Please wait a minute...
J4  2011, Vol. 45 Issue (4): 614-620    DOI: 10.3785/j.issn.1008-973X.2011.04.005
    
Software simulation-based fault injection tool of
virtual machine system
CHE Jian-hua, HE Qin-ming, CHEN Jian-hai, WANG Bei
College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
Download:   PDF(0KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

The mechanism involved by fault injection tools for virtual machine system such as failure model, injection mode, trigging mechanism, monitor and trace was studied. The typical failure model (including fault type, fault location, occurrence mechanism and duration) and its implementation were proposed by statistically analyzing the fault symptoms occurring in various virtual machine systems. By investigating the architecture of virtual machine system and the principle of fault injection, a fault injection tool for Xen system using software simulation method was designed—software fault injector for virtualized environments (SFIVE), and its injection mode, trigging mechanism, monitor and trace were introduced. Experimental results show that SFIVE has higher fault type coverage of virtual machine system, and can activate and monitor most of fault types related to virtual machine.



Published: 05 May 2011
CLC:  TP 393  
Cite this article:

CHE Jian-hua, HE Qin-ming, CHEN Jian-hai, WANG Bei. Software simulation-based fault injection tool of
virtual machine system. J4, 2011, 45(4): 614-620.

URL:

http://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2011.04.005     OR     http://www.zjujournals.com/eng/Y2011/V45/I4/614


基于软件模拟的虚拟机系统故障插入工具

对虚拟机系统故障插入工具所涉及的故障模型、插桩方式、触发机制和监控跟踪等进行研究.通过统计分析各种虚拟机系统的故障症状,给出虚拟机系统的典型故障模型(包括故障类型、故障位置、发生模型和持续时间等)及实现代码.在研究虚拟机系统架构和故障插入实现原理的基础上,采用软件模拟方法基于Xen系统设计一个故障插入工具——SFIVE,介绍相应的插桩方式、触发机制和监控机制.实验分析表明,SFIVE具有较高的虚拟机系统故障覆盖率,能够激活和监控与大部分虚拟机相关的插桩故障.

[1] ROSENBLUM M, GARFINKEL T. Virtual machine monitors: current technology and future trends [J]. Computer, 2005, 38(5): 39-47.
[2] SHIVELEY R. Enhanced virtualization on Intel architecturebased servers [R]. California: Intel Corporation, 2005.
[3] ALDINUCCI M, DANELUTTO M, TORQUATI M, et al. VirtuaLinux: virtualized highdensity clusters with no single point of failure [C]∥ Proceedings of the International Conference ParCo2007. France: IOS, 2007: 355-362.
[4] WEI Lunkao, IYER R. DEFINE: a distributed fault injection and monitoring environment [C]∥ Proceedings of IEEE Workshop on FaultTolerant Parallel and Distributed Systems. California: IEEE, 1995: 252-259.
[5] HAN S, SHIN K, ROSENBERG H. DOCTOR: an integrateD sOftware fault injeCTiOn enviRonment for distributed real time systems [C]∥ Proceedings of Computer Performance and Dependability Symposium. Germany: IEEE, 1995: 204-213.
[6] BARTON J H, CZECK E W, SEGALL Z Z, et al. Fault injection experiments using FIAT [J]. IEEE Transactions on Computers, 1990, 39(4): 575-582.
[7] KANAWATI G A, KANAWATI N A, ABRAHAM J A. FERRARI: a tool for the validation of system dependability properties [C]∥ Proceedings of the 22nd International Symposium on Fault Tolerant Computing. Washington: IEEE, 1992: 336-344.
[8] STOTT D T, FLOERING B, BURKE D, et al. NFTAPE: a framework for assessing dependability in distributed systems with lightweight fault injectors [C]∥ Proceedings of the IEEE International Computer Performance and Dependability Symposium. Washington: IEEE, 2000: 91-100.
[9] DAWSON S, JAHANIAN F, MITTON T. Orchestra: a fault injection environment for distributed systems [C]∥ Proceedings of the 26th International Symposium on FaultTolerant Computing. Washington: IEEE, 1996: 404-414.
[10] CARREIRA J, MADEIRA H, SILVA J G. Xception: software fault injection and monitoring in processor functional units [C]∥ Proceedings of the 5th IFIP Working Conference on Dependable Computing for Critical Applications. Washington: IEEE, 1998: 245-266.
[11] HSUEH M C, TSAI T K, IYER R K. Fault injection techniques and tools [J]. Computer, 1997, 30(4): 75-82.
[12] AVAREZ G, CRISTIAN F. Centralized failure for distributed, faulttolerant protocol testing [C]∥ Proceedings of the 17th IEEE International Conference on Distributed Computing Systems. Washington: IEEE, 1997: 78-86.
[13] CHOI G S, IYER R K. FOCUS: an experimental environment for fault sensitivity analysis [J]. IEEE Transactions on Computers, 1992, 41(12): 1515-1526.
[14] JENN E, ARLAT J, RIMEN M, et al. Fault injection into VHDL models: the MEFISTO tool [C]∥ Proceedings of the 24th International Symposium on Fault Tolerant Computing. Washington: IEEE, 1994: 66-75.
[15] GUNNETLO O, KARLSSON J, TONN J. Evaluation of error detection schemes using fault injection by heavyion radiation [C]∥ Proceedings of the 19th International Symposium on Fault Tolerant Computing. Washington: IEEE, 1989: 340-347.
[16] ARLAT J, CROUZET Y, LAPRIE J C. Fault injection for dependability validation of faulttolerant computer systems [C]∥ Proceedings of the 19th International Symposium on Fault Tolerant Computing. Washington: IEEE, 1989: 348-355.

[1] I De-jun,WANG Gang,YANG Can-jun,JIN Bo,CHEN Yan-hu. NTP/IEEE1588-based time synchronization system in seafloor observatory network[J]. J4, 2014, 48(1): 1-7.
[2] GUO Tong,LIN Feng. Bayesian network structure learning based on hybrid genetic
and fish swarm algorithm
[J]. J4, 2014, 48(1): 130-135.
[3] DU Rui-zhong, TIAN Jun-feng, ZHANG Huan-guo. Cloud service selection model based on trust and personality preferences[J]. J4, 2013, 47(1): 53-61.
[4] ZHANG Shuai, SUN Jian-ling, XU Bin, HUANG Chao, KAVS Aleksander J.. RBAC based access control model for services compositions
cross multiple enterprises
[J]. J4, 2012, 46(11): 2035-2043.
[5] Chen Sui-sheng,Lu Jian-gang,Lou Xiao-chun. Localization algorithm for wireless sensor networks
based on MDS-MAP and nonlinear filtering
[J]. J4, 2012, 46(5): 866-872.
[6] PAN Ju-long, LI Shan-ping, ZHANG Dao-yuan. Detecting suspicious node within one cluster in wireless sensor network
using game theoretic approach
[J]. J4, 2012, 46(1): 72-78.
[7] GAO Qing,LI Shan-ping,YANG Zhao-hui. Virtual force-field based energy efficient geo-routing in
wireless sensor network
[J]. J4, 2012, 46(1): 98-104.
[8] YANG Zhao-hui, LI Shan-ping, LIN Xin. Quality optimizing real-time scheduling for incremental context services[J]. J4, 2012, 46(1): 90-97.
[9] QIAN Jian-feng, YIN Jian-wei, DONG Jin-xiang. Load balancing algorithms of semantic publish/subscribe system
over structured P2P networks
[J]. J4, 2011, 45(10): 1710-1719.
[10] YANG Zhao-hui, LI Shan-ping, LIN Xin. Anonymity level adaptation algorithm to meet resource constraint
of K-anonymity service in LBS
[J]. J4, 2011, 45(7): 1154-1160.
[11] PAN Gang, LI Shi-jian, CHEN Yun-xing. ScudContext: large-scale environmental context services infrastructure
towards cyber-physical space integration
[J]. J4, 2011, 45(6): 991-998.
[12] ZHANG Li-ping, PAN Gang, ZHENG Neng-gan, YANG Guo-qing, LI Hong, ZHAO Min-de. Consistent bidirectional generation method and  development
platform based on SmartC models and codes
[J]. J4, 2011, 45(1): 20-29.
[13] LI Jian-ting, JIN Xin-yu, TANG Jun, ZHANG Yu. Target localization method based on wireless multimedia sensor network[J]. J4, 2011, 45(1): 45-49.
[14] SHU Ting, SUN Shou-qian, WANG Hai-ning, XU Wei-qiang. Adaptive generation algorithm for executable state identification
sequences in EFSM model
[J]. J4, 2010, 44(11): 2183-2187.
[15] CHEN You-Rong, SHU Li, DONG Ji-Fen, HONG Zhen. Power control in wireless sensor network based on
nearestneighbor algorithm
[J]. J4, 2010, 44(7): 1321-1326.