Table-driven signature error detection algorithm

A technology of error detection and detection algorithm, applied in the direction of error detection/correction, calculation, software testing/debugging, etc., can solve problems such as illegal branches, and achieve the effect of improving coverage

Inactive Publication Date: 2017-10-27
STATE GRID ZHEJIANG ELECTRIC POWER +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This algorithm well solves the problem of error detection of legal branches, illegal branches and illegal branches with two shared branch fan-in nodes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Table-driven signature error detection algorithm
  • Table-driven signature error detection algorithm
  • Table-driven signature error detection algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0031] attached figure 1 is the detection of allowed execution branches without shared fan-in nodes, and all basic blocks in the figure have been identified and numbered. as attached figure 1 As shown on the left, each basic block is assigned a different value equal to its own position identifier. attached figure 1 The right side shows how the check instruction performs error detection. When the program executes to v3, the comparison of SS3 with CFID[Reg, SS3] shall be performed first before proceeding to execute the instructions in v3. Reg is a global variable used to store dynamic signatures, which are stored in allocated registers. If the equality relationship between SS3 and CFID[Reg, SS3] is established, that is, if brReg,3 is a legal branch, Reg will be updated to SS3, and the original instructions in the basic block will continue to be executed until the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a table-driven signature error detection algorithm. According to the algorithm, information of a control flow graph is stored in a two-dimensional table (CFID table) based on a finite state machine (FSM) theory; and by comparing signatures in basic blocks with signatures stored in the CFID table, illegal instruction skip is detected out. Illegal instruction skip errors, incapable of being detected by a CFCSS algorithm, of shared branch fan-in nodes can be successfully detected. An experimental result shows that the average error detection coverage rate reaches 98.1%, and the number of error detection instructions inserted in each basic block is smaller than that of the error detection instructions inserted in CFCSS.

Description

technical field [0001] The present invention relates to the technical field of pure software error detection, specifically a table-driven signature error detection algorithm (EDSS), which is applied to legal branches, illegal branches and illegal branches with two shared branch fan-in nodes etc. error detection. Background technique [0002] As technology develops, improvements in microprocessor performance will increasingly rely on smaller, faster transistors while achieving low threshold voltages and tighter noise margins. However, this general need to improve performance and reduce power consumption often leads to many reliability problems. Unlike frequent errors such as manufacturing and design errors, temporary errors (also often referred to as soft errors), resulting from environmental effects such as electromagnetic interference, voltage glitches, or high-energy particles, often lead to unpredictable behavior . The most typical soft error is single event upset (SEU...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
CPCG06F11/3612G06F11/3636
Inventor 沈潇军姚一杨戴波陈建孔晓昀龚小刚戚伟强王以良耿继朴陈可邢雅菲刘雄侯麟毛大鹏吴翔琚小明
Owner STATE GRID ZHEJIANG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products