uniprocessor scheduling of mixed criticality implicit
play

Uniprocessor scheduling of mixed-criticality implicit-deadline - PowerPoint PPT Presentation

Uniprocessor scheduling of mixed-criticality implicit-deadline sporadic task systems with K levels Sanjoy Baruah 1 Vincenzo Bonifaci 2 Gianlorenzo DAngelo 3 Haohan Li 6 Alberto Marchetti-Spaccamela 4 Suzanne Van Der Ster 5 Leen Stougie 5 1 The


  1. Uniprocessor scheduling of mixed-criticality implicit-deadline sporadic task systems with K levels Sanjoy Baruah 1 Vincenzo Bonifaci 2 Gianlorenzo D’Angelo 3 Haohan Li 6 Alberto Marchetti-Spaccamela 4 Suzanne Van Der Ster 5 Leen Stougie 5 1 The University of North Carolina, Chapel Hill, USA. 2 IASI — CNR, Italy. 3 GSSI, L’Aquila, Italy. 4 Sapienza University of Rome, Italy. 5 Vrije Universiteit, The Netherlands. 6 Google Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 1 / 28

  2. This Talk We consider the EDF-VD (Earliest Deadline First with Virtual Deadlines) for scheduling mixed-criticality task systems EDF-VD one processor, implicit deadline 2 and 3 criticality levels: experimental analysis and analysis using speed-up bounds [Baruah et al, ESA 2011, Baruah et al, ECRTS 2012]. we show how to extend EDF-VD to any number of criticality levels we derive speed up bounds up to K = 13 criticality levels Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 2 / 28

  3. Outline 1 Model 2 Algorithm EDF-VD, 2 levels 3 Algorithm EDF-VD, K levels Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 3 / 28

  4. Sporadic Task Systems A Sporadic Task System consists of a set of tasks τ 1 , τ 2 , . . . , τ n A task τ i = ( c i , d i , p i ) generates a potentially infinite sequence of jobs, where: c i is the execution requirement d i is the relative deadline: time between a job’s arrival and its deadline p i is the period: minimum time between two successive arrivals of jobs from this task We consider implicit-deadline tasks system (i.e. d i = p i for all tasks) to be executed on a single processor Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 4 / 28

  5. Mixed-Criticality Sporadic Task Systems A Mixed-Criticality Sporadic Task System with K levels consists of a set of tasks τ 1 , τ 2 , . . . , τ n Each task τ i = ( χ i , < c i (1) , c i (2) , . . . c i ( χ i ) >, T i ) generates a potentially infinite sequence of jobs, where: χ i ∈ { 1 , K } is the criticality level c i ( h ) is the execution requirement at level h , h = 1 , 2 , . . . , χ i T i is the relative deadline and period We assume c i ( h ) ≤ c i ( h + 1) Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 5 / 28

  6. Mixed-Criticality Sporadic Task Systems The amount of execution time a that job of task τ i needs is not known, but discovered by executing the job until it signals completion. A collection of realized values for the execution time is called a behavior By executing the tasks, we learn in which level the system is. This may change over time When the system is in level χ i we need to process only the tasks that are of criticality level ≥ χ i . the tasks of criticality level < χ i are not considered Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 6 / 28

  7. Utilization For x , y ∈ { 1 , K } , c i ( y ) U y � x = T i χ i ≥ x For example, U 1 2 is the utilization of criticality 2 tasks, assuming a level-1 behavior Similarly U 4 4 is the utilization of criticality 4 tasks, assuming a level-4 behavior Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 7 / 28

  8. Example, 2 levels U LO U HI τ i c i ( LO ) c i ( HI ) T i χ i τ 1 2 2 4 1 1/2 τ 2 1 5 6 2 1/6 5/6 Total 2/3 5/6 τ 1 τ 2 0 2 4 6 8 10 12 14 16 18 20 Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 8 / 28

  9. Example, 2 levels U LO U HI τ i c i ( LO ) c i ( HI ) χ i T i τ 1 2 2 4 1 1/2 τ 2 1 5 6 2 1/6 5/6 Total 2/3 5/6 τ 1 τ 2 0 2 4 6 8 10 12 14 16 18 20 LO -criticality behavior Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 9 / 28

  10. Example, 2 levels Usual we denote level 1 with LO and level 2 as HI U LO U HI τ i c i ( LO ) c i ( HI ) χ i T i τ 1 2 2 4 1 1/2 τ 2 1 5 6 2 1/6 5/6 Total 2/3 5/6 τ 1 τ 2 0 2 4 6 8 10 12 14 16 18 20 HI -criticality behavior Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 10 / 28

  11. Example U LO U HI τ i c i ( LO ) c i ( HI ) χ i T i τ 1 2 2 4 1 1/2 τ 2 1 5 6 2 1/6 5/6 Total 2/3 5/6 τ 1 τ 2 0 2 4 6 8 10 12 14 16 18 20 HI -criticality behavior Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 11 / 28

  12. Example U LO U HI τ i c i ( LO ) c i ( HI ) χ i T i τ 1 2 2 4 1 1/2 τ 2 1 5 6 2 1/6 5/6 Total 2/3 5/6 τ 1 τ 2 0 2 4 6 8 10 12 14 16 18 20 HI -criticality behavior Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 12 / 28

  13. Outline 1 Model 2 Algorithm EDF-VD, 2 levels 3 Algorithm EDF-VD, K levels Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 13 / 28

  14. Overview of the Algorithm EDF-VD - 2 criticality levels 1. Preprocessing (off line) U LO 1 Compute x as (note that x < 1): x ← HI 1 − U LO LO 2 If xU LO LO + U HI � � HI ≤ 1 then declare success and compute modified period ˆ T i ˆ T i ← xT i for each τ i s.t. χ i = HI ˆ T i ← T i for each τ i s.t. χ i = LO 3 else declare failure and exit 2. Run-time 1 If the system is at level LO schedule according to EDF where HI criticality tasks τ i have period ˆ T i 2 If some job executes beyond its LO -criticality WCET: ◮ discard all LO -criticality jobs ◮ schedule HI -criticality tasks according to EDF with actual periods Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 14 / 28

  15. Example U LO U HI τ i c i ( LO ) c i ( HI ) χ i T i τ 1 2 2 4 1 1/2 τ 2 1 5 6 2 1/6 5/6 Total 2/3 5/6 U LO 1 − 1 / 2 = 1 1 / 6 HI x = = 1 − U LO 3 LO HI = 1 3 · 1 2 + 5 xU LO LO + U HI 6 = 1 τ 1 τ 2 0 2 4 6 8 10 12 14 16 18 20 Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 15 / 28

  16. Example τ 1 τ 2 0 2 4 6 8 10 12 14 16 18 20 τ 1 τ 2 0 2 4 6 8 10 12 14 16 18 20 Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 16 / 28

  17. Example τ 1 τ 2 0 2 4 6 8 10 12 14 16 18 20 τ 1 τ 2 0 2 4 6 8 10 12 14 16 18 20 Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 17 / 28

  18. Example τ 1 τ 2 0 2 4 6 8 10 12 14 16 18 20 τ 1 τ 2 0 2 4 6 8 10 12 14 16 18 20 Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 18 / 28

  19. Correctness EDF-VD, 2 levels Theorem The following conditions are sufficient for ensuring that EDF-VD successfully schedules all criticality behaviors: U LO HI xU LO LO + U HI either x ≥ or HI ≤ 1 1 − U LO LO Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 19 / 28

  20. Speed-up bounds, 2 levels The Speed-up factor of an algorithm A is the smallest real number f such that any task system that is clairvoyantly schedulable on a unit speed processor is schedulable by A on a f -speed processor Theorem The speed-up factor of EDF-VD is 4 3 Theorem No non-clairvoyant algorithm for scheduling dual-criticality systems can have a speed-up factor smaller than 4 3 Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 20 / 28

  21. Outline 1 Model 2 Algorithm EDF-VD, 2 levels 3 Algorithm EDF-VD, K levels Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 21 / 28

  22. Overview of the Algorithm EDF-VD - K levels 1. Preprocessing 1 Compute x and k that verifiy a suitable inequality (next slide) 2 If such x and k exist then declare success and compute modified period and compute modified period ˆ T i ˆ T i ← xT i for each τ i s.t. χ i > k ˆ T i ← T i for each τ i s.t. χ i ≤ k 3 else declare failure and exit 2. Run-time 1 If the system is at level h , h ≤ k , schedule according to EDF tasks τ i , s.t. χ i ≥ h , assuming modified period ˆ T i 2 If the system is at level h , h > k schedule according to EDF tasks τ i , s.t. χ i ≥ h , assuming original period T i Alberto Marchetti-Spaccamela (The University of North Carolina, Chapel Hill, USA., IASI — CNR, Italy Dagsuthl 22 / 28

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend