Decompose and Conquer: Addressing Evasive Errors in Systems on Chip

Total Page:16

File Type:pdf, Size:1020Kb

Decompose and Conquer: Addressing Evasive Errors in Systems on Chip Decompose and Conquer: Addressing Evasive Errors in Systems on Chip by Doowon Lee A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Science and Engineering) in the University of Michigan 2018 Doctoral Committee: Professor Valeria M. Bertacco, Chair Assistant Professor Reetuparna Das Professor Scott Mahlke Associate Professor Zhengya Zhang Doowon Lee [email protected] ORCID iD: 0000-0003-0046-7746 c Doowon Lee 2018 For my wife, Ghaeun ii ACKNOWLEDGMENTS I would like to express my deepest gratitude to my advisor, Professor Valeria Bertacco. She has affected me in many aspects. She is the most enthusiastic person I have ever met; she always inspires me to achieve more than I could imagine. She has offered an extraordinary research mentorship throughout my Ph.D. journey. She has been consistently available whenever I need her thoughtful advice and keen insight. Also, she has been very patient about my research endeavors, allowing me to navigate different research topics. Her guidance on writing and presentation has been helpful for me to become an outstanding professional after graduation. I also thank my dissertation committee members, Professors Scott Mahlke, Reetuparna Das, and Zhengya Zhang. Their comments on my research projects have been invaluable for me to improve this dissertation. In particular, in-depth discussions with them stimulate me to think out of the box, which in turn strengthens the impacts of the research proposed in the dissertation. Our research group members have helped enjoy a long journey to the degree at the University of Michigan. First of all, I am grateful to Professor Todd Austin for his advice on my research projects. I am also inspired by outstanding senior students in the research group: Andrea Pellegrini, Debapriya Chatterjee, Ritesh Parikh, Rawan Abdel Khalek, and Biruk Mammo. I was fortunate to have opportunities to collaborate with some of them, especially when I just joined the research group, so that I could quickly grow as an inde- pendent researcher. Also, I thank current students in the group: Abraham Addisie, Zelalem Aweke, Misiker Aga, Vidushi Goyal, Timothy Linscott, Pete Ehrett, Andrew McCrabb, Hi- wot Kassa, Mark Gallagher, Lauren Biernacki, Leul Belayneh, Nishil Talati, Colton Holo- day, and Tarunesh Verma. I also thank former members of the research group: Salessawi Yitbarek, Brendan West, and Opeoluwa Matthews. I appreciate the help that I received from staffs in the Computer Science and Engineering department. Among them, I would like to give a special thank to Alice Melloni. The two internships that I had during my study are unforgettable. First of all, I would like to appreciate the great hospitality that I received from the members of IBM Research in Haifa, Israel. In particular, I am grateful to Ronny Morad who offered, arranged, and iii managed my internship. I also thank Vitali Sokhin, Tom Kolan, Arkadiy Morgenshtein, and Avi Ziv for their mentorships. During my internship at Intel, I gained a broad industry experience, not particularly related to the research conducted for this dissertation, from my mentors, Truc Nguyen and Oleksandr Bazhaniuk. My Ph.D. studies in Ann Arbor would have been much harder if I had not provided with financial support. I have been generously supported by the Applications Driving Architec- ture (ADA) Center and the Center for Future Architectures Research (C-FAR), sponsored by Semiconductor Research Corporation (SRC) and DARPA. Also, I have been supported by several fellowships including IBM PhD Fellowship, Rackham Predoctoral Fellowship, and Rackham International Student Fellowship. My wife, Ghaeun Lim, has been supportive to finish my degree at the University of Michigan. With her support, I have been able to better focus on my study and research. Our daughter, Jiyo Lee, makes us smile every day. In addition, I thank my parents and parents-in-law for their endless support. iv TABLE OF CONTENTS DEDICATION ::::::::::::::::::::::::::::::::::: ii ACKNOWLEDGMENTS ::::::::::::::::::::::::::::: iii LIST OF FIGURES :::::::::::::::::::::::::::::::: ix LIST OF TABLES ::::::::::::::::::::::::::::::::: xi LIST OF ALGORITHMS ::::::::::::::::::::::::::::: xii ABSTRACT ::::::::::::::::::::::::::::::::::::: xiii CHAPTER 1. Introduction .................................1 1.1 Systems on Chip . .2 1.2 Functional Verification Challenge . .7 1.3 Reliability Challenge . .9 1.4 Contributions and Outline of This Dissertation . 13 2. Related Work ................................ 16 2.1 Addressing Errors in Microprocessor Cores . 16 2.2 Addressing Errors in Memory Subsystems . 20 2.3 Addressing Errors in On-Chip Networks . 24 2.4 Addressing Errors in Accelerators . 27 3. Probabilistic Bug-Masking Analysis in Instruction Tests ........ 30 3.1 Background and Motivation . 31 3.1.1 Dynamic Bug-Masking Analysis . 33 3.2 BugMAPI Overview . 35 3.3 Baseline Static Information-Flow Bug-Masking Analysis . 36 3.4 Probabilistic Information-Flow Bug-Masking Analysis . 37 v 3.4.1 Bug-Masking through an Instruction . 38 3.4.2 Bug-Masking over an Instruction Sequence . 39 3.5 Experimental Evaluation . 40 3.5.1 Bug Models . 41 3.5.2 Performance Analysis . 41 3.5.3 Bug-Masking Characterization . 42 3.5.4 Accuracy . 43 3.5.5 Discussions . 45 3.6 Application: Masking Reduction . 46 3.7 Related Work . 47 3.8 Summary . 48 4. Efficient Post-Silicon Memory Consistency Validation .......... 49 4.1 Background and Motivation . 50 4.2 MTraceCheck Overview . 53 4.3 Code Instrumentation . 54 4.3.1 Memory-Access Interleaving Signature . 54 4.3.2 Per-thread Signature Size and Decoding . 57 4.4 Collective Graph Checking . 59 4.4.1 Similarity among Constraint Graphs . 59 4.4.2 Re-sorting Topological Order . 61 4.5 Experimental Evaluation . 63 4.5.1 Experimental Setup . 63 4.5.2 Non-determinism in Memory Ordering . 64 4.5.3 Validation Performance . 67 4.5.4 Intrusiveness . 69 4.6 Bug-Injection Case-Studies . 71 4.6.1 Bug Descriptions . 71 4.6.2 Bug-Detection Results . 72 4.7 Insights and Discussions . 73 4.8 Related Work . 75 4.9 Summary . 75 5. Patching Design Bugs in Memory Subsystems .............. 77 5.1 Motivation . 78 5.2 uMemPatch Overview . 79 5.3 Classifying Memory Subsystem Bugs . 81 5.3.1 Root Causes of Memory Subsystem Bugs . 81 5.3.2 Symptoms of Memory Subsystem Bugs . 83 5.3.3 Memory Subsystem Bugs in Open-Source Designs . 84 5.4 Detecting Bug-Prone Microarchitectural State . 84 5.4.1 Collecting Microarchitectural Events . 85 vi 5.4.2 Reducing the Area Overhead of the Bug-Anticipation Module . 86 5.5 Microarchitectural Bug-Elusion . 87 5.5.1 ImmSq & DelSq: Instruction Squash and Re-execution . 87 5.5.2 DelEv: Limiting Data Races by Delaying Cache Eviction 89 5.5.3 DynFc: Limiting Speculation by Dynamic Fence Insertion 89 5.5.4 Bug-Elusion Implementation . 90 5.6 Experimental Evaluation . 90 5.6.1 Experimental Setup . 90 5.6.2 Micro-Benchmark Results . 91 5.6.3 SPLASH-2 Results . 92 5.6.4 Implementation Overheads . 94 5.7 Discussions . 95 5.8 Related Work . 97 5.9 Summary . 98 6. Quick Routing Reconfiguration for On-Chip Networks ......... 100 6.1 Background and Motivation . 101 6.1.1 Avoiding Deadlock by Removing Cyclic Resource De- pendencies . 101 6.1.2 Alternative Route Generation Cost Analysis . 102 6.2 BLINC Overview . 103 6.3 Route Computation . 105 6.3.1 Our Enhanced Segmentation Infrastructure . 105 6.3.2 Routing Metadata . 105 6.3.3 Reconfiguration Process . 106 6.4 Experimental Evaluation . 110 6.4.1 Characterization . 111 6.4.2 Discussion . 112 6.5 Application: Online Fault Detection . 113 6.6 Related Work . 114 6.7 Summary . 116 7. Application-Aware Routing for Faulty On-Chip Networks ....... 117 7.1 Motivation . 118 7.2 FATE Overview . 121 7.3 Turn-Enabling Rules . 122 7.3.1 Turn-Enabling Rules in Faulty Topologies . 125 7.4 Route Computation . 126 7.4.1 Traffic Load Estimation . 126 7.4.2 Iterative Turn-Restriction Decision . 129 7.4.3 Avoiding Illegal Routing Function (Backtracking) . 130 7.5 Experimental Evaluation . 130 vii 7.5.1 Performance on Faulty Networks . 131 7.5.2 Performance on Fault-Free Networks . 134 7.5.3 Overheads . 135 7.6 Related Work . 137 7.7 Summary . 138 8. Test Generation for Verifying Accelerator Interactions ......... 140 8.1 Background and Motivation . 141 8.2 AGARSoC Overview . 142 8.3 Capturing Software Behavior . 143 8.3.1 Analyzing Memory Traces . 144 8.3.2 Identifying Interaction Scenarios . 145 8.3.3 Abstract Representation . 146 8.4 Coverage Model Generation and Analysis . 147 8.5 Test Generation . 149 8.5.1 Generated Test Program Structure . 150 8.5.2 Schedule Generation Algorithm . 150 8.6 Experimental Evaluation . 151 8.7 Discussions . 153 8.8 Related Work . 154 8.9 Summary . 155 9. Conclusion and Future Directions ..................... 156 9.1 Dissertation Summary . 157 9.2 Future Directions . 159 BIBLIOGRAPHY ::::::::::::::::::::::::::::::::: 162 viii LIST OF FIGURES Figure 1.1 Commercial SoCs and a schematic of an SoC example design . .3 1.2 Specification update examples . .6 1.3 Bathtub curve illustrating qualitatively the exposure to faults by a silicon chip over its lifespan . 10 1.4 Three MOSFET wear-out mechanisms . 11 3.1 The bug-masking problem in post-silicon random instruction tests . 32 3.2 Dynamic bug-masking analysis flow . 33 3.3 Overview of BugMAPI probabilistic bug-masking analysis . 35 3.4 Baseline information-flow analysis . 36 3.5 Examples of input-output bug-masking probabilities . 38 3.6 Example of bug-propagation analysis over an instruction sequence . 39 3.7 Bug-masking rate for individual program instructions . 42 3.8 Classification of masked bugs . 43 3.9.
Recommended publications
  • Shared Memory Multiprocessors
    Shared Memory Multiprocessors Logical design and software interactions 1 Shared Memory Multiprocessors Symmetric Multiprocessors (SMPs) • Symmetric access to all of main memory from any processor Dominate the server market • Building blocks for larger systems; arriving to desktop Attractive as throughput servers and for parallel programs • Fine-grain resource sharing • Uniform access via loads/stores • Automatic data movement and coherent replication in caches • Useful for operating system too Normal uniprocessor mechanisms to access data (reads and writes) • Key is extension of memory hierarchy to support multiple processors 2 Supporting Programming Models Message passing Programming models Compilation Multiprogramming or library Communication abstraction User/system boundary Shared address space Operating systems support Hardware/software boundary Communication hardware Physical communication medium • Address translation and protection in hardware (hardware SAS) • Message passing using shared memory buffers – can be very high performance since no OS involvement necessary • Focus here on supporting coherent shared address space 3 Natural Extensions of Memory System P1 Pn Switch P1 Pn (Interleaved) First-level $ $ $ Bus (Interleaved) Main memory Mem I/O devices (a) Shared cache (b) Bus-based shared memory P1 Pn P1 Pn $ $ $ $ Mem Mem Interconnection network Interconnection network Mem Mem (c) Dancehall (d) Distributed-memory 4 Caches and Cache Coherence Caches play key role in all cases • Reduce average data access time • Reduce bandwidth
    [Show full text]
  • Introduction to Multi-Threading and Vectorization Matti Kortelainen Larsoft Workshop 2019 25 June 2019 Outline
    Introduction to multi-threading and vectorization Matti Kortelainen LArSoft Workshop 2019 25 June 2019 Outline Broad introductory overview: • Why multithread? • What is a thread? • Some threading models – std::thread – OpenMP (fork-join) – Intel Threading Building Blocks (TBB) (tasks) • Race condition, critical region, mutual exclusion, deadlock • Vectorization (SIMD) 2 6/25/19 Matti Kortelainen | Introduction to multi-threading and vectorization Motivations for multithreading Image courtesy of K. Rupp 3 6/25/19 Matti Kortelainen | Introduction to multi-threading and vectorization Motivations for multithreading • One process on a node: speedups from parallelizing parts of the programs – Any problem can get speedup if the threads can cooperate on • same core (sharing L1 cache) • L2 cache (may be shared among small number of cores) • Fully loaded node: save memory and other resources – Threads can share objects -> N threads can use significantly less memory than N processes • If smallest chunk of data is so big that only one fits in memory at a time, is there any other option? 4 6/25/19 Matti Kortelainen | Introduction to multi-threading and vectorization What is a (software) thread? (in POSIX/Linux) • “Smallest sequence of programmed instructions that can be managed independently by a scheduler” [Wikipedia] • A thread has its own – Program counter – Registers – Stack – Thread-local memory (better to avoid in general) • Threads of a process share everything else, e.g. – Program code, constants – Heap memory – Network connections – File handles
    [Show full text]
  • Detecting False Sharing Efficiently and Effectively
    W&M ScholarWorks Arts & Sciences Articles Arts and Sciences 2016 Cheetah: Detecting False Sharing Efficiently andff E ectively Tongping Liu Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA; Xu Liu Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23185 USA Follow this and additional works at: https://scholarworks.wm.edu/aspubs Recommended Citation Liu, T., & Liu, X. (2016, March). Cheetah: Detecting false sharing efficiently and effectively. In 2016 IEEE/ ACM International Symposium on Code Generation and Optimization (CGO) (pp. 1-11). IEEE. This Article is brought to you for free and open access by the Arts and Sciences at W&M ScholarWorks. It has been accepted for inclusion in Arts & Sciences Articles by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. Cheetah: Detecting False Sharing Efficiently and Effectively Tongping Liu ∗ Xu Liu ∗ Department of Computer Science Department of Computer Science University of Texas at San Antonio College of William and Mary San Antonio, TX 78249 USA Williamsburg, VA 23185 USA [email protected] [email protected] Abstract 1. Introduction False sharing is a notorious performance problem that may Multicore processors are ubiquitous in the computing spec- occur in multithreaded programs when they are running on trum: from smart phones, personal desktops, to high-end ubiquitous multicore hardware. It can dramatically degrade servers. Multithreading is the de-facto programming model the performance by up to an order of magnitude, significantly to exploit the massive parallelism of modern multicore archi- hurting the scalability. Identifying false sharing in complex tectures.
    [Show full text]
  • A Design Methodology for Soft-Core Platforms on FPGA with SMP Linux
    Muttillo et al. EURASIP Journal on Embedded Systems (2016) 2016:15 EURASIP Journal on DOI 10.1186/s13639-016-0051-9 Embedded Systems RESEARCH Open Access A design methodology for soft-core platforms on FPGA with SMP Linux, OpenMP support, and distributed hardware profiling system Vittoriano Muttillo1*, Giacomo Valente1, Fabio Federici1, Luigi Pomante1, Marco Faccio1,CarloTieri2 and Serenella Ferri2 Abstract In recent years, the use of multiprocessor systems has become increasingly common. Even in the embedded domain, the development of platforms based on multiprocessor systems or the porting of legacy single-core applications are frequent needs. However, such designs are often complicated, as embedded systems are characterized by numerous non-functional requirements and a tight hardware/software integration. This work proposes a methodology for the development and validation of an embedded multiprocessor system. Specifically, the proposed method assumes the use of a portable, open source API to support the parallelization and the possibility of prototyping the system on a field-programmable gate array. On this basis, the proposed flow allows an early exploration of the hardware configuration space, a preliminary estimate of performance, and the rapid development of a system able to satisfy the design specifications. An accurate assessment of the actual performance of the system is then enforced by the use of an hardware-based profiling subsystem. The proposed design flow is described, and a version specifically designed for LEON3 processor
    [Show full text]
  • Improving Multiprocessor Performance with Coarse-Grain Coherence Tracking
    Improving Multiprocessor Performance with Coarse-Grain Coherence Tracking Jason F. Cantin, Mikko H. Lipasti, and James E. Smith Department of Electrical and Computer Engineering University of Wisconsin, Madison {jcantin, mikko, jes}@ece.wisc.edu Abstract caused by broadcasts, high performance multiprocessor To maintain coherence in conventional shared-memory systems decouple the coherence mechanism from the data multiprocessor systems, processors first check other proc- transfer mechanism, allowing data to be moved directly essors’ caches before obtaining data from memory. This from a memory controller to a processor either over a coherence checking adds latency to memory requests and separate data network [1, 2, 3], or separate virtual chan- leads to large amounts of interconnect traffic in broadcast- nels [4]. This approach to dividing data transfer from based systems. Our results for a set of commercial, scien- coherence enforcement has significant performance poten- tific and multiprogrammed workloads show that on tial because the broadcast bottleneck can be sidestepped. average 67% (and up to 94%) of broadcasts are unneces- Many memory requests simply do not need to be broadcast sary. to the entire system, either because the data is not currently Coarse-Grain Coherence Tracking is a new technique shared, the request is an instruction fetch, the request that supplements a conventional coherence mechanism writes modified data back to memory, or the request is for and optimizes the performance of coherence enforcement. non-cacheable I/O data. The Coarse-Grain Coherence mechanism monitors the coherence status of large regions of memory, and uses that 1.1. Coarse-Grain Coherence Tracking information to avoid unnecessary broadcasts.
    [Show full text]
  • The POWER4 Processor Introduction and Tuning Guide
    Front cover The POWER4 Processor Introduction and Tuning Guide Comprehensive explanation of POWER4 performance Includes code examples and performance measurements How to get the most from the compiler Steve Behling Ron Bell Peter Farrell Holger Holthoff Frank O’Connell Will Weir ibm.com/redbooks International Technical Support Organization The POWER4 Processor Introduction and Tuning Guide November 2001 SG24-7041-00 Take Note! Before using this information and the product it supports, be sure to read the general information in “Special notices” on page 175. First Edition (November 2001) This edition applies to AIX 5L for POWER Version 5.1 (program number 5765-E61), XL Fortran Version 7.1.1 (5765-C10 and 5765-C11) and subsequent releases running on an IBM ^ pSeries POWER4-based server. Unless otherwise noted, all performance values mentioned in this document were measured on a 1.1 GHz machine, then normalized to 1.3 GHz. Note: This book is based on a pre-GA version of a product and may not apply when the product becomes generally available. We recommend that you consult the product documentation or follow-on versions of this redbook for more current information. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JN9B Building 003 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 2001. All rights reserved. Note to U.S Government Users – Documentation related to restricted rights – Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
    [Show full text]
  • Multi-Threading for Multi-Core Architectures
    Intel Core Duo AMD Athlon 64 X2 Multithreading and Parallel Microprocessors Stephen Jenks Electrical Engineering and Computer Science [email protected] Mostly Worked on Clusters UCI EECS Scalable Parallel and Distributed Systems Lab 2 Also Build Really Big Displays HIPerWall: 200 Million Pixels 50 Displays 30 Power Mac G5s UCI EECS Scalable Parallel and Distributed Systems Lab 3 Outline 9 Parallelism in Microprocessors 9 Multicore Processor Parallelism 9 Parallel Programming for Shared Memory 9 OpenMP 9 POSIX Threads 9 Java Threads 9 Parallel Microprocessor Bottlenecks 9 Parallel Execution Models to Address Bottlenecks 9 Memory interface 9 Cache-to-cache (coherence) interface 9 Current and Future CMP Technology UCI EECS Scalable Parallel and Distributed Systems Lab 4 Parallelism in Microprocessors Fetch 9 Pipelining is most Buffer prevalent Decode 9Developed in 1960s 9Used in everything Buffer 9Even microcontrollers Register Access 9Decreases cycle time Buffer Buffer 9Allows up to 1 instruction per cycle (IPC) 9No programming changes ALU 9Some Pentium 4s have more than 30 stages! Buffer Write Back UCI EECS Scalable Parallel and Distributed Systems Lab 5 More Microprocessor Parallelism 9 Superscalar allows Instruction Level Parallelism (ILP) ALU 9Replace ALU with multiple functional units 9Dispatch several Becomes instructions at once 9 Out of Order Execution Load/ 9Execute based on data FP INT INT availability Store 9Requires reorder buffer 9 More than 1 IPC 9 No program changes UCI EECS Scalable Parallel and Distributed Systems Lab 6 Thread-Level
    [Show full text]
  • Intel Hyper-Threading Technology
    Intel® Hyper-Threading Technology Technical User’s Guide January 2003 22 Contents Overview of Intel® Hyper-Threading Technology 4 Dealing with Multithreading Code Pitfalls 22 The Evolution of System Key Practices of Thread Synchronization 23 and Processor Architectures 4 Key Practices of System-bus Optimization 23 Single Processor Systems 5 Key Practices of Memory Optimization 23 Multithreading 6 Key Practices of Front-end Optimization 24 Multiprocessing 8 Key Practices: Execution-resource Optimization 24 Multiprocessor Systems 9 Optimization Techniques 24 Multitasking versus Multithreading 11 Eliminate or Reduce the Impact of Spin-wait Loops 24 Hyper-Threading Technology 11 Avoiding 64K Aliasing in the First Level Data Cache 26 Balance the Impact of Background Task Priorities Keys to Hyper-Threading on Physical Processors 28 Technology Performance 15 Avoid Serializing Events and Instructions 28 Understand and Have Clear Optimize Cache Sharing 29 Performance Expectations 15 Overcoming False Sharing in Data Cache 29 Understand Hyper-Threading Synchronization Overhead Greater Than Parallel Region 30 Technology Processor Resources 15 Take Advantage of Write Combining Buffers 30 Maximize Parallel Activity 16 Correct Load Imbalance 31 Best Practices for Optimizing Multitasking Performance 18 Hyper-Threading Technology Application Development Resources 32 Identifying Hyper-Threading Intel® C++ Compiler 32 Technology Performance General Compiler Recommendations 32 Bottlenecks in an Application 19 Logical vs. Physical Processors 19 VTuneTM Performance
    [Show full text]
  • PREDATOR: Predictive False Sharing Detection
    PREDATOR: Predictive False Sharing Detection Tongping Liu Chen Tian Ziang Hu Emery D. Berger School of Computer Science Huawei US R&D Center School of Computer Science University of Massachusetts Amherst [email protected], University of Massachusetts Amherst [email protected] [email protected] [email protected] Abstract General Terms Performance, Measurement False sharing is a notorious problem for multithreaded ap- Keywords False Sharing, Multi-threaded plications that can drastically degrade both performance and scalability. Existing approaches can precisely identify the 1. Introduction sources of false sharing, but only report false sharing actu- While writing correct multithreaded programs is often chal- ally observed during execution; they do not generalize across lenging, making them scale can present even greater obsta- executions. Because false sharing is extremely sensitive to cles. Any contention can impair scalability or even cause ap- object layout, these detectors can easily miss false sharing plications to run slower as the number of threads increases. problems that can arise due to slight differences in mem- False sharing is a particularly insidious form of con- ory allocation order or object placement decisions by the tention. It occurs when two threads update logically-distinct compiler. In addition, they cannot predict the impact of false objects that happen to reside on the same cache line. The sharing on hardware with different cache line sizes. resulting coherence traffic can degrade performance by an This paper presents PREDATOR, a predictive software- order of magnitude [4]. Unlike sources of contention like based false sharing detector. PREDATOR generalizes from locks, false sharing is often invisible in the source code, a single execution to precisely predict false sharing that is making it difficult to find.
    [Show full text]
  • Embedded Multicore: an Introduction
    Embedded Multicore: An Introduction EMBMCRM Rev. 0 07/2009 How to Reach Us: Home Page: www.freescale.com Web Support: http://www.freescale.com/support Information in this document is provided solely to enable system and software USA/Europe or Locations Not Listed: implementers to use Freescale Semiconductor products. There are no express or Freescale Semiconductor, Inc. implied copyright licenses granted hereunder to design or fabricate any integrated Technical Information Center, EL516 circuits or integrated circuits based on the information in this document. 2100 East Elliot Road Tempe, Arizona 85284 Freescale Semiconductor reserves the right to make changes without further notice to +1-800-521-6274 or any products herein. Freescale Semiconductor makes no warranty, representation or +1-480-768-2130 www.freescale.com/support guarantee regarding the suitability of its products for any particular purpose, nor does Freescale Semiconductor assume any liability arising out of the application or use of Europe, Middle East, and Africa: Freescale Halbleiter Deutschland GmbH any product or circuit, and specifically disclaims any and all liability, including without Technical Information Center limitation consequential or incidental damages. “Typical” parameters which may be Schatzbogen 7 provided in Freescale Semiconductor data sheets and/or specifications can and do 81829 Muenchen, Germany vary in different applications and actual performance may vary over time. All operating +44 1296 380 456 (English) +46 8 52200080 (English) parameters, including “Typicals” must be validated for each customer application by +49 89 92103 559 (German) customer’s technical experts. Freescale Semiconductor does not convey any license +33 1 69 35 48 48 (French) under its patent rights nor the rights of others.
    [Show full text]
  • AMC: Advanced Multi-Accelerator Controller
    AMC: Advanced Multi-accelerator Controller 1;2,Tassadaq Hussain, 3,Amna Haider, 3Shakaib A. Gursal, and 1Eduard Ayguade´ 1 Barcelona Supercomputing Center , 2BSC-Microsoft Research Centre , 3Unal Center of Engineering Research & Development Barcelona, Spain ftassadaq.hussain, eduard.ayguadeg @bsc.es ffirst [email protected] Abstract The rapid advancement, use of diverse architectural features and introduction of High Level Synthesis (HLS) tools in FPGA technology have enhanced the ca- pacity of data-level parallelism on a chip. A generic FPGA based HLS multi- accelerator system requires a microprocessor (master core) that manages memory and schedules accelerators. In a real environment, such HLS multi-accelerator sys- tems do not give a perfect performance due to memory bandwidth issues. Thus, a system demands a memory manager and a scheduler that improves performance by managing and scheduling the multi-accelerator’s memory access patterns effi- ciently. In this article, we propose the integration of an intelligent memory system and efficient scheduler in the HLS-based multi-accelerator environment called Advanced Multi-accelerator Controller (AMC). The AMC system is evaluated with memory intensive accelerators, High Performance Computing (HPC) appli- cations and implemented and tested on a Xilinx Virtex-5 ML505 evaluation FPGA board. The performance of the system is compared against the microprocessor- based systems that have been integrated with the operating system. Results show that the AMC based HLS multi-accelerator system achieves 10.4x and 7x of speedup compared to the MicroBlaze and Intel Core based HLS multi-accelerator systems. 1. Introduction In the last few years the density of FPGAs [1, 2] and performance per watt [3] have improved, which allows the High Performance Computing (HPC) industry to increase and provide more functionalities on a single chip.
    [Show full text]
  • Coherent Shared Memories for Fpgas by David Woods a Thesis
    Coherent Shared Memories for FPGAs by David Woods A thesis submitted in conformity with the requirements for the degree of Master of Applied Sciences Graduate Department of Electrical and Computer Engineering University of Toronto Copyright °c 2009 by David Woods Abstract Coherent Shared Memories for FPGAs David Woods Master of Applied Sciences Graduate Department of Electrical and Computer Engineering University of Toronto 2009 To build a shared-memory programming model for FPGAs, a fast and highly parallel method of accessing the shared-memory is required. This thesis presents a ¯rst look at how to implement a coherent caching system in an FPGA. The coherent caching system consists of multiple distributed caches that implement the write-once coherence protocol, allowing e±cient access to system memory while simplifying the user programming model. Several test applications are used to verify functionality, and assess performance of the current system. Results show that with a processor-based system, some applications could bene¯t from improvements to the coherence system, but for many applications, the current system is su±cient. However, the current coherent caching system is not suf- ¯cient for most hardware core based systems, because the faster memory accesses quickly saturate shared system resources. As well, the performance of distributed-memory sys- tems currently surpasses that of the coherent caching system. Performance results are promising, and given the potential for improvements, future work on this system is war- ranted. ii Dedication I dedicate this to my parents for their support throughout my education. And most of all, I'd like to dedicate this to Laura for her help, understanding, and patience throughout my Masters Degree.
    [Show full text]