At the heart of many computer systems is the microprocessor or central processing unit (CPU) (referred to collectively as the “processor.”) The processor performs most of the actions responsible for application programs to function. The execution capabilities of the system are closely tied to the CPU: the faster the CPU can execute program instructions, the faster the system as a whole will execute.
Early processors executed instructions from relatively slow system memory, taking several clock cycles to execute a single instruction. They would read an instruction from memory, decode the instruction, perform the required activity, and write the result back to memory, all of which would take one or more clock cycles to accomplish.
As applications demanded more power from processors, internal and external cache memories were added to processors. A cache memory (hereinafter cache) is a section of very fast memory located within the processor or located external to the processor and closely coupled to the processor. Blocks of instructions or data are copied from the relatively slower system memory (DRAM) to the faster cache memory where they can be quickly accessed by the processor.
Cache memories can develop persistent errors over time, which degrade the operability and functionality of their associated CPU's. In such cases, physical removal and replacement of the failed or failing cache memory has been performed. Moreover, where the failing or failed cache memory is internal to the CPU, physical removal and replacement of the entire CPU module or chip has been performed. This removal process is generally performed by field personnel and results in greater system downtime.
In one embodiment, a method of repairing a processor is provided. The method includes, for example, assigning each cache element a quality rank based on each cache element's error rate, comparing the quality rank of an allocated cache element to the quality rank of a non-allocated cache element, and swapping in the non-allocated cache element for the faulty allocated cache element based on the comparison.
The following includes definition of exemplary terms used throughout the disclosure. Both singular and plural forms of all terms fall within each meaning:
“Logic”, as used herein includes, but is not limited to, hardware, firmware, software and/or combinations of each to perform a function(s) or an action(s). For example, based on a desired application or needs, logic may include a software controlled microprocessor, discrete logic such as an application specific integrated circuit (ASIC), or other programmed logic device. Logic may also be fully embodied as software.
“Cache”, as used herein includes, but is not limited to, a buffer or a memory or section of a buffer or memory located within a processor (“CPU”) or located external to the processor and closely coupled to the processor.
“Cache element”, as used herein includes, but is not limited to, one or more sections or sub-units of a cache.
“CPU”, as used herein includes, but is not limited to, any device, structure or circuit that processes digital information including for example, data and instructions and other information. This term is also synonymous with processor and/or controller.
“Cache management logic”, as used herein includes, but is not limited to, any logic that can store, retrieve, and/or process data for exercising executive, administrative, and/or supervisory direction or control of caches or cache elements.
“During”, as used herein includes, but is not limited to, in or throughout the time or existence of; at some point in the entire time of; and/or in the course of.
Referring now to
A display 114 may be a Cathode Ray Tube, liquid crystal display or any other similar visual output device. An input device is also provided and serves as a user interface to the system. As will be described in more detail, input device may be a light sensitive panel for receiving commands from a user such as, for example, navigation of a cursor control input system. Input device interfaces with the computer system's I/O such as, for example, USB port 138. Alternatively, input device can interface with other I/O ports.
Secondary Bridge 118 is an I/O controller chipset. The secondary bridge 118 interfaces a variety of I/O or peripheral devices to CPU 102 and memory 108 via the host bridge 106. The host bridge 106 permits the CPU 102 to read data from or write data to system memory 108. Further, through host bridge 106, the CPU 102 can communicate with I/O devices on connected to the secondary bridge 118 and, and similarly, I/O devices can read data from and write data to system memory 108 via the secondary bridge 118 and host bridge 106. The host bridge 106 may have memory controller and arbiter logic (not specifically shown) to provide controlled and efficient access to system memory 108 by the various devices in computer system 100 such as CPU 102 and the various I/O devices. A suitable host bridge is, for example, a Memory Controller Hub such as the Intel® 875P Chipset described in the Intel® 82875P (MCH) Datasheet, which is hereby fully incorporated by reference.
Referring still to
The BIOS ROM 120 includes firmware that is executed by the CPU 102 and which provides low level functions, such as access to the mass storage devices connected to secondary bridge 118. The BIOS firmware also contains the instructions executed by CPU 102 to conduct System Management Interrupt (SMI) handling and Power-On-Self-Test (“POST”) 122. POST 102 is a subset of instructions contained with the BIOS ROM 102. During the boot up process, CPU 102 copies the BIOS to system memory 108 to permit faster access.
The super I/O device 128 provides various inputs and output functions. For example, the super I/O device 128 may include a serial port and a parallel port (both not shown) for connecting peripheral devices that communicate over a serial line or a parallel pathway. Super I/O device 108 may also include a memory portion 130 in which various parameters can be stored and retrieved. These parameters may be system and user specified configuration information for the computer system such as, for example, a user-defined computer set-up or the identity of bay devices. The memory portion 130 in National Semiconductor's 97338VJG is a complementary metal oxide semiconductor (“CMOS”) memory portion. Memory portion 130, however, can be located elsewhere in the system.
Referring to
Within each cache area 202, 203, 204, 205 are at least two subsets of elements. For example,
As such, the CPU chip 201 begins with a number of data cache elements 206 that have passed the wafer test and are currently used by the CPU chip. In other words, the data cache elements 206 that passed the wafer test are initially presumed to be operating properly and are thus initially used or allocated by the CPU. Similarly, the CPU chip begins with a number of spare or non-allocated cache elements 207 that have passed the wafer test and are initially not used, but are available to be swapped in for data cache elements 206 that become faulty.
Also included in the CPU cache management system 200 is logic 212. In the exemplary embodiment of
Connected to the CPU chip 201 is an interface 208. The interface 208 allows the CPU chip 201 to communication with and share information with a non-volatile memory 209 and a boot ROM. The boot ROM contains data and information needed to start the computer system 100 and the non-volatile memory 209 may contain any type of information or data that is needed to run programs or applications on the computer system 100, such as, for example, the cache element configuration.
Now referring to
The cache management logic refers generally to the monitoring, managing, handling, storing, evaluating and/or repairing of cache elements and/or their corresponding cache element errors. Cache management logic can be divided up into different programs, routines, applications, software, firmware, circuitry and algorithms such that different parts of the cache management logic can be stored and run from various different locations within the computer system 100. In other words, the implementation of the cache management logic can vary.
The cache management logic 300 begins after the operating system of the computer system 100 is up and running. During boot-up of the computer system 100, the CPU 201 may have a built-in self-test (BIST), independent of the cache management logic, in which the cache elements are tested to make sure that they are operating correctly. However, the testing and repair must come during the booting process. This results in greater downtime and less flexibility since the computer system 100 must be rebooted in order to determine if cache elements are working properly. However, the cache management logic may be run while the operating system is up and running. While the operating system is running, any internal cache error detected by hardware is stored in the CPU logging registers and corrected with no interruption to the processor. A diagnostics program, for example, periodically polls each CPU for errors in the logging registers through a diagnostic procedure call. The diagnostic program may then determine whether a cache element is faulty based on the error information in the logging registers of each CPU and may repair faulty cache elements if necessary without rebooting the system. As a result, the computer system 100 may monitor and locate faulty cache elements continuously, and repair faulty cache elements as needed
While the operating system is running, the cache management logic assigns each cache element a quality rank based on the error rate of each cache element (step 301). More generally, a quality rank includes, but is not limited to, any characteristic or attribute or range of characteristic(s) or attribute(s) that are indicative of one or more states of operation. When an error is caused by an allocated cache element, the cache management logic then determines whether any of the currently-used or allocated cache elements 206 within the CPU are faulty by comparing the quality rank of the allocated cache element with the quality rank of a non-allocated cache element (step 302). If the quality rank of the allocated cache element is better than that quality rank of the non-allocated cache element (step 302), the cache management logic simply returns to normal operation (step 304). However, if the quality rank of the allocated cache element is worse than the quality rank of the non-allocated cache element (step 302), then a spare or non-allocated cache element 207 is swapped in for the faulty currently-used cache element (step 303). The swapping process takes place at regularly scheduled intervals, for example, the cache management logic may poll a CPU every fifteen minutes. If an allocated cache element is determined to be worse than a non-allocated cache element based on their respective quality ranks, then the cache management logic may repair the faulty cache element immediately (i.e. during the procedure poll call) or may schedule a repair at some later time (i.e. during an operating system interrupt or during a system reboot).
Now referring to
The error information that is gathered and logged includes, but is not limited to, the time of the error, which cache element the error occurred, and the type of error. Similarly, the manner in which the error information is logged may vary. For example, the error information may be logged in the non-volatile memory 209 or other memory location.
After the error information has been gathered and logged, the cache management logic determines in step 404 whether the particular cache element that produced the error needs to be repaired. The determination of whether a particular cache element needs to be repaired may vary. For example, in one embodiment a cache element may be deemed in need of repair if its quality rank (which is based on the cache element's error rate) exceeds a predetermined threshold. In another embodiment, a cache element may be deemed in need of repair if its error production exceeds a predetermined threshold number of errors. The threshold number of errors measured may also be correlated to a predetermined time period. In other words, a cache element may be deemed in need of repair if its error production exceeds a predetermined threshold value over a predetermined time period. For example, a cache element may be deemed in need of repair if its error production exceeds 20 errors over the past 24 hour period. As stated above, the precise method of determining if a cache element is in need of repair may vary and is not limited to the examples discussed above.
If the cache management logic determines that the particular cache element does not need to be repaired, the cache management logic returns to step 401 and continues polling for cache errors. However, if the cache element is in need of repair (i.e. the cache element is faulty), the cache management logic advances to step 405 and calls or requests for system firmware, which may be part of the cache management logic, to repair the faulty cache element. The details of the repair process will be explained in greater detail with reference to
Once the repair request has been made, the cache management logic determines, at step 406, whether the repair was successful and/or not needed. This can be accomplished by, for example, using the repair process shown in
Referring to
It is desirable to manage runtime cache errors during operation of the computer system 100 in order to ensure that the computer system 100 runs smoothly and properly. In order to determine if a cache element is faulty, a continuously updated rank of the severity of the cache errors and performance of the individual cache elements 206 can be maintained. Furthermore, since each type of cache area may have different sensitivity and characteristics and each cache area may have its own repair threshold in determining its quality rank. For example, data cache areas may have a higher threshold than level-2 cache areas.
In one embodiment, this is accomplished by having a diagnostic subsystem or diagnostic logic (a sub-part of the cache management logic) continuously monitor all of the CPUs and their cache elements in the computer system 100. If a cache error is detected, the diagnostic logic logs the location or address of the cache element (e.g., which cache element) and the time of the error occurrence (step 501). Furthermore, the diagnostic logic may check the time of the last error occurrence in that particular cache element. Based on this information, the diagnostic logic assigns a “rank” (quality measure) to the particular cache element. For example, if the particular cache element has received 11 errors in a 24 hour period (error rate), it gets a quality rank of “11.” The rank may simply be the error rate (as in the previous example) or it may be a calibrated number based on the error rate which represents the severity of the cache element (severity rank). For example, if the error rate over the last 24 hours is between 0 and 5, the cache managing logic would give the cache element a severity rank of 1, while an error rate between 6 and 10 would get a severity rank of 2, and so on. The severity rank or quality rank may be adjusted/calibrated if desired to have higher numbers indicate lower error rates and lower number indicate higher error rates. In other words, better performing cache elements would have a higher quality number or severity number as compared to poorer performing cache elements.
As stated above, the repair thresholds may vary depending on the type of cache area. For example, the repair threshold for data cache elements 203 might be 31 errors over the previous 24 hours, while the repair threshold for instruction cache elements 204 might be 54 errors over the previous 10 hours. The repair thresholds (including quality rank thresholds and severity rank thresholds) for each cache area will be set in accordance with the characteristics of that particular cache area.
The diagnostic logic stores the rank of the particular cache element (along with the ranks of other cache elements) in the non-volatile memory 209. The cache managing logic may then continuously use the cache element ranks to determine, at step 502 for example, whether a cache element is faulty enough to warrant repairing.
At step 502, the cache management logic compares the quality rank or severity rank to a predetermined threshold. If the quality rank or severity rank exceeds the predetermined threshold, the cache management logic determines that the cache element is in need of repair. For example, the predetermined threshold may be a quality rank of 25 or a severity rank of 5. Therefore, for example, if the quality rank of the cache element exceeds 25 or if the severity rank of the cache element exceeds 5, then the cache element is deemed to be in need of repair.
There may also be multiple thresholds corresponding to different cache areas. In such embodiments, as shown in
If the cache element does not need to be replaced based on the determination at step 502, the cache management logic reports that there is no need to repair that cache element at step 503 and the cache management logic at step 504 returns to step 406. However, if the repair process 500 determines that the cache element needs to be repaired, the cache managing logic then determines at step 505 whether a spare cache element is available. In making this determination, the cache management logic may utilize any spare cache element 207 that is available. In other words, there is no predetermined or pre-allocated spare cache element 207 for a particular cache element 206. Any available spare cache element 207 may be swapped in for any cache element 206 that become faulty.
If a spare cache element 207 is available, the cache managing logic, at step 506, swaps in the spare cache element 207 for the faulty cache element. A spare cache element may be swapped in for a previously swapped in spare cache element that has become faulty. Hereinafter, such swapping refers to any process by which the spare cache element is mapped for having data stored therein or read therefrom in place of the faulty cache element. In one embodiment, this can be accomplished by de-allocating the faulty cache element and allocating the spare cache element in its place.
Once the spare cache element has been swapped in for the faulty cache element, the cache configuration is updated in the non-volatile memory 209 at step 507. Once updated, the cache managing logic reports that the cache element repair was successful, at step 508, and returns, at step 504, to step 306.
If, however, it is determined, at step 505, that a spare cache element is not available, then the cache managing logic determines if there is a higher ranked (i.e. less faulty) faulty cache element available. In other words, when the cache managing logic determines that a spare cache element is not available, it has determined that all of the initial spare cache elements 207 have been swapped in for other faulty cache elements 206. Each of the faulty cache elements (i.e. swapped out cache elements) that were previously swapped out have a quality rank or severity rank associated therewith. At step 509, the cache managing logic determines whether any of the previously swapped out cache elements have a better quality rank or severity rank than the current faulty cache element. If so, the better quality cache element is swapped in for the faulty cache element and the cache configuration is updated in the non-volatile memory.
For example, computer system 100 begins with two cache elements 206 (CE1 and CE2) and two spare cache elements (SE1 and SE2). Initially, each cache element CE1, CE2, SE1, and SE2 have a quality rank of zero. During normal operation of the computer system 100, CE1 and CE2 are continuously monitored for cache errors. Each time an error occurs, the responsible cache element's quality rank is adjusted accordingly. Assuming that CE1 establishes a quality rank of 35 and the threshold is 25, CE1 is swapped out for SE1. At this time, the cache managing logic stores CE1 as having a quality rank of 35. SE1 begins operation with a quality rank of zero. Assuming that subsequently, CE2 establishes a quality rank of 42 (which exceeds the threshold of 25). CE2 is then swapped out for SE2, which begins operation with a quality rank of zero. The cache managing logic stores CE2 as having a quality rank of 42. As SE1 and SE2 are used by the computer system, SE1 eventually obtains a quality rank of 40. Since the quality rank of 40 exceeds the threshold of 25, the cache managing logic determines that SE1 is faulty and is in need of repair. However, a spare cache element is no longer available since SE1 and SE2 were the only spare elements and since both are currently in use. At this point, under previous solutions, the CPU would have to be de-allocated since no spare cache elements are available. However, under this method, the cache managing logic determines, at step 509, if there is a higher ranked faulty element (having a lower quality rank) available. Since CE1 has a quality rank of 35 and since SE1 has a quality rank of 40, the cache managing logic swaps in CE1 for SE1 at step 510. This allows the CPU to run with the best available cache elements and prolongs the life of the CPU. While this example used quality rank, severity rank could just as well have been used.
If there are no higher ranked faulty elements available, then the cache management logic determines at step 511 whether a spare CPU is available. If desired, the cache management logic may avoid the CPU determining step and simply de-allocate the CPU if there are no spare cache elements. If a spare CPU is available, the cache management logic de-allocates the faulty CPU and swaps in the spare CPU for the faulty CPU at step 512. A spare CPU may be swapped in for a previously swapped in spare CPU that has become faulty. Once the spare CPU has been swapped in for the faulty CPU, the CPU configuration is updated in the non-volatile memory 209 at step 513. Once updated, the cache management logic reports that the CPU replacement was successful at step 514 and returns at step 504 to step 406.
Finally, if it is determined at step 511 that a spare CPU is not available, then the cache management logic de-allocates the faulty CPU at step 515 and reports such at step 504. Accordingly, the cache configuration and CPU configuration will change and be updated as different cache elements and CPU chips become faulty and are swapped out for spare cache elements and spare CPU chips. Furthermore, all of the repairing occurs while the operating system of the computer system 100 is up and running without having to reboot the computer system 100. In alternate embodiments, the repairing can occur during the reboot process.
While the present invention has been illustrated by the description of embodiments thereof, and while the embodiments have been described in considerable detail, it is not the intention of the applicants to restrict or in any way limit the scope of the appended claims to such detail. Additional advantages and modifications will readily appear to those skilled in the art. For example, the number of spare cache elements, spare CPUs, and the definition of a faulty cache or memory can be changed. Therefore, the inventive concept, in its broader aspects, is not limited to the specific details, the representative apparatus, and illustrative examples shown and described. Accordingly, departures may be made from such details without departing from the spirit or scope of the applicant's general inventive concept.
This application claims priority from U.S. Provisional application Ser. No. 60/654,256 filed on Feb. 18, 2005. This application is also related to the following US patent applications: “Systems and Methods for CPU Repair”, Ser. No. 60/254,741, filed Feb. 18, 2005, Attorney Docket No. 200310665-1; Ser. No. ______, filed ______ having the same title; “Systems and Methods for CPU Repair”, Ser. No. 60/254,259], filed Feb. 18, 2005, Attorney Docket No. 200300554-1; Ser. No. ______, filed ______ having the same title; “Systems and Methods for CPU Repair”, Ser. No. 60/254,255, filed Feb. 18, 2005, Attorney Docket No. 200300555-1; Ser. No. ______, filed ______ having the same title; “Systems and Methods for CPU Repair”, Ser. No. 60/254,272, filed Feb. 18, 2005, Attorney Docket No. 200300557-1; Ser. No. ______, filed ______ having the same title; “Systems and Methods for CPU Repair”, Ser. No. 60/254,740, filed Feb. 18, 2005, Attorney Docket No. 200300559-1; Ser. No. ______, filed ______ having the same title; “Systems and Methods for CPU Repair”, Ser. No. 60/254,739, filed Feb. 18, 2005, Attorney Docket No. 200300560-1; Ser. No. ______, filed ______ having the same title; “Systems and Methods for CPU Repair”, Ser. No. 60/254,258, filed Feb. 18, 2005, Attorney Docket No. 200310662-1; Ser. No. ______, filed ______ having the same title; “Systems and Methods for CPU Repair”, Ser. No. 60/254,744, filed Feb. 18, 2005, Attorney Docket No. 200310664-1; Ser. No. ______, filed ______ having the same title; “Systems and Methods for CPU Repair”, Ser. No. 60/254,743, filed Feb. 18, 2005, Attorney Docket No. 200310668-1; Ser. No. ______, filed ______ having the same title; “Methods and Systems for Conducting Processor Health-Checks”, Ser. No. 60/254,203, filed Feb. 18, 2005, Attorney Docket No. 200310667-1; Ser. No. ______, filed ______ having the same title; and “Methods and Systems for Conducting Processor Health-Checks”, Ser. No. 60/254,273, filed Feb. 18, 2005, Attorney Docket No. 200310666-1; Ser. No. ______, filed ______ having the same title; which are fully incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60654256 | Feb 2005 | US |