Totalprof: a Fast and Accurate Retargetable Source Code Profiler

Totalprof: a Fast and Accurate Retargetable Source Code Profiler

TotalProf: A Fast and Accurate Retargetable Source Code Profiler Lei Gao, Jia Huang, Jianjiang Ceng, Rainer Leupers, Gerd Ascheid, and Heinrich Meyr Institute for Integrated Signal Processing Systems RWTH Aachen University, Germany {gao,leupers}@iss.rwth-aachen.de ABSTRACT 1. INTRODUCTION Profilers play an important role in software/hardware de- Profiling is deemed of pivotal importance for embedded sign, optimization, and verification. Various approaches system design. On the one hand, profiles obtained from re- have been proposed to implement profilers. The most alistic workloads are indispensable in application, processor, widespread approach adopted in the embedded domain is and compiler design. On the other hand, profile-based pro- Instruction Set Simulation (ISS) based profiling, which pro- gram optimization (e.g., [5]) and parallelization (e.g., [7]) vides uncompromised accuracy but limited execution speed. play an increasingly important role in harnessing the pro- Source code profilers, on the contrary, are fast but less accu- cessing power of embedded processors. However, current rate. This paper introduces TotalProf, a fast and accurate profiling techniques face two major challenges: First, the source code cross profiler that estimates the performance stringent time-to-market pressure and the increasing com- of an application from three aspects: First, code optimiza- plexity of applications and systems require profiling tools to tion and a novel virtual compiler backend are employed to be fast and quickly available, so that they can be employed resemble the course of target compilation. Second, an opti- as early as possible in the evaluation of design variants. Sec- mistic static scheduler is introduced to estimate the behav- ond, the accuracy of profiles is imperative to capture the ior of the target processor’s datapath. Last but not least, characteristics of today’s highly diverse embedded applica- dynamic events, such as cache misses, bus contention and tions and systems. Unfortunately, no existing profiling tech- branch prediction failures, are simulated at runtime. With nique can meet all these requirements, as briefly outlined in an abstract architecture description, the tool can be easily the following: retargeted in a performance characteristics oriented way to estimate different processor architectures, including DSPs • Instruction Set Simulation (ISS) based profiling is the and VLIW machines. Multiple instances of TotalProf can most widespread approach in the embedded domain. be integrated with SystemC to support heterogeneous Multi- Profiling is performed during simulation, therefore un- Processor System-on-Chip (MPSoC) profiling. With only compromised accuracy is achievable. However, the ex- about a 5 to 15% error rate introduced to the major per- ecution speed is inadequate in many scenarios. Addi- formance metrics, such as cycle count, memory accesses and tionally, modeling and modifying simulators are non- cache misses, a more than one Giga-Instruction-Per-Second trivial, which limit the early availability of the ISS- (GIPS) execution speed is achieved. based profilers. Categories and Subject Descriptors • Conversely, classic source code profilers encompass- ing Source-Level Performance Estimation (SLPE) [16, B.8.2 [Performance and Reliability]: Performance Anal- 13, 18] utilize machine-independent optimizations pro- ysis and Design Aids vided by the host compilers to resemble the optimiz- General Terms ing target compilation process for the sake of accuracy. However, the accuracy is still prohibitively limited, es- Design, Measurement, Performance pecially for VLIW architectures and Application Spe- Keywords cific Instruction-set Processors (ASIPs), which are re- grettably the main areas where accurate profiling is Source Code Profiling, Performance Estimation, Instruction needed. Set Simulation, Architecture Description Language Figure 1 compares the workflow of source code profilers with SLPE, ISS-based profilers, and TotalProf – the source Permission to make digital or hard copies of all or part of this work for code profiling infrastructure proposed in this paper. To- personal or classroom use is granted without fee provided that copies are talProf features a novel Intermediate Representation (IR)- not made or distributed for profit or commercial advantage and that copies to-IR transformation process called virtual compiler backend bear this notice and the full citation on the first page. To copy otherwise, to (or virtual backend) to resemble the behavior of a real target republish, to post on servers or to redistribute to lists, requires prior specific compiler backend. It also estimates the behavior of the tar- permission and/or a fee. CODES+ISSS’09, October 11–16, 2009, Grenoble, France. get processor’s datapath and simulates the dynamic events, Copyright 2009 ACM 978-1-60558-628-1/09/10 ...$10.00. such as cache misses, bus contention and branch prediction 305 High (Early) Speed (Availability) Low (Late) SLPE for fine-grained source code profiling. It estimates Low Accuracy High the performance of an application by lowering the C source Source Code Profilers code to a so-called 3 Address Code (3-AC) IR, which is exe- TotalProf ISS-Based Profilers with SLPE cutable C code that only consists of statements in a similar Source Code Source Code Source Code Source-Level abstraction level to a RISC. After machine-independent op- timizations are performed, the performance of each basic Compiler Frontend Compiler Frontend Compiler Frontend block in the 3-AC IR can be estimated. Together with the Optimizer Optimizer Optimizer frequencies of basic blocks obtained from the execution, the performance of the entire application can be calculated. profiled IR IR IR IR-Level Source code profilers only support a limited number of High-Level Languages (HLLs). The approach of instrument- Virtual Compiler Backend Target Compiler Backend ing the applications’ binaries [34, 24, 25, 21] overcomes profiled IR profiled Executable ISA-Level this limitation. Recently, Dynamic Binary Instrumenta- tion (DBI) tools, such as Valgrind [25] and PIN [21], be- Host Compiler Backend Host Compiler Backend Instruction Set Simulator come especially widespread in the general purpose domain. Host Computer Host Computer Host Computer With these tools, application binaries are transformed and instrumented at runtime. However, developing a DBI tool for a new architecture is difficult and even not always pos- Figure 1: Concept of TotalProf. Like source code pro- sible. Because in the embedded domain the diversity of filers utilizing SLPE, TotalProf uses host compilation to Instruction-Set Architectures (ISAs) is much higher than benefit from native execution. The profiling is performed that of the HLLs, binary instrumentation based profiling at the same level of ISS-based profilers, therefore accu- is not widely used. racy can be preserved. Supervision-based profiling can be implemented in various ways as well. The most straightforward example is hardware failures. TotalProf can be easily retargeted with architec- performance counters [1] that widely exist in modern pro- ture descriptions. It can provide highly precise profiling in- cessors. Advanced hardware profilers (e.g., [36]) can be used formation, which is normally only about 5 to 15% worse for complex cases, but the storage of the generated profiles than the ISS-based profilers. At the same time, TotalProf is usually a bottleneck. Hardware profilers cannot be used executes at a more than one GIPS speed, which is 1 to 3 in early design phases, when the prototypes are not available orders of magnitude higher than the speed of most ISSs. yet. A supervision-based profiler can also be implemented Furthermore, heterogeneous MPSoCs can be accurately es- by modifying the software stack the applications run upon timated using multiple TotalProf s connected with SystemC [17]. bus/peripheral models. In the embedded domain, the most straightforward and The remainder of this paper is organized as follows. After widespread approach is ISS-based profiling, which performs reviewing the related work in section 2, section 3 elaborates profiling during simulation. For example, [6] employs Sys- the TotalProf infrastructure. Section 4 presents experimen- temC -based co-simulation for profiling. Static information tal results and two case studies on profile-aided VLIW archi- is collected using an ISS, and the result can be reused in tecture and MPSoC Design Space Exploration (DSE). After dynamic event simulation. TotalProf is introduced, some in-depth discussions are given Furthermore, both instrumentation and supervision based in section 5. Finally, section 6 concludes this paper. profiling approaches can benefit from sampling profiling [24, 14] that reduces the runtime overhead. 2. RELATED WORK 2.2 Instruction Set Simulation 2.1 Profiling Techniques Instruction set simulators are widely used in the embed- In general, profiling can be implemented using two means: ded domain for profiling purposes. instrumentation or supervision. Source code profilers are SimpleScalar [4] is an interpretive simulator that can usually implemented using the former. They inject extra model a wide range of architecture/micro-architecture fea- code to the applications’ source code before or during com- tures. However, the execution speed is low since the entire pilation, so that profiles can be collected during the course process including instruction fetching, decoding and execu- of execution. As an example, GCC can inject extra profiling tion has to be simulated at runtime.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us