Operating journal obtaining method, program, and storage medium
A technology for running logs and programs, which is applied in memory systems, program control design, program control devices, etc., can solve the problems of increasing the workload of processing the running logs, difficult to obtain and process, and time-consuming.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0077] In this embodiment, when a function existing in another module is called from a certain module, the input function address or the virtual function address table (Virtual Address Table) stored in the memory is used to link the functions between the modules. It is called and recorded in the operation log, so that the processing of the entire software can be obtained as a chronological operation log without processing the software module itself. It is explained in detail below.
[0078]
[0079] FIG. 1 is a diagram showing the configuration of a computer (software evaluation system) for realizing an operation log acquisition method according to an embodiment of the present invention. For the sake of simplification, it is assumed that in this embodiment, the software evaluation system is built inside one PC, and the feature of the operation log acquisition method of the present invention is whether it is built inside one PC or multiple PCs The network system is effective...
Embodiment approach 2
[0101] In this embodiment, a case where the operation log is acquired as binary data of pointers and parameters which cannot be completely acquired normally will be described.
[0102] FIG. 10 is an example of the function definition of the software evaluation system of this embodiment, which is described by generally widely used IDL. In the software evaluation system that implements the operation log acquisition method of this embodiment, this IDL tokenized type library file is used as a function definition file.
[0103] FIG. 11 is a diagram showing an IDL-generated description obtained by specifying the acquisition binary for pointers and parameters in the function definition of the present embodiment, and acquiring the data entities of the pointers and parameters as an operation log.
[0104] In the definition of the FuncBinidIs function, for long * lplParam statement custum(PAT_PARAM_ATTR_ID, "binid_is()") (201). Among them, PAT_PARAM_ATTR_ID (200) is an identifier used...
Embodiment approach 3
[0115] In this embodiment, a case where a function such as a callback function is not output and acquired as an operation log will be described.
[0116] FIG. 14 is a diagram showing an IDL-generated description for obtaining a non-output function such as a callback function as an operation log in the function definition of the present embodiment.
[0117] In the definition of the SetCallBack function, custum(PAT_PARAM_ATTR_ID,"funcname_is(FuncCallBack)") is declared for DWORDpfnFuncCallBack (221). The SetCallBack function is a function to set a callback function for the module, and DWORDpfnFuncCallBack is a parameter used to set the address of the callback function. Among them, by defining "funcname_is(FuncCallBack)", the operation log acquisition process recognizes the value sent to this parameter as the address of the FuncCallBack function (222), and replaces it with the address of the operation log acquisition process. In addition, the original value is stored in order to...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


