<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>vunit &amp;mdash; csantosb</title>
    <link>https://infosec.press/csantosb/tag:vunit</link>
    <description>Random thoughts</description>
    <pubDate>Fri, 22 May 2026 17:48:48 +0000</pubDate>
    <item>
      <title>ci (sourcehut): open-logic</title>
      <link>https://infosec.press/csantosb/ci-sourcehut</link>
      <description>&lt;![CDATA[img br/&#xA;Remote #ci is the way to go in #modernhw digital design testing. In this #ciseries, let’s see how to implement it with detail using sourcehut and a real world example. !--more-- br/&#xA;Sourcehut is a lightweight #gitforge where I host my #git repositories. Not only it is based on a paradigm perfectly adapted to #modernhw, but also its builds service includes support for guix (x8664) images. This means that we will be able to execute all of our testing online inside guix profiles, shells or natively on top of the bare-bones image. br/&#xA;&#xA;Open logic&#xA;&#xA;Let’s see how in detail using the cookbook as a starting point, and taking as a complete example the fw-open-logic #openlogic firmware package which comes with the electronics guix channel. br/&#xA;Get it with: br/&#xA;&#xA;guix install fw-open-logic:out&#xA;&#xA;Open logic is a useful #vhdl library of commonly used components, implemented in a reusable and vendor/tool-independent way.  As any other #modernhw library, it includes tests sets for any of its components, using the vunit utility in this case. br/&#xA;To run the full tests suite use (user wide using the default $GUIXPROFILE), install its dependencies, defined in a manifest.scm file (ghdl-clang and python-vunit in this case). br/&#xA;&#xA;cd open-logic&#xA;guix install -m .builds/manifest.scm&#xA;cd sim&#xA;python3 run.py --ghdl -v&#xA;&#xA;or local to the project, using a profile br/&#xA;&#xA;cd open-logic&#xA;mkdir deps&#xA;export GUIXPROFILE=open-logic/deps&#xA;guix install -P $GUIXPROFILE -m .builds/manifest.scm&#xA;. $GUIXPROFILE/etc/profile&#xA;cd sim&#xA;python3 run.py --ghdl -v&#xA;&#xA;go remote&#xA;&#xA;img br/&#xA;Now, how do we proceed online using #sourcehut #ci builds facility ? Builds will pop up a new environment based on an up to date guix-system image when we push a commit to git.sr.ht, provided we include a .build.yml build manifest file, or by a .build folder with up to 4 build manifest files, at the root of the git project 1]. Be careful: consider that this image is [built daily using a crontab job, which is a good and a bad thing at the same time. From one side, you won’t be using the same environment for your tests, which breaks #reproducibility (see comments section below). On the other side, #guix is a rolling release, and new fancy features and new fixes are added every day. Keep this in mind. br/&#xA;Let’s create a .builds folder in a topic test branch, with the following contents: br/&#xA;&#xA;    manifest.scm, list of dependencies in our project br/&#xA;    guix.scm, default guix repository, redundant, included here for convenience br/&#xA;    channels.scm, list of guix channels remote repositories, in addition to the default guix repository, from where we pull packages br/&#xA;    We will be using here my own electronics channel (no substitutes), as well as the guix science channel (which provides substitutes). br/&#xA;    (note how here we load the local guix.scm file, instead of making use of the %default-channels global variable) br/&#xA;    &#xA;        (load &#34;guix.scm&#34;)&#xA;    ;;; %default-channels&#xA;        key.pub, auth key to access substitutes of packages in guix channels br/&#xA;&#xA;build manifests&#xA;&#xA;From now on, every new push to the test #git branch will trigger the execution of the tasks defined in the three build manifest files br/&#xA;&#xA;    profile1 br/&#xA;    profile2 br/&#xA;    shell1 br/&#xA;&#xA;The two profile build manifest files use a slightly different approach, and are given here for comparison purposes only. The shell build manifest uses an isolated shell container within the image itself to illustrate this feature. br/&#xA;Inside the manifests, I declare the image to use, guix, and the global environment variables sourced before each task is run: prj (project name), srv (list of servers with substitutes), manifest and channels (pointing to the corresponding files) and key (same). It is important to declare a trigger action, to receive an email with all relevant information in case of failure (log, id, commit, etc.). br/&#xA;&#xA;tasks&#xA;&#xA;What’s interesting here is the list of tasks. Some of them are common to all three manifests br/&#xA;&#xA;    env, useful only for debugging br/&#xA;    guix\updatechannels, replace the default project local guix.scm file by the output of br/&#xA;    &#xA;        guix describe --format=channels&#xA;        &#xA;    The goal here is avoid pulling latest guix upstream, useless and cpu and time consuming, and using the local version instead. Remember that the guix system image we are using here is updated daily. br/&#xA;    &#xA;        guix\auth, runs the authorize command to add the key.pub file to guix, so that we will be able to download package substitutes when necessary br/&#xA;        &#xA;                sudo guix archive --authorize &lt; &#34;$key&#34;&#xA;                &#xA;        Here, one may opt by doing a br/&#xA;        &#xA;                guix pull --channels=&#34;$channels&#34;&#xA;                &#xA;        as in profile2, to set the revision of the guix channels we are using (remember channels are nothing but git repositories). br/&#xA;        Note how in profile1 and shell1 we opt for a different approach. br/&#xA;        guix\updateprofile, where we create a deps folder to be used as a local $GUIXPROFILE (defined in .envrc). br/&#xA;        Then, one of br/&#xA;        &#xA;                # profile1&#xA;        guix time-machine --channels=&#34;$channels&#34; -- \&#xA;             package -p &#34;$GUIXPROFILE&#34; \&#xA;             --substitute-urls=&#34;$srv&#34; \&#xA;             -m &#34;$manifest&#34;&#xA;                &#xA;        or br/&#xA;        &#xA;                # profile2&#xA;        guix \&#xA;            package -p &#34;$GUIXPROFILE&#34; \&#xA;            --substitute-urls=&#34;$srv&#34; \&#xA;            -m &#34;$manifest&#34;&#xA;                &#xA;        will install packages in $manifest into the $GUIXPROFILE. I’m using here the time-machine mechanism to set the revision of the guix channels, depending if guix pull was run in the previous stage or not. br/&#xA;        vunit, sets env variables in .envrc and runs python3 run.py --ghdl -v inside sim directory br/&#xA;        Note that here, we are using ghdl-clang and python-vunit packages, provided respectively by guix-science and the electronics channel. br/&#xA;        guix\shelltest, used by shell1, make use of time-machine (no former guix pull, then), to create a shell container, where to install project dependencies. Then, if calls inmediately run.sh to run the unit tests br/&#xA;        &#xA;                guix time-machine --channels=&#34;$channels&#34; -- shell -C --substitute-urls=&#34;$srv&#34; -m &#34;$manifest&#34; -- ./.builds/run.sh&#xA;        &#xA;&#xA;comments&#xA;&#xA;You may check the logs of profile1, profile2 and shell1 manifests, including a section with logs per task, to better understand what’s going on here. Remember that #sourcehut gives ssh access to the builds by connecting to the runners in case of failures, which provides a practical way of debugging the manifest files. br/&#xA;You may see how, using the remove guix image, it is possible to deploy a series of tasks to test our #modernhw design as we develop it: we will get an email in case of failure to pass the tests. Here, I present three approaches: guix pulling to set the repositories revisions on use; time-machine, to achieve the same, and guix shell to create an isolated container. These three alternatives are not necessary here, of course, but are given as a simple and practical demo of what can be achieved with #guix, #sourcehut and #ci. br/&#xA;To conclude this long post, it is important to stress once again that the point on using #guix resides in its reproducibility capabilities. By keeping a couple of #plaintext files, namely the manifest.scm and channels.scm, one can obtain #determinism in the execution of the tests. Even if the guix image is upgraded and rebuilt daily (and so it changes), by fixing the revision of our channels (remember, guix pull or guix time-machine) we obtain always the same products out of our tests, as we run the same (project and tests) code, within exactly the same environment. br/&#xA;&#xA;---&#xA;&#xA;[1] It is also possible to automatically submit builds when a patch to a repo with build manifests is sent to a mailing list. This is achieved by appending the project name as a prefix to the subject of the message, for example [PATCH project-name]. br/]]&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://git.sr.ht/~csantosb/csbwiki/blob/master/pics/sourcehut.png" alt="img"> <br/>
Remote <a href="/csantosb/tag:ci" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ci</span></a> is the <a href="https://infosec.press/csantosb/tag:ciseries" rel="nofollow">way to go</a> in <a href="/csantosb/tag:modernhw" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">modernhw</span></a> digital design testing. In this <a href="/csantosb/tag:ciseries" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ciseries</span></a>, let’s see how to implement it with detail using <a href="https://sourcehut.org/" rel="nofollow">sourcehut</a> and a real world example.  <br/>
<a href="https://infosec.press/csantosb/sourcehut-crash-course" rel="nofollow">Sourcehut</a> is a lightweight <a href="/csantosb/tag:gitforge" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">gitforge</span></a> where I host my <a href="/csantosb/tag:git" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">git</span></a> repositories. Not only it is <a href="https://infosec.press/csantosb/git-forges#sourcehut" rel="nofollow">based on a paradigm</a> perfectly adapted to <a href="/csantosb/tag:modernhw" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">modernhw</span></a>, but also its <a href="https://infosec.press/csantosb/sourcehut-crash-course#builds" rel="nofollow">builds</a> service includes support for <a href="https://man.sr.ht/builds.sr.ht/compatibility.md#guix-system" rel="nofollow">guix</a> (x86_64) images. This means that we will be able to execute all of our testing online inside <a href="https://infosec.press/csantosb/guix-crash-course#profiles-and-generations" rel="nofollow">guix profiles</a>, <a href="https://infosec.press/csantosb/guix-crash-course#shell-containers" rel="nofollow">shells</a> or natively on top of the bare-bones image. <br/></p>

<h1 id="open-logic">Open logic</h1>

<p>Let’s see how in detail using the <a href="https://man.sr.ht/~whereiseveryone/builds.sr.ht-guix-cookbook/" rel="nofollow">cookbook</a> as a starting point, and taking as a complete example the <code>fw-open-logic</code> <a href="/csantosb/tag:openlogic" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">openlogic</span></a> firmware package which comes with the <a href="https://infosec.press/csantosb/guix-channels#electronics-channel" rel="nofollow">electronics guix channel</a>. <br/>
Get it with: <br/></p>

<pre><code class="language-sh">guix install fw-open-logic:out
</code></pre>

<p><a href="https://github.com/open-logic/open-logic" rel="nofollow">Open logic</a> is a useful <a href="/csantosb/tag:vhdl" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">vhdl</span></a> library of commonly used components, implemented in a reusable and vendor/tool-independent way.  As any other <a href="/csantosb/tag:modernhw" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">modernhw</span></a> library, it includes tests sets for any of its components, using the <a href="https://infosec.press/csantosb/on-testing#vunit" rel="nofollow">vunit</a> utility in this case. <br/>
To run the full tests suite use (user wide using the default <code>$GUIX_PROFILE</code>), install its dependencies, defined in a <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds/manifest.scm" rel="nofollow">manifest.scm</a> file (<code>ghdl-clang</code> and <code>python-vunit</code> in this case). <br/></p>

<pre><code class="language-sh">cd open-logic
guix install -m .builds/manifest.scm
cd sim
python3 run.py --ghdl -v
</code></pre>

<p>or local to the project, using <a href="https://infosec.press/csantosb/guix-crash-course#profiles-and-generations" rel="nofollow">a profile</a> <br/></p>

<pre><code class="language-sh">cd open-logic
mkdir _deps
export GUIX_PROFILE=open-logic/_deps
guix install -P $GUIX_PROFILE -m .builds/manifest.scm
. $GUIX_PROFILE/etc/profile
cd sim
python3 run.py --ghdl -v
</code></pre>

<h2 id="go-remote">go remote</h2>

<p><img src="https://git.sr.ht/~csantosb/csbwiki/blob/master/pics/ci2.png" alt="img"> <br/>
Now, how do we proceed online using <a href="/csantosb/tag:sourcehut" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">sourcehut</span></a> <a href="/csantosb/tag:ci" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ci</span></a> <code>builds</code> facility ? <a href="https://infosec.press/csantosb/sourcehut-crash-course#builds" rel="nofollow">Builds</a> will pop up a new environment based on an up to date <code>guix-system</code> image when we push a commit to <code>git.sr.ht</code>, provided we include a <code>.build.yml</code> build manifest file, or by a <code>.build</code> folder with up to 4 build manifest files, at the root of the git project [1]. Be careful: consider that this image is <a href="https://git.sr.ht/~sircmpwn/builds.sr.ht/tree/master/item/images/guix" rel="nofollow">built daily</a> using a <a href="https://git.sr.ht/~sircmpwn/builds.sr.ht/tree/master/item/contrib/crontab" rel="nofollow">crontab</a> job, which is a good and a bad thing at the same time. From one side, you won’t be using the same environment for your tests, which breaks <a href="/csantosb/tag:reproducibility" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">reproducibility</span></a> (see <strong>comments</strong> section below). On the other side, <a href="/csantosb/tag:guix" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">guix</span></a> is a rolling release, and new fancy features and new fixes are added every day. Keep this in mind. <br/>
Let’s create a <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds" rel="nofollow">.builds</a> folder in a topic <code>test branch</code>, with the following contents: <br/></p>

<p>    <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds/manifest.scm" rel="nofollow">manifest.scm</a>, list of dependencies in our project <br/>
    <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds/guix.scm" rel="nofollow">guix.scm</a>, default guix repository, redundant, included here for convenience <br/>
    <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds/channels.scm" rel="nofollow">channels.scm</a>, list of <a href="https://infosec.press/csantosb/guix-channels" rel="nofollow">guix channels</a> remote repositories, in addition to the default guix repository, from where we pull packages <br/>
    We will be using here my own <a href="https://infosec.press/csantosb/guix-channels#electronics-channel" rel="nofollow">electronics channel</a> (no substitutes), as well as the <a href="https://codeberg.org/guix-science/guix-science" rel="nofollow">guix science</a> channel (which provides substitutes). <br/>
    (note how here we load the local <code>guix.scm</code> file, instead of making use of the <code>%default-channels</code> global variable) <br/></p>

<p>    <code>scheme
    (load &#34;guix.scm&#34;)
    ;;; %default-channels
</code>
    <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds/key.pub" rel="nofollow">key.pub</a>, <a href="https://man.sr.ht/~whereiseveryone/builds.sr.ht-guix-cookbook/" rel="nofollow">auth key</a> to access <a href="https://infosec.press/csantosb/guix-crash-course#packages" rel="nofollow">substitutes</a> of packages in guix channels <br/></p>

<h3 id="build-manifests">build manifests</h3>

<p>From now on, every new push to the <code>test</code> <a href="/csantosb/tag:git" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">git</span></a> branch will trigger the execution of the tasks defined in the three <a href="https://man.sr.ht/builds.sr.ht/#build-manifests" rel="nofollow">build manifest files</a> <br/></p>

<p>    <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds/profile1.yml" rel="nofollow">profile1</a> <br/>
    <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds/profile2.yml" rel="nofollow">profile2</a> <br/>
    <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds/shell1.yml" rel="nofollow">shell1</a> <br/></p>

<p>The two profile build manifest files use a slightly different approach, and are given here for comparison purposes only. The shell build manifest uses an isolated shell container <em>within</em> the image itself to illustrate this feature. <br/>
Inside the manifests, I declare the image to use, <code>guix</code>, and the global environment variables sourced before each task is run: <code>prj</code> (project name), <code>srv</code> (list of servers with substitutes), <code>manifest</code> and <code>channels</code> (pointing to the corresponding files) and <code>key</code> (same). It is important to declare a trigger action, to receive an email with all relevant information in case of failure (log, id, commit, etc.). <br/></p>

<h3 id="tasks">tasks</h3>

<p>What’s interesting here is the list of tasks. Some of them are common to all three manifests <br/></p>

<p>    <strong>env</strong>, useful only for debugging <br/>
    <strong>guix__update__channels</strong>, replace the default project local <code>guix.scm</code> file by the output of <br/></p>

<p>    <code>sh
    guix describe --format=channels
</code></p>

<p>    The goal here is avoid pulling latest guix upstream, useless and cpu and time consuming, and using the local version instead. Remember that the guix system image we are using here is <a href="https://git.sr.ht/~sircmpwn/builds.sr.ht/tree/master/item/images/guix" rel="nofollow">updated daily</a>. <br/></p>

<p>        <strong>guix__auth</strong>, runs the authorize command to add the <code>key.pub</code> file to guix, so that we will be able to download package substitutes when necessary <br/></p>

<p>        <code>sh
        sudo guix archive --authorize &lt; &#34;$key&#34;
</code></p>

<p>        Here, one may opt by doing a <br/></p>

<p>        <code>sh
        guix pull --channels=&#34;$channels&#34;
</code></p>

<p>        as in <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds/profile2.yml" rel="nofollow">profile2</a>, to set the revision of the guix channels we are using (remember channels are nothing but git repositories). <br/>
        Note how in <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds/profile1.yml" rel="nofollow">profile1</a> and <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds/shell1.yml" rel="nofollow">shell1</a> we opt for a different approach. <br/>
        <strong>guix__update__profile</strong>, where we create a <code>_deps</code> folder to be used as a local <code>$GUIX_PROFILE</code> (defined in <code>.envrc</code>). <br/>
        Then, one of <br/></p>

<p>        <code>sh
        # profile1
        guix time-machine --channels=&#34;$channels&#34; -- \
             package -p &#34;$GUIX_PROFILE&#34; \
             --substitute-urls=&#34;$srv&#34; \
             -m &#34;$manifest&#34;
</code></p>

<p>        or <br/></p>

<p>        <code>sh
        # profile2
        guix \
            package -p &#34;$GUIX_PROFILE&#34; \
            --substitute-urls=&#34;$srv&#34; \
            -m &#34;$manifest&#34;
</code></p>

<p>        will install packages in <code>$manifest</code> into the <code>$GUIX_PROFILE</code>. I’m using here the <a href="https://infosec.press/csantosb/guix-crash-course#time-machine" rel="nofollow">time-machine</a> mechanism to set the revision of the guix channels, depending if <code>guix pull</code> was run in the previous stage or not. <br/>
        <strong>vunit</strong>, sets env variables in <code>.envrc</code> and runs <code>python3 run.py --ghdl -v</code> inside <code>sim</code> directory <br/>
        Note that here, we are using <code>ghdl-clang</code> and <code>python-vunit</code> packages, provided respectively by <code>guix-science</code> and the <code>electronics</code> channel. <br/>
        <strong>guix__shell__test</strong>, used by <a href="https://git.sr.ht/~csantosb/ip.open-logic/tree/test/item/.builds/shell1.yml" rel="nofollow">shell1</a>, make use of <code>time-machine</code> (no former <code>guix pull</code>, then), to create a <a href="https://infosec.press/csantosb/guix-crash-course#time-machine%23shell-containers" rel="nofollow">shell container</a>, where to install project dependencies. Then, if calls inmediately <code>run.sh</code> to run the unit tests <br/></p>

<p>        <code>sh
        guix time-machine --channels=&#34;$channels&#34; -- shell -C --substitute-urls=&#34;$srv&#34; -m &#34;$manifest&#34; -- ./.builds/run.sh
</code></p>

<h2 id="comments">comments</h2>

<p>You may check the logs of <a href="https://builds.sr.ht/~csantosb/job/1384658" rel="nofollow">profile1</a>, <a href="https://builds.sr.ht/~csantosb/job/1384659" rel="nofollow">profile2</a> and <a href="https://builds.sr.ht/~csantosb/job/1384660" rel="nofollow">shell1</a> manifests, including a section with logs per task, to better understand what’s going on here. Remember that <a href="/csantosb/tag:sourcehut" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">sourcehut</span></a> gives <a href="https://man.sr.ht/builds.sr.ht/build-ssh.md" rel="nofollow">ssh access</a> to the builds by connecting to the runners in case of failures, which provides a practical way of debugging the manifest files. <br/>
You may see how, using the remove guix image, it is possible to deploy a series of tasks to test our <a href="/csantosb/tag:modernhw" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">modernhw</span></a> design as we develop it: we will get an email in case of failure to pass the tests. Here, I present three approaches: <code>guix pulling</code> to set the repositories revisions on use; <code>time-machine</code>, to achieve the same, and <code>guix shell</code> to create an isolated container. These three alternatives are not necessary here, of course, but are given as a simple and practical demo of what can be achieved with <a href="/csantosb/tag:guix" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">guix</span></a>, <a href="/csantosb/tag:sourcehut" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">sourcehut</span></a> and <a href="/csantosb/tag:ci" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ci</span></a>. <br/>
To conclude this long post, it is important to stress once again that the point on using <a href="/csantosb/tag:guix" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">guix</span></a> resides in its <a href="https://infosec.press/csantosb/use-guix#reproducibility" rel="nofollow">reproducibility</a> capabilities. By keeping a couple of <a href="/csantosb/tag:plaintext" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">plaintext</span></a> files, namely the <a href="https://infosec.press/csantosb/guix-crash-course#manifest-channels" rel="nofollow">manifest.scm and channels.scm</a>, one can obtain <a href="/csantosb/tag:determinism" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">determinism</span></a> in the execution of the tests. Even if the guix image is upgraded and rebuilt daily (and so it changes), by fixing the revision of our channels (remember, <code>guix pull</code> or <code>guix time-machine</code>) we obtain always the same products out of our tests, as we run the same (project and tests) code, within exactly the same environment. <br/></p>

<hr>

<p>[1] It is also possible to automatically submit builds when a patch to a repo with build manifests is sent to a mailing list. This is achieved by appending the project name as a prefix to the subject of the message, for example [PATCH project-name]. <br/></p>
]]></content:encoded>
      <guid>https://infosec.press/csantosb/ci-sourcehut</guid>
      <pubDate>Fri, 13 Dec 2024 10:18:11 +0000</pubDate>
    </item>
    <item>
      <title>ci (intro)</title>
      <link>https://infosec.press/csantosb/ci-intro</link>
      <description>&lt;![CDATA[img br/&#xA;How to seek, detect, be notified, analyze logs, understand and react to the different possible kind of issues one may encounter in a digital design is a vast topic of research, well beyond the scope of this modest post. But there are a couple of things we may state about here, though: automatizing issue detection is the way to go. Continuous integration (#ci) testing is a practice to adopt in #modernhw as a way to ensure that our design complies with its constraints. Let’s see this in more detail. !--more-- br/&#xA;&#xA;git&#xA;&#xA;We said #git, then, as mandatory when tracking changes (in documentation, project development, taking notes, etc.). Meaningful changes imply new commits (and good commit messages, for what it takes), but this comes along with a risk of introducing issues. Some kind of mechanism is necessary to automatize the execution of a checkout list to be run per new commit. The list is project aware, for sure, but may also be different following the git branch, and even the kind of commit (merges are to be considered differently to regular commits in topic branches, for example). We need to consider what an issue exactly is, and then you’ll need to adopt a different perspective on kinds of checkout lists. br/&#xA;&#xA;verification&#xA;&#xA;First (ideally), one starts with clear specifications about the goals of current development effort (in practice this never happens in research, and if you ever have it, they’ll evolve with time). These specifications (you’ll figure out where to find them somehow) will define the tests to run. For example, if you need to implement in firmware a deep neural network, you’ll probably have access to a test data set to verify the outcomes are correct. You may tune, improve or even completely change the architecture of your network, at the very end, you’ll have to verify your design with help of the test data set. Additionally, you may define more sophisticated tests: consumption, area, resources, etc. These all fall into the category of verification testing. br/&#xA;&#xA;unit tests&#xA;&#xA;Secondly, you’ll be running unit tests during your whole design cycle (and they’ll evolve along with it), and target tests (the one we mentioned just before). Does this addition perform correctly ? What if we stress a module with random inputs ? Are we going through all code in a given design unit ? Do we cover all values of some input/output signal in this important module ? These are all unit testing checkouts, and they’ll help us to detect issues in an early stage of design. br/&#xA;&#xA;codesign&#xA;&#xA;Codesign falls somewhere in between the two previous: as a testing methodology, it includes concepts of verification and unit testing (and can be combined with them). It is way more ambitious and complex, but also more powerful. No matter your testing strategy, the point here is that you’ll be running these tests (fully or partially) automatically at the several different stages of your development cycle. If they fail, you’ll have to be warned. br/&#xA;&#xA;guix&#xA;&#xA;img br/&#xA;Guix, as a package manager, provides all necessary software to deploy our tests (and can be extended with additional tooling). It also includes all that&#39;s necessary to create a running environment where we will execute our tests. Most importantly, #guix does so in a #deterministic and #reproductible way: we will be able to reproduce our tests in the future under exactly the same conditions. Shell containers, profiles and the time machine mechanism allow the degree of #reproducibility we need here. All it takes is a couple of text files. br/&#xA;&#xA;---&#xA;&#xA;Most usually, we will focus on two strategies to seek for issues: local, and remote. Local strategies are greatly based on git hooks, and will be topic of another post. Let’s see now in practice what can be done with help of remote tools, based on #ci, understood as a methodology consisting on automatically executing a set of tests procedures on a digital design. br/&#xA;ciseries br/]]&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://git.sr.ht/~csantosb/csbwiki/blob/master/pics/ci.png" alt="img"> <br/>
How to seek, detect, be notified, analyze logs, understand and react to the <a href="https://infosec.press/csantosb/on-testing" rel="nofollow">different possible kind of issues</a> one may encounter in a digital design is a vast topic of research, well beyond the scope of this modest post. But there are a couple of things we may state about here, though: automatizing issue detection is the way to go. <a href="https://en.wikipedia.org/wiki/Continuous_integration" rel="nofollow">Continuous integration</a> (<a href="/csantosb/tag:ci" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ci</span></a>) testing is a practice to adopt in <a href="/csantosb/tag:modernhw" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">modernhw</span></a> as a way to ensure that our design complies with its constraints. Let’s see this in more detail.  <br/></p>

<h1 id="git">git</h1>

<p>We said <a href="/csantosb/tag:git" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">git</span></a>, then, as mandatory when <a href="https://infosec.press/csantosb/on-dependencies" rel="nofollow">tracking changes</a> (in documentation, project development, taking notes, etc.). Meaningful changes imply new commits (and good <a href="https://www.freecodecamp.org/news/how-to-write-better-git-commit-messages/" rel="nofollow">commit messages</a>, for what it takes), but this comes along with a risk of introducing issues. Some kind of mechanism is necessary to automatize the execution of a checkout list to be run per new commit. The list is project aware, for sure, but may also be different following the git branch, and even the kind of commit (merges are to be considered differently to regular commits in topic branches, for example). We need to consider what an issue exactly is, and then you’ll need to adopt a different perspective on kinds of checkout lists. <br/></p>

<h1 id="verification">verification</h1>

<p>First (ideally), one starts with clear specifications about the goals of current development effort (in practice this never happens in research, and if you ever have it, they’ll evolve with time). These specifications (you’ll figure out where to find them somehow) will define the tests to run. For example, if you need to implement in firmware a deep neural network, you’ll probably have access to a test data set to verify the outcomes are correct. You may tune, improve or even completely change the architecture of your network, at the very end, you’ll <a href="https://infosec.press/csantosb/on-testing#osvvm" rel="nofollow">have to verify your design</a> with help of the test data set. Additionally, you may define more sophisticated tests: consumption, area, resources, etc. These all fall into the category of <strong>verification testing</strong>. <br/></p>

<h1 id="unit-tests">unit tests</h1>

<p>Secondly, you’ll be running <a href="https://infosec.press/csantosb/on-testing#vunit" rel="nofollow">unit tests</a> during your whole design cycle (and they’ll evolve along with it), and target tests (the one we mentioned just before). Does this addition perform correctly ? What if we stress a module with random inputs ? Are we going through all code in a given design unit ? Do we cover all values of some input/output signal in this important module ? These are all <strong>unit testing</strong> checkouts, and they’ll help us to detect issues in an early stage of design. <br/></p>

<h1 id="codesign">codesign</h1>

<p><a href="https://infosec.press/csantosb/on-testing#cocotb" rel="nofollow">Codesign</a> falls somewhere in between the two previous: as a testing methodology, it includes concepts of verification and unit testing (and can be combined with them). It is way more ambitious and complex, but also more powerful. No matter your testing strategy, the point here is that you’ll be running these tests (fully or partially) automatically at the several different stages of your development cycle. If they fail, you’ll have to be warned. <br/></p>

<h1 id="guix">guix</h1>

<p><img src="https://git.sr.ht/~csantosb/csbwiki/blob/master/pics/guix.png" alt="img"> <br/>
<a href="https://infosec.press/csantosb/use-guix" rel="nofollow">Guix</a>, as a package manager, provides all necessary software to deploy our tests (and can be <a href="https://infosec.press/csantosb/guix-channels" rel="nofollow">extended</a> with additional tooling). It also includes <a href="https://infosec.press/csantosb/guix-crash-course" rel="nofollow">all that&#39;s necessary</a> to create a running environment where we will execute our tests. Most importantly, <a href="/csantosb/tag:guix" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">guix</span></a> does so in a <a href="/csantosb/tag:deterministic" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">deterministic</span></a> and <a href="/csantosb/tag:reproductible" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">reproductible</span></a> way: we will be able to reproduce our tests in the future under exactly the same conditions. <a href="https://infosec.press/csantosb/guix-crash-course#shell-containers" rel="nofollow">Shell containers</a>, <a href="https://infosec.press/csantosb/guix-crash-course#profiles-and-generations" rel="nofollow">profiles</a> and the <a href="https://infosec.press/csantosb/guix-crash-course#time-machine" rel="nofollow">time machine mechanism</a> allow the degree of <a href="/csantosb/tag:reproducibility" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">reproducibility</span></a> we need here. All it takes is <a href="https://infosec.press/csantosb/guix-crash-course#manifest-channels" rel="nofollow">a couple of text files</a>. <br/></p>

<hr>

<p>Most usually, we will focus on two strategies to seek for issues: local, and remote. Local strategies are greatly based on <a href="https://git-scm.com/book/ms/v2/Customizing-Git-Git-Hooks" rel="nofollow">git hooks</a>, and will be topic of another post. <a href="https://infosec.press/csantosb/tag:ciseries" rel="nofollow">Let’s see now in practice</a> what can be done with help of remote tools, based on <a href="/csantosb/tag:ci" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ci</span></a>, understood as a methodology consisting on automatically executing a set of tests procedures on a digital design. <br/>
<a href="/csantosb/tag:ciseries" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ciseries</span></a> <br/></p>
]]></content:encoded>
      <guid>https://infosec.press/csantosb/ci-intro</guid>
      <pubDate>Sun, 08 Dec 2024 21:19:43 +0000</pubDate>
    </item>
    <item>
      <title>on testing</title>
      <link>https://infosec.press/csantosb/on-testing</link>
      <description>&lt;![CDATA[img br/&#xA;Creating something new from scratch implies a certain ratio of unpredictable issues (loosely defined in the scope of this post: new errors, regressions, warnings, ... any unexpected behavior one may encounter).  Most important, a digital design developer needs to define somehow what he considers to be a project issue, before even thinking about how to react to it. Luckily, in #modernhw a few usual tools are available to ease the process as a whole. Let’s overview some of them. !--more-- br/&#xA;Here on the electronics digital design side of life, we have mainly three #freesoftware fine tools (among many others) to perform code checking to a large extent: osvvm, cocotb and vunit. They are all compatible with the ghdl compiler, and they are all available from my own #guix electronics channel (cocotb and vunit will hopefully get merged on guix upstream at some point). Each departs from the rest, adopting a different paradigm about how digital design testing should be understood: verification, cosimulation and unit testing are master keywords here. br/&#xA;They are all complementary, so you’ll be able to combine them to test your designs. However, you’ll need to be careful and check twice what you’re doing, as some of their features overlap (random treatment, for example). You’ve been warned. br/&#xA;&#xA;osvvm&#xA;&#xA;First, we have osvvm. #Osvvm is a modern verification #vhdl library using most up-to-date language constructs (by the main contributor to the vhdl standard), and I’ll mention it frequently in this #modernhw posts series. Well documented and being continuously improved, it provides a large set of features for natively verifying advanced designs, among them, a constrained random facility, transactions, logging, functional coverage, scoreboards, FIFOs, sophisticated memory models, etc. Even some co-simulation capabilities are included here. Refer to the documentation repository for up-to-date details about osvvm. br/&#xA;You’ll be able to install osvvm with br/&#xA;&#xA;guix search osvvm&#xA;guix install osvvm-uart osvvm-scripts&#xA;&#xA;You have a simple use of the osvvm vhdl library in the #aludesign, where the random feature is used to inject inputs to a dut unit. Testing runs for as long as every combination of two variables hasn’t been fully covered. This provides a means to be sure that all cases have been tested, regardless of random inputs. You’ll see an example simulation log here, using the remote ci builds facility of sourcehut. br/&#xA;&#xA;vunit&#xA;&#xA;Then, we have Vunit as a complete single point of failure framework. It complements traditional test benches with a software oriented approach, based on the &#34;test early and test often&#34; paradigm, a.k.a. unit testing.  Here, a pre-built library layer on top of the vhdl design scans, runs and logs unit test cases embedded in user test benches. This approach seeks for an early way to detect as soon as possible conception errors. It performs random testing, advanced checking, logging, advanced communication and an advanced api to access the whole from python. It may be called from the command line, adding custom flags, and configured from a python script file where one defines libraries, sources and test parameters. Simple, elegant and efficient as a testing framework, if you want my opinion. Check the documentation for details. br/&#xA;Install it as usual with br/&#xA;&#xA;guix install python-vunit&#xA;&#xA;A clever example of its use is provided by the fw-open-logic firmware package (also included in the electronics channel). When you install it, you’ll need to build the package once, which gets installed in the guix store for you to use. During the process, the whole testing of its constituent modules is performed. You may have an overview of how it goes with: br/&#xA;&#xA;guix build fw-open-logic:out&#xA;&#xA;By the way, if you need the simulation libraries, they are available too. br/&#xA;&#xA;guix install fw-open-logic:out&#xA;# guix install fw-open-logic:sim  # sim libraries&#xA;&#xA;Additionnaly, #vunit is compatible with running a testing #ci pipeline online, as explained here. br/&#xA;&#xA;cocotb&#xA;&#xA;Finally, we have the interesting and original cocotb. It groups several construct providing a set of facilities to implement coroutine-based cosimulation of vhdl designs. Cosimulation, you say ? Yes. It requests on demand #ghdl simulation time from software (python, in this case), dispatching actions as the time advances. Afterward, based on events’ triggers, you’ll stop simulation coming back to software. This forth and back dance goes on, giving access to advanced testing and verification capabilities. Flexible and customizable as much as needed, in my opinion. Go read the documentation to understand how powerful cosumulation approach can reveal. By the way, install it with br/&#xA;&#xA;guix install python-cocotb&#xA;&#xA;---&#xA;&#xA;From the previous, you’ll have understood that having access to verification, unit testing and cosimulation libraries is paramount in #modernhw digital design. Independly or combined (be careful!), they provide powerful tools to detect issues (of any kind) in your design. And yet, this is not enough, as the question arises about where, and when do we run these tests ? From the previous logs in the examples, you’ll have noticed that tests run online in #ci infrastructure. How it goes ? This is the topic of the ci posts in this series. br/]]&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://git.sr.ht/~csantosb/csbwiki/blob/master/pics/testing.png" alt="img"> <br/>
Creating something new from scratch implies a certain ratio of unpredictable issues (loosely defined in the scope of this post: new errors, regressions, warnings, ... any unexpected behavior one may encounter).  Most important, a digital design developer needs to define somehow what he considers to be a project issue, before even thinking about how to react to it. Luckily, in <a href="/csantosb/tag:modernhw" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">modernhw</span></a> a few usual tools are available to ease the process as a whole. Let’s overview some of them.  <br/>
Here on the electronics digital design side of life, we have mainly three <a href="/csantosb/tag:freesoftware" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">freesoftware</span></a> fine tools (among many others) to perform code checking to a large extent: <strong>osvvm</strong>, <strong>cocotb</strong> and <strong>vunit</strong>. They are all compatible with the <a href="https://infosec.press/csantosb/ghdl" rel="nofollow">ghdl compiler</a>, and they are all available from my own <a href="/csantosb/tag:guix" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">guix</span></a> <a href="https://infosec.press/csantosb/guix-channels#electronics-channel" rel="nofollow">electronics channel</a> (<a href="https://issues.guix.gnu.org/68153" rel="nofollow">cocotb</a> and <a href="https://issues.guix.gnu.org/74242" rel="nofollow">vunit</a> will hopefully get merged on <a href="https://infosec.press/csantosb/guix" rel="nofollow">guix upstream</a> at some point). Each departs from the rest, adopting a different paradigm about how digital design testing should be understood: verification, cosimulation and unit testing are master keywords here. <br/>
They are all complementary, so you’ll be able to combine them to test your designs. However, you’ll need to be careful and check twice what you’re doing, as some of their features overlap (random treatment, for example). You’ve been warned. <br/></p>

<h1 id="osvvm">osvvm</h1>

<p>First, we have <a href="https://github.com/OSVVM" rel="nofollow">osvvm</a>. <a href="/csantosb/tag:Osvvm" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">Osvvm</span></a> is a modern verification <a href="/csantosb/tag:vhdl" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">vhdl</span></a> library using most up-to-date language constructs (by the <a href="https://www.linkedin.com/in/jimwilliamlewis" rel="nofollow">main contributor</a> to the <a href="https://gitlab.com/IEEE-P1076" rel="nofollow">vhdl standard</a>), and I’ll mention it frequently in this <a href="/csantosb/tag:modernhw" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">modernhw</span></a> posts series. Well documented and being continuously improved, it provides a large set of features for natively verifying advanced designs, among them, a constrained random facility, transactions, logging, functional coverage, scoreboards, FIFOs, sophisticated memory models, etc. Even some co-simulation capabilities are included here. Refer to the <a href="https://github.com/OSVVM/Documentation#readme" rel="nofollow">documentation repository</a> for up-to-date details about osvvm. <br/>
You’ll be able to install osvvm with <br/></p>

<pre><code class="language-sh"># guix search osvvm
guix install osvvm-uart osvvm-scripts
</code></pre>

<p>You <a href="https://git.sr.ht/~csantosb/ip.alu/tree/test/sim/alu_tb.vhd#L30" rel="nofollow">have a simple use</a> of the osvvm vhdl library in the <a href="/csantosb/tag:aludesign" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">aludesign</span></a>, where the random feature is used to inject inputs to a dut unit. Testing runs for as long as every combination of two variables hasn’t been fully covered. This provides a means to be sure that all cases have been tested, regardless of random inputs. You’ll see an example simulation log <a href="https://builds.sr.ht/query/log/1380968/test_profile/log" rel="nofollow">here</a>, using the <a href="https://infosec.press/csantosb/ci-sourcehut" rel="nofollow">remote ci</a> <a href="https://infosec.press/csantosb/sourcehut-crash-course#builds" rel="nofollow">builds facility</a> of <a href="https://infosec.press/csantosb/sourcehut-crash-course" rel="nofollow">sourcehut</a>. <br/></p>

<h1 id="vunit">vunit</h1>

<p>Then, we have <a href="https://github.com/VUnit/vunit" rel="nofollow">Vunit</a> as a complete single point of failure framework. It complements traditional test benches with a software oriented approach, based on the “test early and test often” paradigm, a.k.a. unit testing.  Here, a pre-built library layer on top of the vhdl design scans, runs and logs unit test cases embedded in user test benches. This approach seeks for an early way to detect as soon as possible conception errors. It performs random testing, advanced checking, logging, advanced communication and an advanced api to access the whole from python. It may be called from the command line, adding custom flags, and configured from a python script file where one defines libraries, sources and test parameters. Simple, elegant and efficient as a testing framework, if you want my opinion. Check the <a href="https://vunit.github.io/" rel="nofollow">documentation</a> for details. <br/>
Install it as usual with <br/></p>

<pre><code class="language-sh">guix install python-vunit
</code></pre>

<p>A clever example of its use is provided by the <code>fw-open-logic</code> firmware package (also included in the <a href="https://infosec.press/csantosb/guix-channels#electronics-channel" rel="nofollow">electronics channel</a>). When you install it, you’ll need to <a href="https://infosec.press/csantosb/guix-crash-course#packages" rel="nofollow">build the package</a> once, which gets installed in the guix store for you to use. During the process, the whole testing of its constituent modules is performed. You may have an overview of how it goes with: <br/></p>

<pre><code class="language-sh">guix build fw-open-logic:out
</code></pre>

<p>By the way, if you need the simulation libraries, they are available too. <br/></p>

<pre><code class="language-sh">guix install fw-open-logic:out
# guix install fw-open-logic:sim  # sim libraries
</code></pre>

<p>Additionnaly, <a href="/csantosb/tag:vunit" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">vunit</span></a> is compatible with running a testing <a href="/csantosb/tag:ci" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ci</span></a> pipeline online, as explained <a href="https://infosec.press/csantosb/ci-sourcehut" rel="nofollow">here</a>. <br/></p>

<h1 id="cocotb">cocotb</h1>

<p>Finally, we have the interesting and original <a href="https://www.cocotb.org/" rel="nofollow">cocotb</a>. It groups several construct providing a set of facilities to implement coroutine-based cosimulation of vhdl designs. Cosimulation, you say ? Yes. It requests on demand <a href="/csantosb/tag:ghdl" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ghdl</span></a> simulation time from software (python, in this case), dispatching actions as the time advances. Afterward, based on events’ triggers, you’ll stop simulation coming back to software. This forth and back dance goes on, giving access to advanced testing and verification capabilities. Flexible and customizable as much as needed, in my opinion. Go read <a href="https://docs.cocotb.org/en/stable/index.html" rel="nofollow">the documentation</a> to understand how powerful cosumulation approach can reveal. By the way, install it with <br/></p>

<pre><code class="language-sh">guix install python-cocotb
</code></pre>

<hr>

<p>From the previous, you’ll have understood that having access to verification, unit testing and cosimulation libraries is paramount in <a href="/csantosb/tag:modernhw" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">modernhw</span></a> digital design. Independly or combined (be careful!), they provide powerful tools to detect issues (of any kind) in your design. And yet, this is not enough, as the question arises about where, and when do we run these tests ? From the previous logs in the examples, you’ll have noticed that tests run online in <a href="/csantosb/tag:ci" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ci</span></a> infrastructure. How it goes ? This is the topic of the <a href="https://infosec.press/csantosb/ci" rel="nofollow">ci posts</a> in this series. <br/></p>
]]></content:encoded>
      <guid>https://infosec.press/csantosb/on-testing</guid>
      <pubDate>Fri, 06 Dec 2024 09:32:14 +0000</pubDate>
    </item>
  </channel>
</rss>