Affiliation:
1. Computer Sciences Department, University of Wisconsin - Madison, Madison, WI, USA
Abstract
Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and non-deterministic interleaving space. In reality, without the resources to thoroughly check the interleaving space, critical concurrency bugs can slip into production runs and cause failures in the field. Approaches to making the best use of the limited resources and exposing severe concurrency bugs before software release would be desirable.
Unlike previous work that focuses on bugs caused by specific interleavings (e.g., races and atomicity-violations), this paper targets concurrency bugs that result in one type of severe effects: program crashes. Our study of the error-propagation process of realworld concurrency bugs reveals a common pattern (50% in our non-deadlock concurrency bug set) that is highly correlated with program crashes. We call this pattern concurrency-memory bugs: buggy interleavings directly cause memory bugs (NULL-pointer-dereference, dangling-pointer, buffer-overflow, uninitialized-read) on shared memory objects.
Guided by this study, we built ConMem to monitor program execution, analyze memory accesses and synchronizations, and predicatively detect these common and severe concurrency-memory bugs. We also built a validator ConMem-v to automatically prune false positives by enforcing potential bug-triggering interleavings.
We evaluated ConMem using 7 open-source programs with 9 real-world severe concurrency bugs. ConMem detects more tested bugs (8 out of 9 bugs) than a lock-set-based race detector and an unserializable-interleaving detector that detect 4 and 5 bugs respectively, with a false positive rate about one tenth of the compared tools. ConMem-v further prunes out all the false positives. ConMem has reasonable overhead suitable for development usage.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Graphics and Computer-Aided Design,Software
Reference51 articles.
1. Apache Bugzilla. How important is the bug? http://issues.apache.org/bugwritinghelp.html. Apache Bugzilla. How important is the bug? http://issues.apache.org/bugwritinghelp.html.
2. Grace
3. Bugzilla@Mozilla. A bug's life cycle. https://bugzilla.mozilla.org/page.cgi?id=fields.html#severity. Bugzilla@Mozilla. A bug's life cycle. https://bugzilla.mozilla.org/page.cgi?id=fields.html#severity.
4. Asserting and checking determinism for multithreaded programs
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Understanding and Detecting Real-World Safety Issues in Rust;IEEE Transactions on Software Engineering;2024-06
2. Addressing a Malicious Tampering Attack on the Default Isolation Level in DBMS;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01
3. An Empirical Study on Concurrency Bugs in Interrupt-Driven Embedded Software;Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis;2023-07-12
4. WAFFLE: Exposing Memory Ordering Bugs Efficiently with Active Delay Injection;Proceedings of the Eighteenth European Conference on Computer Systems;2023-05-08
5. VeriLin: A Linearizability Checker for Large-Scale Concurrent Objects;Theoretical Aspects of Software Engineering;2023