Merging state and preserving timing anomalies in pipelines of high-end processors

Sibin Mohan, Frank Mueller

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Many embedded systems are subject to temporal constraints that require advance guarantees on meeting deadlines. Such systems rely on static analysis to safely bound worst-case execution (WCET) bounds of tasks. Designers of these systems are forced to avoid state-of-the-art processors due to their inherent architectural complexity (such as out-oforder instruction scheduling) that results in non-determinism. This work addresses this problem by providing novel pipeline analysis techniques for characterizing the worst-case behavior of real-time systems on modern processor architectures. We introduce methods to capture ("snapshot") pipeline state and to subsequently perform a "merge" of previously captured snapshots. We prove that our pipeline analysis correctly preserves worst-case timing behavior on out-of-order (OOO) processor pipelines. We further specifically show that anomalous pipeline effects, effectively dilating timing, are preserved by our method. To the best of our knowledge, this method of pipeline analysis and interactions between hardware/ software for obtaining WCET bounds on OOO processors is the first of its kind.

Original languageEnglish (US)
Title of host publicationProceedings - 2008 Real-Time Systems Symposium, RTSS 2008
Pages467-477
Number of pages11
DOIs
StatePublished - 2008
Externally publishedYes
Event2008 Real-Time Systems Symposium, RTSS 2008 - Barcelona, Spain
Duration: Nov 30 2008Dec 3 2008

Publication series

NameProceedings - Real-Time Systems Symposium
ISSN (Print)1052-8725

Other

Other2008 Real-Time Systems Symposium, RTSS 2008
Country/TerritorySpain
CityBarcelona
Period11/30/0812/3/08

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Merging state and preserving timing anomalies in pipelines of high-end processors'. Together they form a unique fingerprint.

Cite this