Cloud native EDA tools & pre-optimized hardware platforms
Arm? recently announced the availability of the next version of the Arm? AMBA? 5 CHI Protocol Specification, .
Synopsys offers a broad set AMBA protocol solutions for early modelling, design, implementation, verification, validation, and system bring-up. Synopsys¡¯ industry leading verification solutions for Arm protocols cover a full range of AMBA specifications including next generation AMBA 5 AXI-K and now AMBA 5 CHI-G. Synopsys¡¯ verification automation solutions also offer testbench generation with Synopsys VC AutoTestbench and performance verification of Arm based SoCs with Synopsys VC AutoPerformance.
¡°Synopsys offers comprehensive protocol verification solutions for all existing and next-generation AMBA specifications, including AMBA 5 CHI-G,¡±?said Vikas Gautam, vice president of R&D for the Synopsys Verification Group. ¡°Our verification solutions leverage Synopsys leading IPs to drive best-in-class verification credibility, and our offerings for Simulation, Emulation and Prototyping platforms ensure that our customer get end-to-end IP to SoC level verification closure.¡±
The CHI-G update introduces numerous new features and optimizations, with some of these tailored specifically for the recently introduced Arm CHI chip-to-chip (CHI C2C) protocol. You can refer to our earlier blog on CHI C2C for more details regarding the CHI C2C protocol. In this blog, we'll explore some of key features introduced in the CHI-G protocol. Let¡¯s delve a little deeper into each of these features.
In our previous blog on CHI-F, we talked about Arm's Realm Management Extension (RME) which is part of Confidential Compute Architecture (CCA), under Arm v9 architecture. RME provides a set of features for creating and managing isolated execution environments called Realms. Memory Encryption Contexts (MECs) extensions to RME allow each Realm to have its own unique encryption context. This feature plays a key role in assigning MECs to all memory accesses within the Realm Physical Address Space. All memory transactions are associated with a MECID, which is used by the Memory Encryption Engine as an index into a table of encryption contexts, which contributes to the external memory encryption. So, each set of Realm data can be encrypted in a different way. This means, that a malicious agent that has access to the physical memory device and can decipher one set of Realm data, cannot use the same decryption method to access other sets of Realm data. Overall, MEC plays a crucial role in ensuring the confidentiality of data within the context of confidential computing.
In CHI-G, this feature can be enabled only when RME is enabled. A new field ¡°MECID¡± is added to the request, data and snoop flits whose width must be sixteen in case MEC Support property is set to True for a CHI node.
Limited Data Elision is a feature that optimizes data transfer between components by reducing the number of data flits required to be transmitted for a given transaction. This optimization can be leveraged when multiple flits need to carry the same data fields, or when the data fields in some or all data flits are zeroes. Through this feature, for a given transaction, a single flit can encapsulate one or more subsequent flits. New fields are added in the data flit which indicate the number of additional data flits that are represented by this single data flit as well as the properties of the elided data flits.
DataSource Extensions: The existing DataSource field in Read and Snoop data flits is resized and divided into sub-fields with each sub-field representing specific information about the location, distance and type of the completer that issued the data flit. Some of these sub-fields hold particular importance in multi-chip(let) systems, where the data flits might traverse one or more chips(lets) enroute to its destination.
DataTarget: The CHI-E feature SLCRepHint was targeted at providing hints to System Level Caches about the likelihood of a particular cacheline being used again, to allow the SLCs to manage and replace stored cache lines more optimally. This becomes especially significant in multi-chip(let) systems where there is an increase in the cache hierarchy. In CHI-G, SLCRepHint has been renamed as DataTarget and an extra sub-field is added to it. This sub-field serves as a recommendation, suggesting the number of cache levels a CopyBack request should propagate to.
PrefetchTgtHint: A new field called PrefetchTgtHint is added in read requests, which acts as a hint to the receiver that prefetching the location before executing the read could be advantageous. This is a more optimal alternative to a standalone PrefetchTgt instruction especially in cases where the transactions need to traverse across the chip(let)-to-chip(let) link.
Synopsys end-to-end protocol verification solutions for?AMBA? 5 AXI5, AXI5-Lite, ACE5, ACE5-Lite, ACE5-Lite/DVM, AXI C2C, CHI C2C, CHI-G?provide performance analysis and comprehensive system-level debug capabilities to check for functional correctness, data integrity, and cache coherency. In-built sequence collection, functional coverage model, verification plans, and usage examples are included to ensure fast bring-up and achieve wholistic verification closure. Synopsys is partnering with early customers and collaborators to enhance the standard architecture for their next-generation designs, incorporating new features now available with the latest specifications.
Synopsys VIP is natively integrated with the?Synopsys Verdi? Protocol Analyzer?debug solution as well as?Synopsys Verdi? Performance Analyzer. Running system-level payload on SoCs requires a faster hardware-based pre-silicon solution. Synopsys transactors, memory models, hybrid and virtual solutions based on?Synopsys IP?enable various verification and validation use-cases on the industry¡¯s fastest verification hardware,?Synopsys ZeBu??emulation and?Synopsys HAPS??prototyping systems.
More information on Synopsys AMBA? VIP and Test Suites is available at?