⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 cheetah.1

📁 RISC处理器仿真分析程序。可以用于研究通用RISC处理器的指令和架构设计。在linux下编译
💻 1
字号:
.TH cheetah 1.SH NAMEcheetah \- Single-pass simulator for direct-mapped, set-associative and fullyassociative caches..SH SYNTAX.B cheetah[.B \-options].SH DESCRIPTION.I cheetahis a cache simulation package which can simulate various cacheconfigurations.It is a collection of single-pass simulators which simulate ranges ofdirect-mapped,  set-associative and fully-associative caches.The input to.I cheetahis a memory address trace in one of three formats:.PP(i) A binary format where the trace is a sequence of fourbyte addresses.This is the format that is actually used in the simulator,and hence no internalconversion step is required. If the trace format you have isnot among those supportedby.I cheetahit is most efficient to convert it to the binary formatfor use with.I cheetah..PP(ii) The pixie format, where the trace is as output by the .I pixietool available on MIPS processor based workstations..PP(iii) The.I DINformat, developed by Mark Hill, and used by earliercache simulators such as.I Tychoand.I Dinero III..PP.I cheetahoutputs the miss ratios of the various caches simulated..PP.I cheetahuses efficient single-pass simulation algorithms, and soin each simulationrun it can determine the miss-ratios of a range of cache configurations.It exploits inclusion and other relations that hold between cache configurationsto significantly speedup the simulation.When many cache configurations need to be simulated on several tracesthe use of.I cheetahshould greatly improve the efficiency of the process overrunning a large number of simulations with simple one-cache-at-a-timesimulators..I Tycho(Mark Hill 1989)is an earlier cache simulation package that also used single-pass simulationalgorithms for simulating multiple LRU set-associative caches. Thecapabilities of.I cheetahare a superset of those of Tycho. Further, the algorithmthat.I cheetahuses to simulate set-associative caches is more efficientboth in terms of simulation time and memory requirements that the one usedin Tycho..PP.I cheetahcan simulate caches under LRU and OPT replacement strategies.With OPT replacement the set-associative simulators permit cache bypass.That is, on a miss the referenced line is installed in cache only if itspriority is high enough.OPT replacement is done by doing a limited look-ahead in the trace andfixing errors in the stack using a stack repair procedure..PPFor further details on the algorithms used in.I cheetahplease see the publicationsreferenced below..PP.SH OPTIONS(If the option is not specified, the corresponding parameter takesa default value in all cases.).PP.I cheetahhas four major options which set the replacement strategy, the cache configuration,the trace format and the trace type..TP 5.BI \-R replUsed to specify the replacement strategy.Replacement policies that are currently supported are.I lruand.I opt.(default .I lru).TP 5.BI \-C configUsed to specify the configuration. Configuration can be one of.RS.TP 10.I faSimulate fully-associative caches..TP.I saSimulate set-associative caches..TP.I dmSimulate direct-mapped caches.Direct\-mapped should be specified only if direct\-mappedcaches of varying line sizesbut constant size need to be simulated. Direct\-mapped caches of varying sizesmay be simulated by setting the configuration to set-associative and the maximumassociativity to one..PPThe default configuration is.I sa..RE.TP 5.BI \-F formatUsed to specify the trace format. Currently, the trace format can be one of.RS.TP 10.I pixieTrace as generated by pixie..TP.I dinTrace in the DIN format (Mark Hill)..TP.I basicTrace is a sequence of four byte addresses..PPThe default format is.I basic..RE.TP 5.BI \-T typeUsed to specify the trace type..I i[nstruction]for instruction traces,.I d[ata]for data traces and .I u[nified]for unified instruction and data traces may bespecified. This option is ignored for the basic trace format.The default trace type is.I unified..PPAlong with the above four major options,for each configuration a set of options are recognized that serveto set various parameter values.Options that are valid for all configurations are first described, followedby the specific options for each of the three configurations..PPThe following options are used for all configurations and set the input/outputfiles and other global simulation parameters..TP 5.BI \-t numberSpecifies an upper limit on the number of addresses processed (default 1 billion)..TP.BI \-f fileSpecifies the input file (default stdin)..TP.BI \-o fileSpecifies the output file (default stdout)..TP.BI \-p numberSpecifies the intervals at which simulation progress should be printed.Useful for checking the status of the simulation (default 10 million)..TP.BI \-s numberSpecifies the intervals at which intermediate results should be saved to theoutput file..PPThe following options are used when the configuration isset-associative to set parameter values and ranges.All logs are to base 2..TP 5.BI \-a numberSpecifies the log of the minimum number of sets (default 7)..TP.BI \-b numberSpecifies the log of the maximum number of sets (default 14)..TP.BI \-l numberSpecifies the log of the line size of the caches (default 4)..TP.BI \-n numberSpecifies the log of the maximum degree of associativity (default 1)..PPThe following options are used when the configuration is fully-associativeto set parameter values..TP 5.BI \-l numberSpecifies the log of the line size of the caches (default 4)..TP.BI \-i numberSpecifies the cache size intervals at which the miss ratio is desiredIf this is less than the line size it is set to the line size (default 512 bytes)..TP.BI \-M numberSpecifies the maximum cache size of interest.When the contents of the stack go beyond this limit entriesare deleted from the bottom of the stack. This is primarily toavoid thrashing (default 512 Kbytes)..PPThe following options are used when the configuration isdirect-mapped to set parameter values.TP 5.BI \-a numberSpecifies the log of the minimum line size (default 7)..TP.BI \-b numberSpecifies the log of the maximum line size (default 14)..TP.BI \-c numberSpecifies the log of the cache size (default 16)..PP.SH EXAMPLEcheetah -Csa -Fbasic -Tu -Rlru -a5 -b14 -l4 -n2 -t1000000 -ftfile -oresults.PPDetermines the miss ratios of set-associative caches with number of setsranging from 32 (2^5) to 16384 (2^14), and associativities ranging from1 to 4 (2^2), with a line size of 16 (2^4) bytes.The input trace format is .I basicand is read from the file.I tfile.A unified instruction and data cache is simulated on thefirst 1 million addresses in the trace.The output is written to the file.I results..PP.SH BUGSCurrently,.I cheetahcannot handle traces that are longer than2^31 addresses..PPWith OPT replacement, the memory requirement is not bounded, and thrashingmight occur with some traces..PPThe conversion routine for DIN traces is simple and not very efficient.If you use DIN traces often it would help to make this routinemore efficient..PPThe package has not been thoroughly debugged on 64-bit architectures suchas the KSR and the DEC Alpha..PP.SH AUTHORSRabin A. Sugumar (rabin@eecs.umich.edu) and Santosh G. Abraham (sga@eecs.umich.edu),The University of Michigan..PP.SH SEE ALSOpixie (1), dineroIII ().PPRabin A. Sugumar and Santosh G. Abraham, ``Efficient Simulation of Caches usingBinomial Trees'', Technical Report CSE TR-111-91, University of Michigan, 1991..PPRabin A. Sugumar and Santosh G. Abraham, ``Efficient Simulation of Caches underOPT replacement with Applications to Miss Characterization,'' in the proceedingsof the 1993 ACM SIGMETRICS Conference.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -