Method, system and program product for reducing a size of a configuration database utilized to configure a hardware digital system

ABSTRACT

A method of constructing a compact configuration database is disclosed. The configuration database originally includes a plurality of Dial instance data structures each corresponding to a respective one of a plurality of Dial instances utilized to control the latch values of one or more latches within a digital design. According to the method, a determination is made of which of the plurality of Dial instance data structures are accessed during initialization of the digital design. In response to the determination, at least one first Dial instance data structure that is not accessed during initialization of the digital design is removed from the configuration database to reduce a size of the configuration database. In one embodiment, at least one second Dial instance data structure corresponding to a Dial instance that is set to only a single setting is also removed from the configuration database. Thereafter, the configuration database is stored.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is related to the following co-pending U.S.patent applications filed on even date herewith:

(1) U.S. patent application Ser. No. 10/425,096;

(2) U.S. patent application Ser. No. 10/425,074;

(3) U.S. patent application Ser. No. 10/425,041;

(4) U.S. patent application Ser. No. 10/425,075;

(5) U.S. patent application Ser. No. 10/425,076;

(6) U.S. patent application Ser. No. 10/425,053;

(7) U.S. patent application Ser. No. 10/425,070;

(8) U.S. patent application Ser. No. 10/425,079;

(9) U.S. patent application Ser. No. 10/425,051;

(10) U.S. patent application Ser. No. 10/425,080; AND

(11) U.S. patent application Ser. No. 10/425,089.

All of the above-mentioned patent applications are assigned to theassignee of the present invention and incorporated herein by referencein their entireties.

BACKGROUND OF THE INVENTION

1. Technical Field

The present invention relates in general to designing, simulating andconfiguring digital devices, modules and systems, and in particular, tomethods and systems for computer-aided design, simulation, andconfiguration of digital devices, modules and systems described by ahardware description language (HDL) model.

2. Description of the Related Art

In a typical digital design process, verifying the logical correctnessof a digital design and debugging the design (if necessary) areimportant steps of the design process performed prior to developing acircuit layout. Although it is certainly possible to test a digitaldesign by actually building the digital design, digital designs,particularly those implemented by integrated circuitry, are typicallyverified and debugged by simulating the digital design on a computer,due in part to the time and expense required for integrated circuitfabrication.

In a typical automated design process, a circuit designer enters into anelectronic computer-aided design (ECAD) system a high-level descriptionof the digital design to be simulated utilizing a hardware descriptionlanguage (HDL), such as VHDL, thus producing a digital representation ofthe various circuit blocks and their interconnections. In the digitalrepresentation, the overall circuit design is frequently divided intosmaller parts, hereinafter referred to as design entities, which areindividually designed, often by different designers, and then combinedin a hierarchical manner to create an overall model. This hierarchicaldesign technique is very useful in managing the enormous complexity ofthe overall design and facilitates error detection during simulation.

The ECAD system compiles the digital representation of the design into asimulation model having a format best suited for simulation. A simulatorthen exercises the simulation model to detect logical errors in thedigital design.

A simulator is typically a software tool that operates on the simulationmodel by applying a list of input stimuli representing inputs of thedigital system. The simulator generates a numerical representation ofthe response of the circuit to the input stimuli, which response maythen either be viewed on the display screen as a list of values orfurther interpreted, often by a separate software program, and presentedon the display screen in graphical form. The simulator may be run eitheron a general-purpose computer or on another piece of electronicapparatus specially designed for simulation. Simulators that runentirely in software on a general-purpose computer are referred to as“software simulators,” and simulators that run with the assistance ofspecially designed electronic apparatus are referred to as “hardwaresimulators.”

As digital designs have become increasingly complex, digital designs arecommonly simulated at several levels of abstraction, for example, atfunctional, logical and circuit levels. At the functional level, systemoperation is described in terms of a sequence of transactions betweenregisters, adders, memories and other functional units. Simulation atthe functional level is utilized to verify the high-level design ofdigital systems. At the logical level, a digital system is described interms of logic elements such as logic gates and flip-flops. Simulationat the logical level is utilized to verify the correctness of the logicdesign. At the circuit level, each logic gate is described in terms ofits circuit components such as transistors, impedances, capacitances,and other such devices. Simulation at the circuit level providesdetailed information about voltage levels and switching speeds.

In order to verify the results of any given simulation run,custom-developed programs written in high-level languages such as C orC++, referred to as a reference model, are written to process inputstimuli (also referred to as test vectors) to produce expected resultsof the simulation run. The test vector is then run against thesimulation execution model by the simulator. The results of thesimulation run are then compared to the results predicted by thereference model to detect discrepancies, which are flagged as errors.Such a simulation check is known in the verification art as an“end-to-end” check.

In modern data processing systems, especially large server-classcomputer systems, the number of latches that must be loaded to configurethe system for operation (or simulation) is increasing dramatically. Onereason for the increase in configuration latches is that many chips arebeing designed to support multiple different configurations andoperating modes in order to improve manufacturer profit margins andsimplify system design. For example, memory controllers commonly requiresubstantial configuration information to properly interface memory cardsof different types, sizes, and operating frequencies.

A second reason for the increase in configuration latches is theever-increasing transistor budget within processors and other integratedcircuit chips. Often the additional transistors available within thenext generation of chips are devoted to replicated copies of existingfunctional units in order to improve fault tolerance and parallelism.However, because transmission latency via intra-chip wiring is notdecreasing proportionally to the increase in the operating frequency offunctional logic, it is generally viewed as undesirable to centralizeconfiguration latches for all similar functional units. Consequently,even though all instances of a replicated functional unit are frequentlyidentically configured, each instance tends to be designed with its owncopy of the configuration latches. Thus, configuring an operatingparameter having only a few valid values (e.g., the ratio between thebus clock frequency and processor clock frequency) may involve settinghundreds of configuration latches in a processor chip.

Conventionally, configuration latches and their permitted range ofvalues have been specified by error-prone paper documentation that istedious to create and maintain. Compounding the difficulty inmaintaining accurate configuration documentation and the effort requiredto set configuration latches is the fact that different constituencieswithin a single company (e.g., a functional simulation team, alaboratory debug team, and one or more customer firmware teams) oftenseparately develop configuration software from the configurationdocumentation. As the configuration software is separately developed byeach constituency, each team may introduce its own errors and employ itsown terminology and naming conventions. Consequently, the configurationsoftware developed by the different teams is not compatible and cannoteasily be shared between the different teams.

In addition to the foregoing shortcomings in the process of developingconfiguration code, conventional configuration software is extremelytedious to code. In particular, the vocabulary used to document thevarious configuration bits is often quite cumbersome. For example, in atleast some implementations, configuration code must specify, for eachconfiguration latch bit, a full latch name, which may include fifty ormore ASCII characters. In addition, valid binary bit patterns for eachgroup of configuration latches must be individually specified.

In view of the foregoing, the present invention appreciates that itwould be useful and desirable to provide an improved method ofconfiguring a digital system described by an HDL model, particularly onethat permits configuration information to be specified in a logicalmanner with a reasonable amount of input and then shared among thevarious organizational constituencies involved in the design,simulation, and commercial implementation of the digital system.

SUMMARY OF THE INVENTION

Improved methods, systems, and program products for specifying theconfiguration of a digital system, such as an integrated circuit orcollection of interconnected integrated circuits, are disclosed. In oneembodiment, a configuration database originally includes a plurality ofDial instance data structures each corresponding to a respective one ofa plurality of Dial instances utilized to control the latch values ofone or more latches within a digital design. According to a method inaccordance with the present invention, a determination is made of whichof the plurality of Dial instance data structures are accessed duringinitialization of the digital design. In response to the determination,at least one first Dial instance data structure that is not accessedduring initialization of the digital design is removed from theconfiguration database to reduce a size of the configuration database.In one embodiment, at least one second Dial instance data structurecorresponding to a Dial instance that is set to only a single setting isalso removed from the configuration database. Thereafter, theconfiguration database is stored.

All objects, features, and advantages of the present invention willbecome apparent in the following detailed written description.

BRIEF DESCRIPTION OF THE DRAWINGS

The novel features believed characteristic of the invention are setforth in the appended claims. However, the invention, as well as apreferred mode of use, will best be understood by reference to thefollowing detailed description of an illustrative embodiment when readin conjunction with the accompanying drawings, wherein:

FIG. 1 is a high level block diagram of a data processing system thatmay be utilized to implement the present invention;

FIG. 2 is a diagrammatic representation of a design entity described byHDL code;

FIG. 3 illustrates an exemplary digital design including a plurality ofhierarchically arranged design entities;

FIG. 4A depicts an exemplary HDL file including embedded configurationspecification statements in accordance with the present invention;

FIG. 4B illustrates an exemplary HDL file including an embeddedconfiguration file reference statement referring to an externalconfiguration file containing a configuration specification statement inaccordance with the present invention;

FIG. 5A is a diagrammatic representation of an LDial primitive inaccordance with the present invention

FIG. 5B depicts an exemplary digital design including a plurality ofhierarchically arranged design entities in which LDials are instantiatedin accordance with the present invention;

FIG. 5C illustrates an exemplary digital design including a plurality ofhierarchically arranged design entities in which an LDial is employed toconfigure signal states at multiple different levels of the designhierarchy;

FIG. 5D is a diagrammatic representation of a Switch in accordance withthe present invention;

FIG. 6A is a diagrammatic representation of an IDial in accordance withthe present invention;

FIG. 6B is a diagrammatic representation of an IDial having a splitoutput in accordance with the present invention;

FIG. 7A is a diagrammatic representation of a CDial employed to controlother Dials in accordance with the present invention;

FIG. 7B depicts an exemplary digital design including a plurality ofhierarchically arranged design entities in which a CDial is employed tocontrol lower-level Dials utilized to configure signal states;

FIG. 8 is a high level flow diagram of a model build process utilized toproduce a simulation executable model and associated simulationconfiguration database in accordance with the present invention;

FIG. 9A illustrates a portion of a digital design illustrating themanner in which a traceback process implemented by a configurationcompiler detects inverters in the signal path between a configuredsignal and an associated configuration latch;

FIG. 9B is a high level flowchart of an exemplary traceback processimplemented by a configuration compiler in accordance with a preferredembodiment of the present invention;

FIG. 10 is a high level logical flowchart of an exemplary method bywhich a configuration compiler parses each signal or Dial identificationwithin a configuration specification statement in accordance with apreferred embodiment of the present invention;

FIG. 11A depicts a diagrammatic representation of a Dial group;

FIG. 11B illustrates an exemplary simulation model including Dialsgrouped in multiple hierarchically arranged Dial groups;

FIG. 12 depicts an exemplary embodiment of a simulation configurationdatabase in accordance with the present invention;

FIG. 13 is a high level logical flowchart of a illustrative method bywhich a configuration database is expanded within volatile memory of adata processing system in accordance with the present invention;

FIG. 14 is a block diagram depicting the contents of volatile systemmemory during a simulation run of a simulation model in accordance withthe present invention;

FIG. 15 is a high level logical flowchart of an exemplary method oflocating one or more Dial instance data structure (DIDS) in aconfiguration database that are identified by a instance qualifier anddialname qualifier supplied in an API call;

FIG. 16A is a high level logical flowchart of an illustrative method ofreading a Dial instance in an interactive mode during simulation of adigital design in accordance with the present invention;

FIG. 16B is a high level logical flowchart of an exemplary method ofreading a Dial group instance in an interactive mode during simulationof a digital design in accordance with the present invention;

FIG. 17A is a high level logical flowchart of an illustrative method ofsetting a Dial instance in an interactive mode during simulation of adigital design in accordance with the present invention;

FIG. 17B is a high level logical flowchart of an exemplary method ofsetting a Dial group instance in an interactive mode during simulationof a digital design in accordance with the present invention;

FIG. 18 is a high level logical flowchart of an illustrative method ofsetting a Dial instance or Dial group instance in a batch mode duringsimulation of a digital design in accordance with the present invention;

FIG. 19 is a block diagram depicting an exemplary laboratory testingsystem in accordance with the present invention;

FIG. 20 is a more detailed block diagram of an integrated circuit chipwithin a data processing system forming a portion of the laboratorytesting system of FIG. 19;

FIG. 21 is a high level flow diagram of an illustrative process fortransforming a simulation configuration database to obtain a chiphardware database suitable for use in configuring a hardware realizationof a digital design;

FIG. 22A is a high level logical flowchart of an exemplary method oftransforming a configuration database to obtain a chip hardware databasein accordance with the present invention;

FIG. 22B depicts an illustrative embodiment of a latch data structurewithin a chip hardware database following the transformation processillustrated in FIG. 22A;

FIG. 23A is a high level logical flowchart of an exemplary method ofloading a hardware configuration database from non-volatile storage intovolatile memory that supports use of the hardware configuration databasewith digital systems of any arbitrary size or configuration;

FIG. 23B illustrates an exemplary embodiment of a hardware configurationdatabase of a digital system in accordance with one embodiment of thepresent invention;

FIG. 24 is a high level logical flowchart of an exemplary method ofidentifying, by reference to a hardware configuration database, one ormore Dial instances or Dial group instances in a digital system that arerelevant to an API call;

FIG. 25 is a high level logical flow diagram of an exemplary process bywhich a hardware configuration database developed during laboratorydevelopment and testing of system firmware can be compressed forcommercial deployment;

FIGS. 26A-26C together form a high level logical flowchart of anillustrative method of compressing a hardware configuration databaseutilizing a software compression tool in accordance with the presentinvention;

FIG. 27 is a graphical representation of the contents of an exemplaryconfiguration database including both Dials and read-only Dials inaccordance with the present invention;

FIGS. 28A-28B respectively illustrate the inclusion of read-only parentfields within Dial instance data structures and latch data structures ofa configuration database in order to support read-only Dials andread-only Dial groups in accordance with one embodiment of the presentinvention;

FIG. 29 is a high level logical flowchart of an exemplary method ofexpanding a configuration database containing RDial and/or RDial groupsinto volatile memory;

FIG. 30 is a high level flow diagram of an exemplary process foranalyzing a selected state of a hardware system, and in particular, afailure state of a hardware system, in accordance with the presentinvention; and

FIG. 31 is a high level logical flowchart of an exemplary method bywhich the chip analyzer tool of FIG. 30 generates chip configurationreports and simulation setup files utilized to analyze hardware failuresin accordance with the present invention.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENT

The present invention introduces a configuration specification languageand associated methods, systems, and program products for configuringand controlling the setup of a digital system (e.g., one or moreintegrated circuits or a simulation model thereof). In at least oneembodiment, configuration specifications for signals in the digitalsystem are created in HDL code by the designer responsible for anassociated design entity. Thus, designers at the front end of the designprocess, who are best able to specify the signal names and associatedlegal values, are responsible for creating the configurationspecification. The configuration specification is compiled at modelbuild time together with the HDL describing the digital system to obtaina configuration database that can then be utilized by downstreamorganizational groups involved in the design, simulation, and hardwareimplementation processes.

With reference now to the figures, and in particular with reference toFIG. 1, there is depicted an exemplary embodiment of a data processingsystem in accordance with the present invention. The depicted embodimentcan be realized, for example, as a workstation, server, or mainframecomputer.

As illustrated, data processing system 6 includes one or more processingnodes 8 a-8 n, which, if more than one processing node 8 is implemented,are interconnected by node interconnect 22. Processing nodes 8 a-8 n mayeach include one or more processors 10, a local interconnect 16, and asystem memory 18 that is accessed via a memory controller 17. Processors10 a-10 m are preferably (but not necessarily) identical and maycomprise a processor within the PowerPC™ line of processors availablefrom International Business Machines (IBM) Corporation of Armonk, N.Y.In addition to the registers, instruction flow logic and execution unitsutilized to execute program instructions, which are generally designatedas processor core 12, each of processors 10 a-10 m also includes anon-chip cache hierarchy that is utilized to stage data to the associatedprocessor core 12 from system memories 18.

Each of processing nodes 8 a-8 n further includes a respective nodecontroller 20 coupled between local interconnect 16 and nodeinterconnect 22. Each node controller 20 serves as a local agent forremote processing nodes 8 by performing at least two functions. First,each node controller 20 snoops the associated local interconnect 16 andfacilitates the transmission of local communication transactions toremote processing nodes 8. Second, each node controller 20 snoopscommunication transactions on node interconnect 22 and masters relevantcommunication transactions on the associated local interconnect 16.Communication on each local interconnect 16 is controlled by an arbiter24. Arbiters 24 regulate access to local interconnects 16 based on busrequest signals generated by processors 10 and compile coherencyresponses for snooped communication transactions on local interconnects16.

Local interconnect 16 is coupled, via mezzanine bus bridge 26, to amezzanine bus 30. Mezzanine bus bridge 26 provides both a low latencypath through which processors 10 may directly access devices among I/Odevices 32 and storage devices 34 that are mapped to bus memory and/orI/O address spaces and a high bandwidth path through which I/O devices32 and storage devices 34 may access system memory 18. I/O devices 32may include, for example, a display device, a keyboard, a graphicalpointer, and serial and parallel ports for connection to externalnetworks or attached devices. Storage devices 34 may include, forexample, optical or magnetic disks that provide non-volatile storage foroperating system, middleware and application software. In the presentembodiment, such application software includes an ECAD system 35, whichcan be utilized to develop, verify and simulate a digital circuit designin accordance with the methods and systems of the present invention.

Simulated digital circuit design models created utilizing ECAD system 35are comprised of at least one, and usually many, sub-units referred tohereinafter as design entities. Referring now to FIG. 2, there isillustrated a block diagram representation of an exemplary design entity200 which may be created utilizing ECAD system 35. Design entity 200 isdefined by a number of components: an entity name, entity ports, and arepresentation of the function performed by design entity 200. Eachdesign entity within a given model has a unique entity name (notexplicitly shown in FIG. 2) that is declared in the HDL description ofthe design entity. Furthermore, each design entity typically contains anumber of signal interconnections, known as ports, to signals outsidethe design entity. These outside signals may be primary input/outputs(I/Os) of an overall design or signals connected to other designentities within an overall design.

Typically, ports are categorized as belonging to one of three distincttypes: input ports, output ports, and bi-directional ports. Designentity 200 is depicted as having a number of input ports 202 that conveysignals into design entity 200. Input ports 202 are connected to inputsignals 204. In addition, design entity 200 includes a number of outputports 206 that convey signals out of design entity 200. Output ports 206are connected to a set of output signals 208. Bi-directional ports 210are utilized to convey signals into and out of design entity 200.Bi-directional ports 210 are in turn connected to a set ofbi-directional signals 212. A design entity, such as design entity 200,need not contain ports of all three types, and in the degenerate case,contains no ports at all. To accomplish the connection of entity portsto external signals, a mapping technique, known as a “port map”, isutilized. A port map (not explicitly depicted in FIG. 2) consists of aspecified correspondence between entity port names and external signalsto which the entity is connected. When building a simulation model, ECADsoftware 35 is utilized to connect external signals to appropriate portsof the entity according to a port map specification.

As further illustrated in FIG. 2, design entity 200 contains a bodysection 214 that describes one or more functions performed by designentity 200. In the case of a digital design, body section 214 containsan interconnection of logic gates, storage elements, etc., in additionto instantiations of other entities. By instantiating an entity withinanother entity, a hierarchical description of an overall design isachieved. For example, a microprocessor may contain multiple instancesof an identical functional unit. As such, the microprocessor itself willoften be modeled as a single entity. Within the microprocessor entity,multiple instantiations of any duplicated functional entities will bepresent.

Each design entity is specified by one or more HDL files that containthe information necessary to describe the design entity. Although notrequired by the present invention, it will hereafter be assumed for easeof understanding that each design entity is specified by a respectiveHDL file.

With reference now to FIG. 3, there is illustrated a diagrammaticrepresentation of an exemplary simulation model 300 that may be employedby ECAD system 35 to represent a digital design (e.g., an integratedcircuit chip or a computer system) in a preferred embodiment of thepresent invention. For visual simplicity and clarity, the ports andsignals interconnecting the design entities within simulation model 300have not been explicitly shown.

Simulation model 300 includes a number of hierarchically arranged designentities. As within any simulation model, simulation model 300 includesone and only one “top-level entity” encompassing all other entitieswithin simulation model 300. That is to say, top-level entity 302instantiates, either directly or indirectly, all descendant entitieswithin the digital design. Specifically, top-level entity 302 directlyinstantiates (i.e., is the direct ancestor of) two instances, 304 a and304 b, of the same FiXed-point execution Unit (FXU) entity 304 and asingle instance of a Floating Point Unit (FPU) entity 314. FXU entityinstances 304, having instantiation names FXU0 and FXU1, respectively,in turn instantiate additional design entities, including multipleinstantiations of entity A 306 having instantiation names A0 and A1,respectively.

Each instantiation of a design entity has an associated description thatcontains an entity name and an instantiation name, which must be uniqueamong all descendants of the direct ancestor entity, if any. Forexample, top-level entity 302 has a description 320 including an entityname 322 (i.e., the “TOP” preceding the colon) and also includes aninstantiation name 324 (i.e., the “TOP” following the colon). Within anentity description, it is common for the entity name to match theinstantiation name when only one instance of that particular entity isinstantiated within the ancestor entity. For example, single instancesof entity B 310 and entity C 312 instantiated within each of FXU entityinstantiations 304 a and 304 b have matching entity and instantiationnames. However, this naming convention is not required by the presentinvention as shown by FPU entity 314 (i.e., the instantiation name isFPU0, while the entity name is FPU).

The nesting of entities within other entities in a digital design cancontinue to an arbitrary level of complexity, provided that all entitiesinstantiated, whether singly or multiply, have unique entity names andthe instantiation names of all descendant entities within any directancestor entity are unique with respect to one another.

Associated with each design entity instantiation is a so called“instantiation identifier”. The instantiation identifier for a giveninstantiation is a string including the enclosing entity instantiationnames proceeding from the top-level entity instantiation name. Forexample, the design instantiation identifier of instantiation 312 a ofentity C 312 within instantiation 304 a of FXU entity 304 is“TOP.FXU0.B.C”. This instantiation identifier serves to uniquelyidentify each instantiation within a simulation model.

As discussed above, a digital design, whether realized utilizingphysical integrated circuitry or as a software model such as simulationmodel 300, typically includes configuration latches utilized toconfigure the digital design for proper operation. In contrast to priorart design methodologies, which employ stand-alone configurationsoftware created after a design is realized to load values into theconfiguration latches, the present invention introduces a configurationspecification language that permits a digital designer to specifyconfiguration values for signals as a natural part of the designprocess. In particular, the configuration specification language of thepresent invention permits a design configuration to be specifiedutilizing statements either embedded in one or more HDL files specifyingthe digital design (as illustrated in FIG. 4A) or in one or moreexternal configuration files referenced by the one or more HDL filesspecifying the digital design (as depicted in FIG. 4B).

Referring now to FIG. 4A, there is depicted an exemplary HDL file 400,in this case a VHDL file, including embedded configuration statements inaccordance with the present invention. In this example, HDL file 400specifies entity A 306 of simulation model 300 and includes threesections of VHDL code, namely, a port list 402 that specifies ports 202,206 and 210, signal declarations 404 that specify the signals withinbody section 214, and a design specification 406 that specifies thelogic and functionality of body section 214. Interspersed within thesesections are conventional VHDL comments denoted by an initialdouble-dash (“--”). In addition, embedded within design specification406 are one or more configuration specification statements in accordancewith the present invention, which are collectively denoted by referencenumerals 408 and 410. As shown, these configuration specificationstatements are written in a special comment form beginning with “--##”in order to permit a compiler to easily distinguish the configurationspecification statements from the conventional HDL code and HDLcomments. Configuration specification statements preferably employ asyntax that is insensitive to case and white space.

With reference now to FIG. 4B, there is illustrated an exemplary HDLfile 400′ that includes a reference to an external configuration filecontaining one or more configuration specification statements inaccordance with the present invention. As indicated by prime notation(′), HDL file 400′ is identical to HDL file 400 in all respects exceptthat configuration specification statements 408, 410 are replaced withone or more (and in this case only one) configuration file referencestatement 412 referencing a separate configuration file 414 containingconfiguration specification statements 408, 410.

Configuration file reference statement 412, like the embeddedconfiguration specification statements illustrated in FIG. 4A, isidentified as a configuration statement by the identifier “--##”.Configuration file reference statement 412 includes the directive“cfg_file”, which instructs the compiler to locate a separateconfiguration file 414, and the filename of the configuration file(i.e., “file00”). Configuration files, such as configuration file 412,preferably all employ a selected filename extension (e.g., “.cfg”) sothat they can be easily located, organized, and managed within the filesystem employed by data processing system 6.

As discussed further below with reference to FIG. 8, configurationspecification statements, whether embedded within an HDL file orcollected in one or more configuration files 414, are processed by acompiler together with the associated HDL files.

In accordance with a preferred embodiment of the present invention,configuration specification statements, such as configurationspecification statements 408, 410, facilitate configuration ofconfiguration latches within a digital design by instantiating one ormore instances of a configuration entity referred to herein genericallyas a “Dial.” A Dial's function is to map between an input value and oneor more output values. In general, such output values ultimatelydirectly or indirectly specify configuration values of configurationlatches. Each Dial is associated with a particular design entity in thedigital design, which by convention is the design entity specified bythe HDL source file containing the configuration specification statementor configuration file reference statement that causes the Dial to beinstantiated. Consequently, by virtue of their association withparticular design entities, which all have unique instantiationidentifiers, Dials within a digital design can be uniquely identified aslong as unique Dial names are employed within any given design entity.As will become apparent, many different types of Dials can be defined,beginning with a Latch Dial (or “LDial”).

Referring now to FIG. 5A, there is depicted a representation of anexemplary LDial 500. In this particular example, LDial 500, which hasthe name “bus ratio”, is utilized to specify values for configurationlatches in a digital design in accordance with an enumerated input valuerepresenting a selected ratio between a component clock frequency andbus clock frequency.

As illustrated, LDial 500, like all Dials, logically has a single input502, one or more outputs 504, and a mapping table 503 that maps eachinput value to a respective associated output value for each output 504.That is, mapping table 503 specifies a one-to-one mapping between eachof one or more unique input values and a respective associated uniqueoutput value. Because the function of an LDial is to specify the legalvalues of configuration latches, each output 504 of LDial 500 logicallycontrols the value loaded into a respective configuration latch 505. Toprevent conflicting configurations, each configuration latch 505 isdirectly specified by one and only one Dial of any type that is capableof setting the configuration latch 505.

At input 502, LDial 500 receives an enumerated input value (i.e., astring) among a set of legal values including “2:1”, “3:1” and “4:1”.The enumerated input value can be provided directly by software (e.g.,by a software simulator or service processor firmware) or can beprovided by the output of another Dial, as discussed further below withrespect to FIG. 7A. For each enumerated input value, the mapping table503 of LDial 500 indicates a selected binary value (i.e., “0” or “1”)for each configuration latch 505.

With reference now to FIG. 5B, there is illustrated a diagrammaticrepresentation of a simulation model logically including Dials.Simulation model 300′ of FIG. 5B, which as indicated by prime notationincludes the same design entities arranged in the same hierarchicalrelation as simulation model 300 of FIG. 3, illustrates two propertiesof Dials, namely, replication and scope.

Replication is a process by which a Dial that is specified in orreferenced by an HDL file of a design entity is automaticallyinstantiated each time that the associated design entity isinstantiated. Replication advantageously reduces the amount of dataentry a designer is required to perform to create multiple identicalinstances of a Dial. For example, in order to instantiate the sixinstances of LDials illustrated in FIG. 5B, the designer need only codetwo LDial configuration specification statements utilizing either of thetwo techniques illustrated in FIGS. 4A and 4B. That is, the designercodes a first LDial configuration specification statement (orconfiguration file reference statement pointing to an associatedconfiguration file) into the HDL file of design entity A 306 in order toautomatically instantiate LDials 506 a 0, 506 a 1, 506 b 0 and 506 b 1within entity A instantiations 306 a 0, 306 a 1, 306 b 0 and 306 b 1,respectively. The designer codes a second LDial configurationspecification statement (or configuration file reference statementpointing to an associated configuration file) into the HDL file ofdesign entity FXU 304 in order to automatically instantiate LDials 510 aand 510 b within FXU entity instantiations 304 a and 304 b,respectively. The multiple instances of the LDials are then createdautomatically as the associated design entities are replicated by thecompiler. Replication of Dials within a digital design can thussignificantly reduce the input burden on the designer as compared toprior art methodologies in which the designer had to individuallyenumerate in the configuration software each configuration latch valueby hand. It should be noted that the property of replication does notnecessarily require all instances of a Dial to generate the same outputvalues; different instances of the same Dial can be set to generatedifferent outputs by providing them different inputs.

The “scope” of a Dial is defined herein as the set of entities to whichthe Dial can refer in its specification. By convention, the scope of aDial comprises the design entity with which the Dial is associated(i.e., the design entity specified by the HDL source file containing theconfiguration specification statement or configuration file referencestatement that causes the Dial to be instantiated) and any design entitycontained within the associated design entity (i.e., the associateddesign entity and its descendents). Thus, a Dial is not constrained tooperate at the level of the design hierarchy at which it isinstantiated, but can also specify configuration latches at any lowerlevel of the design hierarchy within its scope. For example, LDials 510a and 510 b, even though associated with FXU entity instantiations 304 aand 304 b, respectively, can specify configuration latches within entityC instantiations 312 a and 312 b, respectively.

FIG. 5B illustrates another important property of LDials (and otherDials that directly specify configuration latches). In particular, asshown diagrammatically in FIG. 5B, designers, who are accustomed tospecifying signals in HDL files, are permitted in a configurationspecification statement to specify signal states set by a Dial ratherthan values to be loaded into an “upstream” configuration latch thatdetermines the signal state. Thus, in specifying LDial 506, the designercan specify possible signal states for a signal 514 set by aconfiguration latch 512. Similarly, in specifying LDial 510, thedesigner can specify possible signal states for signal 522 set byconfiguration latch 520. The ability to specify signal states ratherthan latch values not only coincides with designers' customary manner ofthinking about a digital design, but also reduces possible errorsintroduced by the presence of inverters between the configuration latch512, 520 and the signal of interest 514, 522, as discussed furtherbelow.

Referring now to FIG. 5C, there is depicted another diagrammaticrepresentation of a simulation model including an LDial. As indicated byprime notation, simulation model 300″ of FIG. 5C includes the samedesign entities arranged in the same hierarchical relation as simulationmodel 300 of FIG. 3.

As shown, simulation model 300″ of FIG. 5C includes an LDial 524associated with top-level design entity 302. LDial 524 specifies thesignal states of each signal sig1 514, which is determined by arespective configuration latch 512, the signal states of each signalsig2 522, which is determined by a respective configuration latch 520,the signal state of signal sig4 532, which is determined byconfiguration latch 530, and the signal state of signal sig3 536, whichis determined by configuration latch 534. Thus, LDial 524 configures thesignal states of numerous different signals, which are all instantiatedat or below the hierarchy level of LDial 524 (which is the top level).

As discussed above with respect to FIGS. 4A and 4B, LDial 524 isinstantiated within top-level entity 302 of simulation model 300″ byembedding within the HDL file of top-level entity 302 a configurationspecification statement specifying LDial 524 or a configuration filereference statement referencing a separate configuration file containinga configuration specification statement specifying LDial 524. In eithercase, an exemplary configuration specification statement for LDial 524is as follows:

LDial bus ratio (FXU0.A0.SIG1, FXU0.A1.SIG1,        FXU0.B.C.SIG2(0 . .. 5),        FXU1.A0.SIG1, FXU1.A1.SIG1,        FXU1.B.C.SIG2(0 . . .5),        FPU0.SIG3, SIG4(0 . . . 3)        ) =        {2:1 =>0b0, 0b0,0x00,            0b0, 0b0, 0x00,            0b0, 0x0;        3:1 => 0b1,0b1, 0x01,            0b1, 0b1, 0x01,            0b0, 0x1;        4:1 =>0b1, 0b1, 0x3F,            0b1, 0b1, 0x3F,            0b1, 0xF        };

The exemplary configuration specification statement given above beginswith the keyword “LDial,” which specifies that the type of Dial beingdeclared is an LDial, and the Dial name, which in this case is “busratio.” Next, the configuration specification statement enumerates thesignal names whose states are controlled by the LDial. As indicatedabove, the signal identifier for each signal is specified hierarchically(e.g., FXU0.A0.SIG1 for signal 514 a 0) relative to the default scope ofthe associated design entity so that different signal instances havingthe same signal name are distinguishable. Following the enumeration ofthe signal identifiers, the configuration specification statementincludes a mapping table listing the permitted enumerated input valuesof the LDial and the corresponding signal values for each enumeratedinput value. The signal values are associated with the signal namesimplicitly by the order in which the signal names are declared. Itshould again be noted that the signal states specified for allenumerated values are unique, and collectively represent the only legalpatterns for the signal states.

Several different syntaxes can be employed to specify the signal states.In the example given above, signal states are specified in either binaryformat, which specifies a binary constant preceded by the prefix “0b”,or in hexadecimal format, which specifies a hexadecimal constantpreceded by the prefix “0x”. Although not shown, signal states can alsobe specified in integer format, in which case no prefix is employed. Forease of data entry, the configuration specification language of ECADsystem 35 also preferably supports a concatenated syntax in which oneconstant value, which is automatically extended with leading zeros, isutilized to represent the concatenation of all of the desired signalvalues. In this concatenated syntax, the mapping table of theconfiguration specification statement given above can be rewritten as:

{2:1 => 0,  3:1 => 0x183821,  4:1 => 0x1FFFFF };in order to associate enumerated input value 2:1 with a concatenated bitpattern of all zeros, to associate the enumerated input value 3:1 withthe concatenated bit pattern ‘0b110000011100000100001’, and to associatethe enumerated input value 4:1 with a concatenated bit pattern of allones.

With reference now to FIG. 5D, there is illustrated a diagrammaticrepresentation of a special case of an LDial having a one-bit output,which is defined herein as a Switch. As shown, a Switch 540 has a singleinput 502, a single 1-bit output 504 that controls the setting of aconfiguration latch 505, and a mapping table 503 that maps eachenumerated input value that may be received at input 502 to a 1-bitoutput value driven on output 504.

Because Switches frequently comprise a significant majority of the Dialsemployed in a digital design, it is preferable if the enumerated valuesets for all Switches in a simulation model of a digital design are thesame (e.g., “ON”/“OFF”). In a typical embodiment of a Switch, the“positive” enumerated input value (e.g., “ON”) is mapped by mappingtable 503 to an output value of 0b1 and the “negative” enumerated inputvalue (e.g., “OFF”) is mapped to an output value of 0b0. In order tofacilitate use of logic of the opposite polarity, a Negative Switch orNSwitch declaration is also preferably supported that reverses thisdefault correspondence between input values and output values in mappingtable 503.

The central advantage to defining a Switch primitive is a reduction inthe amount of input that designers are required to enter. In particular,to specify a comparable 1-bit LDial, a designer would be required toenter a configuration specification statement of the form:

LDial mode (signal) =     {ON =>b1;     OFF =>b0     };A Switch performing the same function, on the other hand, can bespecified with the configuration specification statement:

Switch mode (signal);

Although the amount of data entry eliminated by the use of Switches isnot particularly significant when only a single Switch is considered,the aggregate reduction in data entry is significant when the thousandsof switches in a complex digital design are taken into consideration.

Referring now to FIG. 6A, there is depicted a diagrammaticrepresentation of an Integer Dial (“IDial”) in accordance with apreferred embodiment of the present invention. Like an LDial, an IDialdirectly specifies the value loaded into each of one or moreconfiguration latches 605 by indicating within mapping table 603 acorrespondence between each input value received at an input 602 and anoutput value for each output 604. However, unlike LDials, which can onlyreceive as legal input values the enumerated input values explicitly setforth in their mapping tables 503, the legal input value set of an IDialincludes all possible integer values within the bit size of output 604.(Input integer values containing fewer bits than the bit size ofoutput(s) 604 are right justified and extended with zeros to fill allavailable bits.) Because it would be inconvenient and tedious toenumerate all of the possible integer input values in mapping table 603,mapping table 603 simply indicates the manner in which the integer inputvalue received at input 602 is applied to the one or more outputs 604.

IDials are ideally suited for applications in which one or moremulti-bit registers must be initialized and the number of legal valuesincludes most values of the register(s). For example, if a 4-bitconfiguration register comprising 4 configuration latches and an 11-bitconfiguration register comprising 11 configuration latches were both tobe configured utilizing an LDial, the designer would have to explicitlyenumerate up to 2¹⁵ input values and the corresponding output bitpatterns in the mapping table of the LDial. This case can be handledmuch more simply with an IDial utilizing the following configurationspecification statement:IDial cnt_value (sig1(0 . . . 3), sig2(0 . . . 10));In the above configuration specification statement, “IDial” declares theconfiguration entity as an IDial, “cnt_value” is the name of the IDial,“sig1” is a 4-bit signal output by the 4-bit configuration register and“sig2” is an 11-bit signal coupled to the 11-bit configuration register.In addition, the ordering and number of bits associated with each ofsig1 and sig2 indicate that the 4 high-order bits of the integer inputvalue will be utilized to configure the 4-bit configuration registerassociated with sig1 and the 11 lower-order bits will be utilized toconfigure the 11-bit configuration register associated with sig2.Importantly, although mapping table 603 indicates which bits of theinteger input values are routed to which outputs, no explicitcorrespondence between input values and output values is specified inmapping table 603.

IDials may also be utilized to specify the same value for multiplereplicated configuration registers, as depicted in FIG. 6B. In theillustrated embodiment, an IDial 610, which can be described as an IDial“splitter”, specifies the configuration of three sets of replicatedconfiguration registers each comprising 15 configuration latches 605based upon a single 15-bit integer input value. An exemplaryconfiguration specification statement for instantiating IDial 610 may begiven as follows:

IDial cnt_value(A0.sig1(0 . . . 7), A0.sig2(8 . . . 14);        A1.sig1(0 . . . 7), A1.sig2(8 . . . 14);         A3.sig1(0 . . .7), A3.sig2(8 . . . 14)          );In the above configuration specification statement, “IDial” declares theconfiguration entity as an IDial, and “cnt_value” is the name of theIDial. Following the IDial name are three scope fields separated bysemicolons (“;”). Each scope field indicates how the bits of the inputinteger value are applied to particular signals. For example, the firstscope field specifies that the 8 high-order bits of the integer inputvalue will be utilized to configure the 8-bit configuration registerassociated with the signal A0.sig1 and the 7 lower-order bits will beutilized to configure the 7-bit configuration register associated withA0.sig2. The second and third scope fields specify that thecorresponding configuration registers within design entities A1 and A3will be similarly configured. Importantly, the integer input bits can beallocated differently in each scope field as long as the total number ofbits specified in each scope field is the same.

Although the configuration of a digital design can be fully specifiedutilizing LDials alone or utilizing LDials and IDials, in many cases itwould be inefficient and inconvenient to do so. In particular, forhierarchical digital designs such as that illustrated in FIG. 5C, theuse of LDials and/or IDials alone would force many Dials to higherlevels of the design hierarchy, which, from an organizationalstandpoint, may be the responsibility of a different designer or designgroup than is responsible for the design entities containing theconfiguration latches controlled by the Dials. As a result, properconfiguration of the configuration latches would require not onlysignificant organizational coordination between design groups, but alsothat designers responsible for higher levels of the digital design learnand include within their HDL files details regarding the configurationof lower level design entities. Moreover, implementing Dials at higherlevels of the hierarchy means that lower levels of the hierarchy cannotbe independently simulated since the Dials controlling the configurationof the lower level design entities are not contained within the lowerlevel design entities themselves.

In view of the foregoing, the present invention recognizes the utilityof providing a configuration entity that supports the hierarchicalcombination of Dials to permit configuration of lower levels of thedesign hierarchy by lower-level Dials and control of the lower-levelDials by one or more higher-level Dials. The configuration specificationlanguage of the present invention terms a higher-level Dial thatcontrols one or more lower-level Dials as a Control Dial (“CDial”).

Referring now to FIG. 7A, there is depicted a diagrammaticrepresentation of a CDial 700 a in accordance with the presentinvention. CDial 700 a, like all Dials, preferably has a single input702, one or more outputs 704, and a mapping table 703 that maps eachinput value to a respective associated output value for each output 704.Unlike LDials and IDials, which directly specify configuration latches,a CDial 700 does not directly specify configuration latches. Instead, aCDial 700 controls one or more other Dials (i.e., CDials and/or LDialsand/or IDials) logically coupled to CDial 700 in an n-way “Dial tree” inwhich each lower-level Dial forms at least a portion of a “branch” thatultimately terminates in “leaves” of configuration latches. Dial treesare preferably constructed so that no Dial is instantiated twice in anyDial tree.

In the exemplary embodiment given in FIG. 7A, CDial 700 a receives atinput 702 an enumerated input value (i.e., a string) among a set oflegal values including “A”, . . . , “N”. If CDial 700 a (or an LDial orIDial) is a top-level Dial (i.e., there are no Dials “above” it in aDial tree), CDial 700 a receives the enumerated input value directlyfrom software (e.g., simulation software or firmware). Alternatively, ifCDial 700 a forms part of a “branch” of a dial tree, then CDial 700 areceives the enumerated input value from the output of another CDial.For each legal enumerated input value that can be received at input 702,CDial 700 a specifies a selected enumerated value or bit value for eachconnected Dial (e.g., Dials 700 b, 500 and 600) in mapping table 703.The values in mapping table 703 associated with each output 704 areinterpreted by ECAD system 35 in accordance with the type of lower-levelDial coupled to the output 704. That is, values specified for LDials andCDials are interpreted as enumerated values, while values specified forIDials are interpreted as integer values. With these values, each ofDials 700 b, 500 and 600 ultimately specifies, either directly orindirectly, the values for one or more configuration latches 705.

With reference now to FIG. 7B, there is illustrated another diagrammaticrepresentation of a simulation model containing a Dial tree including atop-level CDial that controls multiple lower-level LDials. As indicatedby prime notation, simulation model 300′″ of FIG. 7B includes the samedesign entities arranged in the same hierarchical relation as simulationmodel 300 of FIG. 3 and contains the same configuration latches andassociated signals as simulation model 300″ of FIG. 5C.

As shown, simulation model 300′″ of FIG. 7B includes a top-level CDial710 associated with top-level design entity 302. Simulation model 300′″further includes four LDials 712 a, 712 b, 714 and 716. LDial 712 a,which is associated with entity instantiation A0 304 a, controls thesignal states of each signal sig1 514 a, which is determined by arespective configuration latch 512 a, and the signal state of signalsig2 522 a, which is determined by configuration latch 520 a. LDial 712b, which is a replication of LDial 712 a associated with entityinstantiation A1 304 b, similarly controls the signal states of eachsignal sig1 514 b, which is determined by a respective configurationlatch 512 b, and the signal state of signal sig2 522 b, which isdetermined by configuration latch 520 b. LDial 714, which is associatedwith top-level entity 302, controls the signal state of signal sig4 532,which is determined by configuration latch 530. Finally, LDial 716,which is associated with entity instantiation FPU0 314, controls thesignal state of signal sig3 536, which is determined by configurationlatch 534. Each of these four LDials is controlled by CDial 710associated with top-level entity 302.

As discussed above with respect to FIGS. 4A and 4B, CDial 710 and eachof the four LDials depicted in FIG. 7B is instantiated within theassociated design entity by embedding a configuration specificationstatement (or a configuration file reference statement pointing to aconfiguration file containing a configuration specification statement)within the HDL file of the associated design entity. An exemplaryconfiguration specification statement utilized to instantiate each Dialshown in FIG. 7B is given below:

CDial BusRatio (FXU0.BUSRATIO, FXU1.BUSRATIO,          FPU0.BUSRATIO,BUSRATIO)=       {2:1 => 2:1, 2:1, 2:1, 2:1;        3:1 => 3:1, 3:1,3:1, 3:1;       4:1 => 4:1, 4:1, 4:1, 4:1       }; LDial BusRatio(A0.sig1, A1.sig1, B.C.sig2(0..5)) =       {2:1 => 0b0, 0b0, 0x00;       3:1 => 0b1, 0b1, 0x01;       4:1 => 0b1, 0b1, 0x3F;       };LDial BusRatio (sig3) =       {2:1 => 0b0;        3:1 => 0b0;        4:1=> 0b1       }; LDial BusRatio (sig4(0..3)) =       {2:1 => 0x0;       3:1 => 0x1;        4:1 => 0xF       };

By implementing a hierarchical Dial tree in this manner, severaladvantages are realized. First, the amount of software code that must beentered is reduced since the automatic replication of LDials 712 withinFXU entity instantiations 304 a and 304 b allows the code specifyingLDials 712 to be entered only once. Second, the organizationalboundaries of the design process are respected by allowing each designer(or design team) to specify the configuration of signals within thedesign entity for which he is responsible. Third, coding of upper levelDials (i.e., CDial 710) is greatly simplified, reducing the likelihoodof errors. Thus, for example, the CDial and LDial collection specifiedimmediately above performs the same function as the “large” LDialspecified above with reference to FIG. 5C, but with much less complexityin any one Dial.

Many Dials, for example, Switches utilized to disable a particulardesign entity in the event an uncorrectable error is detected, have aparticular input value that the Dial should have in nearly allcircumstances. For such Dials, the configuration specification languageof the present invention permits a designer to explicitly specify in aconfiguration specification statement a default input value for theDial. In an exemplary embodiment, a Default value is specified byincluding “=default value” following the specification of a Dial andprior to the concluding semicolon. For example, a default value for aCDial, can be given as follows:

CDial BusRatio (FXU0.BUSRATIO, FXU1.BUSRATIO,          FPU0.BUSRATIO,BUSRATIO)=        {2:1 => 2:1, 2:1, 2:1, 2:1;        3:1 => 3:1, 3:1,3:1, 3:1;        4:1 => 4:1, 4:1, 4:1, 4:1        } = 2:1;It should be noted that for CDials and LDials, the specified defaultvalue is required to be one of the legal enumerated values, which aregenerally (i.e., except for Switches) listed in the mapping table. ForSwitches, the default value must be one of the predefined enumeratedvalues of “ON” and “OFF”.

A default value for an IDial can similarly be specified as follows:

IDial cnt_value(A0.sig1(0 . . . 7), A0.sig2(8 . . . 14);        A1.sig1(0 . . . 7), A1.sig2(8 . . . 14);         A3.sig1(0 . . .7), A3.sig2(8 . . . 14)         ) = 0x7FFF;In this case, a constant, which can be given in hexadecimal, decimal orbinary format, provides the default output value of each signalcontrolled by the IDial. In order to apply the specified constant to theindicated signal(s), high order bits are truncated or padded with zeros,as needed.

The use of default values for Dials is subject to a number of rules.First, a default value may be specified for any type of Dial includingLDials, IDials (including those with split outputs) and CDials. Second,if default values are specified for multiple Dials in a multiple-levelDial tree, only the highest-level default value affecting each “branch”of the Dial tree is applied (including that specified for the top-levelDial), and the remaining default values, if any, are ignored. Despitethis rule, it is nevertheless beneficial to specify default values forlower-level Dials in a Dial tree because the default values may beapplied in the event a smaller portion of a model is independentlysimulated, as discussed above. In the event that the combination ofdefault values specified for lower-level Dials forming the “branches” ofa Dial tree do not correspond to a legal output value set for ahigher-level Dial, the compiler will flag an error. Third, a defaultvalue is overridden when a Dial receives an input to actively set theDial.

By specifying default values for Dials, a designer greatly simplifiesuse of Dials by downstream organizational groups by reducing the numberof Dials that must be explicitly set for simulation or hardwareconfiguration. In addition, as discussed further below, use of defaultvalues assists in auditing which Dials have been actively set.

In addition to defining syntax for configuration specificationstatements specifying Dials, the configuration specification language ofthe present invention supports at least two additional HDL semanticconstructs: comments and attribute specification statements. A comment,which may have the form:

-   -   BusRatio.comment=“The bus ratio Dial configures the circuit in        accordance with a selected processor/interconnect frequency        ratio”;        permits designers to associate arbitrary strings delimited by        quotation marks with particular Dial names. As discussed below        with reference to FIG. 8, these comments are processed during        compilation and included within a configuration documentation        file in order to explain the functions, relationships, and        appropriate settings of the Dials.

Attribute specification statements are statements that declare anattribute name and attribute value and associate the attribute name witha particular Dial name. For example, an attribute specificationstatement may have the form:

-   -   BusRatio.attribute (myattribute)=scom57(0:9);        In this example, “BusRatio.attribute” declares that this        statement is an attribute specification statement associating an        attribute with a Dial having “BusRatio” as its Dial name,        “myattribute” is the name of the attribute, and “scom57(0:9)” is        a string that specifies the attribute value. Attributes support        custom features and language extensions to the base        configuration specification language.

Referring now to FIG. 8, there is depicted a high level flow diagram ofa model build process in which HDL files containing configurationstatements are compiled to obtain a simulation executable model and asimulation configuration database for a digital design. The processbegins with one or more design entity HDL source code files 800, whichinclude configuration specification statements and/or configuration filereference statements, and, optionally, one or more configurationspecification reference files 802. HDL compiler 804 processes HDLfile(s) 800 and configuration specification file(s) 802, if any,beginning with the top level entity of a simulation model and proceedingin a recursive fashion through all HDL file(s) 800 describing a completesimulation model. As HDL compiler 804 processes each HDL file 800, HDLcompiler 804 creates “markers” in the design intermediate files 806produced in memory to identify configuration statements embedded in theHDL code and any configuration specification files referenced by anembedded configuration file reference statement.

Thereafter, the design intermediate files 806 in memory are processed bya configuration compiler 808 and model build tool 810 to complete themodel build process. Model build tool 810 processes design intermediatefiles 806 into a simulation executable model 816, that when executed,models the logical functions of the digital design, which may represent,for example, a portion of an integrated circuit, an entire integratedcircuit or module, or a digital system including multiple integratedcircuits or modules. Configuration compiler 808 processes theconfiguration specification statements marked in design intermediatefiles 806 and creates from those statements a configurationdocumentation file 812 and a configuration database 814.

Configuration documentation file 812 lists, in human-readable format,information describing the Dials associated with the simulation model.The information includes the Dials' names, their mapping tables, thestructure of Dial trees, if any, instance information, etc. In addition,as noted above, configuration documentation file 812 includes stringscontained in comment statements describing the functions and settings ofthe Dials in the digital design. In this manner, configurationdocumentation suitable for use with both a simulation model and ahardware implementation of a digital design is aggregated in a“bottom-up” fashion from the designers responsible for creating theDials. The configuration documentation is then made available to alldownstream organizational groups involved in the design, simulation,laboratory hardware evaluation, and commercial hardware implementationof the digital design.

Configuration database 814 contains a number of data structurespertaining to Dials. As described in detail below, these data structuresinclude Dial data structures describing Dial entities, latch datastructures, and Dial instance data structures. These data structuresassociate particular Dial inputs with particular configuration valuesused to configure the digital design (i.e., simulation executable model816). In a preferred embodiment, the configuration values can bespecified in terms of either signal states or configuration latchvalues, and the selection of which values are used is user-selectable.Configuration database 814 is accessed via Application ProgrammingInterface (API) routines during simulation of the digital designutilizing simulation executable model 816 and is further utilized togenerate similar configuration databases for configuring physicalrealizations of the digital design. In a preferred embodiment, the APIsare designed so that only top-level Dials (i.e., LDials, IDials orCDials without a CDial logically “above” them) can be set and all Dialvalues can be read.

As described above, the configuration specification language of thepresent invention advantageously permits the specification of the outputvalues of LDials and IDials by reference to signal names (e.g., “sig1”).As noted above, a key motivation for this feature is that designers tendto think in terms of configuring operative signals to particular signalstates, rather than configuring the associated configuration latches. Inpractice, however, a signal that a designer desires to configure to aparticular state may not be directly connected to the output of anassociated configuration latch. Instead, a signal to be configured maybe coupled to an associated configuration latch through one or moreintermediate circuit elements, such as buffers and inverters. Ratherthan burdening the designer with manually tracing back each configurablesignal to an associated configuration latch and then determining anappropriate value for the configuration latch, configuration compiler808 automatically traces back a specified signal to the first storageelement (i.e., configuration latch) coupled to the signal and performsany necessary inversions of the designer-specified signal state value toobtain the proper value to load into the configuration latch.

With reference now to FIG. 9A, there is illustrated a portion of adigital design including an LDial 900 that controls the states of aplurality of signals 904 a-904 e within the digital design. Whenconfiguration compiler 808 performs a traceback of signal 904 a, noinversion of the designer-specified signal states is required becausesignal 904 a is directly connected to configuration latch 902 a.Accordingly, configuration compiler 808 stores into configurationdatabase 814 the designer-specified values from the configurationspecification statement of LDial 900 as the values to be loaded intoconfiguration latch 902 a. Traceback of signal 904 b to configurationlatch 902 b similarly does not result in the inversion of anydesigner-specified values from the configuration specification statementof LDial 900 because the only intervening element between signal 904 band configuration register 902 b is a non-inverting buffer 906.

Configuration latches, such as configuration latches 902 c and 902 d,are frequently instantiated by designers through inclusion in an HDLfile 800 of an HDL statement referencing a latch primitive in an HDLdesign library. The latch entity 903 a, 903 b inserted into thesimulation executable model in response to such HDL library referencesmay include inverters, such as inverters 908, 910, which are notexplicitly “visible” to the designer in the HDL code. The automatictraceback performed by configuration compiler 808 nevertheless detectsthese inverters, thus preventing possible configuration errors.

Accordingly, when performing a traceback of signal 904 c, configurationcompiler 808 automatically inverts the designer-specified configurationvalue specified for signal 904 c before storing the configuration valuefor configuration latch 902 c in configuration database 814 because ofthe presence of an inverter 908 between signal 904 c and configurationlatch 902 c. When configuration compiler 808 performs traceback ofsignal 904 d, however, configuration compiler 808 does not invert thedesigner-specified signal state values despite the presence of inverters910, 914 and buffer 912 in the signal path because the logic iscollectively non-inverting. It should be noted that configurationcompiler 808 can accurately process both “hidden” inverters likeinverter 910 and explicitly declared inverters like inverter 914.

FIG. 9A finally illustrates a signal 904 e that is coupled to multipleconfiguration latches 902 e and 902 f through an intermediate AND gate916. In cases like this in which the traceback process detects fanoutlogic between the specified signal and the closest configuration latch,it is possible to configure configuration compiler 808 to generateappropriate configuration values for configuration latches 902 e, 902 fbased upon the designer-specified signal state values for signal 904 e.However, it is preferable if configuration compiler 808 flags theconfiguration specification statement for LDial 900 as containing anerror because the compiler-selected values for configuration latches 902e, 902 f may affect other circuitry that receives the configurationvalues from configuration latches 902 in unanticipated ways.

Referring now to FIG. 9B, there is depicted a high level logicalflowchart of the traceback process implemented by configuration compiler808 for each signal name specified in a configuration specificationstatement. As shown, the process begins at block 920 and then proceedsto block 922-924, which illustrate configuration compiler 808initializing an inversion count to zero and then locating the signalidentified by the signal name specified in a configuration specificationstatement.

The process then enters a loop comprising blocks 926-936, whichcollectively represent configuration compiler 808 tracing back thespecified signal to the first latch element in the signal path.Specifically, as illustrated at blocks 926-930, configuration compiler808 determines whether the next “upstream” circuit element in the signalpath is a latch (926), buffer (928) or inverter (930). If the circuitelement is a latch, the process exits the loop and passes to block 940,which is described below. If, however, the circuit element is a buffer,the process passes to block 934, which illustrates configurationcompiler moving to the next upstream circuit element to be processedwithout incrementing the inversion count. If the circuit element is aninverter, the process passes to blocks 936 and 934, which depictsincrementing the inversion count and then moving to the next upstreamcircuit element to be processed. In this manner, configuration compilertraces back a specified signal to a configuration latch whiledetermining a number of inversions of signal state implemented by thecircuit elements in the path. As noted above, if configuration compiler808 detects a circuit element other than a buffer or inverter in thesignal path, configuration compiler 808 preferably flags an error, asshown at block 946. The process thereafter terminates at block 950.

Following detection of a configuration latch at block 926, configurationcompiler 808 determines whether the inversion count is odd or even. Asshown at blocks 940-944, if the inversion count is odd, configurationcompiler inverts the designer-specified configuration values for thesignal at block 942 prior to inserting the values into configurationdatabase 814. No inversion is performed prior to inserting theconfiguration values into configuration database 814 if the inversioncount is even. The process thereafter terminates at block 950.

As has been described, the present invention provides a configurationspecification language that permits a designer of a digital system tospecify a configuration for the digital system utilizing configurationstatements embedded in the HDL design files describing the digitalsystem. The configuration statements logically instantiate within thedigital design one or more Dials, which provide configuration values forthe digital design in response to particular inputs. The Dials, like thedesign entities comprising the digital design, may be hierarchicallyarranged. The configuration specification statements are compiledtogether with the HDL files describing the digital design to produce aconfiguration database that may be accessed to configure a simulationexecutable model or (after appropriate transformations) a physicalrealization of the digital design. The compilation of the configurationspecification statements preferably supports a traceback process inwhich designer-specified configuration values for a signal are invertedin response to detection of an odd number of inverters coupled betweenthe signal and an associated configuration latch.

With reference again to FIG. 5C, recall that an exemplary configurationspecification statement for LDial 524 includes a parenthetical signalenumeration of the form:

LDial bus ratio (FXU0.A0.SIG1, FXU0.A1.SIG1,         FXU0.B.C.SIG2(0 . .. 5),         FXU1.A0.SIG1, FXU1.A1.SIG1,         FXU1.B.C.SIG2(0 . . .5),         FPU0.SIG3, SIG4(0 . . . 3)         ) =         . . .It should be noted that the signal enumeration section of theconfiguration specification statement individually, hierarchically andexplicitly enumerates the signal identifier of each signal instanceconfigured by the Dial, beginning from the scope of the design entitywith which the Dial is associated (which by convention is the designentity in whose HDL file the configuration specification statement orconfiguration reference statement instantiating the Dial is embedded).This syntax is referred to herein as a “full expression” of a signalidentifier. Employing “full expression” syntax in the signal enumerationsection of the configuration specification statement for an LDial orIDial or in the Dial enumeration section of the configurationspecification statement of a CDial requires the designer to know andcorrectly enter the hierarchical identifier for each instance of asignal (or lower-level Dial) controlled by the Dial. Consequently, if anew instance of the same signal (or lower-level Dial) were later addedto the digital design, the designer must carefully review theconfiguration specification statement of the Dial(s) referencing otherinstances of the same signal (or Dial) and update the signal (or Dial)enumeration section to include the full expression of the newly addedinstance.

In order to reduce the amount of input required to input the signal (orDial) enumeration sections of configuration specification statements andto reduce the burden of code maintenance as new signal and Dialinstances are added to the digital design, an ECAD system 35 inaccordance with the present invention also supports a “compactexpression” syntax for the signal (or Dial) enumeration sections ofconfiguration specification statements. This syntax is referred toherein more specifically as “compact signal expression” when applied tothe configuration specification statements of LDials and IDials and isreferred to as “compact Dial expression” when referring to theconfiguration specification statements of CDials.

In a compact expression of a signal or Dial enumeration, all instancesof an entity within a selected scope for which a common configuration isdesired can be enumerated with a single identifier. For example, in FIG.5C, if the designer wants a common configuration for all fourinstantiations of signal sig1 514, the designer could enumerate all fourinstantiations in the configuration specification statement of LDial 524with the single compact signal expression “[A].sig1”, where thebracketed term is the name of the entity in which the signal of interestoccurs. In compact expressions, the default scope of the expression isimplied as the scope of the design entity (in this case top-level entity302) with which the Dial is associated. The identifier “[A].sig1” thusspecifies all four instantiations of signal sig1 514 within A entityinstantiations 304 within the default scope of top-level entity 302.

The scope of the identifier in a compact expression can further benarrowed by explicitly enumerating selected levels of the designhierarchy. For example, the compact expression “FXU1.[A].sig1” refersonly to signal sig1 instantiations 514 b 0 and 514 b 1 within FXU1entity instantiation 304 b, but does not encompass signal sig1instantiations 514 a 0 and 514 a 1 within FXU0 entity instantiation 304a.

Of course, when only a single instance of a signal or Dial isinstantiated at higher levels of the design hierarchy, the compactexpression and the full expression will require approximately the sameamount of input (e.g., “FPU0.sig3” versus “[FPU].sig3” to identifysignal sig3 536). However, it should be noted that if another FPU entity314 were later added to simulation model 300″, the compact expression ofthe identification would advantageously apply to any later added FPUentities within the scope of top-level entity 302.

Utilizing compact expression, the configuration specification statementfor LDial 524 can now be rewritten more compactly as follows:

LDial bus ratio ([A].SIG1, [C].SIG2(0 . . . 5),         FPU0.SIG3,SIG4(0 . . . 3)         ) =         {2:1 =>0b0, 0x00, 0b0, 0x0;        3:1 =>0b1, 0x01, 0b0, 0x1;         4:1 =>0b1, 0x3F, 0b1, 0xF        };If the concatenation syntax described above is applied to the mappingtable, the mapping table can be further reduced to:

{2:1 =>0;  3:1 =>0x821;  4:1 =>0xFFF };In the concatenation syntax, the signal values are specified in themapping table with a single respective bit field for each entityidentifier, irrespective of the number of actual entity instances. Forexample, all instances encompassed by “[A].sig1” are represented by 1bit of the specified configuration value, all instances encompassed by“[C].sig2” are represented by 6 bits of the specified configurationvalue, the single instance identified by “FPU0.sig3” is represented by 1bit of the specified configuration value, and the single instance of“sig4(0 . . . 3)” is represented by 4 bits of the specifiedconfiguration value. Thus, utilizing concatenation syntax, the 21 bitscollectively specified by LDial 524 can be specified by an equivalent12-bit pattern.

Compact Dial expressions are constructed and parsed by the compiler inthe same manner as compact signal expressions. For example, theconfiguration specification statement for CDial 710 of FIG. 7B can berewritten utilizing compact Dial expression as follows:

CDial BusRatio ([FXU].BUSRATIO, [FPU].BUSRATIO, BUSRATIO)=        {2:1=> 2:1, 2:1, 2:1;        3:1 => 3:1, 3:1, 3:1;        4:1 => 4:1, 4:1,4:1        };Again, this configuration specification statement advantageously permitsCDial 710 to automatically control any additional LDials named “Busratio” that are latter added to simulation model 300′″ through theinstantiation of additional FXU entities 304 or FPU entities 314 withoutany code modification.

Referring now to FIG. 10, there is depicted a high level logicalflowchart of an exemplary method by which configuration compiler 808parses each signal or Dial identification within a configurationspecification statement in accordance with the present invention. Asdescribed above, each signal or Dial identification is constructedhierarchically from one or more fields separated by periods (“.”). Thelast field specifies an instance name of a signal (e.g., “sig1”) or Dial(e.g., “Bus_Ratio”), and the preceding fields narrow the scope from thedefault scope, which by convention is the scope of the design entitywith which the Dial is associated.

As shown, the process begins at block 1000 and then proceeds to block1002, which illustrates configuration compiler 808 determining whetherthe first or current field of the signal or Dial identification containsan entity identifier enclosed in brackets (e.g., “[A]”), that is,whether the identification is a compact expression. If so, the processpasses to block 1020, which is described below. If not, configurationcompiler 808 determines at block 1004 whether the identification is afull expression, by determining whether the first or current field ofthe identification is the last field of the identification. If so, thesignal or Dial identification is a full expression, and the processpasses to block 1010. If, on the other hand, the current field of theidentification is not the last field, configuration compiler 808 narrowsa current scope to the design entity instantiation identified in thecurrent field of the identification, as depicted at block 1006. Forexample, if configuration compiler 808 were processing theidentification “FPU0.SIG3” within the configuration specificationstatement of CDial 710 of FIG. 7B, configuration compiler 808 wouldnarrow the scope from the default scope of top entity 302 to FPU entityinstantiation 314. If the entity instantiation indicated by the currentfield of the identification exists, as shown at block 1008, the processreturns to block 1002 after updating the current field to be the nextfield, as shown at block 1009. If, however, the entity instantiationspecified by the current field does not exist within the current scope,configuration compiler 808 flags an error at block 1032 and terminatesprocessing of the signal or Dial identification.

Referring again to block 1004, when configuration compiler 808 detectsthat it has reached the last field of a full expression, the processshown in FIG. 10 passes from block 1004 to block 1010. Block 1010illustrates configuration compiler 1010 attempting to locate within thecurrent scope the single signal or Dial instance having a name matchingthat specified in the last field of the signal or Dial identification.If configuration compiler 808 determines at block 1012 that no matchinginstance is found within the current scope, the process passes to block1032, and configuration compiler 808 flags an error. However, ifconfiguration compiler 808 locates the matching signal or Dial instance,then configuration compiler 808 makes an entry in configuration database814 binding the signal or Dial instance to the parameters specified inthe mapping table of the configuration specification statement of theDial being processed, as shown at block 1014. Thereafter, processing ofthe signal or Dial identification terminates at block 1030.

With reference now to block 1020 and following blocks, the processing ofa signal or Dial identification employing compact expression will now bedescribed. Block 1020 depicts configuration compiler 808 attempting tolocate, within each of one or more instances in the current scope of theentity indicated by the bracketed field, each Dial or signal instancematching that specified in the signal or Dial identification. Forexample, when processing the compact expression “FXU1.[A].sig1” forsimulation model 300′″ of FIG. 7B, configuration compiler 808, uponreaching the field “[A]”, searches FXU1 for instantiations of entity A306, and upon finding entity instantiations 306 a 0 and 306 a 1,searches within each of these two entity instantiations to locatesignals instantiations sig1 514 a 0 and 514 a 1. If configurationcompiler 808 determines at block 1022 that no matching signal or Dialinstance is found within the current scope, the process passes to block1032, which depicts configuration compiler 808 terminating processing ofthe signal or Dial identification after flagging an error. However, ifconfiguration compiler 808 locates one or more matching signal or Dialinstances, then the process passes from block 1022 to block 1024. Block1024 illustrates configuration compiler 808 making one or more entriesin configuration database 814 binding each matching signal or Dialinstance to the parameters specified in the mapping table of theconfiguration specification statement of the Dial being processed.Thereafter, processing of the signal or Dial identification terminatesat block 1030.

Utilizing the compact expressions supported by the present invention,the amount of code a designer must enter in a configurationspecification statement can be advantageously reduced. The use ofcompact expressions not only reduces input requirements and thelikelihood of input errors, but also simplifies code maintenance throughthe automatic application of specified configuration parameters to laterentered instances of signals and Dials falling within a selected scope.

As described above, every Dial has a one-to-one mapping between each ofits input values and a unique output value of the Dial. In other words,each input value has a unique output value different than the outputvalue for any other input value. For CDials and LDials, the mappingtable must explicitly enumerate each legal input value and itsassociated mapping.

The requirement that the input values must be explicitly enumerated inthe mapping table limits the overall complexity of any given LDial orCDial. For example, consider the case of an integrated circuit (e.g., amemory controller) containing 10 to 20 configuration registers eachhaving between 5 and 20 legal values. In many cases, these registershave mutual dependencies—the value loaded in one register can affect thelegal possibilities of one or more of the other registers. Ideally, itwould be convenient to specify values for all of the registers utilizinga Dial tree controlled by a single CDial. In this manner, theconfiguration of all of the 10 to 20 registers could be controlled as agroup.

Unfortunately, given the assumptions set forth above, the 10 to 20registers collectively may have over 300,000 legal combinations ofvalues. The specification of a CDial in such a case, althoughtheoretically possible, is undesirable and practically infeasible.Moreover, even if a looping construct could be employed to automateconstruction of the configuration specification statement of the CDial,the configuration specification statement, although informing simulationsoftware which input values are legal, would not inform users how to seta CDial of this size.

In recognition of the foregoing, the configuration specificationlanguage of the present invention provides a “Dial group” construct. ADial group is a collection of Dials among which the designer desires tocreate an association. The runtime APIs utilized to provide Dial inputvalues observe this association by preventing the individual Dialswithin a Dial group from being set individually. In other words, allDials in a Dial group must be set at the same time so that individualDials are not set independently without concern for the interactionsbetween Dials. Because software enforces an observance of the groupingof the Dials forming a Dial group, use of Dial groups also provides amechanism by which a designer can warn the “downstream” user communitythat an unstated set of interdependencies exists between the Dialscomprising the Dial group.

With reference now to FIG. 11A, there is illustrated a diagrammaticrepresentation of a Dial group 1100 a. A Dial group 1100 a is defined bya group name 1102 (e.g., “GroupG”) and a Dial list 1104 listing one ormore Dials or other Dial groups. Dial groups do not have any inputs oroutputs. The Dials listed within Dial list 1104, which are all top-levelDials 1110 a-1110 f, may be LDials, CDials and/or IDials.

FIG. 11A illustrates that a Dial group 1100 a may be implemented as ahierarchical Dial group that refers to one or more other Dial groups1100 b-1100 n in its Dial list 1104. These lower-level Dial groups inturn refer to one or more top-level Dials 1110 g-1110 k and 1110 m-1110r (or other Dial groups) in their respective Dial lists.

One motivation for implementing Dial groups hierarchically is tocoordinate configuration of groups of Dials spanning organizationalboundaries. For example, consider a digital system in which 30 Dialslogically belong in a Dial group and 10 of the Dials are containedwithin a first design entity that is the responsibility of a firstdesigner and 20 of the Dials are contained within a second design entitythat is the responsibility of a second designer. Without a hierarchicalDial group, a single Dial group explicitly listing all 30 Dials in itsDial list 1104 would have to be specified at a higher level of thedesign hierarchy encompassing both of the first and second designentities. This implementation would be inconvenient in that the designer(or design team) responsible for the higher-level design entity wouldhave to know all of the related Dials in the lower-level design entitiesand specifically identify each of the 30 Dials in the Dial list 1104 ofthe Dial group.

An alternative hierarchical approach would entail creating a first Dialgroup containing the 10 Dials within the first design entity, a secondDial group containing the 20 Dials within the second design entity, anda third higher-level Dial group that refers to the first and second Dialgroups. Importantly, the Dial list 1104 of the higher-level Dial groupmust only refer to the two lower-level Dial groups, thus shieldingdesigners responsible for higher levels of the design hierarchy fromlow-level details. In addition, code maintenance is reduced sincechanging which Dials belong to the two lower-level Dial groups would notaffect the Dial list 1104 of the upper-level Dial group.

Dial groups are subject to a number of rules. First, no Dial or Dialgroup may be listed in the Dial list 1104 of more than one Dial group.Second, a Dial group must refer to at least one Dial or other Dial groupin its Dial list 1104. Third, in its Dial list 1104, a Dial group canonly refer to Dials or Dial groups within its scope, which by convention(and like the concept of scope as applied to Dials) is that of itsassociated design entity (i.e., the design entity itself and any lowerlevel design entity within the design entity). Fourth, each Dialreferred to in a Dial list 1104 of a Dial group must be a top-levelDial.

Referring now to FIG. 11B, there is depicted an exemplary simulationmodel 1120 illustrating the use of Dial groups. Exemplary simulationmodel 1120 includes a top-level design entity 1122 having instantiationidentifier “TOP:TOP”. Within top-level design entity 1122, two designentities 1124 and 1126 are instantiated, which have entity names FBC andL2, respectively. FBC entity instantiation 1124 in turn instantiates aDial instance 1130 having Dial name “C”, a Z entity instantiation 1132containing a Dial instance 1134 having Dial name “B”, and twoinstantiations of entity X 1136, which are respectively named “X0” and“X1”. Each entity X instantiation 1136 contains two entity Yinstantiations 1138, each further instantiating a Dial instance 1140having Dial name “A”. L2 entity instantiation 1126 contains a Dialinstance 1150 having Dial name “D” and twso entity L instantiations1152, each containing a Dial instance 1154 having Dial name “E”.

As shown, FBC entity instantiation 1124 has an associated Dial groupinstance 1160 having a group name “F”. As indicated by arrows, Dialgroup instance 1160 includes each of Dials instances 1130, 1134 and 1140within FBC entity instantiation 1124. L2 entity instantiation 1126similarly has an associated Dial group instance 1162 that includes eachof Dial instances 1150 and 1154 within L2 entity instantiation 1126.Both of these Dial group instances in turn belong to a higher-level Dialgroup instance 1164 having group name “H”, which is associated withtop-level design entity 1122.

Each Dial group instance is created by including within the HDL file ofthe associated design entity an appropriate configuration statement. Forexample, exemplary syntax for configuration statements creating Dialgroups “F”, “G” and “H” are respectively given as follows:

-   -   GDial F(C, [Z].B, [Y].A);    -   GDial G(D, [L].E);    -   GDial H(FBC.F, L2.G);

In each configuration statement, a Dial group is declared by the keyword“GDial”, which is followed by string (e.g., “F”) representing the groupname. Within the parenthesis following the group name, the Dial list forthe Dial group is specified. As indicated in the configuration statementfor Dial group “H”, the Dial list for a hierarchical Dial groupspecifies other Dial groups in the same manner as Dials. It should alsobe noted that the compact dial expression syntax discussed above can beemployed in specifying Dials or Dial groups in the Dial list, asindicated in the configuration statements for Dial groups “F” and “G”.In addition, default values may be applied to a Dial group by specifyinga default value for each top-level Dial included in the Dial group.

Now that basic types of Dials, syntax for their specification, and theapplication and Dial groups have been described, a description of anexemplary implementation of configuration database 814 and its use willbe provided. To promote understanding of the manner in which particularDial instantiations (or multiple instantiations of a Dial) can beaccessed in configuration database 814, a nomenclature for Dials withinconfiguration database 814 will be described.

The nomenclature employed in a preferred embodiment of the presentinvention first requires a designer to uniquely name each Dial specifiedwithin any given design entity, i.e., the designer cannot declare anytwo Dials within the same design entity with the same Dial name.Observing this requirement prevents name collisions between Dialsinstantiated in the same design entity and promotes the arbitrary re-useof design entities in models of arbitrary size. This constraint is nottoo onerous in that a given design entity is usually created by aspecific designer at a specific point in time, and maintaining uniqueDial names within such a limited circumstance presents only a moderateburden.

Because it is desirable to be able to individually access particularinstantiations of a Dial entity that may have multiple instantiations ina given simulation model (e.g., due to replication), use of a Dial namealone is not guaranteed to uniquely identify a particular Dial entityinstantiation in a simulation model. Accordingly, in a preferredembodiment, the nomenclature for Dials leverages the uniqueinstantiation identifier of the associated design entity required by thenative HDL to disambiguate multiple instances of the same Dial entitywith an “extended Dial identifier” for each Dial within the simulationmodel.

As an aside, it is recognized that some HDLs do not strictly enforce arequirement for unique entity names. For example, conventional VHDLentity naming constructs permit two design entities to share the sameentity name, entity name. However, VHDL requires that such identicallynamed entities must be encapsulated within different VHDL libraries fromwhich a valid VHDL model may be constructed. In such a circumstance, theentity_name is equivalent to the VHDL library name concatenated by aperiod (“.”) to the entity name as declared in the entity declaration.Thus, pre-pending a distinct VHDL library name to the entity namedisambiguates entities sharing the same entity name. Most HDLs include amechanism such as this for uniquely naming each design entity.

In a preferred embodiment, an extended Dial identifier that uniquelyidentifies a particular instantiation of a Dial entity includes threefields: an instantiation identifier field, a design entity name, and aDial name. The extended Dial identifier may be expressed as a string inwhich adjacent fields are separated by a period (“.”) as follows:

-   -   <instantiation identifier>.<design entity name>.<Dial name>

In the extended Dial identifier, the design entity field contains theentity name of the design entity in which the Dial is instantiated, andthe Dial name field contains the name declared for the Dial in the Dialconfiguration specification statement. As described above, theinstantiation identifier specified in the instantiation identifier fieldis a sequence of instantiation identifiers, proceeding from thetop-level entity of the simulation model to the direct ancestor designentity of the given Dial instance, with adjacent instance identifiersseparated by periods (“.”). Because no design entity can include twoDials of the same name, the instantiation identifier is unique for eachand every instance of a Dial within the model.

The uniqueness of the names in the design entity name field is a primarydistinguishing factor between Dials. By including the design entity namein the extended Dial identifier, each design entity is, in effect, givena unique namespace for the Dials associated with that design entity,i.e., Dials within a given design entity cannot have name collisionswith Dials associated with other design entities. It should also benoted that it is possible to uniquely name each Dial by using theinstantiation identifier field alone. That is, due to the uniqueness ofinstantiation identifiers, Dial identifiers formed by only theinstantiation identifier field and the Dial name field will benecessarily unique. However, such a naming scheme does not associateDials with a given design entity. In practice, it is desirable toassociate Dials with the design entity in which they occur through theinclusion of the design entity field because all the Dialsinstantiations can then be centrally referenced without the need toascertain the names of all the design entity instantiations containingthe Dial.

As noted above, use of extended Dial identifiers permits the uniqueidentification of a particular instantiation of a Dial and permits there-use of design entities within any arbitrary model without risk ofDial name collisions. For example, referring again to FIG. 11B, Dial Aentity instantiations 1140 a 0, 1140 a 1, 1140 b 0 and 1140 b 1 can berespectively uniquely identified by the following extended Dialidentifiers:

-   -   FBC.X0.Y0.Y.A    -   FBC.X0.Y1.Y.A    -   FBC.X1.Y0.Y.A    -   FBC.X1.Y1.Y.A

With an understanding of a preferred nomenclature of Dials, reference isnow made to FIG. 12, which is a diagrammatic representation of anexemplary format for a configuration database 814 created byconfiguration compiler 808. In this exemplary embodiment, configurationdatabase 814 includes at least four different types of data structures:Dial definition data structures (DDDS) 1200, Dial instance datastructures (DIDS) 1202, latch data structures 1204 and top-level pointerarray 1206. Configuration database 814 may optionally include additionaldata structures, such as Dial pointer array 1208, latch pointer array1210, instance pointer array 1226 and other data structures depicted indashed-line illustration, which may alternatively be constructed involatile memory when configuration database 814 is loaded, as describedfurther below. Generating these additional data structures only afterconfiguration database 814 is loaded into volatile memory advantageouslypromotes a more compact configuration database 814.

A respective Dial definition data structure (DDDS) 1200 is createdwithin configuration database 814 for each Dial or Dial group in thedigital system. Preferably, only one DDDS 1200 is created inconfiguration database 814 regardless of the number of instantiations ofthe Dial (or Dial group) in the digital system. As discussed below,information regarding particular instantiations of a Dial described in aDDDS 1200 is specified in separate DIDSs 1202.

As shown, each DDDS 1200 includes a type field 1220 denoting whetherDDDS 1200 describes a Dial or Dial group, and if a Dial, the type ofDial. In one embodiment, the value set for type field 1220 includes “G”for Dial group, “I” for integer Dial (IDial), “L” for latch Dial(LDial), and “C” for control Dial (CDial). DDDS 1200 further includes aname field 1222, which specifies the name of the Dial or Dial groupdescribed by DDDS 1200. This field preferably contains the design entityname of the Dial (or Dial group), followed by a period (“.”), followedby the name of Dial (or Dial group) given in the configurationspecification statement of the Dial (or Dial group). The contents ofname field 1222 correspond to the design entity name and Dial namefields of the extended dial identifier for the Dial.

DDDS 1200 also includes a mapping table 1224 that contains the mappingfrom the input of the given Dial to its output(s), if required. ForLDials and CDials, mapping table 1224 specifies relationships betweeninput values and output values much like the configuration specificationstatements for these Dials. For Dial groups and IDials not having asplit output, mapping table 1220 is an empty data structure and is notused. In the case of an IDial with a split output, mapping table 1220specifies the width of the replicated integer field and the number ofcopies of that field. This information is utilized to map the integerinput value to the various copies of the integer output fields. If theconfiguration specification statement for the Dial has a defaultspecified, DDDS 1200 indicates the default value in default field 1229;if no default is specified, default field 1229 is NULL or is omitted.

Finally, DDDS 1200 may include an instance pointer array 1226 containingone or more instance pointers 1228 a-1228 n pointing to each instance ofthe Dial or Dial group defined by the DDDS 1200. Instance pointer array1226 facilitates access to multiple instances of a particular Dial orDial group.

As further illustrated in FIG. 12, configuration database 814 contains aDIDS 1202 corresponding to each Dial instantiation or Dial groupinstantiation within a digital design. Each DIDS 1202 contains adefinition field 1230 containing a definition pointer 1231 pointing tothe DDDS 1200 of the Dial for which the DIDS 1202 describes a particularinstance. Definition pointer 1231 permits the Dial name, Dial type andmapping table of an instance to be easily accessed once a particularDial instance is identified.

DIDS 1202 further includes a parent field 1232 that, in the case of anIDial, CDial or LDial, contains a parent pointer 1233 pointing to theDIDS 1202 of the higher-level Dial instance, if any, having an outputlogically connected to the input of the corresponding Dial instance. Inthe case of a Dial group, parent pointer 1233 points to the DIDS 1202 ofthe higher-level Dial group, if any, that hierarchically includes thepresent Dial group. If the Dial instance corresponding to a DIDS 1202 isa top-level Dial and does not belong to any Dial group, parent pointer1233 in parent field 1232 is a NULL pointer. It should be noted that aDial can be a top-level Dial, but still belong to a Dial group. In thatcase, parent pointer 1233 is not NULL, but rather points to the DIDS1202 of the Dial group containing the top-level Dial.

Thus, parent fields 1232 of the DIDSs 1202 in configuration database 814collectively describe the hierarchical arrangement of Dial entities andDial groups that are instantiated in a digital design. As describedbelow, the hierarchical information provided by parent fields 1232advantageously enables a determination of the input value of anytop-level Dial given the configuration values of the configurationlatches ultimately controlled by that top-level Dial.

Instance name field 1234 of DIDS 1202 gives the fully qualified instancename of the Dial instance described by DIDS 1202 from the top-leveldesign entity of the digital design. For Dial instances associated withthe top-level entity, instance name field 1234 preferably contains aNULL string.

Finally, DIDS 1202 includes an output pointer array 1236 containingpointers 1238 a-1238 n pointing to data structures describing thelower-level instantiations associated with the corresponding Dialinstance or Dial group instance. Specifically, in the case of IDials andLDials, output pointers 1238 refer to latch data structures 1204corresponding to the configuration latches coupled to the Dial instance.For non-split IDials, the configuration latch entity referred to byoutput pointer 1238 a receives the high order bit of the integer inputvalue, and the configuration latch entity referred to by output pointer1238 n receives the low order bit of the integer input value. In thecase of a CDial, output pointers 1238 refer to other DIDSs 1202corresponding to the Dial instances controlled by the CDial. For Dialgroups, output pointers 1238 refer to the top-level Dial instances orDial group instances hierarchically included within the Dial groupinstance corresponding to DIDS 1202.

Configuration database 814 further includes a respective latch datastructure 1204 for each configuration latch in simulation executablemodel 816 to which an output of an LDial or IDial is logically coupled.Each latch data structure 1204 includes a parent field 1240 containing aparent pointer 1242 to the DIDS 1200 of the LDial or IDial directlycontrolling the corresponding configuration latch. In addition, latchdata structure 1204 includes a latch name field 1244 specifying thehierarchical latch name, relative to the entity containing the Dialinstantiation identified by parent pointer 1242. For example, if anLDial X having an instantiation identifier a.b.c refers to aconfiguration latch having the hierarchical name “a.b.c.d.latch1”, latchname field 1244 will contain the string “d.latch1”. Prepending contentsof an instance name field 1234 of the DIDS 1202 identified by parentpointer 1242 to the contents of a latch name field 1244 thus providesthe fully qualified name of any instance of a given configuration latchconfigurable utilizing configuration database 814.

Still referring to FIG. 12, as noted above, configuration database 814includes top-level pointer array 1206, and optionally, Dial pointerarray 1208 and latch pointer array 1210. Top-level pointer array 1206contains top-level pointers 1250 that, for each top-level Dial and eachtop-level Dial group, points to an associated DIDS 1202 for thetop-level entity instance. Dial pointer array 1208 includes Dialpointers 1252 pointing to each DDDS 1200 in configuration database 814to permit indirect access to particular Dial instances through Dialand/or entity names. Finally, latch pointer array 1210 includes latchpointers 1254 pointing to each latch data structure 1204 withinconfiguration database 814 to permit easy access to all configurationlatches.

Once a configuration database 814 is constructed, the contents ofconfiguration database 814 can be loaded into volatile memory, such assystem memory 18 of data processing system 8 of FIG. 1, in order toappropriately configure a simulation model for simulation. In general,data structures 1200, 1202, 1204 and 1206 can be loaded directly intosystem memory 18, and may optionally be augmented with additionalfields, as described below. However, as noted above, if it is desirablefor the non-volatile image of configuration database 814 to be compact,it is helpful to generate additional data structures, such as Dialpointer array 1208, latch pointer array 1210 and instance pointer arrays1226, in the volatile configuration database image in system memory 18.

Referring now to FIG. 13, there is depicted a high level logicalflowchart of a method by which configuration database 814 is expandedwithin volatile memory of a data processing system, such as systemmemory 18 of data processing system 8. Because FIG. 13 depicts logicalsteps rather than operational steps, it should be understood that manyof the steps illustrated in FIG. 13 may be performed concurrently or ina different order than that shown.

As illustrated, the process begins at block 1300 and then proceeds toblock 1302, which illustrates data processing system 6 copying theexisting data structures within configuration database 814 fromnon-volatile storage (e.g., disk storage or flash memory) into volatilesystem memory 18. Next, at block 1304, a determination is made whetherall top-level pointers 1250 within top-level pointer array 1206 ofconfiguration database 814 have been processed. If so, the processpasses to block 1320, which is discussed below. If not, the processproceeds to block 1306, which illustrates selection from top-level array1206 of the next top-level pointer 1250 to be processed.

A determination is then made at block 1308 of whether or not parentpointer 1233 within the DIDS 1202 identified by the selected top-levelpointer 1250 is a NULL pointer. If not, which indicates that the DIDS1202 describes a top-level Dial belonging to a Dial group, the processreturns to block 1304, indicating that the top-level Dial and itsassociated lower-level Dials will be processed when the Dial group towhich it belongs is processed.

In response to a determination at block 1308 that the parent pointer1233 is a NULL pointer, data processing system 8 creates an instancepointer 1228 to the DIDS 1202 in the instance array 1226 of the DDDS1200 to which definition pointer 1231 in definition field 1230 of DIDS1202 points, as depicted at block 1310. Next, at block 1312, dataprocessing system 8 creates a Dial pointer 1252 to the DDDS 1200 of thetop-level Dial within Dial pointer array 1208, if the Dial pointer 1252is not redundant. In addition, as shown at block 1314, data processingsystem 8 creates a latch pointer 1254 within latch pointer array 1210pointing to each latch data structure 1204, if any, referenced by anoutput pointer 1238 of the DIDS 1202 of the top-level Dial. As shown atblock 1316, each branch at each lower level of the Dial tree, if any,headed by the top-level Dial referenced by the selected top-levelpointer 1250 is then processed similarly by performing the functionsillustrated at block 1310-1316 until a latch data structure 1204terminating that branch is found and processed. The process then returnsto block 1304, representing the processing of each top-level pointer1250 within top-level pointer array 1206.

In response to a determination at block 1304 that all top-level pointers1250 have been processed, the process illustrated in FIG. 13 proceeds toblock 1320. Block 1320 illustrates the creation of a Set field 1239 ineach DIDS 1320 in the configuration database. Set field 1239 is aBoolean-valued field that in initialized to FALSE and is updated to TRUEwhen the associated Dial instance is explicitly set. In addition, asdepicted at block 1322, data processing system 8 creates a latch valuefield 1246 and latch set field 1248 in each latch data structure 1204 torespectively indicate the current set value of the associatedconfiguration latch and to indicate whether the configuration latch hasbeen explicitly set. Although the creation of the three fields indicatedat block 1320-1322 is illustrated separately from the processingdepicted at blocks 1304-1316 for purposes of clarity, it will beappreciated that it is more efficient to create Dial set field 1239 aseach DIDS 1202 is processed and to create latch value and latch setfields 1246, 1248 as the latch data structures 1204 at the bottom ofeach Dial tree are reached. The process of loading the configurationdatabase into volatile memory thereafter terminates at block 1324.

With the configuration database loaded into volatile memory, asimulation model can be configured and utilized to simulate a digitaldesign through the execution of simulation software. With reference toFIG. 14, there is illustrated a block diagram depicting the contents ofsystem memory 18 (FIG. 1) during a simulation run of a simulation model.As shown, system memory 18 includes a simulation model 1400, which is alogical representation of the digital design to be simulated, as well assoftware including configuration APIs 1406, a simulator 1410 and an RTX(Run Time eXecutive) 1420.

Simulator 1410 loads simulation models, such as simulation model 1400,into system memory 18. During a simulation run, simulator 1410 resets,clocks and evaluates simulation model 1400 via various APIs 1416. Inaddition, simulator 1410 reads values in simulation model 1400 utilizingGETFAC API 1412 and writes values to simulation model 1400 utilizingPUTFAC API 1414. Although simulator 1410 is implemented in FIG. 14entirely in software, it will be appreciated in what follows that thesimulator can alternatively be implemented at least partially inhardware.

Configuration APIs 1406 comprise software, typically written in a highlevel language such as C or C++, that support the configuration ofsimulation model 1400. These APIs, which are dynamically loaded bysimulator 1410 as needed, include a first API that loads configurationmodel 814 from non-volatile storage and expands it in the mannerdescribed above with reference to FIG. 13 to provide a memory image ofconfiguration database 1404. Configuration APIs 1406 further includeadditional APIs to access and manipulate configuration database 1404, asdescribed in detail below.

RTX 1420 controls simulation of simulation models, such as simulationmodel 1400. For example, RTX 1420 loads test cases to apply tosimulation model 1400. In addition, RTX 1420 delivers a set of API callsto configuration APIs 1406 and the APIs provided by simulator 1410 toinitialize, configure, and simulate operation of simulation model 1400.During and after simulation, RTX 1420 also calls configuration APIs 1406and the APIs provided by simulator 1410 to check for the correctness ofsimulation model 1400 by accessing various Dials, configuration latches,counters and other entities within simulation model 1400.

RTX 1420 has two modes by which it accesses Dials instantiated withinsimulation model 1400: interactive mode and batch mode. In interactivemode, RTX 1420 calls a first set of APIs to read from or write to one ormore instances of a particular Dial within configuration database 1404.The latch value(s) obtained by reference to configuration database 1404take immediate effect in simulation model 1400. In batch mode, RTX 1420calls a different second set of APIs to read or write instantiations ofmultiple Dials in configuration database 1404 and then make any changesto simulation model 1400 at the same time.

In either interactive or batch mode, RTX 1420 must employ some syntax inits API calls to specify which Dial or Dial group instances withinsimulation model 1400 are to be accessed. Although a number of differentsyntaxes can be employed, including conventional regular expressionsemploying wildcarding, in an illustrative embodiment the syntax utilizedto specify Dial or Dial group instances in API calls is similar to thecompact expression hereinbefore described. A key difference between thecompact expressions discussed above and the syntax utilized to specifyDial or Dial group instances in the RTX API calls is that, in theillustrative embodiment, Dial and Dial group instances are specified inthe RTX API calls by reference to the top-level design entity ofsimulation model 1400 rather than relative to the design entity in whichthe Dial or Dial group is specified.

In the illustrative embodiment, each RTX API call targeting one or moreDial or Dial group instances in simulation model 1400 specifies the Dialor Dial group instances utilizing two parameters: an instance qualifierand a dialname qualifier. To refer to only a single Dial or Dial groupinstantiation, the instance qualifier takes the form “a.b.c.d”, which isthe hierarchical instantiation identifier of the design entity in whichthe single Dial or Dial group instantiation occurs. To refer to multipleDial or Dial group instances, the instance qualifier takes the form“a.b.c.[X]”, which identifies all instantiations of entity X within thescope of entity instance a.b.c. In the degenerate form, the instancequalifier may simply be “[X]”, which identifies all instantiations ofentity X anywhere within simulation model 1400.

The dialname qualifier preferably takes the form “Entity.dialname”,where “Entity” is the design entity in which the Dial or Dial group isinstantiated and “dialname” is the name assigned to the Dial or Dialgroup in its configuration specification statement. If bracketed syntaxis employed to specify the instance qualifier, the “Entity” field can bedropped from the dialname qualifier since it will match the bracketedentity name.

Referring now to FIG. 15 there is depicted a high level logicalflowchart of an exemplary process by which configuration APIs 1406locate particular Dial or Dial group instances in configuration database1404 based upon an instance qualifier and dialname qualifier pair inaccordance with the present invention. As shown, the process begins atblock 1500 in response to receipt by a configuration API 1406 of an APIcall from RTX 1420 containing an instance qualifier and a dialnamequalifier as discussed above. In response to the API call, theconfiguration API 1406 enters configuration database 1404 at Dialpointer array 1208, as depicted at block 1502, and utilizes Dialpointers 1252 to locate a DDDS 1200 having a name field 1222 thatexactly matches the specified dialname qualifier, as illustrated atblock 1504.

Next, at block 1506, the configuration API 1406 determines whether theinstance qualifier employs bracketed syntax, as described above. If so,the process passes to block 1520, which is described below. However, ifthe instance qualifier does not employ bracketed syntax, theconfiguration API 1406 follows the instance pointers 1228 of thematching DDDS 1200 to locate the single DIDS 1202 having an instancename field 1234 that exactly matches the specified instance qualifier.As indicated at blocks 1510-1512, if no match is found, the processterminates with an error. However, if a matching DIDS 1202 is located, atemporary “result” pointer identifying the single matching DIDS 1202 iscreated at block 1524. The process thereafter terminates at block 1526.

Returning to block 1520, if bracketed syntax is employed, theconfiguration API 1406 utilizes instance pointers 1228 of the matchingDDDS 1200 to locate one or more DIDSs 1202 of Dial or Dial groupinstances within the scope specified by the prefix portion of theinstance identifier preceding the bracketing. That is, a DIDS 1202 issaid to “match” if the instance name field 1234 of the DIDS 1202contains the prefix portion of the instance qualifier. Again, if nomatch is found, the process passes through block 1522 and terminateswith an error at block 1512. However, if one or more DIDSs 1202 “match”the instance qualifier, temporary result pointers identifying thematching DIDSs 1202 are constructed at block 1524. The process shown inFIG. 15 thereafter terminates at block 1526.

With reference now to FIG. 16A, there is illustrated a high levellogical flowchart of an exemplary process by which RTX 1420 reads avalue of one or more Dial instances in interactive mode, in accordancewith the present invention. As shown, the process begins at block 1600in response to receipt by a configuration API 1406 of a read_Dial( ) APIcall by RTX 1420. As indicated at block 1602, a configuration API 1406responds to the read_Dial( ) API call by locating within configurationdatabase 1404 one or more DIDSs 1202 of Dial instances responsive to theAPI call utilizing the process described above with reference to FIG.15.

The process then enters a loop at block 1604 in which each of thetemporary result pointers generated by the process of FIG. 15 isprocessed. If all of the result pointers returned by the process of FIG.15 have been processed, the process passes to block 1640, which isdescribed below. If not, the process proceeds from block 1606 to block1608, which illustrates the configuration API 1406 selecting a nextresult pointer to be processed. Next, at block 1608, the configurationAPI 1406 determines by reference to type field 1220 of the DDDS 1200associated with the DIDS 1202 identified by the current result pointerwhether the DIDS 1202 corresponds to a Dial group. If so, the processillustrated in FIG. 16A terminates with an error condition at block 1610indicating that RTX 1420 has utilized the wrong API call to read a Dialinstance.

In response to a determination at block 1608 that the DIDS 1202identified by the current result pointer does not correspond to a Dialgroup instance, the process proceeds to block 1620. Block 1620 depictsconfiguration API 1406 utilizing output pointers 1238 of the DIDS 1202(and those of any lower-level DIDS 1202 in the Dial tree) to build adata set containing the latch names from the latch name fields 1244 oflatch data structures 1204 corresponding to all configuration latchesultimately controlled by the Dial instance specified in the API call.Next, as depicted at block 1622, the configuration API 1406 makes one ormore API calls to GETFAC( ) API 1412 of simulator 1410 to obtain fromsimulation model 1400 the latch values of all of the configurationlatches listed in the data set constructed at block 1620.

Configuration API 1406 then verifies the latch values obtained fromsimulation model 1400 by reference to configuration database 1404, asshown at block 1624. In order to verify the latch values, configurationAPI 1406 utilizes mapping tables 1224 to propagate the latch values upthe Dial tree from the corresponding latch data structures throughintermediate DIDSs 1202, if any, until an input value for the requestedDial instance is determined. If at any point in this verificationprocess, a Dial instance's output value generated by the verificationprocess does not correspond to one of the legal values enumerated in itsmapping table 1224, an error is detected at block 1626. Accordingly, thelatch values read from simulation model 1400 and an error indication areplaced in a result data structure, as illustrated at block 1630. If noerror is detected, the Dial input value generated by the verificationprocess and a success indication are placed in the result datastructure, as shown at block 1628.

As indicated by the process returning to block 1604, the above-describedprocess is repeated for each temporary result pointer returned by theprocess of FIG. 15. Once all result pointers have been processed, theprocess passes from block 1604 to blocks 1640-1642, which illustrate theconfiguration API 1406 returning the result data structure to RTX 1420and then terminating.

RTX 1420 reads Dial instances in interactive mode utilizing the methodof FIG. 16A, for example, to initialize checkers that monitor portionsof simulation model 1400 during simulation runs. The Dial settings ofinterest include not only those of top-level Dial instances, but alsothose of lower-level Dial instances affiliated with the portions of thesimulation model 1400 monitored by the checkers.

Referring now to FIG. 16B, there is illustrated a high level logicalflowchart of an exemplary process by which RTX 1420 reads a value of oneor more Dial group instances in interactive mode, in accordance with thepresent invention. As can be seen by comparison of FIGS. 16A and 16B,the process of reading a Dial group instance is similar to the processof reading a Dial instance, but returns the value of one or moretop-level Dial instances of possibly different Dial entities rather thanone or more instances of the same Dial entity.

As shown, the process shown in FIG. 16B begins at block 1650 in responseto receipt by a configuration API 1406 of a read_Dial_group( ) API callby RTX 1420. As indicated at block 1652, a configuration API 1406responds to the read_Dial_group( ) API call by locating withinconfiguration database 1404 one or more DIDSs 1202 of Dial groupinstances responsive to the API call utilizing the process describedabove with reference to FIG. 15.

The process then enters a loop at block 1654 in which each of thetemporary result pointers generated by the process of FIG. 15 isprocessed. If all of the result pointers returned by the process of FIG.15 have been processed, the process passes to block 1680, which isdescribed below. If not, the process proceeds from block 1654 to block1656, which illustrates the configuration API 1406 selecting a nextresult pointer to be processed. Next, at block 1658, the configurationAPI 1406 identifies and creates temporary pointers to all of thetop-level Dial instances belonging to the Dial group instancecorresponding to the DIDS 1202 referenced by the current result pointer.The top-level Dial instances are identified by locating thehighest-level DIDS 1202 for each output pointer 1238 for which the typefield 1220 in the associated DDDS 1220 specifies a type other than Dialgroup. In other words, the configuration API 1406 may have to searchdown through one or more hierarchical Dial groups to locate the relevanttop-level Dial instances.

The process illustrated in FIG. 16B then enters a loop beginning atblock 1659 in which each of the top-level Dial instances belonging tothe Dial group corresponding to the Dial group DIDS 1202 referenced bythe current result pointer is individually processed to obtain thevalue(s) of the top-level Dial instance(s). The process next proceeds toblock 1660, which depicts configuration API 1406 utilizing outputpointers 1238 of the DIDS 1202 of the first (or next) top-level Dialinstance (and those of any lower-level DIDS 1202 in the Dial tree) tobuild a data set containing the latch names from the latch name fields1244 of latch data structures 1204 corresponding to all configurationlatches ultimately controlled by the top-level Dial instance. Next, asdepicted at block 1662, the configuration API 1406 makes one or more APIcalls to GETFAC( ) API 1412 of simulator 1410 to obtain from simulationmodel 1400 the latch values of all of the configuration latches listedin the data set constructed at block 1660.

At block 1664, configuration API 1406 then verifies the latch valuesobtained from simulation model 1400 by reference to configurationdatabase 1404, utilizing the same technique described above withreference to block 1624 of FIG. 16A. If at any point in thisverification process, a Dial instance's output value generated by theverification process does not correspond to one of the legal valuesenumerated in its mapping table 1224, an error is detected at block1666. Accordingly, the latch values read from simulation model 1400 andan error indication are placed in a result data structure, asillustrated at block 1670. If no error is detected, the Dial input valuegenerated by the verification process and a success indication areplaced in the result data structure, as shown at block 1668.

Following either block 1668 or block 1670, the process returns to block1659, which represents a determination of whether or not all top-levelDials belonging to the Dial group corresponding to the DIDS 1202referenced by the current result pointer have been processed. If not,the process returns to block 1660, which has been described. However, ifall top-level Dials have been processed, the process returns to block1654, which illustrates a determination of whether or not all resultpointers have been processed. If not, the next result pointer isprocessed at block 1656 and following blocks, which have been described.If, however, all result pointers have been processed, the process passesto block 1680-1682, which illustrates the configuration API 1406returning the result data structure to RTX 1420 and then terminating.

Reading Dial and Dial group instances in a batch mode of RTX 1420 ispreferably handled by configuration APIs 1406 in the same manner asinteractive mode, with one exception. Whereas in interactive mode latchvalues are always read from simulation model 1440 via calls to GETFAC( )API 1412 at blocks 1622 and 1662, in batch mode a latch value ispreferably obtained from latch value field 1246 of a latch datastructure 1204 in configuration database 1404 if latch set field 1248indicates that the corresponding configuration latch has been set. Ifthe configuration latch has not been set, the latch value is obtainedfrom simulation model 1440 by a call to GETFAC( ) API 1412. Thisdifference ensures that Dial settings made in batch mode, which may notyet have been reflected in simulation model 1400, are correctlyreported.

With reference now to FIG. 17A, there is illustrated a high levellogical flowchart of an exemplary process by which an RTX sets a Dialinstance in an interactive mode in accordance with the presentinvention. The process begins at block 1700 in response to receipt by aconfiguration API 1406 of a set_Dial( ) API call from RTX 1420. Inresponse to the set_Dial( ) API call, the configuration API 1406 firstlocates and generates temporary result pointers pointing to the DIDS1202 of the Dial instance(s) specified in the set_Dial( ) API callutilizing the technique described above with reference to FIG. 15, asillustrated at block 1702. Next, the configuration API 1406 determinesat block 1704 whether or not all of the temporary result pointers pointto DIDSs 1202 of top-level Dial instances. This determination can bemade, for example, by examining the parent pointer 1233 of each suchDIDS 1202 (and that of any higher level DIDS 1202 linked by a parentpointer 1233) and the type fields 1220 of the associated DDDSs 1200. TheDIDS 1202 of a top-level Dial instance will have either a NULL parentpointer 1233 or a non-NULL parent pointer 1233 pointing to another DIDS1202 that the type field 1220 of the associated DDDS 1200 indicatesrepresents a Dial group. If any of the DIDSs 1202 referenced by theresult pointers does not correspond to a top-level Dial instance, theprocess terminates at block 1708 with an error condition.

In response to a determination at block 1704 that all of the DIDSs 1202referenced by the result pointers correspond to top-level Dialinstances, a further determination is made at block 1706 whether or notthe specified value to which the Dial instance(s) are to be set is oneof the values specified in the mapping table 1224 of the associated DDDS1200. If not, the process terminates with an error at block 1708.However, in response to a determination at block 1706 that the specifiedvalue to which the Dial instance(s) are to be set is one of the legalvalues, the process enters a loop including blocks 1710-1716 in whicheach result pointer is processed to set a respective Dial instance.

At block 1710, configuration API 1406 determines whether or not allresult pointers have been processed. If so, the process terminates atblock 1720. If, however, additional result pointers remain to beprocessed, the next result pointer to be processed is selected at block1712. Next, at block 1714, configuration API 1406 propagates the Dialsetting specified in the set_Dial( ) API call down the Dial tree headedby the top-level Dial instance associated with the DIDS 1202 referencedby the current result pointer. In order to propagate the desired Dialsetting, mapping table 1224 in the DDDS 1200 associated with the DIDS1202 referenced by the current result pointer is first referenced, ifnecessary, (i.e., for CDials and LDials) to determine the output valuesfor each of output pointers 1238 in the output pointer array 1236 of theDIDS 1202 referenced by the current result pointer. These output valuesare propagated down the Dial tree as the input values of the nextlower-level Dial instances, if any, corresponding to the DIDSs 1202referenced by output pointers 1238. This propagation continues until alatch value is determined for each configuration latch terminating theDial tree (which are represented in configuration database 1404 by latchdata structures 1204). As shown at block 1716, as each latch value for aconfiguration latch is determined, the configuration API 1406 makes acall to PUTFAC( ) API 1414 to set the configuration latch in simulationmodel 1400 to the determined value utilizing the latch name specifiedwithin the latch name field 1244 of the corresponding latch datastructure 1204.

Thereafter, the process returns to block 1710, which represents theprocessing of the top-level Dial corresponding to the next resultpointer. After all result pointers are processed, the process terminatesat block 1720.

Referring now to FIG. 17B, there is depicted a high level logicalflowchart of an illustrative process by which an RTX sets a Dial groupin an interactive mode in accordance with the present invention. Theprocess begins at block 1730 in response to receipt by a configurationAPI 1406 of a set_Dial_group( ) API call from an RTX 1420. In responseto the set_Dial_group( ) API call, the configuration API 1406 firstlocates and generates temporary result pointers pointing to the DIDS1202 of the Dial group instance(s) specified in the set_Dial_group( )API call utilizing the technique described above with reference to FIG.15, as depicted at block 1732. Next, the configuration API 1406determines at block 1734 whether or not all of the temporary resultpointers point to DIDSs 1202 of top-level Dial group instances. Thisdetermination can be made, for example, by examining the parent pointer1233 of each such DIDS 1202 to ascertain whether the parent pointer 1233is NULL. If any of the DIDSs 1202 referenced by the result pointers doesnot correspond to a top-level Dial group (i.e., has a non-NULL parentpointer 1233), the process terminates at block 1736 with an errorcondition.

In response to a determination at block 1734 that each of the DIDSs 1202referenced by the result pointers corresponds to a top-level Dial group,the process passes to blocks 1738-1740. Block 1738 illustratesconfiguration API 1406 locating all of the top-level Dial instanceswithin each Dial group for which the corresponding DIDS 1202 isreferenced by a result pointer. Then, as depicted at block 1740, theconfiguration API 1406 determines whether or not the specified value towhich each top-level Dial instance is to be set is one of the valuesspecified in the mapping table 1224 of the corresponding DDDS 1200. Ifnot, the process terminates with an error at block 1736.

In the illustrated embodiment, the prevalidation steps illustrated atblocks 1734, 1738 and 1740 are performed prior to setting any Dialinstances because it is deemed preferable to implement setting a Dialgroup instance as an atomic operation that either successfully sets allrelevant top-level Dial instances or completely fails. In this manner, acomplex condition in which some top-level Dial instances within the Dialgroup instance are set and others are not can be avoided.

In response to a determination at block 1740 that the specified value towhich each top-level Dial instance is to be set is one of the legalvalues, the process enters a loop including blocks 1750-1756 in whicheach result pointer is processed to set the top-level Dial instance(s)belonging to each Dial group instance.

At block 1750, the configuration API 1406 determines whether or not allresult pointers have been processed. If so, the process terminates atblock 1760. If, however, additional result pointers remain to beprocessed, the next result pointer to be processed is selected at block1752. Next, at block 1754, configuration API 1406 propagates the Dialsetting specified for each top-level Dial in the set_Dial group( ) APIcall down the Dial trees of the top-level Dial instances belonging tothe Dial group instance corresponding to the DIDS 1202 referenced by thecurrent result pointer. The propagation of Dial settings down the Dialtrees is performed in the same manner discussed above with reference toblock 1714 of FIG. 17A. As shown at block 1756, as each latch value fora configuration latch is determined, the configuration API 1406 makes acall to PUTFAC( ) API 1414 to set the configuration latch in simulationmodel 1400 to the determined value utilizing the latch name specifiedwithin the latch name field 1244 of the corresponding latch datastructure 1204. Thereafter, the process returns to block 1750, whichrepresents the processing of the top-level Dial corresponding to thenext result pointer, if any.

With reference now to FIG. 18, there is illustrated a high level logicalflowchart of an exemplary method of setting Dial and Dial groupinstances in batch mode in accordance with the present invention. Asillustrated, the process begins at block 1800 and thereafter proceeds toblock 1802, which illustrates RTX 1420 initializing configurationdatabase 1404 by calling a configuration API 1406 (e.g., start_batch ()) in order to initialize configuration database 1404. The start_batch() API routine initializes configuration database 1404, for example, bysetting each Dial set field 1239 and latch set field 1248 inconfiguration database 1404 to FALSE. By resetting all of the “set”fields in configuration database 1404, the Dials and configurationlatches that are not set by the current batch mode call sequence can beeasily detected, as discussed below.

Following initialization of configuration database 1404, RTX 1420 issuesa batch mode set_Dial( ) or set_Dial_group( ) API call to enter settingsfor Dial instances and their underlying configuration latches intoconfiguration database 1404. A configuration API 1406 responds to theAPI call in the same manner described above with respect to FIG. 17A(for setting Dial instances) or FIG. 17B (for setting Dial groupinstances), with two exceptions. First, when any top-level orlower-level Dial instances are set, whether as a result of a set_Dial( )or set_Dial_group( ) API call, the Dial set field 1239 of thecorresponding DIDS 1202 is set to TRUE. Second, no latch values arewritten to simulation model 1400 by the “set” API routines, asillustrated at blocks 1716 and 1756 of FIGS. 17A-17B. Instead, the latchvalues are written into latch value fields 1246 of the latch datastructure 1204 corresponding to each affected configuration latch, andthe latch set field 1248 is updated to TRUE. In this manner, the Dialinstances and configuration latches that are explicitly set by the APIcall can be readily identified during subsequent processing.

Following block 1804, the process passes to blocks 1806-1808, whichillustrate RTX 1420 calling an end_batch( ) API routine amongconfiguration APIs 1406 to complete the batch mode access. Asillustrated at block 1806, the end_batch( ) API routine first appliesdefault values, if any, to any Dial instances not explicitly set atblock 1804, if a default mode is enabled (e.g., through a parameter ofthe end_batch( ) API call or an operational parameter of RTX 1420). Toapply default values, the end_batch( ) API routine locates all unsettop-level Dial instances (i.e., those for which Dial set field 1239 isFALSE) in configuration database 1404 and applies the default value, ifany, specified in the default field 1229 of the associated DDDS 1200.These default values are propagated down the Dial tree of each affectedtop-level Dial and utilized to set latch value fields 1246, Dial setfield 1239 and latch set field 1248 in the manner described above withreference to block 1804. The end_batch( ) API routine then traverses theDial tree of each top-level CDial that remains unset following theapplication of default values to top-level Dials and applies the defaultvalue of the next highest-level Dial instance in each branch of the Dialtree that has a specified default value. Again, these default values arepropagated down the Dial tree of each affected lower-level Dial andutilized to set latch value fields 1246, Dial set field 1239 and latchset field 1248 in the manner described above with reference to block1804. This methodology of applying default values allows default valueshigher in a Dial tree to have precedence over default values lower inthe Dial tree.

After default values have been optionally applied as illustrated atblock 1806, the end_batch( ) API routine utilizes latch pointer array1210 to examine each latch data structure 1204 in configuration database1404. For each latch data structure 1204 in which latch set field 1248has the value TRUE, the end batch( ) API routine issues a call toPUTFAC( ) API 1414 of simulator 1410 to update simulation model 1400with the latch value contained in latch value field 1246. Thereafter,the batch process terminates at block 1810.

Configuration APIs 1406 preferably further include a find_unset_latch( )API that, following a batch mode setting of Dial or Dial group instancesin configuration database 1404, audits all of the latch data structures1204 in configuration database 1204 by reference to latch pointer array1210 in order to detect configuration latches that have not beenconfigured by an explicit or default setting (i.e., those having latchset field 1248 set to FALSE). For each such unset configuration latch,the find_unset_latch( ) API preferably returns the fully qualifiedinstance name of the configuration latch from latch name field 1244 inthe corresponding latch data structure 1204 and the fully qualifiedinstantiation identifier of the top-level Dial instance that controlsthe unset latch. The find_unset_latch( ) API thus provides an automatedmechanism for a user to verify that all Dial and latch instancesrequiring an explicit or default setting are properly configured for asimulation run.

Configuration APIs 1406 preferably further include a check_model( ) APIthat, when called, utilizes top-level pointer array 1206 to verify byreference to the appropriate mapping tables 1224 that each top-levelCDial and LDial instance in simulation model 1400 is set to one of itslegal values. Any top-level LDial or CDial set to an illegal value isreturned by the check_model( ) API.

The Dial and Dial group primitives introduced by the present inventioncan be employed not only to configure a simulation model of a digitaldesign as described above, but also to configure hardware realizationsof the digital design for laboratory testing and customer use. Inaccordance with an important aspect of the present invention, hardwarerealizations of the digital design are configured by reference to ahardware configuration database, which like configuration databases 814and 1404 discussed above, is derived from configuration specificationstatements coded by the designers. In this manner, continuity inconfiguration methodology exists from design, through simulation andlaboratory testing, to commercial deployment of a digital design.

Referring now to FIG. 19, there is illustrated a high-level blockdiagram of a laboratory testing system for testing and debugginghardware realizations of one or more digital designs in accordance withan embodiment of the present invention. As illustrated, the laboratorytesting system 1900 includes a data processing system 1902, which isintended for commercial sale and deployment. For laboratory testing anddebugging, data processing system 1902 is coupled by a test interface1903 to a workstation computer 1904 that communicates with dataprocessing system 1902 via test interface 1903 to configure the variouscomponents of data processing system 1902 for proper operation. Whencommercially deployed, data processing system 1902 includes theillustrated components, but is not typically coupled to workstationcomputer 1904 by test interface 1903.

Data processing system 1902 may be, for example, a multiprocessorcomputer system, such as data processing system 6 of FIG. 1. As such,data processing system 1902 includes multiple integrated circuit chips1910 representing the various processing units, controllers, bridges andother components of a data processing system. As is typical ofcommercial data processing systems, data processing system 1902 maycontain multiple instances of some integrated circuit chips, such asintegrated circuit chips 1910 a, and single instances of otherintegrated circuit chips, such as integrated circuit chip 1910 n.

In addition to their respective functional logic, integrated circuitchips 1910 each have a respective test port controller 1912 thatsupports external configuration of the integrated circuit chip utilizingmultiple scan chains, as discussed in detail below with reference toFIG. 20. To permit such external configuration, each test portcontroller 1912 is coupled by a test access port (TAP) 1914 to a serviceprocessor 1920 within data processing system 1902.

Service processor 1920 is a general-purpose or special-purpose computersystem utilized to initialize and configure data processing system 1902,for example, at power-on or in response to a reboot. Service processor1920 includes at least one processing unit 1922 a for executing softwareinstructions, a flash read-only memory (ROM) 1924 providing non-volatilestorage for software and data, an I/O interface 1926 a interfacingservice processor 1920 with test port controllers 1912 and workstationcomputer 1904, and a volatile memory 1928 a that buffers instructionsand data for access by processing unit 1922 a.

Among the software and data stored in flash ROM 1924 is system firmware1930 a. System firmware 1930 a is executed by processing unit 1922 a ofservice processor 1920 at power-on to sequence power to integratedcircuit chips 1910, perform various initialization procedures and tests,synchronize communication between integrated circuit chips 1910, andinitiate operation of the functional clocks. System firmware 1930 acontrols the startup behavior of integrated circuit chips 1910 bycommunication via test access ports 1914.

In addition to system firmware 1930 a, flash ROM 1924 stores hardware(HW) configuration APIs 1934 a and a HW configuration database 1932 adescribing integrated circuit chips 1910. As described below, duringcommercial deployment, processing unit 1922 a calls various HWconfiguration APIs 1934 a to access HW configuration database 1932 a inorder to appropriately configure integrated circuits 1910 via I/Ointerface 1926 a and TAPs 1914.

Workstation computer 1904, which may be implemented, for example, as amultiprocessor computer system like data processing system 6 of FIG. 1,includes many components that are functionally similar to those ofservice processor 1920. Accordingly, like reference numerals designateprocessing unit 1922 b, volatile memory 1928 b, I/O interface 1926 b,and the system firmware 1930 b, HW configuration database 1932 b, and HWconfiguration APIs 1934 b residing in non-volatile storage 1940 (e.g.,disk storage). It will be appreciated by those skilled in the art that,because the system firmware 1930 b, HW configuration database 1932 b andHW configuration APIs 1934 b residing in non-volatile storage 1940 arespecifically designed to initialize and configure data processing system1902 in the context of laboratory testing and debugging, they may havesmaller, larger or simply different feature sets and capabilities thanthe corresponding software and data within flash ROM 1924.

During laboratory testing and debugging, workstation computer 1904assumes most of the functions of service processor 1920. For example,workstation computer 1904 initializes and configures data processingsystem 1902 by executing system firmware 1930 b and various HWconfiguration APIs 1934 b in order to generate various I/O commands.These I/O commands are then communicated to data processing system 1902via test interface 1903 and I/O interfaces 1926 a and 1926 b. Systemfirmware 1930 a, which executes within service processor 1920 in a“bypass mode” in which most of its native functionality is disabled,responds to these external I/O commands by issuing them to integratedcircuit chips 1910 via test access ports 1914 in order to initialize andconfigure integrated circuit chips 1910.

With reference now to FIG. 20, there is illustrated a more detailedblock diagram of an exemplary integrated circuit chip 1910 in accordancewith the present invention. As noted above, integrated circuit chip 1910includes a test port controller 2000 supporting external communicationwith I/O interface 1926 of service processor 1920 of FIG. 19 and controlof various internal functions of integrated circuit chip 1910, includingthe operation of functional clock 2002 and scan clock 2010. Integratedcircuit chip 1910 further includes functional logic (not explicitlyillustrated) comprising the digital integrated circuitry that performsthe “work” the integrated circuit is designed to do, for example,processing software instructions, in response to the clock pulses offunctional clock 2002. Throughout the functional logic is distributed aplurality of functional latches 2004 that, during normal functionaloperation of the functional logic (i.e., when functional clock 2002clocks the functional logic), hold bits representing the dynamic stateof the functional logic and data and/or instructions. These functionallatches 2004 include those that hold mode and configuration bitsutilized to configure the functional logic in a desired configuration.

As shown, groups of functional latches 2004 are interconnected to formmultiple test scan chains 2006 and multiple SCOM (scan communication)chains 2008. Although not illustrated for the sake of clarity, somefunctional latches 2004 are, in practice, members of both a test scanchain 2006 and an SCOM chain 2008. The test scan chains 2006 areutilized to scan bits into functional latches 2004 in response to pulsesof scan clock 2010, and the SCOM chains 2008 are utilized to scan bitsinto functional latches 2004 in response to pulses of functional clock2002. Functional clock 2002 and scan clock 2010 do not both outputpulses at the same time to prevent a conflict between values loaded intofunctional latches 2004.

As depicted, each functional latch 2004 in a test scan chain 2006includes at least two data inputs, a scan input (scanin) and afunctional input (D_(in)), and two clock inputs, a scan clock input(sclk) and a functional clock input (fclk). Each functional latch 2004further includes at least two data outputs, namely, a scan output(scanout) and a functional output (D_(out)). To form a test scan chain2006, the scan input of a first functional latch 2004 and the scanoutput of a last functional latch 2004 are coupled to test portcontroller 2000, and the scan output of each functional latch 2004 inthe test scan chain 2006 (other than the last) is connected to the scaninput of a next functional latch 2004.

Each functional latch 2004 latches in the data bit present at its scaninand latches out its former value at scanout in response to a pulse ofscan clock 2010 on sclk, and latches in the data bit present at D_(in)and latches out its former value in response to receipt of a pulse offunctional clock 2002 on fclk. Thus, by repeated pulsing of scan clock2010, the functional latches 2004 forming a test scan chain 2006transfer data bits in from and out to test port controller 2000 in a“bit-bucket brigade” fashion, thereby allowing test port controller 2000to read or write one or more functional latches 2004 in a test scanchain 2006.

SCOM chains 2008 are utilized to read and write functional latches 2004when functional clock 2002 is active and scan clock 2010 is inactive.Each SCOM chain 2008 includes multiple sequentially connected SCOM cells2012, the first and last of which are connected to test port controller2000 to permit test port controller 2000 to scan data bits into and outof SCOM cells 2012. As depicted, in the exemplary embodiment, each SCOMcell 2008 contains a functional latch 2004 forming a portion of an “SCOMregister,” as well as a shadow latch 2014 forming a portion of a “shadowregister”. It is preferred if all shadow latches 2014, like functionallatches 2004, also belong to a test scan chain 2006.

As shown, each functional latch 2004 in each SCOM cell 2012 is connectedto an associated multiplexer 2020 having a scan input (scomin) coupledto the output of the corresponding shadow latch 2014 and a data input(D_(in)) coupled by a hold path to the data output (D_(out)) of theassociated functional latch 2004. Multiplexer 2020 selects the data bitpresent at one of data input (D_(in)) and scomin as an input offunctional latch 2004 in response to select signal sel2. Functionallatch 2004 latches the selected data bit in response to functional clockfclk.

Shadow latch 2014 in each SCOM cell 2012 is similarly connected to anassociated multiplexer 2022 having a data input (D_(in)) coupled to thedata output (D_(out)) of functional latch 2004, a hold input coupled bya hold path to the output of shadow latch 2014, and scan input (scomin).In the first SCOM cell 2012, the scan input is connected to test portcontroller 2000, and in the remaining SCOM cells 2012, the scan input isconnected to the output of the shadow latch 2014 in the preceding SCOMcell 2012. The output of the shadow register 2014 of the last SCOM cell2012 in each SCOM chain is connected to test port controller 2000.Multiplexer 2022 selects among the data bits present at its inputs asthe input of the associated shadow latch 2014 in response to selectsignal sell. Shadow latch 2014 latches the selected data bit in responseto functional clock fclk.

The chain of shadow registers is used to read values from and writevalues to the associated SCOM registers. For example, to set an SCOMregister, test port controller 2000 scans a new value into shadowlatches 2014 via the scomin inputs of multiplexers 2022 by assertingappropriate values of selects sell. Once all shadow latches 2014 havebeen loaded, test port controller 2000 controls select inputs sel2 tocause functional registers 2004 to load the values from shadow latches2014. To read a value from the SCOM registers, test port controller 2000drives sell to read the values out of the functional latches 2004 intothe shadow latches 2014 and then scans the values out of the shadowlatches 2014 by asserting appropriate values of selects sell.

In the exemplary embodiment, SCOM chains 2008 employ shadow latches 2014to read and write functional latches 2004 to avoid disrupting the properfunctional operation of integrated circuit chip 1910, or even dataprocessing system 1902. By loading all shadow latches 2014 prior toupdating any functional latches 2004, all functional latches 2004 withina SCOM chain 2008 can be updated at once without disrupting their valuesfor multiple cycles of functional clock 2002. It should be understoodthat the particular implementation of SCOM chains 2008 illustrated inFIG. 20 is not required to practice the present invention, and thatother alternative designs may be employed, including some that do notinclude shadow latches 2014.

Thus, by loading the appropriate values into functional latches 2004 andby appropriate control of functional clock 2002 and scan clock 2010,each test port controller 2000 can initialize and configure itsintegrated circuit chip 1910 in a desired manner based upon inputs fromservice processor 1920 and/or workstation computer 1904.

In order to configure hardware functional latches 2004 in the mannerdescribed above, a HW configuration database 1932 that accounts for thedifferences between simulation and hardware environments must begenerated. In general, the structure and contents of HW configurationdatabase 1932 reflect at least two central differences from theconfiguration database 814 for simulation described above.

The first difference is in the manner in which latches are addressed inhardware. In particular, instead of utilizing a fully qualifiedinstantiation identifier for the configuration latch as in simulation,each hardware functional latch 2004 within a particular integratedcircuit 1910 is addressed and accessed for test scanning by an orderedpair consisting of a scan chain (or ring) identifier specifying aparticular test scan chain 2006 and an offset indicating the latch's bitposition in the test scan chain 2006. Functional latches 2004 withinSCOM rings 2008 are similarly addressed and accessed for SCOM scanningusing a similar ordered pair of (ring identifier, offset), specifying aparticular SCOM chain 2008 and the offset of the corresponding shadowlatch 2014. Importantly, the SCOM ring identifier and offset for aparticular functional latch 2004 do not have the same values as thecorresponding test scan ring identifier and offset. In fact, inalternate SCOM implementations, different SCOM hardware may be used, andthe offset can be expressed as a tuple: (ring ID, register, offset). Itwill therefore be appreciated that functional registers 2004 may beaddressed and accessed utilizing multiple access methods, each of whichmay have its own addressing scheme, all of which will likely differ fromthat employed in simulation.

A second important difference between HW configuration database 1932 andthe configuration database 814 employed in simulation is the overalldatabase structure. As described above, configuration database 814 is amonolithic database that may be utilized to represent an arbitrarilyselected digital design of any size or complexity by nesting designentities hierarchically. A new configuration database 814 is generatedby configuration compiler 808 for each different digital design that issimulated. Although this approach is satisfactory in a simulationenvironment, the monolithic database structure employed in simulationdoes not correspond to the actual physical mechanisms utilized to accessand set hardware latches in a hardware digital design. Moreover, it isdesirable in a laboratory environment to avoid developing an entirelynew system firmware 1930 and HW configuration database 1932 for eachdifferent hardware permutation. For example, it is desirable to minimizedevelopment time and cost by reusing some or all of a particular HWconfiguration database 1932 and system firmware 1930 to initialize andconfigure each server computer in a server product line supportingbetween 8 and 32 processing units and 1 to 4 different memorycontrollers.

Consequently, as described in detail below, HW configuration database1932 is preferably structured as a federation of smaller databases thateach corresponds to a particular type (not instance) of integratedcircuit chip present within the hardware digital design. This databasestructure supports construction of a HW configuration database 1932 fora hardware system of any desired size and complexity from the same“building block” per-chip-type databases. Moreover, this databasestructure reflects the fact that hardware latches are accessed by systemfirmware 1930 on a per-chip basis.

Referring now to FIG. 21, there is depicted a high level flow diagram ofan exemplary process by which the simulation configuration database 814of each integrated circuit chip is transformed to obtain a chip HWdatabase utilized to construct a HW configuration database 1932 suitablefor laboratory testing and debugging and commercial deployment. Theillustrated process may be implemented through the execution of softwareon data processing system 6 of FIG. 1.

The process begins with the execution of a scan chain detection tool2100. Scan chain detection tool 2100 processes the simulation model 1400of each integrated circuit chip 1910 within a target hardware system,such as data processing system 1902, to produce a respective output filecorresponding to each functional latch access path/method for latcheswithin the integrated circuit chip 1910. For example, in the exemplaryembodiment, scan chain detection tool 2100 generates a test scandefinition file 2104 corresponding to test scanning and a SCOMdefinition file 2102 corresponding to SCOM scanning. Each of these files2102, 2104 provides, for latches within simulation model 1400, acorrespondence between the latch's scan ring identifier and offset (orother hardware address for the associated access method) and its fullyqualified latch instance name for simulation purposes.

The test scan definition file 2104 and SCOM definition file 2102 and thesimulation configuration database 814 for the integrated circuit chipare then processed by a database transformation tool 2106 to generate achip HW database 2108 that can be utilized as a building block to obtaina HW configuration database 1932 for a hardware system of any arbitrarysystem size and component list.

With reference now to FIG. 22A, there is illustrated a high levellogical flowchart of an exemplary process by which databasetransformation tool 2106 generates a chip HW database 2108 from thecorresponding simulation configuration database 814 for the integratedcircuit chip by reference to test scan definition file 2104 and SCOMdefinition file 2102. As illustrated, the process begins at block 2200and then proceeds to block 2201, which illustrates loading thesimulation configuration database 814 from non-volatile data storageinto volatile memory and augmenting its fields in the manner discussedabove with respect to FIG. 13 to obtain an expanded configurationdatabase 1404. Test scan definition file 2104 and SCOM definition file2102 are also loaded into volatile memory.

Next, at block 2202, a determination is made whether or not all latchdata structures 1204 referenced by latch pointer array 1210 have beenprocessed. If so, the process terminates at block 2204. However, if alllatch data structures 1204 have not yet been processed, the processpasses from block 2202 to block 2206, which illustrates the selectionfor processing of the latch data structure 1204 pointed to by the nextlatch pointer 1254 in latch pointer array 1210. Next, at block 2208, thefully qualified latch name of the latch corresponding to the latch datastructure 1204 under consideration is formed by using the parent pointer1242 to access the contents of instance name field 1234 of the Dialinstance controlling the latch and appending those contents to thecontents of latch name field 1244.

Test scan definition file 2104 is then searched for this fully qualifiedlatch name, as depicted at block 2210. If the fully qualified latch nameis not found within test scan definition file 2104, an error is flaggedat block 2212 because, in the exemplary embodiment, all configurablelatches must be scannable. Otherwise, database transformation tool 2106calls the API routine add_access_method(method_id, method_name) at block2214 to augment latch data structure 1204 to form a new latch datastructure 2230. The method_id parameter of the API calls identifies aparticular access method (e.g., with a string or integer), and themethod_name parameter specifies a “name” utilized by the associatedaccess method to access, in hardware, the latch corresponding to the newlatch data structure 2230. As illustrated in FIG. 22B, the new latchdata structure 2230 is created at block 2214 by adding to latch datastructure 1204 a method ID field 2232 a specifying a method identifierof this access method (which is “0” by convention) and a method namefield 2234 a specifying a test scan ring identifier and offset value forthe latch.

The process proceeds from block 2214 to block 2216, which representsrepeating the search for the fully qualified latch instance nameperformed at block 2210 using the definition file for the next accessmethod, in this case, SCOM definition file 2102. If no match for thefully qualified latch instance name is found within SCOM definition file2102, no error is logged because not all latches belong to SCOM chains,and the process simply passes to block 2220, which is described below.If, on the other hand, a match is found, the add_access_method( ) APIroutine is again called at block 2218 to augment latch data structure2230 with a method ID field 2232 n specifying the method identifier ofthis access method and a method name field 2234 n specifying a SCOM scanring identifier and offset value for the latch.

Finally, at block 2220, the API routine delete_latch_name( ) is calledto delete latch name field 1244 from latch data structure 2230. Latchname field 1244 is no longer needed because a ring identifier and offsetpair uniquely identifies any latch within the integrated circuit chip1910. The process then returns to block 2202, which has been described.

The method of FIG. 22A thus alters the simulation configuration databaseof each integrated circuit chip to include information indicating theaccess methods available for each hardware functional latch and the“method name” (i.e., identifier) of the latch for each available accessmethod. Although the illustrated process depicts the modification of asimulation configuration database to support two particular accessmethods, the illustrated method can be employed to handle any number ortypes of access methods.

Once all of the simulation configuration databases for each integratedcircuit in a system have been processed in the manner illustrated inFIGS. 21 and 22A, the resulting chip hardware databases 2108 can then becombined to form HW configuration database 1932 illustrated in FIG. 19.In a preferred embodiment, HW configuration database 1932 is constructedfrom chip HW databases 2108 by creating a chip pointer data structure2320 (FIG. 23B) that contains a respective chip database pointer 2322referencing the chip HW database 2108 of each type of chip in dataprocessing system 1902. For example, if data processing system 1902includes 32 identical integrated circuit processor chips, chip pointerdata structure 2320 will contain (in addition to other chip databasepointers 2322 corresponding to other types of integrated circuit chips)only one chip database pointer 2322 to a single chip HW database 2108describing the digital design embodied by the 32 integrated circuitprocessor chips. This HW configuration database 1932 is then stored innon-volatile storage, such as non-volatile storage 1940 or flash ROM1924, as shown in FIG. 19.

In order to configure a hardware digital design utilizing a HWconfiguration database 1932, the HW configuration database 1932 is firstloaded from non-volatile storage into volatile memory in accordance withthe exemplary process depicted in FIG. 23A. The process shown in FIG.23A may be performed, for example, in a laboratory environment byworkstation computer 1904 through the execution of system firmware 1930b by processing unit 1922 b. Similarly, when data processing system 1902is deployed commercially, service processor 1920 executes systemfirmware 1930 a according to the process of FIG. 23A to load HWconfiguration database 1932 a from flash ROM 1924 to volatile memory1928 a.

As illustrated, the process of FIG. 23A begins at block 2300 and thenproceeds to block 2302, which illustrates a determination of the typesof integrated circuit chips and number of each type present within atarget data processing system, such as data processing system 1902. Inan exemplary embodiment, the determination illustrated at block 2302 ismade by system firmware 1930, which consults a set of so-called VitalProduct Data (VPD) to determine which of the thousands of possiblemachine configuration is represented by data processing system 1902.

The process then proceeds to blocks 2306-2310, which collectively form aloop in which chip pointer data structure 2320 is walked to process thechip HW databases 2108 of the integrated circuit chips comprising dataprocessing system 1902. First, at block 2306 a determination is madewhether the chip HW database 2108 of each type of integrated circuitchip within data processing system 1902 has been processed. If so,loading of HW configuration database 1932 into volatile memory iscomplete, and the process terminates at block 2312. If, however, thechip HW database 2108 corresponding to each type of integrated circuitchip identified by the VPD has not been processed, a next chip HWdatabase 2108 is loaded into volatile memory 1928 of workstation 1904for processing at block 2308.

As shown in FIG. 23B, which depicts an in-memory view of HWconfiguration database 1932, loading of the chip HW database 2108creates in-memory data structures as described above, such as a Dialpointer array 1208, latch pointer array 1210, and an instance pointerarray 1226 within each DDDS 1200 (see FIG. 12). In addition, a latchvalue field 2324 and a latch set field 2326 are created within eachlatch data structure 2230, and a Dial set field 2328 is created withineach DIDS 1202. Each of these three fields is implemented as an array inwhich each entry corresponds to a particular instance of the integratedcircuit chip 1910 corresponding to the current chip HW database 2108.Finally, an empty chip mapping table 2325 is created.

Next at block 2310, a respective entry is added to chip mapping table2325 for each instance of the type of integrated circuit chipcorresponding to the current chip HW database 2108. This step ispreferably performed by system firmware 1930 via a call to a HWconfiguration API 1934 that accesses the VPD to determine how manyinstances of the type of integrated circuit chip corresponding to thecurrent chip HW database 2108 are contained in the present hardwaredigital design. By convention, the order of the entries within chipmapping table 2325 corresponds to the order of array entries in Dial setfield 2328, latch value field 2324 and latch set field 2326.

As shown in FIG. 23B, each entry within chip mapping table 2325associates two firmware-supplied values: (1) a chip instance name, whichis a string like that identifying the design entity representing theintegrated circuit chip instance in the simulation model of dataprocessing system 1902 (e.g., a.b.c.d) and (2) a chip ID specifying anidentifier of the test access port 1914 by which service processor 1920communicates with that integrated circuit chip instance. Thus, any latchin data processing system 1902 can now be readily addressed by the tuple(chip ID, scan ring, offset), which is associated by chip mapping table2325 with the chip-identifying portion of the fully qualified latch nameemployed by HW configuration APIs 1934. Thereafter, the process returnsto block 2306, which has been described.

The process depicted in FIG. 23A thus permits a single HW configurationdatabase 1932 to be utilized to build an in-memory HW configurationdatabase for a data processing system of any arbitrary size orconfiguration, eliminating the need to develop and store a separatemonolithic configuration database for each possible system size andconfiguration.

With HW configuration database 1932 loaded into a volatile memory 1928,system firmware 1930 can then be executed by processing unit 1922 a ofservice processor 1920 or processing unit 1922 b of workstation computer1904 to call HW configuration APIs 1934 to read or set a configurationof one or more integrated circuit chips 1910 of data processing system1902. As in simulation, HW configuration APIs 1934 preferably includeseparate API routines to read Dials and Dial groups in interactive andbatch modes. Also like simulation, the API calls by system firmware 1930specify an instance qualifier (e.g., a.b.c.d or a.b.c.[X]) and adialname qualifier (e.g., Entity.dialname) for each Dial or Dial groupinstance to be set or read.

Because multiple access methods can be utilized to set or read a Dial orDial group, API calls to set or read a Dial or Dial group instancepreferably include an additional parameter, access_method. In apreferred embodiment, the access_method parameter can take the valuesSCAN, which indicates test scanning, SCOM, which indicates SCOMscanning, and AUTO, which indicates that the HW configuration API 1934is to select the access method. In response to an AUTO value for theaccess_method parameter, a HW configuration API 1934 selects an accessmethod based upon the supported access method(s) indicated by the methodID(s) 2232 in the latch data structure(s) 2230 targeted by the API calland upon which of functional clock 2002 and scan clock 2010 is running.As described above, SCOM scanning is only available when functionalclock 2002 is running, and test scanning is only available when scanclock 2010 is running.

Before any HW configuration API 1934 can set or read a Dial or Dialgroup instance, the HW configuration API 1934 must first determine whichDial or Dial group instances are identified by the instance qualifierand dialname qualifier specified in the API call. Referring now to FIG.24 there is depicted a high level logical flowchart of an exemplaryprocess by which a HW configuration API 1934 locates particular Dial orDial group instances in HW configuration database 1932 in accordancewith the present invention. The illustrated process is analogous to theprocess depicted in FIG. 15 and described above.

As shown, the process begins at block 2400 in response to receipt by aHW configuration API 1934 of an API call from firmware 1930 having as anargument an instance qualifier and a dialname qualifier of one or moreDial or Dial group instances, as discussed above. In response to the APIcall, the configuration API 1934 enters HW configuration database 1932at chip pointer array 2320 and, as depicted at block 2402, enters a loopin which chip database pointers 2322 are processed until one or morematching Dial instances are located within a particular chip HW database2108 or until all chip database pointers 2322 have been processed. Inresponse to a determination at block 2402 that all chip databasepointers 2322 have been processed without locating any matching Dialinstances, the process terminates with an error at block 2403. However,if fewer than all of chip database pointers 2322 have been processed,the next chip database pointer 2322 is selected from chip pointer datastructure 2320 for processing, as depicted at block 2406. The selectedchip database pointer 2322 is utilized to locate the associated chip HWdatabase 2108.

Following block 2406, the process proceeds to block 2408 and followingblocks, which represent a processing loop in which each Dial pointer1252 in the Dial pointer array 1208 of the current chip HW database 2108is processed until a particular Dial matching the API call is located oruntil all Dial pointers 1252 (FIG. 12) have been processed withoutfinding any matching Dial instances. In response to a determination atblock 2408 that all Dial pointers 1252 have been processed withoutlocating any matching Dial entity, the process returns from block 2408to block 2402 in order to process the next chip database pointer 2322 inchip pointer array 2320 (i.e., to process the next chip HW database2108). If, on the other hand, a determination is made at block 2408 thatnot all Dial pointers 1252 within Dial pointer array 1208 have beenprocessed, the process proceeds to block 2410, which illustrates theselection from Dial pointer array 1208 of the next Dial pointer 1252 forprocessing.

Next, a determination is made at block 2412 of whether or not the DDDS1200 referenced by the current Dial pointer 1252 has a name field 1222that exactly matches the specified dialname qualifier. With respect toname fields 1222, two implementations are possible. First, reuse of Dialnames can be prohibited so that every Dial name is unique throughout notonly its own integrated circuit chip, but also throughout the entiresystem (e.g., data processing system 1902). A second, less restrictiveapproach is to require each Dial name to be unique only within itsintegrated circuit chip 1910 and to permit multiple uses of a Dial namein different integrated circuits. In order to support the secondapproach, name field 1222 takes the form “chiptype.Dial name”, where“chiptype” is a unique string identifying the type of integrated circuitchip 1910, thus disambiguating identical Dial names applied to Dialentities instantiated in different integrated circuit chips 1910.

In response to a determination at block 2412 that name field 1222 doesnot match the specified dialname qualifier, the process returns to block2408 for processing of the next Dial pointer 1252, if any, as describedabove. If, however, a match is found, the process then enters aprocessing loop comprising blocks 2420-2434 in which the Dial instancesrepresented by individual DIDS 1202 are examined for a match with theAPI call's instance qualifier utilizing the instance pointers 1228 inthe instance pointer array 1226 of the DDDS 1200 of the matching Dialentity. In this processing loop, a determination is first made at block2420 of whether or not all instance pointers 1228 within the currentDDDS 1200 have been processed. If so, a further determination is made atblock 2434 of whether or not at least one matching instance of the Dialentity corresponding to the current DDDS 1200 was found. Thisdetermination is made because the construction of HW configurationdatabase 1932 ensures that at most one matching Dial (not Dial instance)in only one chip HW database 2108 will match the instance qualifier anddialname qualifier specified in the API call. Consequently, if amatching instance is found for a particular Dial entity, no further Dialentities or chip HW databases 2108 need be searched. Accordingly, if adetermination that at least one matching Dial instance has been foundfor the Dial entity corresponding to the current DDDS 1200, the processpasses from block 2434 to block 2438 and terminates. If, however, adetermination is made at block 2434 that no match was found, the processpasses through page connector A and terminates with an error at block2403.

Returning to block 2420, in response to a determination that allinstance pointers 1228 of the current DDDS 1200 have not been processed,the process proceeds to block 2422, which illustrates the selection ofthe next instance pointer 1228 and its associated DIDS 1202 forprocessing. A determination is then made at block 2424 whether the DIDS1202 has been processed with respect to the Dial instance in each of theintegrated circuit chips 1910 corresponding to the current chip HWdatabase 2108 by processing each entry in chip mapping table 2326. Ifso, the process passes to block 2436, which is described below. Ifprocessing of all entries in chip mapping table 2325 has not beencompleted, the process proceeds to block 2426. Block 2426 depictsforming the next fully qualified Dial instance name to be matchedagainst the instance qualifier specified in the API call by prependingthe chip instance name in the next entry of chip mapping table 2325 tothe instance name field 1234 of the current DIDS 1202. This fullyqualified Dial instance name is then compared to the instance qualifierat block 2430. If they do not match, the process returns to block 2424,which has been described. If they do match, a temporary result pointerand associated chip vector are created at block 2432, if they do notalready exist. The temporary result pointer points to the current DIDS1202 to identify the corresponding Dial instance as matching theinstance qualifier specified in the access request. An entry is alsoplaced in the associated chip vector to indicate the particularintegrated circuit chip instance 1910 in which this matching Dialinstance is located. In an exemplary embodiment, the chip vector maysimply comprise a same number of bits as there are entries in chipmapping table 2325, with a bit value of “1” indicating that thecorresponding integrated circuit chip instance 1910 contains a matchingDial instance. Following block 2432, the process returns to block 2424.

The processing loop represented by blocks 2424-2432 is repeated for eachentry in chip mapping table 2325. After all entries have been processed,the process passes from block 2424 to block 2436, which depicts adetermination of whether the dialname qualifier was specified utilizingnon-bracketed syntax and, if so, whether or not a match was found forthe specified dialname qualifier among the Dial instances represented bythe current DIDS 1202. If the determination is negative, it is possiblethat additional matching Dial instances associated with another DIDS1202 may exist. Accordingly, the process returns to block 2420 toprocess the next instance pointer 1228 of the current DDDS 1200. If,however, the determination at block 2436 is positive, it is known thatall matching Dial instances have been located and identified withtemporary result pointers and associated chip vectors. The processtherefore terminates at block 2438.

After the Dial or Dial group instances specified by the instancequalifier and dialname qualifier have been determined by the processshown in FIG. 24, the Dial or Dial group instance(s) are set or read inmuch the same fashion as described above with respect to FIGS. 16A(reading a Dial instance in interactive mode), 16B (reading a Dial groupinstance in interactive mode), 17A (setting a Dial instance ininteractive mode), 17B (setting a Dial group instance in interactivemode) and 18 (setting a Dial instance or Dial group instance in batchmode). A few differences are required, however, to account for the useof a single chip HW database 2108 to represent possibly multipleintegrated circuit chips 1910 and for the availability of multipledifferent access methods to access integrated circuit chips 1910. Thesedifferences are detailed below.

When reading Dial instances or Dial group instances, latch values areverified by propagating the latch values “up” the Dial trees in theconfiguration database, as described with reference to block 1624 ofFIG. 16A. Conversely, when setting Dial instances or Dial groupinstances, Dial values are propagated “down” the Dial trees in theconfiguration database to the latch data structures, as described abovewith reference to block 1714 of FIG. 17A. In simulation, only one latchvalue at a time is propagated “down” to or “up” from any one latch datastructure 1204. However, because HW configuration database 1932represents multiple integrated circuit chips 1910 of the same type witha single chip HW database 2108, reading or setting a Dial or Dial groupinstance by reference to a chip HW database 2108 representing multiplephysical integrated circuit chips 1910 entails propagating multipleelements of a value set up or down the Dial tree in parallel, where eachelement of the value set is the value for a particular chip instanceidentified by the temporary result pointer and chip vector constructedin FIG. 24.

Similarly, in simulation, each of Dial set field 1239, latch value field1246, and latch set field 1248 within configuration database 1404contains only a single value. In contrast, the corresponding Dial setfields 2328, latch value fields 2324, and latch set fields 2326 withinHW configuration database 1932 are implemented as arrays in which eachelement corresponds to an individual Dial or latch instance for aparticular integrated circuit chip 1910. Accordingly, when Dial, Dialgroup and latch instances are set, the elements within Dial set fields2328, latch value fields 2324, and latch set fields 2326 correspondingto the set instances are updated in accordance with the temporary resultpointer and chip vector constructed in FIG. 24.

Because laboratory or commercial use of HW configuration database 1932entails accessing physical hardware (i.e., integrated circuit chips1910) utilizing multiple possible access methods, three additionaldifferences from a simulation environment are noted in a preferredembodiment. First, a set or read operation requested in an API callpreferably fails (i.e., is not performed) if a HW configuration API 1934determines that the access method indicated by the access_methodparameter contained within the API call is not available for any of theDial instances identified by the temporary result pointer(s) and chipvector(s) obtained by the process of FIG. 24. As described above, theaccess method(s) by which each latch can be set or read is indicated bythe method ID field(s) 2232 of each latch data structure 2230.

Second, a set or read operation requested in an API call preferablysucceeds only if a HW configuration API 1934 determines that thefunctional clock 2002 and scan clock 2010 within each integrated circuitchip 1910 targeted by the API call are in the appropriate states for theaccess_method parameter contained within the API call. That is, if theaccess_method parameter has the value SCAN, the functional clock 2002must be disabled, and the scan clock 2010 must be enabled. Conversely,if the access_method parameter has the value SCOM, the functional clock2002 must be enabled, and the scan clock 2010 must be disabled. If theaccess_method parameter has the value AUTO, the functional clock 2002and scan clock 2010 of each integrated circuit chip 1910 containing alatch targeted by the API call must be in states that permit at leastone access method of each such latch to be employed.

Third, the HW configuration APIs 1934 utilized to read and set hardwarelatches, read_latch( ) and write_latch( ), preferably minimize scanaccesses to integrated circuit chips 1910 by implementing shadow scanchain buffers in volatile memory 1928 and by accessing such scan chainbuffers when possible in lieu of scanning a scan chain in an integratedcircuit chip 1910. For example, the read_latch( ) HW configuration API1934, which corresponds to the GETFAC( ) API 1412 employed insimulation, preferably obtains latch value(s) from the correspondingshadow scan chain buffers in volatile memory 1928 in cases in which thelatch value(s) in volatile memory 1928 are known to be current. Inaddition, multiple updates to latch values via the write_latch( ) API,which corresponds to the PUTFAC( ) API 1414 utilized in simulation, arepreferably buffered in the shadow scan chain buffers in volatile memory1928. In this manner, multiple writes to latches in a particular scanchain of an integrated circuit chip 1910 can be made by scanning theparticular scan chain only once.

HW configuration APIs 1934 preferably further include a check_chip( )API similar to the check_model( ) API available in simulation. Whencalled, the check_chip( ) API utilizes top-level pointer array 1206within a specified chip HW database 2108 to verify that each top-levelCDial and LDial instance within the chip HW database 2108 is set to oneof its legal values. Specifically, the check_chip( ) API propagates theunderlying hardware latch values up the Dial tree of each top-levelCDial and LDial instance by reference to its mapping table 1224 and themapping table(s) 1224 of any lower-level Dial instance(s) in its Dialtree. Any top-level LDial or CDial instance set to an illegal value isreturned by the check_chip( ) API.

Referring again to FIG. 19, in many commercial embodiments of dataprocessing system 1902, the storage capacity of non-volatile storage(e.g., flash ROM 1924) within service processor 1920 is significantlyless than that of the non-volatile storage 1940 (e.g., hard diskstorage) of the workstation computer 1904 utilized to store systemfirmware 1930 b and HW configuration database 1932 b. Accordingly, it isusually desirable or necessary to reduce the size of the system firmware1930 b and HW configuration database 1932 b developed in a laboratoryhardware testing environment to obtain the system firmware 1930 a and HWconfiguration database 1932 a commercially deployed within flash ROM1924 (or other non-volatile storage) of data processing system 1902.

Accordingly, with reference now to FIG. 25, there is illustrated a highlevel logical flow diagram of an exemplary process by which each chip HWdatabase 2108 developed during laboratory development and testing ofsystem firmware 1930 can be compressed through the elimination ofunnecessary information in order to obtain a HW configuration database1932 a suitable for commercial deployment. The process begins bygenerating Dial usage information 2500 indicating which Dial instanceswithin a particular type of integrated circuit chip 1910 have been setand/or read and the values to which Dial instances have been set.

The determination of which Dial instances are set or read and the valuesto which Dial instances have been set can be accomplished in a number ofways well known to those skilled in the art. For example, systemfirmware 1930 can be manually examined to generate Dial usageinformation 2500. Alternatively, system firmware 1930 can be executed ina number of possible machine configurations that cover all the settingsto which Dial instances in the type of integrated circuit chip 1910under consideration may be set. The Dial instances that are set and readand the values to which Dial instances are set can then be logged asDial usage information 2500.

In a preferred embodiment, all that is recorded within Dial usageinformation 2500 for IDial instances is whether or not the IDialinstance is set or read. No IDial instance values are recorded becauseit is assumed, for purposes of generating Dial usage information 2500,that if an IDial instance is set, all of its possible values may beutilized. There are, however, particular IDial instances that developersknow will only be set to a single value. To permit the elimination ofthese IDials from HW configuration database 1932 a, these IDials andtheir associated values can optionally be specified by a developerwithin an override file 2502. Override file 2502 may also contain a listof Dial instances, if any, that the developer desires to explicitlypreserve within HW configuration database 1932 a, regardless of whetheror not the Dial instance is read or set.

Thus, for each chip HW database 2108, Dial usage information 2500 andoverride file 2502 are preferably obtained that collectively contain atleast the following information:

-   -   1) a list of all the top-level non-IDial instances set within        any of the instances of the integrated circuit chip in any        configuration and a list of any top-level IDials set to any        value within any of the instances of the integrated circuit chip        in any configuration;    -   2) a list of all the values of each non-IDial instance that is        set;    -   3) a separate list of IDials set to a single value; and    -   4) a list of all Dial instances that are read.

As further illustrated in FIG. 25, this information is then utilized bya software compression tool 2504 (e.g., executed by workstation computer1904) to eliminate unnecessary information from the associated chip HWdatabase 2108. Compression tool 2504 produces two outputs: (1) acompressed chip HW database 2506 forming a portion of HW configurationdatabase 1932 a and (2) initial scan chain images 2508 utilized todevelop the scan chain images to which test scan chains 2006 in theintegrated circuit chip 1910 are initialized during execution of systemfirmware 1930 a. As indicated, these initial scan chain images 2508 maybe non-destructively combined with additional scan chain inputs 2510 toobtain final scan chain images 2512.

Referring now to FIGS. 26A-26C, there is depicted a high level logicalflowchart of a method by which compression tool 2504 compresses a chipHW database 2108 in accordance with the present invention. As describedin detail below, the illustrated method implements at least three sizeoptimizations.

First, information related to a Dial instance may be eliminated from achip HW database 2108 if the Dial instance will never be set or read bysystem firmware 1930 a. Because such Dial instances will never be set orread by system firmware 1930 a, the DIDS 1202 corresponding to such Dialinstances will never be referenced within HW configuration database 1932a and may accordingly be removed. It is important to note that the factthat system firmware 1930 a does not set or read a Dial instance doesnot necessarily mean that the Dial instance is not set or read duringsimulation or laboratory debugging. Many Dial instances (e.g. modeSwitches) are never set by system firmware 1930 a, but are tested duringsimulation to ensure that the mode Switches work properly if needed by alater firmware revision.

A second reason that information related to a Dial instance may beunnecessary is if the Dial instance is set to only one value in allconfigurations. In this case, the DIDS 1202 corresponding to the Dialinstance can be removed from chip HW database 2108 because the effectsof setting the Dial instance can instead be achieved by setting thefinal scan chain image 2512 scanned into an integrated circuit chip 1910with the latch value(s) that would be obtained by setting the Dialinstance. The code within system firmware 1930 b that sets the Dialinstance can likewise be eliminated to reduce the size of systemfirmware 1930 a ultimately obtained from laboratory testing anddebugging.

Third, mapping tables 1224 in DDDSs 1200 may be optimized by eliminatingvalues to which Dials are never set by system firmware 1930 a.

In making the foregoing optimizations, special consideration is given toDial instances that are read. In general, when a Dial instance is read,it is assumed in the exemplary compression methodology described belowthat the entire Dial tree containing the Dial instance that is read mustbe preserved within its chip HW database. In addition, it is assumedthat all entries within the mapping tables of Dials in Dial treescontaining Dial instances that are read must be preserved because, incommercial deployment, the hardware may set the underlying latches tovalues other than those read by system firmware. Consequently, it cannotbe determined a priori which mapping table entries will be required toread a Dial instance. Although these assumptions limit compression, theyensure that each Dial instance that is read can be easily accessed,regardless of whether or not the Dial instance is a top-level Dialinstance or a lower-level Dial instance.

Referring first to FIG. 26A, the process begins at block 2600 and thenproceeds to block 2602, which illustrates compression tool 2504 loadinga chip HW database 2108 into volatile memory 1928 b and creatingin-memory data structures 1208, 1210 and 2325, as described above. Inaddition, as depicted at block 2604, compression tool 2504 creates, inassociation with each DIDS 1202, some additional temporary fields inmemory used only by compression tool 2506. These temporary fieldsinclude a Dial Instance Value Structure (DIVS) for storing the values,if any, to which the associated Dial instance is set within Dial usageinformation 2500. For IDial instances, the DIVS is handled specially. Inparticular, the DIVS will either be empty, contain a token indicatingthe IDial instance is set, or, for top-level IDial instances only,contain the single value to which the IDial instance is set, ifapplicable. The temporary fields created for each DIDS 1202 at block2604 also include a Dial Instance Preserve Field (DIPF), which is set toTRUE if the associated DIDS should be preserved (i.e., not deleted fromthe compressed chip HW database) and is set to FALSE otherwise. The DIPFof each DIDS 1202, if any, explicitly listed in override file 2502 as aDIDS to be preserved is initialized to TRUE, and all other DIPFs areinitialized to FALSE.

The process then proceeds from block 2604 to block 2606, whichillustrates compression tool 2504 entering a loop in which eachtop-level pointer 1250 in top-level pointer array 1206 is processed toenter relevant information from Dial usage information 2500 in the DIPFand DIVS of each DIDS 1202. If all top-level pointers 1250 have beenprocessed, the processes passes through page connector B to FIG. 26B,which is described below. If, however, all top-level pointers 1250 havenot yet been processed, the next top-level pointer 1250 within top-levelpointer array 1206 is selected for processing at block 2608.

The process then passes from block 2608 to blocks 2610 and 2612. Block2610 illustrates compression tool 2504 processing each non-IDial in theDial tree headed by the Dial instance corresponding to the DIDS 1202referenced by the current top-level pointer 1250. Compression tool 2504adds to the DIVS of each such DIDS 1202 the values for the correspondingDial instance contained within the Dial usage information 2500. Inaddition, as shown at block 2612, compression tool 2504 processes eachIDial within the Dial tree headed by the Dial instance corresponding tothe DIDS 1202 referenced by the current top-level pointer 1250. For eachsuch IDial, compression tool 2504 adds a set token to the DIVS if Dialusage information 2500 indicates that the IDial has been set.

Next, at block 2614, compression tool 2504 sets the DIPF of every DIDS1202 in the Dial tree headed by the Dial instance corresponding to theDIDS 1202 referenced by the current top-level pointer 1250 if Dial usageinformation 2500 indicates that any Dial in the Dial tree was read. Inother words, each DIPF in the Dial tree is set to TRUE if any Dialinstance in the Dial tree is read. The process then proceeds to block2616, which illustrates compression tool 2504 examining each top-levelIDial, if any, corresponding to the DIDS 1202 referenced by the currenttop-level pointer 1250 to determine whether override file 2502 indicatesthat the IDial is set to only a single value. If so, compression tool2504 adds to the DIVS of those top-level IDials the value containedwithin override file 2502 and removes a set token, if present.

Thereafter, the process returns to block 2606, which illustrates thecontinuation of the processing loop until all top-level pointers 1250within top-level pointer array 1206 have been processed. Once alltop-level pointers 1250 have been processed, the process passes throughpage connector B to FIG. 26B.

With reference now to FIG. 26B, the process proceeds from page connectorB to block 2620, which illustrates a second processing loop in whicheach top-level pointer 1250 within top-level pointer array 1206 isprocessed. If a determination is made at block 2620 that all top-levelpointers 1250 within top-level pointer array 1206 have been processed inthe current processing loop, the process passes through page connector Cand continues in FIG. 26C. Otherwise, the process proceeds to block2622, which depicts the selection of the next top-level pointer 1250within top-level pointer array 1206 for processing.

Following block 2622, the DIVS and DIPF associated with the DIDS 1202referenced by the current top-level pointer 1250 are examined for one ofthree conditions respectively represented by decision blocks 2624, 2630,and 2640. If a determination is made at block 2624 that the DIPF has avalue of TRUE or if type field 1220 in the associated DDDS 1200indicates that the DIDS 1202 corresponds to a Dial group, the processsimply returns from block 2624 to block 2620 for processing of the nexttop-level pointer 1250, if any.

If, however, a determination is made at block 2630 that the DIPFassociated with the DIDS 1202 referenced by the current top-levelpointer 1250 has a value of FALSE and the associated DIVS is empty, thencompression tool 2504 can remove the DIDS 1202 from chip HW database2108 because none of the corresponding Dial instances is set or read.Accordingly, as illustrated at block 2632, compression tool 2504 deletesthe DIDS 1202 from chip HW database 2108, as well as each lower-levelDIDS 1202, if any, in the Dial treeheaded by the deleted top-level DIDS1202. In addition, compression tool 2504 deletes the associatedtop-level pointer 1250 from top-level pointer array 1206, and sets theinstance pointer 1228 pointing to each deleted DIDS 1202 to NULL. Adetermination is then made at block 2634 of whether or not the parentpointer 1233 of the deleted DIDS 1202 was set to NULL. If so, theprocess returns to block 2620, which has been described. If, on theother hand, the parent pointer was not NULL, then the top-level Dialinstance(s) corresponding to the deleted DIDS 1202 belonged to Dialgroup instance(s). Because the top-level Dial instance(s) were never setor read, each such top-level Dial instance may be safely removed fromits respective Dial group instance. Accordingly, as shown at block 2636,compression tool 2504 deletes from the DIDS 1202 corresponding to theDial group instance(s) the output pointer 1238 to the deleted DIDS 1202of the top-level Dial instance. If the deletion of the output pointer1238 from the DIDS 1202 of the Dial group instances removes the lastmember of the Dial group, the DIDS 1202 corresponding to the Dial groupinstance(s) is also deleted from chip HW database 2108. This processcontinues, collapsing hierarchical levels of Dial groups, if possible.Following block 2636, the process returns to block 2620, which has beendescribed.

Returning to block 2640, compression tool 2504 determines whether theDIPF associated with the DIDS 1202 referenced by the current top-levelpointer 1250 has a value of FALSE and the associated DIVS contains asingle value. If not, the process returns to block 2620, which has beendescribed. If so, a further determination is made at block 2642 byreference to parent field 1232 of the DIDS 1202 of whether the Dialinstance belongs to a Dial group. If so, the process preferably returnsto block 2620 without further processing, signifying that the DIDS 1202will be preserved. The DIDS 1202 is preferably preserved becauseoperations setting a Dial group are atomic and will fail if a removedDial instance is referenced in the set_Dial_group( ) API call. Inresponse to a determination at block 2642 that the Dial instancecorresponding to the DIDS 1202 referenced by the top-level pointer 1250does not belong to a Dial group, the process proceeds to block 2644.

Block 2644 illustrates propagating the single Dial value contained inthe DIVS down the Dial tree by reference to mapping tables 1224 (ifnecessary) in order to determine the latch values of the latchesterminating the Dial tree. The latch values determined at block 2644 arethen placed within initial scan chain images 2508 in scan chainlocations determined by reference to chip mapping table 2325, asillustrated at block 2646. Therefore, as shown as block 2648, the DIDS1202 referenced by the current top-level pointer 1250, its lower-levelDial tree, and top-level pointer 1250 itself are all removed from thechip HW database 2108, as described above with respect to block 2632. Inaddition, the set_Dial( ) API call utilized to set the top-level Dialinstances corresponding to the deleted DIDS 1202 is removed (typicallyby a human programmer) from system firmware 1930 b, as shown at block2650. Thereafter, the process returns to block 2620, which has beendescribed.

Referring now to FIG. 26C, processing begins at page connector C andproceeds to block 2660, which illustrates a processing loop in which allDial pointers 1252 within Dial pointer array 1208 are processed toeliminate from chip HW database 2108 any unnecessary DDDSs 1200 and anyunnecessary entries within mapping tables 1224. After all Dial pointers1252 within Dial pointer array 1208 have been processed, the processpasses to block 2690, which is described below. If, however, less thanall Dial pointers 1252 have been processed, the process proceeds fromblock 2660 to block 2662, which illustrates selection of the next Dialpointer 1252 for processing.

Following selection of a next Dial pointer 1252, compression tool 2504determines at block 2664 whether all instance pointers 1228 withininstance pointer array 1226 of the DDDS 1200 referenced by the currentDial pointer 1252 are NULL. If so, the entire DDDS 1200 is unnecessaryand is removed from the chip HW database 2108, as shown at block 2666.Following block 2666, the process returns to block 2660, which has beendescribed.

In response to a determination at block 2664 that all instance pointers1228 within the DDDS 1200 referenced by the Dial pointer 1252 are notNULL, a further determination is made at block 2670 of whether or nottype field 1220 indicates that DDDS 1200 defines a IDial. If so, nooptimization to mapping table 1224 is possible, and the process returnsto block 2660. If compression tool 2504 determines that block 2670 thatthe DDDS referenced by the current Dial pointer 1252 does not define anIDial, the process proceeds to block 2672. Block 2672 depicts adetermination of whether or not any DIPF associated with any DIDS 1202referenced by an instance pointer 1228 has a value of TRUE. If so, thiscondition indicates that at least one Dial instance of the Dial definedby DDDS 1200 has been read and therefore requires a full mapping table1224. Accordingly, the process returns to block 2660 without performingany optimization to mapping table 1224.

If, however, compression tool 2504 determines at block 2672 that allDIPFs associated with DIDSs 1202 referenced by instance pointers 1228have a value of FALSE, the process proceeds from 2672 to the processingloop illustrated at blocks 2674, 2676, and 2678. This processing looprepresents compression tool 2504 processing each instance pointer 1228within the instance pointer array 1226 of the DDDS 1200 referenced bythe current Dial pointer 1252 in order to build a Dial value setcontaining all values to which the Dial instances corresponding to theDIDSs 1202 were set by system firmware 1930. As indicated at block 2678,the Dial values are obtained from the DIVS associated with each DIDS1202. After the Dial value set has been built through processing eachinstance pointer 1228, the process passes from block 2674 to block 2680.Block 2680 illustrates compression tool 2504 removing each entry inmapping table 1224 of the DDDS 1200 referenced by the current Dialpointer 1252 whose Dial input value is not found within the Dial valueset. This process continues down the Dial tree, eliminating mappingtable entries that are not utilized to generate the Dial value set.Thus, mapping tables 1224 of individual Dials are optimized by theremoval of unneeded entries. Thereafter, the process returns to block2660.

In response to a determination at block 2660 that all Dial pointers 1252within Dial pointer array 1206 have been processed, compression tool2504 performs a last compression at block 2690 by replacing commonportions of instance names within instance name fields 1234 withpointers to a “dictionary” providing the full instance name portions.This compression technique, which is well known to those skilled in theart, replaces instance names (or portions thereof) with pointers, whichare typically significantly shorter than the instance name or instancename portions they replace. These pointers can then be replaced withininstance name fields 1234 as a step in the process in which HWconfiguration database 1932 a is loaded into volatile memory 1928 a ofservice processor 1920. Following block 2690, compression tool 2504terminates processing at block 2692.

After all of the chip HW databases 2108 have been compressed bycompression tool 2504 in accordance with the method depicted in FIG.26A-26C, the compressed chip HW databases 2108 can then be utilized toconstruct hardware configuration database 1932 a stored within flash ROM1924 by simply constructing a chip pointer data structure 2320. Itshould be noted that the compression methodology implemented bycompression tool 2504 is not exclusive. HW configuration APIs 1934 bpreferably include a suite of APIs that permit a developer to removeindividual DIDSs 1202, remove an entry in a mapping table 1224, andperform other optimizations similar to those illustrated in FIG.26A-26C.

In the embodiments of the present invention described above, it has beenassumed that each Dial (i.e., LDial or IDial) that is logically coupledto a simulation configuration latch or hardware latch can set the valuecontained in the simulation configuration latch or hardware latch. Inpractice, however, it is often desirable to be able to read such latcheswithout permitting system firmware or a simulator to set (or alter) thelatch values.

In view of the foregoing, a preferred embodiment of the presentinvention supports an additional class of configuration entitiesreferred to herein as read-only Dials or RDials. There is preferably aread-only configuration entity corresponding to each type of Dial andDial group described above, that is, a read-only LDial, CDial, IDial andDial group. For ease of understanding, each read-only configurationentity is referred to herein by the Dial or Dial group type name (e.g.,LDial, CDial, IDial and Dial group) preceded by an “R” designating theconfiguration entity as read-only (e.g., RLDial, RCDial, RIDial andRDial group).

RDials and RDial groups are subject to a number of rule sets. First,RDials and RDial groups are read-only and, by definition, cannot be setby a simulator or system firmware. Consequently, RDials and RDial groupscannot be assigned default values.

Second, the syntax defining an RDial or RDial group within aconfiguration specification statement is preferably the same as thatdescribed above for the corresponding non-read-only configurationentity, except that the keyword defining the configuration entity ispreceded by an “R”. For example, an exemplary configurationspecification statement for an RLDial can be given as follows:

RLDial state_machine (state_vector(0 . . . 1)        )=        {idle=>0b00;        start =>0b01;        wait =>0b10;        end =>0b11       };

The exemplary configuration specification statement given above beginswith the keyword “RLDial,” which specifies that the type of RDial beingdeclared is an RLDial, and the RDial name, which in this case is“state_machine.” Next, the configuration specification statementenumerates the signal name(s) whose states are read by the RLDial.Following the enumeration of the signal identifiers, the configurationspecification statement includes a mapping table listing the permittedenumerated “input” values (or settings) of the RLDial and thecorresponding signal (i.e., “output”) values for each enumerated inputvalue. It should again be noted that the signal states specified for allenumerated values are unique, and collectively represent the only legalpatterns for the signal states.

Third, RDials have a different set of rules regarding interconnectionwith Dials and RDials and grouping of Dials and/or RDials to form RDialgroups. These rules are set forth in detail below with reference to FIG.27, which is a graphical representation of a portion of an exemplaryconfiguration database 2700 including Dials and RDials having specifiedlogical connections to latches 2760-2778 of a simulation model orhardware system.

As an initial matter, RDials are subject to similar restrictions oninterconnection to other RDials and latches as set forth above withrespect to the corresponding Dials. That is, in a preferred embodiment,an RIDial or an RLDial, but not an RCDial, can have its output directlycoupled to a latch, and an RCDial, but not an RIDial or RLDial, can haveits output connected to the input of a lower level RDial. Thus, forexample, RCDial 2740 has an output connected to the input of RCDial2742, which in turn has two outputs respectively connected to the inputsof RLDial 2744 and RIDial 2746. RLDial 2744 and RIDial 2746 have outputsconnected to latches 2770 and 2772, respectively.

In addition, an RCDial can have its output connected to the input of anytype of Dial, but no Dial is permitted to have its output connected tothe input of any RDial. For example, RCDial 2740 has an output coupledto the input of CDial 2724. Although not explicitly illustrated in FIG.27, it should be noted that an RDial may have outputs connected to theinputs of RDials and/or Dials at multiple different levels of the samesubtree.

To prevent conflicting settings, the Dials and Dial groups definedhereinabove permit each latch, Dial, and Dial group to have at most oneDial or Dial group as a parent hierarchically “above” it in an n-wayDial tree. For example, each of CDial 2722 and CDial 2724 has only oneDial parent (i.e., CDial 2720), each of LDial 2726 and IDial 2728 hasonly one Dial parent (i.e., CDial 2722), and each of LDial 2730 andIDial 2732 has only one Dial parent (i.e., CDial 2724). However, becauseRDials and RDial groups are, by definition, read-only, any Dial or RDialmay have one or more RDial or RDial group parents without anypossibility of conflict between Dial settings. That is, an RDial mayhave its output connected to a latch, Dial or RDial to which the outputof another RDial or Dial is also connected, subject to the other rulesand provided that no closed loop is formed. Stated another way, eachlatch and Dial is permitted to have at most one Dial parent, but eachlatch, Dial and RDial can have one or more RDial parents, regardless ofwhether the latch or Dial also has a Dial parent. For example, inconfiguration database 2700 of FIG. 27, an output of each of RCDial 2740and RCDial 2750 is connected to the input of RCDial 2742. Similarly,CDial 2720 and RCDial 2740 each have an output connected to the input ofCDial 2724. Also, RLDial 2752 and LDial 2754 each have an outputconnected to latch 2776.

The final rule regards the construction of RDial groups. As describedabove in detail with reference to FIG. 11A, in a preferred embodiment, aDial group may only contain top-level Dial(s) and/or otherhierarchically nested Dial group(s). In contrast, an RDial group maycontain an RDial or Dial at any level of hierarchy and/or a Dial groupor RDial group. This additional flexibility is permitted because RDialgroups, like RDials, are never set by a simulator or system firmware.

The implementation of RDials and RDial groups within a configurationdatabase in combination with the Dials and Dial groups previouslydescribed in accordance with the rules set forth above permitsconstruction of three classes of trees. First, as exemplified by Dialtrees 2702 and 2708, a tree may comprise Dial(s) and latch(es), but noRDials. Second, a RDial tree, for example, RDial tree 2706, may compriseRDial(s) and latch(es), but no Dials. Third, a hybrid tree may beconstructed that contains one or more RDials, one or more Dials, and oneor more latches, as illustrated by hybrid tree 2704.

In order to support RDials and RDial groups, some modifications are madeto a simulation configuration database and a HW configuration database.First, the value set of the type field 1220 within each DDDS 1200 isaugmented to include additional values identifying RDial groups and theadditional types of RDials. For example, the value set may be augmentedwith values RL, RC, RI and RG to respectively identify DDDSs 1200corresponding to RLDials, RCDials, RIDials and RDial groups. Theaddition of these new values ensures that a set_Dial( ) orset_Dial_group( ) API call, which preferably test the type field 1220 ofthe associated DDDS 1200 prior to attempting to set any instance, willnot attempt to set an RDial or RDial group.

In addition, as illustrated in FIG. 28A, each DIDS 1202 is expanded toinclude a read-only parent field 2800 including zero or more read-onlyparent pointers 2801. Each non-NULL read-only parent pointer 2801defines either a connection between the input of the instancerepresented by the DIDS 1202 and the output of a higher-level RDial orthe inclusion of the instance represented by the DIDS 1202 within anRDial group. As noted above, in addition to a Dial or Dial group parent,if any, an instance represented by a DIDS 1202 can have multiple RDialparents and/or belong to multiple RDial groups.

As depicted in FIG. 28B, latch data structures within a configurationdatabase (e.g., latch data structure 2230 of a HW configuration databaseor latch data structure 1204 of a simulation configuration database) aresimilarly augmented to include a read-only parent field 2802 includingone or more read-only parent pointers 2803. Each non-NULL read-onlyparent pointer 2803 defines a connection between the input of the latchinstance represented by the latch data structure and the output of aRIDial or RLDial. As noted above, in simulation, latch names withinlatch name field 1244 (FIG. 12) are preferably specified with referenceto the scope of the LDial or IDial indicated by parent pointer 1242. Ifparent pointer 1242 is NULL, indicating that the configuration latchcorresponding to the latch data structure 1204 has no Dial parent, thelatch name contained within latch name field 1244 is preferablyspecified with reference to the scope of the RLDial or RIDialcorresponding to the DIDS 1202 identified by the first read-only parentpointer 2803 within read-only parent field 2802.

Finally, top-level pointer array 1206 (FIG. 12), although structurallyunchanged, is increased in length to support RDials and RDial groups.Specifically, top-level pointer array 1206 includes top-level pointers1250 to the DIDS 1202 of each top-level RDial group, each top-levelRDial included within an RDial group (i.e., having a non-NULL read-onlyparent field 2800), and each top-level RDial not included within anRDial group (i.e., having a NULL read-only parent field 2800).

The foregoing modifications to the data structures in a configurationdatabase to support RDials and RDial groups necessitates concomitantmodifications to the method of loading and expanding a configurationdatabase from non-volatile storage into volatile storage that wasdescribed above with reference to FIG. 13. FIG. 29 is a high levellogical flowchart of an exemplary method of loading a configurationdatabase containing RDial and/or RDial groups from non-volatile storageinto volatile memory in accordance with a preferred embodiment of thepresent invention. As indicated by the use of like reference numerals,the method illustrated in FIG. 29 is substantially similar to thatdescribed above with reference to FIG. 13, with some additions to ensurethat each data structure is processed only once.

As indicated by prime notation (′), a first modification to the methodpreviously described is made at block 1308′. In the method of FIG. 13,block 1308 represents a determination of whether or not the DIDS 1202referenced by the current top-level pointer 1250 corresponds to a Dialor Dial group belonging to a Dial group. Block 1308′ in FIG. 29 adds tothis determination a further determination of whether or not the DIDS1202 referenced by the current top-level pointer 1250 corresponds to aDial, RDial, Dial group or RDial group belonging to a RDial group. Ifeither determination obtains an affirmative response, processing of thecurrent top-level pointer 1250 terminates as indicated by the processreturning to block 1304 because the DIDS 1202 referenced by the currenttop-level pointer 1250 will be processed when the Dial group or RDialgroup is processed. This determination ensures that the DIDS 1202 oftop-level Dials and RDials are processed only once.

To ensure that lower-level data structures are also processed only onetime during the process of loading the configuration database intovolatile memory, a further determination is made at block 2900 whetherthe DIDS 1202 referenced by the current top-level pointer 1250corresponds to a RDial or RDial group. If not, that is, if the treerooted at the DIDS 1202 corresponds to a Dial or Dial group, then noneof the “children” in the tree can be RDials or RDial groups.Accordingly, the subtree below the current DIDS 1202 can be processed asbefore, as indicated by the process passing from block 2900 to block1316.

However, in response to a determination at block 2900 that the DIDS 1202referenced by the current top-level pointer 1250 corresponds to a RDialor RDial group, the process passes to block 2902 and following blocks,which represent processing the subtree of the RDial or RDial group toensure that each data structure in the configuration database isprocessed only once. To track which data structures have been processed,the current DIDS 1202 is first marked as processed at block 2902. Then,as indicated at block 2904, the process enters a processing loop inwhich each output pointer 1238 within the output pointer array 1236 ofthe current top-level DIDS 1202 is processed. Once all output pointers1238 have been processed, the process exits the processing loop andreturns to block 1304, which represents a determination of whether ornot any additional top-level pointers remain to be processed.

If a determination is made at block 2904 that not all output pointers1238 have been processed, the next output pointer 1238 within outputpointer array 1236 is selected for processing at block 2906. The processthen proceeds to blocks 2910 and 2912, which respectively illustrate adetermination of whether or not the selected output pointer 1238 pointsto a DIDS 1202 corresponding to a Dial or Dial group, or whether theDIDS 1202 referenced by the output pointer is a RDial or RDial groupthat has been marked as previously processed. If a positive result isobtained at block 2910, an interface between an RDial or RDial group anda Dial or Dial group has been located. Because the subtree headed by theDial or Dial group will be processed when another top-level pointer 1250is selected for processing, processing of this subtree terminates, andthe process returns to block 2904. Processing of the subtree similarlyterminates in response to a determination at block 2912 that the DIDS1202 referenced by the current output pointer 1238 (which corresponds toa RDial or RDial group) is marked as previously processed.

If, on the other hand, the determinations illustrated at blocks 2910 and2912 yield negative results, the DIDS 1202 or latch data structure 1204referenced by the current output pointer 1238 is marked and processed atblock 2914. The processing performed at block 2914 is the same as thatillustrated at block 1310, 1312, 1314 and 1316 and described above. Asfurther indicated at block 2914, each lower level data structure in thesubtree up to and including the latch(es) terminating the subtree issimilarly marked and processed, subject to the two conditions depictedat block 2912 and 2914. That is, processing of any subtree isdiscontinued if an interface with a Dial or Dial group is detected or ifa data structure (e.g., a latch data structure 1204 or DIDS 1202corresponding to a RDial or RDial group) that has been marked isdetected. Following block 2914, the process returns to block 2904, whichhas been described.

The implementation of RDials and RDial groups also entails someadjustments in the manner in which Dials, Dial groups, RDials, and RDialgroups are read for both simulation and hardware implementations of thedigital design. In particular, as the trees are traversed to create thelatch set of interest ultimately targeted by a read_Dial( ) orread_Dial_group( ) API call, for example, at blocks 1620 (FIG. 16A) and1660 (FIG. 16B), the “branches” (i.e., DIDS 1202 corresponding to Dialsor RDials) traversed to create the latch set are preferably recorded ormarked. In this manner, when the latch values of the latches in thelatch set are propagated “up” the trees to obtain Dial and RDialsettings, for example, as illustrated at block 1624 (FIG. 16A) and 1664(FIG. 16B), the correct branches are upwardly traversed from the latchdata structures 1204 to obtain the Dial or RDial settings of interest.In other words, because a Dial or RDial may have one or more RDialparents in addition to a single Dial parent, if any, the parent pointersof the branches traversed downwardly to obtain the latch values must berecorded or marked to ensure that the same branches are traversedupwardly to obtain the desired Dial or RDial setting.

Another adjustment is preferably made to the compression routineillustrated in FIGS. 26A-26C. In the described embodiment, block 2632 ofFIG. 26B depicts removing the entire Dial tree of a top-level DIDS 1202that Dial usage information 2500 (and therefore the DIPF) indicates wasnot set or read. With the implementation of RDials and RDial groups,which as shown in FIG. 27 permits the upward branching of trees, it ispreferable if this step is modified to preserve any lower level DIDSs1202 also belonging to the subtree of a RDial instance that was read. Inthis modification, after the top-level DIDS 1202 is removed, the DIPF ofeach lower level DIDS 1202 in the subtree of the deleted DIDS 1202 istested to determine if it has the value TRUE, which indicates that thelower level DIDS 1202 also belongs to a tree that was read. If not, thelower level DIDS 1202 can also be removed, and the removal processcontinues down the subtree. However, if a lower level DIDS 1202 having aDIPF set to TRUE is located, that lower level DIDS 1202 and its subtreeare not removed. However, its parent pointer 1233 is set to NULL toreflect the removal of the parent DIDS 1202 referenced by parent pointer1233.

When debugging and testing a hardware digital design in a laboratoryenvironment or responding to a failure of a deployed hardware system,analysis of failures to determine their causes is a crucial task.Conventionally, to facilitate the determination of the causes of afailure, a scan dump of all of the test scan chains within the hardwaredigital system is obtained. The scan chain images are then analyzed todetermine the cause of the failure. Frequently, particular scan chainbits are hand-selected and input into a simulation model of the digitalsystem in an attempt to reproduce the failure in simulation. Simulationof hardware failures enables the improved signal visibility and steppingcapability of a simulator to be leveraged to assist in the determinationof the causes of the failures.

This conventional failure analysis is tedious and error prone in that auser must first attempt to determine which bits in the “sea of bits”provided by the scan dump are important to port to the simulation systemin order to recreate the error condition. The user must then scanthrough the scan dump by hand by reference to possibly erroneous paperdocumentation in order to determine the values of the bits of interest.Finally, the user must program a RTX or other software program to loadthe latches of the simulation model with the appropriate bit values.

The present invention improves upon such prior art analysis techniquesby leveraging the features of the configuration specification languageand the hardware and simulation configuration databases described above.With reference now to FIG. 30, there is depicted a high level logicalflowchart of an exemplary process for utilizing a simulation model toanalyze a selected state of a hardware system, and in particular, afailure state of a hardware system. As shown, the process begins withthe operation of a chip analyzer tool 3004, which preferably comprisessoftware executing on a computer system, such as data processing system6 of FIG. 1. Chip analyzer tool 3004 receives as inputs test scan chainimages 3000, which collectively represent the system failure state andwhich each contain the latch values of all of the latches of arespective integrated circuit chip within a hardware digital design(e.g., a server computer system under test). In addition, chip analyzertool 3004 receives the per-chip-type chip HW database 2108 for each typeof integrated circuit chip within the hardware digital design. Finally,chip analyzer tool 3004 is provided a selected Dial list 3002, whichidentifies which Dials within each chip HW database 2108 are deemedrelevant to approximate the hardware failure state in simulation.

Chip analyzer tool 3004 processes the scan chain images 3000 and theselected Dial list 3002 by reference to chip HW databases 2108 togenerate a respective chip configuration report 3006 and simulationsetup file 3008 for each integrated circuit chip in the hardware digitaldesign. Each chip configuration report 3006 comprises a human-readableand printable listing of all of the Dial instances associated with aparticular integrated circuit in the hardware digital design, togetherwith the setting (if a legal value is available) of each Dial instanceat the point of failure. For Dial instances for which legal values arenot available, the underlying latch values are reported. Each simulationsetup file 3008 is a machine-readable file specifying the setting (if alegal value is available) of each Dial identified in selected Dial list3002 that is associated with the corresponding integrated circuit chip.As explained below, an RTX 1420 (FIG. 14) utilizes simulation setupfiles 3008 to configure a simulation model 1400 of the hardware digitalsystem to a state approximating the failure state of the hardwaredigital design.

Referring now to FIG. 31, there is illustrated a high level logicalflowchart of an illustrative method by which chip analyzer tool 3004 ofFIG. 30 generates the chip configuration reports 3006 and simulationsetup files 3008 utilized to analyze hardware failures in accordancewith the present invention. As illustrated, the process begins at block3100 and then proceeds to block 3102, which depicts chip analyzer tool3004 determining whether the scan chain images 3000 of each integratedcircuit chip within the hardware digital design have been processed. Ifthe scan chain images 3000 of all integrated circuit chips have beenprocessed, the process terminates at block 3130. If, however, fewer thanall of the scan chain images 3000 have been processed, the scan chainimages 3000 and chip HW database 2108 of the next integrated circuitchip to be processed are selected at block 3104.

The process shown in FIG. 31 then enters a processing loop at blocks3106-3110 in which each latch value of interest scanned from the currentintegrated circuit chip is processed by reference to the latch pointers1254 in the latch pointer array 1210 of chip HW database 2108.Specifically, chip analyzer tool 3004 determines at block 3106 whetheror not all latch pointers 1254 have been processed. If so, the processpasses from block 3106 to block 3120, which is described below. If,however, all latch pointers 1254 have not yet been processed, the nextlatch pointer 1254 within latch pointer array 1210 is selected forprocessing at block 3108. Next, at block 3110, chip analyzer tool 3004utilizes the test scan ring identifier and offset value pair containedin the method name field 2234 a (FIG. 23B) of the latch data structure2230 referenced by the current latch pointer 1254 to locate within scanring images 3000 the latch value of the hardware latch corresponding tothe latch data structure 2230. This latch value is then stored withinthe appropriate entry of latch value field 2324, which is determined byreference to the position of the chipID of the current integratedcircuit chip within chip mapping table 2325. Thereafter, the processreturns to block 3106.

In response to a determination at block 3106 that all latch pointers1254 within the latch pointer array 1210 of the current chip HW database2108 have been processed, the process proceeds to block 3120. Block 3120depicts chip analyzer tool 3004 propagating the set of latch valuescontained in each latch value field 2324 up all branches of the DIDStrees within the chip HW database 2108 by reference to mapping tables1224 in order to obtain the setting (i.e., input value) of each Dial andRDial, if possible. Given the fact that the latch values within latchvalue fields 2324 correspond to a hardware failure state, it isfrequently the case that an attempt to propagate at least some latchvalues up a tree will result in at least one “output” value that is notamong the legal output values specified within the mapping table 1224for a Dial or RDial instance. In such cases, the Dial or RDial instance(and any RDial or Dial above it in the same tree) is flagged as havingan illegal value. Such illegal values frequently suggest the cause ofthe hardware failure.

It should be noted that the ability to derive Dial and RDial values fromlatch values depends upon the invertibility of the configurationspecification language introduced by the present invention. That is,without a one-to-one mapping between Dial (and RDial) inputs andoutputs, Dial (and RDial) settings cannot be definitely determined fromlatch values, as shown at block 3120.

Following block 3120, the process proceeds to block 3122, which depictschip analyzer tool 3004 creating a chip configuration report 3006 forthe current integrated circuit chip. As noted above, chip configurationreport 3006 is a human-readable file containing a listing of all Dialand RDial instances within the current chip HW database 2108 and theircorresponding settings, if any, determined at block 3120. Dial and RDialinstances having illegal values are flagged in chip configuration report3006, and the latch values of the underlying latches are listed tofacilitate analysis. As shown at block 3124, chip analysis tool 3004also creates an RTX-compatible simulation setup file 3008 for thecurrent integrated circuit. Simulation setup file 3008 preferablyincludes the Dial settings of only the Dial instances specified withinselected Dial list 3002, and if a Dial instance specified in selectedDial list 3002 has an illegal value, the latch values of the underlyinglatches in the latch set controlled by the Dial. These Dial instancesettings and latch values can then be applied automatically to asimulation model 1400 by an RTX 1420 running in a simulationenvironment, as explained below.

It should be appreciated that because the number of latches controlledby Dials is typically only a small percentage of the overall number oflatches in an integrated circuit, the designer of the digital system,through the use of the configuration specification language of thepresent invention to associate Dials with particular configurationlatches, has already greatly reduced the number of latch values to beconsidered in recreating the system failure state and has identifiedthose latches most likely to be necessary to reproduce the hardwarefailure state. Selected Dial list 3002 further reduces the amount ofhardware state information to be ported back into a simulation model1400 by designating particular user-selected Dial instances (not RDialinstances) of interest.

Following block 3124, the process depicted in FIG. 31 returns to block3102 for the processing of the next integrated circuit chip in thehardware digital design, if any. After all integrated circuit chipswithin the hardware digital design are processed, the process terminatesat block 3130.

Referring again to FIG. 30, following the creation of a respectivesimulation setup file 3008 for each integrated circuit chip within thehardware digital design in accordance with the process of FIG. 31, thehardware failure state is approximated within a simulation model 1400 ofthe digital design through the execution of RTX 1420. As an aside, itshould be noted that it is generally undesirable to reproduce the exacthardware failure state in simulation because the digital design, bydefinition, will not operate correctly from the failure state.

In order to approximate the hardware failure state in simulation, RTX1420 first makes standard API calls to the APIs provided by simulator1410 in order to perform the normal initialization procedures utilizedto initialize simulation model 1400 for simulation. Next, RTX 1420 mayoptionally make individual user-specified customizations to theconfiguration of simulation model 1400 based upon the contents of auser-provided custom initialization modifications file 3010. Thesecustom modifications may be made, for example, to adjust a parameter toexpose a particular failure mode or to improve the visibility of certaintypes of failures. Finally, RTX 1420 applies the Dial instance settingsand latch values contained in simulation setup files 3008. As describedin detail above with reference to FIGS. 14 and 17A, RTX 1420 sets Dialinstances through set_Dial( ) API calls to a configuration API 1406,which, after reflecting the Dial instance settings in simulationconfiguration database 1404, calls PUTFAC( ) API 1414 to setcorresponding latch values in simulation model 1400. RTX 1420 similarlyutilizes API calls to set the configuration latches of simulation model1400 and latch value fields 1246 (FIG. 12) of configuration database1404 with the latch values contained within simulation setup files 3008that correspond to illegal Dial values. With simulation model 1400 thusconfigured, RTX 1420 directs execution of one or more testcases againstsimulation model 1400 by simulator 1410 in order to attempt reproductionof the hardware failure state in simulation.

While the invention has been particularly shown as described withreference to a preferred embodiment, it will be understood by thoseskilled in the art that various changes in form and detail may be madetherein without departing from the spirit and scope of the invention.For example, it will be appreciated that the concepts disclosed hereinmay be extended or modified to apply to other types of configurationentities having different rules than the particular exemplaryembodiments disclosed herein. In addition, although aspects of thepresent invention have been described with respect to a computer systemexecuting software that directs the functions of the present invention,it should be understood that present invention may alternatively beimplemented as a program product for use with a data processing system.Programs defining the functions of the present invention can bedelivered to a data processing system via a variety of signal-bearingmedia, which include, without limitation, non-rewritable storage media(e.g., CD-ROM), rewritable storage media (e.g., a floppy diskette orhard disk drive), and communication media, such as digital and analognetworks. It should be understood, therefore, that such signal-bearingmedia, when carrying or encoding computer readable instructions thatdirect the functions of the present invention, represent alternativeembodiments of the present invention.

1. A method of constructing a compact configuration database, saidmethod comprising: loading a configuration database including aplurality of Dial instance data structures each corresponding to arespective one of a plurality of Dial instances, wherein each Dialinstance is utilized to control latch values of one or more latcheswithin a digital design; determining which of said plurality of Dialinstance data structures is accessed during initialization of saiddigital design; in response to said determination, removing at least onefirst Dial instance data structure from said configuration database thatis not accessed during initialization of said digital design to reduce asize of said configuration database; and thereafter, storing saidconfiguration database.
 2. The method of claim 1, wherein saiddetermining comprises determining which of said plurality of pluralityof Dial instance data structures is set during said initialization. 3.The method of claim 2, wherein said determining further comprisesdetermining that a Dial is accessed if another Dial coupled to said Dialis read during said initialization.
 4. The method of claim 1, andfurther comprising: determining at least one second Dial instance datastructure among said plurality of Dial instance data structures thatcorresponds to a Dial instance that is set to only a single settingduring said initialization; in response to determining at least onesecond Dial instance data structure, removing said at least one secondDial instance data structure from said configuration database; andcreating an initial scan chain image containing a latch valuecorresponding with said single setting of said at least one second Dialinstance.
 5. The method of claim 4, and further comprising removing aportion of initialization software that is executed to set said at leastone second Dial instance to said single setting.
 6. The method of claim4, and further comprising removing said at least one second Dialinstance data structure only if said at least one second Dial instancedata structure does not belong to a Dial group including at least onethird Dial instance.
 7. The method of claim 1, wherein saidconfiguration database includes a Dial definition data structuredefining a type of a Dial of which at least one of said plurality ofDial instances is an instance, said method further comprising: removingsaid Dial definition data structure from said configuration database ifall Dial instance data structures corresponding to instances of saidtype of Dial have been removed from said configuration database.
 8. Themethod of claim 1, wherein said configuration database includes a Dialdefinition data structure defining a type of a Dial of which at leastone of said plurality of Dial instances is an instance, said Dialdefinition data structure including a mapping table including aplurality of entries each mapping a Dial input to one or more Dialoutputs, said method further comprising: eliminating unneeded entriesfrom said mapping table based upon said initialization.
 9. A dataprocessing system, comprising: processing resources; and data storagecoupled to said processing resources, said data storage storing acompression tool including: means for loading a configuration databaseincluding a plurality of Dial instance data structures eachcorresponding to a respective one of a plurality of Dial instances,wherein each Dial instance is utilized to control latch values of one ormore latches within a digital design; means for determining which ofsaid plurality of Dial instance data structures is accessed duringinitialization of said digital design; means, responsive to saiddetermination, for removing at least one first Dial instance datastructure from said configuration database that is not accessed duringinitialization of said digital design to reduce a size of saidconfiguration database; and means for thereafter storing saidconfiguration database.
 10. The data processing system of claim 9,wherein said means for determining comprises means for determining whichof said plurality of plurality of Dial instance data structures is setduring said initialization.
 11. The data processing system of claim 10,wherein said means for determining further comprises means fordetermining that a Dial is accessed if another Dial coupled to said Dialis read during said initialization.
 12. The data processing system ofclaim 9, said compression tool further comprising: means for determiningat least one second Dial instance data structure among said plurality ofDial instance data structures that corresponds to a Dial instance thatis set to only a single setting during said initialization; means,responsive to determining at least one second Dial instance datastructure, for removing said at least one second Dial instance datastructure from said configuration database; and means for creating aninitial scan chain image containing a latch value corresponding withsaid single setting of said at least one second Dial instance.
 13. Thedata processing system of claim 12, and further comprising means forremoving a portion of initialization software that is executed to setsaid at least one second Dial instance to said single setting.
 14. Thedata processing system of claim 12, said compression tool furthercomprising means for removing said at least one second Dial instancedata structure only if said at least one second Dial instance datastructure does not belong to a Dial group including at least one thirdDial instance.
 15. The data processing system of claim 9, wherein saidconfiguration database includes a Dial definition data structuredefining a type of a Dial of which at least one of said plurality ofDial instances is an instance, said compression tool further comprising:means for removing said Dial definition data structure from saidconfiguration database if all Dial instance data structurescorresponding to instances of said type of Dial have been removed fromsaid configuration database.
 16. The data processing system of claim 9,wherein said configuration database includes a Dial definition datastructure defining a type of a Dial of which at least one of saidplurality of Dial instances is an instance, said Dial definition datastructure including a mapping table including a plurality of entrieseach mapping a Dial input to one or more Dial outputs, said compressiontool further comprising: means for eliminating unneeded entries fromsaid mapping table based upon said initialization.
 17. A programproduct, comprising: a computer usable medium; and a compression toolencoded within said computer usable medium for compressing aconfiguration database including a plurality of Dial instance datastructures each corresponding to a respective one of a plurality of Dialinstances, wherein each Dial instance is utilized to control latchvalues of one or more latches within a digital design, said compressiontool including: means for determining which of said plurality of Dialinstance data structures is accessed during initialization of saiddigital design; means, responsive to said determination, for removing atleast one first Dial instance data structure from said configurationdatabase that is not accessed during initialization of said digitaldesign to reduce a size of said configuration database; and means forthereafter storing said configuration database.
 18. The program productof claim 17, wherein said means for determining comprises means fordetermining which of said plurality of plurality of Dial instance datastructures is set during said initialization.
 19. The program product ofclaim 18, wherein said means for determining further comprises means fordetermining that a Dial is accessed if another Dial coupled to said Dialis read during said initialization.
 20. The program product of claim 17,said compression tool further comprising: means for determining at leastone second Dial instance data structure among said plurality of Dialinstance data structures that corresponds to a Dial instance that is setto only a single setting during said initialization; means, responsiveto determining at least one second Dial instance data structure, forremoving said at least one second Dial instance data structure from saidconfiguration database; and means for creating an initial scan chainimage containing a latch value corresponding with said single setting ofsaid at least one second Dial instance.
 21. The program product of claim20, and further comprising means for removing a portion ofinitialization software that is executed to set said at least one secondDial instance to said single setting.
 22. The program product of claim20, said compression tool further comprising means for removing said atleast one second Dial instance data structure only if said at least onesecond Dial instance data structure does not belong to a Dial groupincluding at least one third Dial instance.
 23. The program product ofclaim 17, wherein said configuration database includes a Dial definitiondata structure defining a type of a Dial of which at least one of saidplurality of Dial instances is an instance, said compression toolfurther comprising: means for removing said Dial definition datastructure from said configuration database if all Dial instance datastructures corresponding to instances of said type of Dial have beenremoved from said configuration database.
 24. The program product ofclaim 17, wherein said configuration database includes a Dial definitiondata structure defining a type of a Dial of which at least one of saidplurality of Dial instances is an instance, said Dial definition datastructure including a mapping table including a plurality of entrieseach mapping a Dial input to one or more Dial outputs, said compressiontool further comprising: means for eliminating unneeded entries fromsaid mapping table based upon said initialization.