A Compositional Approach for Verifying Protocols Running on On-Chip Networks

被引:0
作者
Verbeek, Freek [1 ]
Yaghini, Pooria M. [2 ]
Eghbal, Ashkan [2 ]
Bagherzadeh, Nader [2 ]
机构
[1] Virginia Polytech Inst & State Univ, Syst Software Res Grp, Off Econ Dev, Blacksburg, VA 24061 USA
[2] Univ Calif Irvine, Elect Engn & Comp Sci, Irvine, CA 92697 USA
关键词
Multiprocessor interconnection networks; Formal Verification; Routing protocols; MODEL CHECKING; VERIFICATION;
D O I
10.1109/TC.2017.2786723
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In modern many-core architectures, advanced on-chip networks provide the means of communication for the cores. This greatly complicates the design and verification of the cache coherence protocols deployed by those cores. A common approach to deal with this complexity is to decompose the whole system into the protocol and the network. This decomposition is, however, not always possible. For example, unexpected deadlocks can emerge when a deadlock-free protocol and a deadlock-free network are combined. This paper proposes a compositional methodology: prove properties over a network, prove properties over a protocol, and infer properties over the system as a whole. Our methodology is based on theorems that show that such decomposition is possible by having sufficiently large local buffers at the cores. We apply this methodology to verify several protocols such as MI, MSI, MESI and MEUSI running on top of advanced interconnects with adaptive routing.
引用
收藏
页码:905 / 919
页数:15
相关论文
共 50 条
  • [1] Subspace Snooping: Exploiting Temporal Sharing Stability for Snoop Reduction
    Ahn, Jeongseob
    Kim, Daehoon
    Kim, Jaehong
    Huh, Jaehyuk
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2012, 61 (11) : 1624 - 1637
  • [2] Baier C, 2008, PRINCIPLES OF MODEL CHECKING, P1
  • [3] Behrmann G, 2004, LECT NOTES COMPUT SC, V3185, P200
  • [4] Binkert Nathan, 2011, Computer Architecture News, V39, P1, DOI 10.1145/2024716.2024718
  • [5] Brayton R, 2010, LECT NOTES COMPUT SC, V6174, P24, DOI 10.1007/978-3-642-14295-6_5
  • [6] A Structured Visual Approach to GALS Modeling and Verification of Communication Circuits
    Burns, Frank
    Sokolov, Danil
    Yakovlev, Alex
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (06) : 938 - 951
  • [7] Cavada R., 2014, NUXMV SYMBOLIC MODEL, P334, DOI DOI 10.1007/978-3-319-08867-9_22
  • [8] xMAS: Quick Formal Modeling of Communication Fabrics to Enable Verification
    Chatterjee, Satrajit
    Kishinevsky, Michael
    Ogras, Umit Y.
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2012, 29 (03): : 80 - 88
  • [9] Efficient methods for formally verifying safety properties of hierarchical cache coherence protocols
    Chen, Xiaofang
    Yang, Yu
    Gopalakrishnan, Ganesh
    Chou, Ching-Tsun
    [J]. FORMAL METHODS IN SYSTEM DESIGN, 2010, 36 (01) : 37 - 64
  • [10] Chen XY, 2008, THESIS