📄 d4.1
字号:
.TH DINEROIV 1.UC 4.SH NAMEdineroIV \- fourth generation cache simulator.SH SYNOPSIS.B dineroIV[options].SH DESCRIPTIONThe.I dineroIVcommand is a trace-driven cache simulator based on the.I dineroIVlibrary, documented separately..PPThe basic operation is to read memory reference trace recordsfrom the standard input,process them through one or more simulated caches forming a memory hierarchy,and write statistics on the standard output..SH OPTIONSSome options control overall operation,while others specify the basic parameters and arrangementof the caches to be simulated.In the following list of options,.I Fis a string,.I Uis an unsigned decimal integer,.I Cis a single character,.I Ais a hexadecimal address, and.I Sis like.IR U ,but with an optional scaling suffix character (one of.BR kKmMgG ,for multiplication by 0x400, 0x100000, or 0x40000000)..I Pis like.IR S ,but must be a power of 2,.I Nis a cache level (1 \(<=.IR N ),where level 1 is closest to the processor, and.I Tis a cache type (\f3u\fP\(equnified, \f3i\fP\(eqinstruction, \f3d\fP\(eqdata)..PPSome global options take 0 or 1 argument,while options that specify characteristics of a particular cachetypically involve 2 or 3 arguments, with the cache level and typebeing incorporated into the option name as indicated..TP 18n.B \-helpPrint a synopsis of all the options and defaults.No simulation is done..TP 18n.B \-copyrightDescribe copyright terms for.IR dineroIV ..TP 18n.B \-contactTell how to get the latest version of Dinero IVand how to contact the authors.This information is also available below, in.B AUTHORSand.BR COPYRIGHT ..TP 18n.B \-dineroIIIShow what.I dineroIVcommand line arguments corespond to each.I dineroIIIargument..IP "\f3\-custom\fP \f2F\fP" 18nGenerate and run a customized version of the simulator,with the resulting executable named.IR F .Most cache parameters are fixed and made into constants,with a resulting performance boost that is somewhat variable,but generally recommended for lengthy simulations.The fixed options are unsettable in the customized program;run.I Fwith the.B \-helpoption to see exactly which options are still available..I Fis not removed following simulation,so it can be used for more than one run.The.I dineroIVsource code must be available and properly configured for.B \-customto work, with the.B D4_SRCenvironment variable naming the directory..IP "\f3\-skipcount\fP \f2U\fP" 18nDisregard the initial.I Umemory references from the standard input..IP "\f3\-flushcount\fP \f2U\fP" 18nFlush the cache after processing every.I Ureferences read from the standard input..IP "\f3\-maxcount\fP \f2U\fP" 18nStop the simulation after processing.I Ureferences read from the standard input..IP "\f3\-stat\-interval\fP \f2U\fP" 18nShow statistics after processing every.I Ureferences read from the standard input.This is in addition to the statistics producedat the end of the full simulation..IP "\f3\-informat\fP \f2C\fP" 18nSelect the input trace format as indicated by.I C(\f3D\fP\(eqextended din, \f3d\fP\(eqtraditional din, \f3p\fP\(eqpixie32, \f3P\fP\(eqpixie64, \f3b\fP\(eqbinary).The exact current list of choices is given by the.B \-helpoption.The default input format is.BR D .See.BR "TRACE RECORDS" ,below,for more information..IP "\f3\-on\-trigger\fP \f2A\fP" 18nDisregard trace records until one with address.I Ais seen..IP "\f3\-off\-trigger\fP \f2A\fP" 18nDisregard trace records after seeing one with address.IR A ..TP 18n.B \-stat\-idcombineCombine the statistics for separate instruction and data caches..IP "\f3\-l\fP\f2N\fP\f3\-\fP\f2T\fP\f3bsize\fP \f2P\fP" 18nSet the block size of the specified level.I Ncache to.I Pbytes..IP "\f3\-l\fP\f2N\fP\f3\-\fP\f2T\fP\f3sbsize\fP \f2P\fP" 18nSet the sub-block size of the specified level.I Ncache to.I Pbytes.If not specified, sub-blocks are not used(i.e., sub-block size \(eq block size)..IP "\f3\-l\fP\f2N\fP\f3\-\fP\f2T\fP\f3size\fP \f2P\fP" 18nSet the cache size of the specified level.I Ncache to.I Pbytes..IP "\f3\-l\fP\f2N\fP\f3\-\fP\f2T\fP\f3assoc\fP \f2U\fP" 18nSet the associativity of the specified level.I Ncache to.IR U ..IP "\f3\-l\fP\f2N\fP\f3\-\fP\f2T\fP\f3repl\fP \f2C\fP" 18nSet the replacement policy of the specified level.I Ncache to.I C(\f3l\fP\(eqLRU, \f3f\fP\(eqFIFO, \f3r\fP\(eqrandom).The exact current list of choices is given by the.B \-helpoption..IP "\f3\-l\fP\f2N\fP\f3\-\fP\f2T\fP\f3fetch\fP \f2C\fP" 18nSet the fetch policy of the specified level.I Ncache to.I C(\f3d\fP\(eqdemand, \f3a\fP\(eqalways, \f3m\fP\(eqmiss,\f3t\fP\(eqtagged, \f3l\fP\(eqload forward, \f3s\fP\(eqsub-block).The exact current list of choices is given by the.B \-helpoption.Further information on fetch policies is given in.IR dineroIV (3)..IP "\f3\-l\fP\f2N\fP\f3\-\fP\f2T\fP\f3pfdist\fP \f2U\fP" 18nSet the prefetch distance of the specified level.I Ncache to.I Usub-blocks.The default is 1.This option is not valid for the.B dfetch policy, where no prefetching will happen..IP "\f3\-l\fP\f2N\fP\f3\-\fP\f2T\fP\f3pfabort\fP \f2U\fP" 18nSet the prefetch abort percentage of the specified level.I Ncache to.I U(0\-100).The default is 0.The specified percentage of prefetch requests will be randomly chosento be aborted, i.e., not happen.This option is not valid for the.B dfetch policy, where no prefetching will happen..IP "\f3\-l\fP\f2N\fP\f3\-\fP\f2T\fP\f3walloc\fP \f2C\fP" 18nSet the write allocate policy of the specified level.I Ncache to.I C(\f3a\fP\(eqalways, \f3n\fP\(eqnever, \f3f\fP\(eqnofetch).The exact current list of choices is given by the.B \-helpoption.Further information on write allocate policies is given in.IR dineroIV (3)..IP "\f3\-l\fP\f2N\fP\f3\-\fP\f2T\fP\f3wback\fP \f2C\fP" 18nSet the write back policy of the specified level.I Ncache to.I C(\f3a\fP\(eqalways, \f3n\fP\(eqnever, \f3f\fP\(eqnofetch).The exact current list of choices is given by the.B \-helpoption.Further information on write back policies is given in.IR dineroIV (3)..IP "\f3\-l\fP\f2N\fP\f3\-\fP\f2T\fP\f3ccc\fP" 18nCompute Compulsory/Capacity/Conflict miss rates for the specified level.I Ncache..SH "TRACE RECORDS"A.I dineroIVtrace record, as processed internally,consists of three things: an access type, an address, and a size.The following access types are supported:.IP \(bu 3nRead..IP \(bu 3nWrite..IP \(bu 3nInstruction fetch..IP \(bu 3nMiscellaneous.These references are treated like reads,but they never generate prefetches..IP \(bu 3nCopy-back dirty (sub-)block(s), with no invalidation implied.This affects the whole cache if the indicated size is 0..IP \(bu 3nInvalidate block(s), with no copy-back implied.This affects the whole cache if the indicated size is 0..PPThere are no internal restrictions on what constitutes a valid address,except that the size of an address is platform-dependent(generally 32 bits or more).The size value of a trace record indicates the number of bytes affected.Dinero IV imposes no size or alignment restrictions on memory references;they may span multiple sub-blocks or blocks..PPThe following input formats are supported by the.B \-informatoption:.TP 4n.B dThe traditional ``din'' format of Dinero III.Two fields are examined per line: access type and address.The access type is numeric:0 for read, 1 for write, 2 for instruction fetch, 3 for miscellaneous,4 for copy-back, and 5 for invalidate.The address is hexadecimal, beginning with an optional ``0x'' or ``0X''.Fields are separated by white space (space or tab),and everything following the first two fields of a line is ignored.To approximate the behavior of Dinero III,addresses are silently rounded down to a multiple of 4 bytes,and the data size for reads and writes is always assumed to be 4 bytes..TP 4n.B DAn extended version of the traditional Dinero III input format,where each line contains three significant fields.The first field, specifying the access type, is a single letter.RB ( rwimcv )to indicate one of the access types described above.The second field is the hexadecimal address,and the third field is the hexadecimal size.A leading ``0x'' or ``0X'' is ignored at the beginning of each hexadecimal field.Fields are separated by white space (space or tab),and everything following the first three fields of a line is ignored..TP 4n.B pThe format produced by.B "pixie \-idtrace"on SGI IRIX systems..TP 4n.B PThe format produced by.B "pixie \-idtrace_ext"on SGI IRIX systems..TP 4n.B bA binary format, consisting of a four byte little-endian address,a 2-byte little-endian size, a 1-byte access type, and a byte of padding..SH FILESFor the.B \-customoption, the location of the Dinero IV source files is given by the.B D4_SRCenvironment variable..SH "SEE ALSO"dineroIV (3)..SH AUTHORJan Edler and Mark D. Hill(edler@research.nj.nec.com and markhill@cs.wisc.edu, respectively)..PPThe latest version of Dinero IV can be obtained from.brftp://ftp.nj.nec.com/pub/edler/d4-\f2X\fP.tgz.brwhere \f2X\fP is the latest version number..SH COPYRIGHT.PPCopyright (C) 1997 NEC Research Institute, Inc. and Mark D. Hill..brAll rights reserved..brCopyright (C) 1985, 1989 Mark D. Hill. All rights reserved..PPPermission to use, copy, modify, and distribute this software andits associated documentation for non-commercial purposes is herebygranted (for commercial purposes see below), provided that the abovecopyright notice appears in all copies, derivative works or modifiedversions of the software and any portions thereof, and that both thecopyright notice and this permission notice appear in the documentation.NEC Research Institute Inc. and Mark D. Hill shall be given a copy ofany such derivative work or modified version of the software and NECResearch Institute Inc. and any of its affiliated companies (collectivelyreferred to as NECI) and Mark D. Hill shall be granted permission to use,copy, modify, and distribute the software for internal use and research.The name of NEC Research Institute Inc. and its affiliated companiesshall not be used in advertising or publicity related to the distributionof the software, without the prior written consent of NECI. All copies,derivative works, or modified versions of the software shall be exportedor reexported in accordance with applicable laws and regulations relatingto export control. This software is experimental. NECI and Mark D. Hillmake no representations regarding the suitability of this software forany purpose and neither NECI nor Mark D. Hill will support the software..PPUse of this software for commercial purposes is also possible, but onlyif, in addition to the above requirements for non-commercial use, writtenpermission for such use is obtained by the commercial user from NECI orMark D. Hill prior to the fabrication and distribution of the software..PPTHE SOFTWARE IS PROVIDED AS IS. NECI AND MARK D. HILL DO NOT MAKEANY WARRANTEES EITHER EXPRESS OR IMPLIED WITH REGARD TO THE SOFTWARE.NECI AND MARK D. HILL ALSO DISCLAIM ANY WARRANTY THAT THE SOFTWARE ISFREE OF INFRINGEMENT OF ANY INTELLECTUAL PROPERTY RIGHTS OF OTHERS.NO OTHER LICENSE EXPRESS OR IMPLIED IS HEREBY GRANTED. NECI AND MARKD. HILL SHALL NOT BE LIABLE FOR ANY DAMAGES, INCLUDING GENERAL, SPECIAL,INCIDENTAL, OR CONSEQUENTIAL DAMAGES, ARISING OUT OF THE USE OR INABILITYTO USE THE SOFTWARE.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -