210 likes | 316 Views
FIG: A Prototype Tool for On-Line Verification of Recovery Mechanisms. Naveen Sastry, Pete Broadwell, Jonathan Traupman, David Patterson University of California, Berkeley. Presentation Outline. Introduction Objective/Motivation Background Methods Implementation Test setup Evaluation
E N D
FIG: A Prototype Tool for On-Line Verification of Recovery Mechanisms Naveen Sastry, Pete Broadwell,Jonathan Traupman, David Patterson University of California, Berkeley
Presentation Outline • Introduction • Objective/Motivation • Background • Methods • Implementation • Test setup • Evaluation • Test results • Conclusions
The Berkeley/Stanford ROC Project • Purpose: investigating novel techniques for building highly-dependable Internet services • Example techniques: • Advanced support for operator undo • Stability through targeted restarts • Integrated root cause analysis • Online verification of recovery mechanisms
FIG Project Objective/Motivation Objective: • Develop a lightweight, extensible tool for injecting errors to test recovery code/mechanisms Motivation: • Testing and production environments are always different • Large systems will require recovery code, which should be tested as part of normal operation
“Software’s Invisible Users” User Input User interface Application Other libraries Other apps System libraries (libc) OS Concept: Jim Whittaker Florida Institute of Technology
Related Testing Methods • Ballista (DeVale, Koopman, Siewiorek) • “Top-down” testing of POSIX-compliant OS and library interfaces • Fuzz (Miller, Fredriksen, So) • Tested UNIX applications by feeding them random input streams • Holodeck (Whittaker et al.) • Similar approach to ours, but only for Windows 2000/XP
Normal call path Injected fault FIG Implementation Application • Thin stub library between app & libraries • Traps API calls • Logs them • Inserts faults • Can be inserted into any app without modification • Uses LD_PRELOAD libfig.so libc.so, other libs OS
API stubs are automatically generated Very easy to add new APIs to log Fault injection is under script control Can simulate multiple fault models (e.g., memory pressure) MALLOC_INDEX interval 82 to infinity return 0 errno ENOMEM probability 0.03 OPEN_INDEX // device out of space. interval 100 to infinity return –1 errno ENOSPC probability 0.001 // kernel out of memory. interval 100 to 120 return –1 errno ENOMEM probability 0.1 // too many files open. callnumber 108 return -1 errno EMFILE probability 1.0 Extensibility Sample control file:
Test Setup: Applications • GNU file utilities (ls, mv, etc.) • Emacs 20.7.1 – with and without X • Apache 1.3.22 • Berkeley DB 4.0.14 • Netscape Navigator 4.76 • MySQL server 3.23.36
Test Setup:Instrumented Calls & Their Errors • malloc() – memory exhaustion • read() – I/O error, system call was interrupted • write() – I/O error, no space left on device, call interrupted • open() – memory exhaustion, no space on device, too many files open • select() – memory exhaustion
Test Results: Overhead • Note: FIG communicates with a separate logging daemon through shared memory to reduce logging overhead. Timing using Berkeley DB (non-transactional) to read, sort and write one million words.
Strategies forReliable Services: • Intelligent retry • ls: “bounded retry” of malloc() • Resource preallocation • Apache: allocates buffer pool at startup • Degraded service • Apache: deactivates logging if disk full • Process pools • Apache and MySQL
FIG as a Prototype for Online Error Injection • Low run-time overhead • Easy to enable/disable • Easy to configure • Extensible • Can simulate multiple fault models
A Case for OnlineError Injection • Recovery code is not usually exercised during normal operation • Deployed environments tend to differ from testing environments • Can run error injection tests on a subset of deployed systems • FIG can simulate common environmental errors
Conclusions • FIG exposed a variety of deficiencies in how our test applications handled environmental errors • Server apps are generally more robust than client applications • FIG exhibits low overhead • FIG is suitable for online error injection
Future Directions • Limitations of FIG: • Only for UNIX-like OSes • Limited to app/library interface (proxy for app/OS interaction) • Make FIG part of a larger test suite • Include clock time and event based error triggers • Greater flexibility in configuration file
Other Related Work • Xept (Vo et al.) • Instruments object code to ensure that error handling code exists • Processor & memory errors • DOCTOR, HYBRID, DEFINE • Process memory corruption • FERRARI, DEFINE