This report describes a technique for using instruction counters to track nondeterminism in the execution of operating system kernels and user programs. The operating system records the number of instructions between consecutive nondeterministic events and information about their nature during normal operation. During an analysis phase, the execution is repeated under the control of a monitor, and the nondeterministic events are applied at the same instructions as during the monitored execution. We describe the application of this technique to four areas: Performance monitoring: The technique can be used to instrument an operating system to capture long traces of memory references. Unlike current techniques, it performs the gathering in a ...
Introduction Traditional benchmarks such as SPEC model a simple workload: a single address space, a...
Debugging a faulty program can be very hard and time-consuming. The programmer usually reexecutes hi...
System tracing, runtime monitoring, execution reconstruction are useful techniques for protecting th...
Improvements in performance and energy efficiency often require deep understanding of the complex in...
This dissertation proposes generalized techniques to support software performance analysis using sys...
1 Introduction Runtime verification and monitoring have been proposed as lightweight formal verifica...
Program execution monitoring consists of checking whole executions for given properties in order to ...
A fundamental problem with parallel program monitoring tools is the intrusiveness introduced by inst...
Ideal hardware performance counters provide exact deterministic results. Real-world performance moni...
We have developed a tool called SPAM (for System Performance Analysis using Mi-crocode), based on mi...
This paper shows how system call traces can be obtained with minimal interference to the system bein...
Abstract—To diagnose performance problems in production systems, many OS kernel-level monitoring and...
International audienceEstimating safe upper bounds on task execution times is required in the design...
A program trace lists the addresses of instructions executed and data referenced during a program's ...
The dynamic behavior of parallel programs can be disclosed by event-driven monitoring. A hybrid moni...
Introduction Traditional benchmarks such as SPEC model a simple workload: a single address space, a...
Debugging a faulty program can be very hard and time-consuming. The programmer usually reexecutes hi...
System tracing, runtime monitoring, execution reconstruction are useful techniques for protecting th...
Improvements in performance and energy efficiency often require deep understanding of the complex in...
This dissertation proposes generalized techniques to support software performance analysis using sys...
1 Introduction Runtime verification and monitoring have been proposed as lightweight formal verifica...
Program execution monitoring consists of checking whole executions for given properties in order to ...
A fundamental problem with parallel program monitoring tools is the intrusiveness introduced by inst...
Ideal hardware performance counters provide exact deterministic results. Real-world performance moni...
We have developed a tool called SPAM (for System Performance Analysis using Mi-crocode), based on mi...
This paper shows how system call traces can be obtained with minimal interference to the system bein...
Abstract—To diagnose performance problems in production systems, many OS kernel-level monitoring and...
International audienceEstimating safe upper bounds on task execution times is required in the design...
A program trace lists the addresses of instructions executed and data referenced during a program's ...
The dynamic behavior of parallel programs can be disclosed by event-driven monitoring. A hybrid moni...
Introduction Traditional benchmarks such as SPEC model a simple workload: a single address space, a...
Debugging a faulty program can be very hard and time-consuming. The programmer usually reexecutes hi...
System tracing, runtime monitoring, execution reconstruction are useful techniques for protecting th...