Bug isolation via remote program sampling

被引:130
作者
Liblit, B [1 ]
Aiken, A
Zheng, AX
Jordan, MI
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
[2] Univ Calif Berkeley, Dept Stat, Berkeley, CA 94720 USA
关键词
bug isolation; random sampling; assertions; feature selection; statistical debugging; logistic regression;
D O I
10.1145/780822.781148
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a low-overhead sampling infrastructure for gathering information from the executions experienced by a program's user community. Several example applications illustrate ways to use sampled instrumentation to isolate bugs. Assertion-dense code can be transformed to share the cost of assertions among many users. Lacking assertions, broad guesses can be made about predicates that predict program errors and a process of elimination used to whittle these down to the true bug. Finally, even for non-deterministic bugs such as memory corruption, statistical modeling based on logistic regression allows us to identify program behaviors that are strongly correlated with failure and are therefore likely places to look for the error.
引用
收藏
页码:141 / 154
页数:14
相关论文
共 28 条
[1]   Continuous profiling: Where have all the cycles gone? [J].
Anderson, JM ;
Berc, LM ;
Dean, J ;
Ghemawat, S ;
Henzinger, MR ;
Leung, STA ;
Sites, RL ;
Vandevoorde, MT ;
Waldspurger, CA ;
Weihl, WE .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1997, 15 (04) :357-390
[2]  
[Anonymous], 1995, 1268 U WISC MAD
[3]   A framework for reducing the cost of instrumented code [J].
Arnold, M ;
Ryder, BG .
ACM SIGPLAN NOTICES, 2001, 36 (05) :168-179
[4]  
ARNOLD M, 2000, 2178998099 RC IBM TJ
[5]  
*ASS COMP MACH, 2002, P INT C SOFTW ENG BU
[6]  
BOWRING J, 2002, P 2002 ACM SIGPLAN S, V28, P2
[7]  
Breiman L., 1984, STAT PROBABILITY SER
[8]  
BROADWELL P, 2003, IN PRESS P 11 USENIX
[9]  
Burrows M, 2000, ACM SIGPLAN NOTICES, V35, P160, DOI 10.1145/384264.379236
[10]   Collaborative filtering with privacy [J].
Canny, J .
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, :45-57