CN113705150B - Method and equipment for generating coverage group - Google Patents

Method and equipment for generating coverage group Download PDF

Info

Publication number
CN113705150B
CN113705150B CN202110838255.5A CN202110838255A CN113705150B CN 113705150 B CN113705150 B CN 113705150B CN 202110838255 A CN202110838255 A CN 202110838255A CN 113705150 B CN113705150 B CN 113705150B
Authority
CN
China
Prior art keywords
coverage
bin
information
point
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110838255.5A
Other languages
Chinese (zh)
Other versions
CN113705150A (en
Inventor
朱旭涛
唐治龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Yixin Electronic Technology Co ltd
Original Assignee
Hefei Yixin Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Yixin Electronic Technology Co ltd filed Critical Hefei Yixin Electronic Technology Co ltd
Priority to CN202110838255.5A priority Critical patent/CN113705150B/en
Publication of CN113705150A publication Critical patent/CN113705150A/en
Application granted granted Critical
Publication of CN113705150B publication Critical patent/CN113705150B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/30Circuit design
    • G06F30/39Circuit design at the physical level
    • G06F30/398Design verification or optimisation, e.g. using design rule check [DRC], layout versus schematics [LVS] or finite element methods [FEM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • G06F8/42Syntactic analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Evolutionary Computation (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Geometry (AREA)
  • Data Mining & Analysis (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application relates to a method and equipment for generating a coverage group, wherein the method comprises the steps of obtaining a configuration file, recording one or more items in the configuration file, and at least one first item comprises information corresponding to a function point of the coverage group, wherein the function point comprises a coverage point or an intersection point; and extracting the information corresponding to each first item to generate a coverage group code. The method solves the problems of lower acquisition efficiency and accuracy of the coverage group codes caused by the existing manual coverage group writing mode and inconvenience for engineering test.

Description

Method and equipment for generating coverage group
Technical Field
The present application relates generally to the field of integrated circuit verification. More particularly, the present application relates to a method, apparatus, and computer-readable storage medium for generating coverage groups.
Background
With the continuous increase of the complexity of integrated circuit scale design, the integrated circuit scale is gradually increased, and the functional verification at the code level is gradually becoming an important test facing the integrated circuit design. At present, a random verification method based on SystemVerilog (a language for hardware design and verification combining hardware description language HDL and modern high-level verification language HVL) grammar is greatly popularized in functional verification, the SystemVerilog can provide an overlay group (Covergroup) method, and the collection rate of bin (bin) represents the functional overlay condition, so that the completeness of functional verification under the random verification method can be ensured by an overlay group (Covergroup). In the process of performing functional verification on the integrated circuit by using the generated coverage group, a verification engineer needs to represent the functional point information according to the corresponding grammar rule so as to complete the collection of the functional test points. However, in the random verification process, if verification of a relatively complex module is involved, it is necessary to verify that the engineer writes a large number of corresponding functional coverage groups. The manual writing coverage group mode has the advantages that on one hand, the workload is large and the efficiency is low for verification engineers, and on the other hand, missing or repeated writing is easy to occur, so that missing detection and missing coverage in the test process occur. Therefore, in view of the situation that the current verification engineer needs the overlay set with handwriting function, a method for quickly and accurately generating the overlay set is needed to improve the engineering test efficiency.
Disclosure of Invention
In order to solve at least the technical problems described in the background art section, the application records the related information of the function points in the configuration file, thereby facilitating the user to sort and generalize the information of the function points so as to reduce the situations of errors or omission. When the corresponding overlay group code is required to be generated, the user can automatically extract the information corresponding to at least the first item in the configuration file to generate the overlay group code only by filling the function point information into the configuration file. By the method, the configuration file can be automatically detected, the corresponding overlay group code is generated, the manual participation is not needed in the process of writing the overlay group code, and the obtained overlay group code is high in accuracy and beneficial to improving engineering test efficiency.
According to a first aspect of the present application there is provided a method of generating a coverage group according to the first aspect of the present application, comprising: acquiring a configuration file, wherein one or more items are recorded in the configuration file, and at least one first item comprises information corresponding to a functional point of a coverage group, wherein the functional point comprises a coverage point or a cross point; and extracting the information corresponding to each first item to generate a coverage group code.
According to a first method for generating a coverage group of the first aspect of the present application, there is provided a second method for generating a coverage group according to the first aspect of the present application, extracting information corresponding to each first item to generate a coverage group code, including: extracting first information recorded in a first field and second information recorded in at least one second field in each first entry, wherein the first information comprises keyword information, and the second information comprises function point names, variable names corresponding to the function points, variable bit widths and bins associated with the function points; and matching the first information with the specified keyword, and if the matching is successful, generating a corresponding coverage group code according to the first information and the second information.
According to a first or second method of generating an overlay group of the first aspect of the present application, there is provided a third method of generating an overlay group according to the first aspect of the present application, matching first information with a specified keyword, comprising: matching the first information with the specified keywords corresponding to the coverage points; and/or matching the first information with the designated keywords corresponding to the cross points.
According to a third method for generating a coverage group in the first aspect of the present application, there is provided a fourth method for generating a coverage group in the first aspect of the present application, wherein each second field corresponds to one piece of second information.
According to one of the second to fourth methods of generating a coverage group of the first aspect of the present application, there is provided a fifth method of generating a coverage group according to the first aspect of the present application, the second information including: the name of the coverage point, the variable name corresponding to the coverage point, the variable bit width and the bin associated with the coverage point.
According to a fifth method of generating a coverage group of the first aspect of the present application, there is provided a sixth method of generating a coverage group according to the first aspect of the present application, the second information further including: user-defined overlay weight information, overlay condition information, and annotation information.
According to a fifth method of generating a coverage group according to the first aspect of the present application, there is provided a seventh method of generating a coverage group according to the first aspect of the present application, if the second field for recording the bin associated with the coverage point has recorded therein: one number or a plurality of numbers, wherein any two numbers in the plurality of numbers are separated by a first separator; and generating a bin according to each digit when the group codes are covered, wherein the bin value is equal to the corresponding digit.
A fifth method of generating a coverage group according to the first aspect of the present application provides the eighth method of generating a coverage group according to the first aspect of the present application, if the second field for recording the bin associated with the coverage point has recorded therein: one or more first data intervals, wherein any two first data intervals in the plurality of first data intervals are separated by a first separator; and generating a bin according to each first data interval when the coverage group code is generated, wherein the bin value is equal to the range indicated by the first data interval.
According to a fifth method of generating an overlay group according to the first aspect of the present application, there is provided a ninth method of generating an overlay group according to the first aspect of the present application, if the second field for recording the bin associated with the overlay point has recorded therein: a first byte of bit width keys, wild cards and numbers; then, upon generation of the coverage group code, a bin expressed by SV syntax is generated from the first byte.
A fifth method of generating an overlay group according to the first aspect of the application provides the method of generating an overlay group according to the tenth aspect of the application, if the second field for recording the bin associated with the overlay point has recorded therein: the first sequence comprises at least two numbers, and the numbers are connected through jump designated symbols; then, in generating the coverage group code, a bin expressed by SV syntax is generated based on the first sequence.
According to a fifth method of generating an overlay group according to the first aspect of the present application, there is provided the method of generating an overlay group according to the eleventh aspect of the present application, if the second field for recording the bin associated with the overlay point has recorded therein: at least one first data set, wherein the first data set comprises a second data interval and a number, and the second data interval and the number are separated by a combination bin designation symbol; in generating the overlay group code, a bin is generated from each first data set, the bin value being equal to the second data interval and number contained in the first data set.
According to one of the seventh to eleventh methods of generating an overlay group according to the first aspect of the present application, there is provided the twelfth method of generating an overlay group according to the first aspect of the present application, if the second field for recording the bin associated with the overlay point has recorded therein: and when the coverage group code is generated, the data, the first data interval, the first byte, the first sequence and/or the second data interval separated by the first separator are respectively enumerated as one bin.
A fifth method of generating a coverage group according to the first aspect of the present application provides the thirteenth method of generating a coverage group according to the first aspect of the present application, if the second field for recording the bin associated with the coverage point has recorded therein: and when the coverage group code is generated, generating a corresponding SV grammar expressed bin according to the data range, wherein the bin value is equal to the data range.
A fifth method of generating a coverage group according to the first aspect of the present application provides the method of generating a coverage group according to the fourteenth aspect of the present application, if the second field for recording the bin associated with the coverage point has recorded therein: a multi-bin enumeration key and corresponding enumeration number; then a number of bins equal to the number of enumerated numbers are generated when the overlay group code is generated.
A fifth method of generating a coverage group according to the first aspect of the present application provides the method of generating a coverage group according to the fifteenth aspect of the present application, if the second field for recording the bin associated with the coverage point has recorded therein: variable bit keywords and corresponding variable bit width digits and bin value digits; and generating bins expressed in SV grammar according to the variable bit width numbers and bin value numbers when generating the coverage group codes.
According to a fifth method of generating a coverage group of the first aspect of the present application, there is provided a method of generating a coverage group according to the sixteenth aspect of the present application, the second information comprising: the name of the intersection, the name of the overlay variable, the bit width of the variable, and the bin associated with the intersection corresponding to the intersection.
A sixteenth method of generating a coverage group according to the first aspect of the present application provides the seventeenth method of generating a coverage group according to the first aspect of the present application, the second information further comprising: user-defined cross-weight information, cross-condition information, and annotation information.
A sixteenth method of generating an overlay group according to the first aspect of the present application provides the eighteenth method of generating an overlay group according to the first aspect of the present application, if the second field for recording the bin associated with the intersection has recorded therein: a first statement based on the SV syntax, wherein the first statement is used to represent an ignored coverage type and coverage point combination; the first statement is copied into the override group code.
The eighteenth method of generating a coverage group according to the first aspect of the present application provides the nineteenth method of generating a coverage group according to the first aspect of the present application, if the second field for recording the bin associated with the intersection has recorded therein: a second separator, wherein the second separator is used for separating any two first sentences; then a plurality of first statements separated by the second separator are each enumerated when the overlay group code is generated.
According to one of the first to nineteenth methods of generating a coverage group of the first aspect of the present application, there is provided a method of generating a coverage group according to the twentieth of the first aspect of the present application, further comprising: and matching the first information of the first item with the specified keyword corresponding to the coverage group name, and taking the first information of the first item as the coverage group name in the coverage group code if the matching is successful.
A twentieth method of generating a coverage group according to the first aspect of the present application provides the twentieth method of generating a coverage group according to the first aspect of the present application, further comprising: and matching the information corresponding to the second item in the configuration file with the designated keyword corresponding to the global variable name, and taking the information corresponding to the second item as the global variable name in the coverage group code if the matching is successful.
A twenty-second method of generating a coverage group according to the first aspect of the present application is provided, further comprising: and matching the information corresponding to the third item in the configuration file with the specified keyword corresponding to the file name, and if the matching is successful, taking the information corresponding to the third item as the file name corresponding to the coverage group code.
A twenty-third method of generating a coverage group according to the first aspect of the present application is provided, further comprising: and matching the information corresponding to the fourth item in the configuration file with the specified keyword corresponding to the annotation content, and if the matching is successful, writing the information corresponding to the fourth item into the overlay group code as the annotation content.
According to one of the first to twenty-third methods of generating a coverage group of the first aspect of the present application, there is provided a twenty-fourth method of generating a coverage group according to the first aspect of the present application, the configuration file employs an excel template.
According to one of the first to twenty-fourth methods of generating a coverage group of the first aspect of the present application, there is provided a twenty-fifth method of generating a coverage group according to the first aspect of the present application, wherein the configuration file is detected using Perl script.
According to a second aspect of the present application there is provided an apparatus for generating an overlay group according to the second aspect of the present application, comprising a processor and a memory, the memory storing a computer program which, when executed by the processor, implements one of the methods of generating an overlay group of the first aspect of the present application.
According to a third aspect of the present application, there is provided a computer-readable storage medium according to the third aspect of the present application, having stored thereon a computer program which, when executed, implements one of the methods of generating a coverage group of the first aspect of the present application.
Drawings
The above, as well as additional purposes, features, and advantages of exemplary embodiments of the present application will become readily apparent from the following detailed description when read in conjunction with the accompanying drawings. In the drawings, embodiments of the application are illustrated by way of example and not by way of limitation, and like reference numerals refer to similar or corresponding parts and in which:
FIG. 1 is a flow diagram of a method of generating coverage groups according to an embodiment of the application;
FIG. 2 is a flow chart of a method for extracting information corresponding to each entry in a configuration file to generate an overlay group code according to an embodiment of the present application;
FIG. 3 is a flow chart of a method for extracting function point related information according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a configuration file according to an embodiment of the application;
Fig. 5 is a schematic diagram of an apparatus for generating a coverage group according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application. It should be understood that the terms "first," "second," "third," and "fourth," etc. in the claims, specification and drawings of the present application are used for distinguishing between different objects and not for describing a particular sequential order. The terms "comprises" and "comprising" when used in the specification and claims of the present application are taken to specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification and claims, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should be further understood that the term "and/or" as used in the present specification and claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations. As used in this specification and the claims, the terms "if", "if" and "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context.
In practical engineering tests, the functional points in the overlay group (Covergroup) include basic overlay points (CoverPoint) and intersection points (CrossPoint), and the grammar of the overlay group used is generally not too complex and is relatively single. In view of this, the user may fill in the corresponding content in the configuration file, i.e. collect the function point information in the configuration file, for example, the configuration file may be a form file in Excel format. The overlay group code is then automatically generated by the script based on the configuration file. In one application scenario, the Perl script may be used to detect the foregoing configuration file to generate the overlay group code corresponding to the configuration file. It should be noted that, in the technical solution of the present application, the format selection of the configuration file and the language selection of the script may be arbitrary, and the Excel format and the Perl script are presented only as examples, which are not limited by the present application. By the method for generating the coverage group, the working efficiency of the user in coverage rate collection can be effectively improved, and the condition of missing coverage points caused by human factors can be reduced. Specific embodiments of the present application are described in detail below with reference to the accompanying drawings.
FIG. 1 illustrates a flow chart of a method of generating coverage groups in an embodiment in accordance with the application.
First, step S101 is executed to obtain a configuration file, where the configuration file may include one or more entries, where at least one entry includes information corresponding to a functional point of an overlay group. The function point may include, for example, a coverage point or an intersection point. Next, step S102 is executed to extract the information corresponding to each item to generate an overlay group code. A mapping relation exists between the configuration file and the generated overlay group codes, a user fills the configuration file according to a stipulated format, and then the overlay group codes are automatically generated by scripts, namely overlay group (Covergroup) codes based on SystemVerilog grammar (hereinafter referred to as SV grammar).
The cover point (CoverPoint) and the intersection point (CrossPoint) are described as examples. And the user fills the related information of the coverage points and the intersection points into the configuration file, so that the script can automatically detect the related information of the function points and generate corresponding coverage group codes. In one application scenario, the aforementioned configuration file may take the form of, for example, table 1 below.
TABLE 1
By way of example, this table 1 describes a plurality of item information, wherein a first row (Template) represents a Template of a configuration file, and in a second row, for example, a function point (overlay point or intersection point) and its related information can be recorded. In one application scenario, the key information of the function point may be recorded in column 1 of the second row. For example, in column 1 of the second row, is a coverage point key ("CoverPoint"), then columns 2-8 of the second row may record information about the coverage point. For example, the third row, column 1, records a keyword ("CrossPoint") for the intersection, and columns 2 through 8 of the third row may record information about the intersection. The information related to the coverage point may include a coverage point name (CvpName), a variable name (SmpVariable) corresponding to the coverage point, a variable bit width (VrbW) of the coverage point, a bin (UserDefBins) associated with the coverage point, weight information (Weight) of the bin corresponding to the coverage point, coverage condition information (Iff), and Comment information (command). The information related to the intersection may include: the cross point name (CRSName), the variable name (CrsCvps) corresponding to the cross point, the variable bit width (VrbW), the bin (UserDefBins) associated with the cross point, the Weight information (Weight) of the bin corresponding to the cross point, the cross condition information (Iff), and the Comment information (Comment). That is, in the configuration file, information of one function point (coverage point or intersection point) is recorded for each line. Further, a plurality of function points may be included in the configuration file. For example, the second row in table 1 records a coverage point and the third row records an intersection point, it will be appreciated that more rows may be added to table 1 to record more coverage points or intersection points
In addition to the above information about coverage points and intersection points, the configuration file may also include item names, such as TopTestPlan shown in the fourth row of table 1, which are not typically specially processed in generating the coverage group code. The profile also includes the overlay group name, such as the Chapter shown in the fifth line of table 1. In a general verification environment, coverage of multiple coverage groups needs to be collected, so a script supports data tables of multiple configuration files, each data table can correspond to one coverage group, and character strings filled in after a Chapter can be used to generate coverage group names, for example, the filling content of a fifth row is Chapter: dem_ cvgrp _0, where the string dem_ cvgrp _0 represents a specific overlay group name, the code may be written by "covergroup cvgrp _dem_ cvgrp _0" when the overlay group code is generated. The configuration file further includes a package handle, such as item PktHd in the sixth line of table 1, and since the variables of the collection overlay group in the verification environment are all from other components (components), the characters after PktHd can be added to the overlay group code in a unified manner when the code is generated by the script. For example, the sixth line is PktHd: pkt, the character pkt may be added to the code in unison when the overlay code is generated.
Further, the file format in table 1 is just a simple example of a configuration file format, and those skilled in the art may use files in different formats or forms according to requirements. For example, the user may take the form of recording function points by column, instead of by row, according to filling habits.
The foregoing describes in detail an exemplary representation of a configuration file in the present solution, and next describes a process of generating a corresponding overlay group code based on the function point information contained in the entry of the configuration file. The application can use script to detect the configuration file, thereby writing the function point information recorded in the configuration file into the overlay group file (or the overlay group code).
In one implementation scenario, automatically generating overlay group code based on SystemVerilog grammar from scripts may take the following format:
(1) Overlay point or intersection name;
(2) Variable names to be covered, or coverage point names to be crossed;
(3) Covering condition information or cross condition information;
(4) A bin enumeration associated with a coverage point, or a bin enumeration associated with a cross point, and corresponding weight information.
For example, a coverage group code may be generated in the form of:
in the above-described overlay group code, the first row covergroup indicates the overlay group name "CovPort", and the second row "cover_ind" indicates the overlay point name, as shown in the above-described format (1); coverpoint pkt indicates the variable name "ind" to be covered, as shown in the above-described format (2); the overlay condition information or the cross-condition information (as shown in the above-described format (3)) may be written in the second row (the above-described code does not contain the corresponding condition information). The third to fifth rows indicate the information of the bin associated with the coverage point or the bin associated with the intersection, and the sixth row indicates the coverage point weight information or the intersection weight information, as shown in the above-described format (4).
The foregoing describes the manner in which the corresponding overlay group codes are generated from the configuration file, and the scheme of the present application will be described in detail below in connection with different situations.
Fig. 2 illustrates a method flow of extracting information corresponding to each entry in the aforementioned configuration file to generate an overlay group code according to an embodiment of the present application.
In an application scenario, as shown in fig. 2, the method S102 for extracting information corresponding to each entry in the configuration file to generate an overlay group code may include the following steps: step 201 is performed to extract first information recorded in a first field in each entry of the aforementioned configuration file, and second information (such as information of the second row 2 to the 8 th column in table 1) recorded in at least one second field, where the first information may include key information, and the key information includes, by way of example, a function point key (such as an overlay point key of the second row 1 st column in table 1), and the second information may include a function point name, a variable name corresponding to the function point, a variable bit width, and a bin associated with the function point. Next, step S202 is executed to match the first information with the specified keyword, and if the matching is successful, a corresponding coverage group code is generated according to the first information and the second information. Further, the foregoing matching of the first information with the specified keyword may include both the matching of the first information with the specified keyword corresponding to the coverage point and the matching of the first information with the specified keyword corresponding to the intersection point. The scheme of the present application will be explained next from the keyword matching process of the coverage point and the intersection point, respectively.
Fig. 3 shows a flow chart of a method of extracting functional point related information.
As shown in fig. 3, taking table 1 as an example, after the configuration file is obtained, step S301 is performed to determine the number of valid rows and columns in the configuration file (at least the rows or columns in the contents of the formats (1) - (4) are recorded). Then, step S302 is executed to traverse all the valid rows of the configuration file row by row, and read out the information recorded in the 1 st column in each row, so as to facilitate the subsequent judgment of the keyword information. The column 1 of the configuration file in which the related information of the function point is recorded may store the keyword information of the coverage point or the intersection, and when the keyword information of the coverage point is recorded, steps S303 and S304 are executed; when the keyword information of the intersection is recorded, steps S305 and S306 are performed. The case will be explained next.
In the foregoing traversal process, step S303 is executed to perform coverage point keyword matching. If it is determined that the information related to the coverage point is stored in the valid row according to the key word of the 1 st column, the information in each column next in the row is sequentially read, step S304 is executed, and the information related to the coverage point is obtained according to the data storage sequence in the configuration file. For example, the overlay point name CvpName may be acquired from the 2 nd column of the second row of the above table 1, the variable name SvVariable corresponding to the overlay point may be acquired from the 3 rd column, the variable bit Width may be acquired from the 4 th column, the bin Bins associated with the overlay point may be acquired from the 5 th column, the user-defined overlay point Weight information Weight may be acquired from the 6 th column, the overlay condition information Iff may be acquired from the 7 th column, and the overlay point Comment information command may be acquired from the 8 th column, thereby acquiring the information related to the overlay point, that is, the information corresponding to the above second field. The content of the second information included in the second field can be obtained in the above manner, and if information such as numbers, data intervals and the like is recorded in the second field for recording the bins associated with the coverage points, one or more bins in the coverage group code corresponding to the System Verilog grammar can be automatically generated according to the preset. This part of the content will be described in detail in the following.
In another application scenario, as shown in fig. 3, in the process of performing traversal, step S305 is performed, after matching the keyword of the 1 st column with the specified keyword and determining that the information related to the intersection is recorded in the valid row, step S306 is performed, and then information in each next column in the row is sequentially read. For example, according to the data storage order in the configuration file, the intersection name CrsName may be acquired from column 2 of the third row of the above table 1, the variable name CRSCVPNMS corresponding to the intersection may be acquired from column 3, the variable bit Width may be acquired from column 4, the bin Bins associated with the user intersection may be acquired from column 5, the user-defined intersection Weight information Weight may be acquired from column 6, the intersection condition information Iff may be acquired from column 7, and the intersection annotation information command may be acquired from column 8.
The above describes the manner of acquiring the relevant information of each function point in the configuration file, and the agreed manner of generating the overlay group code according to the relevant information of the function point. Next, the generation process of the coverage group code in the present application will be described in detail according to one practical application example.
Fig. 4 shows a schematic diagram of a configuration file in an embodiment according to the application.
As shown in fig. 4, the user inputs information related to the coverage points and the intersection points according to the profile format, and obtains a corresponding profile, for example, an Excel table shown in fig. 4. By using the traversing mode of the configuration file, the information recorded in the configuration file can be obtained.
In an application scenario, as shown in fig. 4, in the configuration file, it is detected that "CoverPoint" is recorded in column 1 of row 11 (for example, column number in fig. 4), and the "CoverPoint" is matched with a keyword of a coverage point, so that it is determined that information of the coverage point is recorded in the row, and then content of the second information, that is, information related to the coverage point, is continuously acquired. Specifically, the information about the coverage point in the 11 th row includes: the overlay point name cov _base_a is obtained from column 2, the variable name var_a corresponding to the overlay point is obtained from column 3, the variable bit width is obtained from column 4, the bin value associated with the user overlay point is obtained from column 5 as "0,1", the user-defined overlay point weight information is obtained from column 6 as 2, the overlay condition information is obtained from column 7 as rst_sel= =0, and the overlay point annotation information is obtained from column 8 as 0:value 0 1:value 1. After the information related to the coverage points is acquired, the information can be written into the coverage group codes in turn according to a corresponding mode. For example, from the information recorded in this 11 th line, the following code may be generated:
In the above code, the overlay roll name cov _base_a obtained from the 2 nd column of the configuration file is written into the underlined position of the label sheet, namely the name corresponding to the part of the overlay group in the code; writing the variable name var_a corresponding to the coverage point obtained from the 3 rd column into the code marked by double underlines The position is the variable name corresponding to the coverage point; the variable bit width obtained from column 4 may not be processed; the "0,1" of the bin detection associated with the user coverage point is obtained from column 5 is processed and then written into the positions in the third and fourth rows in the above code (here, for illustrative purposes only, since there are various cases of information recorded in the bin associated with the coverage point or intersection, not described here, and described in detail in the following); writing the user-defined coverage weight information 2 obtained from column 6 into the location marked by the dotted line, i.e./>Is a content part of (2); in the coverage group codes, the bin generated according to the information recorded in the bin associated with the coverage point and the codes generated according to the weight information are written into a bracket; the name rst_sel= 0 of the global variable, which is the overlay condition information acquired from column 7, is written to the line box labeled/>Is a position of (2); annotation information 0:value 0 1:value 1 for the overlay point taken from column 8 is written to wavy line/>, in the codeThe marked position is preceded by "//", thereby indicating that the content is annotation information.
The above describes a manner in which the script generates the overlay group code from the related information of the overlay point recorded in the detection profile, and a description will be continued in the following specific example in a manner similar to the above manner with respect to the manner in which the overlay group code is generated from the related information of the intersection point.
In the second information mentioned in the above, the information recorded in the bin associated with the coverage point will correspond to the generation of the bin expressed by the SV syntax or the enumerated bin, and the information recorded in the bin associated with the intersection will generate the corresponding bin, and the manner of generating the corresponding code of the bin will be explained in detail below.
The content recorded in the bin associated with the coverage point includes a plurality of different cases, and the code generation modes corresponding to the different cases are respectively described:
In the first case, the second field for recording the bin associated with the coverage point has recorded therein: one number or a plurality of numbers, wherein any two numbers in the plurality of numbers are separated by a first separator; and when the coverage group code is generated, a bin is generated according to each digit, and the bin value is equal to the corresponding digit.
For example, a number "0" is recorded in the second field for recording the bin associated with the coverage point, and then the code of the bin corresponding to the number generator is bin b0= {0}.
As an example, a plurality of digits may be recorded simultaneously in a second field for recording bins associated with the coverage point, and the different digits are separated by a first separator, the first separator being comma ",". For example, the bin value associated with the coverage point in column 5 of row 12 in fig. 4 is "0,1". Two numbers are included, each of which forms a corresponding bin. Examples of codes are as follows:
In the above code, bin b0 of the coverage point and its bin value 0 are recorded in the third row, denoted by bin b0= {0} and then bin b1 of the coverage point and its bin value 1 in the fourth row, denoted by bin b1= {1 }. By way of example, if the numbers recorded in bins associated with recording coverage points are separated by a first separator, such as "0,1", then when generating coverage group codes using SV syntax, a bin is generated from the number 0 with a bin value of 0; another bin is generated from the number 1, with a bin value of 1. The script generates different bins when the first separator is detected, for example, in the example above, dividing 0 and 1 into two rows, i.e., when a first separator is detected, then opening one row again; it will be appreciated that if there are 2 first separators, then 3 rows may be divided and corresponding 3 bins may be generated, and if there are 3 first separators, then 4 rows may be divided and corresponding 4 bins may be generated.
In a second case, the second field for recording the bin associated with the coverage point has recorded therein: one or more first data intervals, wherein any two first data intervals in the plurality of first data intervals are separated by a first separator; and generating a bin according to each first data interval when the coverage group code is generated, wherein the bin value is equal to the range indicated by the first data interval.
For example, a first data interval "1:3" is recorded in a second field for recording the bin associated with the coverage point, wherein a colon "is passed between two digits in the first data interval: and dividing, wherein the code for generating the corresponding bin according to the first digital interval is bin b 0= { [1:3] }.
In addition, the second field may further include at least one number, and the first data section and the number are separated by a first separator, on the basis that the first data section is recorded in the second field. As an example, as in line 13 in fig. 4, the information of the coverage point includes: the overlay point name cov _base_bin_1 is acquired in column 2, the variable name var_a corresponding to the overlay point is acquired in column 3, the variable bit width is 32 in column 4, the user overlay point weight information is acquired in column 5, the user-defined overlay point weight information is 2 in column 6, the overlay condition information is rst_sel= 0 in column 7, and the overlay point annotation information is not cont value with diff bins in column 8.
Generating a corresponding coverage group code according to the information comprises:
//not cont value with diff bins
cov_base_bin_1:coverpoint pkt.var_a iff(pkt.rst_sel==0){
bins b0={[1:3]};
bins b1={5};
option.weight=2;}
Note information of the overlay point is recorded in a first row, and the overlay point name, the variable name corresponding to the overlay point, and the overlay condition information are recorded in a second row in the set order. In the above code, when the bin b0 of the coverage point and the data sections 1 to 3 thereof are recorded in the third line, the bin corresponding to the third line is generated and represented by bin b0= { [1:3] }. In addition, if a number 5 is recorded in addition to the data section and separated from the data section by a comma (i.e., the first separator), a bin b1 corresponding to the coverage point and its bin value 5 are generated from the number 5, and are represented by bin b 1= {5}, in addition to the bin corresponding to the data section.
In summary, in the second field for recording the bin associated with the coverage point, if employed "," at least two digits apart, or at least two data intervals, or a combination of digits and data intervals, then "may be used to distinguish between multiple bins when generating the code".
The manner in which one or more digits, one or more data sections, at least one data section, and at least one digit are recorded in the second field for recording the bin associated with the overlay point and the overlay group code is generated from the content is described above, and a case in which a digit with a specified symbol or wild card is recorded in the second field for recording the bin associated with the overlay point will be described next.
In a third case, the second field for recording the bin associated with the coverage point has recorded therein: at least one first data set, wherein the first data set comprises a second data interval and a number, and the second data interval and the number are separated by a combination bin designation symbol; in generating the overlay group code, a bin is generated from each first data set, the bin value being equal to the second data interval and number contained in the first data set.
For example, in line 14 of FIG. 4, a first data set { [1:3] |5}, where the second data interval 1-3 and number 5 are separated by the designated symbol "|", and the second data interval and number Luo Lieyu "{ }" are recorded in the second field for recording the bin associated with the coverage point. When detecting the configuration file, when detecting the "{ }", combining the second data interval [1:3] and the number 5 separated by the "|" in the "{ }" into one bin, wherein the corresponding generated coverage group codes are as follows:
//not cont value with one bins
cov_base_bin2:coverpoint pkt var_a iff{pkt.rst_se1==0){
bins b0={[1:3],5}
}
By way of example, one number and data interval, number and number, or data interval and data interval may be combined by "|" to generate one bin when generating the overlay group code. The contents following "///" in the first row of the code are that the overlay point annotation information is "not cont value with one bins", and the second row is that the overlay point name base_bin2, the variable name var_a corresponding to the overlay point, and the overlay condition information rst_se1= 0.
In a fourth case, the second field for recording the bin associated with the coverage point has recorded therein: a first byte of a bit width key, a wild card, and a number.
In one application scenario, if a bit width key (e.g., "4' b"), wild card (e.g., ".
For example, in line 17 of Figure 4, the warehouse records "3'b?? 1, 3'b1??". If it is detected that the warehouse associated with the coverage point records the bit width keyword "3'b", wildcard character "?", and number "1", the corresponding code can be generated based on the wildcard number in the warehouse. The code generated by "3'b?? 1" can be in the form of wildcard bins b0={3'b?? 1}, and the code generated by "3'b1??" can be in the form of wildcard bins b1={3'b1??}, then the code can be represented in the following form:
Among them, there are two first bytes recorded in the warehouse of the coverage point recorded in line 17, which are "3'b??1,3'b1??" respectively. These two first bytes are separated by a first delimiter (such as ","), so that when generating the coverage group code automatically, a corresponding warehouse is generated based on each first byte.
In a fifth case, the second field for recording the bin associated with the coverage point has recorded therein: a first sequence comprising at least two digits, the digits being connected by a hop designation symbol (e.g., "= >").
In some application scenarios, a sequence covering a change to a certain variable value may be required to identify a certain function, so that a situation that numbers in a bin jump, for example, a change sequence from 0 to 1 to 2, may be expressed in a form of "0= > 1= > 2".
For example, two first sequences, respectively, "0= >1" and "1= >3", are recorded in bins associated with corresponding coverage points in line 18 in fig. 4, and represent first sequences that jump from 0 to 1 and first sequences that jump from 1 to 3, where when the coverage group code is automatically generated, the corresponding bins expressed by SV syntax are generated according to the first sequences when the first sequences are detected, and are respectively bin b 0= { 0= >1}, and bin b 1= { 1= >3}. The coverage group code generated from the first sequence is as follows:
In summary, if the first separator is recorded in the second field for recording the bin associated with the coverage point, for example, ", when generating the coverage group code, the data, the first data section, the first byte, the first sequence and/or the second data section separated by the first separator are listed as one bin, and then the coverage group code corresponding to the bin is generated through the SV grammar.
In addition to the above five cases, the following special cases are included:
in a sixth case, the second field for recording the bin associated with the coverage point has recorded therein: individual bin keys and corresponding data ranges.
For example, in the present application, an individual bin keyword Split is defined, and a corresponding data range is indicated by brackets "()" where the data range is the value of the individual bin or the individual bin to be generated. For example, recorded in line 15 of the figure is Split (0:7), the corresponding coverage group code is generated according to the individual bin key and the corresponding data range as follows:
The above coverage group code is generated in such a way that, in the second field in which the bin associated with the coverage point is acquired, the individual bin key (split) and the corresponding data range (0:7) are recorded, then a bin is generated in the coverage group code, and the bin value is equal to the data range ([ 0:7 ]).
In a seventh case, the second field for recording the bin associated with the coverage point has recorded therein: a multi-bin enumeration key (one-hot) and corresponding enumeration number. For example for an 8-bit address bus, this bin may be recorded as one_hot (8). For more bit variables to write codes in the above form, the enumeration workload increases with increasing bit width, for simplicity, the multi-bin enumeration key may be defined as one_hot and the numbers filled in with "()" after the parentheses enumeration key one_hot. The code generated for one_hot (32) recorded in the corresponding bin of line 16 in fig. 4 is recorded as follows:
/>
specifically, in the above code, since the number of brackets () after the multi-bin enumeration key one_hot is detected to be 32, in addition to the information such as the coverage point annotation information and the coverage point name in the first and second rows, and the plurality of bins starts to be enumerated in the bracket in the third row, the 32 bins are enumerated correspondingly, and in the bin value of each generated bin, 32 represents the number of bits information to be enumerated, and the bits corresponding to the bins can be recorded after h.
In an eighth case, the second field for recording the bin associated with the coverage point records: a variable bit key (one_host_wildcard) and a corresponding variable bit width number, bin value number.
In some application scenarios, it may be desirable to cover the situation where all bits of a variable appear 1, such as a variable 4 bits wide, care that all bits appear 1, may be represented by the above-mentioned wildcard (e.g., ". The key one_hot_holdcard_0 () is defined corresponding to the case where the overlay needs to appear 0, thereby generating the corresponding overlay group code.
For example, in lines 19 and 20 of Figure 4, One_hot_wildcard-0 (3) and One_hot_wildcard_1 (3) are recorded, respectively. If the variable bit width number in One_hot_wildcard-0 (3) is 3, it is necessary to cover all cases where 0 appears in the bits. When the One_hot_wildcard-0() and the number 3 in parentheses are detected, three corresponding bins will be generated when generating the coverage group code. The bin values in each bin are 3'b??0, 3'b?0?, 3'b0??. In the process of generating coverage group code, a bin expressed in SV syntax is generated based on the variable width number and bin value number. The corresponding coverage group codes that can be generated by One_hot_wildcard-0 (3) and One_hot_wildcard_1 (3) are as follows:
In the bin listed in the previous code, in the 4-bit wide variable, the order from low bit to high bit is the first bit, second bit, third bit, and fourth bit. Among them, "3'b??0" indicates that there is a 0 in the first bit, "3'b?0?" indicates that there is a 0 in the second bit, and "3'b0??" indicates that there is a 0 in the third bit. "3'b??1" indicates that the first bit appears as 1, "3'b?1?" indicates that the second bit appears as 1, and "3'b1??" indicates that the third bit appears as 1.
The above are several cases of generating a corresponding overlay group code for the overlay point related information, and a manner of generating the overlay group code from the related information of the intersection will be described in detail.
The configuration file may further include information related to the intersection, and the information corresponding to each entry in the configuration file is extracted and a coverage group code is generated. The information related to the intersection includes first information and second information, the first information includes the aforementioned intersection key, and the second information may include the name of the intersection, the variable name corresponding to the intersection, the variable bit width, and the bin associated with the intersection. In addition, the second information may further include user-defined cross-weight information, cross-condition information, and annotation information. The process of generating the corresponding overlay group code according to the information such as the variable name, the variable bit width, etc. corresponding to the intersection point in the above second information is similar to the case of the overlay point, and will not be described in detail here.
In the generating of the overlay group code, if the second field for recording the bin associated with the intersection is recorded with: based on the first statement of the SV grammar, the first statement is copied into the corresponding overlay group code. As an example, the first statement is used to indicate some combinations that need to be ignored when crossing coverage types and coverage points, for example, if two combinations of cover_kined=0 and cover_port=0, and cover_kined=1 and cover_port=1 are ignored, can be represented by the following first statement:
ignore_bins bin0=binsof(cover_kind)intersect{0}&&binsof(cover_port).intersect{0};
ignore_bins bin1=binsof(cover_kind)intersect{1}&&binsof(cover_port)intersect{1};
Wherein bin0 represents a bin corresponding to ignore cover_kine=0 and cover_port=0; bin1 represents a bin corresponding to ignore cover_kine=1 and cover_port=1. It can be seen that the plurality of content recorded in the second field of the bin associated with the record cross point, which need to be ignored, can pass "; "(referred to as a second separator) so that when generating the coverage group code, different bins are generated correspondingly, respectively.
As shown in fig. 4, what needs to be ignored, that is, ignore_bins ba= binsof (cov _base_a) intersect {0} and ignore_ binsba = binsof (cov base _a) intersect {0} & binsof (cov _base_b) intersect {0} are recorded in the 24 th and 25 th lines, respectively.
From this content, an overlay group code may be generated as follows:
Further, if the record in the second field for recording the bin associated with the intersection or coverage point is empty, the corresponding bin is not generated, but other information for that function point needs to be written into the coverage group code. In an application scenario, if the information in the bin associated with the record intersection in line 23 in fig. 4 is empty, other relevant intersection names, weight information and the like are directly written into the code according to the method, but the code segment does not contain corresponding bin value information. For example, from the information about the intersection recorded in this 23 rd line, the following code form can be generated:
//base cross
cross_base_ab:cross cov_base_a,cov_base_b{
option.weight=4;}
The above describes in detail the provisioning mode or the generation rule of the corresponding overlay group code according to the configuration file in the present application. It will be appreciated that the foregoing conventions or generation rules are exemplary and not limiting and may be adjusted by one skilled in the art based on actual requirements.
In addition to the above description of the information of the bin or the like associated with the function point in the second information, the information of the item name, the overlay group name or the like recorded in the configuration file is detected, and these contents are written in the overlay group code. In one implementation scenario, topTestPlan is recorded as in line 7 in FIG. 4: DEM, line 8 records the overlay group name Chapter: dem_ cvgrp _0. If the TopTestPlan item, i.e., item name, is detected and the item name DEM is obtained, and the overlay group name Chapter item is obtained and the item name dem_ cvgrp _0 is obtained, these contents are written into the code. For example, according to detected TopTestPlan above: DEM and Chapter: dem_ cvgrp _0, covergroup cvgrp _dem_ cvgrp _0 will be written in the code, this part of the content usually being at the beginning of the code segment. In addition, the packet handle recorded in line 9 of fig. 4, pktHd: when the script generates the code, the script will directly write the content into the code, such as "pkt. Var_a", "pkt. Var_c", etc., in the various embodiments described above.
According to the method for generating the coverage group, provided by the application, the information in the configuration file can be detected by the script only by filling the information of the functional points to be covered or crossed into the configuration file by a user, and the corresponding coverage group codes are automatically generated, so that the accuracy and the generation efficiency of the coverage group codes are effectively improved, and the reliability guarantee is provided for improving the engineering test efficiency.
The foregoing describes the whole content of the method for generating the coverage group, and according to another aspect of the present application, an embodiment of the present application further provides an apparatus for generating the coverage group, where an internal structure diagram may be shown in fig. 5. The device is a computer device and comprises a processor, an internal memory, a communication interface, a display screen and an input device which are connected through a system bus. The processor of the computer equipment is used for providing calculation and control capability, and various varieties such as CPU, singlechip, DSP or FPGA can be selected. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The steps described in the method embodiments described above may be accomplished when a computer program is executed. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a method of generating a coverage group. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 5 is merely a block diagram of a portion of the structure associated with aspects of the present application and is not intended to limit the computer device of the present application, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
According to yet another aspect of the present application, an embodiment of the present application further provides a computer readable storage medium having stored thereon a computer program, which when executed by a processor, implements the method of generating a coverage group in the above embodiment. The storage medium may include various existing storage media such as nonvolatile and/or volatile memory.
It should be noted that, for the sake of simplicity, the present application represents some methods and embodiments thereof as a series of acts and combinations thereof, but it will be understood by those skilled in the art that the aspects of the present application are not limited by the order of acts described. Thus, those skilled in the art will appreciate, in light of the present disclosure or teachings, that certain steps thereof may be performed in other sequences or concurrently. Further, those skilled in the art will appreciate that the embodiments described herein may be considered as alternative embodiments, i.e., wherein the acts or modules involved are not necessarily required for the implementation of some or all aspects of the present application. In addition, the description of some embodiments of the present application is also focused on according to the different schemes. In view of this, those skilled in the art will appreciate that portions of one embodiment of the application that are not described in detail may be referred to in connection with other embodiments.
In particular implementations, based on the disclosure and teachings of the present application, those skilled in the art will appreciate that several embodiments of the present disclosure may be implemented in other ways not disclosed herein. For example, in terms of the foregoing embodiments of the electronic device or apparatus, the units are split in consideration of the logic function, and there may be another splitting manner when actually implemented. For another example, multiple units or components may be combined or integrated into another system, or some features or functions in the units or components may be selectively disabled. In terms of the connection relationship between different units or components, the connections discussed above in connection with the figures may be direct or indirect couplings between the units or components. In some scenarios, the foregoing direct or indirect coupling involves a communication connection utilizing an interface, where the communication interface may support electrical, optical, acoustical, magnetic, or other forms of signal transmission.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application. It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, it is intended that the present application also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (9)

1. A method of generating a coverage group, comprising:
Acquiring a configuration file, wherein one or more items are recorded in the configuration file, and at least one first item comprises information corresponding to a functional point of a coverage group, wherein the functional point comprises a coverage point or a cross point;
Extracting information corresponding to each first item to generate an overlay group code, including extracting first information recorded in a first field in each first item and second information recorded in at least one second field, wherein the first information comprises keyword information, the second information comprises function point names, variable names corresponding to the function points, variable bit widths and bins associated with the function points, the first information is matched with a specified keyword, and if matching is successful, the corresponding overlay group code is generated according to the first information and the second information.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
If the second field for recording the bin associated with the coverage point records: one number or a plurality of numbers, wherein any two numbers in the plurality of numbers are separated by a first separator;
And when the coverage group code is generated, a bin is generated according to each digit, and the bin value is equal to the corresponding digit.
3. A method according to claim 1 or 2, characterized in that,
If the second field for recording the bin associated with the coverage point records: one or more first data intervals, wherein any two first data intervals in the plurality of first data intervals are separated by a first separator;
and generating a bin according to each first data interval when the coverage group code is generated, wherein the bin value is equal to the range indicated by the first data interval.
4. The method of claim 1, wherein the step of determining the position of the substrate comprises,
If the second field for recording the bin associated with the coverage point records: a first byte of bit width keys, wild cards and numbers; then, upon generation of the coverage group code, a bin expressed by SV syntax is generated from the first byte.
5. The method of claim 1, wherein the step of determining the position of the substrate comprises,
If the second field for recording the bin associated with the coverage point records: the first sequence comprises at least two numbers, and the numbers are connected through jump designated symbols;
Then, in generating the coverage group code, a bin expressed by SV syntax is generated based on the first sequence.
6. The method of claim 1, wherein the step of determining the position of the substrate comprises,
If the second field for recording the bin associated with the coverage point records: individual bin keys and corresponding data ranges,
And when the coverage group code is generated, generating a corresponding SV grammar expressed bin according to the data range, wherein the bin value is equal to the data range.
7. The method of claim 1, wherein the step of determining the position of the substrate comprises,
If the second field for recording the bin associated with the coverage point records: a multi-bin enumeration key and corresponding enumeration number;
then a number of bins equal to the number of enumerated numbers are generated when the overlay group code is generated.
8. The method of claim 1, wherein the step of determining the position of the substrate comprises,
If the second field for recording the bin associated with the coverage point records: variable bit keywords and corresponding variable bit width digits and bin value digits;
And generating bins expressed in SV grammar according to the variable bit width numbers and bin value numbers when generating the coverage group codes.
9. An apparatus for generating an overlay group, comprising a processor and a memory, the memory storing a computer program that, when executed by the processor, performs the method of any one of claims 1-8.
CN202110838255.5A 2021-07-23 2021-07-23 Method and equipment for generating coverage group Active CN113705150B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110838255.5A CN113705150B (en) 2021-07-23 2021-07-23 Method and equipment for generating coverage group

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110838255.5A CN113705150B (en) 2021-07-23 2021-07-23 Method and equipment for generating coverage group

Publications (2)

Publication Number Publication Date
CN113705150A CN113705150A (en) 2021-11-26
CN113705150B true CN113705150B (en) 2024-06-04

Family

ID=78650362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110838255.5A Active CN113705150B (en) 2021-07-23 2021-07-23 Method and equipment for generating coverage group

Country Status (1)

Country Link
CN (1) CN113705150B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5642521A (en) * 1993-06-22 1997-06-24 Casio Computer Co., Ltd. Data processing apparatus for extracting and processing arbitrary records from a file
CN105302573A (en) * 2015-11-20 2016-02-03 浪潮集团有限公司 Method for building function point matching setting automation platform for function verification platform
CN108897724A (en) * 2018-07-03 2018-11-27 天津芯海创科技有限公司 Function schedule determines method and device
GB2577102A (en) * 2018-09-14 2020-03-18 Advanced Risc Mach Ltd Generation of code coverage information during testing of a code sequence
CN112560390A (en) * 2020-12-23 2021-03-26 海光信息技术股份有限公司 Method, device and equipment for automatically generating ignore bin in cross coverage point

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10521547B2 (en) * 2017-10-20 2019-12-31 Mentor Graphics Corporation Covergroup network analysis
US10846455B2 (en) * 2018-03-10 2020-11-24 Synopsys, Inc. Automatic definition and extraction of functional coverage metric for emulation-based verification
US11579195B2 (en) * 2018-11-20 2023-02-14 Micron Technology, Inc. Automated verification code generation based on a hardware design and design data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5642521A (en) * 1993-06-22 1997-06-24 Casio Computer Co., Ltd. Data processing apparatus for extracting and processing arbitrary records from a file
CN105302573A (en) * 2015-11-20 2016-02-03 浪潮集团有限公司 Method for building function point matching setting automation platform for function verification platform
CN108897724A (en) * 2018-07-03 2018-11-27 天津芯海创科技有限公司 Function schedule determines method and device
GB2577102A (en) * 2018-09-14 2020-03-18 Advanced Risc Mach Ltd Generation of code coverage information during testing of a code sequence
CN112560390A (en) * 2020-12-23 2021-03-26 海光信息技术股份有限公司 Method, device and equipment for automatically generating ignore bin in cross coverage point

Also Published As

Publication number Publication date
CN113705150A (en) 2021-11-26

Similar Documents

Publication Publication Date Title
CN107807982B (en) Consistency checking method and device for heterogeneous database
CN106294134B (en) The collapse localization method and device of code
US20070133067A1 (en) Forming a master page for an electronic document
CN101976318A (en) Detection method of code similarity based on digital fingerprints
CN106294222A (en) A kind of method and device determining PCIE device and slot corresponding relation
US20070204215A1 (en) Device for analyzing log files generated by process automation tools
CN112364637B (en) Sensitive word detection method and device, electronic equipment and storage medium
CN104731896A (en) Data processing method and system
CN102959538B (en) Index to document
KR20180105546A (en) Element-noun reference numeral acquiring method for acquiring element-noun reference numeral of claim-element-noun
CN110427884A (en) The recognition methods of the document structure of an article, device, equipment and storage medium
US7779377B2 (en) Method and apparatus for aiding verification of circuit, and computer product
CN104156373B (en) Coded format detection method and device
CN108153728A (en) A kind of keyword determines method and device
CN113705150B (en) Method and equipment for generating coverage group
CN110377566A (en) Arrange the method and system of the S parameter test file of PCB
CN115542067A (en) Fault detection method and device
CN110287338B (en) Industry hotspot determination method, device, equipment and medium
CN109508390B (en) Input prediction method and device based on knowledge graph and electronic equipment
JP3604977B2 (en) Bus interface circuit creation device and recording medium
JP6052801B2 (en) System, method and program for associating description items between documents
CN107305522A (en) The apparatus and method detected for the repetition collapse to application program
CN109669875A (en) Application crash test method and device, electronic equipment and storage medium
CN112566005B (en) Audio chip testing method and device, electronic equipment and storage medium
CN107908724A (en) A kind of data model matching process, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant