G06F11/3636

PROVIDING DEBUG INFORMATION ON PRODUCTION CONTAINERS USING DEBUG CONTAINERS

A method and associated system for providing debug information associated with computer software executing in a production container. The production container is replicated as a debug container. The computer software is executed in the production container and the debug container. Executing the computer software includes replicating requests sent to the computer software executing in the production container to the computer software executing in the debug container. Requests from the computer software executing in the production container are stored together with any responses to the stored requests. Debug information generated by the computer software executing in the debug container is stored.

CONTROL STATE PRESERVATION DURING TRANSACTIONAL EXECUTION

A method includes saving a control state for a processor in response to commencing a transactional processing sequence, wherein saving the control state produces a saved control state. The method also includes permitting updates to the control state for the processor while executing the transactional processing sequence. Examples of updates to the control state include key mask changes, primary region table origin changes, primary segment table origin changes, CPU tracing mode changes, and interrupt mode changes. The method also includes restoring the control state for the processor to the saved control state in response to encountering a transactional error during the transactional processing sequence. In some embodiments, saving the control state comprises saving the current control state to memory corresponding to internal registers for an unused thread or another level of virtualization. A corresponding computer system and computer program product are also disclosed herein.

Inferring watchpoints for understandable taint reports

A taint report represents a taint flow from a source value at a source program point to a sink value at a sink program point. Candidate watchpoints that correspond to taint-like values similar to the source value may be inferred from an execution trace. Different subsets of candidate watchpoints represent solutions to the problem of determining an optimal subset of watchpoints contributing to a taint flow. Using a hill-climbing heuristic, incremental improvements are efficiently applied to a solution until no more improvements are found. An objective function may determine whether one solution improves another solution. The objective function may be based on validity, understandability, and performance. Validity favors candidate watchpoints that reduce the edit distance between the source and sink values. Understandability favors candidate watchpoints included in a call chain from the source program point to the sink program point. Performance favors small subsets of candidate watchpoints.

PROVIDING A PSEUDO LANGUAGE FOR MANIPULATING COMPLEX VARIABLES OF AN ORCHESTRATION FLOW

A pseudo language is provided for manipulating the complex variables associated with the orchestration flow. Verbs are specified in the pseudo language. The verbs cause operations to be performed on the complex variables during processing of the orchestration flow. A first verb of the verbs is specified with a first operation of the operations The first operation, when processed, transfers data from a first set of source elements in a source complex variable to new target elements in a target complex variable based on a description of a target schema of the target complex variable. The target complex variable does not include the first subset of source elements and the target schema includes the description of the first subset of the source elements.

SYSTEM AND METHOD FOR ANOMALY DETECTION AND ROOT CAUSE AUTOMATION USING SHRUNK DYNAMIC CALL GRAPHS
20230004487 · 2023-01-05 ·

A system and method for real-time or near real-time anomaly detection and root cause automation in production environments or in other environments using shrunk dynamic call graphs are provided. The system includes an instrumentation agent that generates shrunk dynamic call graphs and exceptions/errors by injecting monitoring code or probes or call-tags into monitored application, a data agent that forwards collected data to the analysis engine over a network, an analysis engine that performs continuous clustering using machine learning, anomaly, and root cause detection. The system also includes a reporting module to report the anomaly.

CONTROLLED INPUT/OUTPUT IN PROGRESS STATE DURING TESTCASE PROCESSING

A transient input/output in progress state is established during processing of a testcase by a test infrastructure in a computing environment. The method includes obtaining the testcase for an object having one or more pages, and processing the testcase by the test infrastructure. Processing the testcase by the test infrastructure includes, for a page of the object, generating a delay in the processing of the testcase for the page of the object. The delay opens a transient input/output in progress state during which one or more test operations reference the page of the object.

SYSTEMS AND METHODS FOR SELECTIVE PATH SENSITIVE INTERVAL ANALYSIS

Abstract interpretation based static analysis tools use relational/non-relational abstract domains to verify program properties. Precision and scalability of analysis vary basis usage of abstract domains. K-limited path-sensitive interval domain is an abstract domain that was conventionally proposed for analysis on industry strength programs. The domain maintains variables' intervals along a configurable K subsets of paths at each program point, which implicitly provides co-relation among variables. When the number of paths at the join point exceeds K, set of paths are partitioned into K subsets, arbitrarily, which results in loss of precision required to verify program properties. To address the above problem, embodiments of the present disclosure provide selective merging of paths in such a way that the intervals computed help verifying more properties. The selective path-sensitive method of the present disclosure is based on the knowledge of variables whose values influence the verification outcome of program properties.

DYNAMIC DEBUG LOG ENABLER FOR ANY PROTECTION FAILURE JOBS
20230236953 · 2023-07-27 ·

The present invention provides a system, computer readable code and method for dynamically performing debugging. The system, code, and method store debugging logs throughout an operation. At predetermined points the logs are stored to a cache. Older and/or unnecessary logs are periodically deleted from the cache to ensure that the cache does not grow to be larger than a predetermined size. This avoids the need to re-run a scenario after an error occurs in order to produce troubleshooting/debugging information.

REAL-TIME CROSS APPLIANCE OPERATIONAL INTELLIGENCE DURING MANAGEMENT APPLIANCE UPGRADE

Distributed tracing is applied during an upgrade from a first management appliance to a second management appliance. The distributed tracing method includes generating a parent span that encapsulates states of the overall workflow, including a span context that contains a trace identifier and a span identifier, and generating a plurality of child spans. Each child span encapsulates states that represent a piece of the workflow and contains a reference to the parent span context. The states of the child spans include an error tag that indicates whether the piece of the workflow associated with the child span executed with an error. Because child spans may be generated for a piece of the workflow that is executed by a service running in the first or second management appliance, the span context for the parent span is persisted by the first management appliance and replicated for use by the second management appliance.

Automated deprecation analysis in a service-oriented system

Methods, systems, and computer-readable media for automated deprecation analysis in a service-oriented system are disclosed. A service deprecation system determines that a first service in a service-oriented system calls a second service in the service-oriented system. The service deprecation system determines that the second service calls a third service in the service-oriented system. The service deprecation system determines that logic of the second service is duplicated by logic of the first service. The first service is modified to call the third service instead of the second service, and the second service is disabled or removed from the service-oriented system.