2007
DOI: 10.1145/1274858.1274863
|View full text |Cite
|
Sign up to set email alerts
|

Scalable precision cache analysis for real-time software

Abstract: Caches are needed to increase the processor performance, but the temporal behavior is difficult to predict, especially in embedded systems with preemptive scheduling. Current approaches use simplified assumptions or propose complex analysis algorithms to bound the cache-related preemption delay. In this paper, a scalable preemption delay analysis for associative instruction caches to control the analysis precision and the time-complexity is proposed. An accurate preemption delay calculation is integrated into … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 31 publications
0
15
0
Order By: Relevance
“…By analyzing the preempted task [10], [11], [12], [13], [14]: Additional misses can only occur for useful cache blocks (UCBs), i.e., blocks that may be cached and that may be reused later, resulting in cache hits. Static analyses have been proposed to safely approximate the set of UCBs.…”
Section: Crpd Analysis For Selfish-lrumentioning
confidence: 99%
See 1 more Smart Citation
“…By analyzing the preempted task [10], [11], [12], [13], [14]: Additional misses can only occur for useful cache blocks (UCBs), i.e., blocks that may be cached and that may be reused later, resulting in cache hits. Static analyses have been proposed to safely approximate the set of UCBs.…”
Section: Crpd Analysis For Selfish-lrumentioning
confidence: 99%
“…By analyzing the preempting task [15], [11], [12], [13]: The preempting task may only cause additional cache misses in those cache sets that it modifies. Thus, analyses to compute bounds on the number of evicting cache blocks (ECBs) have been developed.…”
Section: Crpd Analysis For Selfish-lrumentioning
confidence: 99%
“…Traditionally, CRPD is computed by analyzing (i) the preempted task [1,9], (ii) the preempting task [19], or (iii) both the preempted and preempting tasks [2,14,17,18]. The concept of useful cache block (UCB) is introduced by [9] for analyzing the preempted task.…”
Section: Related Workmentioning
confidence: 99%
“…Although the latter (so called "state-based" approach) scales exponentially in space and time in its originally proposed form, it offers high accuracy, which is why this is used as the basis for our proposed approach. Moreover, the authors of [13] have proposed a technique to flexibly scale the complexity of the latter analysis at the expense of precision. The general topic of cache analysis and CRPD computation at a broader perspective is discussed in depth in the following Sec.…”
Section: Related Workmentioning
confidence: 99%
“…[16] considers ECB only, independently of the actually preempted task. In [10,13,14], the CRPD is bounded by considering both UCB and ECB with varying precision. While most proposals limit themselves to direct-mapped caches for the sake of formal simplification, specific problems related to setassociativity have been overlooked or neglected [3] with the consequence of either being unsound or overly pessimistic.…”
Section: Related Workmentioning
confidence: 99%