Fault Injection Test Harness

  •        0

The Fault Injection Test Harness provides a uniform mechanism for writing reliable test case to validate a Linux device driver can gracefully handle software and hardware fault conditions.




comments powered by Disqus

Related Projects

Pydailychecks - A simple python library to make my life easier when checking multiple platforms for

A simple python library to make my life easier when checking multiple platforms for failures. All tasks are managed on my local machine, with checks that can be injected into the system to look for faults across the network. Still in very early stages, ideas appreciated.

Defectofix - Defectofix is an open source interactive defect fixing and logging tool built using Rub

Defectofix is an open source interactive defect fixing and logging tool built using Ruby. The basic aim behind this tool is to design a model for extracting the information by fault injection that is needed to build rich models of defect and fixes.

Tikle - faulT Injection environment for networK protocoL Evaluation

Tikle is a communication fault injection environment which allows test engineers to reproduce realistic fault scenarios in computer networks. Tikle allows the assessment of network protocol specifications, replication consistency algorithms and more. for our publications, please follow: during Testing and Fault Injection Workshop in Latin-American Symposium on Dependable Computing - 2009 http://inf.ufrgs.br/~gmoliveira/WTF2009.pdf (portuguese-br) during The IEEE Latin-American Test Workshop - 20

Polyglot-compiler - Extensible compiler framework for Java

Polyglot is a highly extensible compiler front end for the Java programming language. It is implemented as a Java class framework using design patterns to promote extensibility. Using Polyglot, language extensions can be implemented without duplicating code from the framework itself. Polyglot has been used to implement domain-specific languages, to explore language design ideas, to simplify Java for pedagogical purposes, and for various code transformations such as optimization and fault injecti


antiparser is an API/framework for generating random, malformed data for use in fuzzing and fault injection of network protocols and file formats. antiparser is written in Python and can be imported by scripts that implement additional fuzzing logic.

Firefuzzer - A Penetration Testing tool intended to find vulnerabilities in Web Pages especially Buf

Concept: In this age of the excessive INTERNET-dependency, the Web browser is the most basic common unit of the Internet experience for much of the global community. Also, it is the one which is the most attacked from external agencies. Thus, it is critical to test the Browser's ability to be secure enough. Thus, to audit the security mechanisms in place within conventional Web Browsers, we plan to use a fuzzer codenamed 'FireFuzzer'. A fuzzer (also known as 'Fault Injectors') is a typically a t

Carmamutation - Unit Test Verification Tool using Error Injection

Source Code repository is now streamlined and online. What is CarmaCarma is a tool which validates the quality of your product by analyzing your test cases. It clearly identifies gaps in your test cases and reports the conditions which certainly require additional and/or enhanced test cases. It exceeds the power of plain code coverage tools as such tools rely on a technique which does not seriously help in identifying weak test cases. Just imagine a load of test cases without any assertions. The

LFI (Library-level Fault Injector)

Easy-to-use fault injection tool for testing robustness of software to faults that originate in shared libraries and the layers below. LFI minimizes human effort involved in testing and does not require access to the target program's source code.

Injectiontools - Tools for fault injection

Here are three tools that allow fault injection in the memory space of an application. - Injector_gtk permits to inject randomly in memory areas. - Global_gtk permits to list all global variables and to modify their values at any time. - Syscall_gtk permits to catch some syscalls an application uses and to modify how they're executed. Both are based on a fork, use ptrace library to do injections and objdump to get all memory information. Those application run under unix, you can use them to test