Memory Model Tool: Morello (and some Memory Tagging)
This post presents the implementation of Morello in the Memory Model Tool. The reader is expected to have some understanding of the tool, which is documented in previous posts: A working example of how to use the herd7 Memory Model Tool and How to generate litmus tests automatically with the diy7 tool.
Morello
Morello is a security architecture developed by Arm, based on Capability Hardware Enhanced RISC Instructions (CHERI). More information can be found in the Arm Morello program.
We have extended the Memory Model Tools to support Morello:
https://github.com/herd/herdtools7/commit/ef79f222ed8ad77c79457c3c9c77a945f12bf9fb
Extending the Memory Model Tools to include the Morello instruction set increases the coverage of the tools. This benefits hardware developers and software developers during the prototyping of Morello evaluation boards and the code that runs on them. There are several aspects that are of interest in the implementation of Morello in the Memory Model Tool, namely the addition of:
- New instructions or new variations of instructions specific to Morello
- New types of memory accesses
- Interaction between Morello and other instructions
To read the full article, click here
Related Semiconductor IP
- Process/Voltage/Temperature Sensor with Self-calibration (Supply voltage 1.2V) - TSMC 3nm N3P
- USB 20Gbps Device Controller
- SM4 Cipher Engine
- Ultra-High-Speed Time-Interleaved 7-bit 64GSPS ADC on 3nm
- Fault Tolerant DDR2/DDR3/DDR4 Memory controller
Related Blogs
- Buying DDRn Controller IP AND Memory Model to the same IP vendor gives real TTM advantage
- The RISC-V Memory Consistency Model
- How to Reduce Memory Model Debug Time
- Flash Forward: MRAM and RRAM Bring Embedded Memory and Applications into the Future
Latest Blogs
- Shaping the Future of Semiconductor Design Through Collaboration: Synopsys Wins Multiple TSMC OIP Partner of the Year Awards
- Pushing the Boundaries of Memory: What’s New with Weebit and AI
- Root of Trust: A Security Essential for Cyber Defense
- Evolution of AMBA AXI Protocol: An Introduction to the Issue L Update
- An Introduction to AMBA CHI Chip-to-Chip (C2C) Protocol