on timing- independent false path identification feng yuan, qiang xu cuhk reliable computing lab,...

25
On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Upload: holly-wiggins

Post on 25-Dec-2015

226 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

On Timing-Independent False Path IdentificationFeng Yuan, Qiang XuCuhk Reliable Computing Lab,The Chinese University of Hong KongICCAD 2010

Page 2: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Outline Introduction Preliminaries False Path Examination Method Experimental Results & Conclusion

Page 3: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Outline Introduction Preliminaries False Path Examination Method Experimental Results & Conclusion

Page 4: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Introduction False Path

The test vector which cannot propagate in function mode.

Used in STA of timing-driven placement. In manufacturing testing is unnecessary

and may cause over-testing. Optimization does not help to improve the

performance of the circuit.

Page 5: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Introduction (cont.) Kinds of False Path

Timing-don’t-care false paths Path in async. clock domain crossovers

Timing-independent false paths Logically unsensitizable in function mode

Delay-dependent false paths Logically sensitizable but dominated by one

or more side-input signals all the time

Page 6: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Outline Introduction Preliminaries False Path Examination Method Experimental Results & Conclusion

Page 7: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Illegal State Identification Previous Work[12]

Page 8: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

False Path caused by Illegal State If a path is activated only with illegal states in

the circuit, this path is a false path.

Page 9: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Outline Introduction Preliminaries False Path Examination Method Experimental Results & Conclusion

Page 10: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Controlling Signal

0

x0

1

xx

1

x1

0

xx

Page 11: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Criterion A path is a timing-independent false

path iff there exist at least one on-path signal such that when it is a non-controlling value, one or more of its corresponding side-input signals are with controlling values in function mode.

Meet some illegal state?

Page 12: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Criterion (cont.) A path is not a timing-independent false

path iff there any on-path signal such that when it is a non-controlling value, one or more of its corresponding side-input signals are with non-controlling values in function mode.

Page 13: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Path Sensitizaton Given a path P, to determine whether it

is a timing-independent false path. Propagate logic ‘0’and ‘1’ at launch point.

Page 14: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Proposed Examination Procedure Phantom logic AND gate

Use AND gates and inverters to represent the illegal states.

Set output of AND gates to be logic ‘0’

Page 15: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Outline Introduction Preliminaries False Path Examination Method Experimental Results & Conclusion

Page 16: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Find False Path The number of false paths is exponential

to circuit size. Find the root cause structures

Prime False path segment

Page 17: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010
Page 18: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Static Implication Learning Consider illegal state: {FF0(1), FF2(1)}

Conduct implication for the inverse values of FF0(0), FF2(0) independently

FF0(0)=>B(0)=>G(0) FF2(0)=>A(0)=>C(1)

=>D(0)=>F(1)

Use counter-positive low

Page 19: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Suspicious Node Extraction Suspicious Node

Starting point of S-Frontier All the possible false segments can be

detect. The selected points are as less as possible.

Affect Node The nodes have implications after Static

Implication Learning. Not all the affect nodes need to consider

as the starting points.

Page 20: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

S-Frontier Propagation Do a BFS process to launch nodes with

0(1) Created at each suspicious node Launch 0(1) and propagate to new node Add the implication and check if meet the

illegal state. Check the starting point

is already in existing falsepath segment to avoidfinding the same segment.

Page 21: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Outline Introduction Preliminaries False Path Examination Method Experimental Results & Conclusion

Page 22: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Experiment Results Benchmark

ISCAS’89 IWLS 2005

Environment 2GHz PC 1GB memory

Competitor [5] Fast Identification of Untestable Delay

Faults Using Implications

Page 23: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Experiment Results (cont.) Use PrimeTime to fetch 5000 critical

paths Worse Case Delay(WCD)

Report the true critical paths delay

Page 24: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Experiment Results (cont.) Use academic ATPG tool Atalanta [7]

Check whether we can find a solution to activate them.

Page 25: On Timing- Independent False Path Identification Feng Yuan, Qiang Xu Cuhk Reliable Computing Lab, The Chinese University of Hong Kong ICCAD 2010

Conclusion Develop novel false path identification

techniques by taking illegal states in the circuit into consideration.

The proposed solution find much more false paths than existing FPI techniques.