Overview Background Deep submicron challenges Verification, - - PDF document

overview
SMART_READER_LITE
LIVE PREVIEW

Overview Background Deep submicron challenges Verification, - - PDF document

Paper Review DIVA - A reliable substrate for Deep Submicron Microarchitecture Design - Todd Austin, Univ. of Michigan (1999) ECE1718 MCA - K.P. Tang November 2008 Overview Background Deep submicron challenges Verification,


slide-1
SLIDE 1

1

Paper Review

DIVA - A reliable substrate for Deep Submicron Microarchitecture Design

  • Todd Austin, Univ. of Michigan (1999)

ECE1718 MCA

  • K.P. Tang

November 2008

2

Overview

  • Background

– Deep submicron challenges – Verification, testing, validation

  • Motivation

– simply processor verification and lower test cost

  • Diva Architecture

– Chkcomp, Chkcomm, Watchdog Timer

  • How it works
  • Diva observations
  • Summary
slide-2
SLIDE 2

2

3

Deep submicron challenges

  • Smaller geometry

– performance, power, cost

  • Increasing complexity

– design, test, manufacturing

  • Time to market, get it right the first time
  • Costs

– NRE, design, test, manufacturing – opportunity cost (market share)

  • Values

– Correctness, performance, cost, time

4

Verification, testing, validation

  • Verification

– Functionality and performance – Simulation and formal verification

  • Testing

– Manufacturing

  • Validation

– System integration – Did we build the right system?

  • Verification needs to cover all programs, corner

cases

– Verification gap

slide-3
SLIDE 3

3

5

Verification gap

6

Sources of errors

  • Functional

– Logic (>60%)

  • Timing

– Glitches, races, speed

  • Manufacturing

– Defects

  • Others

– Process, operating condition (temperature/voltage) variations – EM interference, radiation

slide-4
SLIDE 4

4

7

Design re-spins

Delays in re-spins = Lost time to market Many designs have

  • ne or more re-spins

8

DIVA checker

  • DIVA

– Dynamic Implementation Verification Architecture

  • Increase processor design reliability
  • Separate microarchitectural processor design

and verification

  • Detect and fix incorrect operation
  • Become a run-time checker
  • Lower verification costs and risks
  • Improve time-to-market
slide-5
SLIDE 5

5

9

DIVA core and checker

IF – Intr. Fetch ID – Intr. Decode REN – Rename REG – Register EX – Execution MEM – Memory CT – Commit CHK – Check WT – Watchdog Timer Source: DIVA Source: DIVA -

  • Todd Austin, Univ. of Michigan

Todd Austin, Univ. of Michigan

10

DIVA checker

Source: DIVA - Todd Austin, Univ. of Michigan

  • CHKcomp verifies results
  • CHKcomm verifies register/memory inputs
  • Watchdog timer detects lockups
  • Simple, in-order scheduler, no reorder, low latency, accurate
slide-6
SLIDE 6

6

11

DIVA checker architecture

Source: DIVA - Todd Austin, Univ. of Michigan

12

DIVA check mode

Source: DIVA - Todd Austin, Univ. of Michigan

slide-7
SLIDE 7

7

13

DIVA recovery mode

Source: DIVA - Todd Austin, Univ. of Michigan

14

DIVA observations

Complex core processor

  • Focus on fast, speculative, and

complex core design

  • Branch predictions
  • Cache prefetches

Checker processor

  • Simple and low cost processor

core

  • Take advantages of main core

branch predictions and cache prefetches

  • Focus on fault detection and

correction (design errors, electrical faults, silicon defects, and even core failures)

  • Checker must be high accuracy

and reliable

Source: DIVA - Todd Austin, Univ. of Michigan

slide-8
SLIDE 8

8

15

Beta release and launch

Source: DIVA - Todd Austin, Univ. of Michigan

Previous launch

time

Previous beta

16

Self-tuned systems

Source: DIVA - Todd Austin, Univ. of Michigan

  • Self tuning to maximize operating performance

– Built-in design margins from designers – Speed binning at manufacturing – Optimize operating frequency with voltage and temperature inputs

slide-9
SLIDE 9

9

17

DIVA checker verification

Source: DIVA - Todd Austin, Univ. of Michigan

  • Simple checker processor core requires

complete functional verification

18

DIVA checker core BIST

Source: DIVA - Todd Austin, Univ. of Michigan

Manufacturing defects

slide-10
SLIDE 10

10

19

If checker processor fail to check?

Source: DIVA - Todd Austin, Univ. of Michigan

Transient faults

20

Replicate checker core

Source: DIVA - Todd Austin, Univ. of Michigan

Core redundancy

slide-11
SLIDE 11

11

21

Summary

Source: DIVA - Todd Austin, Univ. of Michigan

  • Introduced DIVA core and DIVA checker
  • DIVA can separate processor core design from

traditional costly and lengthy core verification

  • DIVA pipelined checker core can be simple, fast (latency

insensitive), and low cost

  • Core processor can tolerate permanent and transient

errors

  • Beta release can help overlap processor launch with

verification

  • Clock and voltage tuning system can optimize circuit
  • perations
  • DIVA must be reliable and functionally correct.

22

Backup slides

Source: DIVA - Todd Austin, Univ. of Michigan

slide-12
SLIDE 12

12

23

Example operations

Source: DIVA - Todd Austin, Univ. of Michigan

24

Register file and cache bandwidth

Source: DIVA - Todd Austin, Univ. of Michigan

R-4 extra register file ports, M-1 extra memory port 1 extra memory port is good enough

slide-13
SLIDE 13

13

25

Checker latency

Source: DIVA - Todd Austin, Univ. of Michigan

Minimal effect on core performance

26

Exception rates

Source: DIVA - Todd Austin, Univ. of Michigan

One exception per x instruction Worst case performance