Hangfix: Automatically Fixing Software Hang Bugs for Production
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
APPLICATION of the DELTA DEBUGGING ALGORITHM to FINE-GRAINED AUTOMATED LOCALIZATION of REGRESSION FAULTS in JAVA PROGRAMS Master’S Thesis
TALLINN UNIVERSITY OF TECHNOLOGY Faculty of Information Technology Marina Nekrassova 153070IAPM APPLICATION OF THE DELTA DEBUGGING ALGORITHM TO FINE-GRAINED AUTOMATED LOCALIZATION OF REGRESSION FAULTS IN JAVA PROGRAMS Master’s thesis Supervisor: Juhan Ernits PhD Tallinn 2018 TALLINNA TEHNIKAÜLIKOOL Infotehnoloogia teaduskond Marina Nekrassova 153070IAPM AUTOMATISEETITUD SILUMISE RAKENDAMINE VIGADE LOKALISEERIMISEKS JAVA RAKENDUSTES Magistritöö Juhendaja: Juhan Ernits PhD Tallinn 2018 Author’s declaration of originality I hereby certify that I am the sole author of this thesis. All the used materials, references to the literature and the work of others have been referred to. This thesis has not been presented for examination anywhere else. Author: Marina Nekrassova 08.01.2018 3 Abstract In software development, occasionally, in the course of software evolution, the functionality that previously worked as expected stops working. Such situation is typically denoted by the term regression. To detect regression faults as promptly as possible, many agile development teams rely nowadays on automated test suites and the practice of continuous integration (CI). Shortly after the faulty change is committed to the shared mainline, the CI build fails indicating the fact of code degradation. Once the regression fault is discovered, it needs to be localized and fixed in a timely manner. Fault localization remains mostly a manual process, but there have been attempts to automate it. One well-known technique for this purpose is delta debugging algorithm. It accepts as input a set of all changes between two program versions and a regression test that captures the fault, and outputs a minimized set containing only those changes that directly contribute to the fault (in other words, are failure-inducing). -
Hang Analysis: Fighting Responsiveness Bugs
Hang Analysis: Fighting Responsiveness Bugs Xi Wang† Zhenyu Guo‡ Xuezheng Liu‡ Zhilei Xu† Haoxiang Lin‡ Xiaoge Wang† Zheng Zhang‡ †Tsinghua University ‡Microsoft Research Asia Abstract return to life. However, during the long wait, the user can neither Soft hang is an action that was expected to respond instantly but in- cancel the operation nor close the application. The user may have stead drives an application into a coma. While the application usu- to kill the application or even reboot the computer. ally responds eventually, users cannot issue other requests while The problem of “not responding” is widespread. In our expe- waiting. Such hang problems are widespread in productivity tools rience, hang has occurred in everyday productivity tools, such as such as desktop applications; similar issues arise in server programs office suites, web browsers and source control clients. The actions as well. Hang problems arise because the software contains block- that trigger the hang issues are often the ones that users expect to re- ing or time-consuming operations in graphical user interface (GUI) turn instantly, such as opening a file or connecting to a printer. As and other time-critical call paths that should not. shown in Figure 1(a), TortoiseSVN repository browser becomes unresponsive when a user clicks to expand a directory node of a This paper proposes HANGWIZ to find hang bugs in source code, which are difficult to eliminate before release by testing, remote source repository. The causes of “not responding” bugs may be complicated. An as they often depend on a user’s environment. HANGWIZ finds hang bugs by finding hang points: an invocation that is expected erroneous program that becomes unresponsive may contain dead- to complete quickly, such as a GUI action, but calls a blocking locks (Engler and Ashcraft 2003; Williams et al. -
Repairnator Patches Programs Automatically
Repairnator patches programs automatically Ubiquity Volume 2019, Number July (2019), Pages 1-12 Martin Monperrus, Simon Urli, Thomas Durieux, Matias Martinez, Benoit Baudry, Lionel Seinturier DOI: 10.1145/3349589 Repairnator is a bot. It constantly monitors software bugs discovered during continuous integration of open-source software and tries to fix them automatically. If it succeeds in synthesizing a valid patch, Repairnator proposes the patch to the human developers, disguised under a fake human identity. To date, Repairnator has been able to produce patches that were accepted by the human developers and permanently merged into the code base. This is a milestone for human-competitiveness in software engineering research on automatic program repair. Programmers have always been unhappy that mistakes are so easy, and they need to devote much of their work to finding and repairing defects. Consequently, there has been considerable research on detecting bugs, preventing bugs, or even proving their absence under specific assumptions. Yet, regardless of how bugs are found, this vast research has assumed that a human developer would fix the bugs. A decade ago, a group of researchers took an alternative path: regardless of how a bug is detected, they envisioned that an algorithm would analyze it to synthesize a patch. The corresponding research field is called "automated program repair." This paradigm shift has triggered a research thrust with significant achievements [1]: Some past bugs in software repositories would have been amenable to automatic correction. In this following example, a patch fixes an if- statement with incorrect condition (a patch inserts, deletes, or modifies source code): - if (x < 10) + if (x ≤ 10) foo(); Armed with the novel mindset of repairing instead of detecting, and with opulent and cheap computing power, it is possible today to automatically explore large search spaces of possible patches. -
What Is an Operating System III 2.1 Compnents II an Operating System
Page 1 of 6 What is an Operating System III 2.1 Compnents II An operating system (OS) is software that manages computer hardware and software resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function. Memory management Among other things, a multiprogramming operating system kernel must be responsible for managing all system memory which is currently in use by programs. This ensures that a program does not interfere with memory already in use by another program. Since programs time share, each program must have independent access to memory. Cooperative memory management, used by many early operating systems, assumes that all programs make voluntary use of the kernel's memory manager, and do not exceed their allocated memory. This system of memory management is almost never seen any more, since programs often contain bugs which can cause them to exceed their allocated memory. If a program fails, it may cause memory used by one or more other programs to be affected or overwritten. Malicious programs or viruses may purposefully alter another program's memory, or may affect the operation of the operating system itself. With cooperative memory management, it takes only one misbehaved program to crash the system. Memory protection enables the kernel to limit a process' access to the computer's memory. Various methods of memory protection exist, including memory segmentation and paging. All methods require some level of hardware support (such as the 80286 MMU), which doesn't exist in all computers. -
Mac OS X: an Introduction for Support Providers
Mac OS X: An Introduction for Support Providers Course Information Purpose of Course Mac OS X is the next-generation Macintosh operating system, utilizing a highly robust UNIX core with a brand new simplified user experience. It is the first successful attempt to provide a fully-functional graphical user experience in such an implementation without requiring the user to know or understand UNIX. This course is designed to provide a theoretical foundation for support providers seeking to provide user support for Mac OS X. It assumes the student has performed this role for Mac OS 9, and seeks to ground the student in Mac OS X using Mac OS 9 terms and concepts. Author: Robert Dorsett, manager, AppleCare Product Training & Readiness. Module Length: 2 hours Audience: Phone support, Apple Solutions Experts, Service Providers. Prerequisites: Experience supporting Mac OS 9 Course map: Operating Systems 101 Mac OS 9 and Cooperative Multitasking Mac OS X: Pre-emptive Multitasking and Protected Memory. Mac OS X: Symmetric Multiprocessing Components of Mac OS X The Layered Approach Darwin Core Services Graphics Services Application Environments Aqua Useful Mac OS X Jargon Bundles Frameworks Umbrella Frameworks Mac OS X Installation Initialization Options Installation Options Version 1.0 Copyright © 2001 by Apple Computer, Inc. All Rights Reserved. 1 Startup Keys Mac OS X Setup Assistant Mac OS 9 and Classic Standard Directory Names Quick Answers: Where do my __________ go? More Directory Names A Word on Paths Security UNIX and security Multiple user implementation Root Old Stuff in New Terms INITs in Mac OS X Fonts FKEYs Printing from Mac OS X Disk First Aid and Drive Setup Startup Items Mac OS 9 Control Panels and Functionality mapped to Mac OS X New Stuff to Check Out Review Questions Review Answers Further Reading Change history: 3/19/01: Removed comment about UFS volumes not being selectable by Startup Disk. -
Recovering from Operating System Crashes
Recovering from Operating System Crashes Francis David Daniel Chen Department of Computer Science Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign University of Illinois at Urbana-Champaign Urbana, USA Urbana, USA Email: [email protected] Email: [email protected] Abstract— When an operating system crashes and hangs, it timers and processor support techniques [12] are required to leaves the machine in an unusable state. All currently running detect such crashes. program state and data is lost. The usual solution is to reboot the It is accepted behavior that when an operating system machine and restart user programs. However, it is possible that after a crash, user program state and most operating system state crashes, all currently running user programs and data in is still in memory and hopefully, not corrupted. In this project, volatile memory is lost and unrecoverable because the proces- we use a watchdog timer to reset the processor on an operating sor halts and the system needs to be rebooted. This is inspite system crash. We have modified the Linux kernel and added of the fact that all of this information is available in volatile a recovery routine that is called instead of the normal boot up memory as long as there is no power failure. This paper function when the processor is reset by a watchdog. This resumes execution of user processes after killing the process that was explores the possibility of recovering the operating system executing when the watchdog fired. We have implemented this using the contents of memory in order to resume execution on the ARM architecture and we use a periodic watchdog kick of user programs without any data loss. -
Acronis True Image 2021
Acronis True Image 2021 USER GUIDE Table of contents 1 Introduction ....................................................................................................................7 1.1 What is Acronis® True Image™? ................................................................................................ 7 1.2 New in this version .................................................................................................................... 7 1.3 Backups created in Acronis True Image 2020 or later ............................................................... 8 1.4 System requirements and supported media ............................................................................. 9 1.4.1 Minimum system requirements .................................................................................................................... 9 1.4.2 Supported operating systems ...................................................................................................................... 10 1.4.3 Supported file systems .................................................................................................................................. 10 1.4.4 Supported Internet connection types ......................................................................................................... 11 1.4.5 Supported storage media ............................................................................................................................. 11 1.5 Installing Acronis True Image 2021 ..........................................................................................12 -
How to Use Microsoft Adplus to Capture Hang and Crash Logs for EFT Server
How to use Microsoft ADPlus to capture hang and crash logs for EFT Server THE INFORMATION IN THIS ARTICLE APPLIES TO: • EFT v6 and later DISCUSSION In order for support to properly determine root cause of a crash or hang of EFT Server, the client must be able to provide a crash dump or a hang dump. This article describes the following procedures: 1. How to use Microsoft ADPlus to capture hang and crash logs. 2. Collect a hang/crash dump. 3. Create and submit a case to support. IMPORTANT: Use of ADPlus to monitor crashes requires an active login on the system. Logging off will kill the ADPlus application. This can run while the server is locked, but user must NOT log off while using this. You will also need to disable any automatic restarting of the EFT service to ensure that the dump files can be collected properly. Confirm if you are experiencing a Hang or a Crash • A Hang is when the process (cftpstes.exe) is still running in task Manager but EFT does not respond to FTP/SSH/HTTP connections. It may also not respond to Administrator requests through COM or through the Administrator Interface. • A Crash is when the process (cftpstes.exe) is no longer running in Task Manager. Download ADPlus Download the 32-bit version of ADPlus from the URL below to capture the Crash or Hang dump. https://support.microsoft.com/en-us/help/286350/how-to-use-adplus-vbs-to-troubleshoot-hangs-and-crashes **Although there is a 64-bit version of ADPLUS, you MUST use the 32-bit version regardless of OS, as EFT is a 32-bit process** How to use Microsoft ADPlus to capture hang and crash logs for EFT Server Install ADPLUS Install ADPLUS, choosing the "custom" option, in the following folder: C:\dbtools Once ADP is installed, create the following folder: C:\ADPlusOutput For an Application Hang If you are investigating a hang, then the adplus.bat file should only be run when the system is hanging. -
Parastack: Efficient Hang Detection for MPI Programs at Large Scale
ParaStack: Eicient Hang Detection for MPI Programs at Large Scale Hongbo Li, Zizhong Chen, Rajiv Gupta University of California, Riverside CSE Department, 900 University Ave Riverside, CA 92521 fhli035,chen,[email protected] ABSTRACT It is widely accepted that some errors manifest more frequently While program hangs on large parallel systems can be detected via at large scale both in terms of the number of parallel processes and the widely used timeout mechanism, it is dicult for the users to problem size as testing is usually performed at small scale to manage set the timeout – too small a timeout leads to high false alarm rates cost and some errors are scale and input dependent [12, 29, 36, 39, and too large a timeout wastes a vast amount of valuable computing 40]. Due to communication, an error triggered in one process (faulty resources. To address the above problems with hang detection, this process) gradually spreads to others, nally leading to a global hang. paper presents ParaStack, an extremely lightweight tool to detect Although a hang may be caused by a single faulty process, this hangs in a timely manner with high accuracy, negligible overhead process is hard to locate as it is not easily distinguishable from with great scalability, and without requiring the user to select a other processes whose execution has stalled. us, the problem of timeout value. For a detected hang, it provides direction for fur- hang diagnosing, i.e. locating faulty processes, has received much ther analysis by telling users whether the hang is the result of an aention [11, 27, 28, 31]. -
A Method for the Recovery of Data After a Computer System Failure: The
Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1992 A method for the recovery of data after a computer system failure: the development of Constant Random Access Memory (CRAM) Recovery System Renford Adolphus Benito Brevett Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Computer Sciences Commons, and the Engineering Education Commons Recommended Citation Brevett, Renford Adolphus Benito, "A method for the recovery of data after a computer system failure: the development of Constant Random Access Memory (CRAM) Recovery System " (1992). Retrospective Theses and Dissertations. 9977. https://lib.dr.iastate.edu/rtd/9977 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. -
3.01.0000.00 Release Notes
VTrak® A-Class Mac OS X or macOS SAN Client VTrak Mac OS X Client Package 1.4.2 (build 54047) Release Notes. (Mac OS X/macOS Clients only) This Mac Client Package Requires VTrak A-Class firmware SR3.3 Version 1.16.0000.00 or later R1.00 10/25/2017 This document is applicable for SAN Clients of the following PROMISE A-Class models: Model Description VTrak A3800fSL 4U/24 FC, single controller with 2 FS Support VTrak A3800fDM 4U/24 FC, dual controller with 4 FS support VTrak A3600fSL 3U/16 FC, single controller with 2 FS Support VTrak A3600fDM 3U/16 FC, dual controller with 4 FS support The Client Operating Systems supported by this release include: Vendor Platform Type macOS 10.13 x64 macOS 10.12 (10.12.4, x64 Apple 10.12.5, 10.12.6) OS X 10.11 (10.11.6) x64 VTrak Client Package version 1.4.2 (54047) This release includes the macOS (High Sierra) 10.13 Support Notes: . Includes Extended ACL support for SAN client . Includes Spotlight support - Command line command “mdutil -i on” to enable Spotlight on VTrakFS (network) volume . Supports for English language only. The option to switch language is not implemented. R1.00 10/25/2017 Important Note on upgrading the VTrak Client in macOS 10.13: Sometimes after upgrading to macOS 10.13 and installing the new VTrakFS Client, you won’t be able to mount the file system. This is likely due to complications from the new requirements for User Approved Kernel Extension loading in macOS 10.13. -
Karampatsis2021.Pdf (1.617Mb)
This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions of use: This work is protected by copyright and other intellectual property rights, which are retained by the thesis author, unless otherwise stated. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. Scalable Deep Learning for Bug Detection Rafael-Michael Karampatsis I V N E R U S E I T H Y T O H F G E R D I N B U Doctor of Philosophy Institute for Language, Cognition and Computation School of Informatics University of Edinburgh 2020 Dedicated to my brother Elias and to my lovely parents for encouraging me to never stop pursuing my dreams Declaration I declare that this thesis has been composed by myself and that this work has not been submitted for any other degree or professional qualification. I confirm that the work submitted is my own, except where work which has formed part of jointly-authored publications has been included. My contribution and those of the other authors to this work have been explicitly indicated at the beginning of each chapter.