Hardware control path redundancy for functional safety of peripherals

ABSTRACT

Techniques including receiving a first control value, starting a timeout counter based on receiving the first control value, receiving a second control value, determining whether the second control value is received before the timeout counter expires, and based on the determination that the second control value is received before the timeout counter expires: determining whether the first control value is the same as the second control value, and loading the first control value into a set of control registers based on the determination that the first control value is the same as the second control value.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to India Provisional Application No. 202141007281, filed Feb. 22, 2021, which is hereby incorporated by reference.

BACKGROUND

Increasingly, computing hardware is used in safety and mission-critical applications where the computing hardware is expected to resist failure or continue operating despite errors, such as hardware errors. Redundancy may be used to help provide this fault tolerance. Often this redundancy may be provided through redundancy of computing hardware, such as processor, storage, sensors, peripherals, etc., performing the computation with a primary computing unit and a redundant computing unit, and comparing the output from the primary computing unit against the output from a redundant computing unit to determine whether the outputs are consistent with each other.

One source of errors in computing systems includes single event upset, or soft errors, in which a signal or data is changed, disrupting the computing system. These disruptions may be caused by radiation, high energy particles, etc., which can cause, among other possible errors, bit flips or other such data corruption. If data including such an error is passed from one component of a computing system to another, such as from a processor to a peripheral, the error can further cause downstream issues, such as data corruption/loss, erroneous operation of components, etc. While duplicate computing systems can help detect such errors, completely duplicating the computing hardware can be expensive. Techniques which maintain functional safety, that is, the overall safety of a system, while reducing costs, for example as compared to completely duplicating the computing system, may be useful.

SUMMARY

This disclosure relates to a technique including a circuit that includes a first set of registers configured to receive a first control value, a second set of registers configured to receive a second control value, and a timeout counter. The circuit further includes a functional safety controller coupled to the timeout counter, wherein the functional safety controller is configured to start the timeout counter when the first control value is received and determine whether the second control value is received before the timeout counter expires. The circuit also includes a comparator coupled to the first set of registers, the second set of registers, and the functional safety controller, wherein the comparator is configured to determine whether the first control value is the same as the second control value. The functional safety controller is further configured to load the first control value into a set of control registers based on the first control value being the same as the second control value.

Another aspect of the present disclosure relates to a method that includes receiving a first control value, starting a timeout counter based on receiving the first control value, and receiving a second control value. The method further includes determining whether the second control value is received before the timeout counter expires. Based on the second control value being received before the timeout counter expires, the method further includes determining whether the first control value is the same as the second control value and loading the first control value into a set of control registers based on the first control value being the same as the second control value.

Another aspect of the present disclosure relates to a device that includes a first set of registers configured to receive a first control value, a second set of registers configured to receive a second control value, and a timeout counter. The device further includes a functional safety controller coupled to the timeout counter. The functional safety controller is configured to start the timeout counter when the first control value is received and determine whether the second control value is received before the timeout counter expires. The device further includes a comparator coupled to the first set of registers, the second set of registers, and the functional safety controller. The comparator is configured to determine that the first control value is the same as the second control value. The functional safety controller is further configured to load the first control value into a set of control registers based on the first control value being the same as the second control value.

BRIEF DESCRIPTION OF THE DRAWINGS

For a detailed description of various examples, reference will now be made to the accompanying drawings in which:

FIG 1 is a block diagram of a peripheral with control path redundancy, in accordance with aspects of the present disclosure.

FIG. 2 is a state diagram of control path redundancy for a peripheral, in accordance with aspects of the present disclosure.

FIG. 3 is a timing diagram illustrating valid control register access, in accordance with aspects of the present disclosure.

FIG. 4 is a timing diagram illustrating a control register access data mismatch, in accordance with aspects of the present disclosure.

FIG. 5 is a timing diagram illustrating a safety counter timeout, in accordance with aspects of the present disclosure.

FIG. 6 is a flow diagram illustrating a technique for control path safety, in accordance with aspects of the present disclosure.

DETAILED DESCRIPTION

Often, computing hardware and systems are configured to monitor and/or operate various peripherals. Such systems often include a data path to interface with the peripheral as well as a control path to configure and/or control the operations of the computing hardware. In some cases, information carried on the data path changes often when the peripheral is operating, and the likelihood that any single error on the data path will cause a safety-related fault is small, as the data can be updated quickly, clearing the error. For example, a real-time sensor may provide data from the sensor multiple times per second, and a single error in the data may be ignored or smoothed out by non-erroneous data received after the single error. Information on the control path, however, can be infrequently changed and remain relatively static for relatively long periods of time. For example, a real-time sensor may be configured via the control path when powered on and only reconfigured when power cycled. A transient error on the control path can be more problematic, as the error may result in undesired and/or incorrect operation of the computing hardware rather than a transient error on the data path. Thus, a high level of functional safety may be obtained by providing a level of redundancy for the control path of a peripheral. Generally, a peripheral may provide connectivity, services, and/or interfaces for a processor. Examples of peripherals include, but are not limited to, universal serial bus (USB), multimedia card (MMC), display connectivity, and graphical operations, for example, via a graphics processing unit or other image processing hardware, sensors, PCI express (PCIe) interface, etc, In some cases, the processor and some peripherals may be integrated together, for example, on a system on a chip (SoC).

FIG. 1 is a block diagram of a peripheral 100 with control path redundancy, in accordance with aspects of the present disclosure. It may be understood that, for clarity, the components of peripheral 100 as shown focus on aspects of the control path for peripheral 100, It should be understood that peripheral 100 may include other components that are not shown. As shown, the peripheral 100 may be coupled to one or more processors via a processor bus 102 that is communicatively coupled to a set of registers 104. The registers are used to communicate, by the peripheral 100, with the coupled one or more processors. For example, a processor may pass data to the peripheral 100 by writing to one or more of registers of the set of registers 104, and the peripheral 100 may pass data to the processor by writing data to one or more registers of the set of registers 104. The set of registers 104 may include multiple regions, including a primary register region 110 and a secondary register region 112.

In some cases, the set of registers 104 may be memory-mapped registers. Where the registers are memory mapped, accessing a specific memory address, for example, by a processor, accesses a specific register of the peripheral. For example, certain memory addresses, such as memory addresses 0-7 accessible by the processor, may be mapped to registers of the peripheral 100, such as registers 7-14, corresponding with configuration registers 108B. A range or region of memory addresses corresponding to a set of registers, such as the primary register region 110 and/or secondary register region 112, may be referred to as an aperture (e.g., primary register aperture and secondary register aperture). For example, the primary register region 110 may be associated with a primary aperture or range of memory addresses with a certain base (e.g., starting) memory address, and the secondary register region 112 may be associated with a secondary aperture or range of memory addresses with a different base memory address. In some cases, the primary aperture and the secondary aperture may together form a continuous range of memory addresses.

The register regions of the set of registers 104 may be further divided based on the intended purpose of the registers. For example, register regions of the set of registers 104 may include both control type registers as well as data registers. In this example, the primary register region 110 includes both data registers 106 and control type registers 108. The control type registers 108 may include control registers 108A, configuration registers 108B, and status registers 108C. The secondary register region 112 in this example includes the control type registers 114, which includes control registers 114A, configuration registers 114B, and status registers 114C, but does not necessarily include corresponding data registers. The control type registers 114 of the secondary register region 112 correspond to the control type registers 108 of the first register region 110.

In this example, the primary register region 110 is coupled to primary shadow registers 116 and the secondary register region 112 is coupled to secondary shadow registers 118. The primary shadow registers 116 and the secondary shadow registers 118 are both coupled to comparator 120, which is in turn coupled to a functional safety controller (FSC) 130. The FSC 130 may be implemented by a finite state machine, other hardware, software, or any combination thereof. As an example, the FSC 130 may include hardware implementing a finite state machine for updating and/or setting the primary control registers for controlling the peripheral 100. The primary shadow registers 116 are further coupled to primary control registers 122 and redundant control registers 124. The primary control registers 122 may be the registers that are used during operations of the peripheral 100 to control the operations of the peripheral 100, and the redundant control registers 124 may be a copy of the primary control registers 122. The primary control registers 122 and the redundant control registers 124 may be coupled to a comparator 126, which compares the values stored in the primary control registers 122 and the redundant control registers 124 to verify that the values are the same. The comparator 126 is coupled to a switch 128, which is coupled to the FSC 130. If the comparator 126 determines that the primary control registers 122 and the redundant control registers 124 match, then the values in primary control registers 122 and the redundant control registers 124 are used, for example, to control the peripheral. If comparator 126 determines that the primary control registers 122 and the redundant control registers 124 do not match, the comparator 126 may send an indication, such as a transient fault indication, to switch 128.

In some cases, switch 128 may also be coupled to one or more primary status registers. In this example, the peripheral includes one or more primary status registers 132. The peripheral also includes one or more redundant primary status registers 134, which correspond with the one or more primary status registers 132. The primary status registers 132 and the redundant primary status registers 134 are coupled to comparator 136, and comparator 136 is coupled to switch 128. In some cases, the primary status registers 132 may be coupled to the primary shadow registers 116 (not shown) and the redundant primary status registers 134 may be coupled to the secondary shadow registers 118 (not shown).

The FSC 130 is also coupled to a safety timeout counter 138, which is coupled to and receives a clock signal from a clock controller 140. The safety timeout counter 138 is coupled to and receives a safety timeout value 142 via mux 144. The FSC 130 is also coupled to and configured to send safety warning events 154 to the processor. The FSC 130 is also coupled to and configured to send safety warning events to a safety warning counter 146, and a value of the safety warning counter 146 may be output to a coupled comparator 150. A safety warning threshold 148 is also input to the comparator 150, and when the value of the safety warning counter 146 matches and/or exceeds the safety warning threshold 148, a safety fault event 156 may be output to the processor and/or the peripheral reset 158. In some cases, the safety warning threshold 148 may be configurable, for example, by an application. In some cases, a safety disable signal may also be input to a safety disable register 152 of the FSC 130.

As shown, the set of registers 104 may be split into two general regions, the primary register region 110 and the secondary register region 112. The primary register region 110 may include a set of control registers 108 corresponding to the primary control registers 122 (e.g., a full set of control registers for controlling the peripheral 100) as well as the data registers 106. The secondary register region 112 also contains a full set of control registers 114 for controlling the peripheral 100. While in this example, the secondary register region 112 does not include data registers, in other cases, the secondary register region 112 may include data registers and data register redundancy may be implemented in a substantially similar way to control register redundancy as described herein.

The secondary register region 112 helps provide redundancy by ensuring that a control signal is correctly received. In accordance with aspects of the present disclosure, a control signal, such as one received from a processor, may be received by and written into the control registers 108 of the primary register region 110. The values written into the control registers 108 may be stored in the primary shadow registers 116. When a write to the control registers 108 of the primary register region 110 and/or primary shadow registers 116 is detected, a safety timeout counter 138 may be started by, for example, the FSC 130 while waiting for a second control signal.

If a second control signal is received by and written into the control registers 114 of the secondary register region 112, the values written into the secondary register region may be stored in the secondary shadow registers 118. The values stored in the primary shadow registers 116 may be compared to the values stored in the secondary shadow registers 118 by, for example, the comparator 120. The comparator 120 may indicate to the FSC 130 whether the values match.

If the comparator 120 indicates to the FSC 130 that the values match, then the FSC 130 may indicate to the primary control registers 122 and the redundant control registers 124 to load the values from the primary shadow registers 116 for use by the peripheral 100. The FSC 130 may also indicate to the safety timeout counter 138 to reset the safety timeout counter. The values loaded into the primary control registers 122 and the redundant control registers 124 may be compared by comparator 126. The values in the primary control registers 122 are used to control the peripheral 100. In some cases, the comparator 126 may continue to monitor the primary control registers 122 and redundant control registers 124 to ensure that values stored in the control registers are consistent. If the values in the primary control registers 122 and redundant control registers 124 become inconsistent, for example, due to a bit flip event, then the comparator 126 may send an indication, such as a transient fault indication, to switch 128.

In some cases, a control signal, such as one received from a processor via processor bus 102, may be a read request for information stored in a status register. Status registers, such as status registers 108C and 114C, may include information about the peripheral and may be updated by the peripheral 100 based on one or more states of the peripheral. When a read request is received for one or more registers of the status registers 108C, a value stored in the corresponding registers of the primary status register 132 may be read into the primary shadow registers 116 and status register 108C for return via the processor bus 102.

To help ensure that the received read request was an intentional read request, the control path redundancy may require that a second, corresponding read request for one or more corresponding registers of status registers 114C be received within a certain time period, as a received read request for may change one or more internal states of the peripheral 100. For example, when a read request for a value of a register of the status registers 108C is received, an indication of the received read request may be recorded in the status registers 108C and/or corresponding registers of the primary shadow registers 116. The safety timeout counter 138 may be started, by, for example, the FSC 130 while waiting for the second read request.

If the second read request for one or more corresponding registers of status registers 114C is received before the safety timeout counter 138 has expired, then an indication of the received read request may be recorded in status registers 114C and/or corresponding registers of the secondary shadow registers 118. A value stored in the corresponding registers of the redundant primary status registers 134 may be read into the secondary shadow registers 118 and status registers 114C. If the second read request is not received before the safety timeout counter 138 expires, the FSC 130 may transmit an indication of a safety warning event 154, for example, to the processor, and any indications of the received read request recorded in the primary shadow registers 116 are ignored.

In some cases, the peripheral 100 may update a status register in the primary status registers 132 and a corresponding status register in the redundant primary status registers 134. The values of registers in the primary status registers 132 are compared with the values of registers in the redundant status registers 134 by comparator 136 to verify that the values are the same. If comparator 136 detects that values of registers in the primary status registers 132 do not match values of registers in the redundant status registers 134. then comparator 136 may send an indication of the mismatch, such as a transient fault indication, to switch 128.

If either comparator 136 or comparator 126 indicates to switch 128 that there was a mismatch in their corresponding register values, the switch 128 may pass on the indication to the FSC 130. The FSC 130 may then transmit an indication of a safety warning event 154, for example, to the processor.

In some cases, a safety warning counter 146 may be incremented each time a safety warning is transmitted. This safety warning counter 146 may be compared, for example, by comparator 150, to the safety warning threshold 148, and if the safety warning counter 146 exceeds or is equal to the safety warning threshold 148, a safety fault event 156 may be transmitted, for example, to the processor, and/or the peripheral 100 may be reset 158.

The processor, upon receiving the safety warning event 154 and/or the safety fault event 156 may take an application-controlled action and attempt to address the safety warning event 154 and/or the safety fault event 156.

As discussed above, after a value is written to the control registers 108 of the primary register region 110 and/or primary shadow registers 116, the safety timeout counter 138 is started. The safety timeout counter 138 is set based on the safety timeout value 142. The safety timeout value 142, in some cases, may be preconfigured, such as during a boot initialization of the peripheral or hard-coded at the factory. In some cases, the safety timeout value 142 may be configured, for example, during a development and/or configuration process and loaded during boot up. In some cases where the safety timeout value 142 is configured during boot up, the safety timeout value 142 may be locked from modification while the device is running. The safety timeout counter 138 may count clock ticks from the clock controller 140. If the safety timeout counter 138 expires without an indication from the comparator 120 that a second signal with a value matching the value in the first signal was received (e.g., the second signal was not received), then the values in the primary shadow registers 116 are ignored and not loaded into the primary control registers 122, and the FSC 130 may transmit an indication of a safety warning event 154, for example, to the processor.

In some cases, the FSC 130 may include a safety disable register 152. The safety disable register 152 may disable the control path redundancy for the peripheral 100. In some cases, the control path redundancy for the peripheral 100 is disabled, the primary register region 110 may be used, and the secondary register region 112 may be ignored. In some cases, the safety disable register 152 may be configured, for example, during boot up of the peripheral 100.

In cases where read-to-clear registers are used for the control registers 108 of the primary register region 110 and/or control registers 114 of the secondary register region 112, the registers may be cleared after the register values have been read from both the primary register region 110 and the secondary register region 112.

As indicated above, the peripheral 100 may be coupled to one or more processors via the processor bus 102 that is communicatively coupled to the set of registers 104, including the primary register region 110 and the secondary register region 112. In some cases, the first signal and the second signal may be transmitted by any of the coupled one or more processors. For example, a first processor may transmit the first signal, setting certain values of the control registers 108 of the primary register region 110, and another processor (or the first processor) may transmit the second signal, setting corresponding values of the control registers 114 of the secondary register region 112.

FIG. 2 is a state diagram 200 of control path redundancy for a peripheral, in accordance with aspects of the present disclosure. This example state diagram 200 may illustrate operating states of the FSC 130 of FIG. 1 . At state 202, the FSC may be in an idle state, waiting for a first signal writing an update and/or change to the primary register region to be received by the peripheral. Once a write to the primary register region 204 is detected, the FSC may transition to a first write state 206. In the first write state 206, a safety timeout counter may be started and values written to the primary register region may be copied to the primary shadow register 208. The safety timeout counter may be active and adjusted (e.g., incremented or decremented) 210 based on the dock as the FSC waits to receive a second signal writing an update and/or change to the secondary register region. If the safety timeout counter expires 212 without a write to the secondary register region 218 being detected, the FSC enters a fault state 214. In the fault state 214, the FSC asserts a safety warning event 216 and then returns to the idle state 202.

While in the first write state 206, if a write to the secondary register region 218 is detected, the FSC may transition to a second write state 220. In the second write state 220, the safety timeout counter may be reset and values written to the secondary register region may be copied to the secondary shadow register 222. The FSC may then transition to a compare state 224, where values stored in the primary shadow register are compared to values stored in the secondary shadow register 226.

If the values stored in the primary shadow register match 228 the values stored in the secondary shadow register, then the FSC may transition to an update state 260, where the primary control registers and redundant control registers may be updated 232. The FSC may then return to the idle state 202.

If the values stored in the primary shadow register do not match 234 the values stored in the secondary shadow register, then the FSC may transition to the fault state 214, and the FSC may assert the safety warning event 216. The FSC may then return to the idle state 202.

FIG. 3 is a timing diagram 300 illustrating valid control register access, in accordance with aspects of the present disclosure. As shown, the timing diagram 300 includes, on a time axis 302, writes to a control register in a primary register region 304, writes to a primary shadow register 306, values of a safety timeout counter 308, safety timeout events 310, writes to a control register in a secondary register region 312, writes to a secondary shadow register 314, comparator match indication 316, primary control register values 318, FSC states 320, and safety warning event 322. As shown, the FSC state 320 is in an idle state 324 initially. At time 326, a write to a control register in the primary register region 328 occurs. In this example, the value of this write is 0x3489. This written value is copied 330 into the primary shadow register 306, and the safety timeout counter 308 is started 332. The safety timeout counter 308 counts out a safety timeout window 334. The FSC state 320 then transitions to a first write state 336.

Prior to the expiration of the safety timeout window 334, a write to a control register in the secondary register region 312 occurs 338 at time 346, and this written value is copied 340 into the secondary shadow register 314. The FSC state 320 also transitions to a second write state 342, and the safety timeout counter 308 is reset 344. In this example, the value of this write is also 0x3489.

The FSC state 320 may transition to the compare state 350, and values in the primary shadow register and secondary shadow register may be compared. An indication that the values match 348 may be raised based on the comparison. Based on the indication that the values match 348, the FSC state 320 may transition to the update state 352 and the primary control register 318 updated 354 with the new value, here 0x3489. After the primary control register 318 is updated, the FSC state 320 may transition back to the idle state 356.

FIG. 4 is a timing diagram 400 illustrating a control register access data mismatch, in accordance with aspects of the present disclosure. As with FIG, 3, timing diagram 400 includes, on a time axis 302, writes to a control register in a primary register region 304, writes to a primary shadow register 306, values of a safety timeout counter 308, safety timeout events 310, writes to a control register in a secondary register region 312, writes to a secondary shadow register 314, comparator match indication 316, primary control register values 318, FSC states 320, and safety warning events 322. As before, the FSC state 320 is in an idle state 324 initially. At time 326, a write to a control register in the primary register region 328 occurs. In this example, the value of this write is 0x3489. This written value is copied 330 into the primary shadow register 306, and the safety timeout counter 308 is started 332. The safety timeout counter 308 counts out a safety timeout window 334. The FSC state 320 then transitions to a first write state 336.

Prior to the expiration of the safety timeout window 334, a write to a control register in the secondary register region 312 occurs 338 at time 346, and this written value is copied 340 into the second shadow register 314. The FSC state 320 also transitions to a second write state 342, and the safety timeout counter 308 is reset 344. In this example, the value of this write is 0x3009, different from the value 0x3489 written into the primary control registers.

The FSC state transitions to the compare state 350. When the values in the primary shadow register and secondary shadow register are compared, a determination is made that the values do not match, and no indication that the values match is raised. As no indication that the values match is received by the FSC, the FSC state 320 transitions to a fault state 402, and a safety warning event 322 is raised 404. The FSC state 320 may then transition back to an idle state 406.

FIG. 5 is a timing diagram 500 illustrating a safety counter timeout, in accordance with aspects of the present disclosure. As with FIGS. 3 and 4 , timing diagram 500 includes, on a time axis 302, writes to a control register in a primary register region 304, writes to a primary shadow register 306, values of a safety timeout counter 308, safety timeout events 310, writes to a control register in a secondary register region 312, writes to a secondary shadow register 314, comparator match indication 316, primary control register values 318, FSC states 320, and safety warning events 322. As before, the FSC state 320 is in an idle state 324 initially. At time 326, a write to a control register in the primary register region 328 occurs. In this example, the value of this write is 0x3489. This written value is copied 330 into the primary shadow register 306, and the safety timeout counter 308 is started 332. The safety timeout counter 308 counts out a safety timeout window 334. The FSC state 320 then transitions to a first write state 336.

In this example, a second signal is not received prior to the expiration of the safety timeout window 334, and the secondary register region and secondary shadow register 314 still retain their previous values, here 0x1245. When the safety timeout window 334 expires 502 at time 504, a safety timeout event 310 is raised 508, causing the FSC state 320 to transition to a fault state 506. The safety timeout counter 308 may be reset 512. The FSC may then raise 510 a safety warning event 322. The FSC state 320 may then transition to an idle state 514.

FIG. 6 is a flow diagram illustrating a technique 600 for control path safety, in accordance with aspects of the present disclosure. At block 602, a first control value is received. For example, a peripheral may include a set of registers. The set of registers may include a first set of control registers and a second set of control registers for receiving control values for the peripheral. A control signal including a first control value may be received when the first control value is written into the first set of control registers. At block 604, a timeout counter is started based on receiving the first control value. For example, a timeout counter is started when the first control value is written into the first set of control registers. In some cases, the timeout counter may be preconfigured, for example, at boot time of the peripheral. At block 606, a second control value is received. For example, a second control signal including a second control value may be received when the second control value is written into the second set of control registers. At block 608, a determination whether the second control value is received before the timeout counter expires is made. In some cases, the second control signal may not be received. If the second control signal is not received before the expiration of the timeout counter, then a safety event may be raised. In some cases, the safety event may be a warning event. In some cases, the safety event may be a fault event and/or other kind of event. This safety event may be transmitted to one or more processors, for example, via a processor bus. In some cases, a number of safety events may be determined and compared to a safety warning threshold. If the number of safety events exceeds the safety warning threshold, a safety fault event may be raised. In some cases, the peripheral may be reset if the number of safety events exceeds the safety warning threshold. At block 610, based on the second control value being received before the timeout counter expires, a determination whether the first control value is the same as the second control value is made. For example, where the second control value is received before the timeout counter expires, the first control value may be compared to the second control value to determine whether the values match. In some cases, if the first control value does not match the second control value, a safety event may be raised. When the first control value matches the second control value, at block 612, the first control value is loaded into a set of control registers based on the first control value being the same as the second control value. For example, the received first control value may be loaded into a set of registers that are actually used to control the peripheral.

In this description, the term “couple” may cover connections, communications, or signal paths that enable a functional relationship consistent with this description. For example, if device A generates a signal to control device B to perform an action: (a) in a first example, device A is coupled to device B by direct connection; or (b) in a second example, device A is coupled to device B through intervening component C if intervening component C does not alter the functional relationship between device A and device B, such that device B is controlled by device A via the control signal generated by device A.

Modifications are possible in the described embodiments, and other embodiments are possible, within the scope of the claims. 

What is claimed is:
 1. A circuit, comprising: a first set of registers configured to receive a first control value; a second set of registers configured to receive a second control value; a timeout counter; a functional safety controller coupled to the timeout counter, wherein the functional safety controller is configured to: start the timeout counter when the first control value is received; and determine whether the second control value is received before the timeout counter expires; and a comparator coupled to the first set of registers, the second set of registers, and the functional safety controller, wherein the comparator is configured to determine whether the first control value is the same as the second control value, and wherein the functional safety controller is further configured to load the first control value into a set of control registers based on the first control value being the same as the second control value.
 2. The circuit of claim 1, wherein the first set of registers and the second set of registers are coupled to a bus, and wherein the first control value and the second control value are received via the bus.
 3. The circuit of claim 1, wherein the first set of registers is configured to copy the first control value into a first shadow register, and wherein the second set of registers is configured to copy the second control value into a second shadow register.
 4. The circuit of claim 3, wherein the comparator is coupled to the first shadow register and the second shadow register, and wherein the comparator compares the first control value in the first shadow register to the second control value in the second shadow register to determine that the first control value is the same as the second control value.
 5. The circuit of claim 1, wherein the first set of registers and the second set of registers comprise memory-mapped registers.
 6. The circuit of claim 1, wherein the functional safety controller is further configured to raise a safety event based on the first control value not being the same as the second control value.
 7. The circuit of claim 1, wherein the functional safety controller is further configured to raise a safety event based on the timeout counter having expired.
 8. The circuit of claim 1, wherein a value of the timeout counter is based on a value configured during a boot-up process for the circuit and locked from modification while the circuit is running.
 9. The circuit of claim 1, further comprising: a third set of registers configured to receive a first status value; a fourth set of registers configured to receive a second status value; another comparator coupled to the third set of registers and the fourth set of registers configured to determine whether the first status value is the same as the second status value; wherein the first set of registers is further configured to receive a request for the first status value; wherein the second set of registers is further configured to receive a request for the second status value; wherein the functional safety controller is further configured to: start the timeout counter when the request for the first status value is received; determine whether the request for the second status value is received before the timeout counter expires; load the first status value into the first set of registers; and load the second status value into the second set of registers.
 10. A method, comprising: receiving a first control value; starting a timeout counter based on receiving the first control value; receiving a second control value; determining whether the second control value is received before the timeout counter expires; and based on the second control value being received before the timeout counter expires: determining whether the first control value is the same as the second control value; and loading the first control value into a set of control registers based on the first control value being the same as the second control value.
 11. The method of claim 10, further comprising: copying the first control value into a first shadow register, and copying the second control value into a second shadow register.
 12. The method of claim 11, wherein determining that the first control value is the same as the second control value is based on the copied first control value in the first shadow register and the copied second control value in the second shadow register.
 13. The method of claim 11, further comprising: receiving a third control value; starting a second timeout counter based on receiving the third control value; raising a safety event based on one of: a fourth control value not being received before the timeout counter expires; and a determination that the third control value is not the same as a received fourth control value.
 14. The method of claim 13, further comprising counting a number of safety events raised.
 15. The method of claim 14, further comprising: determining whether the number of safety events exceeds a safety warning threshold; and at least one of: raising a safety fault event based on the number of safety events exceeding the safety warning threshold; and resetting a peripheral controlled based on the first control value and second control value.
 16. The method of claim 15, wherein the safety warning threshold is configurable.
 17. A device, comprising: a first set of registers configured to receive a first control value; a second set of registers configured to receive a second control value; a timeout counter; a functional safety controller coupled to the timeout counter, wherein the functional safety controller is configured to: start the timeout counter when the first control value is received; and determine whether the second control value is received before the timeout counter expires; and a comparator coupled to the first set of registers, the second set of registers, and the functional safety controller, wherein the comparator is configured to determine whether the first control value is the same as the second control value, and wherein the functional safety controller is further configured to load the first control value into a set of control registers based on the first control value being the same as the second control value.
 18. The device of claim 17, wherein the first set of registers and the second set of registers are coupled to a bus and wherein the first control value and the second control value are received via the bus.
 19. The device of claim 17, wherein the first set of registers is configured to copy the first control value into a first shadow register, and wherein the second set of registers is configured to copy the second control value into a second shadow register.
 20. The device of claim 19, wherein the comparator is coupled to the first shadow register and the second shadow register, and wherein the comparator compares the first control value in the first shadow register to the second control value in the second shadow register to determine that the first control value is the same as the second control value.
 21. The device of claim 17, wherein the first set of registers and the second set of registers comprise memory-mapped registers.
 22. The device of claim 17, wherein the functional safety controller is further configured to raise a safety event based on the first control value not being the same as the second control value.
 23. The device of claim 17, wherein the functional safety controller is further configured to raise a safety event based on the timeout counter having expired. 