Quantify User's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Quantify User's Guide Quantify User’s Guide Version 3.1 [email protected] http://www.rational.com IMPORTANT NOTICE DISCLAIMER OF WARRANTY Rational Software Corporation makes no representations or warranties, either express or implied, by or with respect to anything in this guide, and shall not be liable for any implied warranties of merchantability or fitness for a particular purpose or for any indirect, special or consequential damages. COPYRIGHT NOTICE Quantify, copyright 1992-1997 Rational Software Corporation. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, photocopying, recording or otherwise, without prior written consent of Rational Software Corporation. No patent liability is assumed with respect to the use of the information contained herein. While every precaution has been taken in the preparation of this book, Rational Software Corporation assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. The program and information contained herein are licensed only pursuant to a license agreement that contains use, reverse engineering, disclosure and other restrictions; accordingly, it is “Unpublished — rights reserved under the copyright laws of the United States” for purposes of the FARs. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure by the U.S. Government is subject to restrictions set forth in DFARS 227.7202-1(a) and 227.7202-3(a) (1995), DFARS 252.227-7013(c)(1)(ii) (Oct 1988), FAR 12.212(a) 1995, FAR 52.227-19, or FAR 52.227-14, as applicable. TRADEMARKS Rational, Purify, PureCoverage, Quantify, PureLink, ClearDDTS, and ClearCase are U. S. registered trademarks of Rational Software Corporation. All other products or services mentioned in this guide are covered by the trademarks, service marks, or product names as designated by the companies who market those products. PATENTS Quantify is covered by one or more of U.S. Patent Nos. 5,193,180 and 5,335,344 and 5,535,329. Purify is licensed under Sun Microsystems Inc.’s U.S. Pat. No. 5,404,499. Other U.S. and foreign patents pending. Printed in the U.S.A. QUANTIFY USER’S GUIDE Contents Welcome to Quantify Using this guide . .ix Using online Help . .ix Conventions used in this guide . x Displaying the release notes . x Installing Quantify . x Contacting technical support . .xi 1 Introducing Quantify How Quantify works . 1-2 Building and running a Quantify’d program . 1-3 Interpreting the program summary . 1-4 Using Quantify’s data analysis windows . 1-5 The Function List window . 1-6 Sorting the function list . 1-6 Restricting functions . 1-7 Finding and filtering functions . 1-7 The Call Graph window . 1-9 Understanding the layout of the call graph . 1-10 Using the pop-up menu . 1-11 Expanding and collapsing descendants . 1-11 Locating functions in the call graph . 1-12 Changing the focus of the call graph . 1-13 Displaying additional data for functions . 1-14 Changing line scale factors . 1-15 Shortening function names . 1-16 Saving the call graph . 1-16 iii The Function Detail window . 1-17 Understanding how time is distributed . 1-18 Changing the scale and precision of data . 1-19 Saving function detail data . 1-19 The Annotated Source window . 1-20 Changing annotations . 1-21 What annotations mean . 1-21 Saving performance data . 1-22 Customizing Quantify’s graphical interface . 1-23 Editing the .qvrc file . 1-23 2 Improving Performance with Quantify The hashtable package . 2-1 Collecting baseline performance data . 2-4 Uncovering an unexpected behavior . 2-5 The function detail suggests long buckets . 2-6 Annotated source confirms excessive calls . 2-8 Saving the baseline data . 2-9 Improving the performance of the testHash program . 2-10 Running the improved_testHash program . 2-12 Verifying the performance improvement . 2-14 Other causes of slow software . 2-15 Needless computation . 2-15 Premature computation . 2-16 Needless recomputation . 2-16 Inefficient computation . 2-16 Needless library or system-call requests . 2-16 Excessive library or system-call requests . 2-17 Expensive library or system-call requests . 2-17 Environmental factors . 2-17 3 How Quantify Collects Data How Quantify records function time . 3-2 iv How Quantify names functions . 3-3 Analyzing basic blocks . 3-4 How Quantify identifies basic blocks . 3-5 How Quantify reports multiple basic blocks . 3-9 Annotations and compiler differences . 3-9 C++ templates and annotated source . 3-11 How Quantify times system calls . 3-13 Variations in system-call timing . 3-14 How Quantify times register-window traps . 3-15 Understanding recursive functions . 3-16 Running on a different machine . 3-20 Paging and memory cache effects . 3-20 4 Customizing Data Collection Avoiding all data recording . 4-2 Timing system calls . 4-2 Avoiding timing for all system calls . 4-2 Controlling how system calls are timed . 4-4 Avoiding timing for specific system calls . 4-5 Reporting excluded system-call time . 4-6 Timing shared-library operations . 4-7 Recording dynamic linking . 4-7 Understanding shared-library operations . 4-8 Timing register-window traps . 4-10 Changing the granularity of collected data . 4-11 Collecting partial data for a run . 4-13 Analyzing datasets containing partial data . 4-14 Calling quantify _stop_recording_system_calls and quantify_clear_data from your debugger . 4-15 Annotating datasets . 4-16 Saving data on signals . 4-17 Collecting data in long-running programs . 4-18 v Collecting data for child processes . 4-18 Using execve . 4-19 Using fork . 4-19 Using vfork . 4-19 Collecting data in threaded programs . 4-20 Threads and stacks . 4-20 Solaris lightweight processes and threads . 4-21 Analyzing data from threaded programs . 4-22 5 Analyzing Data with Scripts Exporting performance data . 5-1 The export data file format . 5-1 Running qv . 5-2 Rerouting Quantify’s output . 5-3 Saving data incrementally . 5-4 Automating data analysis . 5-5 Automating performance regression tests . 5-5 Comparing program runs with qxdiff . 5-7 What qxdiff annotations mean . 5-8 Managing cached object files . 5-10 Deleting cached object files . 5-10 A Using Quantify Options and API Functions Using Quantify options . A-2 Option syntax . A-2 Using conversion characters in filenames . A-3 How Quantify creates filenames . A-4 Option types . ..
Recommended publications
  • Toolchains Instructor: Prabal Dutta Date: October 2, 2012
    EECS 373: Design of Microprocessor-Based Systems Fall 2012 Lecture 3: Toolchains Instructor: Prabal Dutta Date: October 2, 2012 Note: Unless otherwise specified, these notes assume: (i) an ARM Cortex-M3 processor operating in little endian mode; (ii) the ARM EABI application binary interface; and (iii) the GNU GCC toolchain. Toolchains A complete software toolchain includes programs to convert source code into binary machine code, link together separately assembled/compiled code modules, disassemble the binaries, and convert their formats. Binary program file (.bin) Assembly Object Executable files (.s) files (.o) image file objcopy ld (linker) as objdump (assembler) Memory layout Disassembled Linker code (.lst) script (.ld) Figure 0.1: Assembler Toolchain. A typical GNU (GNU's Not Unix) assembler toolchain includes several programs that interact as shown in Figure 0.1 and perform the following functions: • as is the assembler and it converts human-readable assembly language programs into binary machine language code. It typically takes as input .s assembly files and outputs .o object files. • ld is the linker and it is used to combine multiple object files by resolving their external symbol references and relocating their data sections, and outputting a single executable file. It typically takes as input .o object files and .ld linker scripts and outputs .out executable files. • objcopy is a translation utility that copies and converts the contents of an object file from one format (e.g. .out) another (e.g. .bin). • objdump is a disassembler but it can also display various other information about object files. It is often used to disassemble binary files (e.g.
    [Show full text]
  • Coldfire Cross Development with GNU Toolchain and Eclipse
    ColdFire cross development with GNU Toolchain and Eclipse Version 1.0 embedded development tools Acknowledgements Ronetix GmbH Waidhausenstrasse 13/5 1140 Vienna Austria Tel: +43-720-500315 +43-1962-720 500315 Fax: +43-1- 8174 955 3464 Internet: www.ronetix.at E-Mail [email protected] Acknowledgments: ColdFire is trademark of Freescale Ltd. Windows, Win32, Windows CE are trademarks of Microsoft Corporation. Ethernet is a trademark of XEROX. All other trademarks are trademarks of their respective companies. © 2005-2008 RONETIX All rights reserved. ColdFire cross development 2 www.ronetix.at Acknowledgements Change log April 2007 - First release ColdFire cross development 3 www.ronetix.at Contents 1 INTRODUCTION ...........................................................................................................................5 2 PEEDI COLDFIRE EMULATOR INSTALLATION........................................................................6 3 TOOLSET INSTALLATION ON LINUX ........................................................................................7 4 TOOLSET INSTALLATION ON WINDOWS...............................................................................10 5 WORKING WITH ECLIPSE.........................................................................................................11 5.1 Adding a project ....................................................................................................................11 5.2 Configuring and working with the Eclipse built-in debugger ...........................................16
    [Show full text]
  • Transparent Dynamic Optimization: the Design and Implementation of Dynamo
    Transparent Dynamic Optimization: The Design and Implementation of Dynamo Vasanth Bala, Evelyn Duesterwald, Sanjeev Banerjia HP Laboratories Cambridge HPL-1999-78 June, 1999 E-mail: [email protected] dynamic Dynamic optimization refers to the runtime optimization optimization, of a native program binary. This report describes the compiler, design and implementation of Dynamo, a prototype trace selection, dynamic optimizer that is capable of optimizing a native binary translation program binary at runtime. Dynamo is a realistic implementation, not a simulation, that is written entirely in user-level software, and runs on a PA-RISC machine under the HPUX operating system. Dynamo does not depend on any special programming language, compiler, operating system or hardware support. Contrary to intuition, we demonstrate that it is possible to use a piece of software to improve the performance of a native, statically optimized program binary, while it is executing. Dynamo not only speeds up real application programs, its performance improvement is often quite significant. For example, the performance of many +O2 optimized SPECint95 binaries running under Dynamo is comparable to the performance of their +O4 optimized version running without Dynamo. Internal Accession Date Only Ó Copyright Hewlett-Packard Company 1999 Contents 1 INTRODUCTION ........................................................................................... 7 2 RELATED WORK ......................................................................................... 9 3 OVERVIEW
    [Show full text]
  • Building a GCC Cross Compiler
    B uilding the Gnu GCC Compiler Page 1 Building a Gnu GCC Cross Compiler Cmpware, Inc. Introduction The Cmpware Configurable Multiprocessor Development Kit (CMP-DK) is based around fast simulation models for multiple processors. While the Cmpware CMP-DK comes with several popular microprocessor models included, it does not supply tools for programming these processors. One popular microprocessor development tool chain is the Gnu tools from the Free Software Foundation. These tools are most often used in typical self-hosted development environments, where the processor and operating system used for development is also the processor and operating system used to execute the code being developed. In the case of development for the Cmpware CMP-DK, it is more likely that the tools will be cross targeted. This means that the host machine used for software development uses one processor and operating system and the target system uses a different processor and operating system. This arrangement does not necessarily complicate the processor itself; it still only has to produce code for a single target. The major problem with cross targeted tools is that the possible combinations of host and target can be large and the audience for such tools relatively small. So such tools tend to be less rigorously maintained than more popular self-hosted tools. This document briefly describes the complete process of building a cross targeted Gnu tool chain. It uses a popular combination of host and target, and the process is know to work correctly. This document does not address the problems that may occur in the build process which may require specialized knowledge of the internals of the Gnu tools.
    [Show full text]
  • Embedded Design Handbook
    Embedded Design Handbook Subscribe EDH | 2020.07.22 Send Feedback Latest document on the web: PDF | HTML Contents Contents 1. Introduction................................................................................................................... 6 1.1. Document Revision History for Embedded Design Handbook........................................ 6 2. First Time Designer's Guide............................................................................................ 8 2.1. FPGAs and Soft-Core Processors.............................................................................. 8 2.2. Embedded System Design...................................................................................... 9 2.3. Embedded Design Resources................................................................................. 11 2.3.1. Intel Embedded Support........................................................................... 11 2.3.2. Intel Embedded Training........................................................................... 11 2.3.3. Intel Embedded Documentation................................................................. 12 2.3.4. Third Party Intellectual Property.................................................................12 2.4. Intel Embedded Glossary...................................................................................... 13 2.5. First Time Designer's Guide Revision History............................................................14 3. Hardware System Design with Intel Quartus Prime and Platform Designer.................
    [Show full text]
  • Compiler Driver
    GHS Compiler Driver Advanced Data Controls Corp. 1 Flow of Source Files Through the Tool Chain Assembly Language Sorce File Object Library Lnguage (Ada95,C,C++,Fortron,Pascal) Modules Archives Files Language Compiler Assembly Language File (.s extension) Assembled by the Assembler Object Module (.o extension) Linked Executable program a.out 2 Compiler Drivers • A compiler driver is a program which invokes the other components of the tool set to process a program. There is a separate compiler driver for each source language. The drivers use command line arguments and source file extensions to determine which compiler or assembler to invoke for each source file, then sequence the resulting output through the subsequent linker and conversion utilities, relieving the user of the burden of invoking each of these tools individually. 3 Compilers • Each Green Hills optimizing compiler is a combination of a language-specific front end, a global optimizer, and a target- specific code generator. Green Hills provides compilers for five languages: Ada,C,C++,FORTRAN,and Pascal, including all major dialects. All languages for a target use the same subroutine linkage conventions. This allows modules written in different languages to call each other. The compilers generate assembly language. 4 Assembler • The relocatable macro assembler translates assembly language statements and directives into a relocatable object file containing instructions and data. 5 Librarian • The Librarian combines object files created by assembler or Linker into a library file. The linker can search library files to resolve internal references. 6 Linker • The Linker combines one or more ELF object modules into a single ELF relocatable object or executable program.
    [Show full text]
  • Embedded System Tools Reference Manual
    Embedded System Tools Reference Manual UG1043 (v2016.1) April 06, 2016 Revision History The following table shows the revision history for this document. Date Version Revision 04/06/2016 2016.1 Added information about the supported processors and compilers. Added references to Zynq® UltraScale+™ MPSoC related documentation. Embedded System Tools Reference Manual www.xilinx.com Send Feedback 2 UG1043 (v2016.1) April 06, 2016 Table of Contents Revision History . 2 Chapter 1: Embedded System and Tools Architecture Overview Design Process Overview. 6 Vivado Design Suite Overview . 8 Software Development Kit . 9 Chapter 2: GNU Compiler Tools Overview . 12 Compiler Framework . 12 Common Compiler Usage and Options . 14 MicroBlaze Compiler Usage and Options. 29 ARM Cortex-A9 Compiler Usage and Options . 46 Other Notes . 48 Chapter 3: Xilinx System Debugger SDK System Debugger . 50 Xilinx System Debugger Command-Line Interface (XSDB) . 51 Chapter 4: Flash Memory Programming Overview . 52 Program Flash Utility . 53 Other Notes . 55 Appendix A: GNU Utilities General Purpose Utility for MicroBlaze Processors. 60 Utilities Specific to MicroBlaze Processors. 60 Other Programs and Files . 63 Appendix B: Additional Resources and Legal Notices Xilinx Resources . 64 Solution Centers. 64 Documentation Navigator and Design Hubs . 64 Embedded System Tools Reference Manual www.xilinx.com Send Feedback 3 UG1043 (v2016.1) April 06, 2016 References . 65 Training Resources. 65 Please Read: Important Legal Notices . 66 Embedded System Tools Reference Manual www.xilinx.com Send Feedback 4 UG1043 (v2016.1) April 06, 2016 Chapter 1 Embedded System and Tools Architecture Overview This guide describes the architecture of the embedded system tools and flows provided in the Xilinx® Vivado® Design Suite for developing systems based on the MicroBlaze™ embedded processor and the Cortex A9, A53 and R5 ARM processors.
    [Show full text]
  • Slides for RISC-V Code Size Talk
    How compact is compiled RISC-V Jeremy Bennett code? Copyright © 2019 Embecosm. Freely available under a Creative Commons license. What this talk is... Thanks to openclipart.org What this talk is not... Thanks to openclipart.org Architectures Analysed ● DesignWare ARC HS. ● Arm Cortex-M4 + Thumb 2. ● RISV-V RV32IMC All 32-bit architectures, with 16-bit short instructions and no hardware floating point. BEEBS Name B M I F Bristol/Embecosm Embedded Benchmark Suite Blowfish ● CRC32 free and open source Cubic root solver ● mixture of branching (B), memory access (M), Dijkstra FDCT integer ops (I) and floating point (F) Float matmult ● minimal I/O Integer matmult ● Rjindael https://arxiv.org/abs/1308.5174 SHA ● BEEBS 2.0 now 79 benchmarks 2D FIR High frequency Medium frequency Low frequency What to Measure ● Sections in an embedded program – code: goes into ROM/Flash – read-only data: goes into ROM/Flash – initialized data: goes into RAM, maybe setup from ROM – uninitialized data (BSS): goes into RAM ● We look at code + read-only data size – most important for embedded systems – easily measured using size What to Measure Look at: Stack/heap code + read-only data RAM – most important for Uninitialized data embedded systems Initialized data – easily measured Read only data using size ROM Code Absolute Statistics ● Size for each program – code + read-only data ● Statistics recorded: – Total size for all programs ● dominated by effects on large programs – Size of largest program – Size of smallest programs Relative Statistics ● Size for ARC and
    [Show full text]
  • In Using the GNU Compiler Collection (GCC)
    Using the GNU Compiler Collection For gcc version 6.1.0 (GCC) Richard M. Stallman and the GCC Developer Community Published by: GNU Press Website: http://www.gnupress.org a division of the General: [email protected] Free Software Foundation Orders: [email protected] 51 Franklin Street, Fifth Floor Tel 617-542-5942 Boston, MA 02110-1301 USA Fax 617-542-2652 Last printed October 2003 for GCC 3.3.1. Printed copies are available for $45 each. Copyright c 1988-2016 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with the Invariant Sections being \Funding Free Software", the Front-Cover Texts being (a) (see below), and with the Back-Cover Texts being (b) (see below). A copy of the license is included in the section entitled \GNU Free Documentation License". (a) The FSF's Front-Cover Text is: A GNU Manual (b) The FSF's Back-Cover Text is: You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development. i Short Contents Introduction ::::::::::::::::::::::::::::::::::::::::::::: 1 1 Programming Languages Supported by GCC ::::::::::::::: 3 2 Language Standards Supported by GCC :::::::::::::::::: 5 3 GCC Command Options ::::::::::::::::::::::::::::::: 9 4 C Implementation-Defined Behavior :::::::::::::::::::: 373 5 C++ Implementation-Defined Behavior ::::::::::::::::: 381 6 Extensions to
    [Show full text]
  • Developing Programs Using the Hardware Abstraction Layer, Nios II
    6. Developing Programs Using the Hardware Abstraction Layer January 2014 NII52004-13.1.0 NII52004-13.1.0 This chapter discusses how to develop embedded programs for the Nios® II embedded processor based on the Altera® hardware abstraction layer (HAL). This chapter contains the following sections: ■ “The Nios II Embedded Project Structure” on page 6–2 ■ “The system.h System Description File” on page 6–4 ■ “Data Widths and the HAL Type Definitions” on page 6–5 ■ “UNIX-Style Interface” on page 6–5 ■ “File System” on page 6–6 ■ “Using Character-Mode Devices” on page 6–8 ■ “Using File Subsystems” on page 6–15 ■ “Using Timer Devices” on page 6–16 ■ “Using Flash Devices” on page 6–19 ■ “Using DMA Devices” on page 6–25 ■ “Using Interrupt Controllers” on page 6–30 ■ “Reducing Code Footprint in Embedded Systems” on page 6–30 ■ “Boot Sequence and Entry Point” on page 6–37 ■ “Memory Usage” on page 6–39 ■ “Working with HAL Source Files” on page 6–44 The application program interface (API) for HAL-based systems is readily accessible to software developers who are new to the Nios II processor. Programs based on the HAL use the ANSI C standard library functions and runtime environment, and access hardware resources with the HAL API’s generic device models. The HAL API largely conforms to the familiar ANSI C standard library functions, though the ANSI C standard library is separate from the HAL. The close integration of the ANSI C standard library and the HAL makes it possible to develop useful programs that never call the HAL functions directly.
    [Show full text]
  • Compiler Support for Linker Relaxation in RISC-V
    Compiler Support For Linker Relaxation in RISC-V Shiva Chen Hsiangkai Wang 2019 RISC-V Workshop Taiwan The Idea of Linker Relaxation in RISC-V To reduce the number of instructions to access symbols Function call can be generated by jal(jump and link) jal can jump to the symbol within +/- 1Mib auipc and jalr pair The pair can jump to the symbol within 32-bit pc-relative address If the symbol and the call site are not in the same compile unit Compiler can not know the symbol offsets auipc and jalr pair will be generated to guarantee the function call can reach the symbol Linker know the symbol address if it’s a static linking Linker can transfer the pair to single jal Taking RISC-V® Mainstream 2 What is Relocation? The process that linker will fill in the symbol offsets that compiler can not know Linker will rewrite the offsets according to relocation records Relocation record contain the information Which instructions need to be relocated the offsets Which symbols involved with the relocations How to relocate the fields relative to symbols 00000000 <foo>: 0: auipc t1,0x0 4: jalr t1 # 0 <foo> Relocation section '.rela.text' Offset Type Sym.Value Sym. Name + Addend 00000000 R_RISCV_CALL 00000000 bar + 0 Taking RISC-V® Mainstream 3 Relaxation Relocation Type With the relocation types, linker can eliminate the instructions if the offset can fit in single instruction Emit extra relocation type “R_RISCV_RELAX” To indicate the instructions can do the relaxation Linker could relax auipc and jalr to jal 00000000 <foo>: 0: auipc t1,0x0 4: jalr t1 # 0 <foo> Relocation section '.rela.text' Offset Type Sym.Value Sym.
    [Show full text]
  • Compiling Applications for Analysis with DIVINE
    Faculty of Informatics, Masaryk University wyA 1 Compiling Applications for Analysis with DIVINE Master’s thesis Zuzana Baranová Brno, 2019 Declaration Hereby I declare that this thesis is my original work, which I have created on my own. All sources and literature used in writing the thesis, as well as any quoted material, are properly cited, including full reference to its source. Advisor: doc. RNDr. Petr Švenda, Ph.D. Consultant: RNDr. Petr Ročkai, Ph.D. Abstract Verification and other formal analysis techniques are often demanding tasks, both in skill and time. This is why non-critical software is seldom subjected to the same rigorous analysis as safety-critical software. However, all software would benefit from an extra level of assurance of its reliability and there has been prolonged effort on the side of analysis tools developers to make their use easier. Ideally, the aim is to integrate analysis techniques into the normal software development process. Among other tools, DIVINE is one such verifier whose long-term key goal is to bring verification closer to the developers of everyday software. A big step forward was direct verification of C and C++ programs. The programs are compiled into a more analysis-friendly form to be verified, notably LLVM bitcode (LLVM IR). Another big step in lowering barriers for adopting formal verification is re-using automated build tools and existing build instructions of projects, which would prevent the need for manual compilation of software. The purpose of this thesis is to replace the existing compilation toolchain of DIVINE with a tool which could be transparently used in automated build systems and which would produce bitcode of the whole program.
    [Show full text]