/
A Systematic Methodology to Compute the A Systematic Methodology to Compute the

A Systematic Methodology to Compute the - PowerPoint Presentation

phoebe-click
phoebe-click . @phoebe-click
Follow
405 views
Uploaded On 2015-12-03

A Systematic Methodology to Compute the - PPT Presentation

Architectural Vulnerability Factors for a HighPerformance M icroprocessor 1 Saad Arrabi 2242010 CS 8501 Outline Definition of soft errors Motivation of the paper Goals of this paper ID: 213383

performance ace errors soft ace performance soft errors instructions results state error dynamically design architectural future paper good process cost injection early

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "A Systematic Methodology to Compute the" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor

1

Saad

Arrabi

2/24/2010

CS 8501Slide2

OutlineDefinition of soft errorsMotivation of the paperGoals of this paper

ACE and un-ACE bitsResultsConclusion and comments

2Slide3

Mechanism of Soft ErrorsCosmic ray interactions with atmosphere

Protons bombard O2 and N2

Shower of secondary particles

charged and neutral

Cascade of interactions

3

Illustration credit: S.

Swardy

/ U. Chicago / NASASlide4

Soft errorsSometimes they cause a spike in current in the transistorsTransient faults, permanent faults

Trend in the future with transistors getting smallerRays that lead to errors and ones that don’t

4Slide5

Latch/SRAM

Transient simulation of a particle strike

5Slide6

MotivationTechniques to prevent soft errors existExpensive in performance and cost

You don’t want to over do itSun is documented to having lost a major customer to IBM from this phenomena [3].Things will get tougher with timeMulti bit upset

Lower voltage

6Slide7

Goals of the paperReduce cost of the soft error protectionKnow the required cost of protection early in the design process

Give good estimates for AVF while still being conservativeProvide a systematic method that can be expanded in the future

7Slide8

Terminologies*AVF: architectural vulnerability factor

*ACE: architecturally correct execution*FIT: Error

(Fault)

in Time

*

SDC:

silent data corruption

MTBF: Mean Time Between Failures

DUE: detected unrecoverable errorsFDD

: first-level dynamically deadTDD: Transitively dynamically dead

* Focus of the

paper

8Slide9

Un-ACE bitsMicroarchitectural Un-ACE Bits

Idle or Invalid State.Mis-speculated State.Predictor Structures.

Ex-ACE State.

Architectural Un-ACE Bits

NOP instructions.

Performance-enhancing instructions.

Predicated-false instructions.

Dynamically dead instructions

. (FDD & TDD)Logical masking.

9

Opcode

Valid bits

invalid

Validity

instruction

Which branch is predicted

Unused instruction

or data

NOP

Un-ACE bits

Prefetch

Address

False

ResultSlide10

MethodologyUsing performance simulatorAdding window analysis to follow ACE and un-ACE instructions

Check the validity by micro benchmarksTypical methods are fault injection models

Require RTL model

Slow and later in the design process

10Slide11

Results

11Slide12

Results

12Slide13

Results

13Slide14

Result

14Slide15

Conclusions and commentsReduce the estimation of AVF

Done through performance simulator, so early in the design process and application orientedDetails is limited by the simulator detailsIdentify the AFV of different parts rather average

Less accurate that error injection models

Is the way they tested their accuracy good enough?

Why being so conservative?

Is performance will be included in the future

15Slide16

The End16

Questions?Some slides are courtesy of Nishant

George