17
PROCESSORS FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal, and Emulation Technologies

AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

Embed Size (px)

Citation preview

Page 1: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

PROCESSORS FOR THE CONNECTED WORLDYour application is unique, so why isn’t your processor?

AUTOMATED RISC-V VERIFICATION FLOWUtilizing Simulation, Formal, and Emulation Technologies

Page 2: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

FLEXIBLE RISC-V ISA�1 RISC-V ISA standard ð many RISC-V HW architecture variants:�Base is only integer instruction set ("I /E")�Can be enhanced by standard extensions: integer multiplication and division

("M"), atomic instructions for handling real-time concurrency ("A"), IEEE floating point ("F") with double-precision ("D") and quad-precision ("Q")�Can have compressed instructions (“C")�Can have different number of the registers (16 or 32) of different sizes (32 or 64

bits).

�We do not verify only 1 processor but many of its variants with enabled/disabled extensions!

Page 3: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

OVERVIEW�Codix Berkelium processors from Codasip

�Automated generation of SDK, tests, RTL, UVM by Codasip Studio

�Mentor formal, simulation, VIP, emulation tools

�Resulting productivity

Page 4: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

CODIX CORES

Page 5: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

CODIX BK3 – IP VARIANTS

I

E

I

E

M

I

E

C

I

E

C

M

Bk3

Standard ISA:I = integer ISA, 32 GPRsE = integer ISA, 16 GPRsM = multiplication extensionC = compressed instructions

Codasip HW extensions:U = user mode with memory protectionP = parallel multiplier/dividerj = branch predictiond = JTAG debug

Page 6: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

CODIX BK5 – IP VARIANTS

I

E

I

E

M

I

E

F

I

E

F

M

Bk5

Standard ISA:I = integer ISA, 32 GPRsE = integer ISA, 16 GPRsM = multiplication extensionF = floating-point ISA

Codasip HW extensions:U = user mode with memory protectiond = JTAG debug

Page 7: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

UNIQUE AUTOMATION TECHNOLOGY

Processor Modeling Software analysis SDK Synthesis RTL Synthesis Verification

Berkelium Microarchitecture

Codix Cycle Accurate Models Codix RTL ModelsCA Simulator, Profiler, Debugger

Application(s)/Programs(s)

C/C++ Compiler

Assembler

Linker

IA Simulator, Profiler, DebuggerCodix InstructionAccurate Models

Codix CodAL Models

RISC-V Instruction Set

Page 8: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

UNIQUE AUTOMATION TECHNOLOGY

Processor Modeling Software analysis SDK Synthesis RTL Synthesis Verification

Berkelium Microarchitecture

Codix Cycle Accurate Models Codix RTL ModelsCA Simulator, Profiler, Debugger

Application(s)/Programs(s)

C/C++ Compiler

Assembler

Linker

IA Simulator, Profiler, DebuggerCodix InstructionAccurate Models

Codix CodAL Models

RISC-V Instruction SetReference Models

UVM Verification

Page 9: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

MORE VERIFICATION, BETTER PRODUCTS

Page 10: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

RTL and Questa Autocheck

Verification Plan and Questa VRM

UVM and Questa Sim + Questa VIP

Regressions and Veloce Emulation

Page 11: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

RTL and Questa Autocheck

Verification Plan and Questa VRM

UVM and Questa Sim + Questa VIP

Regressions and Veloce Emulation

Page 12: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

RTL and Questa Autocheck

Verification Plan and Questa VRM

UVM and Questa Sim + Questa VIP

Regressions and Veloce Emulation

Page 13: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

RTL and Questa Autocheck

Verification Plan and Questa VRM

UVM and Questa Sim + Questa VIP

Regressions and Veloce Emulation

Page 14: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

RTL and Questa Autocheck

Verification Plan and Questa VRM

UVM and Questa Sim + Questa VIP

Regressions and Veloce Emulation

0:01:31

2:06:55

21:08:11

0:01:52 0:33:13

5:17:35

0:00:00

2:24:00

4:48:00

7:12:00

9:36:00

12:00:00

14:24:00

16:48:00

19:12:00

21:36:00

0:00:00

Totaltestingtimefor1randomprogram

Totaltestingtimefor100randomprograms

Totaltestingtimefor1000randomprograms

Time[h:m:s]

Totaltestingtimefor1,100and1000programs

Simulator(QuestaSim) Emulator(Veloce)

0:00:15

0:01:16

0:01:33

0:00:19

0:00:00

0:00:17

0:00:35

0:00:52

0:01:09

0:01:26

0:01:44

CompilationofRTLfiles Simulation/emulationof1randomprogram(~100000instructions)

Time[hh:mm:ss]

Maindifferencesbetweensimulationandemulation

Simulator(QuestaSim) Emulator(Veloce)

Comparisonoftotaltimeneededfortesting

(differenttimescale!)

Page 15: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

SHORTENING DEVELOPMENT TIME

0

50

100

150

200

250

300

350

400

450

500

550

600

ADLprocessormodel SDK RTL UVMenvironment ISAtests Micro-architecturaltests

Verificationanddebugging

Man-days

Sub-variant/Extension-variantofRISC-Vcore+acceleratedverification(reuse)

InitialdevelopmentflowbyCodasip+fullverification

StandardRISC-Vprocessordevelopmentflow

125 days

570days

30days

Page 16: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

SUMMARY�When we want to make RISC-V successful, strength is in maximizing

automation in generating RTL and verification!

�Codasip automates most processes from single high-level description, including RTL, SDK and UVM generation

�Long-term partnership with Mentor increases quality of Berkelium cores every day J

Page 17: AUTOMATED RISC-V VERIFICATION FLOW FOR THE CONNECTED WORLD Your application is unique, so why isn’t your processor? AUTOMATED RISC-V VERIFICATION FLOW Utilizing Simulation, Formal,

� ¬

Thank you for your attention!

[email protected], [email protected]+420 541 141 475 (CZE) www.codasip.com, www.mentor.com