A fault injection analysis of Linux operating on an FPGA-embedded platform

17Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

An FPGA-based Linux test-bed was constructed for the purpose of measuring its sensitivity to single-event upsets. The test-bed consists of two ML410 Xilinx development boards connected using a 124-pin custom connector board. The Design Under Test (DUT) consists of the "hard core" PowerPC, running the Linux OS and several peripherals implemented in "soft" (programmable) logic. Faults were injected via the Internal Configuration Access Port (ICAP). The experiments performed here demonstrate that the Linux-based system was sensitive to 199,584 or about 1.4 percent of all tested bits. Each sensitive bit in the bit-stream is mapped to the resource and user-module to which it configures. A density metric for comparing the reliability of modules within the system is presented. Using this density metric, we found that the most sensitive user module in the design was the PowerPC's direct connections to the DDR2 memory controller. Copyright © 2012 Joshua S. Monson et al.

Cite

CITATION STYLE

APA

Monson, J. S., Wirthlin, M., & Hutchings, B. (2012). A fault injection analysis of Linux operating on an FPGA-embedded platform. International Journal of Reconfigurable Computing, 2012. https://doi.org/10.1155/2012/850487

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free