Using fault injection for testing Linux kernel components
The paper presents methods aimed to extend coverage of existing tests by systematic and targeted fault injection in Linux kernel. The main goal is to test if kernel components correctly handle abnormal situations. As long as such situations happen seldom and unpredictably, it is difficult to debug b...
Ausführliche Beschreibung
Autor*in: |
A. . Tsyvarev [verfasserIn] A. . Khoroshilov [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch ; Russisch |
Erschienen: |
2018 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: Труды Института системного программирования РАН - Ivannikov Institute for System Programming of the Russian Academy of Sciences, 2019, 27(2018), 5, Seite 157-174 |
---|---|
Übergeordnetes Werk: |
volume:27 ; year:2018 ; number:5 ; pages:157-174 |
Links: |
Link aufrufen |
---|
DOI / URN: |
10.15514/ISPRAS-2015-27(5)-9 |
---|
Katalog-ID: |
DOAJ067491251 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ067491251 | ||
003 | DE-627 | ||
005 | 20230309070932.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230228s2018 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.15514/ISPRAS-2015-27(5)-9 |2 doi | |
035 | |a (DE-627)DOAJ067491251 | ||
035 | |a (DE-599)DOAJ246f1d0bfaa447ab882cb9647dfbffb1 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng |a rus | ||
050 | 0 | |a QA75.5-76.95 | |
100 | 0 | |a A. . Tsyvarev |e verfasserin |4 aut | |
245 | 1 | 0 | |a Using fault injection for testing Linux kernel components |
264 | 1 | |c 2018 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a The paper presents methods aimed to extend coverage of existing tests by systematic and targeted fault injection in Linux kernel. The main goal is to test if kernel components correctly handle abnormal situations. As long as such situations happen seldom and unpredictably, it is difficult to debug bugs in the code handling them. Currently the only approach used in practice is random fault injection. The paper presents new methods that inject faults systematically. It allows to achieve better coverage and to make test results more predictable. The paper describes results of evaluation of the methods proposed and random fault injection. | ||
650 | 4 | |a linux | |
650 | 4 | |a компоненты ядра linux | |
650 | 4 | |a драйвер | |
650 | 4 | |a тестирование | |
650 | 4 | |a симуляция сбоев | |
653 | 0 | |a Electronic computers. Computer science | |
700 | 0 | |a A. . Khoroshilov |e verfasserin |4 aut | |
773 | 0 | 8 | |i In |t Труды Института системного программирования РАН |d Ivannikov Institute for System Programming of the Russian Academy of Sciences, 2019 |g 27(2018), 5, Seite 157-174 |w (DE-627)1004960409 |x 22206426 |7 nnns |
773 | 1 | 8 | |g volume:27 |g year:2018 |g number:5 |g pages:157-174 |
856 | 4 | 0 | |u https://doi.org/10.15514/ISPRAS-2015-27(5)-9 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/246f1d0bfaa447ab882cb9647dfbffb1 |z kostenfrei |
856 | 4 | 0 | |u https://ispranproceedings.elpub.ru/jour/article/view/680 |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2079-8156 |y Journal toc |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2220-6426 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 27 |j 2018 |e 5 |h 157-174 |
author_variant |
a t at a k ak |
---|---|
matchkey_str |
article:22206426:2018----::snfutnetofretnlnxe |
hierarchy_sort_str |
2018 |
callnumber-subject-code |
QA |
publishDate |
2018 |
allfields |
10.15514/ISPRAS-2015-27(5)-9 doi (DE-627)DOAJ067491251 (DE-599)DOAJ246f1d0bfaa447ab882cb9647dfbffb1 DE-627 ger DE-627 rakwb eng rus QA75.5-76.95 A. . Tsyvarev verfasserin aut Using fault injection for testing Linux kernel components 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The paper presents methods aimed to extend coverage of existing tests by systematic and targeted fault injection in Linux kernel. The main goal is to test if kernel components correctly handle abnormal situations. As long as such situations happen seldom and unpredictably, it is difficult to debug bugs in the code handling them. Currently the only approach used in practice is random fault injection. The paper presents new methods that inject faults systematically. It allows to achieve better coverage and to make test results more predictable. The paper describes results of evaluation of the methods proposed and random fault injection. linux компоненты ядра linux драйвер тестирование симуляция сбоев Electronic computers. Computer science A. . Khoroshilov verfasserin aut In Труды Института системного программирования РАН Ivannikov Institute for System Programming of the Russian Academy of Sciences, 2019 27(2018), 5, Seite 157-174 (DE-627)1004960409 22206426 nnns volume:27 year:2018 number:5 pages:157-174 https://doi.org/10.15514/ISPRAS-2015-27(5)-9 kostenfrei https://doaj.org/article/246f1d0bfaa447ab882cb9647dfbffb1 kostenfrei https://ispranproceedings.elpub.ru/jour/article/view/680 kostenfrei https://doaj.org/toc/2079-8156 Journal toc kostenfrei https://doaj.org/toc/2220-6426 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 27 2018 5 157-174 |
spelling |
10.15514/ISPRAS-2015-27(5)-9 doi (DE-627)DOAJ067491251 (DE-599)DOAJ246f1d0bfaa447ab882cb9647dfbffb1 DE-627 ger DE-627 rakwb eng rus QA75.5-76.95 A. . Tsyvarev verfasserin aut Using fault injection for testing Linux kernel components 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The paper presents methods aimed to extend coverage of existing tests by systematic and targeted fault injection in Linux kernel. The main goal is to test if kernel components correctly handle abnormal situations. As long as such situations happen seldom and unpredictably, it is difficult to debug bugs in the code handling them. Currently the only approach used in practice is random fault injection. The paper presents new methods that inject faults systematically. It allows to achieve better coverage and to make test results more predictable. The paper describes results of evaluation of the methods proposed and random fault injection. linux компоненты ядра linux драйвер тестирование симуляция сбоев Electronic computers. Computer science A. . Khoroshilov verfasserin aut In Труды Института системного программирования РАН Ivannikov Institute for System Programming of the Russian Academy of Sciences, 2019 27(2018), 5, Seite 157-174 (DE-627)1004960409 22206426 nnns volume:27 year:2018 number:5 pages:157-174 https://doi.org/10.15514/ISPRAS-2015-27(5)-9 kostenfrei https://doaj.org/article/246f1d0bfaa447ab882cb9647dfbffb1 kostenfrei https://ispranproceedings.elpub.ru/jour/article/view/680 kostenfrei https://doaj.org/toc/2079-8156 Journal toc kostenfrei https://doaj.org/toc/2220-6426 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 27 2018 5 157-174 |
allfields_unstemmed |
10.15514/ISPRAS-2015-27(5)-9 doi (DE-627)DOAJ067491251 (DE-599)DOAJ246f1d0bfaa447ab882cb9647dfbffb1 DE-627 ger DE-627 rakwb eng rus QA75.5-76.95 A. . Tsyvarev verfasserin aut Using fault injection for testing Linux kernel components 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The paper presents methods aimed to extend coverage of existing tests by systematic and targeted fault injection in Linux kernel. The main goal is to test if kernel components correctly handle abnormal situations. As long as such situations happen seldom and unpredictably, it is difficult to debug bugs in the code handling them. Currently the only approach used in practice is random fault injection. The paper presents new methods that inject faults systematically. It allows to achieve better coverage and to make test results more predictable. The paper describes results of evaluation of the methods proposed and random fault injection. linux компоненты ядра linux драйвер тестирование симуляция сбоев Electronic computers. Computer science A. . Khoroshilov verfasserin aut In Труды Института системного программирования РАН Ivannikov Institute for System Programming of the Russian Academy of Sciences, 2019 27(2018), 5, Seite 157-174 (DE-627)1004960409 22206426 nnns volume:27 year:2018 number:5 pages:157-174 https://doi.org/10.15514/ISPRAS-2015-27(5)-9 kostenfrei https://doaj.org/article/246f1d0bfaa447ab882cb9647dfbffb1 kostenfrei https://ispranproceedings.elpub.ru/jour/article/view/680 kostenfrei https://doaj.org/toc/2079-8156 Journal toc kostenfrei https://doaj.org/toc/2220-6426 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 27 2018 5 157-174 |
allfieldsGer |
10.15514/ISPRAS-2015-27(5)-9 doi (DE-627)DOAJ067491251 (DE-599)DOAJ246f1d0bfaa447ab882cb9647dfbffb1 DE-627 ger DE-627 rakwb eng rus QA75.5-76.95 A. . Tsyvarev verfasserin aut Using fault injection for testing Linux kernel components 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The paper presents methods aimed to extend coverage of existing tests by systematic and targeted fault injection in Linux kernel. The main goal is to test if kernel components correctly handle abnormal situations. As long as such situations happen seldom and unpredictably, it is difficult to debug bugs in the code handling them. Currently the only approach used in practice is random fault injection. The paper presents new methods that inject faults systematically. It allows to achieve better coverage and to make test results more predictable. The paper describes results of evaluation of the methods proposed and random fault injection. linux компоненты ядра linux драйвер тестирование симуляция сбоев Electronic computers. Computer science A. . Khoroshilov verfasserin aut In Труды Института системного программирования РАН Ivannikov Institute for System Programming of the Russian Academy of Sciences, 2019 27(2018), 5, Seite 157-174 (DE-627)1004960409 22206426 nnns volume:27 year:2018 number:5 pages:157-174 https://doi.org/10.15514/ISPRAS-2015-27(5)-9 kostenfrei https://doaj.org/article/246f1d0bfaa447ab882cb9647dfbffb1 kostenfrei https://ispranproceedings.elpub.ru/jour/article/view/680 kostenfrei https://doaj.org/toc/2079-8156 Journal toc kostenfrei https://doaj.org/toc/2220-6426 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 27 2018 5 157-174 |
allfieldsSound |
10.15514/ISPRAS-2015-27(5)-9 doi (DE-627)DOAJ067491251 (DE-599)DOAJ246f1d0bfaa447ab882cb9647dfbffb1 DE-627 ger DE-627 rakwb eng rus QA75.5-76.95 A. . Tsyvarev verfasserin aut Using fault injection for testing Linux kernel components 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The paper presents methods aimed to extend coverage of existing tests by systematic and targeted fault injection in Linux kernel. The main goal is to test if kernel components correctly handle abnormal situations. As long as such situations happen seldom and unpredictably, it is difficult to debug bugs in the code handling them. Currently the only approach used in practice is random fault injection. The paper presents new methods that inject faults systematically. It allows to achieve better coverage and to make test results more predictable. The paper describes results of evaluation of the methods proposed and random fault injection. linux компоненты ядра linux драйвер тестирование симуляция сбоев Electronic computers. Computer science A. . Khoroshilov verfasserin aut In Труды Института системного программирования РАН Ivannikov Institute for System Programming of the Russian Academy of Sciences, 2019 27(2018), 5, Seite 157-174 (DE-627)1004960409 22206426 nnns volume:27 year:2018 number:5 pages:157-174 https://doi.org/10.15514/ISPRAS-2015-27(5)-9 kostenfrei https://doaj.org/article/246f1d0bfaa447ab882cb9647dfbffb1 kostenfrei https://ispranproceedings.elpub.ru/jour/article/view/680 kostenfrei https://doaj.org/toc/2079-8156 Journal toc kostenfrei https://doaj.org/toc/2220-6426 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 27 2018 5 157-174 |
language |
English Russian |
source |
In Труды Института системного программирования РАН 27(2018), 5, Seite 157-174 volume:27 year:2018 number:5 pages:157-174 |
sourceStr |
In Труды Института системного программирования РАН 27(2018), 5, Seite 157-174 volume:27 year:2018 number:5 pages:157-174 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
linux компоненты ядра linux драйвер тестирование симуляция сбоев Electronic computers. Computer science |
isfreeaccess_bool |
true |
container_title |
Труды Института системного программирования РАН |
authorswithroles_txt_mv |
A. . Tsyvarev @@aut@@ A. . Khoroshilov @@aut@@ |
publishDateDaySort_date |
2018-01-01T00:00:00Z |
hierarchy_top_id |
1004960409 |
id |
DOAJ067491251 |
language_de |
englisch russisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ067491251</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230309070932.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230228s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.15514/ISPRAS-2015-27(5)-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ067491251</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ246f1d0bfaa447ab882cb9647dfbffb1</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield><subfield code="a">rus</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA75.5-76.95</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">A. . Tsyvarev</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Using fault injection for testing Linux kernel components</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2018</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The paper presents methods aimed to extend coverage of existing tests by systematic and targeted fault injection in Linux kernel. The main goal is to test if kernel components correctly handle abnormal situations. As long as such situations happen seldom and unpredictably, it is difficult to debug bugs in the code handling them. Currently the only approach used in practice is random fault injection. The paper presents new methods that inject faults systematically. It allows to achieve better coverage and to make test results more predictable. The paper describes results of evaluation of the methods proposed and random fault injection.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">компоненты ядра linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">драйвер</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">тестирование</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">симуляция сбоев</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic computers. Computer science</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">A. . Khoroshilov</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">Труды Института системного программирования РАН</subfield><subfield code="d">Ivannikov Institute for System Programming of the Russian Academy of Sciences, 2019</subfield><subfield code="g">27(2018), 5, Seite 157-174</subfield><subfield code="w">(DE-627)1004960409</subfield><subfield code="x">22206426</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:27</subfield><subfield code="g">year:2018</subfield><subfield code="g">number:5</subfield><subfield code="g">pages:157-174</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.15514/ISPRAS-2015-27(5)-9</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/246f1d0bfaa447ab882cb9647dfbffb1</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ispranproceedings.elpub.ru/jour/article/view/680</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2079-8156</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2220-6426</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">27</subfield><subfield code="j">2018</subfield><subfield code="e">5</subfield><subfield code="h">157-174</subfield></datafield></record></collection>
|
callnumber-first |
Q - Science |
author |
A. . Tsyvarev |
spellingShingle |
A. . Tsyvarev misc QA75.5-76.95 misc linux misc компоненты ядра linux misc драйвер misc тестирование misc симуляция сбоев misc Electronic computers. Computer science Using fault injection for testing Linux kernel components |
authorStr |
A. . Tsyvarev |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)1004960409 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
QA75 |
illustrated |
Not Illustrated |
issn |
22206426 |
topic_title |
QA75.5-76.95 Using fault injection for testing Linux kernel components linux компоненты ядра linux драйвер тестирование симуляция сбоев |
topic |
misc QA75.5-76.95 misc linux misc компоненты ядра linux misc драйвер misc тестирование misc симуляция сбоев misc Electronic computers. Computer science |
topic_unstemmed |
misc QA75.5-76.95 misc linux misc компоненты ядра linux misc драйвер misc тестирование misc симуляция сбоев misc Electronic computers. Computer science |
topic_browse |
misc QA75.5-76.95 misc linux misc компоненты ядра linux misc драйвер misc тестирование misc симуляция сбоев misc Electronic computers. Computer science |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Труды Института системного программирования РАН |
hierarchy_parent_id |
1004960409 |
hierarchy_top_title |
Труды Института системного программирования РАН |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)1004960409 |
title |
Using fault injection for testing Linux kernel components |
ctrlnum |
(DE-627)DOAJ067491251 (DE-599)DOAJ246f1d0bfaa447ab882cb9647dfbffb1 |
title_full |
Using fault injection for testing Linux kernel components |
author_sort |
A. . Tsyvarev |
journal |
Труды Института системного программирования РАН |
journalStr |
Труды Института системного программирования РАН |
callnumber-first-code |
Q |
lang_code |
eng rus |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2018 |
contenttype_str_mv |
txt |
container_start_page |
157 |
author_browse |
A. . Tsyvarev A. . Khoroshilov |
container_volume |
27 |
class |
QA75.5-76.95 |
format_se |
Elektronische Aufsätze |
author-letter |
A. . Tsyvarev |
doi_str_mv |
10.15514/ISPRAS-2015-27(5)-9 |
author2-role |
verfasserin |
title_sort |
using fault injection for testing linux kernel components |
callnumber |
QA75.5-76.95 |
title_auth |
Using fault injection for testing Linux kernel components |
abstract |
The paper presents methods aimed to extend coverage of existing tests by systematic and targeted fault injection in Linux kernel. The main goal is to test if kernel components correctly handle abnormal situations. As long as such situations happen seldom and unpredictably, it is difficult to debug bugs in the code handling them. Currently the only approach used in practice is random fault injection. The paper presents new methods that inject faults systematically. It allows to achieve better coverage and to make test results more predictable. The paper describes results of evaluation of the methods proposed and random fault injection. |
abstractGer |
The paper presents methods aimed to extend coverage of existing tests by systematic and targeted fault injection in Linux kernel. The main goal is to test if kernel components correctly handle abnormal situations. As long as such situations happen seldom and unpredictably, it is difficult to debug bugs in the code handling them. Currently the only approach used in practice is random fault injection. The paper presents new methods that inject faults systematically. It allows to achieve better coverage and to make test results more predictable. The paper describes results of evaluation of the methods proposed and random fault injection. |
abstract_unstemmed |
The paper presents methods aimed to extend coverage of existing tests by systematic and targeted fault injection in Linux kernel. The main goal is to test if kernel components correctly handle abnormal situations. As long as such situations happen seldom and unpredictably, it is difficult to debug bugs in the code handling them. Currently the only approach used in practice is random fault injection. The paper presents new methods that inject faults systematically. It allows to achieve better coverage and to make test results more predictable. The paper describes results of evaluation of the methods proposed and random fault injection. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
container_issue |
5 |
title_short |
Using fault injection for testing Linux kernel components |
url |
https://doi.org/10.15514/ISPRAS-2015-27(5)-9 https://doaj.org/article/246f1d0bfaa447ab882cb9647dfbffb1 https://ispranproceedings.elpub.ru/jour/article/view/680 https://doaj.org/toc/2079-8156 https://doaj.org/toc/2220-6426 |
remote_bool |
true |
author2 |
A. . Khoroshilov |
author2Str |
A. . Khoroshilov |
ppnlink |
1004960409 |
callnumber-subject |
QA - Mathematics |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.15514/ISPRAS-2015-27(5)-9 |
callnumber-a |
QA75.5-76.95 |
up_date |
2024-07-04T01:06:44.902Z |
_version_ |
1803608606537416704 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ067491251</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230309070932.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230228s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.15514/ISPRAS-2015-27(5)-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ067491251</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ246f1d0bfaa447ab882cb9647dfbffb1</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield><subfield code="a">rus</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA75.5-76.95</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">A. . Tsyvarev</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Using fault injection for testing Linux kernel components</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2018</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The paper presents methods aimed to extend coverage of existing tests by systematic and targeted fault injection in Linux kernel. The main goal is to test if kernel components correctly handle abnormal situations. As long as such situations happen seldom and unpredictably, it is difficult to debug bugs in the code handling them. Currently the only approach used in practice is random fault injection. The paper presents new methods that inject faults systematically. It allows to achieve better coverage and to make test results more predictable. The paper describes results of evaluation of the methods proposed and random fault injection.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">компоненты ядра linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">драйвер</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">тестирование</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">симуляция сбоев</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic computers. Computer science</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">A. . Khoroshilov</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">Труды Института системного программирования РАН</subfield><subfield code="d">Ivannikov Institute for System Programming of the Russian Academy of Sciences, 2019</subfield><subfield code="g">27(2018), 5, Seite 157-174</subfield><subfield code="w">(DE-627)1004960409</subfield><subfield code="x">22206426</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:27</subfield><subfield code="g">year:2018</subfield><subfield code="g">number:5</subfield><subfield code="g">pages:157-174</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.15514/ISPRAS-2015-27(5)-9</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/246f1d0bfaa447ab882cb9647dfbffb1</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ispranproceedings.elpub.ru/jour/article/view/680</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2079-8156</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2220-6426</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">27</subfield><subfield code="j">2018</subfield><subfield code="e">5</subfield><subfield code="h">157-174</subfield></datafield></record></collection>
|
score |
7.399496 |