REPT: reverse debugging of failures in deployed software
REPT: reverse debugging of failures in deployed software Cui et al., OSDI’18
REPT (‘repeat’) won a best paper award at OSDI’18 this month. It addresses the problem of debugging crashes in production software, when all you have available is a memory dump. In particular, we’re talking about debugging Windows binaries. To effectively understand and fix bugs, a developer wants to be able to follow the path leading up to the point of failure. Not just the control flow, but also the data values involved. This is known as reverse debugging. What’s so clever about REPT is that it enables reverse debugging without the high overheads of record/replay systems (typically up to 200%). It combines low overhead hardware tracing (Intel PT) to record a programs control flow, with a novel binary analysis technique to recover (a very good percentage of) data flow information. Evaluated on 16 real-world bugs in software such as Chrome, Apache, PHP, and Python, REPT enabled effective reverse debugging for 14 of them, including 2 concurrency bugs.
REPTs offline binary analysis and reverse debugging is integrated into WinDbg, and the Windows Error Reporting service (WER) is enhanced to support REPT so that developers can request Intel PT Continue reading

Arista strengthened its campus networking portfolio of products through its acquisition of Mojo Networks.
Altiostar, Mavenir, and Parallel Wireless were picked by TIP’s OpenRAN project for having the most compliant platforms.
These devices will be open, disaggregated, interoperable, and supplier-neutral, and they target mobile operators’ 5G deployments.