Testing on Target: Concepts and Experiences
Author: Jan Peleska and M. Oliver Möller
Abstract:
In this presentation we introduce a method and tool support for executing test
logic partly on the embedded target hardware and partly on a separated host
PC. The modifications of the target are minimally invasive, such that they
preserve the integrity of the target with respect to time and memory resources
to a large extent. The data-intensive part of the test is performed on the
host PC, where time and memory resources can be inexpensively scaled up to meet
demands.
Technically this introduces a small new entity to the target, which
acts as a test agent. The test agent communicates to the PC host via any
available bidirectional channel (e.g. serial line or ethernet). The agent
allows to inject stimulations by manipulating on-target data, stubbing
target-side functions, or making explicit use of a library of driver API.
Test data generation--including stub behavior--and verdict computation are
performed on the host PC.
Compared to classical hardware-in-the-loop (HIL) testing, our method allows a
fine-granular and low-level data manipulation. For instance, error conditions
of hardware interfaces can be simulated on software level, though the software
under test executes on the original target hardware. Moreover, library
and driver layers can be exhaustively tested in their real-time hardware
environment.
The method is based on a configuration syntax, which the test designer uses to
specify the data flow between host and target. If a small number of
prerequisites are met, the test environment automates the joint host/target
configuration and build process. We outline solutions to issues like pointer
treatment and endianess conversion which arise in this context.
We report experiences with this technology from two test projects in the
avionics industry, where software development is subject to certification
according to Do178B. The first project concerns the software part of a
communication library, which connects three separated CPU boards of a A380
cabin controller. The second project addresses a Posix-style operation system
layer executing as one partition of a secure embedded platform, which allows
multiple operating systems and applications to run simultaneously.
PDF file (880KB)