Using OVM to reuse vital verification knowledge
By Jana Richards, LSI Corp. and Dan Cohen, Mentor Graphics
edadesignline.com (January 05, 2010)
Reuse of legacy directed test environments is common practice but, with each generation of reuse, the number of tests grows and with it the overhead of maintaining the environment across multiple projects. Another concern lies in the fragility of directed tests. With each change to a design, a percentage of the directed tests will fail, but a certain percentage will pass but no longer verify their intended feature. Careful, tedious, time consuming auditing is the only way to identify and fix these tests.
During the design of a fifth generation SAS device at LSI, it was clear that our testbench needed significant updates to verify the new features. The environment surrounding the SAS expander design had become cumbersome to manage. With each generation many new features had been added to the design. The new features complicated the existing environment, which, although flexible, had not been designed to verify these features. And, as each new feature meant adding directed tests to the library, after four generations the library contained thousands upon thousands of tests.
Of course, vital verification knowledge was embedded in the existing test patterns that we wanted to preserve. However, documentation associating the tests to the relevant sections within the design specification needed improvement and porting the tests directly would also involve many tedious hours (that our team did not have). As if all of these factors weren't problematic enough, all of this work would need to be repeated for future generations of the device.
Clearly, we needed a new approach; one that could encapsulate the verification knowledge in a portable, documented form that could move easily through future generations of the project without manual intervention. The new approach also needed to show which features of the device had been verified —not just a list of directed tests that had been written.
To read the full article, click here
Related Semiconductor IP
- UCIe D2D Adapter & PHY Integrated IP
- Low Dropout (LDO) Regulator
- 16-Bit xSPI PSRAM PHY
- ASIL B Compliant MIPI CSI-2 CSE2 Security Module
- SHA-256 Secure Hash Algorithm IP Core
Related Articles
- Reduce SoC verification time through reuse in pre-silicon validation
- Reuse UVM RTL verification tests for gate level simulation
- API-based verification: Effective reuse of verification environment components
- Retargeting IP -> System-in-package option aids reuse
Latest Articles
- A 129FPS Full HD Real-Time Accelerator for 3D Gaussian Splatting
- SkipOPU: An FPGA-based Overlay Processor for Large Language Models with Dynamically Allocated Computation
- TensorPool: A 3D-Stacked 8.4TFLOPS/4.3W Many-Core Domain-Specific Processor for AI-Native Radio Access Networks
- Assertain: Automated Security Assertion Generation Using Large Language Models
- VolTune: A Fine-Grained Runtime Voltage Control Architecture for FPGA Systems