首页 | 本学科首页   官方微博 | 高级检索  
     

基于指令行为的Cache可靠性评估研究
引用本文:周学海,余洁,李曦,王志刚. 基于指令行为的Cache可靠性评估研究[J]. 计算机研究与发展, 2007, 44(4): 553-559
作者姓名:周学海  余洁  李曦  王志刚
作者单位:中国科学技术大学计算机科学技术系,合肥,230027;中国科学技术大学计算机科学技术系,合肥,230027;中国科学技术大学计算机科学技术系,合肥,230027;中国科学技术大学计算机科学技术系,合肥,230027
基金项目:国家自然科学基金 , 高等学校博士学科点专项科研项目 , 安徽省自然科学基金
摘    要:软错误由高能粒子撞击所产生,对处理器的可靠性产生很大的损害.随着处理器设计目标转向低功耗、高性能和低供电电压,软错误的发生日益频繁,处理器的可靠性研究也随之受到越来越多的关注.针对传统的基于注错仿真的可靠性评估方法效率低的缺陷,提出了一套系统的cache可靠性评估方法,以可靠性指标之一--体系结构易受损因子(architectural vulnerability factor,AVF))--为研究对象,一方面,基于指令行为分析应用程序运行过程中对最终结果不产生影响的指令,从而确定对cache的AVF产生作用的指令;另一方面,根据cache的存储类型、所采取的写策略,结合cache中数据/指令阵列和地址标识阵列的特点,对cache上的各种相邻操作组合对AVF的影响进行了研究,从而完成AVF评估所需的信息分析.实验部分对PISA体系结构指令cache中的指令阵列进行了AVF评估,说明了该方法的有效性.

关 键 词:可靠性  体系结构易受损因子  cache  无效指令
修稿时间:2006-07-17

Research on Reliability Evaluation of Cache Based on Instruction Behavior
Zhou Xuehai,Yu Jie,Li Xi,Wand Zhigang. Research on Reliability Evaluation of Cache Based on Instruction Behavior[J]. Journal of Computer Research and Development, 2007, 44(4): 553-559
Authors:Zhou Xuehai  Yu Jie  Li Xi  Wand Zhigang
Affiliation:Department of Computer Science and Techenology, University of Science and Technology of China, Hefei 230027
Abstract:Soft error arises from the strike of high-energy particle,and does great harm to the reliability of processor.Furthermore,with the change of design targets of processor to low power consumption,high performance,and the reduction of supplying voltage,the occurrence possibility of soft error arises greatly.As a result,research on reliability of processor receives much more attention than ever.Aiming at solving the problem of low efficiency of traditional evaluation methods,which mostly apply fault-injection methods,this paper presents a systematic evaluation method of the indispensable memory unit in processor,cache.It takes an evaluation attribute,architectural vulnerability factor as research object.On the one hand,this method analyzes instructions that have no impact on the final execution result of application program to get the instructions that affect AVF.On the other hand,according to memory type,writing policy,and features of data?instruction and address tag array of cache,it analyzes various combination of neighboring operations' effects on AVF,thus attaining the needed information in AVF evaluation process.In the experiment,architectural vulnerability factor evaluation of instruction array of cache in PISA architecture is performed.The experiment results demonstrate the validity of this method.
Keywords:reliability  architectural vulnerability factor  cache  ineffective instruction
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号