Tools for memory access detection are widely used, playing an important role especially in real-time systems. For example, on multi-core platforms, the problem of co-scheduling CPU and memory resources with hard real-time constraints requires a deep understanding of the memory access patterns of the deployed taskset. While code execution flow can be analyzed by considering the control-flow graph and reasoning in terms of basic blocks, a similar approach cannot apply to data accesses. In this paper, we propose MadT, a tool that uses a novel mechanism to perform memory access detection of general purpose applications. MadT does not perform binary instrumentation and always executes application code natively on the platform. Hence it can operate entirely in user-space without sand-boxing the task under analysis. Furthermore, MadT provides detailed symbolic information about the accessed memory structures, so it is able to translate the virtual addresses to their original symbolic variable names. Finally, it requires no modifications to application source code. The proposed methodology relies on existing OS-level capabilities. In this paper, we describe how MadT has been implemented on commercial hardware and compare its performance with state-of-the-art software techniques for memory access detection.

Cesati, M., Mancuso, R., Betti, E., Caccamo, M. (2015). A memory access detection methodology for accurate workload characterization. In Proceedings of 2015 IEEE 21st International Conference on Embedded and Real-Time Computing Systems and Applications (pp.141-148). Institute of Electrical and Electronics Engineers Inc. [10.1109/RTCSA.2015.30].

A memory access detection methodology for accurate workload characterization

CESATI, MARCO;
2015-01-01

Abstract

Tools for memory access detection are widely used, playing an important role especially in real-time systems. For example, on multi-core platforms, the problem of co-scheduling CPU and memory resources with hard real-time constraints requires a deep understanding of the memory access patterns of the deployed taskset. While code execution flow can be analyzed by considering the control-flow graph and reasoning in terms of basic blocks, a similar approach cannot apply to data accesses. In this paper, we propose MadT, a tool that uses a novel mechanism to perform memory access detection of general purpose applications. MadT does not perform binary instrumentation and always executes application code natively on the platform. Hence it can operate entirely in user-space without sand-boxing the task under analysis. Furthermore, MadT provides detailed symbolic information about the accessed memory structures, so it is able to translate the virtual addresses to their original symbolic variable names. Finally, it requires no modifications to application source code. The proposed methodology relies on existing OS-level capabilities. In this paper, we describe how MadT has been implemented on commercial hardware and compare its performance with state-of-the-art software techniques for memory access detection.
IEEE 21st International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2015
chn
2015
21
Rilevanza internazionale
contributo
2015
Settore ING-INF/05 - SISTEMI DI ELABORAZIONE DELLE INFORMAZIONI
English
multiprocessing systems; real-time systems; storage allocation
Intervento a convegno
Cesati, M., Mancuso, R., Betti, E., Caccamo, M. (2015). A memory access detection methodology for accurate workload characterization. In Proceedings of 2015 IEEE 21st International Conference on Embedded and Real-Time Computing Systems and Applications (pp.141-148). Institute of Electrical and Electronics Engineers Inc. [10.1109/RTCSA.2015.30].
Cesati, M; Mancuso, R; Betti, E; Caccamo, M
File in questo prodotto:
File Dimensione Formato  
07299854.pdf

solo utenti autorizzati

Descrizione: Articolo principale
Licenza: Copyright dell'editore
Dimensione 579.91 kB
Formato Adobe PDF
579.91 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2108/152227
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? 2
social impact