[SystemSafety] State of the art for "safe Linux"

Martyn Thomas martyn at 72f.org
Wed Aug 7 14:19:23 CEST 2024


Even total path coverage couldn’t find all faults, as you need to test with all possible combinations of data. 

Static analysis can find the potential zero divide in 1/a-b almost instantly, or show its absence. Which is  infeasible with testing

Regards

Martyn

> On 7 Aug 2024, at 12:11, Prof. Dr. Peter Bernard Ladkin <ladkin at causalis.com> wrote:
> 
> On 2024-08-07 11:38 , Paul Sherwood wrote:
>> On 2024-08-07 10:28, Prof. Dr. Peter Bernard Ladkin wrote:
>>>>> [Dewi Daniels] If
>>>>> your tests haven't achieved statement coverage, then there's code that
>>>>> you've never executed, not even once, during your testing.
>>>> 
>>>> I understand the argument, but this last sentence is flawed.
>>> 
>>> How is the last sentence "flawed"? It seems to me a clear statement of the obvious (which I imagine is what Dewi intended).
>> 
>> Because we can **test**, without creating **tests**. We may have executed the code, but not created tests for it.
> 
> Let me rephrase. Dewi's statement above is a tautology.
> 
> I imagine he made it in order to remind us of the importance of statement coverage in constructing tests of critical software.
> 
> PBL
> 
> Prof. Dr. Peter Bernard Ladkin
> Causalis Limited/Causalis IngenieurGmbH, Bielefeld, Germany
> Tel: +49 (0)521 3 29 31 00
> 
> _______________________________________________
> The System Safety Mailing List
> systemsafety at TechFak.Uni-Bielefeld.DE
> Manage your subscription: https://lists.techfak.uni-bielefeld.de/mailman/listinfo/systemsafety



More information about the systemsafety mailing list