Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Chapter
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Chapter
}
TY - CHAP
T1 - Execution path profiling for OS device drivers: Viability and methodology
AU - Sârbu, C.
AU - Johansson, A.
AU - Suri, Neeraj
PY - 2008
Y1 - 2008
N2 - Operating Systems (OSs) mediate across the hardware and software applications, leading to overall system service provision, but often sacrifice service robustness while favoring increasing feature richness and peripheral support. The OS interface to peripherals is implemented by components termed as Device Drivers (DDs). Unfortunately, despite extensive testing, DDs continue to constitute the prominent cause of system service failures. To find DD's weakness areas, this paper proposes a novel technique for profiling kernel mode DDs execution paths. Such profiles highlight the frequently used parts of a driver for a workload, helping identify redundant tests. The communication interfaces between the OS and DDs are simultaneously monitored, revealing the kernel functions invoked at runtime and the followed code paths. To highlight execution hotspots, a cluster analysis scheme using string similarity metrics is proposed to distribute the code paths into equivalence classes, reflecting the occurrence weights of both kernel functions and code paths. © 2008 Springer-Verlag Berlin Heidelberg.
AB - Operating Systems (OSs) mediate across the hardware and software applications, leading to overall system service provision, but often sacrifice service robustness while favoring increasing feature richness and peripheral support. The OS interface to peripherals is implemented by components termed as Device Drivers (DDs). Unfortunately, despite extensive testing, DDs continue to constitute the prominent cause of system service failures. To find DD's weakness areas, this paper proposes a novel technique for profiling kernel mode DDs execution paths. Such profiles highlight the frequently used parts of a driver for a workload, helping identify redundant tests. The communication interfaces between the OS and DDs are simultaneously monitored, revealing the kernel functions invoked at runtime and the followed code paths. To highlight execution hotspots, a cluster analysis scheme using string similarity metrics is proposed to distribute the code paths into equivalence classes, reflecting the occurrence weights of both kernel functions and code paths. © 2008 Springer-Verlag Berlin Heidelberg.
KW - Black-box testing
KW - Cluster analysis
KW - Code path profiling
KW - Device driver
KW - Operating system
KW - Computer hardware
KW - Function evaluation
KW - User interfaces
KW - Computer operating systems
U2 - 10.1007/978-3-540-68129-8_9
DO - 10.1007/978-3-540-68129-8_9
M3 - Chapter
SN - 3540681280
SN - 9783540681281
VL - 5017 LNCS
SP - 90
EP - 109
BT - Service Availability
ER -