2011 International Conference on Parallel Processing 2011
DOI: 10.1109/icpp.2011.15
|View full text |Cite
|
Sign up to set email alerts
|

Cache Pirating: Measuring the Curse of the Shared Cache

Abstract: We present a low-overhead method for accurately measuring application performance (CPI) and off-chip bandwidth (GB/s) as a function of its the available shared cache capacity, on real hardware, with no modifications to the application or operating system. We accomplish this by co-running a Pirate application that "steals" cache space with the Target application. By adjusting how much space the Pirate steals during the Target's execution, and using hardware performance counters to record the Target's performanc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
47
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 56 publications
(47 citation statements)
references
References 18 publications
0
47
0
Order By: Relevance
“…This input data consist of the applications' fetch and hit rates, IPCs, and hit ratios as a function of their cache allocation, and can be acquired with low overhead on modern multicore machines [6]. This low-overhead data is in contrast to many existing methods for modeling cache sharing which rely on expensive data such as stack distance traces [2,4,3,17].…”
Section: Introductionmentioning
confidence: 99%
“…This input data consist of the applications' fetch and hit rates, IPCs, and hit ratios as a function of their cache allocation, and can be acquired with low overhead on modern multicore machines [6]. This low-overhead data is in contrast to many existing methods for modeling cache sharing which rely on expensive data such as stack distance traces [2,4,3,17].…”
Section: Introductionmentioning
confidence: 99%
“…Our method combines and extends three existing pieces of infrastructure: a cache sharing model [16], a lowoverhead cache analysis tool [7], and a phase detection framework [19]. In this section, we describe the different pieces and how we extend them.…”
Section: Putting It Togethermentioning
confidence: 99%
“…Traditionally, such profiles have been generated through simulation, but such an approach is slow and it is difficult to build accurate simulators for modern processor pipelines and memory systems. Instead, we use Cache Pirating [7] to collect the data. Cache Pirating solves both problems by measuring how an application behaves as a function of cache size on the target machine with very low overhead.…”
Section: Cache Piratingmentioning
confidence: 99%
See 2 more Smart Citations