Software Quality Journal

, Volume 25, Issue 1, pp 201–229

A declarative framework for stateful analysis of execution traces

  • Florian Wininger
  • Naser Ezzati-Jivan
  • Michel R. Dagenais
Article

DOI: 10.1007/s11219-016-9311-0

Cite this article as:
Wininger, F., Ezzati-Jivan, N. & Dagenais, M.R. Software Qual J (2017) 25: 201. doi:10.1007/s11219-016-9311-0

Abstract

With newer complex multi-core systems, it is important to understand an application’s runtime behavior to be able to debug its execution, detect possible problems and bottlenecks and finally identify potential root causes. Execution traces usually contain precise data about an application execution. Their analysis and abstraction at multiple levels can provide valuable information and insights about an application’s runtime behavior. However, with multiple abstraction levels, it becomes increasingly difficult to find the exact location of detected performance or security problems. Tracing tools provide various analysis views to help users to understand their application problems. However, these pre-defined views are often not sufficient to reveal all analysis aspects of the underlying application. A declarative approach that enables users to specify and build their own custom analysis and views based on their knowledge, requirements and problems can be more useful and effective. In this paper, we propose a generic declarative trace analysis framework to analyze, comprehend and visualize execution traces. This enhanced framework builds custom analyses based on a specified modeled state, extracted from a system execution trace and stored in a special purpose database. The proposed solution enables users to first define their different analysis models based on their application and requirements, then visualize these models in many alternate representations (Gantt chart, XY chart, etc.), and finally filter the data to get some highlights or detect some potential patterns. Several sample applications with different operating systems are shown, using trace events gathered from Linux and Windows, at the kernel and user-space levels.

Keywords

Software debugging Declarative debugging Execution trace analysis 

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Florian Wininger
    • 1
  • Naser Ezzati-Jivan
    • 1
  • Michel R. Dagenais
    • 1
  1. 1.Ecole Polytechnique MontrealMontrealCanada

Personalised recommendations