Understanding the Propagation of Hard Errors to Software and Implications for Resilient System Design

With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. We explore a cooperative hardware-software solution that watches...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: LI, Man-Lap, RAMACHANDRAN, Pradeep, SAHOO, Swamp K, ADVE, Sarita V, ADVE, Vikram S, YUANYUAN ZHOU
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 276
container_issue 2
container_start_page 265
container_title
container_volume 42
creator LI, Man-Lap
RAMACHANDRAN, Pradeep
SAHOO, Swamp K
ADVE, Sarita V
ADVE, Vikram S
YUANYUAN ZHOU
description With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. We explore a cooperative hardware-software solution that watches for anomalous software behavior to indicate the presence of hardware faults. Fundamental to such a solution is a characterization of how hardware faults indifferent microarchitectural structures of a modern processor propagate through the application and OS. This paper aims to provide such a characterization, resulting in identifying low-cost detection methods and providing guidelines for implementation of the recovery and diagnosis components of such a reliability solution. We focus on hard faults because they are increasingly important and have different system implications than the much studied transients. We achieve our goals through fault injection experiments with a microarchitecture-level full system timing simulator. Our main results are: (1) we are able to detect 95% of the unmasked faults in 7 out of 8 studied microarchitectural structures with simple detectors that incur zero to little hardware overhead; (2) over 86% of these detections are within latencies that existing hardware checkpointing schemes can handle, while others require software checkpointing; and (3) a surprisingly large fraction of the detected faults corrupt OS state, but almost all of these are detected with latencies short enough to use hardware checkpointing, thereby enabling OS recovery in virtually all such cases.
doi_str_mv 10.1145/1353535.1346315
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_1353535_1346315</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>20381590</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2275-2b90c0926e29b9b0692139799c9ce7eabeac4f7937d3c75d7907ca0804160be33</originalsourceid><addsrcrecordid>eNo9kMFLwzAUh4MoOKdnr7l47PZe0zbNUeZ0g4HiHHgraZrUSNeUJCD77-3ckHf4PR7v-x0-Qu4RZohZPkeWH2eGLCsY5hdkgiJjSV4Wn5dkAliMuyjhmtyE8A2AJRY4IXrXN9qHKPvG9i2NX5q-eTfIVkbreuoMXUnf0KX3zgcaHd06E3-k13Qk6Ho_dFb9vQZqnKfvOtjO6j7S7SFEvadP46Htb8mVkV3Qd-eckt3z8mOxSjavL-vF4yZRacrzJK0FKBBpoVNRixoKkSITXAgllOZa1lqqzHDBeMMUzxsugCsJJWRYQK0Zm5L5qVd5F4LXphq83Ut_qBCqo6XqbKk6WxqJhxMxyKBkZ7zslQ3_WAqsxFwA-wW-7Wd2</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Understanding the Propagation of Hard Errors to Software and Implications for Resilient System Design</title><source>ACM Digital Library</source><creator>LI, Man-Lap ; RAMACHANDRAN, Pradeep ; SAHOO, Swamp K ; ADVE, Sarita V ; ADVE, Vikram S ; YUANYUAN ZHOU</creator><creatorcontrib>LI, Man-Lap ; RAMACHANDRAN, Pradeep ; SAHOO, Swamp K ; ADVE, Sarita V ; ADVE, Vikram S ; YUANYUAN ZHOU</creatorcontrib><description>With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. We explore a cooperative hardware-software solution that watches for anomalous software behavior to indicate the presence of hardware faults. Fundamental to such a solution is a characterization of how hardware faults indifferent microarchitectural structures of a modern processor propagate through the application and OS. This paper aims to provide such a characterization, resulting in identifying low-cost detection methods and providing guidelines for implementation of the recovery and diagnosis components of such a reliability solution. We focus on hard faults because they are increasingly important and have different system implications than the much studied transients. We achieve our goals through fault injection experiments with a microarchitecture-level full system timing simulator. Our main results are: (1) we are able to detect 95% of the unmasked faults in 7 out of 8 studied microarchitectural structures with simple detectors that incur zero to little hardware overhead; (2) over 86% of these detections are within latencies that existing hardware checkpointing schemes can handle, while others require software checkpointing; and (3) a surprisingly large fraction of the detected faults corrupt OS state, but almost all of these are detected with latencies short enough to use hardware checkpointing, thereby enabling OS recovery in virtually all such cases.</description><identifier>ISSN: 0163-5980</identifier><identifier>EISSN: 1943-586X</identifier><identifier>DOI: 10.1145/1353535.1346315</identifier><identifier>CODEN: OSRED8</identifier><language>eng</language><publisher>New York, NY: Association for Computing Machinery</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computers, microcomputers ; Electronics ; Exact sciences and technology ; Hardware ; Language processing and microprogramming ; Programming languages ; Software</subject><ispartof>Operating systems review, 2008, Vol.42 (2), p.265-276</ispartof><rights>2008 INIST-CNRS</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2275-2b90c0926e29b9b0692139799c9ce7eabeac4f7937d3c75d7907ca0804160be33</citedby><cites>FETCH-LOGICAL-c2275-2b90c0926e29b9b0692139799c9ce7eabeac4f7937d3c75d7907ca0804160be33</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,314,780,784,789,790,23930,23931,25140,27924,27925</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=20381590$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>LI, Man-Lap</creatorcontrib><creatorcontrib>RAMACHANDRAN, Pradeep</creatorcontrib><creatorcontrib>SAHOO, Swamp K</creatorcontrib><creatorcontrib>ADVE, Sarita V</creatorcontrib><creatorcontrib>ADVE, Vikram S</creatorcontrib><creatorcontrib>YUANYUAN ZHOU</creatorcontrib><title>Understanding the Propagation of Hard Errors to Software and Implications for Resilient System Design</title><title>Operating systems review</title><description>With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. We explore a cooperative hardware-software solution that watches for anomalous software behavior to indicate the presence of hardware faults. Fundamental to such a solution is a characterization of how hardware faults indifferent microarchitectural structures of a modern processor propagate through the application and OS. This paper aims to provide such a characterization, resulting in identifying low-cost detection methods and providing guidelines for implementation of the recovery and diagnosis components of such a reliability solution. We focus on hard faults because they are increasingly important and have different system implications than the much studied transients. We achieve our goals through fault injection experiments with a microarchitecture-level full system timing simulator. Our main results are: (1) we are able to detect 95% of the unmasked faults in 7 out of 8 studied microarchitectural structures with simple detectors that incur zero to little hardware overhead; (2) over 86% of these detections are within latencies that existing hardware checkpointing schemes can handle, while others require software checkpointing; and (3) a surprisingly large fraction of the detected faults corrupt OS state, but almost all of these are detected with latencies short enough to use hardware checkpointing, thereby enabling OS recovery in virtually all such cases.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computers, microcomputers</subject><subject>Electronics</subject><subject>Exact sciences and technology</subject><subject>Hardware</subject><subject>Language processing and microprogramming</subject><subject>Programming languages</subject><subject>Software</subject><issn>0163-5980</issn><issn>1943-586X</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNo9kMFLwzAUh4MoOKdnr7l47PZe0zbNUeZ0g4HiHHgraZrUSNeUJCD77-3ckHf4PR7v-x0-Qu4RZohZPkeWH2eGLCsY5hdkgiJjSV4Wn5dkAliMuyjhmtyE8A2AJRY4IXrXN9qHKPvG9i2NX5q-eTfIVkbreuoMXUnf0KX3zgcaHd06E3-k13Qk6Ho_dFb9vQZqnKfvOtjO6j7S7SFEvadP46Htb8mVkV3Qd-eckt3z8mOxSjavL-vF4yZRacrzJK0FKBBpoVNRixoKkSITXAgllOZa1lqqzHDBeMMUzxsugCsJJWRYQK0Zm5L5qVd5F4LXphq83Ut_qBCqo6XqbKk6WxqJhxMxyKBkZ7zslQ3_WAqsxFwA-wW-7Wd2</recordid><startdate>20080325</startdate><enddate>20080325</enddate><creator>LI, Man-Lap</creator><creator>RAMACHANDRAN, Pradeep</creator><creator>SAHOO, Swamp K</creator><creator>ADVE, Sarita V</creator><creator>ADVE, Vikram S</creator><creator>YUANYUAN ZHOU</creator><general>Association for Computing Machinery</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20080325</creationdate><title>Understanding the Propagation of Hard Errors to Software and Implications for Resilient System Design</title><author>LI, Man-Lap ; RAMACHANDRAN, Pradeep ; SAHOO, Swamp K ; ADVE, Sarita V ; ADVE, Vikram S ; YUANYUAN ZHOU</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2275-2b90c0926e29b9b0692139799c9ce7eabeac4f7937d3c75d7907ca0804160be33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computers, microcomputers</topic><topic>Electronics</topic><topic>Exact sciences and technology</topic><topic>Hardware</topic><topic>Language processing and microprogramming</topic><topic>Programming languages</topic><topic>Software</topic><toplevel>online_resources</toplevel><creatorcontrib>LI, Man-Lap</creatorcontrib><creatorcontrib>RAMACHANDRAN, Pradeep</creatorcontrib><creatorcontrib>SAHOO, Swamp K</creatorcontrib><creatorcontrib>ADVE, Sarita V</creatorcontrib><creatorcontrib>ADVE, Vikram S</creatorcontrib><creatorcontrib>YUANYUAN ZHOU</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>LI, Man-Lap</au><au>RAMACHANDRAN, Pradeep</au><au>SAHOO, Swamp K</au><au>ADVE, Sarita V</au><au>ADVE, Vikram S</au><au>YUANYUAN ZHOU</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Understanding the Propagation of Hard Errors to Software and Implications for Resilient System Design</atitle><btitle>Operating systems review</btitle><date>2008-03-25</date><risdate>2008</risdate><volume>42</volume><issue>2</issue><spage>265</spage><epage>276</epage><pages>265-276</pages><issn>0163-5980</issn><eissn>1943-586X</eissn><coden>OSRED8</coden><abstract>With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. We explore a cooperative hardware-software solution that watches for anomalous software behavior to indicate the presence of hardware faults. Fundamental to such a solution is a characterization of how hardware faults indifferent microarchitectural structures of a modern processor propagate through the application and OS. This paper aims to provide such a characterization, resulting in identifying low-cost detection methods and providing guidelines for implementation of the recovery and diagnosis components of such a reliability solution. We focus on hard faults because they are increasingly important and have different system implications than the much studied transients. We achieve our goals through fault injection experiments with a microarchitecture-level full system timing simulator. Our main results are: (1) we are able to detect 95% of the unmasked faults in 7 out of 8 studied microarchitectural structures with simple detectors that incur zero to little hardware overhead; (2) over 86% of these detections are within latencies that existing hardware checkpointing schemes can handle, while others require software checkpointing; and (3) a surprisingly large fraction of the detected faults corrupt OS state, but almost all of these are detected with latencies short enough to use hardware checkpointing, thereby enabling OS recovery in virtually all such cases.</abstract><cop>New York, NY</cop><pub>Association for Computing Machinery</pub><doi>10.1145/1353535.1346315</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0163-5980
ispartof Operating systems review, 2008, Vol.42 (2), p.265-276
issn 0163-5980
1943-586X
language eng
recordid cdi_crossref_primary_10_1145_1353535_1346315
source ACM Digital Library
subjects Applied sciences
Computer science
control theory
systems
Computers, microcomputers
Electronics
Exact sciences and technology
Hardware
Language processing and microprogramming
Programming languages
Software
title Understanding the Propagation of Hard Errors to Software and Implications for Resilient System Design
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T16%3A13%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Understanding%20the%20Propagation%20of%20Hard%20Errors%20to%20Software%20and%20Implications%20for%20Resilient%20System%20Design&rft.btitle=Operating%20systems%20review&rft.au=LI,%20Man-Lap&rft.date=2008-03-25&rft.volume=42&rft.issue=2&rft.spage=265&rft.epage=276&rft.pages=265-276&rft.issn=0163-5980&rft.eissn=1943-586X&rft.coden=OSRED8&rft_id=info:doi/10.1145/1353535.1346315&rft_dat=%3Cpascalfrancis_cross%3E20381590%3C/pascalfrancis_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true