the if toolset
play

The IF toolset VERIMAG M.Bozga, S. Graf, L. Mounier, Y. Lakhnech, - PowerPoint PPT Presentation

The IF toolset VERIMAG M.Bozga, S. Graf, L. Mounier, Y. Lakhnech, Il. Ober, Iu. Ober , J. Sifakis sifakis@imag.fr bozga@imag.fr 4th International School on Formal Methods for the Design of Computer, Communication and Software Systems: Real Time


  1. Parallel composition: Interaction models - composition a 3 a 4 a 1 a 2 a 5 a 6 a 7 a 8 a 9 a 10 K 1 K 2 a 11 a 12 IM[K 1 ,K 2 ]: C[K 1 ,K 2 ] = {{a 1 , a 2 , a 3 , a 4 }, {a 11 , a 12 }} IC[K 1 ,K 2 ]+ = {a 1 |a 2 |a 3 |a 4 , a 11 , a 11 |a 12 } IM[K 2 ]: IM[K 1 ]: C[K 2 ] = {{a 3 , a 4 }, {a 7 , a 10 }, {a 8 , a 10 }} C[K 1 ] = {{a 1 , a 2 }, {a 5 , a 9 },{a 6 , a 9 }} IC[K 2 ] + = {a 10 , a 7 |a 10 , a 8 |a 10 } IC[K 1 ] + = {a 5 , a 6 , a 11 , a 5 |a 9 , a 6 |a 9 } ⎢⎢ a 3 a 4 a 10 a 1 a 2 a 9 K 2 K 1 a 7 a 8 a 12 a 5 a 6 a 11

  2. Parallel composition: Interaction models – composition (2) IM[K 1 ,K 2 ]: C[K 1 ,K 2 ] = {{a 1 , a 2 , a 3 , a 4 }, {a 11 , a 12 }} IC[K 1 ,K 2 ]+ = {a 1 |a 2 |a 3 |a 4 , a 11 , a 11 |a 12 } IM[K 2 ]: IM[K 1 ]: C[K 2 ] = {{a 3 , a 4 }, {a 7 , a 10 }, {a 8 , a 10 }} C[K 1 ] = {{a 1 , a 2 }, {a 5 , a 9 },{a 6 , a 9 }} IC[K 2 ] + = {a 10 , a 7 |a 10 , a 8 |a 10 } IC[K 1 ] + = {a 5 , a 6 , a 11 , a 5 |a 9 , a 6 |a 9 } ⎢⎢ a 3 a 4 a 10 a 1 a 2 a 9 K 2 K 1 a 7 a 8 a 12 a 5 a 6 a 11 IM[K 1 ∪ K 2 ]: C[K 1 ∪ K 2 ] = C[K 1 ] ∪ C[K 2 ] ∪ C[K 1 , K 2 ] IC[K 1 ∪ K 2 ] + = IC[K 1 ] + ∪ IC[K 2 ] + ∪ IC[K 1 , K 2 ] + a 1 a 2 a 9 a 3 a 4 a 10 K 1 ∪ K 2 a 5 a 6 a 11 a 7 a 8 a 12

  3. Parallel composition: General definition IM[K1,K2] IM[K1 ∪ K2]) IM[K1] IM[K2] ⎢⎢ = B[K1 ∪ K2] B[K1] B[K2] S[K1 ∪ K2] S[K1] S[K2] S[K1] || SK[2] = (B[K1], IM[K1]) || (B[K2], IM[K2]) = (B[K1] × B[K2], IM[K1] ∪ IM[K2] ∪ IM[K1,K2] ) = S[K1 ∪ K2] where × is an associative and commutative operation such that B[K1] × B[K2] = B[K1 ∪ K2] Composition is associative and commutative

  4. Flexible parallel composition : transition systems with priorities Behavior : transition systems Interaction model : priority relation on interactions A transition system with priorities is a pair (B, 〈 ) where, • B is a labeled transition system with labels from a set of interactions A • 〈 is a strict partial order on A that restricts B : Semantics of (B, 〈 ) : q − a1 → q’ ∈ (B, 〈 ) if q − a1 → q’ ∈ B and there is no q − a2 → q’’ ∈ B, a1 〈 a2 The sum 〈 1 ⊕ 〈 2 of two priority orders 〈 1 , 〈 2 is the least priority order (if it exists) such that 〈 1 ∪ 〈 2 ⊆ 〈 1 ⊕ 〈 2 Remark : ⊕ is a (partial) associative and commutative operation

  5. Flexible parallel composition - definition 〈 12 〈 1 ⊕ 〈 2 ⊕ 〈 12 〈 1 〈 2 IM[K2] ⎢⎢ = B[K1 ∪ K2] B[K1] B[K2] Composition of behaviors: (q1,q2) − a1 → (q1’,q2) q1 − a1 → q1’ (q1,q2) − a2 → (q1,q2’) implies q2 − a2 → q2’ (q1,q2) − a1 ⎢ a2 → (q1’,q2’) if a1 ⎢ a2 ∈ IC[K1 ∪ K2] 〈 12 is defined by the rules : • Maximal progress : a 1 〈 12 a 1 ⎢ a 2, if a1 ⎢ a2 ∈ IC[K1 ∪ K2] • Completeness : a1 〈 12 a2 , if a1 is incomplete and non maximal a2 is complete in IC[K1 ∪ K2]

  6. Flexible parallel composition : producer-consumer put get prod put get cons put |get Consumer Producer prod cons put get put 〈 put | get, get 〈 put | get put 〈 cons, get 〈 prod Producer ⎢⎢ Consumer prod cons × × put get × Producer Consumer put|get × × get put cons prod

  7. Flexible parallel composition : deadlock-freedom by construction (B 1 , 〈 1 ) ⎢⎢ (B 2 , 〈 2 ) = (B 1 × B 2 , 〈 1 ⊕ 〈 2 ⊕ 〈 12 ) is an associative total operation on components if no incomplete interaction dominates a complete interaction in the components (B, 〈 ) is deadlock-free if B is deadlock-free (B 1 , 〈 1 ) ⎢⎢ (B 2 , 〈 2 ) is deadlock-free if B 1 , B 2 are deadlock-free ! Check that after composition the resulting component can not execute incomplete interactions which are not maximal

  8. Outline Key Research issues • Modeling Real-time systems • From application SW to implementations • Component-based construction The modeling framework • Parallel composition • Adding timing constraints • Scheduler modeling • Timed systems with priorities The IF toolset • IF notation • Core components • Validation • Front ends • Case studies Discussion

  9. Adding timing constraints • there exist different timed ⎜⎜ P1 P2 extensions for ⎜⎜ T corresponding to different assumptions about idling before interaction � Constraints ⊕ Timing • compositionality: define ⎜⎜ T so as to preserve � properties such as well-timedness, deadlock-freedom, ⎜⎜ T P1 T P2 T liveness.

  10. Adding timing constraints: Timed systems t’=0 Automata: labeled transition relations on a arrive set of actions t:=0 Timers: real-valued variables that can t’=1 - be reset and tested at transitions - increase (derivative =1) or remain unchanged at states (derivative =0) Types of urgency τ associated with guards t’=1 express priority over time progress at states begin ε (eager) : if enabled then must fire asap τ λ ( lazy) : (t ≤ D) if enabled then may fire δ ( delayable) : if enabled must fire before it becomes disabled

  11. Adding timing constraints : example A periodic process of period T and execution time E sleep Actions a (t=T) ε a: arrive b: begin t:=0 e: end wait b (t ≤ T-E) δ e t’=x’=1 at all states x:=0 (x=E) ε use

  12. Adding timing constraints Three different kinds of timing constraints: • from the execution platform e.g. execution times, latency times • from the external environment about arrival times of triggering events e.g. periodic tasks • user requirements e.g. QoS, which are timing constraints relating events of the real-time system and events of its environment e.g. deadlines, jitter

  13. Adding timing constraints Each shared resource induces a partition on the control states of a process { Sleep, Wait, Use}. Sleep arrive Arrival times (t) T_min ≤ t ≤ T_max t:=0 Execution times (x) Wait begin Deadline D x:=0 end t ≤ D - E_max (E_min ≤ x ≤ E_max) Use ∧ (t ≤ D ) t ≤ D - E_max

  14. Outline Key Research issues • Modeling Real-time systems • From application SW to implementations • Component-based construction The modeling framework • Parallel composition • Adding timing constraints • Scheduler modeling • Timed systems with priorities The IF toolset • IF notation • Core components • Validation • Front ends • Case studies Discussion

  15. Scheduler modeling state Timed SW Envt Scheduler (QoS) K pol choice A scheduler is a controller which restricts access to resources so as to meet t he timing constraints (deadlock-free behavior) by applying a scheduling policy K pol : K pol = ∧ r ∈ R K r_pol K r_pol = K r_res ∧ K r_adm K r_res says how conflicts for the acquisition of resource r are resolved e.g. EDF, RMS, LLF K r_adm says which requests for r are considered by the scheduler at a state e.g. masking

  16. Scheduler modeling Example : K pol for the Priority Ceiling Protocol Admission control: “Process P is eligible for resource r if the current priority of P is higher than the ceiling priority of any resource allocated to a process other than P” Conflict resolution: “ The CPU is allocated to the process with the highest current priority” Result : Any feasible scheduling policy K pol induces a restriction that can be described by dynamic priorities

  17. Outline Key Research issues • Modeling Real-time systems • From application SW to implementations • Component-based construction The modeling framework • Parallel composition • Adding timing constraints • Scheduler modeling • Timed systems with priorities The IF toolset • IF notation • Core components • Validation • Front ends • Case studies Discussion

  18. Timed Systems with priorities (wait1, wait2) 〈 bgn1 bgn2 g1 g2 (use1, wait2) (wait1, use2) Priority rule Strengthened guard of bgn1 true → bgn1 〈 bgn2 g1’ = g1 ∧ ¬ g2 C → bgn1 〈 bgn2 g1’ = g1 ∧ ¬( C ∧ g2 )

  19. Timed Systems with priorities A priority order is a strict partial order, 〈 ⊆ A x A A set of priority rules, pr = { Ci → 〈 i } i where { Ci } i is a set of disjoint state predicates pr = { C i → 〈 i } i TS’ TS a k g’ k a k g k g’ k = g k ∧ ∧ C → 〈 ∈ pr ( C ⇒ ∧ ak 〈 ai ¬ g i )

  20. Timed Systems with priorities: FIFO policy t1 ≤ t2 → b1 〈 b2 t2 ≤ t1 → b2 〈 b1 sleep1 sleep2 a1 a2 t1=T1 t2=T2 t1:=0 t2:=0 wait2 wait1 b2 b1 t2 ≤ T2-E2 t1 ≤ T1-E1 x2:=0 x1:=0 e1 e2 # use1 use2 x1=E1 x2=E2

  21. Timed Systems with priorities : Least Laxity First policy L1 ≤ L2 → b2 〈 b1 L2 ≤ L1 → b1 〈 b2 where Li =Ti-Ei-ti is the laxity of process i sleep1 sleep2 a1 a2 t1=T1 t2=T2 t1:=0 t2:=0 wait2 wait1 b2 b1 t2 ≤ T2-E2 t1 ≤ T1-E1 x2:=0 x1:=0 e1 e2 # use1 use2 x1=E1 x2=E2

  22. Timed Systems with priorities: composition of priorities pr2 pr1 ⊕ pr2 pr1 = ( pr1 ⊕ pr2)(q) is the least priority order containing pr1(q) ∪ pr2(q) Results : � The operation ⊕ is partial, associative and commutative � Sufficient conditions for deadlock-freedom and liveness

  23. Timed Systems with priorities: mutual exclusion + FIFO t1 ≤ t2 → b1 〈 b2 t2 ≤ t1 → b2 〈 b1 true → b1 〈 e2 true → b2 〈 e1 sleep1 sleep2 a1 a2 t1=T1 t2=T2 t1:=0 t2:=0 wait2 wait1 b2 b1 t2 ≤ T2-E2 t1 ≤ T1-E1 x2:=0 x1:=0 e1 e2 use1 use2 x1=E1 x2=E2

  24. Systems with priorities : Fixed priority preemptive scheduling Scheduling policy b i 〈 b j , b i |p k 〈 b j |p k , f i |r k 〈 f j |r k for n ≥ I > j ≥ 1 Interaction model b j |p i , f j |r i ∈ IC, for n ≥ i,j ≥ 1 a i , f i , b i ∈ IC + , for n ≥ i ≥ 1 s 2 s 1 s i s n a 2 a 1 a i a n w 2 w 1 w i w n f 2 f 1 f i f n b 2 b 1 b i b n e 2 e 1 e i e n r 2 r 1 p 2 r i r i r n p 1 p i p i p n e 2 ’ e 1 ’ e i ’ e i ’ e n ’

  25. Outline Key Research issues • Modeling Real-time systems • From application SW to implementations • Component-based construction The modeling framework • Parallel composition • Adding timing constraints • Scheduler modeling • Timed systems with priorities The IF toolset • IF notation • Core components • Validation • Front ends • Case studies Discussion

  26. IF notation: System description Processes extended timed systems (non-determinism, dynamic creation) predefined data types (basic types, arrays, Interactions records) asynchronous channels abstract data types shared variables Data

  27. IF notation: System description • A process instance: – executes asynchronously with other instances – can be dynamically created – owns local data (public or private) – owns a private FIFO buffer • Inter-process interactions: – asynchronous signal exchanges (directly or via signalroutes) – shared variables

  28. IF notation: System description // constants const N1 = … ; process type t1 = … ; // types s1(t1) (N1 initial instances ) signal s2(t1, t2), // signals … P1(N1) P1(N1) // signalroutes signalroute sr1(1) … // route attributes from P1 to P3 … // processes s2 (t1, t2) P2(N2) process P1(N0) … // data + signal parameter behaviour … endprocess; … sr(1) … P3(N3) process P3(N3) signalroute local data … … endprocess;

  29. IF notation: Process description Process = hierarchical, timed systems with actions process P1(N1); parameters fpar … ; local data local data + local clocks // types, variables, constants, s0 procedures t1 state state s0 … ; s1 … // transition t1 t2 t3 endstate; s2 t5 s42 outgoing transitions state s1 #unstable …; t6 t7 t4 … // transitions t2, t3 s4 s41 endstate; s3 // states s2, s3, s4 P1(N1) … endprocess;

  30. IF notation: dynamic creation • process creation: parameters p := fork client (true) pid of the newly a new instance is created instance created process name • process destruction: the instance is destroyed, together with its buffer, kill client(2) and local data pid expression kill p the “self” instance is • process termination: destroyed, together with stop its buffer, and local data

  31. IF notation: Process description-transition transition = urgency + trigger + body state s0 urgency … urgency eager untimed guard provided x!=10; t1 timed guard when c2 >= 4; = trigger input update(m); signal consumption body …. from the process nextstate s1 ; buffer … endstate; statement list sequential. conditional, or iterative composition statement = data assignment message emission, process or signalroute creation or destruction, …

  32. IF notation: Data and types Variables: are statically typed (but explicit conversions allowed) • can be declared public (= shared) • Predefined basic types: integer, boolean, float, pid, clock ⊇ {self, nil} Predefined type constructors: (integer) interval: type fileno = range 3..9; • enumeration: type status= enum open, close endenum ; • array: type vector= array [12] of pid • structure: type file = record f fileno; s status endrecord ; • Abstract Data Type definition facilities …

  33. IF notation: interactions - signal routes signal route = connector = process to process communication channel with attributes, can be dynamically created initial instance number attributes route signal set name signalroute s1(1) #unicast #lossy #fifo from server to client with grant, fail; endpoints attributes: • queuing policy: fifo | multiset • reliability: reliable | lossy • delivery policy: peer | unicast | multicast • delay policy: urgent | delay[l,u] | rate[l,u]

  34. IF notation: interactions - delivery policies peer unicast multicast server(0) server(0) server(0) client(1) client(0) client(1) client(2) client(0) client(1) client(2) to all instances to one to a randomly specific chosen instance instance

  35. IF notation: interactions - signal exchange Signal emission (non blocking): parameters pid expression signal to a specific process: output req (3, open) to server(2); signalroute via a signalroute: output req(3, open) via s0(1); mixed: output token via link(1) to client(k+1)%N; pid expression k=integer(self) Signal consumption (blocking): formal parameters input req (f, s);

  36. IF notation: System description - example abort s0 update(file) stop client(NC) server(NS) grant, fail(reason) fail(reason) s1 s2 req(file,status) const NS= … , NC= … ; type file= … , status= … , reason= … ; signal stop(), req(file, status), fail(reason), grant(), abort(), update(data); signalroute s0(1) #multicast from server to client with abort; signalroute s1(1) #unicast #lossy from server to client with grant,fail; signalroute s2(1) #unicast from client to server with req; process server(NS) … endprocess; process client(NC) … endprocess;

  37. IF notation: timed behavior The model of time [timed systems] – global time → same clock speed in all processes – time progress in stable states only → transitions are instantaneous time = 0 time = δ 0 time = δ 0 + δ 1 q0 q1 q2 q3 q4 q5 t1 P1 system configuration P2 δ 0(q2) δ 1(q4) … t2 P3 … Pk

  38. IF notation: timed behavior • operations on clocks state send; output sdt(self,m,b) to {receiver}0; – set to value set t:= 10; – deactivate nextstate wait_ack; – read the value into a variable endstate ; state wait_ack; • timed guards input ack(sender,c); – comparison of a clock to an integer … – comparison of a difference of two when 10 <t<20 ; clocks to an integer … endstate ;

  39. IF notation: dynamic priorities • priority order between process instances p1, p2 ( free variables ranging over the active process set) priority_rule_name : p1 < p2 if condition (p1,p2) • semantics: only maximal enabled processes can execute • scheduling policies – fixed priority: p1 < p2 if p1 instanceof T and p2 instanceof R – run-to-completion: p1 < p2 if p2 = manager(0).running – EDF: p1 < p2 if Task(p2).timer < Task(p1).timer (p1)

  40. Outline Key Research issues • Modeling Real-time systems • From application SW to implementations • Component-based construction The modeling framework • Parallel composition • Adding timing constraints • Scheduler modeling • Timed systems with priorities The IF toolset • IF notation • Core components • Validation • Front ends • Case studies Discussion

  41. IF toolset: overall architecture Objecteering Rational Rose ObjectGeode RT/UML UML SDL OMEGA uml2if sdl2if aml2if TReX IF IF LASH Static Analyzer Description RMC IF Exploration Platform model model guided guided TGV mincost path Test Generation construction checking exploration simulation extraction Test Suites LTS schedules CADP SPIDER

  42. Core components C/C++ code IF description parser writer predefined modules application specific process code (time, channels, etc.) compiler IF AST asynchronous execution state space representation dynamic scheduling syntactic transformation tools: - static analyser - code generator LTS exploration tools -- debugging -- model checking -- test generation

  43. Core components: syntactic transformations IF specifications parser writer • The API provides access to the AST of an IF description represented as a collection of C++ objects IF AST syntactic transformation tools: - static analysis - code generation

  44. Core components : exploration platform Main features • process execution simulation • inter-process interaction application predefined modules • process creation / destruction specific • control of simulation time process code (time, channels, etc.) • state space representation The API provides access to the asynchronous execution labeled transition system of an IF state space description representation – state, label representation dynamic scheduling • type definition • access primitives – forward traversal primitives LTS exploration tools • initial state function ( init ) -- debugging -- model checking • successor function ( succ ) -- test generation

  45. Core c o mponents: exploration platform – execution Time process 1 process 2 process j module active I 1 :P 1 I 2 :P 1 I 1 :P 2 I 2 :P 2 I k :P j Time instances s output e t , run r e run step step run step run step s create e t asynchronous execution execution control dynamic scheduling S S u u c c c c ? ? S S u u c c c c ! !

  46. Core components: exploration platform – execution 1 st layer : emulates asynchronous parallel execution to obtain global (system) steps from local (process) steps – it asks successively, each process instance to execute its enabled transitions – during the execution of a transition by a process instance, • it ensures message delivery and shared variable update • it manages dynamic instance creation and destruction • it records generated observable events – when a local step is finished, • It takes a snapshot of the global configuration and stores it • It sends the successor to the 2 nd layer (dynamic scheduler) – It manages time progress and clocks updates

  47. Core components: exploration platform – execution 2 nd layer: dynamic scheduling (priorities) – collects all potential global successors – filters them according to dynamic priorities • evaluates each priority constraint • if applicable on current state, it removes successors produced by the low priority instance – delivers the remaining set to the user application through the exploration API

  48. Core components: exploration platform – time i) discrete time •clock valuations represented as Dedicated module varying size integer vectors • including clock variables •time progress is explicit and •handling dynamic clock allocation computed w.r.t. the next enabled (set, reset) deadline •checking timing constraints (timed guards) ii) continuous time • computing time progress conditions •clock valuations represented using w.r.t. actual deadlines and varying size difference bound • fires timed transitions, if enabled matrices (DBMs) •time progress represented symbolically •non-convex time zones may arise Two implementations for because of deadlines: they are discrete and continuous time represented implicitly as unions of DBMs (others can be easily added )

  49. Outline Key Research issues • Modeling Real-time systems • From application SW to implementations • Component-based construction The modeling framework • Parallel composition • Adding timing constraints • Scheduler modeling • Timed systems with priorities The IF toolset • IF notation • Core components • Validation • Front ends • Case studies Discussion

  50. Validation Model-Based Validation - model checking - test generation Objecteering Rational Rose ObjectGeode - optimization RT/UML UML SDL OMEGA - static analysis uml2if sdl2if aml2if TReX IF IF LASH Static Analyzer Description RMC IF Exploration Platform model model guided guided TGV mincost path Test Generation construction checking exploration simulation extraction Test Suites LTS schedules CADP SPIDER

  51. Validation: model-checking using observers • Observers are used to specify safety properties in an operational way • They are described as the processes – specific commands for monitoring events, system state, elapsed time, pruning out • 3 types of states : normal / error / success Semantics: Transitions triggered by monitored events and executed with • highest priority idle match input ACK(void) [x =< t_ack] match output SDT(void, b) [b = R(0).flag] test [b <> R(0).flag] set x := 0 error wait [x >= t_ack]

  52. Validation: model-checking - using µ -calculus • alternating-free fragment ϕ ::= T | X | <a> ϕ | ¬ϕ | ϕ∧ϕ | µ X. ϕ (X) where a denotes a regular expression on labels • macros available to describe complex formula e.g, all ϕ ≡ υ X. ϕ ∧ [*]X pot ϕ ≡ µ X. ϕ ∨ <*>X inev ϕ ≡ µ X. ϕ ∨ <*>T ∧ [*]X • On-the-fly local model-checker • diagnostics can be extracted either as sequences (if the property is “linear”) or sub-graphs (if the property is “branching”)

  53. Validation: behavioral equivalence checking • LTS comparison: – equivalence relations (“behavior equality”): System ≈ Requirements – preorder relations (“behavior inclusion”): System ≤ Requirements • LTS minimization: – quotient w.r.t an equivalence relation: (System / ≈ ) • CADP can be used to check the following relations : weak/strong bisimulation, branching, safety, trace equivalence

  54. Validation: behavioral equivalence checking reduction w.r.t. branching bisimulation

  55. Validation: min-cost execution path • User defined costs associated to transitions of IF descriptions e.g, execution times init • problem: find the min-cost execution path leading from tick(2) some initial state to some goal state tick(1) • three algorithms implemented: tick(5) – Dijkstra algorithm (best first) tick(7) – A* algorithm (best first + goal goal estimation) – branch and bound (depth-first) • applications: – job-shop scheduling (find the tick(3) makespan), – asynchronous circuit analysis (find the maximal stabilization time)

  56. Validation: static analysis • approach – source code transformations for model reduction – code optimization methods • techniques implemented so far – live variable analysis: remove dead variables and/or reset variables when useless in a control state – dead-code elimination: remove unreachable code w.r.t. assumptions about the environment – variable abstraction: extract the relevant part after removing some variables • usually, impressive state space reduction

  57. Validation: static analysis – live variables find live variables a variable is dead at a control point if its value is not used before being redefined usual backward dataflow analysis extended on any path starting at that point to IF interaction primitives asynchronous interaction via queues parameter passing at process creation Intra and inter-process propagation of live variables ?m(x, y) y := z+2 reset y reset y using dead variables Transform IF description by y not used removing completely dead variables and here signal / process parameters resetting partially dead variables y := 3*x Multiple gains: Drastic reduction of the size of the model (orders of magnitude on realistic examples) Strongly preservation of the initial behaviour

  58. Validation: static analysis – dead code elimination find dead code a piece of code is dead if it will never be entered, for any execution algorithm for static accessibility of control states and control transitions given user assumptions about the environment process P(1) process Q(0) process R(0) accessibility propagated both intra- and inter processes ?b τ ?b ?c using dead code fork Q !b fork R !a transform IF description by removing processes never created !c removing signals never sent removing unreachable control states and control transitions the gains are reduce the size of the description enable more reduction by live analysis strongly preserve the initial behavior, under the given assumptions

  59. Validation: static analysis – variable elimination finding undefined variables abstraction w.r.t. a set of variables (to eliminate) provided by the user forward dataflow analysis propagating the influence of removed variables i k, x local undefined-ness of variables i:=0 global undefined-ness of signal and process ?b(k) parameters [k odd] [k even] [i=N] [i<N] Inta and inter-process propagation x:=x+k x:=0 !b(i) i:=i+1 using undefined variables transform IF descriptions by x removing assignments to undefined variables ?b removing undefined signal and process parameters relaxing guards involving undefined variables obtain a conservative abstraction of the initial x:= ⊥ x:=0 description i.e, including all the behaviors of the !b initial one

  60. Outline Key Research issues • Modeling Real-time systems • From application SW to implementations • Component-based construction The modeling framework • Parallel composition • Adding timing constraints • Scheduler modeling • Timed systems with priorities The IF toolset • IF notation • Core components • Validation • Front ends • Case studies Discussion

  61. Front-Ends - sdl2if Objecteering Rational Rose ObjectGeode - uml2if RT/UML UML SDL OMEGA uml2if sdl2if aml2if TReX IF IF LASH Static Analyzer Description RMC IF Exploration Platform model model guided TGV mincost path Test Generation construction checking exploration extraction Test Suites LTS schedules CADP SPIDER

  62. Front ends: UML2IF – Omega UML UML for real-time and embedded systems (OMEGA IST project) • covers operational specifications – classes with operations, attributes, associations, generalization, statecharts; basic data types • defines a particular execution model – a notion of active class – instances of active classes define activity groups – run-to-completion for activity groups • interaction and behavior – primitive operations – procedural, stacked – triggered operations – embedded in state machine, queued – asynchronous signals • define an Action Language

  63. Front ends: UML2IF – translation principle • structure – class → process type – attributes & associations → variables – inheritance → replication of features – signals, basic data types → direct mapping • behavior – state machines (with restrictions) → IF hierarchical automata – action language → IF actions, automaton encoding – operations: • operation call/return → signal exchange • procedure activations → process creation • polymorphism → untyped PIDs • dynamic binding → destination object automaton determines the executed procedure

  64. Front ends: UML2IF – architecture Rhapsody UML2IF XMI 1.0/1.1 Rose (UML 1.4 + XMI reader UML 1.4 Argo stereotypes) repository Objecteering IF 2.0 UML 1.4 translator API IF 2.0 IF description TOOLBOX

  65. Front ends: UML2IF – simulation interface • user friendly simulation • system state exploration… • customizable presentation of results for UML users

  66. Outline Key Research issues • Modeling Real-time systems • From application SW to implementations • Component-based construction The modeling framework • Parallel composition • Adding timing constraints • Scheduler modeling • Timed systems with priorities The IF toolset • IF notation • Core components • Validation • Front ends • Case studies Discussion

  67. Case studies: protocols SSCOP Service Specific Connection Oriented Protocol M. Bozga et al. Verification and test generation for the SSCOP Protocol . In Journal of Science of Computer Programming - Special Issue on Formal Methods in Industry . Vol. 36, number 1, January 2000. MASCARA Mobile Access Scheme based on Contention and Reservation for ATM case study proposed in VIRES ESPRIT LTR S. Graf and G. Jia. Verification Experiments on the Mascara Protocol . In M.B. Dwyer (Ed.) Proceedings of SPIN Workshop 2001, Toronto, Canada . LNCS 2057. PGM Pragmatic General Multicast case study proposed in ADVANCE IST-1999-29082

  68. Case studies: asynchronous circuits timing analysis O. Maler et al. On timing analysis of combinational circuits . In Proceedings of the 1st workshop on formal modeling and analysis of timed systems, FORMATS’03, Marseille, France . functional validation D. Borrione et al. Validation of asynchronous circuit specifications using IF/CADP . In Proceedings of IFIP Intl. Conference on VLSI, Darmstadt, Germany

  69. Case studies: Embedded software Ariane 5 Flight Program joint work with EADS Lauchers M. Bozga, D. Lesens, L. Mounier. Model-checking Ariane 5 Flight Program . In Proceedings of FMICS 2001, Paris, France . K9 Rover Executive S.Tripakis et al. Testing conformance of real-time software by automatic generation of observers . In Proceedings of Workshop on Runtime Verification, RV’04, Barcelona, Spain . Akhavan et al. Experiment on Verification of a Planetary Rover Controller . In Proceedings of 4 th International Workshop on Planning and Scheduling for Space, IWPSS’04, Darmstadt, Germany.

  70. Ariane-5 flight program

  71. Flight program specification • built by reverse engineering by EADS-LV • two independent views 1. asynchronous – high level, non-deterministic, abstracts the whole program as communicating extended finite-state machines 2. synchronous – low level, deterministic, focus on specific components … – we focus on the asynchronous view

  72. Flight program architecture OBC (On Board Computer) OBC (Redundant) Regulation engines/boosters Control ignition/extinction Navigation Guidance Configuration Algorithms stage/payload separation ~3500 lines Ground of SDL code

  73. Regulation components • initiate sequences of “regulation” commands at right start moments in time : input start-date(T 0 ) – at T 0 + ∆ 1 execute action 1 – at T 0 + ∆ 2 execute action 2 state 1 … now = T 0 + ∆ 1 action 1 – at T 0 + ∆ n execute action n • if necessary, stopped at any state 2 moment now = T 0 + ∆ 2 action 2 state 3 • described as “sequential” now = T 0 + ∆ 3 action 3 processes, moving on specific, precise times

  74. Configuration components • initiate “configuration” changes depending on : – flight phase : ground, launch, orbit, … – control information: reception of some signal, ... – time : eventually done in [T 0 +L,T 0 +U] • described as processes combining signal and timeout-driven transitions

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend