Download presentation
Presentation is loading. Please wait.
Published byAlena Wenman Modified over 9 years ago
1
Runtime Verification Ali Akkaya Boğaziçi University
2
Motivation The Remote Agent Experiment During the May 1999 RAX mission, the satellite deadlocked in space, causing the ground crew to put the spacecraft on standby. Ariane 5 Flight 501 Airane 5 Flight 501 was destroyed 40 seconds after take off. The US$1 billion prototype rocket self-destructed due to a bug in the on-board guidance software
3
Motivation Air-Traffic Control System in LA Airport The controllers lost contact with the planes when the main voice communications system shut down unexpectedly. To make matters worse, a backup system that was supposed to take over in such an event crashed within a minute after it was turned on. The outage disrupted about 800 flights ac ross the country.
4
Introduction Runtime Verification Tools Java PathExplorer (JPaX) Java MultiPathExplorer (JMPaX) Conclusion Further Study Outline
5
Runtime Verification is the study of monitoring and analyzing system executions to detect/recover faults. Two important aspects of program verification are Testing Use of Formal Methods Runtime Verification
6
Testing Formal Methods Ideal Runtime Verification Scalibility Coverage
7
Runtime Verification Architecture Reaction Instrumentation Specification Code Monitoring Execution
8
while (true) { lock(r1); processShared(); unlock(r2); } while (true) { lock(r1); logLock(p,r1); processShared(); release(r2); logRelease(p,r1); } Instrumentation Execution Traces: lock(p1,r1) release(p1,r1) lock(p2,r1) release(p2,r1)
9
Dispatching of trace events to a set of specification rules. Specification Language Boolean Logic provides formulation of statements for a specific time. Not sufficient to express time based changes in states Monitoring
10
If A happens now, B must happen (A → ◊ B) Future Time Temporal Logic AB p ∧ q = p and q p ∨ q = p or q p → q = p implies q ¬p = not p p = always p ◊ p = eventually p p U q = p until q
11
If A happens now, B must have happened (A → ♦ B) Past Time Temporal Logic BA p ∧ q = p and q p ∨ q = p or q p → q = p implies q ¬p = not p ■ p = sofar p ♦ p = previously p p S q = p since q
12
Offline Monitor does not run in parallel but runs after program Online Outline: Runs in parallel with program as an external entity. Inline: Runs in parallel with program as embedded in the code. Monitoring
13
Action to be taken in case faults are detected Error mesage Exception Seperate code execution Integrated code execution Reaction
14
Java PathExplorer (JPaX) Java MultiPathExplorer (JMPaX) Temporal ROVER (Commercial) Cadence, Synopsys, Mentor (Commercial HW Tools) Java MaC Partial Order Trace Analyzer (POTA) …. Runtime Verification Tools
15
Java PathExplorer (JPaX) Monitors Java programs by analyzing (exploring) particular execution traces. The observer performs two kinds of verification Logic based monitoring Future Time Temporal Logic Past Time Temporal Logic Error pattern analysis Deadlocks Data Races
16
JPaX Architecture
17
Data Race Analysis class Value { private int x = 1 ; public synchronized void add(Value v) { x = x + v.get() } ; public int get() { return x ; } } class Task extends Thread { Value v1 ; Value v2 ; public Task(Value v1, Value v2) {this.v1=v1;this.v2=v2;this.start()} public void run(){v1.add(v2)} ; } class Main { public static void main(String [] args) { Value d1 = new Value() ; Value d2 = new Value() ; new Task(d1, d2) ; new Task(d2, d1) ; }
18
Data Race Analysis Task 1 start() d1.lock.acquire() d1. add(d2) d1.x = d1.x + d2.get() R 1 = d2.get() = 1 d1.x = 1 + R 1 = 2 Task 2 start() d2.lock.acquire() d2. add(d1) d2.x = d2.x + d1.get() R2 = d1.get() = 1 d2.x = 1 + R 2 = 2
19
Data Race Analysis Task 1 Task 2 start() d1.lock.acquire() Thread-map[Task1] = {d1.lock} d1. add(d2) start() d2.lock.acquire() Thread-map[Task 2 ] = {d2.lock} d2. add(d1) d1.x = d1.x + d2.get() Variable-map[d1] = {d1.lock} R 1 = d2.get() = 1 Variable-map[d2] = {d 1.lock} d1.x = 1 + R 1 = 2 d2.x = d2.x + d1.get() Variable-map[d1] = {} R2 = d1.get() = 2 Variable-map[d1] = {} d2.x = 1 + R 2 = 3
20
Deadlock Analysis class Value { private int x = 1 ; public synchronized void add(Value v) { x = x + v.get() } ; public synchronized int get() { return x ; } } class Task extends Thread { Value v1 ; Value v2 ; public Task(Value v1, Value v2) {this.v1=v1;this.v2=v2;this.start()} public void run(){v1.add(v2)} ; } class Main { public static void main(String [] args) { Value d1 = new Value() ; Value d2 = new Value() ; new Task(d1, d2) ; new Task(d2, d1) ; }
21
Deadlock Analysis Task 1 start() d1.lock.acquire() d1. add(d2) d1.x = d1.x + d2.get() d2.lock.acquire() Task 2 start() d2.lock.acquire() d2. add(d1) d2.x = d2.x + d1.get() d1.lock.acquire() Deadlock occurred!!
22
Deadlock Analysis Task 1 Task 2 start() d1.lock.acquire() Thread-map[Task1] = {d1.lock} d1. add(d2) d1.x = d1.x + d2.get() d2.lock.acquire() Thread-map[Task1] = {d1.lock, d2.lock} d1.lock → d2.lock R 1 = d2.get() = 1 d1.x = 1 + R 1 = 2 start() d2.lock.acquire() Thread-map[Task2] = {d2.lock} d2. add(d1) d2.x = d2.x + d1.get() d1.lock.acquire() Thread-map[Task 2 ] = {d 2.lock, d 1.lock} d2.lock → d1.lock Cycle!! R2 = d1.get() = 2 d2.x = 1 + R 2 = 3
23
Possible Implementation class Value { private int x = 1 ; public void add(Value v) { x = x + v.get() } ; public int get() { return x ; } } class Task extends Thread { Value v1 ; Value v2 ; public Task(Value v1, Value v2) {this.v1=v1;this.v2=v2;this.start()} public void run(){ synchronized (lock) { v1.add(v2)} ; } class Main { public static Object lock = new Object(); public static void main(String [] args) { Value d1 = new Value() ; Value d2 = new Value() ; new Task(d1, d2) ; new Task(d2, d1) ; }
24
Possible Implementation Task 1 start() lock.acquire() d1. add(d2) d1.x = d1.x + d2.get() R 1 = d2.get() = 1 d1.x = 1 + R 1 = 2 lock.release () Task 2 start() lock.acquire() d2. add(d1) d2.x = d2.x + d1.get() R2 = d1.get() d2.x = 1 + R2 lock.release()
25
Java MultiPathExplorer (JMPaX) Monitors multithreaded Java programs. The observer performs Logic based monitoring based on Past Time Temporal Logic Have the ability to predict safety violation errors in multithreaded programs by observing successful executions.
26
JMPaX Architecture
27
Vector Clocks Vector Clocks is an algorithm for generating a partial ordering of events in a distributed system and detecting causality violations. A A:0 B B:0 C C:0 C:1 B:1 C:1 B:2 C:1 A:1 B:2 C:1 A:2 B:2 C:1 B:3 C:1 A:3 B:4 C:1 B:3 C:2 B:3 C:3 A:3 B:3 C:3
28
Example Suppose that one wants to monitor some safety property of the multithreaded program below. The program involves relevant variables x, y and z: Initially: x = −1; y = 0; z = 0; thread T1{... x++;... y = x + 1;... } thread T2{... z = x + 1;... x++;... }
29
Example
30
Multithreaded Safety Analysis Checking safety against single run Suppose we want to monitor “if (x > 0), then (x = 0) has been true in the past, and since then (y > z) was always false.” (x > 0) → [(x = 0), y >z)s (−1, 0, 0), (0, 0, 0), (0, 0, 1), (0, 1, 1), (1, 1, 1) -> satisfied (−1, 0, 0), (0, 0, 0), (0, 1, 0), (0, 1, 1), (1, 1, 1) -> not satisfied
31
Multithreaded Safety Analysis Checking safety against all runs The major hurdle in monitoring all possible runs is that the number of possible runs can be exponential in the length of the computation The problem is avoided by traversing the computation lattice level by level.
32
JPaX vs JMPaX JPaX uses total ordering of events JMPaX uses partial ordering of events In JPaX it is possible to reveal errors in multithreaded programs that are hard to detect by observing successful executions. JMPaX extends JPaX
33
Conclusion Runtime verification combines testing and formal methods to provide scalable solutions with bigger coverage. Several academic and commercial tools available to be used for runtime verification.
34
Further Study Other runtime verification tools. Use of tools on small scale real-life problems.
35
References “ Runtime Safety Analysis of Multithreaded Programs ”, Koushik Sen, Grigore Rosu, and Gul Agha. “ Monitoring Java Programs with Java PathExplore ”, K. Havelund and G. Rosu, http://pswlab.kaist.ac.kr/lab-orientation/presentation-file/trace_97.ppt http://pswlab.kaist.ac.kr/lab-orientation/presentation-file/trace_97.ppt http://www.runtime-verification.org/course/slides/lecture1.pdf http://www.runtime-verification.org/course/slides/lecture1.pdf http://www.cse.lehigh.edu/~gtan/bug/softwarebug.html http://www.cse.lehigh.edu/~gtan/bug/softwarebug.html http://en.wikipedia.org/wiki/List_of_notable_software_bugs http://en.wikipedia.org/wiki/List_of_notable_software_bugs
36
Thank you Questions ?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.