Multi-Bit Error Tolerant Caches Using Two-Dimensional Error Coding

Multi-Bit Error Tolerant Caches Using Two-Dimensional Error Coding

Multi-bit Error Tolerant Caches Using Two-Dimensional Error Coding Jangwoo Kim* Nikos Hardavellas* Ken Mai* Babak Falsafi*† James C. Hoe* *Computer Architecture Laboratory (CALCM), Carnegie Mellon University †School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne http://www.ece.cmu.edu/~truss Abstract are a number of causes of soft errors including ener- getic particle strikes, signal or power supply noise In deep sub-micron ICs, growing amounts of on- coupling, and erratic device behavior [3, 15, 53]. In die memory and scaling effects make embedded memories, soft errors typically manifest as bit flips in memories increasingly vulnerable to reliability and the storage nodes of the memory cell arrays. While the yield problems. As scaling progresses, soft and hard failures-in-time (FIT) rate of an individual SRAM cell errors in the memory system will increase and single remains approximately constant across process tech- error events are more likely to cause large-scale multi- nologies, the overall chip FIT rate increases as technol- bit errors. However, conventional memory protection ogies scale due to the increasing number of SRAM techniques can neither detect nor correct large-scale cells on a die [43]. In today's technologies, the majority multi-bit errors without incurring large performance, of soft error events result in only a single cell being area, and power overheads. disturbed. However, as we scale into the nanometer We propose two-dimensional (2D) error coding in regime, the single-event multi-bit upset rate exponen- embedded memories, a scalable multi-bit error tially increases because more memory cells fall under protection technique to improve memory reliability and the footprint of a single energetic particle strike [29, yield. The key innovation is the use of vertical error 34, 41]. The extent of a single-event multi-bit error can coding across words that is used only for error range from disrupting a few bits to hundreds of bit flips correction in combination with conventional per-word along entire columns and rows [15, 43]. SRAM horizontal error coding. We evaluate this scheme in the designs have already exhibited up to 16 bit corruptions cache hierarchies of two representative chip in one dimension [5, 29, 34]. multiprocessor designs and show that 2D error coding Hard errors can occur either at manufacture-time can correct clustered errors up to 32x32 bits with or in-the-field. Manufacture-time hard errors are due to significantly smaller performance, area, and power manufacturing defects such as electrical shorts or overheads than conventional techniques. opens caused by contaminants during lithography. In memories, these errors are typically repaired at the 1. Introduction factory using redundant cell rows, columns, or arrays. The incidence of manufacture-time hard errors is With the scaling of process technologies into the expected to increase dramatically as processes scale to nanometer regime, the reliability of embedded memory nanometer dimensions overwhelming conventional systems becomes an increasingly important concern levels of spare redundancy [9, 33, 40, 44] for digital system designers. Nanoscale components In-the-field hard errors are the result of a number themselves are increasingly likely to fail, and the of phenomena including electromigration, device growing amount of on-chip memory creates more wear-out, and highly energetic particle strikes [26, 30, possible points of failure. As designers integrate more 40, 45]. The frequency of these errors is also expected of the memory hierarchy onto the processing die, the to rise dramatically, resulting in run-time large-scale number and size of memory arrays on these system-on- information loss (e.g., clusters of cells, rows and a-chip (SoC) and microprocessors will increase [39]. columns, or even entire arrays) [13, 40]. This poses a Therefore, errors occurring in the embedded memory significant threat to the run-time reliability of chips systems are a growing threat to the overall SoC and with large embedded memories. Furthermore, increas- processor reliability and yield. ing inter- and intra-die device variability causes not Errors in memories can be broadly classified as only an increasing percentage of memory circuits to either transient (soft) or permanent (hard) errors. There fail all-together, but also an increasing percentage of ECC EDC8 8-bit interleaved parity, can detect 8-bit errors Data Row (i.e., parity_bit[i] = xor (data_bit[i], data_bit[i+8], data_bit[i+16],...)) SECDED 1-bit error correction, 2-bit error detection (Hamming distance = 4) DECTED 2-bit error correction, 3-bit error detection (Hamming distance = 6) Addr QECPED 4-bit error correction, 5-bit error detection (Hamming distance = 10) Decoder OECNED 8-bit error correction, 9-bit error detection (Hamming distance = 18) 100% 250% Column I/O 64b word 64b word / 64kB array Data ECC 80% 256b word 200% 256b word / 4MB array ECC = 150% Calc 60% 40% 100% ECC Correct 20% 50% Extra Memory Storage Extra Memory Write Read 0% Read per Energy Extra 0% 8 D Data Data ED E DC8 TED DC PED E E CDED C E S DECT QE (a) Error detection and correction SECD DEC QECPED OECNED OECNED using ECC (b) Area overhead of ECC (c) Energy overhead of ECC Figure 1. ECC mechanism and overhead. Figure (a) shows the basic ECC mechanism in SRAM. Figures (b) and (c) show the extra area and energy overheads to compute, store, and access ECC bits. We modified Cacti 4.0 [48] to model a standard EDC/ECC logic based on [12]. circuits that are marginally functional and thus more errors on-the-fly, while still maintaining soft error susceptible to hard and soft error phenomena [9, 22]. protection. We can leverage this resilience gained at Modern microprocessors and SoC ASICs already the micro-architecture level to aggressively scale use various protection techniques such as error correct- SRAM cell sizes while still maintaining robust opera- ing codes (ECC) [1, 5, 25, 31, 36], bit interleaving [5, tion and high yield. We evaluate this scheme in the 36], and hardware redundancy [8, 24, 33, 35] to safe- cache hierarchies of two representative chip multi- guard their embedded memories. However, scaling up processor (CMP) designs and show that 2D error conventional techniques to cover multi-bit errors will coding can correct clustered errors up to 32x32 bits incur large performance, area, and power overheads in with significantly smaller performance, area, and part due to the tight coupling between the error detec- power overheads than conventional techniques. tion and correction mechanisms. In the next section, we discuss conventional tech- Thus, we propose 2D error coding, an error detec- niques for protecting memories against errors, defi- tion and correction scheme using error coding in two ciencies in those techniques, and how the deficiencies dimensions (horizontal and vertical1) which decouples worsen as we scale process technology. In Section 3, the error detection from the error correction mecha- we introduce a 2D error coding concept, and Section 4 nisms. The key innovation in this scheme is the combi- discusses how to implement the scheme in cache nation of conventional per-word horizontal error memories. Section 5 explores the overheads of imple- coding (used only for error detection and possibly menting 2D error coding. Section 6 summarizes the small-scale error correction) with vertical error coding related work and Section 7 draws conclusions. across words (used only for error correction). 2D error coding provides scalable multi-bit error protection 2. Limitations of conventional techniques that can reconstruct large clusters of flipped bits, including multiple column/row failures, while incur- This section discusses limitations of conventional ring significantly smaller performance, area, and memory protection techniques to motivate 2D error power overheads when compared to conventional coding. schemes with similar error coverage. This strong multi- bit error protection can also be used to improve 2.1. Error detection and correcting codes memory manufacturability and yield by correcting small-scale (e.g., single-bit) manufacture-time hard A common technique to protect memory arrays against errors is to use error detecting codes (EDC) and error correcting codes (ECC). Many conventional 1. Throughout the paper, “horizontal” refers to the wordline cache designs use single-error-correct double-error- direction and “vertical” refers to the bitline direction. detect (SECDED) codes [1, 5, 25, 31, 36]. ECC is typi- Delay+Area Opt = Delay-only Opt Delay+Area Opt = Delay-only Opt 7.0 Power+Delay+Area Opt 7.0 Power+Delay+Area Opt = Power-only Opt Power-only Opt Bit Interleaving of 6.0 6.0 4 data words 5.0 5.0 A1 B1 C1 D1 A2 B2 C2 D2 An Bn Cn Dn 4.0 4.0 3.0 3.0 4:1 4:1 4:1 Access 2.0 2.0 1.0 1.0 B B B 1 2 n 0.0 0.0 Single data word Normalized Energy perRead 1:1 2:1 4:1 8:1 16:1 1:1 2:1 4:1 8:1 16:1 Degree of Interleaving Degree of Interleaving (a) 4-way physical bit interleaving (b) 64kB cache (2-way, 2 ports, 1 bank) (c) 4MB cache (16-way, 1 port, 8 banks) Figure 2. Physical bit interleaving mechanism and overhead. Figure (a) shows the interleaving of four separate ECC codewords. Figures (b) and (c) show the increasing energy consumption as the degree of interleaving increases for (72,64) SECDED ECC words in a 64kB cache and (266,256) SECDED ECC words in a 4MB L2 cache. cally applied to the data on a per-word basis (e.g., 64 (Figure 2(a)). This allows the column decode to be bits) and allows error detection/correction at the cost of performed in parallel with the row decode.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    13 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us