Code tracking method and device
A code and target technology, applied in the field of code tracking methods and devices, can solve problems such as inaccessibility, heavy code transformation workload, and inability to further dig down the code path, achieving the effect of high tracking accuracy and strong flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0049] figure 1 It shows a schematic flowchart of a code tracking method provided by an embodiment of the present invention, see figure 1 , the method includes the following steps:
[0050] 110. Obtain the data collected by the pre-built plug-in, the pre-built plug-in is attached to the target process running on the production environment;
[0051] It should be noted that when performing code tracking, the plug-in is first attached to the target process when the production environment is running through the JVM code instrument; then, when the business is opened to the outside world, the parameters and return values are captured to provide performance hotspot analysis. data support.
[0052] 120. Perform performance hotspot analysis on the acquired data, and determine the target interface according to the analysis results;
[0053] It should be noted that, based on the data obtained in step 110, the target interface is determined through preset criteria;
[0054] Wherein,...
Embodiment 2
[0061] figure 2 It shows a schematic diagram of the principle of a code tracking method provided by an embodiment of the present invention, see figure 2 , the principle of the method is as follows:
[0062] 210. Attach the plug-in to the running process of the production environment through the JVM code instrument, capture parameters and return values, provide data support for finding the target injection point, and improve the search efficiency of the target injection point;
[0063] 220. Find and obtain the target injection point based on the parameters and return values captured by the plug-in; the JVM code instrument injects the predefined sensor into the target injection point, and the sensor captures the transaction middleware interface parameter value;
[0064] 230. The code slicing program assembles and generates test cases according to the transaction middleware interface parameter values;
[0065] 240-250. Perform service detection processing on the production ...
Embodiment 3
[0072] The web front-end system indirectly invokes the transaction middle layer by calling some encapsulation interfaces. There are two technical implementation methods here: first, the JVM directly calls the production isolation middleware CICS / test transaction middleware Tuxedo through the transaction gateway; second, indirectly through the enterprise bus Call CICS / Tuxedo. Among them, the first method includes three steps.
[0073] see image 3 , the first step specifically includes:
[0074] 310. Perform stack analysis on the call stack obtained by the code instrument suite;
[0075] 320. On the entire call stack, select the lowest-end performance hotspot;
[0076] It should be noted that the lower-level business implementation often has wider implantation capabilities and can cover most business scenarios. If the prompt is that the ongoing thread is waiting for Object.wait(), it is actually waiting for the return of a synchronous or asynchronous call, which is of littl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


