The ARM implementation of the JTAG standard for this task replaces the TDI and TDO pins with the single bidirectional pin SWDIO. The Morris worm exploited a command injection in a Unix sendmail mode intended for this purpose. This task can be performed using the netlist insertion method, in which an integrated logic analyzer traces the post-synthesis netlist. The x command in one tool for this task executes PEEKTEXT and POKETEXT using the Unix system call (*) ptrace. IBM Purity is often used to perform this task for memory occurrences, while gdb and lldb are more general tools for performing this task. This task can be primitively performed on hardware by inserting breakpoints between instructions or by single-stepping. For 10 points, name this process of removing errors from code. ■END■
ANSWER: debugging [accept fixing code or finding code errors until “removing errors” is read; accept control flow analysis; prompt on probing; reject “validation” or “verification”]
<KJ, Other Science>
= Average correct buzz position