Laboratoire d' Intégration des Systèmes et des Technologies System-Level Hardware-Based Protection of Memories against Soft-Errors Valentin Gherman Samuel.

Slides:



Advertisements
Similar presentations
Computer Architecture
Advertisements

3D Graphics Content Over OCP Martti Venell Sr. Verification Engineer Bitboys.
Basic Memory Management Monoprogramming Protection Swapping Overlaying OS space User space.
Experiments with the Peripheral Virtual Component Interface Roman L. Lysecky, Frank Vahid*, Tony D. Givargis Dept. of Computer Science & Engineering University.
Students:Guy Derry Gil Wiechman Instructor: Isaschar Walter Winter 2003 Students:Guy Derry Gil Wiechman Instructor: Isaschar Walter Winter 2003 טכניון.
Reporter :LYWang We propose a multimedia SoC platform with a crossbar on-chip bus which can reduce the bottleneck of on-chip communication.
1/1/ / faculty of Electrical Engineering eindhoven university of technology Architectures of Digital Information Systems Part 1: Interrupts and DMA dr.ir.
1/1/ / faculty of Electrical Engineering eindhoven university of technology Processor support devices Part 1:Interrupts and shared memory dr.ir. A.C. Verschueren.
Virtual Memory main memory can act as a cache for secondary storage motivation: Allow programs to use more memory that there is available transparent to.
CSC 4250 Computer Architectures December 8, 2006 Chapter 5. Memory Hierarchy.
Thread-Level Transactional Memory Decoupling Interface and Implementation UW Computer Architecture Affiliates Conference Kevin Moore October 21, 2004.
General information Course web page: html Office hours:- Prof. Eyal.
CSCE 212 Chapter 7 Memory Hierarchy Instructor: Jason D. Bakos.
Virtual Memory & Address Translation Vivek Pai Princeton University.
Reliable Data Storage using Reed Solomon Code Supervised by: Isaschar (Zigi) Walter Performed by: Ilan Rosenfeld, Moshe Karl Spring 2004 Part A Final Presentation.
~ EDA lab ~ Interconnect Verification for SOC Jing-Yang Jou Department of Electronics Engineering National Chiao Tung University Hsinchu, Taiwan
טכניון – מכון טכנולוגי לישראל הפקולטה להנדסת חשמל Final A Presentation Students: Nir Sheffi Evgeny Bogokovsky Instructor: Isaschar Walter Winter 2004.
טכניון – מכון טכנולוגי לישראל הפקולטה להנדסת חשמל Midterm Presentation Students: Nir Sheffi Evgeny Bogokovsky Instructor: Isaschar Walter Winter 2004.
Reliable Data Storage using Reed Solomon Code Supervised by: Isaschar (Zigi) Walter Performed by: Ilan Rosenfeld, Moshe Karl Spring 2004 Midterm Presentation.
Unbounded Transactional Memory Paper by Ananian et al. of MIT CSAIL Presented by Daniel.
Cost-Efficient Soft Error Protection for Embedded Microprocessors
Computer System Overview Chapter 1. Basic computer structure CPU Memory memory bus I/O bus diskNet interface.
Chapter 8: Part II Storage, Network and Other Peripherals.
ABACUS: A Hardware-Based Software Profiler for Modern Processors Eric Matthews Lesley Shannon School of Engineering Science Sergey Blagodurov Sergey Zhuravlev.
COMP3221 lec31-mem-bus-II.1 Saeid Nooshabadi COMP 3221 Microprocessors and Embedded Systems Lectures 32: Memory and Bus Organisation - II
University of Michigan Electrical Engineering and Computer Science 1 A Microarchitectural Analysis of Soft Error Propagation in a Production-Level Embedded.
Computer Systems Computer Performance.
Lect 13-1 Lect 13: and Pentium. Lect Microprocessor Family  Microprocessor  Introduced in 1989  High Integration  On-chip 8K.
Module I Overview of Computer Architecture and Organization.
Performance Tradeoffs for Static Allocation of Zero-Copy Buffers Pål Halvorsen, Espen Jorde, Karl-André Skevik, Vera Goebel, and Thomas Plagemann Institute.
Embedded Bus – i2c David E. Culler Lab 2 Feb 2, 2015
Computer Architecture Lecture 28 Fasih ur Rehman.
Instituto de Informática and Dipartimento di Automatica e Informatica Universidade Federal do Rio Grande do Sul and Politecnico di Torino Porto Alegre,
Lecture 19: Virtual Memory
CS 342 – Operating Systems Spring 2003 © Ibrahim Korpeoglu Bilkent University1 Input/Output CS 342 – Operating Systems Ibrahim Korpeoglu Bilkent University.
I/O management is a major component of operating system design and operation Important aspect of computer operation I/O devices vary greatly Various methods.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
Title of Selected Paper: IMPRES: Integrated Monitoring for Processor Reliability and Security Authors: Roshan G. Ragel and Sri Parameswaran Presented by:
Memory Management COSC 513 Presentation Jun Tian 08/17/2000.
Fundamentals of Programming Languages-II Subject Code: Teaching SchemeExamination Scheme Theory: 1 Hr./WeekOnline Examination: 50 Marks Practical:
Error Detection in Hardware VO Hardware-Software-Codesign Philipp Jahn.
Virtual Memory Additional Slides Slide Source: Topics Address translation Accelerating translation with TLBs class12.ppt.
Introduction to Virtual Memory and Memory Management
Soc 5.1 Chapter 5 Interconnect Computer System Design System-on-Chip by M. Flynn & W. Luk Pub. Wiley 2011 (copyright 2011)
Bus, Cache and shared memory. Bus System System bus of a computer system operates on contention basis Effective bandwidth available to each processor.
Multilevel Caches Microprocessors are getting faster and including a small high speed cache on the same chip.
Copyright © 2010 Houman Homayoun Houman Homayoun National Science Foundation Computing Innovation Fellow Department of Computer Science University of California.
1 Chapter Seven CACHE MEMORY AND VIRTUAL MEMORY. 2 SRAM: –value is stored on a pair of inverting gates –very fast but takes up more space than DRAM (4.
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Processor Memory Processor-memory bus I/O Device Bus Adapter I/O Device I/O Device Bus Adapter I/O Device I/O Device Expansion bus I/O Bus.
Virtual Memory Review Goal: give illusion of a large memory Allow many processes to share single memory Strategy Break physical memory up into blocks (pages)
Spring 2007W. Rhett DavisNC State UniversityECE 747Slide 1 ECE 747 Digital Signal Processing Architecture SoC Lecture – Working with Buses & Interconnects.
LECTURE 12 Virtual Memory. VIRTUAL MEMORY Just as a cache can provide fast, easy access to recently-used code and data, main memory acts as a “cache”
FILE SYSTEM IMPLEMENTATION 1. 2 File-System Structure File structure Logical storage unit Collection of related information File system resides on secondary.
Region-Based Software Distributed Shared Memory Song Li, Yu Lin, and Michael Walker CS Operating Systems May 1, 2000.
CS 704 Advanced Computer Architecture
Memory Hierarchy Ideal memory is fast, large, and inexpensive
Lecture 12 Virtual Memory.
nZDC: A compiler technique for near-Zero silent Data Corruption
Lecture 14 Virtual Memory and the Alpha Memory Hierarchy
Hwisoo So. , Moslem Didehban#, Yohan Ko
CS 105 “Tour of the Black Holes of Computing!”
Interconnect with Cache Coherency Manager
Virtual Memory.
Virtual Memory Nov 27, 2007 Slide Source:
CS 105 “Tour of the Black Holes of Computing!”
Co-designed Virtual Machines for Reliable Computer Systems
CS 105 “Tour of the Black Holes of Computing!”
Virtual Memory 1 1.
Presentation transcript:

Laboratoire d' Intégration des Systèmes et des Technologies System-Level Hardware-Based Protection of Memories against Soft-Errors Valentin Gherman Samuel Evain Mickael Cartron Nathaniel Seymour Yannick Bonhomme

Laboratoire d' Intégration des Systèmes et des Technologies New constraints –Increasing design & manufacturing costs –Decreasing time-to-market –Increasing reliability and yield problems of nanometer technologies Memory systems remain the most vulnerable New requirements –Low-cost solutions Cross-domain & cross-application platform-based design –Flexible solutions Power, Performance, Reliability Motivation

Laboratoire d' Intégration des Systèmes et des Technologies Low Cost [1, 3] –Flexibility –Standard interconnect & memory Hardware-based [1, 2] –Concurrent error detection –Transient & permanent faults System-level [3] –Software-based Related EDAC-based memory protection schemes [1] GRLIB IP Core User’s Manual, Version , September 2008, pages 227, 248 [2] R. Mariani, G. Boschi, Solid-State Electronics 49, 2005 [3] P.P. Shirvani, N. Saxena, E.J. McCluskey, Transactions on Reliability, September 2000 [1, 2] Processor Core Interconnection [3] Standard Memory Data Word EDAC1 … EDACn EDAC1... EDACm

Laboratoire d' Intégration des Systèmes et des Technologies RSM Low Cost [1, 3, RSM] –Flexibility –Standard interconnect & memory Hardware-based [1, 2, RSM] –Concurrent error detection –Transient & permanent faults System-level [3, RSM] Reliability Service Manager (RSM) [1] GRLIB IP Core User’s Manual, Version , September 2008, pages 227, 248 [2] R. Mariani, G. Boschi, Solid-State Electronics 49, 2005 [3] P.P. Shirvani, N. Saxena, E.J. McCluskey, Transactions on Reliability, September 2000 [1, 2] Processor Core Standard Memory Data Word EDAC1 … EDACn EDAC1... EDACm [3] Standard Interconnection

Laboratoire d' Intégration des Systèmes et des Technologies RSM: address calculation of EDAC = OffSet  [ (Mask >> log 2 n ] % n = address of a protected data word (DW) –OffSet, Mask are parameters –n = DW width / EDAC code width Standard Memory Data Word (DW) 1 EDAC 1 OffSet Check Words Data Word (DW) n …. EDAC n EDAC code position in a memory word

Laboratoire d' Intégration des Systèmes et des Technologies RSM plugged on the bus arbiter (1) Scales well with the number of masters in the system Hide supplementary RSM-memory accesses to the arbiter Processor (Master 1) Processor (Master n) Main Memory (Slave) Main Memory (Slave) RSM Bus arbiter …

Laboratoire d' Intégration des Systèmes et des Technologies Interface RSM: AHB master  AHB slave AHB Master WCTRL ADDR WDATA SWCTRL SADDR SWDATA MWCTRL MADDR MWDATA AHB Arbiter RSM AHB Slave (Memory) MUX1 MUX2 Data bits Check bits RSM plugged on the bus arbiter (2)

Laboratoire d' Intégration des Systèmes et des Technologies Interface RSM: AHB slave  AHB master AHB Master AHB Slave (Memory ) AHB Arbiter SRCTRL SRDATA SRCTRL SRDATA MRCTRL MRDATA RCTRL RDATA MUX3 RSM RSM plugged on the bus arbiter (3)

Laboratoire d' Intégration des Systèmes et des Technologies RSM Implementation 2.5 ns & 4154 NAND2 ( 130 nm HCMOS9) Clock cycle overhead (MiBench benchmarks) Processor without memory cache Processor with memory cache

Laboratoire d' Intégration des Systèmes et des Technologies RSM associated to each master on the interconnection sub-system Larger fault coverage of the interconnection sub-system Better system performance Interconnection RSM Processor (Master 1) Processor (Master 1) RSM Processor (Master n) Processor (Master n) Main Memory (Slave) Main Memory (Slave) …

Laboratoire d' Intégration des Systèmes et des Technologies RSM as a MMU wrapper Physical address space –Page-level granularity of the protected zones Virtual address space –Number of protection zones equal to the number of integrity levels Protect MMU-generated memory accesses MMU RSM Processor Main Memory

Laboratoire d' Intégration des Systèmes et des Technologies RSM with solid-state secondary storage sub-system Transfers protected by RSM –Blocks with protected data from memory to secondary storage Unprotected mode transfers –All blocks from secondary storage to secondary storage –Blocks with unprotected data and checksums from memory to secondary storage Interconnection RSM Processor RSM DMA Main Memory Secondary Storage

Laboratoire d' Intégration des Systèmes et des Technologies Conclusions Low cost –Flexible: cross-domain & cross-application –Standard memory, storage & interconnections –Easy integration into the system (IP core) Small size (same size as an UART) –No modification of application software –Low impact on system performance Yield & Reliability –Permanent & transient faults Programmability & Flexibility –Size, location & integrity levels of protected zones –Programmable Offset & Mask parameters