Integrated Verification Approach During ADL-Driven Processor Design

Integrated Verification Approach During ADL-Driven Processor Design

Integrated Verification Approach during ADL-driven Processor Design Anupam Chattopadhyay1, Arnab Sinha2, Diandian Zhang1, Rainer Leupers1, Gerd Ascheid1, and Heinrich Meyr1 1Aachen University of Technology, Integrated Signal Processing Systems, 52056 Aachen, Germany, Email - [email protected], Tel - 00-49-241-80-28272, Fax - 00-49-241-80-22195 2Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, India Abstract level of abstraction. These ADL-based approaches, require to pass through several synthesis steps and thereby, come with a costly Nowadays, Architecture Description Languages (ADLs) are verification effort. On the other extreme, the processor design is getting popular to achieve quick and optimal design convergence simplified by limiting the choice of design within a range of pre- during the development of Application Specific Instruction-Set verified IPs or allowing fine-tuning of an existing template proces- Processors (ASIPs). Verification, in various stages of such ASIP sor core [4] [5]. This template-based approach allows quick ver- development, is a major bottleneck hindering widespread accep- ification with limited choice of application-specific optimizations. tance of ADL-based processor design approach. Traditional veri- Since, the major part of the processor is available as pre-verified fication of processors are only applied at Register Transfer Level IP, the verification concern is focussed on the possible designer- (RTL) or below. In the context of ADL-based ASIP design, this defined configurations or the extensions of the basic template. In verification approach is often inconvenient and error-prone, since order to reach the high flexibility like ADLs, more and more con- design and verification are done at different levels of abstrac- figurations need to be supported, eventually increasing the veri- tion. In this paper, this problem is addressed by presenting an fication effort. Clearly, there is a trade-off between optimization integrated verification approach during ADL-driven processor de- and verification effort. sign. Our verification flow includes the idea of automatic assertion Independent of the two separate approaches, verification has generation during high-level synthesis and support for automatic received continuous attention from EDA researchers. With the test-generation utilizing the ADL-framework for ASIP design. We traditional processor design approach, the verification is primarily show the benefit of our approach by trapping errors in a pipelined done in the Register Transfer Level (RTL) or below. Simulation- SPARC-compliant processor architecture. based verification is a commonly known verification technique. In this domain, test patterns targeted to detect faults are fed into the design-under-test. However, the number of exhaustive test pat- terns being huge, automated test pattern generation approaches are 1. Introduction adopted. On the other hand, with the advent of hardware verifi- The growing design complexity coupled with diverse, narrow- cation languages like Vera, e, designed for automatic verification ing application domains have increased the importance of verifi- environment, has tried to blend simulation based approach with cation in the design cycle of today’s embedded processors consid- formal verification approaches. Among the semi-formal method- erably. The designer needs to deliver the optimum performance in ologies, assertion-based verification achieved prominence. As- a short time without compromising the verification issues. While sertions are properties, which expresses the designers’ intent in a optimal processor performance is achieved by flexible solutions purely mathematical language. The properties, expressed as as- like introducing special instructions into the Instruction-Set Ar- sertions, help the verification engineer in a large way because, the chitecture (ISA), the task of verification is simplified by starting latter can identify the designers’ intent in a clear logical manner. from pre-verified IP blocks. As a result, the processor design com- In essence, varied verification approaches are making their way munity have emerged with distinct trends in the processor design into commercial and academic acceptance. Contemporarily, in or- approach. At one extreme, the processor design is performed on a der to handle the demanding design complexity, the designers are high level of abstraction, thereby allowing fast design space explo- seeking their way to express the design in a high level of abstrac- ration and ample scope of optimization for target-specific archi- tion, which sometimes come at the penalty of longer verification tectures. Architecture Description Languages (ADLs) offer one cycle. With traditional verification approach, the ADL has to be promising avenue for efficient design of an highly application- synthesised to generate the RTL and then RTL-based verification specific processor. ADLs [1] [2] [3] are employed to model the methodologies need to be applied. In this approach, the ADL- Application Specific Instruction-Set Processor (ASIP) at a higher based information about the architecture is often lost in the syn- Proceedings of the Seventeenth IEEE International Workshop on Rapid System Prototyping (RSP'06) 0-7695-2580-6/06 $20.00 © 2006 IEEE Authorized licensed use limited to: Princeton University. Downloaded on August 19, 2009 at 15:37 from IEEE Xplore. Restrictions apply. thesis process thereby, making the RTL-driven verification pro- our knowledge. ADL EXPRESSION used assertions during their cess imprecise and computationally complex. An integrated ver- top-down validation flow. In their approach, the ADL description ification flow merging the concepts of ADL and different genres automatically generates an RTL description. A symbolic simula- of verification is of high interest for fast and error-free processor tor automatically generates property/assertion from the generated design. We address this issue in this paper. Our work focuses RTL description [14] (figure 2). The drawback with this approach on the ADL-based approach, for which there is a strong need for is that the generation of property/assertion is done from the auto- seamless and robust verification methodology. We chose the ADL matically generated RTL and not from the ADL. Therefore, this LISA for our work. We have integrated a mix of semi-formal and approach heavily relies on the correct generation of the RTL from simulation-based verification methodology in our ADL-based ver- the ADL. Understandably, in their approach the automatically gen- ification approach. In summary, the contribution of this paper is to erated RTL is considered as golden reference, which is used to ver- present: ify manually implemented RTL design. In our approach, we take it a step higher and try to verify the correctness of the ADL descrip- • An ADL-driven assertion-based verification methodology. tion itself. Therefore, it is imperative to automatically generate the • A semi-automatic user-constrained test generation method- assertions from the ADL, as proposed in this paper. ology for ADL-driven ASIP design. In the domain of ADL-based automatic test pattern generation, there are existing methodologies [6] [15]. We propose an alterna- Our work complements the existing ADL-based processor de- tive ADL-based test-generation methodology, where the user can velopment flow by adding the verification flow. The components strongly influence the test-pattern generation. The existing test- of the verification framework are completely derived from the generation methodologies focus on the statement coverage [9] or ADL description, thereby minimizing the chances of design in- functional coverage [15]. These approaches, though introduces consistency. As a case study, we chose a 7-stage, SPARC v8 com- novel test pattern generation techniques, allows little user inter- patible processor and showed the strength of our approach by un- action in the process. Our approach is semi-automatic in nature, covering hidden and injected errors. where user deals with the instruction grammar to influence the test The rest of the paper is organized as follows: section 2 intro- patterns. This is closer to the approach of IBM Genesys [11] but, duces the previous work in this domain. Section 3 discusses the our approach does not require separate modelling of architecture basic features of LISA. Section 4 describes the complete verifi- or test template. cation flow in detail. Section 5 elaborates and analyzes our case study. We conclude with the summary and outlook. 3. Brief Overview of LISA In this section, a brief overview of the architecture description 2. Related Work language LISA is provided. Only those language elements, which Processor verification had always remained a major issue for are relevant for this paper are covered here. the research community from the inception of processor design. Evolving processor design concepts e.g. pipelining and VLIW 3.1 LISA Operation Graph made the task of verification even more demanding, thereby ren- In LISA, an operation is the central element to describe the dering exhaustive manual testing to be an impractical and ineffi- timing and the behavior of a processor instruction. The instruction cient solution. Consequently, numerous verification approaches may be split among several LISA operations. The resources (reg- and techniques emerged over the past decades. Here, we limit our isters, memories, pins etc.) are declared globally in the resource discussion among ADL-based verification approaches. section,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us