Unlock instant, AI-driven research and patent intelligence for your innovation.

Operating journal obtaining method, program, and storage medium

A technology for running logs and programs, which is applied in memory systems, program control design, program control devices, etc., can solve the problems of increasing the workload of processing the running logs, difficult to obtain and process, and time-consuming.

Inactive Publication Date: 2004-01-21
CANON KK
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) In order to obtain operation logs continuously even in the user's operating environment, it is necessary to process and add a processing operation log acquisition routine to the software module itself, which will increase the workload for obtaining and processing operation logs
[0005] (2) Since the acquisition of the processing operation log is carried out for each module, the generated operation log is based on the unit of the module, and it is difficult to obtain the processing of the entire software as an operation log in complete chronological order
Therefore, the process of analyzing the operation log until the cause of the failure is extremely time-consuming as the prediction of the entire processing operation log is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operating journal obtaining method, program, and storage medium
  • Operating journal obtaining method, program, and storage medium
  • Operating journal obtaining method, program, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0077] In this embodiment, when a function existing in another module is called from a certain module, the input function address or the virtual function address table (Virtual Address Table) stored in the memory is used to link the functions between the modules. It is called and recorded in the operation log, so that the processing of the entire software can be obtained as a chronological operation log without processing the software module itself. It is explained in detail below.

[0078]

[0079] FIG. 1 is a diagram showing the configuration of a computer (software evaluation system) for realizing an operation log acquisition method according to an embodiment of the present invention. For the sake of simplification, it is assumed that in this embodiment, the software evaluation system is built inside one PC, and the feature of the operation log acquisition method of the present invention is whether it is built inside one PC or multiple PCs The network system is effective...

Embodiment approach 2

[0101] In this embodiment, a case where the operation log is acquired as binary data of pointers and parameters which cannot be completely acquired normally will be described.

[0102] FIG. 10 is an example of the function definition of the software evaluation system of this embodiment, which is described by generally widely used IDL. In the software evaluation system that implements the operation log acquisition method of this embodiment, this IDL tokenized type library file is used as a function definition file.

[0103] FIG. 11 is a diagram showing an IDL-generated description obtained by specifying the acquisition binary for pointers and parameters in the function definition of the present embodiment, and acquiring the data entities of the pointers and parameters as an operation log.

[0104] In the definition of the FuncBinidIs function, for long * lplParam statement custum(PAT_PARAM_ATTR_ID, "binid_is()") (201). Among them, PAT_PARAM_ATTR_ID (200) is an identifier used...

Embodiment approach 3

[0115] In this embodiment, a case where a function such as a callback function is not output and acquired as an operation log will be described.

[0116] FIG. 14 is a diagram showing an IDL-generated description for obtaining a non-output function such as a callback function as an operation log in the function definition of the present embodiment.

[0117] In the definition of the SetCallBack function, custum(PAT_PARAM_ATTR_ID,"funcname_is(FuncCallBack)") is declared for DWORDpfnFuncCallBack (221). The SetCallBack function is a function to set a callback function for the module, and DWORDpfnFuncCallBack is a parameter used to set the address of the callback function. Among them, by defining "funcname_is(FuncCallBack)", the operation log acquisition process recognizes the value sent to this parameter as the address of the FuncCallBack function (222), and replaces it with the address of the operation log acquisition process. In addition, the original value is stored in order to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A log acquisition method is provided that allows a processing log of software to readily be acquired and reduces the man-hours needed for analyzing a bug. The log acquisition method is a method for acquiring a runtime log of a program 91 including a function (FuncAA), comprising the step of changing the address of the function (FuncAA) loaded to the address of a function (92) for log acquisition and selecting the function (Func AA), wherein the function (92) for log acquisition comprises the steps of: calling the function (Func AA) (96) the log of which is to be acquired to cause a predetermined process to be executed (97), receiving the result of the execution (98), and passing said result to said program 91 (101), recording given information when calling the address of the selected function (Func AA) (95, 100), and recording given information when receiving the result of the execution of the selected function (Func AA) (99, 100).

Description

technical field [0001] The present invention relates to a technology capable of acquiring a processing operation log of software divided into a plurality of modules. Background technique [0002] Conventionally, for a software failure with a low recurrence rate, the cause of the failure has been found out and countermeasures have been taken by acquiring a processing operation log of the software and analyzing the processing log. [0003] However, there are the following problems in obtaining the above-mentioned conventional processing log. [0004] (1) In order to obtain the operation log continuously even in the user's operating environment, it is necessary to process and add a processing operation log acquisition routine to the software module itself, which will increase the workload for obtaining and processing the operation log. [0005] (2) Since the acquisition of the processing operation log is carried out for each module, the generated operation log is based on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/06G06F9/44G06F9/45G06F11/36H02H3/05
CPCG06F11/3636
Inventor 三原誠
Owner CANON KK