Proceedings of the 19th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming 2014
DOI: 10.1145/2555243.2555262
|View full text |Cite
|
Sign up to set email alerts
|

Trace driven dynamic deadlock detection and reproduction

Abstract: Dynamic analysis techniques have been proposed to detect potential deadlocks. Analyzing and comprehending each potential deadlock to determine whether the deadlock is feasible in a real execution requires significant programmer effort. Moreover, empirical evidence shows that existing analyses are quite imprecise. This imprecision of the analyses further void the manual effort invested in reasoning about non-existent defects.In this paper, we address the problems of imprecision of existing analyses and the subs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 35 publications
(19 citation statements)
references
References 44 publications
0
19
0
Order By: Relevance
“…Static analysis approaches [8] for deadlock detection can be imprecise and also cannot automatically provide proof of correctness of the detected deadlock. We showed in [6] that our approach of deadlock detection, that is employed here, outperforms other dynamic deadlock detectors [2,1] with respect to precision and scalability.…”
Section: Related Workmentioning
confidence: 83%
See 3 more Smart Citations
“…Static analysis approaches [8] for deadlock detection can be imprecise and also cannot automatically provide proof of correctness of the detected deadlock. We showed in [6] that our approach of deadlock detection, that is employed here, outperforms other dynamic deadlock detectors [2,1] with respect to precision and scalability.…”
Section: Related Workmentioning
confidence: 83%
“…However, the reported deadlocks are manually analyzed to identify whether the reported deadlocks are true positives. In contrast, the integration of a precise deadlock detector [6] as part of implementation eliminates the need for a developer to analyze the source code and reason about the correctness of the reported deadlock.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…ConLock [12] first does an initial run and generates scheduling constraint from the trace and from a deadlock candidate, and then uses a form of random scheduling that works within the limits of the generated scheduling constraints. Wolf [53] first does an initial run and does cycle detection, then prunes away cycles that cannot be executed, then generates a synchronization dependency graph, and finally uses a form of scheduling based on that graph.…”
Section: Related Workmentioning
confidence: 99%