modular wcet analysis of arm processors
play

Modular WCET Analysis of ARM Processors Andreas Engelbredt Dalsgaard - PowerPoint PPT Presentation

Modular WCET Analysis of ARM Processors Andreas Engelbredt Dalsgaard Mads Christian Olesen Martin Toft Ren e Rydhof Hansen Kim Guldstrand Larsen Introduction Challenges Tool-Chain Value Analysis Demo Conclusion The Problem Problem


  1. Modular WCET Analysis of ARM Processors Andreas Engelbredt Dalsgaard Mads Christian Olesen Martin Toft Ren´ e Rydhof Hansen Kim Guldstrand Larsen

  2. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion The Problem Problem Given a program in executable form, for an ARM9 processor, determine a safe and tight worst-case execution time (WCET) Goals: Model the pipeline and cache(s) of the ARM9 in a precise manner Make the model modular, such that other ARM9 processors can easily be modelled 1/20

  3. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Real-Time Systems Real-time systems (RTS) are systems that need to respond to real-life events in a timely manner A number of processes with associated WCETs and deadlines Tasks are periodic or sporadic 2/20

  4. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion WCET Distribution Estimates should be on the safe side! However, too much on the safe side ⇒ inefficient system 3/20

  5. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Challenge I: Modern Processors Modern processors optimise for the average case , using: Caching: allowing quick access to recently used memory items Pipelining: executing instructions in parallel Execute Fetch Shifter ALU Fetch instruction from instruction cache or main memory Memory Decode Memory data access ARM decode Reg. address Register decode read Thumb decode Writeback Reg. address Register decode read ALU result and/or load data writeback 4/20

  6. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Can we be ignorant? No! Some processors have “timing anomalies”, i.e. local worst-case �⇒ global worst-case Even without “timing anomalies” assuming the local worst-case can give an over-approximation by a factor 30 The ARM9 processor does not exhibit “timing anomalies” Quicker analysis, less overapproximation Processors without “timing anomalies” are sufficient for most real-time systems 5/20

  7. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Challenge II: Making the Analysis Modular A modular analysis allows more flexibility , e.g. how would this program perform: . . . if the cache was larger? . . . with an extra processor core? . . . on an entirely different processor? And different accuracy/performance tradeoffs : Abstract interpretation for (abstract) cache analysis Model checking for (concrete) cache analysis Use simple always-miss cache, if no need to do more precise analysis 6/20

  8. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Tool-Chain Overview 7/20

  9. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Tool-Chain Overview 7/20

  10. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Tool-Chain Overview 7/20

  11. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Tool-Chain Overview 7/20

  12. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Tool-Chain Overview 7/20

  13. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Tool-Chain Overview 7/20

  14. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Tool-Chain Overview 7/20

  15. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Overview of Our Model 8/20

  16. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Path Analysis Timed automaton for every function Transitions emulate instruction execution fib_branch! fib_branch? loop_counter_1 = 0 0x00 cmp r0, 1 i0x0_cmp_r0_1 0x04 push lr fetch! fetch! ... instradr[PFS] = 0, ... ... instrtype[PFS] = INSTR_OTHER, dataadr[PFS] = INVALID_ADDRESS, 0x50 bx lr ... i0x4_push_lr_ i0x50_bx_lr MORE FUNCTION BODY Functions handled flow-sensitively 9/20

  17. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Cache Analysis ARM9: Separate data and instruction caches 16 kB in size, 64-way associative, 8 words (32 byte) per line Write-through and write-back policies Pseudo-random and round-robin replacement policies Modelled concretely as timed automata in UPPAAL Main Cache Memory Memory } l 1 , way 1 m 1 Cache set 1 m 2 l 2 , way 2 } m 3 l 3 , way 1 Cache set 2 m 4 l 4 , way 2 } m 5 l 5 , way 1 Cache set 3 m 6 l 6 , way 2 } l 7 , way 1 Cache set 4 l 8 , way 2 10/20

  18. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Value Analysis The cache analysis needs concrete memory addresses Registers are used as base and offset in all memory accesses Value analysis: Find an over-approximation of possible register values at all execution points of a process Weighted push-down systems (WPDSs) used for inter-procedural, control-flow sensitive value analysis Presented by Reps et al. in Program Analysis using Weighted Push-Down Systems 11/20

  19. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Weighted Push-Down Systems Use the PDS-stack as call-stack: Sequential: � p , n main � ֒ → � p , n 2 � Function call: � p , n 4 � ֒ → � p , n 8 n 5 � Function return: � p , n 12 � ֒ → � p , ǫ � Each rule has an associated weight, describing the effect of the transition. Weights can be: Combined (“join”): w 1 ⊕ w 2 = w 3 Extended (sequential progression): w 1 ⊗ w 2 = w 3 The effect of executing a program to a set of configurations ( T ) (“Meet over all paths”): � { w 1 ⊗ . . . ⊗ w n | w 1 , . . . , w n is the weights associated with a path of rules leading to a configuration in T } 12/20

  20. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Our Value Analysis Implemented simple value analysis, using: Loop unrolling Simple (syntactical) register-value tracking No tracking of values in memory Finds good amount of values for some programs, but could be much better 13/20

  21. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Our Value Analysis Weights = functions representing the effect of an instruction or a sequence of instructions, e.g.: � r 0 � � “ r 1 + 2” � � r 0 � � � id w 1 = w 2 = , r 1 id r 1 “ r 0 ∗ 2 + r 1 << 3” Special values: id , ⊥ and ⊤ Combine and extend handled syntactically (string equality, and string replacement) 14/20

  22. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Implementation = WALi + Python The open source Weighted Automata Library (WALi) implements a number of WPDS algorithms Easy to extend with e.g. new weight domains Our weights are, very conveniently, valid Python expressions Process automata are annotated with the results i0x8330_push_lr_ fetch! ... dataadr[PFS] = (loop_counter_33652 == 0) ? 127992 : INVALID_ADDRESS, ... 15/20

  23. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Disassembler — Dissy 16/20

  24. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion WCET Guarantee in Three Easy Steps Demo 17/20

  25. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Experiments Evaluated on the M¨ alardalen WCET benchmarks 18/20

  26. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Experiments Evaluated on the M¨ alardalen WCET benchmarks The most interesting findings: Taking the instruction cache into account yields WCETs that are up to 97% sharper (78% on average at -O2 ) Taking the data cache into account yields WCETs that are up to 68% sharper (31% on average at -O2 ) Almost all results are obtained within five minutes 18/20

  27. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Experiments Evaluated on the M¨ alardalen WCET benchmarks The most interesting findings: Taking the instruction cache into account yields WCETs that are up to 97% sharper (78% on average at -O2 ) Taking the data cache into account yields WCETs that are up to 68% sharper (31% on average at -O2 ) Almost all results are obtained within five minutes Some programs fail due to State space explosion (6) Write to program counter (2) Floating point operations 1 Value analysis problems 1 need to manually find good loop-bounds for very optimised assembler 18/20

  28. Introduction Challenges Tool-Chain Value Analysis Demo Conclusion Experiments Evaluated on the M¨ alardalen WCET benchmarks The most interesting findings: Taking the instruction cache into account yields WCETs that are up to 97% sharper (78% on average at -O2 ) Taking the data cache into account yields WCETs that are up to 68% sharper (31% on average at -O2 ) Almost all results are obtained within five minutes Some programs fail due to State space explosion (6) Write to program counter (2) Floating point operations 1 Value analysis problems We are able to analyse 17 out of the 25 non-floating point benchmarks! 1 need to manually find good loop-bounds for very optimised assembler 18/20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend