Checkpointing SystemC-Based Virtual Platforms

Checkpointing SystemC-Based Virtual Platforms

Stefan Kraemer, Rainer Leupers, Dietmar Petras, Thomas Philipp, Andreas Hoffmann
Copyright: © 2011 |Volume: 2 |Issue: 4 |Pages: 17
ISSN: 1947-3176|EISSN: 1947-3184|EISBN13: 9781613506929|DOI: 10.4018/jertcs.2011100102
Cite Article Cite Article

MLA

Kraemer, Stefan, et al. "Checkpointing SystemC-Based Virtual Platforms." IJERTCS vol.2, no.4 2011: pp.21-37. http://doi.org/10.4018/jertcs.2011100102

APA

Kraemer, S., Leupers, R., Petras, D., Philipp, T., & Hoffmann, A. (2011). Checkpointing SystemC-Based Virtual Platforms. International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 2(4), 21-37. http://doi.org/10.4018/jertcs.2011100102

Chicago

Kraemer, Stefan, et al. "Checkpointing SystemC-Based Virtual Platforms," International Journal of Embedded and Real-Time Communication Systems (IJERTCS) 2, no.4: 21-37. http://doi.org/10.4018/jertcs.2011100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The ability to restore a virtual platform from a previously saved simulation state can considerably shorten the typical edit-compile-debug cycle for software developers and therefore enhance productivity. For SystemC based virtual platforms (VP), dedicated checkpoint/restore (C/R) solutions are required, taking into account the specific characteristics of such platforms. Apart from restoring the simulation process from a checkpoint image, the proposed checkpoint solution also takes care of re-attaching debuggers and interactive GUIs to the restored virtual platform. The checkpointing is handled automatically for most of the SystemC modules, only the usage of host OS resources requires user provision. A process checkpointing based C/R has been selected in order to minimize the adaption required for existing VPs at the expense of large checkpoint sizes. This drawback is overcome by introducing an online compression to the checkpoint process. A case study based on the SHAPES Virtual Platform is conducted to investigate the applicability of the proposed framework as well as the impact of checkpoint compression in a realistic system environment.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.