=Max*(ACC_(n) ,x1+y1)

It is noted that the natural result of the extra hardware for the LPinstructions swaps the “0” index data to the high ACC and the “1” indexdata to the low ACC. If this can be easily swapped in the datapath, thatwill be preferable. In various embodiments, a PE implements such afunction as:

ACC_(n+1)=MAX(ACC_(n+1),(X[15:0]+Y[15:0]))+TLUoffset

ACC_(n)=MAX(ACC_(n),(X[31:16]+Y[31:16]))+TLUoffset

It is also possible to generate the double sum of quotients in the logdomain. In a similar fashion as to what has previously been shown,subtraction is used instead of addition to provide:

ACC_(n+1)=Max*(ACC_(n+1) ,x0-y0):ACC_(n)=Max*(ACC_(n) ,x1-y1)

In various embodiments, a PE implements such a function as:

ACC_(n+1)=MAX(ACC_(n+1),(X[15:0]-Y[15:0]))+TLUoffset

ACC_(n)=MAX(ACC_(n),(X[31:16]-Y[31:16]))+TLUoffset

To implement the above-referenced instructions, dedicated logiccircuits, such as those depicted in FIG. 9 -FIG. 14 may be employed. Insome cases, the logic circuits may be selectively enabled based on thetype of instruction, thereby allowing multiple instructions to beperformed using a minimum amount of logic circuits.

The primary interconnection network (PIN) of an MPS is designed for highbandwidth, low latency transport of data within and between applicationsrunning on PEs and communicating with chip I/O ports. An interconnectionnetwork (IN) may be generally described as a set of nodes withconnecting links between them. Most PIN are not fully point-to-pointcapable in one stage as this would require too much wire. Instead theyare multistage with a router at each node of the network and the nodesconnected to each other by links. Messages can be routed through thePIN, which enforces rules for starting, pausing, and delivering messagesfrom a source node to a destination node. If a message is left open thenit may be used indefinitely as a data pipe. However, because of themultiple stages, an existing message can block the setup of a newmessage by occupying a link or destination that is specified by the newmessage, thus message delivery is not guaranteed. Some mitigations tothis have appeared in the literature such as dynamic cut through, andlong routes to “jump over” congestion. However, our approach is to addlayers of interconnect, each layer having another set of links. Witheach additional layer, the PIN node router is expanded to allow messagesto cross from one layer to another.

In large MPS there is a need to manage the system without impacting theoperational efficiency of the PIN. This has led to the development ofsecondary interconnection networks (SIN), which may, in someembodiments, have a lower bandwidth than a PIN but which may guaranteemessage delivery. Such an interconnection network is shown in FIG. 15 .As illustrated, message bus 1500 includes multiple message bus nodescoupled to each other in a fixed connectivity fashion. The message busprovides a moderate bandwidth, variable latency, guaranteed deliverymethod of reaching every accessible register and memory location withinthe chip, including both PE and DMR locations, as well as I/Ocontrollers, such as I/O controller 1502.

The message bus may be used to boot, debug, and load data outside of thecore array fabric, as well as provide access to virtually alladdressable locations through the MPS device. For example, the messagebus may access, all PE/DMR data and instruction memory locations,internal PE registers, DMR registers (including register bus locations),and I/O peripherals attached to the I/O bus.

The message bus may, in some embodiments, provide support for multiple,simultaneous masters, such as, PEs, development access port (DAP) 1503,Boot Control 1504, and I/O processors. Messages are routed on themessage bus using automatic routing based on relative positioning ofsource and destination. Replies route automatically in a similar mannerto a request using relative locations. Error reply routes utilize arunning location to the source maintained in the message.

In some embodiments, a message bus may comprise more than oneindependent message fabric. Occasions will arise where messages onindependent fabrics attempt access to the same destination; for whichautomatic arbitration is useful. The arbitration outcome may bedetermined by a simple scheme such as priority configuration. A Messagebus priority configuration may allow for two unique priorities, lowestor highest, established for access to a DMR address, with all PE addressaccesses at lowest priority in the PE.

A message bus may support multiple endpoint message groups to permitsubsets of the array to respond to a single message. Multiple groupmemberships may be set on a single node. In various embodiments, abroadcast capability may be used to reach all nodes, and manyindependent groups may be available for allocation.

In various embodiments, the Message bus may allow for multiple chipoperation. Relative address of destination may bridge between chips, ifa multiple die structure is implemented. In some cases, the messageformat may permit up to 256 MBN nodes in the X and Y directions. Inother embodiments, the message can be expanded to support additionalnodes. By employing a relay technique using a table (e.g., table 1807),any suitable number of message nodes may be supported.

The Message bus has the capability to allow any processor within thedevice to reach every addressable location in the device. Thiscapability enables a variety of possibilities, including the passing ofmessages between processors, updating tables of values as algorithmsprogress, managing the behavior of a remote I/O controller, collectingstatistics on operations, managing security of a cell, and generalcommunication of non-time-critical information between processors.

It is noted that the message bus may lack certain features that make itundesirable to be used as an extra layer of PIN routing fabric. First,the bandwidth is much lower. For example, in some implementations, themessage bus may be as much as 10 times slower than the PIN, while inother implementations, the message bus may be only two times slower thanthe PIN. Second, the latency of data delivery varies widely, even formessages between the same source and destination pair. There is noconcept of a programmed route setup and teardown, where in the fabric aknown length route is set up for a message, and every time the route isused, the same wires are traversed to connect the two endpoints,resulting in a predictable latency for the data delivery. With theMessage bus, relatively short messages are directed from a source todestination with the route determined by the fabric hardware. If amessage is blocked at some point along the way, it will wait for theother blocking message to complete, then it will continue. With only onemessage at a time on the fabric (and no priority delays at thedestination) data delivery by the message may show predictable latency.However, additional message traffic on the fabric may disrupt datadelivery and may change the route taken by each subsequent message.Thus, the Message bus may be unsuited to distribute synchronizedmessages, as the arrival times are not guaranteed.

The Message bus is useful for power efficient, guaranteed delivery oflower bandwidth, short messages to/from any destination in the MPS.These would consume considerable resources in the PIN fabric,potentially tying up links for extended times with little data passingthrough, or requiring constant setup and teardown of links to preventthem from blocking the system. The Message bus also simplifies remoteprocessor management of chip I/O, for MPS where only those processorsnear to an I/O port may control the port and any peripheral deviceattached to it.

While not well suited for timing critical applications, the message busstill has significant performance available. The bus itself moves a wordper clock, and the clock may be the same as the functional core clock,which may have a target frequency of 1500 MHz. This results in aneffective 1500 M word/sec movement rate between nodes. Since the messagebus is designed to push data and addresses across the bus, then free thebus to other messages as quickly as possible, for each word delivered toa register, there is an inherent overhead required to define a route,identify where words should read or written from, and how data or statusis returned to the node making the request. These non-data words reducethe throughput of the bus for a single transaction. To limit the impactof the overhead of the message structure, an arbitrary number of wordscan be transferred in one message, with the only limitation being theymust be contiguous from a single starting address.

Under normal conditions, access to any normally addressable locationwithin the MPS device is available. This means any register, memorylocation, or peripheral that has a normal mode address can be written orread, within the parameters of the specific address being accessed. Forsome PE internal registers the contents of the PE can be read while thePE is operational, however, the values contained represent a snapshot intime when the read occurred, and only update when the value isrequested. In addition, there is a time interval between when a requestis generated, the value is read by the message bus from the PE or DMR,and the results are delivered back to the requester, which depending onsystem and message bus loading may represent a significant waiting timefor a result. There is the potential for excessive waiting for access tocertain PE internal registers that are needed for operations on nearlyevery clock, effectively stalling the request until the PE is stopped ata breakpoint. It is possible that a gap would appear in the codeallowing these registers to be read, but the PE requires a number ofregisters to operate, and a Message bus message attempt to read thoseregisters at the default low priority will generally result in aprolonged stall of the message. Within the DMR the priority of access isprogrammable, so the request can be made to either wait until no otherrequests are pending for that address region, or immediately access theaddress, and block all others attempting access to the same region.

The normal mode address locations may include:

-   -   Read/Write access to any DMR data memory location    -   Read/Write access to any DMR memory mapped register    -   Read/Write access to any PE instruction memory location    -   Read/Write access to PE status and control registers    -   Read/Write access to clock control registers    -   Breakpoint control, except Hardware Break insertion    -   PE wakeup control    -   Parity control    -   PE message passing    -   PE programmer register access    -   Memory and Peripherals on the IO Bus

Extreme care must be used when operating on instruction memory while aprogram is executing. It is possible to write a block of instructions tomemory, and due to execution of a currently running program, a portionof the new code may be executed, without first completely replacing theblock of code, resulting in unpredictable operation. An MPS may beconfigurable to include parity bits on each write to memory and to checkparity on every read operation, branching to a fault condition if anerror is detected. However, parity checking consumes more power thanwhen not doing so. Parity check in an MPS may be considered a mode ofoperation to be used in extreme environments, meaning that with andwithout parity are distinct operating modes of a memory, and changingbetween these modes is not advisable while running applications that usethat memory.

Access to the clock control is possible under all conditions, however,not all times are advisable to alter the state of the clock registers.While the system is operational, especially when operating on data setsthat are shared between multiple processors, changes to the clockcontrol will be made locally without regard to other nodes which mayalso be accessed to update the clock control in those locations. Timingof access to data will likely be lost if attempting to alter the clockconfiguration while an algorithm is running.

When a PE is stopped at a breakpoint, additional access is available tothe message bus. As the PE is suspended, the program counter hasstopped, and updates to hardware breakpoints are possible. All of thenormal mode capabilities are available, with a hardware breakpointinsertion capability additionally available.

Due to the implementation of breakpoints, changing values while thesystem is in operation can lead to unpredictable results includingmissed breaks, and unintentional breaks. Thus, changes to thebreakpoints will most reliably become effective while program executionis stopped.

As the PE is stopped at a breakpoint, internal register access time willbe improved, and the returned values will remain accurate for thestopped processor. The arbitration for PE register access, while notaltered, has no active higher priority requestors, enabling fasteraccess by the debug system to the PE internal state registers.Similarly, on the DMR, after DMA operations complete, there are no othercompeting accesses for addresses, and even lowest priority requests areserved immediately.

During boot, the message bus may be utilized to load the processor forthe first time, configure clocks and security, and release the PE fromreset to start operations. For boot operations, it is expected that themajority of transactions on the message bus will originate from the bootprocessor, with destinations throughout the device. It is expected longburst operations will be prevalent, reducing the overhead of programloading due to addresses.

One later use of the boot controller is to implement dynamic cells,where it is possible to have new cells loaded into an already runningsystem. As used and defined herein, a cell is a portion of anapplication assigned to one or more PE and one or more DMR. It is notedthat at least one DMR is included in a cell to serve as an instructionmemory for a related PE included in the cell. In this case, there islikely more activity on the message bus, but again, already being at theperimeter of the device, arbitration is simplified to transmit new cellsinto the array. By utilizing larger block transfers, the time to loaddynamic cells can be minimized. Unlike the initial loading, there willlikely be contention at some point while the replacement cell is loaded.The overall length of a burst should be considered when implementingdynamic cell loading, as it will consume a path for potentially a longtime, and may lead to delays in delivery of other messages.

One common problem with an in-system debugger is the potentialinteraction of the debug facility with the functional operation of thesystem. In certain cases, it may result in a change in behavior of thefunctional system when debugging is engaged, or more problematic,correcting or changing the error when debug is operating. While anyaccess that must be arbitrated can never completely remove theinteraction between functional systems and parallel debug facilities, ifdebug operations are mapped into a separate message bus instance thiscan remove all interaction except the final data access arbitration.Through careful selection of debug to be the lowest priority, debugwould only interact with the system while it is otherwise unused, andwould not upset the functional accesses generated from the functionalsystem. In various embodiments, the priority may be changed between lowand high.

When a processor is at a breakpoint, there are no PE originated requestsdelivered to the DMR. This does not mean that there are no requestspresent in the DMR, as DMA requests can continue to be processed whilethe PE is stopped. This results in a split state, where PE requests areserved immediately, as no other requests for data would be present, anda DMR state where DMA transactions would continue to be ahead of debugrequests. Logically, this maintains the idea that debug should notinterfere with operations, and for non-breakpoint processors.

Before diving into the details of the bus itself, it is helpful to firstunderstand what is meant by a message in the context of the message bus.In the most general sense, the message needs a means to deliver themessage to the intended destination, the data to deliver, and a means toget a response back to the starting point. In detail, there are severaluniquely different messages that the Message bus passes through itsnetwork, which will now be covered.

Messages are constructed and sent by programming the configurationregisters within the Message bus node. There are two sets of theseregisters for the two channels (A and B) of the Message bus. Theprogramming of these registers is discussed below. There are severalformats of messages available. These can be categorized as follows:

-   -   Point-to-Point Message—Allows one to read or write information        from any other single node.    -   Multi-Point Message—Allows reads or writes to a group of end        point nodes with a single message.    -   Reply Message—Not directly generated by a user. Used by the        message bus to provide acknowledgement of the other messages.    -   Secure Configuration Message— A form of message used to        configure security for the chip.

To send a message the program must program the basic components of themessage into configuration registers and then signal for the message tobe sent. Programming components are listed in FIG. 16

The STATUS register is used to observe the status of the message thatwas sent. In addition to these registers that directly control themessages being sent there are several other configuration registersdescribed later that are used to control other aspects of the messagebus system. Note that only the registers that need to be modified todefine a new message need to be updated prior to sending the nextmessage. For instance, to send the same message to five locations simplyupdate the route information in DELTA_OFFSET and resend the messageusing GEN MSG. The message formats will be described more fully below.

The most basic message, which can be used by any master to reach anylocation in the chip is the Point-to-Point message. As the name implies,this message targets a single location, and issued from a singlelocation. The information passed between the two nodes is only seenoutside the message bus by the two nodes, as all intermediate locationshave no means to snoop the passing data, in this regard, allPoint-to-Point messages are secure. A variety of options are availablefor constructing the message, which balances capabilities and overheadfor this message type.

The slave can only receive and process one message at a time, so thereis no need to know which node is requesting the data accesses, only aroute back to the master is necessary, so that the reply can getthrough. Part of the request message includes the return path for theresponse, which is necessary to complete the round trip of thePoint-to-Point message.

The Point-to-Point message can be either a read or write request, withthe read request generating a reply message containing the requestedread data, and a write request generating a response indicating thesuccess or failure of performing the write. Much like the read or writerequest message balances capability and performance, the reply messagealso minimizes overhead, at the expense of some lost flexibility at themaster.

There is one reply message to each Point-to-Point read or write message,and in the case of multiple data words included, there will be multiplereply words included, so that every address sent out, has a replyreturned, either status of a write, or data for a read. The data in themessage body will be returned in the same order as the request sent. Toensure that the data is promptly removed from the bus when arriving backat the requesting node, the address of where to store off the responseis programmed in the MBN. Since only one reply location can be stored ata time, each MBN can have one outstanding transaction at a time if morethan 1 word is expected in return, and the automatic memory loadingmechanism is used. If the processor extracts all the data from the node,then as many requests can be outstanding as the processor desires.

The same reply message format is used for all multiple endpoint replies,however, for these multiple endpoint replies, a single reply word isinserted into the payload. For example, in read messages, the value ofthe requested address, or the security error control word if an invalidread is attempted to a secured region. Alternatively, in write messages,the reply may include a pass or fail value indicating whether therequest write was performed or not.

The multiple endpoint write message is received by more than one activenodes. This message is useful for communication within a cell, where thecell can be instructed which messages to react to through the messagebus configuration address write. Security may prevent writes fromoccurring, and a single write status is returned for the entire message,rather than individual word status, as this would potentially causeblockages. The reply address is recorded as the delta offset from therequesting node, computed as the multi-cast message is distributedthrough the array. This will result in many paths being used forreturning the reply message back to the master, many not following thesame path as the request, which is expected. A case of the multipleendpoint message is the broadcast message, which addresses all nodes atonce.

There may also be times when the ability to read the same address from acollection of message bus nodes is useful. For these cases, the use of amultiple endpoint read is available. The operation functions such thatonly nodes that match the multi-node address will respond. As with theother multiple endpoint messages, the reply path is determined by deltaoffset computed on the way to the replying node. The replies will followa number of routes back to the requesting node, many of which aredifferent from the path taken from the source to the destination. Thereis also a case where all nodes will respond, and return one word.

At each node, a security configuration is maintained, which describesthe operations that are allowed at the node. Setting this configurationmust be a secured action, and is implemented through an TO processorselected as a part of the boot operation. This message is used to updatethe security configuration, and can be generated by a selected processorin the system. The format of this message is unique, and cannot beconstructed through data writes, thus only identified securityprocessors can generate this message. The underlying security decisionsthat lead to generation of security configuration messages is out ofscope for the message bus, as the only consideration is the delivery ofthe messages. The nodes not selected to be the security master aredisabled from sending security messages much like masters can bedisabled to implement a forced separation of debug from functionalnetworks, although in this case only a type of message is restrictedrather than all message generation as is the case in network isolation.

The message bus may be implemented as a two-dimensional mesh network asshown in FIG. 15 . In addition, there are two identical networksoperating in parallel, with a recombination point located within eachnode. Each link shown is comprised of both an input and output port,duplicated for both networks, both networks allowing simultaneoustransmit and receive on the same side of the node, for a total of up tofour messages active on any side of the node. In the maximal use case ofone of the networks, all four input ports and four output ports can beutilized to transport messages across the node. When in maximal use caseoperation, the only restriction on routing is that no U-turn routes arepermitted, but any other combination of routes to the other threeoutputs is acceptable. While there are two networks present at everynode, they operate completely independent of each other, with no routingpossible between the two networks, making it possible to have blockingoccur in one network while the other is idle.

There are several advantages to the implementation as a mesh networkover other topologies, the largest being the ability to route aroundobstacles. Since the message bus is a dynamically routed network betweennodes, there is always the potential to encounter blockages on a directpath between the two nodes, from routes already in use by othermessages, to nodes being powered off to reduce overall chip powerconsumption. The mesh structure provides options for reaching thedestination, in most cases there are two logical directions which movethe message closer to the endpoint, meaning that even if one directionto get closer to the end is blocked, another generally exists. It isstill possible to have un-routable messages, but this is due to thecomplete lack of a path between the requested endpoints, such as onelocated in a power-down region, which is a failure of the system, notnecessarily a failure to route a message.

Another advantage to the mesh network is a reduction in message traveldistance. For large numbers of nodes there are several potentialconnection methods, serial chain, multiple loops, row or column-orientedbus, and a mesh. In the serial chain, the main drawback is the longdistances that the message may have to travel between the two points.Additionally, the number of messages that can coexist in the network isgenerally reduced, as there is typically only one path available throughthe chip. Serial chain access timing may be variable and difficult todesign for adequate timing margins.

Another issue with large serial chains is power, and the inability topower an arbitrary region down if any of the nodes are part of a pathneeded to access an unrelated node. An improvement to the single serialbus is a number of smaller loops, but this leads to the centralizedproblem of needing to move between loops, and the potential forsignificant delay if conflicts occur at the inter-loop connection point.The multiple loops also continue to have issues with power optimization,as an entire loop would need to be either powered up or down, whichresults in a fairly large power step. The number of simultaneousaccesses increases, but is still limited at the point data must movebetween independent loops.

A multi-bus oriented arrangement has similar issues like the multipleloop construction, namely the point needed to move between the variousbus segments ultimately becomes a choke point for the overallinterconnection network. The bus arrangement does permit an easier meansto send multiple messages at one time, however, the ease of getting amessage on one bus segment is reduced by the complexity of needing toarbitrate between different bus segments. Depending on the location ofthe inter bus interconnect, this may force a certain region of thedevice to remain on, for no other reason than to be able to move databetween bus segments. With I/O spread around the perimeter of thedevice, there is no ideal location to place the inter bus connector, asdata could potentially have affinity to any side of the device. Thisresults in some layouts being relatively power efficient, while leavingothers as poor performers due to needing a large number of otherwiseunused nodes on to be able to interconnect with other bus segments.

The mesh also supports many messages running in parallel. As there is nocommon choke point to the routes, many messages can move through thenetwork at the same time. Unless through significant blockages routesare constrained to merge and pass through a single node in the samedirection, each message can progress often without ever encounteringanother message, regardless of when the message is sent. If eachprocessor supports one message at a time, the upper limit for concurrentlong-duration messages is equal to the number of processors in thesystem. Congestion may, however, reduce the practical upper limit,depending on the routes needed to deliver the parallel messages, andreturn the replies to the messages.

As all nodes within the message bus structure function either as amaster, a slave, or an intermediate point of a route, these basicfunctions of each node will be detailed in general in this section. Theexact interface details may vary across embodiments, with thisdescription providing a functional overview of the message bus nodecomponents. The general interface of the message bus node into thesystem is illustrated in FIG. 17 . There is a variation in how the nodeis attached at the IO Bus, as there is no PE link required, although theunderlying operation is similar.

As illustrated, message bus node 1701 is configured to receive a firstmessage that includes a payload and routing information, select adifferent message node of the plurality of message nodes based on therouting information and operational information of the multi-processorarray. As used herein, operational information is information relatingto either past or current performance of a multi-processor array. Forexample, operational information may include resource availability,network performance heuristics, congestion information for the messagebus, and the like. In some cases, the operational information may becurrent information about the performance of the multi-processor array,while in other cases, the operational information may include a historicinformation regarding the performance of the multi-processor array. Itis noted that in some embodiments, a message bus node may receive theoperational information from the multi-processor array during operation.

Message bus node 1701 is further configured to modify, based on thedifferent message node, the routing information of the first message togenerate a second message, and forward the second message to thedifferent message node. Routing information, as used herein, isinformation that specifies either an absolute or relative destinationfor a message. When a relative destination is specified, a number ofnodes and respective directions are specified from the starting node inorder to determine the destination for the message. Alternatively, whenan absolute destination is specified, an identifier noting a particularnode is specified as the destination. Each message node may thendetermine a best possible node to forward the message in order topropagate the message to the specified absolute destination. Asdescribed below in more detail, routing information can include anoffset which specifies a number of messages nodes and in what directionthe message is to be sent.

As used and described herein, a message is a collection of data thatincludes a payload (i.e., the content of the message), along withrouting information. Additionally, the message can include theoperational information or any suitable portion of the operationalinformation.

Message bus nodes (or simply “message nodes”) may be implementedaccording to various design styles. A particular embodiment is depictedin FIG. 18 . As illustrated, message bus node 1800 includes router 1801,router 1802, network processor 1803, network processor 1804, arbiter1805, config circuit 1806, and table 1807.

Error! Reference source not found. Message bus node 1800 is attached tothe PE and DMR through the arbiter 1805, and in the case of the IO Bus,the arbiter 1805 is the bridge between the IO Bus and the message bus.There are three targets of an access entering message bus node 1800 fromthe local processor, the configuration registers (located in configcircuit 1806), and the network processors 1803 and 1804. In addition,network processors 1803 and 1804 can be generating accesses to the localnode, and only one access path is possible from message bus node 1800back to the DMR or PE. Based on the configuration of the node, whichtype of access, a remote request processing, a local request beinggenerated, or a reply being stored, the arbiter 1805 connects one ofnetwork processors 1803 and 1804 to the PE and DMR interface.

Since only the request generation is vulnerable to stalling from thenetwork side, all writes to the DMR or PE can be generated immediately.In the case where a read is requested, either to fill data for a writerequest, or in response to a remote access being processed, arbiter 1805must wait for one request to complete before switching to the othernetwork processor. If the DMR or PE has stalled the request, it ispossible to remove the current request and switch to the other networkprocessor if that access is configured to be higher priority. Since thePE or DMR had already stalled the access, there is no data in flightthat would be impacted by switching the access to the other processor.

Arbiter 1805 is also configured to steer the register bus traffic to theproper network processor or configuration registers, based on theaddress requested. Arbiter 1805 will also generate stalls back on theregister bus interface in the case that a remote access is currentlyusing the configuration registers, as this is the only point ofcontention in message bus node 1800 between the local node and remoteaccesses.

Network Processors 1804 and 1805 are responsible for the interactionbetween the attached PE/DMR or IO Bus and the rest of the message busnetwork. There are three responsibilities that network processor 1803and 1804 fulfill, the first being generating request messages into thenetwork. The second function is to process messages received from thenetwork (including modifying the routing information of a message), andaccess the local addresses requested in the message, either for writesor reads. The last function is to process the reply messages received inresponse to a request message.

The first function of a network processor (e.g., network processor 1803)is to generate new messages into the network. This is accomplished inone of two ways, the first, for single word messages the PE can writethe node delta to the remote node or multiple endpoint group to access,the address at the remote node to access, and in the case of a write,the write data. The network processor then generates the messagestructure, and sends the message to the router for delivery. For longermessages, meaning two or more words long, the PE writes the node deltato the remote node, the starting address at the remote node, the endaddress at the remote node, and the local address in the DMR where thewrite data can be found, or in the case of a read, the location that thereturned data will be stored. Once these values are configured, thenetwork processor generates the message structure to the router, andgenerates read requests to the DMR to fetch the necessary write data.

The second function of a network processor is to service the messagesreceived from the network, and provide a response. In this case, thearriving message structure is deconstructed, and the first and lastaddresses to access are stored off. In the case of reads, a read requestwill be generated to the DMR, starting at the first address, andcontinuing until the last address is reached. A check that the regionbeing accesses is not protected by security is performed, and an errorvalue is returned instead of data for read words, which are notaccessible in the present configuration. In the case of a write, thenetwork processor will wait until the first data word arrives, and thenit will generate a write to the DMR for each word received. Writes havean additional check performed to validate that if the address is asecurity configuration address, the received message is also a securitymessage type.

The third function of a network processor is to receive the replies torequests, and store them back for the processor to read. This step hastwo options, the first is for single word replies, which the processorcan directly read from the reply register of message bus node 1800. Toprevent multiple word messages from stalling in the network, when morethan one word is returned, the network processor will store them back tothe DMR memory. When the read request was generated, the reply storingaddress range was also configured in message bus node 1800. The networkprocessor uses the pre-programmed address range to store back the reply,discarding any additional data that may have been returned in themessage as a safety measure.

As there are three functions competing for a single resource, thenetwork processor must also determine which action to take at any giventime. In reality only two of the three can be present at the same time,as only a reply or a request service can be active on the router side ofthe network processor, and a request generation can be active on thePE/DMR side. The main issue with arbitration is ensuring no deadlockcondition can form, and the prevention of deadlock is more importantthan the performance of the system under deadlock potential operation.Since the system can plan how the messages will flow in the system, thearbitration scheme is selected from one of three options. The firstscheme is first in, first served. In this mode the node will process thefirst request, either from the network or processor side that arrives,and process that message to completion before considering any othermessages. This is the simplest method that maintains full networkperformance, however, it is vulnerable to deadlock. The second method isround robin servicing, which will alternate between the two requests foraccess. Unfortunately, due to the pipeline depth of the DMR interface,this has the potential to cut the access rate to ⅖th speed. Whateffectively happens is a write for the return or a remote read or writewill occupy one cycle, the next cycle will handle a local write messageread of the write data, then the interface must wait for these twoaccesses to complete. By waiting, the network stall interacting with theDMR pipeline is avoided, at the expense of significantly lowerperformance. Between these two is a means to determine that the messageentering the MBN and the message leaving the MBN are not both betweenthe same nodes. While multi-node deadlock is possible, the system mustactively create such a scenario, which the hardware will not protectagainst. By checking from where the data came, and comparing to wherethe data is going to, it is possible to determine if the two messagesthat are competing could generate deadlock, and in such a scenario theround robin operation can be selected. Otherwise, FIFS can be thedefault, running at full speed, and as a system wide message delivery,the messages complete sooner than if round robin is implemented.

Each of router 1801 and router 1802 are coupled to respective networkand are configured to receive messages from the network, and forwardmessages generated by network processors 1803 and 1804 onto the messagesrespective next destinations. Routers 1801 and 1802 may include multipleswitches or other suitable circuits configured to coupled networkprocessors 1803 and 1804 to their respective networks.

Routers 1801 and 1802 are identical, and each performs two mainoperations on data passing through the node. The first is to identifythose messages that are intended for the node. This involves looking atthe two bytes of node delta address delivered, and upon finding a set ofzero values, starting to extract the following contents of the messageand delivering them to the slave processor.

When a match is not found, the second main operation is to forwardmessages on to the next node, making progress towards the destination.Progress towards the destination can be in potentially two directions,with an option to detour in the third direction if there is no availablepath along the two options that lead closer to the destination. Thedirection the data arrived from is not an option, as backtracking is notallowed, an underlying requirement of the system design is to allow apath between the two nodes that are to communicate such that a routedoes not need to make a U turn when following the routing rules.

The router is also responsible for inserting new messages into thenetwork. To insert a message into the network, the destination deltaoffset is known, and so long as one of the two logical direction outputstowards the destination is free, the message is accepted and placed intothe message bus. Just prior to the first address and data pair the replydelta slot is inserted in the message, to permit the destination node toreply back with the result of the requested operation. The reply deltais automatically updated based on the path the message takes through thenetwork, allowing any node along the way, in the case of error replies,or the destination node to have an accurate destination to send a replyto in response to the request message.

When discussing addresses within the message bus, it is important todifferentiate between the address of the message bus node, and the valueplaced in the message in order to route to that node. The address of thenode is effectively the X, Y coordinate location of the node within theoverall array, which includes IO nodes, core array locations containinga PE and DMR, and core nodes containing only a DMR, as occurs on the topand right edges of the array. Location (0,0) is found on the lower leftcorner of the device, connected to the boot processor, located outsidethe main core array. The core array is bounded by these four corners(1,1), (1,17), (17,17), and (17,1) as shown on the overall array in FIG.19 noting that the format in the figure is (top number, bottom number).

The location address of the message bus node is used in generating therouting delta information for use in the message header. To compute therouting delta necessary for the message, the signed difference in thetwo locations is used to identify the number of nodes that need to betraversed in each direction of the mesh to transit from the source tothe destination node. For instance, to travel from (2,2) to (4,7) adelta address of (+2, +5) would be used, and the return route would be(−2, −5). This indicates that the destination is 2 nodes east and 5nodes north of the current location. This permits a flexible placementof cells, since routing information is relative, and if a cell is moved,the endpoint is moved a similar distance, leaving the delta between thetwo locations unchanged.

In some cases, information stored in table 1807 may be used to determinethe routing delta. For example, destination information included in amessage may be used as an index to table 1807 to retrieve data. Suchdata may specify a next message bus node to which the message should beforwarded. Table 1807 may be implemented as a static random-accessmemory (SRAM), register file, or other suitable storage circuit. Invarious embodiment, the information stored in table 1807 may be loadedduring a boot sequence and may be updated during operation of themulti-processor array.

Given an 8-bit row and column address value, it may be possible for themessage bus to span a 256×256 node array. To realized such a node array,and allow for the message bus to remain constant, scale as technologynodes shrink, or support multiple die array construction may occur inlater generations, a format of the address may be selected that wouldnot need revision for a number of generations.

Once a message has reached the destination node, a second address neededto locate the value at the destination node to access. Unlike the rowand column addresses which have ample room for growth, the PE/DMRdestination node local address component is actually rather tight onspace. As currently defined, there are 16 k words of DMR data memory, 8k words of PE instruction memory, a DMR register bus space, PE internalregisters, and the message bus internal configuration registers. Sincethe local address does not need all 16 bits of a word, and the readwrite indication requires only one bit, the bit 15 location is utilizedas a control bit. This is also convenient since the address is repeatedfor each burst to be written or read, and allowing the burst by burstselection of read and write provides a flexible and efficient means toapply control to the access.

For the IO bus interface nodes, the bus operates with a 32-bit address.Based on the message format, only 15 bits transfer for each burst,resulting in 17 bits unaccounted for by the message. For these remainingbits, a page register is used, with an implied upper bit of 0, resultingin a potential 31 bits of address available, more than enough for the IOBus to place all necessary memory and peripheral spaces. As a part ofmessages that access the IO Bus, the message should start with a writeto the page register, as the page will hold the last value written,leading to potentially unintended access locations if another master hasset the page register to a different value than the current master wasexpecting.

To further illustrate the operation of a message bus node, a flowdiagram depicting an embodiment of a method for operating a message busnode is illustrated in FIG. 22 . The method, which may be applied tomessage bus node 1800 or any other suitable message bus node, begins inblock 2201.

The method includes receiving, by a particular message node of aplurality of message nodes included in a multi-processor array, a firstmessage that includes a payload and routing information (block 2202). Asdescribed above, the first message may be received via one of multiplemessage busses coupled to the particular message node.

The method also includes selecting, by the particular message node, adifferent message node of the plurality of message nodes based on therouting information and operational information of the multi-processorarray (block 2203). As noted above, the different message node may bebased on a relative offset included in the routing information andcongestion or other heuristics included in the operational information.

Additionally, the method includes generating, by the particular messagenode, a second message based the different message node (block 2204). Invarious embodiments, a network processor (e.g., network processor 1803)may generate a second message based on which message node was selected.In some cases, the second message may include modified routinginformation that can be used by the different message node to forwardthe message onto a subsequent message node.

The method further includes forwarding, by the particular message node,the second message to the different message node (block 2205). In someembodiments, a router (e.g., router 1801) may forward the second messagebased on a relative offset included in the routing information of thefirst message. Such a relative offset can be used by the router todetermine in which direction the message should be sent. The methodconcludes in block 2206.

HyperOp Datapaths

Turning to FIG. 20 , an embodiment of a HyperOp datapath. Asillustrated, the HyperOp datapath includes two datapaths identified asDP0 and DP1. Each of DP0 and DP1 may be identical and include multipliercircuits, adder circuits, shifter circuits, as well as additionalcircuits for moving operands through the datapath. It is noted that agiven PE in a multi-processor array may include the HyperOp datapathdepicted in FIG. 20 .

Different programming models may be employed with the multi-processorarchitecture described above. Examples of such programming models aredepicted in FIG. 21 . As illustrated, FIG. 21 includes an ASM and aHyperOp programming model. Additional details and coding examples forthe different programming models are described below. Each exampleincludes:

-   -   C—reference code describing the functional operations/algorithm.    -   ASM—one or more examples of how to implement the        operations/algorithm using 64b instructions. It also includes        examples of using vector intrinsics (pseudo ASM instructions) to        access dual-DP. The vector intrinsics are ASM-like instructions        that are mapped to HyperOps instructions    -   HyperOps—one or more examples of how to implement the        operations/algorithm using 128b instructions.

Memory Operands

ASM Code

add16s M1.H, M2.H, M3.H add16s M1.L, M2.L, M3.L

HyperOps Code

|A| ld32 M1, %A; // load SIMD data from 32b M1 |B| ld32 M2, %B; // loadSIMD data 32b M2 |DP1| add16s %AH, %BH, %ACC2; // ACC2 = M1[0] + M2[0]|DP0| add16s %AL, %BL, %ACC0; // ACC0 = M1[1] + M2[1] |D| dst16%ACC2_ACC0, M3; // store SIMD result to 32b M3

Immediate Operands

ASM Code

sub16 s % r2, $10, % r8

HyperOps Code

{ |A| ld16 %r2, %AL; // load 16b R2 |C| ld16 $10, %CLH; // load 16bimmed value 10 |DP1| sub16s %AL, %CLH, %D1; // D1 = R2 − 10 |D| st16%D1, %r8; // store result to 16b R8 }Note the load immed uses slotC to load a 16b segment of the % Cregister, but it could use slotB to load a 16b segment of the % Bregister.

Conditional Execution on Scalars

C Code

  int16 a, b, c, d, e; if (a > b) e = c + d;

ASM Code

  // Assume: // a in %R2 // b in %R3 // c in %R4 // // d in %R5 // e in%R6 // %R7 used as temp tcmp16s GT %R2, %R3, %P0 add16s %R4, %R5, %R7cmov16 (%P0) %R7, %R6

HyperOps Code (Conditional Store Slot)—Version 1

{ |A| ld16s %R2, %AL; // load 16b R2 |B| ld16s %R3, %BL; // load 16b R3|DP0| tcmp16s GT %AL, %BL, %P0; // test (R2 > R3) and set pred P0 } {|A| ld16s %R4, %AH; // load 16b R4 |B| ld16s %R5, %BH; // load 16b R5|DP0| add16s %AH, %BH, %D0; // D0 = R4 + R5 |D| st16 (%P0) %D0, %R6; //if(P0) store result to 16b R6 }

HyperOps Code (Conditional Store Slot)—Version 2

{ |A| ld32 %R2.d, %A; // load 32b R2:R3 |B| ld32 %R4.d, %B; // load 32bR4:R5 |DP1| tcmp16s GT %AH, %AL, %P0; // test R2>R3 and set pred P0|DP0| add16s GT %BH, %BL, %D0; // D0 = R4 + R5 } { |D| st16 (%P0) D0,%R6; // if(P0) store result to 16b R6 }

Notes:

-   -   conditional execution in ASM model only available with CMOV        -   requires computing result to temp register, then            conditionally moving to destination    -   conditional execution in HyperOps model allows condition to be        applied independently to slots    -   predicated execution uses predicate flags Pn set in earlier        instructions, not the same instruction        -   conditional store is in slotD of separate instruction        -   it may be possible to hide it in a subsequent HyperOp

Conditional Execution on Vectors

C Code

  int16 a[2], b[2], c[2], d[2], e[2]; if (a[0] > b[0])  e[0] = c[0] +d[0]; if (a[1] > b[1]) e[1] = c[1] + d[1];

ASM Code

  // Assume: // a[0],a[1] in %R2,%R3 // b[0],b[1] in %R4,%R5 //c[0],c[1] in %R6,%R7 // d[0],d[1] in %R8,%R9 // e[0],e[1] in %R10,%R11// %R12,%R13 used as temps tcmp16s GT %R2, %R4, %P1 tcmp16s GT %R3, %R5,%P0 add16s %R6, %R8, %R12 add16s %R7, %R9, %R13 cmov16 (%P1) %R12, %R10cmov16 (%P0) %R13, %R11

HyperOp Code (Double Conditional Store)

{ |A| 1d32 %R2.D, %A;// load 32b R2:R3 |B| 1d32 %R4.D, %B; // load 32bR4:R5 |DP1| tcmp16s GT %AH, %BH, %P1;// test (R2 > R4) and set pred P1|DP0| tcmp16s GT %AL, %BL, %P0; // test (R3 > R5) and set pred P0 } {|A| 1d32 %R6.D, %A;// load 32b R6:R7 |B| 1d32 %R8.D, %B; // load 32bR8:R9 |DP1| add16s %AH, %BH, %D1;// D1 = R6 + R8 |DP0| add16s %AL, %BL,%D0;// D0 = R7 + R9 |D| dst16 (%P1 %P0) %D1_D0, %R10.D; // if(P1) storeD1 to 16b R10, if(P0)                  // store D0 to 16b R11 }

Notes:

-   -   conditional execution applied to slotD instruction    -   uses SIMD predicated execution mode        -   if (% P1% P0) { . . . }        -   % P1 controls high word        -   % P0 controls low word

Detect Non-Zero Elements of an Array, Save Values

C Code

  int16 a[N], b[N]; int16 i, j; j = 0; for(i = 0; i < N; i++) {  if (a[i] <> 0 )   b[j++] = a[i]; }

ASM Code Using GPn

// Assume: // %I1 used for i // %I2 used for j // %B1 points to a[ ] //%B2 points to b[ ] // %I0 used as a temp GR gmovi $0, %I2 // I2 = 0repeat $0, $N−1, $1, %I1, L_loop_start, L_loop_end L_loop_start:  mov160[%B1+%I1], %I0// I0 = a[i]  // +4 cycles stall on loading %I0 in EX andusing in FD  gtcmps NE %I0, $0, %GP0 // test (a[i] <> 0) and set predGP0  cmov16 (%GP0) 0[%B1+%I1], 0[%B2+%I2] // if(GP0) move a[i]   to 16bb[j]  gadd (%GP0) %I2, $1, %I2 // if(GP0) j++ L_loop_end: Cycles:2+N(1+4+3) = 2+8N

ASM Code Using Pn

gmovi $0, %I2      // I2 = 0  repeat $0, $N−1, $1, %I1, L_loop_start,L_loop_end  L_loop_start:   tcmp16s NE 0[%B1+%I1], $0, %P0    // test(a[i] <> 0)    and set pred P0   cmov16 (%P0) 0[%B1+%I1], 0[%B2+%I2] //if(P0) move a[i]    to 16b b[j]   // +3 cycles stall on setting %P0 inEX and using in FD   gadd (%P0) %I2, $1, %I2  // if(P0) j++ L_loop_end:Cycles: 2+N(2+3+1) = 2+6N

HyperOps Code Simple Using Pn (Conditional G Slot Execution)

// Assume: // %B1 points to a[ ], i is in %I1 // %B2 points to b[ ], jis in %I2 gmovi $0, %I2 // I2 = 0 repeat $0, $N−1, $1, %I1,L_loop_start, L_loop_end L_loop_start:  {   |A| ld16 0[%B1+%I1], %AL; //load 16b a[i]   |DP0| mov16s %AL, %D0;   |DP1| tcmp16 NE %AL, $0, %P0;// test (a[i] <> 0) and set    pred P0  }  {   |D| st16 (%P0) %D0,0[%B2+%I2]; // if(P0) move a[i]    to 16b b[j]  }  // +3 cycles stall onsetting %P0 in EX and using in FD  {   |G| gadd (%P0) %I2, $1, %I2; //if(P0) j++  } L_loop_end: Cycles: 2+N(1+1+3+1) = 2+6N

HyperOps Code Pipelined, Using Pn (Conditional Store)

// Assume: // %B1 points to a[ ], i is in %I1 // %B2 points to b[ ], jis in %I2 gdmovi $0, $1, %I2, %S2     // I2 = 0, S2 = 1 repeat $0, $N−1,$4 %I1, L_loop_start, L_loop_end L_loop_start:  { |A| ld16 0[%B1+%I1],%AL; |DP1| mov16 %AL, %ACC0; |DP0|   tcmp16 NE %AL, $0, %P0; }  { |A|ld16 1[%B1+%I1], %AL; |DP1| mov16 %AL, %ACC1; |DP0|   tcmp16 NE %AL, $0,%P1; }  { |A| ld16 2[%B1+%I1], %AL; |DP1| mov16 %AL, %ACC2; |DP0|  tcmp16 NE %AL, $0, %P2; }  { |A| ld16 3[%B1+%I1], %AL; |DP1| mov16%AL, %ACC3; |DP0|   tcmp16 NE %AL, $0, %P3; }  // +1 cycles stall onsetting %P0 in EX and using in FD   { |A| incr (%P0) $(_i2Mask); |D|st16 (%P0) %ACC0,  0[%B2+%I2]; }   { |A| incr (%P1) $(_i2Mask); |D| st16(%P1) %ACC1,  0[%B2+%I2]; }   { |A| incr (%P2) $(_i2Mask); |D| st16(%P2) %ACC2,  0[%B2+%I2]; }   { |A| incr (%P3) $(_i2Mask); |D| st16(%P3) %ACC3,  0[%B2+%I2]; } L_loop_end: Cycles: 1+N/4(4+1+4) = 1+2.25N

HyperOps Code Using 2 PEs

  // Use PE0 to perform the test on the input array a[ ]: for(i=0; i<N;i++) {  if ( a[i] <> 0 )   sendToPE1 ( a[i] ); } // Use PE1 to performsave the sparse output array b[ ]: idx = 0; while(1) {  tmp =recvFromPE0( );  b[idx++] = tmp; }

PE0

  // Assume: // %B1 points to a[ ], i is in %I1 repeat $0, $N−1, $1 %I1,L_loop_start, L_loop_end L_loop_start:  tcmp16 NE 0[%B1+%I1], $0, %P0; cmov16 (%P0) 0[%B1+%I1], PE0_PE1_QPORT; L_loop_end: PE0 Cycles: 1+2N

PE1

// Assume: // %B2 points to b[ ], j is in %I2 gdmovi $0, $1, %I2, %S2   // I2 = 0, S2 = 1 L_loop: jmp L_loop;      // loop forever on QPort { |A| incr $(_i2Mask);     // I2+=S2; update avail for   next instruction |B| ld16 PE0_PE1_QPORT, %BL;  |DP0| mov16 %BL, %D0;  |D| st16 %D0,0[%B2+%I2]; // store uses current value   of I2 (not                //updated) }

Notes:

-   -   using 2 PEs avoids stall on setting % GP0 in EX and using in FD

Detect Non-Zero Elements of an Array, Save Indices

C Code

  int16 a[N], b[N]; int16 i, j; j = 0; for(i=0; i<N; i++) {  if ( a[i]<> 0 ) { b[j++] = i; } }

ASM Code Using GPn

// Assume: // %B1 points to a[ ], i is in %I1 // %B2 points to b[ ], jis in %I2 gmov $0, %I2 repeat $0, $N−1, $1 %I1, L_loop_start, L_loop_endL_loop_start:  mov16 0[%B1+%I1], %I0 // load a[i] into temp I0  // +4cycles stall on loading %I0 in EX and using in FD  gtemps NE %I0, $0,%GP0 // test (a[i] <> 0) and set pred GP0  cmov16 (%GP0) %I1, 0[%B2+%I2]// if(GP0) move i to 16b b[j]  gadd (%GP0) %I2, $1, %I2 // if (GP0) incrj++ L_loop_end: Cycles: 2+N(1+4+3) = 2+8N

ASM Code Using Pn

// Assume: // %B1 points to a[ ], i is in %I1 // %B2 points to b[ ], jis in %I2 gmov16 $0, %I2 repeat $0, $N−1, $1 %I1, L_loop_start,L_loop_end L_loop_start:  tcmp16s NE 0[%B1+%I1], $0 , %P0   // test(a[i] < > 0) and set  pred P0  cmov16 (%P0) %I1, 0[%B2 + %I2]   //if(P0) move i to 16b   b[j]  // +3 cycles stall on setting %P0 in EX andusing in FD  gadd (%P0) %I2, $1, %I2   // if(P0) incr j++ L_loop_end:Cycles: 2+N(2+3+1) = 2+6N

ASM Code Using Pipelined Pn

// Assume: // %B1 points to a[ ], i is in %I1 // %B2 points to b[ ], jis in %I2 gmov16 $0, %I2 repeat $0, $N−1, $4 % I1, L_loop_start,L_loop_end L_loop_start: tcmp16s NE 0[%B1+%I1], $0, %P0 // test (a[i+0]<> 0) and set  pred P0 tcmp16s NE 1[%B1+%I1], $0, %P1 // test (a[i+1] <>0) and set  pred P1 tcmp16s NE 2[%B1+%I1], $0, %P2 // test (a[i+2] <> 0)and set  pred P2 tcmp16s NE 3[%B1+%I1], $0, %P3 // test (a[i+3] <> 0)and set  pred P3 add16s (%P0) %I1, $0, 0 [%B2+%I2] // if(P0) move i+0to16b  b[j] gadd (%P0) %I2, $1, % I2 // if(P0) incr j++ add16s (%P1)%I1, $1, 0[%B2+%I2] // if(P1) move i+1 to 16b  b[j] gadd (%P1) %I2, $1,% I2// if(P1) incr j++ add16s (%P2) %I1, $2, 0 [%B2 + %I2] // if(P2)move i+2 to 16b b[j] gadd (%P2) %I2, $1, %I2 // if(P2) incr j++ add16s(%P3) %I1, $3, 0[%B2 + %I2] // if(P3) move i+3 to 16b  b[j] gadd (%P3)%I2, $1, % I2 // if(P3) incr j++ L_loop_end: Cycles: 2+N/4(4+8) = 2+3N

HyperOps Code Simple, Using GPn (Conditional G Slot and Store)

// Assume: // %B1 points to a[ ], i is in %I1 // %B2 points to b[ ], jis in %I2 gdmov $0, $1, %I2, %S2 repeat $0, $N−1, $1 %I1, L_loop_start,L_loop_end L_loop_start:  {   |A| ld16 0[%B1+%I1], %AL; // load a[i]into AL   |DP0| mov16 %AL, %D0; // move a[i] to D0   |D| st16 %D0, %I0;// store D0=a[i] into temp I0  }  // +4 cycles stall on writing %I0 inEX and using in FD  {   |B| ld16 %I1, %BH; // load i into BH   |DP0|mov16s %BH, %D0; // move i to D0   |G| gtcmps NE %I0, $0, %GP0; // test(a[i] <> 0) and set    pred GP0  }  {   |A| incr (%GP0) $(_i2Mask); //if (GP0) incr j++   |D| st16 (%GP0) %D0, 0[%B2+%I2];// if(GP0) move i to   16b b[j]  } L_loop_end: Cycles: 2+N(1+4+2) = 2+7N

HyperOps Code Simple Using Pn

// Assume: // %B1 points to a [ ], i is in %I1 // %B2 points to b [ ], jis in %I2 gdmovi $0, $1, %I2, %S2 repeat $0, $N-1, $1 % I1,L_loop_start, L_loop_end L_loop_start: { |A| ld16 0[%B1+%I1], %AL; //load api[ into AL |B| ld16 %I1, %BL; // load i into BL |DP1| tcmp16s NE%AL, $0, %P0; // test (a [i] < > 0) and set  pred P0 |DP0| mov %BL, %D0;// move i to D0, ready for store } // +4 cycles stall on writing %P0 inEX and using in FD { |A| incr (%P0) $ (_i2Mask); // if(P0) incr j++ |D|st16 (%P0) %D0, 0[%B2+%I2]:// if(P0) move to i to 16b b[j] } L_loop_end:Cycles: 2+N(l+4+l) = 2+6N

HyperOps Code Pipelines Using GPn

// Assume: // %B1 points to a [ ], i is in %I1 // %B2 points to b [ ], jis in %I2 gdmovi $0, $1, %I2, %S2 repeat $0, $N-1, $5 %I1, L_loop_start,L_loop_end L loop start:  // load next 5 values from a[ ] into temp GRs { |A| ld16 0[%B1+%I1], %AL; |DP0| mov16s %AL, %D0; |D| st16   %D0, %T4;}  { |A| ld16 1[%B1+%I1], %AL; |DP0| mov16 %AL, %D0; |D| st16   %D0,%T5; }  { |A| ld16 2 [%B1+%I1], %AL; |DP0| mov16 %AL, %D0; |D| st16  %D0, %T6; }  { |A| ld16 3 [%B1+%I1], %AL; |DP0| mov16 %AL, %D0; |D|st16   %D0, %T7; }  { |A| ld16 4 [%B1+%I1], %AL; |DP0| mov16 %AL, %D0;|D| st16   %D0, %I0; }  // if ( a[i] < > 0 ) { b[j++] = i; }// testa[i+0]  { |A| ld16 %I1, %AH; |G| gtcmpi16 NE %T4, $0, %GP0; |DP0|  add16s %AH, $0, %D0; }  { |A| incr (%GP0) $(_i2Mask); |D| st16 (%GP0)%D0,   0[%B2+%I2]; }  // if ( a[i+1] < > 0 ) { b [ j++] = i+1; }// testa[i+1]  { |G| gtcmpi16 NE %T5, $0, %GP0; |DP0| add16s %AH, $1, %D0;   } { |A| incr (%GP0) $(_i2Mask); |D| st16 (%GP0) %D0,   0[%B2+%I2]; }  //if ( a[i+2] < > 0 ) { b[j++] = i+2; } // test a[i+2]  { |G| gtcmpi16 NE%T6, $0, %GPO; |DP0| add16s %AH, $2, %D0;   }  { |A| incr (%GP0)$(_i2Mask); |D| st16 (%GP0) %D0,   0[%B2+%I2]; }  // if ( a[i+3] < > 0 ){ b[j++] = i+3; } // test a[i+3]  { |G| gtcmpi16 NE %T7, $0, %GPO; |DP0|add16s %AH, $3, %D0;   }  { |A| incr (%GP0) $(_i2Mask); |D| st16 (%GP0)%D0,   0[%B2+%I2]; }  // if ( a[i+4] < > 0 ) { b[j++] = i+4; } // testa[i+4]  { |G| gtcmpi16 NE %I0, $0, %GPO; |DP0| add16s %AH, $4, %D0;   } { |A| incr (%GP0) $(_i2Mask); |D| st16 (%GP0) %D0,   0[%B2+%I2]; }L_loop_end: Cycles: 2+N/5(5+5(2)) = 2+3N

Notes

-   -   Can hide all stalls by loading into 5 GRs

HyperOps Code Pipelined Using Pn

// Assume: // %B1 points to a[ ], i is in %I1 // %B2 points to b[ ], jis in %I2 gdmovi $0, $1, %I2, %S2 repeat $0, $N-1, $4 %I1, L_loop start,L_loop_end L_loop start:  // test next 5 values of a[ ] into P0-3  { |A|ld32 0[%B1+%I1], %A;   |C| ld16 %I1, %CLL; // CLL = I1   |DP1| tcmp16sNE %AH, $0, %P0;   |DP0| tcmp16s NE %AL, $0, %P1;  }  { |B| ld322[%B1+%I1], %B;   |DP1| tcmp16s NE %BH, $0, %P2;   |DP0| tcmp16s NE %BL,$0, %P3;  }  // +3 cycles stall on setting %P0 in EX and using in FD  //if ( a[i] < > 0 ) {b[j++] = i;} // using P0  { |A| incr (%P0) $(_i2Mask);   |DP0| add16s %CLL, $0, %D0;   |D| st16 (%P0) %D0,0[%B2+%I2];  }  // if ( a[i+1] < > 0 ) { b[j++] = i+l; } // using P1  {|A| incr (%P1) $(_i2Mask);   |DP0| add16s %CLL, $1, %D0;   |D| st16(%P1) %D0, 0[%B2+%I2];  }  // if ( a[i+2] < > 0 ) { b[j++] = i+2; } //using P2  { |A| incr (%P2) $(_i2Mask);   |DP0| add16s %CLL, $2, %D0;  |D| st16 (%P2) %D0, 0[%B2+%I2];  // if ( a[i+3] <> 0 ) { b[j++] = i+3;} // using P3  { |A| incr (%P3) $(_i2Mask) ;   |DP0| add16s %CLL, $3,%D0;   |D| st16 (%P3) %D0, 0[%B2+%12];  }  L_loop_end: Cycles:2+N/4(2+3+4) = 2+2.25N

Notes

-   -   Cannot hide all stalls with 4 Pn

HyperOps Code Using Tagged Data

// Assume: // %B1 points to a [ ] , i is in %I1 // %B2 points to b [ ] ,j is in %I2 gdmovi $0, $1, %I2, %S2 repeat $0, $N-1, $4 %I1,L_loop_start, L_loop_end L_loop_start:  // test next 4 values of a[ ]into P0-3  {   |A| ld32 0[%B1+%11], %A; // load AH = a[i+0], AL =   a[i+1]   |C| ld16 $a, %CLL; // CLL = &a[0]   |DP1| tcmp16 NE %AH, $0,%P0; // test (a[i+0] < > 0) and    set pred P0   |DP0| tcmp16 NE %AL,$0, %P1; // test (a[i+1] < > 0) and    set pred P1  }  {   |B| ld322[%B1+%I1], %B; // load BH = a[i+2], BL = a[i+3]   |DP1| tcmp16 NE %BH,$0, %P2; // test (a[i+2] < > 0) and    set pred P2   |DP0| tcmp16 NE%BL, $0, %P3; // test (a[i+3] < > 0) and    set pred P3  }   // +3cycles stall on setting %P0 in EX and using in FD    (INCR inst)   // if( a[i] < > 0 ) { b[j++] = i; }  {   |A| incr (%P0) $(_i2Mask) ; //if(P0) incr j++   |B| ld16t 0[%B1+%I1], %B; // load tagged data B =    {&a[i] :a[i] }   |DP0| sub16s %BH, %CLL, %D0; // D0 = &a[i]-&a[0] = i  |D| st16 (%P0) %D0, 0[%B2 + %I2];// if(PO) store i to 16b    b [ j ]  }  // if ( a[i+1] < > 0 ) { b[j++] = i+1; }  }  |A| incr (%P1)$(_i2Mask) ; // if (P1) incr j++  |B| ld16t 1[%B1+%I1], %B; // loadtagged data B =  {&a[i+1]:a[i+1]}  |DP0| sub16s %BH, %CLL, %D0; // D0 =&a[i+1]-&a[0] = i+1  |D| st16 (%P1) %D0, 0[%B2+%I2]; // if(P1) store i+1to  16b b [ j]  }  // if ( a[i+2] < > 0 ) { b[j++] = i+2; }  {   |A|incr (%P2) $(_i2Mask); // if(P2) incr j++   |B| ld16t 2 [%B1+%I1] , %B;// load tagged data B =    {&a [ i+2] :a[i+2] }   |DP0| sub16s %BH,%CLL, %D0; // D0 = &a[i+2]-&a [ 0] = i+2   |D| st16 (%P2) %D0, 0 [%B2 +%I2];// if(P2) store i+2 to    16b b [ j]  }  // if ( a[i+3] <> 0 ) {b[j++] = i+3; }  {   |A| incr (%P3) $(_i2Mask); // if(P3) incr j++   |B|ld16t 3[%B1+%I1], %B; // load tagged data B =    {&a [i+3]:a[i+3] }  |DP0| sub16s %BH, %CLL, %D0; // D0 = &a[i+3]-&a [ 0] = i+3   |D| st16(%P3) %D0, 0[%B2+%I2];// if(P3) store i+3 to    16b b[j]  }  L_loop_end:Cycles: 2+N/4(2+3+4) = 2+2.25N

Notes:

-   -   tagged load LD16T loads 16b data (to lower 16b) and its address        (to upper 16b) as packed data    -   data index is data address (or tag)—array start

Access an Array Using Indirection

C Code

  int16 a[N], b[N], c[N]; int16 i, j; for (i=0; i<N; i++) {  j = b[i] ; a[i] = c[j]; }

ASM Code

  // Assume %B1 points to a [ ], i is in %I1 // Assume %B2 points to b [], i is in %I1 // Assume %B4 points to c [ ], j is in %I2 repeat $0,$N-1, $1 %I1, L_loop_ start, L_loop_end L_loop_start:  mov16 0[%B2+%I1],%I2  // + 4 cycles stall on setting %I2 in EX and using in FD  mov160[%B4+%I2], 0[%B1+%I1] L_loop_end: Cycles: l+N(l+4+l) = 1+6N

HyperOps Code Simple

// Assume %B1 points to a [ ], i is in %I1 // Assume %B2 points to b [], i is in %I1 // Assume %B4 points to c [ ], j is in %I2 repeat $0,$N-1, $1 %I1, L_loop_start, L_loop_end L_loop_start:  { |A| ld160[%B2+%I1], %AL; |DP0| mov %AL, %D0; |D| st16   %D0, %12 }  // +4 cyclesstall on setting %I2 in EX and using in FD  { |B| ld16 0[%B4+%I2], %BL;|DP0| mov %BL, %D0; |D| st16   %D0, 0[%Bl+%I1] }; L_loop_end:  Cycles:l+N(1+4+1) = 1+6N

HyperOps Code Pipelined

// Assume %B1 points to a [ ], i is in %I1 // Assume %B2 points to b [], i is in %I1 // Assume %B4 points to c [ ], j is in %I2-%I7 // j0 = b[0 ] ; j1 = b [1] ; {|A| ld32 0[%B2], %A; |DP0| mov32 %A, %D0; |D| st32%D0, %1213; } // j2 = b[2] ; j3 = b[3]; {|A| ld32 2[%B2], %A; |DP0|mov32 %A, %D0; |D| st32 %D0, %1415; } // j4 = b [4]; j5 = b[5]; {|A|ld32 4[%B2], %A; |DP0| mov32 %A, %D0; |D| st32 %D0, %1617; } // +1cycles stall on setting %12,%13 in EX and using in FD repeat $0, $N-1,$6 %I1, loop_start, L_loop_end L_loop_start: // a[i+0] = c[j0]; a[i+1] =c[j1]; j0 = b[i+6]; j1 = b[i+7] { |A| ld16 0[%B4+%I2], %AL; |B| ld160[%B4+%I3], %BL |DP1| mov16 %AL, %D1; |DP0| mov16 %BL, %D0; |D| dst16%D1 D0, 0 [%B1+%I1]; } { |A| ld32 6[%B2+%I1], %A; |DP0| mov32 %A, %D0;|D| st32 %D0, %I2I3; } // a[i+2] = c[j2]; a[i+3] = c[j3]; j2 = b[i+8];j3 = b [i+9]; { |A| ld16 0[%B4+%I4], %AL; |B| ld16 0[%B4+%I5], %BL;|DP1| mov16 %AL, %D1; |DP0| mov16 %BL, %D0; |D| dst16 %D1_D0;2[%B1+%I1]; } { |A| ld32 8[%B2+%I1], %A; |DP0| mov32 %A, %D0; |D| st32%D0, %I4I5; } // a[i + 4] = c[j4]; a[i+5] = c[j5]; j4 = b[i+10]; j5 =b[i+11]; { |A| ld16 0[%B4+%I6], %AL; |B| ld16 0[%B4+%I7], %BL; |DPI|mov16 %AL, %D1; |DP0| mov16 %BL, %D0; |D| dst16 %D1_D0, 4[%B1+%I1]; } {|A| ld32 10[%B2+%I1], %A; |DP0| mov32 %A, %D0; st32 %ACC0 %I6I7; } //ignore the final values loaded into I2-I7 L_loop_end: Cycles:3+1+1+N/6(6) = 5+N

Notes:

-   -   indexes j loaded from b[i] in pairs in 1 cycle    -   two c[j] loaded and stored to a[i] as a pair in 1 cycle    -   using 6 index registers avoids pipeline bubble of setting index        in EX and using it in FD

Conditional Accumulation Using Dual-DP

The following is an example of where we can use conditional HyperOpswith 2 predicates.

C Code

  int16 a[N], b[N], c[N] ; int16 i; int32 sum = 0; for (int i = 0; i <N; i++) {  if (a[i] > b[i] )   sum += a[i] * c[i]; }

ASM Code

This example uses vector intrinsics (pseudo ASM instructions) to accessdual-DP.

repeat $0, $N-1, $2, IDX_i, L_loop_start, L_loop_end movx16s $0, %ACC2movx16s $0, %ACC0 L_loop_start:  vtcmp16s GT 0[BP_a+IDX_i] ,0[BP_b+IDX_i] , %P1P0;  cmov16 (%P1) 0[BP_a+IDX_i], $0, %R0  cmov16(%P0) 1[BP_a+IDX_i], $0, %R1  vmulaa16s %R0.D, 0[BP_c+IDX_i], %ACC2_ACC0L_loop_end: accadd %ACCO, $0, %ACC2 Cycles: 3+N/2(4)+l = 4+2N

HyperOps Code (Conditional DP Slot Execution—Both Slots)

#define BP_a %B1 #define BP_b %B2 #define BP_c %B3 #define IDX_i %I1repeat $0, $N-1, $2, IDX i, L_loop_start, L_loop_end { |DPI| movx16s $0,%ACC2; |DP0| movx16s $0, %ACCO; } L_loop_start:  { |A| ld320[BP_a+IDX_i], %A; |B| ld32 0[BP_b+IDX_i], %B;   |DP1| tcmp16s GT %AH,%BH, %P1; |DP0| tcmp16s GT %AL, %BL,    %P0; }  { |C| ld320[BP_c+IDX_i], %B;   |DPI| mulaa16s (%P1) %AH, %BH, %ACC2; |DP0|mulaa16s (%P0)    %AL, %BL, %ACCO; } L_loop_end: accadd %ACC0, $0, %ACC2Cycles: 1+N/2(2)+1 = 2+N

Notes:

-   -   process iterations i and i+1 in parallel using DP1 and DP0    -   split sum into % ACC0 and % ACC2, then combine at the end    -   use predicate flags % P1 and % P0 to control the accumulations        into % ACC2 and % ACC0 independently

Conditional Accumulation Using Dual-DP, Each Using Dual-MUL

The following is an example of where we can use conditional HyperOpswith 4 predicates.

C Code int16 a[N], b[N], c[N]; int16 i; int32 sum = 0; for (int i = 0; i< N; i++) {  if (a[i] > b[i] )   sum += a[i] * c[i]; }

HyperOps Code (Quad Conditional Using Both DPs)

#define BP_a %B1 #define BP_b %B2 #define BP_c %B3 repeat $0, $N-1, $4,IDX i, L loop start, L loop end { |DP1| movx16s $0, %ACC2; |DP0| movx16s$0, %ACCO; } L_loop_start:  { |A| ld64 0[BP_a+IDX_i], %AB; |C| ld640[BP_b+IDX_i], %C;   |DP1| dtcmp16s GT %A, ICH, %P3P2;   |DP0| dtcmp16sGT %B, %CL, %P1P0; }  { |C| ld64 0[BP_c+IDX_i], %C;   |DP1| dmulaa16s(%P3P2) %A, %CH, %ACC2;   |DP0| dmulaa16s (%P1PO) %B, %CL, %ACC0; } L_loop_end:  accadd %ACC0, $0, %ACC2 Cycles: 2+N/4(2)+l = 3+0.5N

Notes:

-   -   process iterations i . . . i+3 in parallel:        -   i and i+1 in DP1        -   i+2 and i+3 in DP0    -   DP0 performs double operations, DP1 performs double operations    -   split sum into % ACC0 and % ACC2, then combine at the end    -   use predicate flags P0-P3 to control the accumulations of        products into % ACC0 and % ACC2 independently    -   b[ ] and c[ ] must be different DMRs to a[ ] for the 64b        accesses to work

Conditional Store Using Dual-DP

The following C code is an example of where we can use conditionalHyperOps to perform conditional store.

C Code

int16 a[N], b[N], c[N], d[N]; int16 i; for (int i = 0; i < N; i++) {  if(a[i] > b[i])   d[i] = a[i] * c[i]; }

ASM Code

This example uses vector intrinsics (pseudo ASM instructions) to accessdual-DP.

#define BP_a %B1 #define BP_b %B2 #define BP_c %B3 #define BP_d %B4#define IDX_i %I1 repeat $0, $N-1, $2, IDX_i, L_loop_start, L_loop_endL_loop_start:  vtcmp16s GT [BP_a+IDX_i], [BP_b+IDX_i], %P1P0  vmul16s(%P1P0) [BP_a+IDX_i], [BP_c+IDX_i], [BP_d+IDX_i] L_loop_end:

HyperOps Code (Dual Conditional Store)

define BP_a %B1 #define BP_b %B2 #define BP_c %B3 #define BP_d %B4#define IDX_i %I1 repeat $0, $N-1, $2, IDX_i, L_loop_start, L_loop_endL_loop_start:  { |A| ld32 0 [BP_a+IDX_i], %A; |B| ld32 0 [BP_b+IDX_i],%B;   |DP1| tcmp16s GT %AH, %BH, %P1; |DP0| tcmp16s GT %AL, %BL,    %P0;}  { |C| ld32 0 [BP_c+IDX_i], %CL;   |DP1| mul16s %AH, %CLH, %D1; |DP0|mul16s %AL, %CLL, %D0;    |D| dst16 (%P1P0) %D1_D0, 0 [BP_d+IDX_i]; }L_loop_end:

Notes:

-   -   process iterations i and i+1 in parallel using DP1 and DP0    -   use predicate flags P1 and P0 to control the 16b:16b stores        independently (SIMD mode)

Conditional if-Else-if Example Using Conditional Jump

C Code

  absq = abs (q); if (absq < qmin) {  qmin2 = qmin;  qmin = absq;  imin= i; } else if (absq < qmin2) {  qmin2 = absq; }

ASM Code

// assume imin and qmin stored as packed data imin_qmin (even  address)abs16s q, absq   // absq = abs(q) tcmp16 LT absq, qmin, %P1   // P1 =(absq < qmin) jmp (!%P1) L_else PNT   // if(!P1) skip qmin update tcmp16LT absq, qmin2, %P0   // P0 = (absq < qmin2) --  delay slot L_if: //update qmin and qmin2: mov16 qmin, qmin2  // qmin2 = qmin jmp L_enddmov16 i, absq, imin_qmin   // qmin = absq, imin = i -  - delay slotL_else: jmp (!%P0) L_end PNT DLY nop // delay slot mov16 absq, qmin2  //update only qmin2 L_end:

ASM Code with DLY-Optimization

abs16s q, absq tcmp16 LT absq, qmin, %P1 jmp (!%P1) L_else PNT tcmp16 LTabsq, qmin2, %P0  // executed in delay slot L_if: mov16 qmin, qmin2 jmpL_end dmov16 i, absq, imin_qmin  // executed in delay slot L_else: jmp(!%P0) L_end PNT DLY mov16 absq, qmin2 // executed after JMP, not in delay slot L_end:

Conditional if-Else-if Example Using Conditional Move

C Code

  absq = abs (q); if (absq < qmin) {  qmin2 = qmin;  qmin = absq;  imin= i; } else if (absq < qmin2) {  qmin2 = absq; }

ASM Code

// assume imin and qmin stored as packed data imin_qmin (even  address)abs16s q, absq // absq = abs(q) tcmp16s LT absq, qmin, %P1 // P1 = (absq< qmin) tcmp16s LT absq, qmin2, %P0 // P0 = (absq < qmin2) cmov16 (%P1)qmin, qmin2 // if (P1) qmin2 = qmin cmov16 (%P1) absq, qmin // if (P1)qmin = absq cmov16 (%P1) i, imin // if (P1) imin = i cmov16 (!%P1 & %P0)absq, qmin2  // else if (P0) qmin2  = absq Cycles: 7

HyperOps Code

{ |A| ld16 q, AL;  |B| ld16 i, %BL;  |DP1| mov16 %BL, %ACC3; // ACC3 = i |DP0| abs16s %AL, %ACC1; // ACC1L = absq  |D| dst16 %ACC3_ACC1, %ACC3;} // ACC3H = i, ACC3L = absq { |A| ld32 imin_qmin, %A;// AH = imin, AL =qmin  |B| ld16 qmin2, %BL; // BL = qmin2  |DP1| tcmp16 LT %ACC3L, %AL,%P1; // P1 = (absq < qmin)  |DP0| tcmp16 LT %ACC1L, %BL, %P0; } // P0 =(absq < qmin2) { |DP1| if(%P1) cmov32 %ACC3, %A, %ACC2 ; // if (P1){ACC2H =   i, ACC2L = absq}    // else {ACC2H = imin, ACC2L = qmin} |DP0| if(%P1) cmov16 %AL, %BL, %ACC0; // ACC0 = (P1) ?   qmin2 : qmin|D| st32 %ACC2, imin_qmin; } // update imin:qmin =   ACC2H:ACC2L { |DP0|if(!%P1 & %P0) cmov16 %ACC3L, %ACC0L, %ACC0; // else   ACC0L = (P0) ?absq : qmin  |D| st16 %ACC0, qmin2; } // update qmin2 = ACC0L Cycles: 4

Notes:

-   -   use % P1 and % P0 to hold boolean results of IF and ELSE IF        tests    -   assume imin and qmin stored as packed 16:16 in memory    -   use % P1 and % P0 with CSEL to conditionally update state        variables, in pairs where possible

Combining Tests Using Predicate Flags

C Code

  int16 a, b, c, d, e; void test ( ) {  a = (b < c) && (d < e); }

ASM Code

tcmp16s LT b, c %P0 // P0 = (b < c) tcmp16s LT d, e, %P1 // P1 = (d < e)cmov16 (%P0 & %P1) $1, $0, a // a = (P0 & P1) 1 : 0

Notes:

-   -   The compiler will replace && with & operator:

a=(b<c)&(d<e)

Combining Tests Using Register File

C Code

  int16 a, b, c, d, e; void test( ) {  a = (b < c) && (d < e); }

ASM Code

tcmp16s LT b, c, %R0  // R0 = (b < c) tcmp16s LT d, e, %R1  // R1 = (d <e) and16 %R0, %R1, a // a = R0 & R1

Notes:

-   -   The compiler will replace && with & operator:

a=(b<c)&(d<e)

Conditional Jump to Subroutine

C Code

  int a, b, c, d, e, f; if ( (a < b) & (c < e) | (d > f) )  foo( );

ASM Code

tcmp16s LT a, b, %R1 // R1 = (a < b) tcmp16s LT c, e, %R2 // R2 = (c <e) tand16 NZ %R1, %R2, %P0 // P0 = (a < b) & (c < e) tcmp16s GT d, f,%P1 // P1 = (d > f) jsr (% (%P0 | %P1) foo // if (P0 | P1) foo ( )

Notes:

-   -   Use TAND16 rather than AND16        -   Note Pn can't be the dstD for an ALU operation, other than            TEST

Assignment of Logical/Test Operation Results

C Code

  int16 a, b, c, d, e, f, result; result = ( (a < b) & (c < e) | (d > f));

ASM Code

tcmp16s LT a, b, %R1 // R1 = (a < b) tcmp16s LT c, e, %R2 // R2 = (c <e) and16 %R1, %R2, %R3 // P3 = (a < b) & (c < e) tcmp16s GT d, f, %R4 //R4 = (d > f) or16 %R3, %R4, result // result = (R3 | R4)

Any of the various embodiments described herein may be realized in anyof various forms, e.g., as a computer-implemented method, as acomputer-readable memory medium, as a computer system, etc. A system maybe realized by one or more custom-designed hardware devices such asApplication Specific Integrated Circuits (ASICs), by one or moreprogrammable hardware elements such as Field Programmable Gate Arrays(FPGAs), by one or more processors executing stored programinstructions, or by any combination of the foregoing.

In some embodiments, a non-transitory computer-readable memory mediummay be configured so that it stores program instructions and/or data,where the program instructions, if executed by a computer system, causethe computer system to perform a method, e.g., any of the methodembodiments described herein, or, any combination of the methodembodiments described herein, or, any subset of any of the methodembodiments described herein, or, any combination of such subsets.

In some embodiments, a computer system may be configured to include aprocessor (or a set of processors) and a memory medium, where the memorymedium stores program instructions, where the processor is configured toread and execute the program instructions from the memory medium, wherethe program instructions are executable to implement any of the variousmethod embodiments described herein (or, any combination of the methodembodiments described herein, or, any subset of any of the methodembodiments described herein, or, any combination of such subsets). Thecomputer system may be realized in any of various forms. For example,the computer system may be a personal computer (in any of its variousrealizations), a workstation, a computer on a card, anapplication-specific computer in a box, a server computer, a clientcomputer, a hand-held device, a mobile device, a wearable computer, asensing device, a television, a video acquisition device, a computerembedded in a living organism, etc. The computer system may include oneor more display devices. Any of the various computational resultsdisclosed herein may be displayed via a display device or otherwisepresented as output via a user interface device.

An apparatus, comprising: a plurality of processors; and a plurality ofdata memory routers coupled to the plurality of processors in aninterspersed arrangement, wherein a particular data memory router isconfigured to relay received messages to at least one other data memoryrouter of the plurality of data memory routers; wherein a particularprocessor of the plurality of processors is configured to set at leastpredicate flag of a plurality of predicate flags; and conditionallyexecute an instruction using the plurality of predicate flags.

The aforementioned apparatus, wherein the plurality of predicate flagsincludes at least a first set of predicate flags associated with adatapath included in the particular processor, and a second set ofpredicate flags associated with an address generator unit included inthe particular processor.

The aforementioned apparatus, wherein to set the at least one predicateflag of the plurality of predicate flags, the particular processor isfurther configured to, in response to execution of a test instruction,compare a first value and a second value to generate a result, and setthe at least one predicate flag based on the result.

The aforementioned apparatus, wherein to compare the first value and thesecond value, the particular processor is further configured to performa logical operation using the first value and the second value togenerate the result.

The aforementioned apparatus, wherein to set the at least one predicateflag of the plurality of predicate flags, the particular processor isfurther configured to set the at least one predicate flag based on, atleast in part, information indicative of timing operation of a datapathincluded in the particular processor.

The aforementioned apparatus, wherein to set the at least one predicateflag of the plurality of predicate flags, the particular processor isfurther configured to set the at least one predicate flag based on, atleast in part, information indicative of timing operation of an addressgenerator unit included in the particular processor.

The aforementioned apparatus, wherein to conditionally execute theinstruction, the particular processor is further configured toconditionally execute one or datapath slots included in a datapathincluded in the particular processor using the plurality of predicateflags.

A method, comprising: setting, by a particular processor of a pluralityof processors, at least one predicate flag of a plurality of predicateflags; wherein the plurality of processors is coupled to a plurality ofdata memory routers in an interspersed arrangement; conditionallyexecuting, by the particular processor of the plurality of processors,an instruction using the plurality of predicate flags.

The aforementioned method, wherein the plurality of predicate flagsinclude at least a first set of predicate flags associated with adatapath included in the particular processor, and a second set ofpredicate flags associated with an address generator unit included inthe particular processor.

The aforementioned method, wherein setting the at least one predicateflag of the plurality of predicate flags includes comparing, in responseto executing a test instruction by the particular processor, a firstvalue and a second value to generate a result, and setting the at leastone predicate flag based on the result.

The aforementioned method, wherein comparing the first value and thesecond value includes performing a logical operation using the firstvalue and the second value to generate the result.

The aforementioned method, wherein setting the at least one predicateflag of the plurality of predicate flags includes setting, by theparticular processor, the at least one predicate flag based on, at leastin part, information indicative of timing operation of a datapathincluded in the particular processor.

The aforementioned method, wherein setting the at least one predicateflag of the plurality of predicate flags includes setting, by theparticular processor, the at least one predicate flag based on, at leastin part, information indicative of timing operation of an addressgenerator unit included in the particular processor.

The aforementioned method of claim 22, wherein conditionally executing,by the particular processor, the instruction includes conditionallyexecuting one or datapath slots included in a datapath included in theparticular processor using the plurality of predicate flags.

An apparatus, comprising: a plurality of processors; and a plurality ofdata memory routers coupled to the plurality of processors in aninterspersed arrangement, wherein a particular data memory router isconfigured to relay received messages to at least one other data memoryrouter of the plurality of data memory routers; wherein a particularprocessor of the plurality of processors is configured to: selectivelyactivate a subset of a plurality of arithmetic logic circuits includedin a particular data path of a plurality of data paths included in theparticular processor based on a received instruction; and execute thereceived instruction using the subset of the plurality of arithmeticlogic circuits.

The aforementioned apparatus, wherein to selectively activate the subsetof the plurality of arithmetic logic circuits, the particular processoris further configured to decode the instruction to generate a decodedinstruction, and to selectively activate the subset of the plurality ofarithmetic logic circuits using the decoded instruction.

The aforementioned apparatus, wherein the particular processor of theplurality of processors is further configured to route data betweenindividual arithmetic logic circuits included in the subset of theplurality of arithmetic logic circuits based on the instruction.

The aforementioned apparatus, wherein to route the data between theindividual arithmetic logic circuit included in the subset of theplurality of arithmetic logic circuit the particular processor isfurther configured to selectively change a state of at least onemultiplex circuit of a plurality of multiplex circuits included in theparticular data path.

The aforementioned apparatus, wherein a particular arithmetic logiccircuit of the plurality of logic circuits includes at least an addercircuit.

The aforementioned apparatus, wherein the particular arithmetic logiccircuit of the plurality of logic circuits includes a lookup tableconfigured to store an offset used in executing the instruction.

The aforementioned apparatus, wherein the instruction specifies a logprobability operation.

A method, comprising: selectively activating a subset of a plurality ofarithmetic logic circuits included in a particular data path of aplurality of data paths included in a particular processor of aplurality of processors; wherein the plurality of processors are coupledto a plurality of data memory routers in an interspersed arrangement;and executing, by the particular processor of the plurality ofprocessor, the instruction using the subset of the plurality ofarithmetic logic circuit.

The aforementioned method, wherein a selectively activating the subsetof the plurality of arithmetic logic circuits includes decoding theinstruction to generate a decoded instruction, and selectivelyactivating the subset of the plurality of arithmetic logic circuitsusing the decoded instruction.

The aforementioned method, further comprising routing data betweenindividual arithmetic logic circuits included in the subset of theplurality of arithmetic logic circuits based on the instruction.

The aforementioned method, wherein routing the data between theindividual arithmetic logic circuit included in the subset of theplurality of arithmetic logic circuit the particular processor includesto selectively changing a state of at least one multiplex circuit of aplurality of multiplex circuits included in the particular data path.

The aforementioned method, wherein a particular arithmetic logic circuitof the plurality of logic circuits includes at least an adder circuit.

The aforementioned method, wherein the particular arithmetic logiccircuit of the plurality of logic circuits includes a lookup table, andfurther comprising storing an offset used in executing the instructionin the lookup table.

The aforementioned method, wherein the instruction specifies a logprobability operation.

Although the above embodiments have been described in connection withthe preferred embodiment, it is not intended to be limited to thespecific form set forth herein, but on the contrary, it is intended tocover such alternatives, modifications, and equivalents, as can bereasonably included within the spirit and scope of the embodiments ofthe invention as defined by the appended claims.

What is claimed is:
 1. An apparatus, comprising: a plurality ofprocessors; a plurality of data memory routers coupled to the pluralityof processors in an interspersed arrangement, wherein a particular datamemory router is configured to relay received messages to at least oneother data memory router of the plurality of data memory routers; andwherein a particular processor of the plurality of processors isconfigured to: set a particular predicate flag of a plurality ofpredicate flags that includes a first set predicate flags associatedwith a datapath included in the particular processor; and conditionallyexecute an instruction using the plurality of predicate flags.
 2. Theapparatus of claim 1, wherein the particular processor includes anaddress generator unit, and wherein the plurality of predicate flagsincludes a second set of predicate flags associated with the addressgenerator unit.
 3. The apparatus of claim 2, wherein the particularprocessor is further configured to set, based on timing informationassociated with the address generator unit, a different predicate flagincluded in the second set of predicate flags.
 4. The apparatus of claim1, wherein the particular processor is further configured to: inresponse to an execution of a test instruction, compare a first valueand a second value to generate a result; and set, based on the result,the particular predicate flag.
 5. The apparatus of claim 4, wherein tocompare the first value and the second value, the particular processoris further configured to perform a logical operation using the firstvalue and the second value to generate the result.
 6. The apparatus ofclaim 1, wherein the particular processor is further configured to set,based on timing information associated with the datapath, the particularpredicate flag.
 7. A method, comprising: setting, by a particularprocessor of a plurality of processors, a particular predicate flag of aplurality of predicate flags that includes a first set of predicateflags associated with a datapath included in the particular processor,wherein the plurality of processors is coupled to a plurality of datamemory routers in an interspersed arrangement; and conditionallyexecuting, by the particular processor, an instruction using theplurality of predicate flags.
 8. The method of claim 7, wherein theparticular processor includes an address generator unit, and wherein theplurality of predicate flags includes a second set of predicate flagsassociated with the address generator unit.
 9. The method of claim 8,further comprising, setting, by the particular processor and based ontiming information associated with the address generator unit, adifferent predicate flag included in the second set of predicate flags.10. The method of claim 7, further comprising: in response to executinga test instruction, comparing, by the particular processor, a firstvalue and a second value to generate a result; and setting, by theparticular processor and based on the result, the particular predicateflag.
 11. The method of claim 10, wherein comparing the first value andthe second value includes performing a logical operation using the firstvalue and the second value to generate the result.
 12. The method ofclaim 7, further comprising setting, by the particular processor andbased on timing information associated with the datapath, the particularpredicate flag.
 13. The method of claim 7, wherein the datapath includesa plurality of slots, wherein the instruction is included in aparticular slot of the plurality of slots, and wherein conditionallyexecuting the instruction includes selecting, based on the particularpredicate flag, the particular slot.
 14. An apparatus, comprising: aplurality of processors including a particular processor that includes aplurality of datapaths including a particular datapath that includes aplurality of arithmetic logic circuits; and a plurality of data memoryrouters coupled to the plurality of processors in an interspersedarrangement, wherein a particular data memory router is configured torelay received messages to at least one other data memory router of theplurality of data memory routers; and wherein the particular processorof the plurality of processors is configured to: selectively activate,based on a received instruction, a subset of the plurality of arithmeticlogic circuits; and execute the received instruction using the subset ofthe plurality of arithmetic logic circuits.
 15. The apparatus of claim14, wherein to selectively activate the subset of the plurality ofarithmetic logic circuits, the particular processor is furtherconfigured to: decode the received instruction to generate a decodedinstruction; and selectively activate the subset of the plurality ofarithmetic logic circuits using the decoded instruction.
 16. Theapparatus of claim 14, wherein the particular processor is furtherconfigured to route, based on the received instruction, data betweengiven arithmetic logic circuits of the subset of the plurality ofarithmetic logic circuits.
 17. The apparatus of claim 16, wherein theparticular datapath includes a plurality of multiplex circuits includinga particular multiplex circuit coupled between a first arithmetic logiccircuit of the plurality of arithmetic logic circuits and a secondarithmetic logic circuit of the plurality of arithmetic logic circuits,and wherein to route the data, the particular processor is furtherconfigured to selectively change a state of the particular multiplexcircuit.
 18. The apparatus of claim 14, wherein a particular logiccircuit of the plurality of arithmetic logic circuits includes at leastan adder circuit.
 19. The apparatus of claim 14, wherein a particularlogic circuit of the plurality of arithmetic logic circuits includes alookup table configured to store an offset, and wherein the particularprocessor is further configured to execute the received instructionusing the offset.
 20. The apparatus of claim 14, wherein the receivedinstruction specifies a log probability operation.