A fault injection analysis of Linux operating on an FPGA-embedded platform

  • Authors:
  • Joshua S. Monson;Mike Wirthlin;Brad Hutchings

  • Affiliations:
  • Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT;Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT;Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT

  • Venue:
  • International Journal of Reconfigurable Computing - Special issue on Selected Papers from the International Conference on Reconfigurable Computing and FPGAs (ReConFig'10)
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

An FPGA-based Linux test-bed was constructed for the purpose of measuring its sensitivity to single-event upsets. The test-bed consists of two ML410 Xilinx development boards connected using a 124-pin custom connector board. The Design Under Test (DUT) consists of the "hard core" PowerPC, running the Linux OS and several peripherals implemented in "soft" (programmable) logic. Faults were injected via the Internal Configuration Access Port (ICAP). The experiments performed here demonstrate that the Linux-based system was sensitive to 199,584 or about 1.4 percent of all tested bits. Each sensitive bit in the bit-stream is mapped to the resource and user-module to which it configures. A density metric for comparing the reliability of modules within the system is presented. Using this density metric, we found that the most sensitive user module in the design was the PowerPC's direct connections to the DDR2 memory controller.