CN104484270A - Method for verifying airborne embedded operating system software - Google Patents
Method for verifying airborne embedded operating system software Download PDFInfo
- Publication number
- CN104484270A CN104484270A CN201410741379.1A CN201410741379A CN104484270A CN 104484270 A CN104484270 A CN 104484270A CN 201410741379 A CN201410741379 A CN 201410741379A CN 104484270 A CN104484270 A CN 104484270A
- Authority
- CN
- China
- Prior art keywords
- operating system
- operating systems
- software
- files
- test
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000012360 testing method Methods 0.000 claims abstract description 22
- 238000010998 test method Methods 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 4
- 239000012792 core layer Substances 0.000 abstract 1
- 239000010410 layer Substances 0.000 abstract 1
- 238000009413 insulation Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
Landscapes
- Debugging And Monitoring (AREA)
Abstract
The invention provides a method for verifying airborne embedded operating system software. By the aid of the method, kernel units of airborne embedded operating systems can be isolated from one another during tests, and problems which occur when test activities are executed by target machines and then structural coverage of source codes is analyzed can be solved. The method includes that codes of the operating systems are used as operating environments, duplicates of the codes of the operating systems are used as tested objects, the codes of the operating systems are operated in core layers of the operating systems, and the duplicates of the codes of the operating systems are operated in application layers of the operating systems. The method has the advantages that the problem of incapability of uploading existing dynamic execution result files can be solved by the aid of a process for remapping files; the problem that the existing dynamic execution result files cannot be completely uploaded can be solved by the aid of a process for manually opening and closing dynamic execution result files in instrumentation files and then uploading the files onto hosts to analyze the files; the problem of incapability of acquiring inline library file execution results can be solved by the aid of a process for modifying inline file types into *.c file types.
Description
Technical field:
The present invention relates to a kind of verification method of airborne embedded OS software.
Background technology:
Along with progressively improving of China's military aircraft security requirement and pushing forward comprehensively of civil aircraft seaworthiness work, to when taking embedded OS as the checking of airborne basic software of representative, on the basis taking into account this kind of complex software feature, the i.e. requirement of demand fulfillment GJB, the again requirement of demand fulfillment DO-178B.
According to GJB and DO-178B, need to test software unit and parts, and these unit and parts and other module should be isolate.The software unit of embedded operating system kernel module does not allow user directly to access, and cannot carry out unit testing; If the attribute of amendment kernel unit, makes them directly can be accessed by user, although can test them, because they also may be called by operating system itself, so cannot ensure the insulation request to them.This problem needs to solve.
According to GJB and DO-178B, need to carry out structural coverage analysis (SCA) to software source code.The test activity of airborne embedded OS software performs in target machine environment; This situation result in that Dynamic Execution destination file can not be uploaded, Dynamic Execution destination file uploads three problems such as imperfect, inline library file Dynamic Execution destination file cannot obtain, and causes structural coverage analysis to carry out, and this problem needs to solve.
Summary of the invention:
The present invention is used for airborne embedded OS software verification, can solve isolating problem during airborne embedded operating system kernel unit testing, and target machine perform structural coverage analysis carries out to source code after test activity time produced problem.
Technical scheme of the present invention is as follows:
The verification method of airborne embedded OS software, is divided into and tests software unit and parts and to carry out these two aspects of structural coverage analysis to software source code; Wherein
Software unit and parts are tested, adopt operating system code as running environment, operating system code copy is as measurand simultaneously, and the former operates in operating system kernel layer (lower floor), and the latter operates in operating system application layer (upper strata); Operating system application layer APP is made up of a operating system nucleus module copied specially and test procedure; Described measurand is exactly software unit in this layer of kernel module and parts, only tested routine call;
Carrying out structural coverage analysis to software source code, is first on host, carry out pitching pile with instrument to the software source code of * .c document form; Then the file after pitching pile and test procedure are loaded on target machine in the lump and run, carry out dynamic test; Finally, the execution result file generated after test is passed back host, carries out coverage rate analysis.
Advantage of the present invention:
This method can solve the isolating problem when kernel unit and unit test that run in airborne embedded OS testing authentication process, and the Dynamic Execution destination file occurred during SCA can not upload problem, Dynamic Execution destination file uploads imperfect problem and can not obtain the Dynamic Execution destination file problem of inline library file.
Use the checking activity that this method is carried out, present stage China's military standard (GJB) can either be met to the requirement of software test, the requirement to software verification in seaworthiness DO-178B can be met again, taking into account military and civilian, is the testing authentication method of a kind of practicality of embedded OS software in airborne system and equipment.
Accompanying drawing illustrates:
Fig. 1 is kernel unit and unit test pattern diagram.
Embodiment:
(1) solution of isolating problem when kernel unit and unit test
Fig. 1 is the test pattern of kernel unit and parts.The operating system (OS and API) that lower floor runs provides support for upper layer application (APP); Upper strata APP is made up of a operating system nucleus module copied specially and test procedure (Test Procedure); The measurand that test procedure calls is exactly software unit in this layer of kernel module and parts, and the latter is tested routine call only, not by lower level operations system call, thus reaches insulation request.
In order to ensure that the tested kernel unit called and parts and hardware have nothing to do, need function relevant with hardware for kernel module in the APP of upper strata to be carried out piling process.Before test procedure performs, also need to carry out kernel module initialization operation.
(2) solution of produced problem during SCA
To the overall flow that airborne embedded OS software carries out SCA be: first use instrument to carry out pitching pile to software source code (* .c) on host; Then the file after pitching pile and test procedure are loaded on target machine in the lump and run, carry out dynamic test; Finally, the execution result file generated after test is passed back host, carries out coverage rate analysis.The problem that this process runs into and corresponding solution as follows:
The first, Dynamic Execution destination file can not upload problem.Because the pitching pile of dynamic test instrument completes on host, the dynamic test of application program also completes usually on host, so the catalogue acquiescence of the execution result file generated after dynamic test is the catalogue on host.Operating system software test execution needs to perform in target machine environment, and target machine environment can not resolve host catalogue, therefore can not obtain Dynamic Execution destination file.The solution of this problem is that the storing directory of Dynamic Execution destination file in pitching pile file is changed to the catalogue of target machine.
The second, Dynamic Execution destination file uploads imperfect problem.Under host environment, the Dynamic Execution destination file opened, just in this locality, does not need to upload; Destination file can accomplish instant write, immediately reads; Even if not close file, also result can be obtained.But, under target machine environment, the Dynamic Execution destination file opened must be closed, otherwise imperfect during this files passe host.The solution of this problem first by hand in pitching pile file, closes Dynamic Execution destination file, and then this file is uploaded on host analyze.
3rd, the Dynamic Execution destination file problem of inline library file (* .inl) can not be obtained.Embedded OS, in order to improve operational efficiency, contains many inline storehouses in kernel.This class file when compiling not direct compilation be file destination, but the function prototype in the place of calling the directly inline storehouse of use is replaced, therefore directly can not obtain the Dynamic Execution result of this class file.The solution of this problem is first * .c file by this type of file amendment, and then carry out SCA activity.
Claims (1)
1. a verification method for airborne embedded OS software, is divided into and tests software unit and parts and to carry out these two aspects of structural coverage analysis to software source code; Wherein
Test software unit and parts, adopt operating system code as running environment, operating system code copy is as measurand simultaneously, and the former operates in operating system kernel layer, and the latter operates in operating system application layer; Operating system application layer APP is made up of a operating system nucleus module copied specially and test procedure; Described measurand is exactly software unit in this layer of kernel module and parts, only tested routine call;
Carrying out structural coverage analysis to software source code, is first on host, carry out pitching pile with instrument to the software source code of * .c document form; Then the file after pitching pile and test procedure are loaded on target machine in the lump and run, carry out dynamic test; Finally, the execution result file generated after test is passed back host, carries out coverage rate analysis.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410741379.1A CN104484270A (en) | 2014-12-05 | 2014-12-05 | Method for verifying airborne embedded operating system software |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410741379.1A CN104484270A (en) | 2014-12-05 | 2014-12-05 | Method for verifying airborne embedded operating system software |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN104484270A true CN104484270A (en) | 2015-04-01 |
Family
ID=52758814
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201410741379.1A Pending CN104484270A (en) | 2014-12-05 | 2014-12-05 | Method for verifying airborne embedded operating system software |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN104484270A (en) |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7065677B1 (en) * | 2003-04-10 | 2006-06-20 | Microsoft Corporation | Method for testing operating system components |
| CN101699408A (en) * | 2008-05-09 | 2010-04-28 | 北京泰得思达科技发展有限公司 | Method for testing integration of multiple operation systems |
| CN101833500A (en) * | 2010-04-07 | 2010-09-15 | 南京航空航天大学 | An Agent-based Intelligent Testing Method for Embedded Software |
| CN102243610A (en) * | 2011-08-09 | 2011-11-16 | 广东省电力调度中心 | Operating system test method and test system |
| CN102541739A (en) * | 2011-12-31 | 2012-07-04 | 曙光信息产业股份有限公司 | Test method and device of Linux operating system |
| CN102567187A (en) * | 2010-12-07 | 2012-07-11 | 北京广利核系统工程有限公司 | Method for executing SCADE (security-critical application development environment) test object by use of C++ test |
| CN102968377A (en) * | 2012-12-13 | 2013-03-13 | 中国航空无线电电子研究所 | Virtual machine technique based airborne software system testing general platform |
| CN103019921A (en) * | 2011-09-20 | 2013-04-03 | 中国人民解放军63928部队 | Operating system fault tolerance testing system and method based on fault injection |
-
2014
- 2014-12-05 CN CN201410741379.1A patent/CN104484270A/en active Pending
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7065677B1 (en) * | 2003-04-10 | 2006-06-20 | Microsoft Corporation | Method for testing operating system components |
| CN101699408A (en) * | 2008-05-09 | 2010-04-28 | 北京泰得思达科技发展有限公司 | Method for testing integration of multiple operation systems |
| CN101833500A (en) * | 2010-04-07 | 2010-09-15 | 南京航空航天大学 | An Agent-based Intelligent Testing Method for Embedded Software |
| CN102567187A (en) * | 2010-12-07 | 2012-07-11 | 北京广利核系统工程有限公司 | Method for executing SCADE (security-critical application development environment) test object by use of C++ test |
| CN102243610A (en) * | 2011-08-09 | 2011-11-16 | 广东省电力调度中心 | Operating system test method and test system |
| CN103019921A (en) * | 2011-09-20 | 2013-04-03 | 中国人民解放军63928部队 | Operating system fault tolerance testing system and method based on fault injection |
| CN102541739A (en) * | 2011-12-31 | 2012-07-04 | 曙光信息产业股份有限公司 | Test method and device of Linux operating system |
| CN102968377A (en) * | 2012-12-13 | 2013-03-13 | 中国航空无线电电子研究所 | Virtual machine technique based airborne software system testing general platform |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10180899B2 (en) | Device for automatically generating test cases for embedded software using symbolic and concrete execution | |
| CN110162977B (en) | A system and method for vulnerability detection of Android vehicle terminal system | |
| US10387627B2 (en) | Systems and methods for analyzing software | |
| CN103514023B (en) | The method and system that a kind of virtual machine off-line automatic software is installed | |
| US9535814B2 (en) | Dynamic border line tracing for tracking message flows across distributed systems | |
| CN102413010B (en) | Testing environment deployment method and device | |
| US9292417B2 (en) | System and method for hypervisor breakpoints | |
| US20160124728A1 (en) | Collecting profile data for modified global variables | |
| CN109471697B (en) | Method, device and storage medium for monitoring system call in virtual machine | |
| US20150234700A1 (en) | System Level Memory Leak Detection | |
| US20170147471A1 (en) | Isolating production environment debugging sessions | |
| CN103345419A (en) | Dynamic evidence obtaining method based on Android platform | |
| CN104408366A (en) | Android application permission usage behavior tracking method based on plug-in technology | |
| WO2019075994A1 (en) | Method, device and system for mock data at ios end, and storage medium | |
| Kowalczyk et al. | Configurations in Android testing: they matter | |
| Zhang et al. | A code protection scheme by process memory relocation for android devices | |
| US9459883B2 (en) | Modifying disk images | |
| CN105488415A (en) | System process scanning method and apparatus | |
| CN103729293A (en) | GUI testing method based on UML activity diagrams | |
| US11036619B2 (en) | Bypassing execution of a module in real-time | |
| CN103049376A (en) | Memory overflow test method, device and equipment of courses | |
| US20200042176A1 (en) | Categorizing computing process output data streams for flash storage devices | |
| US11036852B2 (en) | System and method for software diversification | |
| CN103279334A (en) | Android software rapid dynamic detection device and method | |
| CN109086173B (en) | Equipment test method and device of operating system and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150401 |
|
| RJ01 | Rejection of invention patent application after publication |