首页> 外文期刊>Very Large Scale Integration (VLSI) Systems, IEEE Transactions on >Systematic Methodology for the Quantitative Analysis of Pipeline-Register Reliability
【24h】

Systematic Methodology for the Quantitative Analysis of Pipeline-Register Reliability

机译:管道套准可靠性定量分析的系统方法

获取原文
获取原文并翻译 | 示例

摘要

Decades of rapid aggressive technology scaling have brought the challenge of soft errors to modern computing systems. Sequential elements (registers) in the processor pipeline exposed to charge-carrying particles generate bit flips or soft errors that could translate into system failures. Next to the processor cache, the pipeline registers (PRs) - registers between two pipeline stages - account for more than 50% of soft-error failures in the system. In this paper, for the first time, we apply architectural correct execution models that quantitatively define the vulnerability (or exposure to soft errors) of microarchitectural components, and extend it to define the vulnerability of PRs - PR vulnerability (PRV). We develop gemV-Pipe, a simulation toolset for the systematic, accurate, and quantitative estimation and analysis of PRV. Our detailed ISA-aware analysis in gemV-Pipe reveals interesting facts on the data-access behavior of PRs: 1) the vulnerability of each PR is not proportional to their size; 2) the PR bits used for one instruction may not be used (and are thus not vulnerable) for another, which makes PRV extremely instruction-dependent; and 3) the functionality of stored data on the PR bits can be used to classify them as - instruction, control, and data bits - each of which differ in their instruction-specific behavior and vulnerability. Applying the insight gained, we perform design space exploration on selectively hardening the PR bits, and demonstrate that 75% improved reliability can be achieved for only <;15% power overhead.
机译:数十年来,快速,积极的技术扩展已经给现代计算系统带来了软错误的挑战。处理器管道中暴露于带电粒子的顺序元素(寄存器)会产生位翻转或软错误,这些错误或错误可能转化为系统故障。在处理器缓存旁边,流水线寄存器(PR)–两个流水线级之间的寄存器–占系统中软错误故障的50%以上。在本文中,我们首次应用了体系结构正确的执行模型,该模型定量地定义了微体系结构组件的漏洞(或暴露于软错误),并将其扩展以定义PR的漏洞-PR漏洞(PRV)。我们开发了gemV-Pipe,这是一种用于对PRV进行系统,准确和定量评估和分析的仿真工具集。我们在gemV-Pipe中对ISA进行的详细分析揭示了有关PR的数据访问行为的有趣事实:1)每个PR的脆弱性与它们的大小不成比例; 2)用于一条指令的PR位可能不会被另一条指令使用(因此不易受到攻击),这使PRV非常依赖于指令; 3)PR位上存储的数据的功能可用于将它们分类为-指令位,控制位和数据位-每种位在其特定于指令的行为和漏洞方面有所不同。利用所获得的见解,我们对选择性地加固PR位进行了设计空间探索,并证明了仅<15%的功率开销就可以实现75%的可靠性提高。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号