Predicting architectural vulnerability on multithreaded processors under resource contention and sharing
Document Type
Article
Publication Date
1-1-2013
Abstract
Architectural vulnerability factor (AVF) characterizes a processor's vulnerability to soft errors. Interthread resource contention and sharing on a multithreaded processor (e.g., SMT, CMP) shows nonuniform impact on a program's AVF when it is co-scheduled with different programs. However, measuring the AVF is extremely expensive in terms of hardware and computation. This paper proposes a scalable two-level predictive mechanism capable of predicting a program's AVF on a SMT/CMP architecture from easily measured metrics. Essentially, the first-level model correlates the AVF in a contention-free environment with important performance metrics and the processor configuration, while the second-level model captures the interthread resource contention and sharing via processor structures' occupancies. By utilizing the proposed scheme, we can accurately estimate any unseen program's soft error vulnerability under resource contention and sharing with any other program(s), on an arbitrarily configured multithreaded processor. In practice, the proposed model can be used to find soft error resilient thread-to-core scheduling for multithreaded processors. © 2013 IEEE.
Publication Source (Journal or Book title)
IEEE Transactions on Dependable and Secure Computing
First Page
114
Last Page
127
Recommended Citation
Duan, L., Peng, L., & Li, B. (2013). Predicting architectural vulnerability on multithreaded processors under resource contention and sharing. IEEE Transactions on Dependable and Secure Computing, 10 (2), 114-127. https://doi.org/10.1109/TDSC.2012.87