Bounding worst-case data cache behavior by analytically deriving cache reference patterns

H. Ramaprasad, F. Mueller
{"title":"Bounding worst-case data cache behavior by analytically deriving cache reference patterns","authors":"H. Ramaprasad, F. Mueller","doi":"10.1109/RTAS.2005.12","DOIUrl":null,"url":null,"abstract":"While caches have become invaluable for higher-end architectures due to their ability to hide, in part, the gap between processor speed and memory access times, caches (and particularly data caches) limit the timing predictability for data accesses that may reside in memory or in cache. This is a significant problem for real-time systems. The objective our work is to provide accurate predictions of data cache behavior of scalar and nonscalar references whose reference patterns are known at compile time. Such knowledge about cache behavior provides the basis for significant improvements in bounding the worst-case execution time (WCET) of real-time programs, particularly for hard-to-analyze data caches. We exploit the power of the cache miss equations (CME) framework but lift a number of limitations of traditional CME to generalize the analysis to more arbitrary programs. We further devised a transformation, coined \"forced\" loop fusion, which facilitates the analysis across sequential loops. Our contributions result in exact data cache reference patterns minus; in contrast to approximate cache miss behavior of prior work. Experimental results indicate improvements on the accuracy of worst-case data cache behavior up to two orders of magnitude over the original approach. In fact, our results closely bound and sometimes even exactly match those obtained by trace-driven simulation for worst-case inputs. The resulting WCET bounds of timing analysis confirm these findings in terms of providing tight bounds. Overall, our contributions lift analytical approaches to predict data cache behavior to a level suitable for efficient static timing analysis and, subsequently, real-time schedulability of tasks with predictable WCET.","PeriodicalId":291045,"journal":{"name":"11th IEEE Real Time and Embedded Technology and Applications Symposium","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"82","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"11th IEEE Real Time and Embedded Technology and Applications Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RTAS.2005.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 82

Abstract

While caches have become invaluable for higher-end architectures due to their ability to hide, in part, the gap between processor speed and memory access times, caches (and particularly data caches) limit the timing predictability for data accesses that may reside in memory or in cache. This is a significant problem for real-time systems. The objective our work is to provide accurate predictions of data cache behavior of scalar and nonscalar references whose reference patterns are known at compile time. Such knowledge about cache behavior provides the basis for significant improvements in bounding the worst-case execution time (WCET) of real-time programs, particularly for hard-to-analyze data caches. We exploit the power of the cache miss equations (CME) framework but lift a number of limitations of traditional CME to generalize the analysis to more arbitrary programs. We further devised a transformation, coined "forced" loop fusion, which facilitates the analysis across sequential loops. Our contributions result in exact data cache reference patterns minus; in contrast to approximate cache miss behavior of prior work. Experimental results indicate improvements on the accuracy of worst-case data cache behavior up to two orders of magnitude over the original approach. In fact, our results closely bound and sometimes even exactly match those obtained by trace-driven simulation for worst-case inputs. The resulting WCET bounds of timing analysis confirm these findings in terms of providing tight bounds. Overall, our contributions lift analytical approaches to predict data cache behavior to a level suitable for efficient static timing analysis and, subsequently, real-time schedulability of tasks with predictable WCET.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
通过解析导出缓存参考模式来限定最坏情况下的数据缓存行为
由于能够部分地隐藏处理器速度和内存访问时间之间的差距,缓存(尤其是数据缓存)对可能驻留在内存或缓存中的数据访问的时间可预测性进行了限制,因此对于高端架构来说,缓存已经变得非常宝贵。这是实时系统的一个重要问题。我们的工作目标是提供对引用模式在编译时已知的标量和非标量引用的数据缓存行为的准确预测。这种关于缓存行为的知识为限制实时程序的最坏情况执行时间(WCET)提供了重要的改进基础,特别是对于难以分析的数据缓存。我们利用缓存缺失方程(CME)框架的强大功能,但消除了传统CME的一些限制,将分析推广到更任意的程序。我们进一步设计了一个转换,创造了“强制”循环融合,它促进了跨顺序循环的分析。我们的贡献导致了精确的数据缓存引用模式的减少;与先前工作的近似缓存丢失行为相反。实验结果表明,最坏情况下数据缓存行为的准确性比原始方法提高了两个数量级。事实上,我们的结果与最坏情况下的跟踪驱动模拟结果紧密结合,有时甚至完全匹配。时序分析的WCET边界在提供紧密边界方面证实了这些发现。总的来说,我们的贡献将预测数据缓存行为的分析方法提升到了一个适合于高效静态定时分析的水平,并随后提高了具有可预测WCET的任务的实时可调度性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Practical on-line DVS scheduling for fixed-priority real-time systems VPN gateways over network processors: implementation and evaluation Hybrid supervisory utilization control of real-time systems Diff-EDF: a simple mechanism for differentiated EDF service Real-time component-based systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1