Understanding the propagation of hard errors to software and implications for resilient system design
With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. We explore a cooperative hardware-software solution that watches...
Gespeichert in:
Veröffentlicht in: | SIGPLAN notices 2008-03, Vol.43 (3), p.265-276 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 276 |
---|---|
container_issue | 3 |
container_start_page | 265 |
container_title | SIGPLAN notices |
container_volume | 43 |
creator | Li, Man-Lap Ramachandran, Pradeep Sahoo, Swarup Kumar Adve, Sarita V. Adve, Vikram S. Zhou, Yuanyuan |
description | With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. We explore a cooperative hardware-software solution that watches for anomalous software behavior to indicate the presence of hardware faults. Fundamental to such a solution is a characterization of how hardware faults indifferent microarchitectural structures of a modern processor propagate through the application and OS.
This paper aims to provide such a characterization, resulting in identifying low-cost detection methods and providing guidelines for implementation of the recovery and diagnosis components of such a reliability solution. We focus on hard faults because they are increasingly important and have different system implications than the much studied transients. We achieve our goals through fault injection experiments with a microarchitecture-level full system timing simulator. Our main results are: (1) we are able to detect 95% of the unmasked faults in 7 out of 8 studied microarchitectural structures with simple detectors that incur zero to little hardware overhead; (2) over 86% of these detections are within latencies that existing hardware checkpointing schemes can handle, while others require software checkpointing; and (3) a surprisingly large fraction of the detected faults corrupt OS state, but almost all of these are detected with latencies short enough to use hardware checkpointing, thereby enabling OS recovery in virtually all such cases. |
doi_str_mv | 10.1145/1353536.1346315 |
format | Article |
fullrecord | <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_1145_1353536_1346315</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1145_1353536_1346315</sourcerecordid><originalsourceid>FETCH-LOGICAL-c312t-895d0902bb1827807563358c055ae1194dbd44e448494cd0e98ca143441e022b3</originalsourceid><addsrcrecordid>eNotkEtrwzAQhEVpoW7ac6_6A0529XDkYwl9QaCX5mxka-2oxJaRBCX_vm4b5jAwM7uHj7FHhDWi0huUelG1RqkqifqKFai1KREruGYFyEqUSwW37C6lLwCQIEzB6DA5iinbyflp4PlIfI5htoPNPkw89Pxoo-MUY4iJ58BT6PO3jcSXC-7H-eS7v2nifYg8UvInT1Pm6ZwyjdwtwTDds5venhI9XHzFDi_Pn7u3cv_x-r572pedRJFLU2sHNYi2RSO2Bra6klKbDrS2hFgr1zqlSCmjatU5oNp0FpVUCgmEaOWKbf7_djGkFKlv5uhHG88NQvNLqblQai6U5A_Ixlq2</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Understanding the propagation of hard errors to software and implications for resilient system design</title><source>ACM Digital Library Complete</source><creator>Li, Man-Lap ; Ramachandran, Pradeep ; Sahoo, Swarup Kumar ; Adve, Sarita V. ; Adve, Vikram S. ; Zhou, Yuanyuan</creator><creatorcontrib>Li, Man-Lap ; Ramachandran, Pradeep ; Sahoo, Swarup Kumar ; Adve, Sarita V. ; Adve, Vikram S. ; Zhou, Yuanyuan</creatorcontrib><description>With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. We explore a cooperative hardware-software solution that watches for anomalous software behavior to indicate the presence of hardware faults. Fundamental to such a solution is a characterization of how hardware faults indifferent microarchitectural structures of a modern processor propagate through the application and OS.
This paper aims to provide such a characterization, resulting in identifying low-cost detection methods and providing guidelines for implementation of the recovery and diagnosis components of such a reliability solution. We focus on hard faults because they are increasingly important and have different system implications than the much studied transients. We achieve our goals through fault injection experiments with a microarchitecture-level full system timing simulator. Our main results are: (1) we are able to detect 95% of the unmasked faults in 7 out of 8 studied microarchitectural structures with simple detectors that incur zero to little hardware overhead; (2) over 86% of these detections are within latencies that existing hardware checkpointing schemes can handle, while others require software checkpointing; and (3) a surprisingly large fraction of the detected faults corrupt OS state, but almost all of these are detected with latencies short enough to use hardware checkpointing, thereby enabling OS recovery in virtually all such cases.</description><identifier>ISSN: 0362-1340</identifier><identifier>EISSN: 1558-1160</identifier><identifier>DOI: 10.1145/1353536.1346315</identifier><language>eng</language><ispartof>SIGPLAN notices, 2008-03, Vol.43 (3), p.265-276</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c312t-895d0902bb1827807563358c055ae1194dbd44e448494cd0e98ca143441e022b3</citedby><cites>FETCH-LOGICAL-c312t-895d0902bb1827807563358c055ae1194dbd44e448494cd0e98ca143441e022b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Li, Man-Lap</creatorcontrib><creatorcontrib>Ramachandran, Pradeep</creatorcontrib><creatorcontrib>Sahoo, Swarup Kumar</creatorcontrib><creatorcontrib>Adve, Sarita V.</creatorcontrib><creatorcontrib>Adve, Vikram S.</creatorcontrib><creatorcontrib>Zhou, Yuanyuan</creatorcontrib><title>Understanding the propagation of hard errors to software and implications for resilient system design</title><title>SIGPLAN notices</title><description>With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. We explore a cooperative hardware-software solution that watches for anomalous software behavior to indicate the presence of hardware faults. Fundamental to such a solution is a characterization of how hardware faults indifferent microarchitectural structures of a modern processor propagate through the application and OS.
This paper aims to provide such a characterization, resulting in identifying low-cost detection methods and providing guidelines for implementation of the recovery and diagnosis components of such a reliability solution. We focus on hard faults because they are increasingly important and have different system implications than the much studied transients. We achieve our goals through fault injection experiments with a microarchitecture-level full system timing simulator. Our main results are: (1) we are able to detect 95% of the unmasked faults in 7 out of 8 studied microarchitectural structures with simple detectors that incur zero to little hardware overhead; (2) over 86% of these detections are within latencies that existing hardware checkpointing schemes can handle, while others require software checkpointing; and (3) a surprisingly large fraction of the detected faults corrupt OS state, but almost all of these are detected with latencies short enough to use hardware checkpointing, thereby enabling OS recovery in virtually all such cases.</description><issn>0362-1340</issn><issn>1558-1160</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><recordid>eNotkEtrwzAQhEVpoW7ac6_6A0529XDkYwl9QaCX5mxka-2oxJaRBCX_vm4b5jAwM7uHj7FHhDWi0huUelG1RqkqifqKFai1KREruGYFyEqUSwW37C6lLwCQIEzB6DA5iinbyflp4PlIfI5htoPNPkw89Pxoo-MUY4iJ58BT6PO3jcSXC-7H-eS7v2nifYg8UvInT1Pm6ZwyjdwtwTDds5venhI9XHzFDi_Pn7u3cv_x-r572pedRJFLU2sHNYi2RSO2Bra6klKbDrS2hFgr1zqlSCmjatU5oNp0FpVUCgmEaOWKbf7_djGkFKlv5uhHG88NQvNLqblQai6U5A_Ixlq2</recordid><startdate>20080325</startdate><enddate>20080325</enddate><creator>Li, Man-Lap</creator><creator>Ramachandran, Pradeep</creator><creator>Sahoo, Swarup Kumar</creator><creator>Adve, Sarita V.</creator><creator>Adve, Vikram S.</creator><creator>Zhou, Yuanyuan</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20080325</creationdate><title>Understanding the propagation of hard errors to software and implications for resilient system design</title><author>Li, Man-Lap ; Ramachandran, Pradeep ; Sahoo, Swarup Kumar ; Adve, Sarita V. ; Adve, Vikram S. ; Zhou, Yuanyuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c312t-895d0902bb1827807563358c055ae1194dbd44e448494cd0e98ca143441e022b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Li, Man-Lap</creatorcontrib><creatorcontrib>Ramachandran, Pradeep</creatorcontrib><creatorcontrib>Sahoo, Swarup Kumar</creatorcontrib><creatorcontrib>Adve, Sarita V.</creatorcontrib><creatorcontrib>Adve, Vikram S.</creatorcontrib><creatorcontrib>Zhou, Yuanyuan</creatorcontrib><collection>CrossRef</collection><jtitle>SIGPLAN notices</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Man-Lap</au><au>Ramachandran, Pradeep</au><au>Sahoo, Swarup Kumar</au><au>Adve, Sarita V.</au><au>Adve, Vikram S.</au><au>Zhou, Yuanyuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Understanding the propagation of hard errors to software and implications for resilient system design</atitle><jtitle>SIGPLAN notices</jtitle><date>2008-03-25</date><risdate>2008</risdate><volume>43</volume><issue>3</issue><spage>265</spage><epage>276</epage><pages>265-276</pages><issn>0362-1340</issn><eissn>1558-1160</eissn><abstract>With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. We explore a cooperative hardware-software solution that watches for anomalous software behavior to indicate the presence of hardware faults. Fundamental to such a solution is a characterization of how hardware faults indifferent microarchitectural structures of a modern processor propagate through the application and OS.
This paper aims to provide such a characterization, resulting in identifying low-cost detection methods and providing guidelines for implementation of the recovery and diagnosis components of such a reliability solution. We focus on hard faults because they are increasingly important and have different system implications than the much studied transients. We achieve our goals through fault injection experiments with a microarchitecture-level full system timing simulator. Our main results are: (1) we are able to detect 95% of the unmasked faults in 7 out of 8 studied microarchitectural structures with simple detectors that incur zero to little hardware overhead; (2) over 86% of these detections are within latencies that existing hardware checkpointing schemes can handle, while others require software checkpointing; and (3) a surprisingly large fraction of the detected faults corrupt OS state, but almost all of these are detected with latencies short enough to use hardware checkpointing, thereby enabling OS recovery in virtually all such cases.</abstract><doi>10.1145/1353536.1346315</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0362-1340 |
ispartof | SIGPLAN notices, 2008-03, Vol.43 (3), p.265-276 |
issn | 0362-1340 1558-1160 |
language | eng |
recordid | cdi_crossref_primary_10_1145_1353536_1346315 |
source | ACM Digital Library Complete |
title | Understanding the propagation of hard errors to software and implications for resilient system design |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T13%3A56%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Understanding%20the%20propagation%20of%20hard%20errors%20to%20software%20and%20implications%20for%20resilient%20system%20design&rft.jtitle=SIGPLAN%20notices&rft.au=Li,%20Man-Lap&rft.date=2008-03-25&rft.volume=43&rft.issue=3&rft.spage=265&rft.epage=276&rft.pages=265-276&rft.issn=0362-1340&rft.eissn=1558-1160&rft_id=info:doi/10.1145/1353536.1346315&rft_dat=%3Ccrossref%3E10_1145_1353536_1346315%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |