Question

The ARM implementation of the JTAG standard for this task replaces the TDI and TDO pins with the single bidirectional pin SWDIO. The Morris worm exploited a command injection in a Unix sendmail mode intended for this purpose. (15[1])This task can be performed using the netlist insertion method, in which an integrated logic analyzer traces the post-synthesis netlist. The x command in one tool for this task executes PEEKTEXT and POKETEXT using the Unix system call (*) ptrace. IBM Purity is often used to perform this task for memory occurrences, while gdb (10[1])and lldb are more (10[1])general tools for performing this task. (10[1])This task can be primitively performed on hardware by inserting breakpoints between instructions (-5[1])or by single-stepping. For 10 points, name this (10[1])process of removing errors from code. ■END■ (10[1])

ANSWER: debugging [accept fixing code or finding code errors until “removing errors” is read; accept control flow analysis; prompt on probing; reject “validation” or “verification”]
<KJ, Other Science>
= Average correct buzz position

Back to tossups

Buzzes

PlayerTeamOpponentBuzz PositionValue
Franklin WuToronto Chestnut Rice and KamehamehaCarleton A3715
Mattias EhatammWaterloo AspidistraOttawa Absolomabsolomabsolom9010
Sky LiToronto AToronto Disband the Club 2k249410
James TangWaterloo ClozeToronto Metropolitan A10010
Asha BasuMcGill AMcMaster ApocolocyntosisBidii113-5
Ethen SunToronto BWaterloo Basic12110
Yusuf BaigMcMaster ApocolocyntosisBidiiMcGill A12810