Encyclopedia of Crash Dump Analysis Patterns

Size: px
Start display at page:

Download "Encyclopedia of Crash Dump Analysis Patterns"

Transcription

1 Encyclopedia of Crash Dump Analysis Patterns Detecting Abnormal Software Structure and Behavior in Computer Memory Dmitry Vostokov Software Diagnostics Institute OpenTask

2 2 Published by OpenTask, Republic of Ireland Copyright 2015 by Dmitry Vostokov Copyright 2015 by Software Diagnostics Institute All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior written permission of the publisher. You must not circulate this book in any other binding or cover, and you must impose the same condition on any acquirer. OpenTask books are available through booksellers and distributors worldwide. For further information or comments send requests to press@opentask.com. Product and company names mentioned in this book may be trademarks of their owners. A CIP catalog record for this book is available from the British Library. ISBN-13: (Paperback) First printing, 2015 Version 1.0

3 3 Summary of Contents Summary of Contents 3 Detailed Table of Contents 17 Preface 41 A 43 Abridged Dump 43 Accidental Lock 47 Activation Context 54 Active Thread 57 Activity Resonance 59 Affine Thread 61 Annotated Disassembly 64 B 65 Blocked DPC 65 Blocked Queue 66 Blocked Thread 69 Blocking File 82 Blocking Module 85 Broken Link 86 Busy System 88 C 97 C++ Exception 97

4 4 Caller-n-Callee 99 Changed Environment 102 Cloud Environment 106 CLR Thread 108 Coincidental Error Code 112 Coincidental Frames 114 Coincidental Symbolic Information 118 Corrupt Dump 124 Corrupt Structure 126 Coupled Machines 128 Coupled Modules 129 Coupled Processes 130 Crash Signature 136 Crash Signature Invariant 138 Crashed Process 139 Critical Section Corruption 140 Critical Stack Trace 148 Custom Exception Handler 149 D 154 Data Alignment 154 Data Contents Locality 155 Data Correlation 160

5 Deadlock Debugger Bug 200 Debugger Omission 201 Design Value 202 Deviant Module 203 Deviant Token 210 Dialog Box 211 Directing Module 215 Disconnected Network Adapter 216 Disk Packet Buildup 218 Dispatch Level Spin 221 Distributed Spike 224 Distributed Wait Chain 232 Divide by Zero 234 Double Free 238 Double IRP Completion 258 Driver Device Collection 260 Dry Weight 261 Dual Stack Trace 262 Duplicate Extension 263 Duplicated Module 267 Dynamic Memory Corruption 272

6 6 E 292 Early Crash Dump 292 Effect Component 295 Embedded Comments 301 Empty Stack Trace 302 Environment Hint 306 Error Reporting Fault 307 Exception Module 310 Exception Stack Trace 312 Execution Residue 314 F 330 Fake Module 330 False Effective Address 334 False Function Parameters 335 False Positive Dump 338 Fat Process Dump 340 Fault Context 341 First Fault Stack Trace 342 FPU Exception 343 Frame Pointer Omission 345 Frozen Process 349 G 353

7 Ghost Thread Glued Stack Trace 355 H 358 Handle Leak 358 Handle Limit 359 Handled Exception 365 Hardware Activity 374 Hardware Error 378 Hidden Call 386 Hidden Exception 391 Hidden IRP 397 Hidden Module 398 Hidden Parameter 400 Hidden Process 402 High Contention 404 Historical Information 415 Hooked Functions 416 Hooked Modules 422 Hooking Level 424 I 427 Incomplete Stack Trace 427 Incomplete Session 428

8 8 Inconsistent Dump 430 Incorrect Stack Trace 431 Incorrect Symbolic Information 437 Injected Symbols 442 Inline Function Optimization 445 Instrumentation Information 449 Instrumentation Side Effect 453 Insufficient Memory 456 Invalid Exception Information 502 Invalid Handle 506 Invalid Parameter 518 Invalid Pointer 521 IRP Distribution Anomaly 523 J 525 JIT Code 525 L 528 Last Error Collection 528 Last Object 530 Late Crash Dump 531 Lateral Damage 532 Least Common Frame 533 Livelock 535

9 Local Buffer Overflow Lost Opportunity 540 M 542 Main Thread 542 Managed Code Exception 545 Managed Stack Trace 552 Manual Dump 553 Memory Fluctuation 562 Memory Leak 564 Message Box 588 Message Hooks 591 Missing Component 594 Missing Process 608 Missing Thread 609 Mixed Exception 614 Module Collection 619 Module Hint 622 Module Product Process 624 Module Variable 625 Module Variety 627 Multiple Exceptions 630 N 640

10 10 Namespace 640 Nested Exceptions 641 Nested Offender 648 Network Packet Buildup 651 No Component Symbols 652 No Current Thread 655 No Data Types 657 No Process Dumps 658 No System Dumps 659 Not My Version 660 NULL Pointer 662 O 668 OMAP Code Optimization 668 One-Thread Process 672 Optimized Code 674 Optimized VM Layout 676 Origin Module 678 Out-of-Module Pointer 680 Overaged System 681 P 682 Packed Code 682 Paged Out Data 685

11 Paratext Pass Through Function 689 Passive System Thread 691 Passive Thread 695 Past Stack Trace 702 Patched Code 704 Pervasive System 705 Platform-Specific Debugger 706 Pleiades 708 Pre-Obfuscation Residue 709 Problem Exception Handler 710 Problem Module 712 Problem Vocabulary 713 Process Factory 714 Punctuated Memory Leak 719 Q 723 Quiet Dump 723 R 724 Random Object 724 Raw Pointer 727 Reduced Symbolic Information 728 Reference Leak 729

12 12 Regular Data 732 RIP Stack Trace 733 Rough Stack Trace 735 S 738 Same Vendor 738 Screwbolt Wait Chain 739 Self-Diagnosis 740 Self-Dump 745 Semantic Split 747 Semantic Structure 754 Shared Buffer Overwrite 758 Shared Structure 766 Small Value 767 Software Exception 769 Special Process 770 Special Stack Trace 775 Special Thread 776 Spike Interval 777 Spiking Thread 778 Stack Overflow 787 Stack Trace 808 Stack Trace Change 822

13 Stack Trace Collection Stack Trace Set 839 Step Dumps 842 Stored Exception 843 String Hint 844 String Parameter 846 Suspended Thread 848 Swarm of Shared Locks 850 System Object 855 T 858 Tampered Dump 858 Technology-Specific Subtrace 871 Template Module 879 Thread Age 883 Thread Cluster 885 Thread Starvation 886 Top Module 892 Translated Exception 893 Truncated Dump 894 Truncated Stack Trace 897 U 898 Ubiquitous Component 898

14 14 Unknown Component 913 Unloaded Module 917 Unrecognizable Symbolic Information 921 Unsynchronized Dumps 926 V 927 Value Adding Process 927 Value Deviation 928 Value References 932 Version-Specific Extension 933 Virtualized Process 937 Virtualized System 945 W 951 Wait Chain 951 Waiting Thread Time 1001 Well-Tested Function 1010 Well-Tested Module 1011 Wild Code 1012 Wild Pointer 1014 Y 1016 Young System 1016 Z 1018 Zombie Processes 1018

15 Appendix A Reference Stack Traces 1025 Appendix B 1026.NET / CLR / Managed Space Patterns 1026 Contention Patterns 1027 Deadlock and Livelock Patterns 1028 DLL Link Patterns 1029 Dynamic Memory Corruption Patterns 1030 Executive Resource Patterns 1031 Exception Patterns 1032 Falsity and Coincidence Patterns 1033 Hooksware Patterns 1034 Insufficient Memory Patterns 1036 Meta-Memory Dump Patterns 1037 Module Patterns 1038 Optimization Patterns 1039 Process Patterns 1040 RPC, LPC and ALPC Patterns 1041 Stack Overflow Patterns 1042 Stack Trace Patterns 1043 Symbol Patterns 1044 Thread Patterns 1045

16 16 Wait Chain Patterns 1046 Appendix C 1047 Crash Dump Analysis Checklist 1047 Index 1051

17 17 Detailed Table of Contents Summary of Contents 3 Detailed Table of Contents 17 Preface 41 A 43 Abridged Dump 43 Accidental Lock 47 Activation Context 54 Active Thread 57 Mac OS X 57 Activity Resonance 59 Affine Thread 61 Annotated Disassembly 64 JIT.NET Code 64 B 65 Blocked DPC 65 Blocked Queue 66 LPC/ALPC 66 Comments 68 Blocked Thread 69 Hardware 69 Software 71

18 18 Comments 79 Timeout 81 Blocking File 82 Blocking Module 85 Comments 85 Broken Link 86 Busy System 88 C 97 C++ Exception 97 Windows 97 Comments 97 Mac OS X 98 Caller-n-Callee 99 Changed Environment 102 Comments 105 Cloud Environment 106 CLR Thread 108 Comments 111 Coincidental Error Code 112 Coincidental Frames 114 Coincidental Symbolic Information 118 Windows 118

19 Mac OS X Corrupt Dump 124 Comments 125 Corrupt Structure 126 Coupled Machines 128 Coupled Modules 129 Coupled Processes 130 Semantics 130 Strong 131 Comments 132 Weak 133 Crash Signature 136 Crash Signature Invariant 138 Crashed Process 139 Critical Section Corruption 140 Critical Stack Trace 148 Custom Exception Handler 149 Kernel Space 149 User Space 151 D 154 Data Alignment 154 Page Boundary 154

20 20 Data Contents Locality 155 Data Correlation 160 Function Parameters 160 Deadlock 162 Critical Sections 162 Comments 169 Executive Resources 174 LPC 178 Managed Space 183 Mixed Objects 186 Kernel Space 186 User Space 191 Comments 198 Self 199 Comments 199 Debugger Bug 200 Debugger Omission 201 Design Value 202 Deviant Module 203 Comments 209 Deviant Token 210 Dialog Box 211 Directing Module 215

21 Disconnected Network Adapter Disk Packet Buildup 218 Dispatch Level Spin 221 Distributed Spike 224 Comments 231 Distributed Wait Chain 232 Divide by Zero 234 Kernel Mode 234 User Mode 236 Windows 236 Mac OS X 237 Double Free 238 Kernel Pool 238 Comments 241 Process Heap 246 Windows 246 Comments 255 Mac OS X 257 Double IRP Completion 258 Driver Device Collection 260 Dry Weight 261 Dual Stack Trace 262 Duplicate Extension 263

22 22 Comments 266 Duplicated Module 267 Comments 271 Dynamic Memory Corruption 272 Kernel Pool 272 Comments 278 Managed Heap 282 Process Heap 285 Windows 285 Comments 286 Mac OS X 290 E 292 Early Crash Dump 292 Effect Component 295 Embedded Comments 301 Empty Stack Trace 302 Comments 305 Environment Hint 306 Error Reporting Fault 307 Exception Module 310 Exception Stack Trace 312 Comments 313 Execution Residue 314

23 23 Mac OS X 314 Managed Space 316 Comments 317 Unmanaged Space 318 Comments 329 F 330 Fake Module 330 False Effective Address 334 False Function Parameters 335 False Positive Dump 338 Fat Process Dump 340 Fault Context 341 First Fault Stack Trace 342 FPU Exception 343 Frame Pointer Omission 345 Frozen Process 349 G 353 Ghost Thread 353 Glued Stack Trace 355 H 358 Handle Leak 358 Handle Limit 359

24 24 GDI 359 Handled Exception 365.NET CLR 365 Kernel Space 370 User Space 371 Comments 373 Hardware Activity 374 Hardware Error 378 Comments 383 Hidden Call 386 Hidden Exception 391 Kernel Space 391 User Space 392 Hidden IRP 397 Hidden Module 398 Comments 399 Hidden Parameter 400 Hidden Process 402 High Contention 404.NET CLR Monitors 404 Critical Sections 407 Executive Resources 409 Comments 411

25 Processors Historical Information 415 Comments 415 Hooked Functions 416 Kernel Space 416 Comments 419 User Space 420 Hooked Modules 422 Comments 423 Hooking Level 424 I 427 Incomplete Stack Trace 427 GDB 427 Incomplete Session 428 Comments 429 Inconsistent Dump 430 Comments 430 Incorrect Stack Trace 431 Comments 436 Incorrect Symbolic Information 437 Injected Symbols 442 Inline Function Optimization 445

26 26 Managed Code 445 Unmanaged Code 447 Instrumentation Information 449 Instrumentation Side Effect 453 Comments 455 Insufficient Memory 456 Committed Memory 456 Control Blocks 458 Handle Leak 459 Comments 463 Kernel Pool 468 Comments 476 Module Fragmentation 477 Comments 484 Physical Memory 485 PTE 488 Comments 489 Region 490 Reserved Virtual Memory 492 Session Pool 495 Stack Trace Database 496 Invalid Exception Information 502 Invalid Handle 506 General 506

27 Comments 509 Managed Space Invalid Parameter 518 Process Heap 518 Invalid Pointer 521 General 521 IRP Distribution Anomaly 523 J 525 JIT Code 525.NET 525 Comments 527 L 528 Last Error Collection 528 Last Object 530 Late Crash Dump 531 Lateral Damage 532 Comments 532 Least Common Frame 533 Livelock 535 Local Buffer Overflow 537 Mac OS X 537 Windows 539

28 28 Lost Opportunity 540 M 542 Main Thread 542 Managed Code Exception 545 Managed Stack Trace 552 Manual Dump 553 Kernel 553 Comments 555 Process 558 Comments 561 Memory Fluctuation 562 Process Heap 562 Memory Leak 564.NET Heap 564 Comments 570 I/O Completion Packets 571 Page Tables 572 Process Heap 578 Comments 584 Regions 585 Message Box 588 Comments 590 Message Hooks 591

29 Missing Component General 594 Static Linkage 598 User Mode 598 Missing Process 608 Comments 608 Missing Thread 609 Comments 613 Mixed Exception 614 Comments 618 Module Collection 619 General 619 Predicate 621 Module Hint 622 Comments 623 Module Product Process 624 Module Variable 625 Module Variety 627 Multiple Exceptions 630 Windows 630 Kernel Mode 630 Managed Space 635 User Mode 636

30 30 Mac OS X 638 N 640 Namespace 640 Nested Exceptions 641 Managed Code 641 Unmanaged Code 644 Nested Offender 648 Network Packet Buildup 651 No Component Symbols 652 No Current Thread 655 No Data Types 657 No Process Dumps 658 No System Dumps 659 Comments 659 Not My Version 660 Hardware 660 Software 661 NULL Pointer 662 Windows 662 Code 662 Data 664 Mac OS X 665 Code 665

31 Data O 668 OMAP Code Optimization 668 One-Thread Process 672 Optimized Code 674 Comments 675 Optimized VM Layout 676 Origin Module 678 Out-of-Module Pointer 680 Overaged System 681 Comments 681 P 682 Packed Code 682 Paged Out Data 685 Paratext 687 Mac OS X 687 Comments 688 Pass Through Function 689 Comments 690 Passive System Thread 691 Kernel Space 691 Passive Thread 695

32 32 User Space 695 Comments 701 Past Stack Trace 702 Patched Code 704 Pervasive System 705 Platform-Specific Debugger 706 Pleiades 708 Pre-Obfuscation Residue 709 Problem Exception Handler 710 Comments 711 Problem Module 712 Problem Vocabulary 713 Process Factory 714 Punctuated Memory Leak 719 Q 723 Quiet Dump 723 R 724 Random Object 724 Raw Pointer 727 Reduced Symbolic Information 728 Reference Leak 729 Regular Data 732

33 RIP Stack Trace Rough Stack Trace 735 S 738 Same Vendor 738 Screwbolt Wait Chain 739 Self-Diagnosis 740 Kernel Mode 740 Comments 740 Registry 741 User Mode 743 Comments 744 Self-Dump 745 Semantic Split 747 Semantic Structure 754 PID.TID 754 Comments 757 Shared Buffer Overwrite 758 Windows 758 Mac OS X 762 Shared Structure 766 Small Value 767 Comments 768 Software Exception 769

34 34 Special Process 770 Comments 774 Special Stack Trace 775 Comments 775 Special Thread 776.NET CLR 776 Spike Interval 777 Spiking Thread 778 Windows 778 Comments 783 Mac OS X 785 Stack Overflow 787 Windows 787 Kernel Mode 787 Comments 795 Software Implementation 797 User Mode 799 Comments 802 Mac OS X 804 Stack Trace 808 Windows 808 Database 808 File System Filters 813

35 35 General 815 I/O Request 819 Mac OS X 821 Stack Trace Change 822 Stack Trace Collection 823 I/O Requests 823 Managed Space 827 Predicate 830 Unmanaged Space 831 Comments 838 Stack Trace Set 839 Step Dumps 842 Stored Exception 843 String Hint 844 String Parameter 846 Suspended Thread 848 Swarm of Shared Locks 850 System Object 855 T 858 Tampered Dump 858 Technology-Specific Subtrace 871 COM Interface Invocation 871 Dynamic Memory 874

36 36 JIT.NET Code 876 Template Module 879 Thread Age 883 Thread Cluster 885 Thread Starvation 886 Normal Priority 886 Realtime Priority 888 Top Module 892 Translated Exception 893 Truncated Dump 894 Windows 894 Mac OS X 896 Truncated Stack Trace 897 Comments 897 U 898 Ubiquitous Component 898 Kernel Space 898 User Space 901 Unknown Component 913 Unloaded Module 917 Unrecognizable Symbolic Information 921 Unsynchronized Dumps 926

37 V Value Adding Process 927 Value Deviation 928 Stack Trace 928 Value References 932 Comments 932 Version-Specific Extension 933 Virtualized Process 937 WOW Comments 944 Virtualized System 945 W 951 Wait Chain 951 CLR Monitors 951 Critical Sections 952 Executive Resources 955 General 959 Comments 963 LPC/ALPC 964 Modules 970 Mutex Objects 971 Named Pipes 973 Process Objects 975

38 38 Pushlocks 980 RPC 982 RTL_RESOURCE 986 Thread Objects 992 Window Messaging 996 Waiting Thread Time 1001 Kernel Dumps 1001 Comments 1006 User Dumps 1008 Comments 1009 Well-Tested Function 1010 Well-Tested Module 1011 Wild Code 1012 Wild Pointer 1014 Y 1016 Young System 1016 Z 1018 Zombie Processes 1018 Comments 1024 Appendix A 1025 Reference Stack Traces 1025 Appendix B 1026.NET / CLR / Managed Space Patterns 1026

39 Contention Patterns Deadlock and Livelock Patterns 1028 DLL Link Patterns 1029 Dynamic Memory Corruption Patterns 1030 Executive Resource Patterns 1031 Exception Patterns 1032 Falsity and Coincidence Patterns 1033 Hooksware Patterns 1034 Insufficient Memory Patterns 1036 Meta-Memory Dump Patterns 1037 Module Patterns 1038 Optimization Patterns 1039 Process Patterns 1040 RPC, LPC and ALPC Patterns 1041 Stack Overflow Patterns 1042 Stack Trace Patterns 1043 Symbol Patterns 1044 Thread Patterns 1045 Wait Chain Patterns 1046 Appendix C 1047 Crash Dump Analysis Checklist 1047 Index 1051

Encyclopedia of Crash Dump Analysis Patterns Second Edition

Encyclopedia of Crash Dump Analysis Patterns Second Edition Encyclopedia of Crash Dump Analysis Patterns Second Edition Detecting Abnormal Software Structure and Behavior in Computer Memory Dmitry Vostokov Software Diagnostics Institute OpenTask 2 Published by

More information

Memory Dump Analysis Anthology

Memory Dump Analysis Anthology Memory Dump Analysis Anthology Volume 6 Dmitry Vostokov Software Diagnostics Institute OpenTask 2 Published by OpenTask, Republic of Ireland Copyright 2013 by Dmitry Vostokov Copyright 2015 by Software

More information

Memory Forensics. Presented at VolgaCTF, Russia Inter-Regional Inter-University Open Computer Security Contest

Memory Forensics. Presented at VolgaCTF, Russia Inter-Regional Inter-University Open Computer Security Contest Memory Forensics Presented at VolgaCTF, Russia Inter-Regional Inter-University Open Computer Security Contest www.volgactf.ru Facebook LinkedIn Twitter Dmitry Vostokov Software Diagnostics Institute Forensics

More information

You must not circulate this book in any other binding or cover, and you must impose the same condition on any acquirer.

You must not circulate this book in any other binding or cover, and you must impose the same condition on any acquirer. Published by OpenTask, Republic of Ireland Copyright 2016 by OpenTask Copyright 2016 by Software Diagnostics Services Copyright 2016 by Dmitry Vostokov All rights reserved. No part of this book may be

More information

x64 Windows Debugging

x64 Windows Debugging x64 Windows Debugging Practical Foundations Dmitry Vostokov OpenTask 2 Published by OpenTask, Republic of Ireland Copyright 2009 by Dmitry Vostokov All rights reserved. No part of this book may be reproduced,

More information

.NET Memory. Dump Analysis. Version 2.0. Dmitry Vostokov Software Diagnostics Services

.NET Memory. Dump Analysis. Version 2.0. Dmitry Vostokov Software Diagnostics Services .NET Memory Dump Analysis Version 2.0 Dmitry Vostokov Software Diagnostics Services WinDbg Commands Prerequisites We use these boxes to introduce some WinDbg commands used in practice exercises Basic.NET

More information

Windows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1

Windows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1 Windows 7 Overview Windows 7 Overview By Al Lake History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface Lake 2 Objectives To explore the principles

More information

B. V. Patel Institute of Business Management, Computer &Information Technology, UTU

B. V. Patel Institute of Business Management, Computer &Information Technology, UTU BCA-3 rd Semester 030010304-Fundamentals Of Operating Systems Unit: 1 Introduction Short Answer Questions : 1. State two ways of process communication. 2. State any two uses of operating system according

More information

Buffer Overflow Defenses

Buffer Overflow Defenses Buffer Overflow Defenses Some examples, pros, and cons of various defenses against buffer overflows. Caveats: 1. Not intended to be a complete list of products that defend against buffer overflows. 2.

More information

Ausgewählte Betriebssysteme - Mark Russinovich & David Solomon (used with permission of authors)

Ausgewählte Betriebssysteme - Mark Russinovich & David Solomon (used with permission of authors) Outline Windows 2000 - The I/O Structure Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Components of I/O System Plug n Play Management Power Management I/O Data Structures File

More information

Computer Systems A Programmer s Perspective 1 (Beta Draft)

Computer Systems A Programmer s Perspective 1 (Beta Draft) Computer Systems A Programmer s Perspective 1 (Beta Draft) Randal E. Bryant David R. O Hallaron August 1, 2001 1 Copyright c 2001, R. E. Bryant, D. R. O Hallaron. All rights reserved. 2 Contents Preface

More information

CSL373/CSL633 Major Exam Solutions Operating Systems Sem II, May 6, 2013 Answer all 8 questions Max. Marks: 56

CSL373/CSL633 Major Exam Solutions Operating Systems Sem II, May 6, 2013 Answer all 8 questions Max. Marks: 56 CSL373/CSL633 Major Exam Solutions Operating Systems Sem II, 2012 13 May 6, 2013 Answer all 8 questions Max. Marks: 56 1. True or False. Give reasons and/or brief explanation. No marks for incomplete/wrong

More information

2 nd Half. Memory management Disk management Network and Security Virtual machine

2 nd Half. Memory management Disk management Network and Security Virtual machine Final Review 1 2 nd Half Memory management Disk management Network and Security Virtual machine 2 Abstraction Virtual Memory (VM) 4GB (32bit) linear address space for each process Reality 1GB of actual

More information

The Aggregator plugin PRINTED MANUAL

The Aggregator plugin PRINTED MANUAL The Aggregator plugin PRINTED MANUAL Aggregator plugin All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying,

More information

DNWSH - Version: 2.3..NET Performance and Debugging Workshop

DNWSH - Version: 2.3..NET Performance and Debugging Workshop DNWSH - Version: 2.3.NET Performance and Debugging Workshop .NET Performance and Debugging Workshop DNWSH - Version: 2.3 8 days Course Description: The.NET Performance and Debugging Workshop is a practical

More information

Application Programming

Application Programming Multicore Application Programming For Windows, Linux, and Oracle Solaris Darryl Gove AAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris

More information

The TCP redirecting plugin PRINTED MANUAL

The TCP redirecting plugin PRINTED MANUAL The TCP redirecting plugin PRINTED MANUAL TCP redirecting plugin All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including

More information

Module 23: Windows NT. Windows NT

Module 23: Windows NT. Windows NT Module 23: Windows NT History Design Principles System Components Environmental Subsystems File System Networking Programmer Interface Operating System Concepts 23.1 Silberschatz and Galvin c 1998 Windows

More information

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 22: Remote Procedure Call (RPC)

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 22: Remote Procedure Call (RPC) CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2002 Lecture 22: Remote Procedure Call (RPC) 22.0 Main Point Send/receive One vs. two-way communication Remote Procedure

More information

Module 21: Windows 2000

Module 21: Windows 2000 Module 21: Windows 2000 History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface 21.1 Windows 2000 32-bit preemptive multitasking operating system

More information

Module 21: Windows 2000

Module 21: Windows 2000 Module 21: Windows 2000 History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface 21.1 Windows 2000 32-bit preemptive multitasking operating system

More information

Software Based Fault Injection Framework For Storage Systems Vinod Eswaraprasad Smitha Jayaram Wipro Technologies

Software Based Fault Injection Framework For Storage Systems Vinod Eswaraprasad Smitha Jayaram Wipro Technologies Software Based Fault Injection Framework For Storage Systems Vinod Eswaraprasad Smitha Jayaram Wipro Technologies The agenda Reliability in Storage systems Types of errors/faults in distributed storage

More information

The Data timeout plugin PRINTED MANUAL

The Data timeout plugin PRINTED MANUAL The Data timeout plugin PRINTED MANUAL Data timeout plugin All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying,

More information

Module 23: Windows NT

Module 23: Windows NT Module 23: Windows NT History Design Principles System Components Environmental Subsystems File System Networking Programmer Interface Operating System Concepts 23.1 Silberschatz and Galvin c 1998 Windows

More information

ORACLG. Oracle Press. Advanced Tuning for. JD Edwards EnterpriseOne. Implementations

ORACLG. Oracle Press. Advanced Tuning for. JD Edwards EnterpriseOne. Implementations ORACLG Oracle Press Advanced Tuning for JD Edwards EnterpriseOne Implementations Foreword Acknowledgments Introduction... xv xvii xix 1 Outline of a Structured Tuning Methodology 1 Overview 3 Benchmarks

More information

CSCE Introduction to Computer Systems Spring 2019

CSCE Introduction to Computer Systems Spring 2019 CSCE 313-200 Introduction to Computer Systems Spring 2019 Processes Dmitri Loguinov Texas A&M University January 24, 2019 1 Chapter 3: Roadmap 3.1 What is a process? 3.2 Process states 3.3 Process description

More information

The "Event generator" plugin PRINTED MANUAL

The Event generator plugin PRINTED MANUAL The "Event generator" plugin PRINTED MANUAL "Event generator" plugin All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including

More information

Appendix C: Windows Operating System Concepts Essentials 8 th Edition

Appendix C: Windows Operating System Concepts Essentials 8 th Edition Appendix C: Windows 2000 Silberschatz, Galvin and Gagne 2011 Module C: Windows 2000 History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface c.2

More information

ExpressCluster X SingleServerSafe 3.2 for Windows. Operation Guide. 2/19/2014 1st Edition

ExpressCluster X SingleServerSafe 3.2 for Windows. Operation Guide. 2/19/2014 1st Edition ExpressCluster X SingleServerSafe 3.2 for Windows Operation Guide 2/19/2014 1st Edition Revision History Edition Revised Date Description First 2/19/2014 New manual Copyright NEC Corporation 2014. All

More information

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft.NET Framework Agent Fix Pack 13.

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft.NET Framework Agent Fix Pack 13. IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft.NET Framework Agent 6.3.1 Fix Pack 13 Reference IBM IBM Tivoli Composite Application Manager for Microsoft Applications:

More information

C# 6.0 in a nutshell / Joseph Albahari & Ben Albahari. 6th ed. Beijin [etc.], cop Spis treści

C# 6.0 in a nutshell / Joseph Albahari & Ben Albahari. 6th ed. Beijin [etc.], cop Spis treści C# 6.0 in a nutshell / Joseph Albahari & Ben Albahari. 6th ed. Beijin [etc.], cop. 2016 Spis treści Preface xi 1. Introducing C# and the.net Framework 1 Object Orientation 1 Type Safety 2 Memory Management

More information

The DNP3 plugin PRINTED MANUAL

The DNP3 plugin PRINTED MANUAL The DNP3 plugin PRINTED MANUAL DNP3 plugin All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

CS350: Final Exam Review

CS350: Final Exam Review University of Waterloo CS350: Final Exam Review Gwynneth Leece, Andrew Song, Rebecca Putinski Winter, 2010 Intro, Threads & Concurrency What are the three views of an operating system? Describe them. Define

More information

Process and Thread Management

Process and Thread Management Process and Thread Management Ausgewählte Betriebssysteme Professur Betriebssysteme Fakultät Informatik Data Structures Process Creation Thread Creation Scheduling Outline 2 1 Data Structures Process represented

More information

Outline. Process and Thread Management. Data Structures (2) Data Structures. Kernel Process Block (PCB)

Outline. Process and Thread Management. Data Structures (2) Data Structures. Kernel Process Block (PCB) Outline Process and Thread Management Ausgewählte Betriebssysteme Professur Betriebssysteme Fakultät Informatik Data Structures Process Creation Thread Creation Scheduling 2 Data Structures Data Structures

More information

The control of I/O devices is a major concern for OS designers

The control of I/O devices is a major concern for OS designers Lecture Overview I/O devices I/O hardware Interrupts Direct memory access Device dimensions Device drivers Kernel I/O subsystem Operating Systems - June 26, 2001 I/O Device Issues The control of I/O devices

More information

Reliable Computing I

Reliable Computing I Instructor: Mehdi Tahoori Reliable Computing I Lecture 9: Concurrent Error Detection INSTITUTE OF COMPUTER ENGINEERING (ITEC) CHAIR FOR DEPENDABLE NANO COMPUTING (CDNC) National Research Center of the

More information

Module 22: Windows XP. Chapter 22: Windows XP. Objectives. Windows XP. History. Design Principles

Module 22: Windows XP. Chapter 22: Windows XP. Objectives. Windows XP. History. Design Principles Module 22: Windows XP Chapter 22: Windows XP History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface 22.2 Silberschatz, Galvin and Gagne 2005 Objectives

More information

Chapter 22: Windows XP

Chapter 22: Windows XP Chapter 22: Windows XP Module 22: Windows XP History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface 22.2 Silberschatz, Galvin and Gagne 2005 Objectives

More information

The Scheduler & Hotkeys plugin PRINTED MANUAL

The Scheduler & Hotkeys plugin PRINTED MANUAL The Scheduler & Hotkeys plugin PRINTED MANUAL Scheduler & Hotkeys plugin All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including

More information

DISTRIBUTED COMPUTER SYSTEMS

DISTRIBUTED COMPUTER SYSTEMS DISTRIBUTED COMPUTER SYSTEMS Communication Fundamental REMOTE PROCEDURE CALL Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline Communication Architecture Fundamentals

More information

Java Performance: The Definitive Guide

Java Performance: The Definitive Guide Java Performance: The Definitive Guide Scott Oaks Beijing Cambridge Farnham Kbln Sebastopol Tokyo O'REILLY Table of Contents Preface ix 1. Introduction 1 A Brief Outline 2 Platforms and Conventions 2 JVM

More information

Lecture 6: Lazy Transactional Memory. Topics: TM semantics and implementation details of lazy TM

Lecture 6: Lazy Transactional Memory. Topics: TM semantics and implementation details of lazy TM Lecture 6: Lazy Transactional Memory Topics: TM semantics and implementation details of lazy TM 1 Transactions Access to shared variables is encapsulated within transactions the system gives the illusion

More information

Communication. Distributed Systems Santa Clara University 2016

Communication. Distributed Systems Santa Clara University 2016 Communication Distributed Systems Santa Clara University 2016 Protocol Stack Each layer has its own protocol Can make changes at one layer without changing layers above or below Use well defined interfaces

More information

ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE

ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE Most application performance problems surface during peak loads. Often times, these problems are time and resource intensive,

More information

Alex Ionescu, Chief

Alex Ionescu, Chief Alex Ionescu, Chief Architect @aionescu alex@crowdstrike.com Reverse engineered Windows kernel since 1999 Lead kernel developer for ReactOS Project Interned at Apple for a few years (Core Platform Team)

More information

IBM Content Manager for iseries. Messages and Codes. Version 5.1 SC

IBM Content Manager for iseries. Messages and Codes. Version 5.1 SC IBM Content Manager for iseries Messages and Codes Version 5.1 SC27-1137-00 IBM Content Manager for iseries Messages and Codes Version 5.1 SC27-1137-00 Note Before using this information and the product

More information

Verification & Validation of Open Source

Verification & Validation of Open Source Verification & Validation of Open Source 2011 WORKSHOP ON SPACECRAFT FLIGHT SOFTWARE Gordon Uchenick Coverity, Inc Open Source is Ubiquitous Most commercial and proprietary software systems have some open

More information

RTA-OS V850E2/GHS Release Note - Version ( )

RTA-OS V850E2/GHS Release Note - Version ( ) RTA-OS V850E2/GHS Release Note - Version 2.0.24 (17-11-2016) Copyright The data in this document may not be altered or amended without special notification from ETAS GmbH. ETAS GmbH undertakes no further

More information

Hackveda Training - Ethical Hacking, Networking & Security

Hackveda Training - Ethical Hacking, Networking & Security Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass

More information

The Google File System (GFS)

The Google File System (GFS) 1 The Google File System (GFS) CS60002: Distributed Systems Antonio Bruto da Costa Ph.D. Student, Formal Methods Lab, Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur 2 Design constraints

More information

Oracle Developer Studio Code Analyzer

Oracle Developer Studio Code Analyzer Oracle Developer Studio Code Analyzer The Oracle Developer Studio Code Analyzer ensures application reliability and security by detecting application vulnerabilities, including memory leaks and memory

More information

Module 12: I/O Systems

Module 12: I/O Systems Module 12: I/O Systems I/O hardwared Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Performance 12.1 I/O Hardware Incredible variety of I/O devices Common

More information

C and C++ Secure Coding 4-day course. Syllabus

C and C++ Secure Coding 4-day course. Syllabus C and C++ Secure Coding 4-day course Syllabus C and C++ Secure Coding 4-Day Course Course description Secure Programming is the last line of defense against attacks targeted toward our systems. This course

More information

Operating Systems Comprehensive Exam. Spring Student ID # 2/17/2011

Operating Systems Comprehensive Exam. Spring Student ID # 2/17/2011 Operating Systems Comprehensive Exam Spring 2011 Student ID # 2/17/2011 You must complete all of Section I You must complete two of the problems in Section II If you need more space to answer a question,

More information

CIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know:

CIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know: CIS 21 Final Study Guide Final covers ch. 1-20, except for 17. Need to know: I. Amdahl's Law II. Moore s Law III. Processes and Threading A. What is a process? B. What is a thread? C. Modes (kernel mode,

More information

OS Extensibility: SPIN and Exokernels. Robert Grimm New York University

OS Extensibility: SPIN and Exokernels. Robert Grimm New York University OS Extensibility: SPIN and Exokernels Robert Grimm New York University The Three Questions What is the problem? What is new or different? What are the contributions and limitations? OS Abstraction Barrier

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems DM510-14 Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations STREAMS Performance 13.2 Objectives

More information

McAfee Endpoint Security

McAfee Endpoint Security Release Notes 10.5.3 Contents About this release What's new Resolved issues Installation information Known issues Getting product information by email Where to find product documentation About this release

More information

Play with FILE Structure Yet Another Binary Exploitation Technique. Abstract

Play with FILE Structure Yet Another Binary Exploitation Technique. Abstract Play with FILE Structure Yet Another Binary Exploitation Technique An-Jie Yang (Angelboy) angelboy@chroot.org Abstract To fight against prevalent cyber threat, more mechanisms to protect operating systems

More information

Windows History 2009 Windows 7 2

Windows History 2009 Windows 7 2 Example: Windows 1 Windows History 2009 Windows 7 2 Features added Windows2000 additions Plug-and-play Network directory service New GUI Vista additions New GUI More focus on security clean-up the code

More information

CSL373/CSL633 Major Exam Operating Systems Sem II, May 6, 2013 Answer all 8 questions Max. Marks: 56

CSL373/CSL633 Major Exam Operating Systems Sem II, May 6, 2013 Answer all 8 questions Max. Marks: 56 CSL373/CSL633 Major Exam Operating Systems Sem II, 2012 13 May 6, 2013 Answer all 8 questions Max. Marks: 56 1. True or False. Give reasons and/or brief explanation. No marks for incomplete/wrong explanation.

More information

The Printer Out plugin PRINTED MANUAL

The Printer Out plugin PRINTED MANUAL The Printer Out plugin PRINTED MANUAL Printer Out plugin All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying,

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Streams Performance Objectives Explore the structure of an operating

More information

CLI Error Messages. CLI Error Messages APPENDIXA

CLI Error Messages. CLI Error Messages APPENDIXA APPENDIXA This appendix lists the CLI error messages and CLI validation error messages. It contains the following sections:, page A-1 CLI Validation Error Messages, page A-4 describes CLI error messages.

More information

The Events notification plugin PRINTED MANUAL

The Events notification plugin PRINTED MANUAL The Events notification plugin PRINTED MANUAL Events notification plugin All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including

More information

Device-Functionality Progression

Device-Functionality Progression Chapter 12: I/O Systems I/O Hardware I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Incredible variety of I/O devices Common concepts Port

More information

Chapter 12: I/O Systems. I/O Hardware

Chapter 12: I/O Systems. I/O Hardware Chapter 12: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations I/O Hardware Incredible variety of I/O devices Common concepts Port

More information

IT 540 Operating Systems ECE519 Advanced Operating Systems

IT 540 Operating Systems ECE519 Advanced Operating Systems IT 540 Operating Systems ECE519 Advanced Operating Systems Prof. Dr. Hasan Hüseyin BALIK (3 rd Week) (Advanced) Operating Systems 3. Process Description and Control 3. Outline What Is a Process? Process

More information

Quickly Pinpoint and Resolve Problems in Windows /.NET Applications TECHNICAL WHITE PAPER

Quickly Pinpoint and Resolve Problems in Windows /.NET Applications TECHNICAL WHITE PAPER Quickly Pinpoint and Resolve Problems in Windows /.NET Applications TECHNICAL WHITE PAPER Table of Contents Executive Overview...1 Problem Resolution A Major Time Consumer...2 > Inefficiencies of the Problem

More information

Chapter 12: I/O Systems

Chapter 12: I/O Systems Chapter 12: I/O Systems Chapter 12: I/O Systems I/O Hardware! Application I/O Interface! Kernel I/O Subsystem! Transforming I/O Requests to Hardware Operations! STREAMS! Performance! Silberschatz, Galvin

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations STREAMS Performance Silberschatz, Galvin and

More information

Chapter 12: I/O Systems. Operating System Concepts Essentials 8 th Edition

Chapter 12: I/O Systems. Operating System Concepts Essentials 8 th Edition Chapter 12: I/O Systems Silberschatz, Galvin and Gagne 2011 Chapter 12: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations STREAMS

More information

CSE 544 Principles of Database Management Systems

CSE 544 Principles of Database Management Systems CSE 544 Principles of Database Management Systems Alvin Cheung Fall 2015 Lecture 5 - DBMS Architecture and Indexing 1 Announcements HW1 is due next Thursday How is it going? Projects: Proposals are due

More information

CS 167 Final Exam Solutions

CS 167 Final Exam Solutions CS 167 Final Exam Solutions Spring 2018 Do all questions. 1. [20%] This question concerns a system employing a single (single-core) processor running a Unix-like operating system, in which interrupts are

More information

OSEK/VDX. Communication. Version January 29, 2003

OSEK/VDX. Communication. Version January 29, 2003 Open Systems and the Corresponding Interfaces for Automotive Electronics OSEK/VDX Communication Version 3.0.1 January 29, 2003 This document is an official release and replaces all previously distributed

More information

Student Name: University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Science

Student Name: University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Science University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Science CS 162 Spring 2011 I. Stoica FINAL EXAM Friday, May 13, 2011 INSTRUCTIONS READ THEM

More information

Design of Operating System

Design of Operating System Design of Operating System Architecture OS protection, modes/privileges User Mode, Kernel Mode https://blog.codinghorror.com/understanding-user-and-kernel-mode/ a register of flag to record what mode the

More information

Fast Byte-Granularity Software Fault Isolation

Fast Byte-Granularity Software Fault Isolation Fast Byte-Granularity Software Fault Isolation Manuel Costa Microsoft Research, Cambridge Joint work with: Miguel Castro, Jean-Philippe Martin, Marcus Peinado, Periklis Akritidis, Austin Donnelly, Paul

More information

Chapter 2: Operating-System Structures. Operating System Concepts Essentials 8 th Edition

Chapter 2: Operating-System Structures. Operating System Concepts Essentials 8 th Edition Chapter 2: Operating-System Structures Operating System Concepts Essentials 8 th Edition Silberschatz, Galvin and Gagne 2011 Chapter 2: Operating-System Structures Operating System Services User Operating

More information

Chapter 2: System Structures. Operating System Concepts 9 th Edition

Chapter 2: System Structures. Operating System Concepts 9 th Edition Chapter 2: System Structures Silberschatz, Galvin and Gagne 2013 Chapter 2: System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs

More information

EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows. Operation Guide. 10/03/2016 4th Edition

EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows. Operation Guide. 10/03/2016 4th Edition EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows Operation Guide 10/03/2016 4th Edition Revision History Edition Revised Date Description 1st 02/09/2015 New manual 2nd 04/20/2015 Corresponds to the internal

More information

Error num: 1 Meaning: Not owner Error num: 2 Meaning: No such file or directory Error num: 3 Meaning: No such process Error num: 4 Meaning:

Error num: 1 Meaning: Not owner Error num: 2 Meaning: No such file or directory Error num: 3 Meaning: No such process Error num: 4 Meaning: Error num: 1 Meaning: Not owner Error num: 2 Meaning: No such file or directory Error num: 3 Meaning: No such process Error num: 4 Meaning: Interrupted system call Error num: 5 Meaning: I/O error Error

More information

Chapter 2: Operating-System

Chapter 2: Operating-System Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services! User Operating System Interface! System Calls! Types of System Calls! System Programs! Operating

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Streams Performance I/O Hardware Incredible variety of I/O devices Common

More information

Welcome to. Supporting Support. Presented by : T.Roy. CodeMachine Inc.

Welcome to. Supporting Support. Presented by : T.Roy. CodeMachine Inc. Welcome to Supporting Support Presented by : T.Roy CodeMachine Inc. www.codemachine.com Speaker Introduction Tilakraj Roy Roychoudhury Masters in Computer Engineering 20 years experience in system software

More information

CLI Error Messages. CLI Error Messages APPENDIXD

CLI Error Messages. CLI Error Messages APPENDIXD APPENDIXD This appendix lists the CLI error messages and CLI validation error messages. It contains the following sections:, page D-1 CLI Validation Error Messages, page D-5 describes CLI error messages.

More information

SELF-AWARE APPLICATIONS AUTOMATIC PRODUCTION DIAGNOSIS DINA GOLDSHTEIN

SELF-AWARE APPLICATIONS AUTOMATIC PRODUCTION DIAGNOSIS DINA GOLDSHTEIN SELF-AWARE APPLICATIONS AUTOMATIC PRODUCTION DIAGNOSIS DINA GOLDSHTEIN Agenda Motivation Hierarchy of self-monitoring CPU profiling GC monitoring Heap analysis Deadlock detection 2 Agenda Motivation Hierarchy

More information

C13: Files and Directories: System s Perspective

C13: Files and Directories: System s Perspective CISC 7310X C13: Files and Directories: System s Perspective Hui Chen Department of Computer & Information Science CUNY Brooklyn College 4/19/2018 CUNY Brooklyn College 1 File Systems: Requirements Long

More information

Using Memory Analysis to Create Leaner, Faster, More Reliable Embedded Systems

Using Memory Analysis to Create Leaner, Faster, More Reliable Embedded Systems Font and font sizes: Title: Arial 14, bold Using Memory Analysis to Create Leaner, Faster, More Reliable Embedded Systems Bill Graham, Product Line Manager Paul N. Leroux, Technology Analyst QNX Software

More information

NightStar. NightView Source Level Debugger. Real-Time Linux Debugging and Analysis Tools BROCHURE

NightStar. NightView Source Level Debugger. Real-Time Linux Debugging and Analysis Tools BROCHURE NightStar Real-Time Linux Debugging and Analysis Tools Concurrent s NightStar is a powerful, integrated tool set for debugging and analyzing time-critical Linux applications. NightStar tools run with minimal

More information

SHADOW WALKER Raising The Bar For Rootkit Detection. By Sherri Sparks Jamie Butler

SHADOW WALKER Raising The Bar For Rootkit Detection. By Sherri Sparks Jamie Butler SHADOW WALKER Raising The Bar For Rootkit Detection By Sherri Sparks ssparks@longwood.cs.ucf.edu Jamie Butler james.butler@hbgary.com What Is A Rootkit? Defining characteristic is stealth. Viruses reproduce,

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Streams Performance 13.2 Silberschatz, Galvin

More information

Chapter 13: I/O Systems. Chapter 13: I/O Systems. Objectives. I/O Hardware. A Typical PC Bus Structure. Device I/O Port Locations on PCs (partial)

Chapter 13: I/O Systems. Chapter 13: I/O Systems. Objectives. I/O Hardware. A Typical PC Bus Structure. Device I/O Port Locations on PCs (partial) Chapter 13: I/O Systems Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Streams Performance 13.2 Silberschatz, Galvin

More information

Virtual Memory Outline

Virtual Memory Outline Virtual Memory Outline Background Demand Paging Copy-on-Write Page Replacement Allocation of Frames Thrashing Memory-Mapped Files Allocating Kernel Memory Other Considerations Operating-System Examples

More information

CSE544 Database Architecture

CSE544 Database Architecture CSE544 Database Architecture Tuesday, February 1 st, 2011 Slides courtesy of Magda Balazinska 1 Where We Are What we have already seen Overview of the relational model Motivation and where model came from

More information

Page 1. Goals for Today" Remote Procedure Call" Raw messaging is a bit too low-level for programming! RPC Details"

Page 1. Goals for Today Remote Procedure Call Raw messaging is a bit too low-level for programming! RPC Details Goals for Today" CS162 Operating Systems and Systems Programming Lecture 23 Remote Procedure Call" Remote Procedure Call Examples using RPC and caching Distributed File Systems World-Wide Web April 24,

More information

Windows Interrupts

Windows Interrupts Windows 2000 - Interrupts Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik 1 Interrupts Software and Hardware Interrupts and Exceptions Kernel installs interrupt trap handlers Interrupt

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Computer Systems Engineering: Spring Quiz I Solutions

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Computer Systems Engineering: Spring Quiz I Solutions Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.033 Computer Systems Engineering: Spring 2011 Quiz I Solutions There are 10 questions and 12 pages in this

More information

Process Description and Control. Chapter 3

Process Description and Control. Chapter 3 Process Description and Control 1 Chapter 3 2 Processes Working definition: An instance of a program Processes are among the most important abstractions in an OS all the running software on a computer,

More information