Using kernel level simulation techniques to improve application program robustness
First Claim
Patent Images
1. A method of simulating system conditions at a kernel-level, comprising:
- intercepting an operating system call from an application at a kernel-level;
determining whether the operating system call was called from a process that was identified for failure emulation;
if the operating system call was called from a process that was identified for failure emulation, consulting user loaded rules and returning results to the operating system call according to the user loaded rules; and
if the operating system call was not called from a process that was identified for failure emulation, calling a native operating system service routine associated with the operating system call.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for simulating system conditions at a kernel-level is provided. In one aspect, process identifiers of processes for which simulation is to be performed are transmitted along with simulation pattern or rules from a user-space to a kernel space. Emulator in the kernel space intercepts system calls invoked by processes running in the user space. If the system calls originated from the one or more processes for which emulation was to be performed, return results according to the simulation pattern are generated and returned to the calling process.
24 Citations
13 Claims
-
1. A method of simulating system conditions at a kernel-level, comprising:
-
intercepting an operating system call from an application at a kernel-level;
determining whether the operating system call was called from a process that was identified for failure emulation;
if the operating system call was called from a process that was identified for failure emulation, consulting user loaded rules and returning results to the operating system call according to the user loaded rules; and
if the operating system call was not called from a process that was identified for failure emulation, calling a native operating system service routine associated with the operating system call. - View Dependent Claims (2, 3, 4)
-
-
5. A method of simulating system conditions at a kernel-level, comprising:
-
identifying one or more processes to a kernel-level module for which to emulate failures;
transmitting one or more failure rules to the kernel-level module, the one or more failure rules associated with the one or more processes;
activating the kernel-level module; and
running the one or more processes. - View Dependent Claims (6, 7)
-
-
8. A program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform method of simulating system conditions at a kernel-level, comprising:
-
intercepting an operating system call from an application at a kernel-level;
determining whether the operating system call was called from a process that was identified for failure emulation;
if the operating system call was called from a process that was identified for failure emulation, consulting user loaded rules and returning results to the operating system call according to the user loaded rules; and
if the operating system call was not called from a process that was identified for failure emulation, calling a native operating system service routine associated with the operating system call. - View Dependent Claims (9, 10, 11)
-
-
12. A system for simulating system conditions at a kernel-level, comprising:
-
a user-space module operable to transmit one or more process identifiers and one or more rules associated with the process identifiers for emulating failure conditions at a kernel-level; and
a kernel-level module operable to intercept system call, and further operable to determine whether the system call was invoked from one or more processes identified by the one or more process identifiers and if the system call was invoked from the one or more processes identified by the one or more process identifiers, the kernel-level module further operable to generate a return result according to the one or more rules, and if the system call was not invoked from the one or more processes identified by the one or more process identifiers, the kernel-level module further operable to call native operating system service routine associated with the system call. - View Dependent Claims (13)
-
Specification