Method to Perform Hardware Safety Analysis without Fault Simulation
20210064810 · 2021-03-04
Inventors
Cpc classification
G06F2119/02
PHYSICS
G06F30/398
PHYSICS
International classification
Abstract
A safety analysis method is based on a safety-specific design structural analysis and cone of influence (COI) that does not require fault simulation. The method for performing a safety analysis of an integrated circuit based on a safety-specific design structural analysis and cone of influence comprises generating with a processor a computed set of basic design elements by intersecting two transitive cones of influence, wherein a first cone of influence is a transitive fanin cone of influence starting from a TO element and a second cone of influence is a transitive fanout cone of influence starting from a FROM element.
Claims
1. A method for performing a safety analysis of an integrated circuit based on a safety-specific design structural analysis and cone of influence comprising: generating with a processor a computed first set of basic design elements by intersecting two transitive cones of influence, wherein a first cone of influence is a transitive fanin cone of influence starting from at least one TO element and a second cone of influence is a transitive fanout cone of influence starting from at least one FROM element.
2. A method for performing a safety analysis of an integrated circuit based on a safety-specific design structural analysis and cone of influence according to claim 1, further comprising: extracting, with the processor, from the computed first set of basic design elements a second set of basic design elements that are in a direct fanin of the computed set of basic design elements.
3. A method for performing a safety analysis of an integrated circuit based on a safety-specific design structural analysis and cone of influence according to claim 2, wherein said second set of basic design elements are not FROM elements of the first cone of influence.
4. A method for performing a safety analysis of an integrated circuit based on a safety-specific design structural analysis and cone of influence according to claim 1, further comprising: extracting, with said processor, from the computed first set of basic design elements a third set of basic design elements that are in a direct fanout of the computed first set of basic design elements.
5. A method for performing a safety analysis of an integrated circuit based on a safety-specific design structural analysis and cone of influence according to claim 4, wherein said third set of basic design elements are not TO elements of the first cone of influence or elements in the direct fanout of the TO elements of the first cone.
6. A method for performing a safety analysis of an integrated circuit based on a safety-specific design structural analysis and cone of influence according to claim 3, further comprising: generating with said processor a computed fourth set of basic design elements, wherein said fourth set of basic design elements comprises elements from said first computed set that are inside a transitive fanin cone of the third set of basic design elements.
7. A method for performing a safety analysis of an integrated circuit based on a safety-specific design structural analysis and cone of influence according to claim 6, further comprising: subtracting with said processor the fourth set of basic design elements from the computed first set of basic design elements to generate a fifth computed set of basic design elements.
8. A method for performing a safety analysis of an integrated circuit based on a safety-specific design structural analysis and cone of influence according to claim 3, further comprising: generating with said processor a computed a sixth set of basic design elements, wherein said sixth computed set of basic design elements comprises elements that are inside a transitive fanin cone of the second set of basic design elements
9. A method for performing a safety analysis of an integrated circuit based on a safety-specific design structural analysis and cone of influence according to claim 1, further comprising: calculating with said processor a size of logic represented by the computed first set of basic design elements.
10. A method for performing a safety analysis of an integrated circuit based on a safety-specific design structural analysis and cone of influence according to claim 1, further comprising: generating with said processor a fault list for the computed first set of basic design elements.
11. A method for performing a safety analysis of an integrated circuit based on a safety-specific design structural analysis and cone of influence according to claim 1, wherein at least one of said at least one TO element and said at least one FROM element is included in said computed first set of basic design elements.
12. A method for performing a safety analysis of an integrated circuit component having a plurality of parts comprising: deriving with a processor a subpart of one of said parts of said component from a transitive fanin logic cone associated with a first point and a transitive fanout logic cone associated with a second point, wherein said subpart comprises elements within both said transitive fanin logic cone of said TO element and said transitive fanout logic cone of said FROM element.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0017] For a more complete understanding of the present invention and the advantages thereof, reference is now made to the following description and the accompanying drawings, in which:
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0026] An integrated circuit design can be considered as a hardware component, having a plurality of parts and a plurality of subparts. Subparts maybe grouped into safety mechanism and intended functionality where two such groups may form a safety feature.
[0027] An example of a safety feature is error correction code (ECC) protected first-in-first-out (FIFO), which is illustrated in
[0028] A lockstep core safety mechanism is illustrated in
[0029] Accurate extraction of a subpart, or set of basic design elements, is non-trivial. Basic design elements may include, for example, bits, states, ports, signals, wires, gates or cells. Extraction of a subpart and determination of where the safety mechanism or protected logic begins and/or ends in accordance with a preferred embodiment of the present invention is described with reference to
[0030] In the next step shown in
[0031] The processor identifies or extracts elements (logic) in the computed subpart or set 324 (
[0032] As shown in
[0033] As shown in
[0034] The subpart_write 328 (
[0035] The processor may subtract the subpart_read 326 from the subpart 324, i.e., the computed first set of basic design elements, to generate another subpart of set of basic design elements, so that, for example subpart_read is considered to contain potentially protected elements whereas this new subpart contains protected logic or elements.
[0036] Looking now at the invention in the context of a memory, an error code correction (ECC) protected first-in first-out (FIFO) design in accordance with the present invention is illustrated in
[0037] To apply COI analysis and extraction on the ECC FIFO design, a set of first points (TO elements) must be defined for each subpart. The population of faults that are protected by the ECC SM can be extracted using the inputs of the decoder, marked as DI in
[0038] As shown in
[0039] The basic COI analysis method can be significantly improved by introducing stop points, illustrated in
[0040] SAHP produces more precise results compared to basic COI analysis and extraction. However, it does rely on correct identification of TO elements for each subpart, which might be difficult in some cases. Identifying the TO elements of the control logic subpart (CO in
[0041] This challenge can be addressed by introducing the new concept of FROM elements. In addition to extracting the transitive fan-in cone from the TO elements, DI in the ECC FIFO example, we also consider the points where the protection by the SM starts, EO in the ECC FIFO example.
[0042] Unlike previously introduced stop points, FROM elements do not only act as stop points but are also used as TO elements for a transitive fan-out COI analysis and extraction. Intersecting the transitive fan-out of EO (FanoutCOI in
[0043] Similar to the TO elements, FROM elements must be associated with the subpart under analysis. It is preferable to define FROM elements that are also TO elements for one or more other subparts. This reduces the total number of points that need to be defined and ensures that the analysis of all subparts covers the entire circuit. Moreover, TO elements can be used as stop points during the transitive fan-out cone extraction, although this is not required. During the analysis of a subpart, TO and FROM elements of all other subparts can be used to speed-up the extraction of the fault list.
[0044] The SAHP method provides more accurate fault lists compared to basic COI analysis and extraction. This eliminates the need to simulate numerous faults, resulting in significant effort and computational savings. SAHP can be applied using FROM elements or stop points. The two approaches can also be combined. Using FROM elements is preferred as results are more accurate, particularly in designs with complex control logic where only the data path logic is protected by a SM.
[0045] Any of the generated or extracted sets of basic design elements, calculations and lists may be stored in memory or other storage and may be displayed, for example, on a display.
[0046] The foregoing description of the preferred embodiment of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the invention. The embodiment was chosen and described explain the principles of the invention and its practical application to enable one skilled in the art to utilize the invention in various embodiments as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto, and their equivalents. The entirety of each of the aforementioned documents is incorporated by reference herein.