A verification method and system for a SOC chip
A verification method and chip technology, applied in CAD circuit design, special data processing applications, instruments, etc., can solve problems such as complex verification operations, inability to verify application scenarios, inability to simulate system software and hardware co-verification, etc., to achieve easy-to-use and easy-to-use The effect of multiplexing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] figure 2 It shows the implementation flowchart of the SOC chip verification method provided by Embodiment 1 of the present invention, and is described in detail as follows:
[0039] In step S201, a test program is loaded.
[0040] In the embodiment of the present invention, the test program can realize the following functions:
[0041] (1) Control the flow of the verification system.
[0042] (2) Obtain and change the state of the authentication system.
[0043] (3) Operate and access the chip to be tested.
[0044] (4) Generate random test transactions to test the chip.
[0045] (5) Operations that other standard C / C++ can complete.
[0046] In the embodiment of the present invention, the test program may be a driver program or an application program, for example, may include a main program and an interrupt service program, etc., wherein,
[0047] 1. The interrupt service routine can be a function with the following form:
[0048] intisr(intpid, intsource, intp...
Embodiment 2
[0133] Figure 4 It shows the flow chart of the method for generating a random transaction according to the system function and the maintenance list corresponding to the system function when the random transaction is a random test transaction provided by the second embodiment of the present invention, and is described in detail as follows:
[0134] In step S401, the device under test configuration corresponding to the aforementioned device under test is searched in the device under test configuration list.
[0135] In the embodiment of the present invention, each device under test has a device under test configuration, the device under test configuration includes the register image of the device under test and the constraint expression of the device under test, and the above register image specifically includes the name and address of the register , bit width, default configuration value, current configuration value and previous configuration value, the above constraint expres...
Embodiment 3
[0146] Figure 6 It shows the implementation flowchart of the method for generating a random transaction according to the system function and the maintenance list corresponding to the system function when the random transaction is a random IO operation transaction provided by the third implementation of the present invention, and is described in detail as follows:
[0147] In step S601, the random parameters to be randomized in the random IO function are determined.
[0148] In step S602, the random values of the above random parameters are generated in chronological order through the IO list.
[0149] In step S603, a random IO operation transaction is generated according to the random value of the above random parameter.
[0150] For ease of understanding, the method of the embodiment of the present invention is described below with a specific implementation example, but not limited to this implementation example. For details, please refer to Figure 7 , when the random t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 