Fading Coder

One Final Commit for the Last Sprint

Home > Tech > Content

Synopsys SpyGlass RTL Verification Methodology

Tech May 10 3

RTL Verification Challenges in Modern IC Design

  • Increasing design complexity with advanced process nodes
  • Growing verification overhead for million-gate designs
  • Significant impact on project timelines and costs

Critical Verification Requirements

  • Detects hazardous RTL constructs including:
    • Combinatorial loops
    • Finite state machine anomalies
    • Metastability risks
  • Identifies PPA degradation factors:
    • Redundant logic structures
    • Complex FSM implementations
    • Unintended latch inference
  • Prevents verification schedule delays across:
    • Unit testing (UT)
    • Integratino testing (IT)
    • System testing (ST)
    • FPGA prototyping
  • Mitigates physical implementation risks during RTL finalization

Core Verification Capabilities

  • Early-stage design analysis
  • Design iteration acceleration
  • Predictable implementation outcomes

Tool Architecture Overview

SpyGlass provides comprehensive RTL analysis through:

Lint Verification

  • Coding style compliance
  • Language construct validation
  • Simulation performence analysis
  • Synthesis readiness assessment

Common verification targets:

  1. Width mismatch detection
  2. Multiple signal assignments
  3. Floating inputs/outputs
  4. Embedded synthesis directives
  5. Incomplete sensitivity lists
  6. Partial conditional branches
  7. Unintended latch inference

Clock Domain Crossing (CDC) Analysis

  1. Metastability prevention (async reset synchronization)
  2. Multiple synchronization detection
  3. Signal convergence (Gray coding requirements)
  4. Data loss scenarios (fast-to-slow clock transitions)

Execution Modes

(1) Lint_DC
(2) Lint
(3) CDC
(4) DFT
(5) Coding_Style
(6) Power_Estimate

Project Structuer

(1) hdl/riscv_core/rtl/       # RTL source files
    - riscv_core.v
    - riscv_core.lst
    
(2) hdl/riscv_core/spyglass/  # Verification artifacts
    - rpt/    # Analysis reports
    - sgdc/   # Constraint files
    - waive/  # Waiver management
    
(3) hdl/spyglass/             # Execution environment
    - ./aspy        # Batch mode
    - ./aspy -gui   # Graphical interface

Related Articles

Understanding Strong and Weak References in Java

Strong References Strong reference are the most prevalent type of object referencing in Java. When an object has a strong reference pointing to it, the garbage collector will not reclaim its memory. F...

Comprehensive Guide to SSTI Explained with Payload Bypass Techniques

Introduction Server-Side Template Injection (SSTI) is a vulnerability in web applications where user input is improper handled within the template engine and executed on the server. This exploit can r...

Implement Image Upload Functionality for Django Integrated TinyMCE Editor

Django’s Admin panel is highly user-friendly, and pairing it with TinyMCE, an effective rich text editor, simplifies content management significantly. Combining the two is particular useful for bloggi...

Leave a Comment

Anonymous

◎Feel free to join the discussion and share your thoughts.