Assessment and Improvement of Hang Detection in the Linux Operating System

Total Page:16

File Type:pdf, Size:1020Kb

Assessment and Improvement of Hang Detection in the Linux Operating System 2009 28th IEEE International Symposium on Reliable Distributed Systems Assessment and Improvement of Hang Detection in the Linux Operating System Domenico Cotroneo∗, Roberto Natella∗†, and Stefano Russo∗† ∗Dipartimento di Informatica e Sistemistica, Università degli Studi di Napoli Federico II, Via Claudio 21, Naples, Italy †Laboratorio CINI-ITEM “Carlo Savy”, Complesso Universitario Monte Sant’Angelo, Ed.1, Via Cinthia, Naples, Italy {cotroneo, roberto.natella, stefano.russo}@unina.it Abstract—We propose a fault injection framework to assess detection mechanisms within OSs can fail, and they may hang detection facilities within the Linux Operating System lead to missing, misleading, or false detections. This is the (OS). The novelty of the framework consists in the adoption of case of hang failures, which are caused by a significant a more representative faultload than existing ones, and in the effectiveness in terms of number of hang failures produced; part of software faults in OS code [15]; they cause the OS representativeness is supported by a field data study on the to get partially or completely stalled, and to not provide Linux OS. Using the proposed fault injection framework, any response to user-space applications. It is difficult to along with realistic workloads, we find that the Linux OS detect hang failures, because they hamper the execution is unable to detect hangs in several cases. We experience a of the OS, and, unlike other types of failures (e.g., illegal relative coverage of 75%. To improve detection facilities, we propose a simple yet effective hang detector, which periodically memory access), they are not notified by the hardware. tests OS liveness, as perceived by applications, by means of Focus of this paper is on the assessment and the I/O system calls; it is shown that this approach can improve improvement of hang detection mechanisms in commodity relative coverage up to 94%. The hang detector can be OSs. The problem of hang detection has been faced in deployed on any Linux system, with an acceptable overhead. past research studies (see §II). However, they assume knowledge about workload or availability of special I. INTRODUCTION hardware, thus hampering their adoption in commodity Operating Systems (OSs) act as the core of a wide range OSs. Our driving idea is to propose a fault injection of computer systems, enabling the development of complex framework to assess hang detection facilities, and to and distributed services. Commodity OSs are being used guide their improvement. To the best of our knowledge, even in critical scenarios, since they allow a reduction of there are not fault injection techniques tailored for the development time and costs. However, they suffer the well- assessment of hang detection mechanisms. Fault injection known dependability pitfalls that characterize Off-the-Shelf is a valuable approach for experimental evaluation of (OTS) software modules [1]. A failure in the OS may com- fault tolerance mechanisms, as it provides the means for promise the correct execution and application performance, studying of complex interactions between faults, errors, as well as the mission of the overall system [2]. Hence, failures and fault tolerance mechanisms [16], and it can be characterizing the dependability of OSs is a major concern. used to complement and increase the confidence of other It has been demonstrated that software faults (i.e., bugs) validation approaches [17]. However, existing fault injection are a major cause of system failures [3]–[5]. As they can techniques and tools, based on bit-flips (e.g., NFTAPE) and manifest transiently, depending on environmental conditions generic software faults (e.g., G-SWFIT), are able to induce (e.g., hardware and software configuration, workload, and a hang only in a small minority of cases [18], [19], and no timing events), they often elude testing efforts, thus resulting previous work discusses fault representativeness with respect in failures on the field; this is especially true for OSs, which to hang scenarios. In this paper, we propose a fault injection are very complex and often made up of millions of lines of framework for experimental evaluation of OS hang detection code, often written by third-party developers (e.g., device mechanisms. The contribution of this paper is twofold: drivers). Several research studies have been conducted on 1) The design of a representative and effective fault injection fault tolerance issues within commodity OSs, such as repli- framework, which is made up of the following phases: cation, checkpointing, driver restarting, and microreboots • Collection and analysis of software fault reports. Our [6]–[10]. All these mechanisms rely on the OS capability study on the Linux OS confirms that concurrency of decting the occurrence of a failure. Failure detection issues are a major cause of hang failures, as observed capabilities are a fundamental requirement for enabling from previous field data studies [5], [15]; fault tolerance strategies, and to achieve self-management • Definition of a set of faults based on the collected in complex and distributed systems [11]. However, there are software fault reports; failures that may occur without being explicitly notified by • Identification of fault locations by system profiling. the system, for which a recovery action cannot be started. It is worth noting that although several model checking As shown by several studies on field failures [4], [12]–[14], approaches [20] have been proposed, the fault injection framework is complementary to them, since it is difficult This work has been partially supported by the Regione Campania in to comprehensively model software systems. the context of the projects L.R n. 5/2002, “Reti di sensori senza filo per l’identificazione ed il tracciamento di target mobili” and Misura 3.17 2) It proposes a hang detection mechanism that overcomes POR 200/2006, “REMOAM Reti di sensori per il monitoraggio dei rischi limitations of hang detectors in the Linux OS. The ambientali.” proposed mechanism tests OS liveness, as perceived 1060-9857/09 $26.00 © 2009 IEEE 288 DOI 10.1109/SRDS.2009.26 Authorized licensed use limited to: Universita degli Studi di Napoli. Downloaded on January 6, 2010 at 13:33 from IEEE Xplore. Restrictions apply. by applications, by means of periodic system call characterized by minimal overhead and cannot be affected invocations, in order to stimulate most important OS by software faults. However, hardware support may be not subsystems (e.g., memory management, file system, available, and they are not able to detect failures in which device drivers); failure detection is performed by the OS is stalled but the monitored events still occur. More monitoring of kernel I/O throughput. flexible software-implemented techniques are needed to cope An experimental campaign is conducted on Linux OS, with these failures. In this paper we consider hang detection using the proposed framework and workloads representative mechanisms that do not rely on hardware instrumentation. of long-running applications in real-world systems. Workload modeling techniques. They provide a synthetic Experiments show that, in 75% of cases, the kernel is model of system performance, in order to detect anomalies able to detect a hang (see §IV). The proposed detection due to both applications and OS faults [27]–[29]. OS level mechanism has been able to detect 94% of hangs, thus metrics are considered (e.g., CPU utilization, paging, I/O improving detection relative coverage of 19%, with respect operations, and free memory), which are modeled by means to the considered faultload and workloads (see §VI). The of time series analysis and machine learning (e.g., PCA, detector exhibits low overhead and no false positives, and decision trees). They are particularly effective when the it does not require in-depth knowledge of system internals. operational profile is known a priori. Regression techniques The remainder of the paper is organized as follows: have been proposed in [30] to reduce false detections due §II discusses the state of the art in the field of OS hang to changes in the operational profile; nevertheless, workload detection; §III describes the proposed fault injection frame- modeling approaches are not immune to false positives. work for OS hang detection assessment; §IV describes the Moreover, workload modeling cannot distinguish between experimental analysis we conduct on Linux; §V proposes a OS faults and application faults, therefore it is difficult to mechanism for improving hang detection, which is analyzed correctly apply OS fault tolerance mechanisms. in §VI; §VII ends up with conclusions and future work. B. Technical Background II. BACKGROUND AND RELATED RESEARCH Kernel data collection tools. Several monitoring facilities A. Related Work on Hang Detection are provided by the Linux kernel, which have been exploited in this work. In particular, we use KProbes1, which inserts Debugging techniques. They use static and dynamic breakpoints in arbitrary binary code locations in charge of source code analysis to identify hang root causes. In [21], triggering user-defined handler functions. Handlers can be the disk I/O subsystem is modeled analytically; the model is used to collect information about internal kernel variables; then compared to execution traces, to identify workload con- subsequently, kernel execution is restored. Kdump2 is a ditions under which performance is suspiciously low, and to tool for failure data collection based on the execution fix anomalies
Recommended publications
  • Hang Analysis: Fighting Responsiveness Bugs
    Hang Analysis: Fighting Responsiveness Bugs Xi Wang† Zhenyu Guo‡ Xuezheng Liu‡ Zhilei Xu† Haoxiang Lin‡ Xiaoge Wang† Zheng Zhang‡ †Tsinghua University ‡Microsoft Research Asia Abstract return to life. However, during the long wait, the user can neither Soft hang is an action that was expected to respond instantly but in- cancel the operation nor close the application. The user may have stead drives an application into a coma. While the application usu- to kill the application or even reboot the computer. ally responds eventually, users cannot issue other requests while The problem of “not responding” is widespread. In our expe- waiting. Such hang problems are widespread in productivity tools rience, hang has occurred in everyday productivity tools, such as such as desktop applications; similar issues arise in server programs office suites, web browsers and source control clients. The actions as well. Hang problems arise because the software contains block- that trigger the hang issues are often the ones that users expect to re- ing or time-consuming operations in graphical user interface (GUI) turn instantly, such as opening a file or connecting to a printer. As and other time-critical call paths that should not. shown in Figure 1(a), TortoiseSVN repository browser becomes unresponsive when a user clicks to expand a directory node of a This paper proposes HANGWIZ to find hang bugs in source code, which are difficult to eliminate before release by testing, remote source repository. The causes of “not responding” bugs may be complicated. An as they often depend on a user’s environment. HANGWIZ finds hang bugs by finding hang points: an invocation that is expected erroneous program that becomes unresponsive may contain dead- to complete quickly, such as a GUI action, but calls a blocking locks (Engler and Ashcraft 2003; Williams et al.
    [Show full text]
  • What Is an Operating System III 2.1 Compnents II an Operating System
    Page 1 of 6 What is an Operating System III 2.1 Compnents II An operating system (OS) is software that manages computer hardware and software resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function. Memory management Among other things, a multiprogramming operating system kernel must be responsible for managing all system memory which is currently in use by programs. This ensures that a program does not interfere with memory already in use by another program. Since programs time share, each program must have independent access to memory. Cooperative memory management, used by many early operating systems, assumes that all programs make voluntary use of the kernel's memory manager, and do not exceed their allocated memory. This system of memory management is almost never seen any more, since programs often contain bugs which can cause them to exceed their allocated memory. If a program fails, it may cause memory used by one or more other programs to be affected or overwritten. Malicious programs or viruses may purposefully alter another program's memory, or may affect the operation of the operating system itself. With cooperative memory management, it takes only one misbehaved program to crash the system. Memory protection enables the kernel to limit a process' access to the computer's memory. Various methods of memory protection exist, including memory segmentation and paging. All methods require some level of hardware support (such as the 80286 MMU), which doesn't exist in all computers.
    [Show full text]
  • Mac OS X: an Introduction for Support Providers
    Mac OS X: An Introduction for Support Providers Course Information Purpose of Course Mac OS X is the next-generation Macintosh operating system, utilizing a highly robust UNIX core with a brand new simplified user experience. It is the first successful attempt to provide a fully-functional graphical user experience in such an implementation without requiring the user to know or understand UNIX. This course is designed to provide a theoretical foundation for support providers seeking to provide user support for Mac OS X. It assumes the student has performed this role for Mac OS 9, and seeks to ground the student in Mac OS X using Mac OS 9 terms and concepts. Author: Robert Dorsett, manager, AppleCare Product Training & Readiness. Module Length: 2 hours Audience: Phone support, Apple Solutions Experts, Service Providers. Prerequisites: Experience supporting Mac OS 9 Course map: Operating Systems 101 Mac OS 9 and Cooperative Multitasking Mac OS X: Pre-emptive Multitasking and Protected Memory. Mac OS X: Symmetric Multiprocessing Components of Mac OS X The Layered Approach Darwin Core Services Graphics Services Application Environments Aqua Useful Mac OS X Jargon Bundles Frameworks Umbrella Frameworks Mac OS X Installation Initialization Options Installation Options Version 1.0 Copyright © 2001 by Apple Computer, Inc. All Rights Reserved. 1 Startup Keys Mac OS X Setup Assistant Mac OS 9 and Classic Standard Directory Names Quick Answers: Where do my __________ go? More Directory Names A Word on Paths Security UNIX and security Multiple user implementation Root Old Stuff in New Terms INITs in Mac OS X Fonts FKEYs Printing from Mac OS X Disk First Aid and Drive Setup Startup Items Mac OS 9 Control Panels and Functionality mapped to Mac OS X New Stuff to Check Out Review Questions Review Answers Further Reading Change history: 3/19/01: Removed comment about UFS volumes not being selectable by Startup Disk.
    [Show full text]
  • Recovering from Operating System Crashes
    Recovering from Operating System Crashes Francis David Daniel Chen Department of Computer Science Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign University of Illinois at Urbana-Champaign Urbana, USA Urbana, USA Email: [email protected] Email: [email protected] Abstract— When an operating system crashes and hangs, it timers and processor support techniques [12] are required to leaves the machine in an unusable state. All currently running detect such crashes. program state and data is lost. The usual solution is to reboot the It is accepted behavior that when an operating system machine and restart user programs. However, it is possible that after a crash, user program state and most operating system state crashes, all currently running user programs and data in is still in memory and hopefully, not corrupted. In this project, volatile memory is lost and unrecoverable because the proces- we use a watchdog timer to reset the processor on an operating sor halts and the system needs to be rebooted. This is inspite system crash. We have modified the Linux kernel and added of the fact that all of this information is available in volatile a recovery routine that is called instead of the normal boot up memory as long as there is no power failure. This paper function when the processor is reset by a watchdog. This resumes execution of user processes after killing the process that was explores the possibility of recovering the operating system executing when the watchdog fired. We have implemented this using the contents of memory in order to resume execution on the ARM architecture and we use a periodic watchdog kick of user programs without any data loss.
    [Show full text]
  • Acronis True Image 2021
    Acronis True Image 2021 USER GUIDE Table of contents 1 Introduction ....................................................................................................................7 1.1 What is Acronis® True Image™? ................................................................................................ 7 1.2 New in this version .................................................................................................................... 7 1.3 Backups created in Acronis True Image 2020 or later ............................................................... 8 1.4 System requirements and supported media ............................................................................. 9 1.4.1 Minimum system requirements .................................................................................................................... 9 1.4.2 Supported operating systems ...................................................................................................................... 10 1.4.3 Supported file systems .................................................................................................................................. 10 1.4.4 Supported Internet connection types ......................................................................................................... 11 1.4.5 Supported storage media ............................................................................................................................. 11 1.5 Installing Acronis True Image 2021 ..........................................................................................12
    [Show full text]
  • How to Use Microsoft Adplus to Capture Hang and Crash Logs for EFT Server
    How to use Microsoft ADPlus to capture hang and crash logs for EFT Server THE INFORMATION IN THIS ARTICLE APPLIES TO: • EFT v6 and later DISCUSSION In order for support to properly determine root cause of a crash or hang of EFT Server, the client must be able to provide a crash dump or a hang dump. This article describes the following procedures: 1. How to use Microsoft ADPlus to capture hang and crash logs. 2. Collect a hang/crash dump. 3. Create and submit a case to support. IMPORTANT: Use of ADPlus to monitor crashes requires an active login on the system. Logging off will kill the ADPlus application. This can run while the server is locked, but user must NOT log off while using this. You will also need to disable any automatic restarting of the EFT service to ensure that the dump files can be collected properly. Confirm if you are experiencing a Hang or a Crash • A Hang is when the process (cftpstes.exe) is still running in task Manager but EFT does not respond to FTP/SSH/HTTP connections. It may also not respond to Administrator requests through COM or through the Administrator Interface. • A Crash is when the process (cftpstes.exe) is no longer running in Task Manager. Download ADPlus Download the 32-bit version of ADPlus from the URL below to capture the Crash or Hang dump. https://support.microsoft.com/en-us/help/286350/how-to-use-adplus-vbs-to-troubleshoot-hangs-and-crashes **Although there is a 64-bit version of ADPLUS, you MUST use the 32-bit version regardless of OS, as EFT is a 32-bit process** How to use Microsoft ADPlus to capture hang and crash logs for EFT Server Install ADPLUS Install ADPLUS, choosing the "custom" option, in the following folder: C:\dbtools Once ADP is installed, create the following folder: C:\ADPlusOutput For an Application Hang If you are investigating a hang, then the adplus.bat file should only be run when the system is hanging.
    [Show full text]
  • Parastack: Efficient Hang Detection for MPI Programs at Large Scale
    ParaStack: Eicient Hang Detection for MPI Programs at Large Scale Hongbo Li, Zizhong Chen, Rajiv Gupta University of California, Riverside CSE Department, 900 University Ave Riverside, CA 92521 fhli035,chen,[email protected] ABSTRACT It is widely accepted that some errors manifest more frequently While program hangs on large parallel systems can be detected via at large scale both in terms of the number of parallel processes and the widely used timeout mechanism, it is dicult for the users to problem size as testing is usually performed at small scale to manage set the timeout – too small a timeout leads to high false alarm rates cost and some errors are scale and input dependent [12, 29, 36, 39, and too large a timeout wastes a vast amount of valuable computing 40]. Due to communication, an error triggered in one process (faulty resources. To address the above problems with hang detection, this process) gradually spreads to others, nally leading to a global hang. paper presents ParaStack, an extremely lightweight tool to detect Although a hang may be caused by a single faulty process, this hangs in a timely manner with high accuracy, negligible overhead process is hard to locate as it is not easily distinguishable from with great scalability, and without requiring the user to select a other processes whose execution has stalled. us, the problem of timeout value. For a detected hang, it provides direction for fur- hang diagnosing, i.e. locating faulty processes, has received much ther analysis by telling users whether the hang is the result of an aention [11, 27, 28, 31].
    [Show full text]
  • A Method for the Recovery of Data After a Computer System Failure: The
    Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1992 A method for the recovery of data after a computer system failure: the development of Constant Random Access Memory (CRAM) Recovery System Renford Adolphus Benito Brevett Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Computer Sciences Commons, and the Engineering Education Commons Recommended Citation Brevett, Renford Adolphus Benito, "A method for the recovery of data after a computer system failure: the development of Constant Random Access Memory (CRAM) Recovery System " (1992). Retrospective Theses and Dissertations. 9977. https://lib.dr.iastate.edu/rtd/9977 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted.
    [Show full text]
  • 3.01.0000.00 Release Notes
    VTrak® A-Class Mac OS X or macOS SAN Client VTrak Mac OS X Client Package 1.4.2 (build 54047) Release Notes. (Mac OS X/macOS Clients only) This Mac Client Package Requires VTrak A-Class firmware SR3.3 Version 1.16.0000.00 or later R1.00 10/25/2017 This document is applicable for SAN Clients of the following PROMISE A-Class models: Model Description VTrak A3800fSL 4U/24 FC, single controller with 2 FS Support VTrak A3800fDM 4U/24 FC, dual controller with 4 FS support VTrak A3600fSL 3U/16 FC, single controller with 2 FS Support VTrak A3600fDM 3U/16 FC, dual controller with 4 FS support The Client Operating Systems supported by this release include: Vendor Platform Type macOS 10.13 x64 macOS 10.12 (10.12.4, x64 Apple 10.12.5, 10.12.6) OS X 10.11 (10.11.6) x64 VTrak Client Package version 1.4.2 (54047) This release includes the macOS (High Sierra) 10.13 Support Notes: . Includes Extended ACL support for SAN client . Includes Spotlight support - Command line command “mdutil -i on” to enable Spotlight on VTrakFS (network) volume . Supports for English language only. The option to switch language is not implemented. R1.00 10/25/2017 Important Note on upgrading the VTrak Client in macOS 10.13: Sometimes after upgrading to macOS 10.13 and installing the new VTrakFS Client, you won’t be able to mount the file system. This is likely due to complications from the new requirements for User Approved Kernel Extension loading in macOS 10.13.
    [Show full text]
  • How to Start Using Princeton's High Performance Computing Systems
    How to Start Using Princeton’s High Performance Computing Systems Dawn Koffman Office of Population Research Princeton University January 2017 1 Running Your Computation on Princeton’s High Performance Computing Systems significantly more computing resources available compared to your laptop or desktop but often, particularly at first, it is much easier to develop and debug locally, and then ‐ connect ‐ transfer files ‐ submit jobs and make use of full computing power available on these remote systems 2 Workshop Outline Part I • Princeton’s High Performance Computing Systems Part II • Linux Philosophy and User Interface • Files • Directories • Commands • Shell Programs • Stream Editor: sed 3 Princeton’s High Performance Computing Systems • Overview • Obtaining Accounts • Connecting • Transferring Files • Running R scripts and Stata .do Files • Using a Scheduler to Submit Computing Jobs 4 Part I Princeton’s High Performance Computing Systems ‐ remote computing systems managed by Princeton’s Research Computing group http://www.princeton.edu/researchcomputing/ ‐hardware location: ‐ High Performance Computing Research Center (HPCRC) ‐ 47,000‐square‐foot facility opened in 2011 ‐tours ‐ computing systems make up TIGRESS: Terascale Infrastructure for Groundbreaking Research in Engineering and Science ‐in addition to remote computing systems, Research Computing also manages: software licenses and support (Stata, SAS, Matlab, …) visualization lab (open house today, 3:30‐5:30pm, Peter B. Lewis Library, Room 347) 5 How to Get Started ‐ request
    [Show full text]
  • Some Computers May Hang Or Present a Blue Screen of Death
    FAQ Some Computers May Hang or Present a Blue Screen of Death with Stop Code: MEMORY MANAGEMENT Error You may experience a time where your Dell computer stops working or presents a Stop Code: MEMORY MANAGEMENT error Figure 1, (commonly called a Blue Screen Of Death or BSOD), this may be caused by DDR4 2666MHz memory modules installed in the computers listed in Table 1. Dell recommends that the latest BIOS be installed. For more information refer to Dell Knowledge Base article Dell BIOS Updates. Note: To determine whether or not that the latest BIOS includes the the resolution for this issue, perform the following steps. 1. Once on the product page for your computer, select the BIOS file name to expand the section. 2. Touch or click View full driver details. 3. Look under Enhancements:. 4. When Improved memory compatibility for DDR4 2666Mhz memory DIMMS is listed, the BIOS has been updated to resolve the issue. When it does not, please refer to this site later, for an updated BIOS. Dell also provides an application called SupportAssist, which provides automatic computer updates and proactive resolution features to help identify and prevent issues. To run the SupportAssist application, perform the following steps. 1. In the Search Box on your computer, type SupportAssist. 2. Select SupportAssist in the search results to open the application. Note: When SupportAssist is not listed in the search results, it means the application is not installed on your computer. For more information on how to download and install SupportAssist, see the SupportAssist for PCs and tablets page.
    [Show full text]
  • Automating Problem Analysis and Triage Sasha Goldshtein @Goldshtn Production Debugging
    Automating Problem Analysis and Triage Sasha Goldshtein @goldshtn Production Debugging Requirements Limitations • Obtain actionable • Can’t install Visual information about Studio crashes and errors • Can’t suspend • Obtain accurate production servers performance • Can’t run intrusive information tools In the DevOps Process… Automatic build (CI) Automatic Automatic deployment remediation (CD) Automatic Automatic error triage monitoring and analysis Dump Files Dump Files • A user dump is a snapshot of a running process • A kernel dump is a snapshot of the entire system • Dump files are useful for post-mortem diagnostics and for production debugging • Anytime you can’t attach and start live debugging, a dump might help Limitations of Dump Files • A dump file is a static snapshot • You can’t debug a dump, just analyze it • Sometimes a repro is required (or more than one repro) • Sometimes several dumps must be compared Taxonomy of Dumps • Crash dumps are dumps generated when an application crashes • Hang dumps are dumps generated on-demand at a specific moment • These are just names; the contents of the dump files are the same! Generating a Hang Dump • Task Manager, right- click and choose “Create Dump File” • Creates a dump in %LOCALAPPDATA%\Te mp Procdump • Sysinternals utility for creating dumps • Examples: Procdump -ma app.exe app.dmp Procdump -ma -h app.exe hang.dmp Procdump -ma -e app.exe crash.dmp Procdump -ma -c 90 app.exe cpu.dmp Procdump -m 1000 -n 5 -s 600 -ma app.exe Windows Error Reporting • WER can create dumps automatically
    [Show full text]