G06F11/3461

Tentative execution of code in a debugger
11055197 · 2021-07-06 · ·

Tentatively executing an entity includes identifying a runtime data element used by the entity, the runtime data element having a first value at a particular point based on a trace of a prior execution of the entity. Input specifying a second, different, value for the runtime data element is received. A tentative replay of the entity is performed, the tentative replay applying the second, different, value for the runtime data element using the trace. The tentative replay includes setting the runtime data element to the second value and emulating one or more memory writes performed by the entity during the tentative replay. Based on determining that the entity has requested data from the trace during the tentative replay that is not available in the trace, it is detected that the tentative replay has deviated from the prior execution and can no longer continue using the trace.

Method and system for fuzzing windows kernel by utilizing type information obtained through binary static analysis

Disclosed is a window kernel fuzzing technique utilizing type information obtained through binary static analysis. The method of fuzzing a kernel of a computer operating system performed by a fuzzing system may include the steps of: automatically inferring type information of a system call using a library file provided by the computer operating system; and performing system call fuzzing on the basis of the type information of the system call obtained through the inference.

Detecting performance regressions in software for controlling autonomous vehicles
10896116 · 2021-01-19 · ·

The disclosure relate to detecting performance regressions in software used to control autonomous vehicles. For instance, a simulation may be run using a first version of the software. While the simulation is running, CPU and memory usage by one or more functions of the first version of the software may be sampled. The sampled CPU and memory usage may be compared to CPU or memory usage by each of the one or more functions in a plurality of simulations each running a corresponding second version of the software. Based on the comparisons, an anomaly corresponding to a performance regression in the first version of the software relating to one of the one or more functions may be identified. In response to detecting the anomaly, the first version of the software and the one of the one or more functions may be flagged for review.

DEVICES, SYSTEMS AND METHODS FOR OPTIMIZING WORKLOAD PERFORMANCE OF USER FACING WEB APPLICATIONS DURING HIGH LOAD EVENTS

Disclosed are devices, systems, apparatuses, methods, products, and other implementations for optimizing system performance of user facing web applications with load testing scripts. According to some embodiments, the system includes an analytics engine and a workload model including one or more load variables. The workload model generates a distribution of values for each of the one or more load variables. The system further includes a script engine and a load test controller that controls load generators to simulate internet traffic to a website. The load test controller determines an amount of computer resources needed to meet a high load scenario based on the performance of the system in response to the simulated internet traffic to the website.

Method and apparatus for tracing common cause failure in integrated drawing

Provided is a method of tracing a common cause failure in an integrated drawing. The method includes: synthesizing entities assigned attributes in at least one design drawing in units of a system where a common cause is to be traced; generating an integrated drawing with a hierarchical structure by horizontally or vertically interconnecting the entities assigned the same attribute in the at least one design drawing; and displaying a fault propagation path in the integrated drawing by using an internal tracer, wherein the displaying illustrates state information of the entities on the fault propagation path.

INPUT/OUTPUT DATA TRANSFORMATIONS WHEN EMULATING NON-TRACED CODE WITH A RECORDED EXECUTION OF TRACED CODE
20200301809 · 2020-09-24 ·

Transforming input data to enable execution of second executable code using trace data gathered during execution of first executable code. A trace of an execution of the first code is accessed. The trace stores data of an input that was consumed by first executable instructions of the first code. It is determined that the stored data of the input is usable as an input to second executable instructions of the second code. A difference in size/format of the stored data as used by the first instructions, compared to an input size/format expected by the second executable instructions, is identified. Based on the identified difference, a data transformation is determined that would enable the second instructions to consume the stored data. Execution of the second instructions is emulated using the stored data, including projecting the data transformation to enable the second instructions to consume the stored data.

APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM FOR ANALYZING TRACE INFORMATION
20200285557 · 2020-09-10 ·

The present disclosure provides an apparatus for analyzing trace information. The apparatus includes one or more storage devices that store a set of instructions, and one or more processors. The one or more processors are configured to execute the set of instructions to cause the apparatus to: obtain, from servers, processor instruction traces corresponding to workloads performed by the servers; generate address traces based on the processor instruction traces; and perform a workload analysis in accordance with the address traces to model resource demands of the workloads.

SYSTEMS AND METHODS FOR PERFORMANCE MONITORING

Data storage systems monitor the performance of data storage operations on a granular level and compile the information for presenting to a user. The system measures the time of execution for individual granular stages of the storage operation and in response to the monitoring results, automatically adjust parameters to optimize performance. Further, the system performs a performance test by simulating the data storage operation, but may not actually write the data to the secondary storage medium.

Tracking missing data using provenance traces and data simulation

Methods, systems, and computer program products for tracking missing data using provenance traces and data simulation are provided herein. A computer-implemented method includes generating, for each of multiple stages in a data curation sequence, a machine learning model of the data curation sequence, wherein the model is based on historical input records within the data curation sequence, historical output records within the data curation sequence, and provenance data within the data curation sequence; creating a simulated output record based on a detected anomaly corresponding to the data curation sequence; predicting the content of absent input records that precede the simulated output record in the data curation sequence and provenance data corresponding to the simulated output record; and outputting, to a user, in response to a query pertaining to the detected anomaly, the predicted input records and information relating the predicted input records to the detected anomaly.

METHOD AND SYSTEM FOR CACHE AGENT TRACE AND CAPTURE
20200210315 · 2020-07-02 · ·

In one embodiment, a processor comprises a fabric interconnect to couple a first cache agent to at least one of a memory controller or an input/output (I/O) controller; and a first cache agent comprising a cache controller coupled to a cache; and a trace and capture engine to periodically capture a snapshot of state information associated with the first cache agent; trace events to occur at the first cache agent in between captured snapshots; and send the captured snapshots and traced events via the fabric interconnect to the memory controller or I/O controller for storage at a system memory or storage device.