DocumentCode :
3250995
Title :
Debugging with reverse watchpoint
Author :
Maruyama, Kazutaka ; Terada, Minoru
Author_Institution :
Dept of Mechano-Informatics, Tokyo Univ., Japan
fYear :
2003
fDate :
6-7 Nov. 2003
Firstpage :
116
Lastpage :
123
Abstract :
Many programmers have had to deal with an overwritten variable resulting for example from an aliasing problem. The culprit is obviously the last write-access to that memory location before the manifestation of the bug. The usual technique for removing such bugs starts with the debugger by (1) finding the last write and (2) moving the control point of execution back to that time by re-executing the program from the beginning. We call the feature to implement this process "reverse watchpoint" and believe automating it is important. In this paper we propose a new concept, "position ", that is, a point in the program execution trace, as needed for step (2) above. The position enables debuggers to automate the control of program execution to support common debugging activities. We have implemented position in Java with a bytecode transformer. Measurements show that position can be provided with an acceptable amount of overhead.
Keywords :
Java; program debugging; software maintenance; Java; bug manifestation; bug removal; bytecode transformer; debugger; execution control point; memory location; program execution control automation; reverse watchpoint; Automatic control; Computer bugs; Debugging; Information science; Java; Position measurement; Programming profession; Proposals; Software measurement; Software testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Quality Software, 2003. Proceedings. Third International Conference on
Print_ISBN :
0-7695-2015-4
Type :
conf
DOI :
10.1109/QSIC.2003.1319093
Filename :
1319093
Link To Document :
بازگشت