WO2000041078A1 - Online debugging and tracing system and method - Google Patents
Online debugging and tracing system and method Download PDFInfo
- Publication number
- WO2000041078A1 WO2000041078A1 PCT/US1999/031208 US9931208W WO0041078A1 WO 2000041078 A1 WO2000041078 A1 WO 2000041078A1 US 9931208 W US9931208 W US 9931208W WO 0041078 A1 WO0041078 A1 WO 0041078A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- target machine
- machine
- data
- host
- software
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/3636—Software debugging by tracing the execution of the program
Definitions
- the invention relates generally to source code debugging methods and apparatus, and m particular, to the debugging of software programs using trace points set using a debugging tool .
- stopping the program at a break point can be quite disruptive to the system
- a large shared data storage subsystem such as the EMC Symmetrix series of products
- halting the program m effect stops the entire data reading, writing, and caching process.
- the behavior of the system, and hence the analysis of an error can be completely masked by the system stoppage because, for example, other external subsystems may then go into a recovery mode .
- a debugging system tool and method can be provided which enable immediate and certain interaction, on line, with the software program operating, for example, in a large shared data storage system
- the method and apparatus of the current invention advantageously provide online access to debug the system while, at the same time, not significantly disrupting operation of the system so as to mask any error occurring m the operation of the source code.
- the invention relates to a method and apparatus for online debugging software running on a target machine.
- the method features defining trace point locations (addresses) and data and variables to be collected at those trace points m the software at a host machine; sending the trace point locations and variables, for example in a debugging script, to the target machine, maintaining a stub program m the target machine to perform the debugging script, collecting the data and variables at the predefined trace points, using the stub program, the data representing variables identified by the host machine debugging script when a trace point is reached, and sending the collected data, online, at the request of the host machine, without significantly interrupting or stopping operation of the target machine.
- the target machine is a disk drive controller.
- the invention features determining, at the target machine, using an expression evaluation, locations for each variable for which data is to be collected when a trace point is reached and passed through, the variables being originally specified by the host machine debugging script m the form of numeric expressions from a compiler symbol table.
- the trace points may be automatically set at the host machine and the variables are automatically identified at the host machine.
- the collected data is directed to a buffer, m the target machine, for storage; and when the buffer overflows, the data is wrapped around the buffer thereby erasing the old data and replacing it with new data. In this way, only the last frames of data are kept m the buffer .
- the apparatus of the invention provides for debugging software (the stub) running m a target machine and comprises a host machine, elements for defining, m the host machine, trace point locations and variables to be collected by the software, circuitry for sending the trace point locations and variables to the target machine, circuitry for running a stub program m the target machine, circuitry for collecting, using the stub program, data representing the variables selected by the user on the host machine.
- the circuitry sends the collected data, online, to the host machine without stopping operation of the target machine.
- the apparatus is a computer implemented apparatus for debugging, from a host computer, software running m a target machine.
- the invention provides for software media m both the target machine and the host computer to implement the steps of defining, m the host computer, trace point locations and variables to be collected by the software on the target machine, sending the trace point locations and variables to the target machine, running a stub program m the target machine, collecting, using stub program, data representing the variables selected by the user, for example, at the host computer when a trace point is reached and passed through, and providing the collected data, online, to the host computer without stopping operation of the target machine .
- the method and apparatus of the invention thus advantageously enable debugging of the target computer or disk controller with minimal disturbance to the operation of the target machine.
- FIG. 1 is a general block diagram illustrating the system m which the invention has particular application;
- FIG. 2 is a block diagram illustrating m more detail a typical environment m accordance with the invention.
- Figure 3 is a diagrammatic block diagram illustrating a typical operation m accordance with the invention.
- Figure 4 is a flow chart illustrating operation of one embodiment m accordance with the invention.
- the invention relates to a computer system wherein at least one, and more likely a plurality of hosts 12a, 12b, ..., 12n, connect to a memory module system 14, such as the EMC Symmetrix disk array memory system.
- the memory module 14 acts as the interface between the host computers and a plurality of mass storage devices, such as, for example, disk drives 16a, 16b, ... , 16k. Data written by the host or read from the disk drive elements pass through the memory module system which acts as a two way communications path with substantial capabilities.
- the data from the host are uniformly striped across all or some of the disk storage devices; and m other systems, the data from the host are stored on the disk drives 16 according to a RAID protocol.
- all of the data from a particular host can be stored on a single disk drive or m different logical volumes of the same or different disk drives, depending upon the nature and the source of the data and host.
- a host computer can also read data from one or more of the disk drive units.
- a problem arises which impairs performance of the system, for example, a non-recoverable software error, a decrease m throughput, or "bugs" m newly installed software
- the problem can arise m either the host, the memory module, the disk drive elements, or m combinations thereof.
- trace points are inserted m the software and data is collected without substantially imposing any significant performance degradation on the customer's system. As described below, data can then be remotely collected for analysis without having to bring down, stop, or otherwise interfere substantially with the system operation.
- the disk controller is configured to have a plurality of channel directors 30 (most often referred to a SCSI adapters when operating according to a SCSI protocol) connecting to a global memory 32 through which all data and commands flow.
- the global memory 32 is connected to a plurality of disk directors 34 (also typically SCSI adapters) which connect to the disk drives 16.
- each channel director operates over channels 36 and 38 using a SCSI protocol.
- Each channel director 30 can be connected to one or more host computers over buses 36 (typically, one host I/O Controller per port 40) . In the illustrated embodiment, it is the software operation which will be monitored and analyzed.
- the host machine 400 is typically located in a site remote from the target machines 402.
- the host 400 and target 402 communicate over modems 404, 406 and a communications link 408.
- the host machine includes a source level debugger 410 which has access to a storage 412 containing source files 414, and the compiled symbol table 416 and binary executable file 418 for a program running in the target machine.
- the storage 412 contains many such collections of files for different versions of programs running on different target machines.
- the binary files are identical to the binary executable program files at the target machine.
- the source level debugger uses the symbol taole 416, and under the control of either the user or an automatic trace point program, identifies the addresses at which trace points are to be inserted into the executable program running at the target machine, as well as addresses for the variables (or numeric expressions to determine such addresses) . That data is sent over communications link 408 to the target machine.
- the stub program uses that data and inserts traps at the trace point addresses, causing at each trace point, the necessary data to be collected and stored m a trace buffer 420.
- the stub program 422 is included m the target machine as part of its operating programs.
- a program is compiled and linked and loaded m binary executable form m the target machine while being stored m binary files 418 and symbol files 416.
- a user or the system, then defines the trace points and the data to be collected, and sends that set up information to the target machine. The appropriate data is then collected each time a trace point is hit and the trace program is terminated as described hereinafter.
- a "post mortum” analysis is then performed on all or part of the data collected m the trace buffer.
- a source level debugging program is initiated at a host computer which is typically remote from the site of the target machine. This is indicated at 98
- the debugging program under user control, opens a source code window, at the host computer, that is, a window on a display screen by which a debug information is created. This is indicated at step 100.
- the user identifies a program, running on the target machine, here controller system 14, and the debugger verifies that it has the same version of the program as that which is running on the target machine. This is indicated at 101.
- the user either automatically or manually sets a series of trace points m the program to be debugged. This is indicated at step 102.
- the manual setting of the trace points is typically performed at the source code level m the program. Along with each trace point the user either manually or automatically identifies the variables, data for which are collected each time the trace point is reached or "hit". If the trace points are set automatically, a method such as that described m copendmg U.S. Patent Application No. 09/069,608, filed April 29, 1998, and entitled source code debugging tool application, the contents of which are incorporated herein by reference, can be employed Once the debug setup has been completed by the user, the host sends to the target machine the location of the trace points m the executable code existing on the target machine.
- the format of the transmitted data allows numeric expressions to be sent from which the location of the desired variables can be derived at the target machine This is indicated at 103.
- the addresses and expressions are derived from the variables found m the symbol table ordinarily created and stored by the compiler m creating the executable code of the program.
- the symbol table is available at the host machine.
- This address and expression information is transmitted at 104 to the target machine (as debugging set-up data) for use m operation by the stub program there.
- the target and host systems can be connected, for example, over the internet, by modem, or a high speed communication bus.
- the so-called "stub” operates to implement the debugging set-up data at 105 and collects the relevant data during operation of the software to be debugged.
- the stub program inserts traps at the trace point addresses identified by the host system and collects the required data each time a "trap" is reached or hit.
- the stub operates at each trace point address to trap the code and collect the required data. This is indicated at 110.
- the stub operates to acquire the data from the target by evaluating the expressions provided by the host (the variable physical address can change from time to time), and store the acquired data in a target buffer. This is indicated at 112. If the target buffer fills, in this illustrated embodiment of the invention, the buffer wraps around so that old and earlier collected data is overwritten.
- the stub thus operates to collect the variable data specified in the debugging set-up even though it is specified at the numeric or expression level. That is, the stub has an expression evaluator, working in reverse polish notation in the format of the preferred embodiment of the invention, which enables the stub to determine the address of the variable, or variables to be collected, even though the address of the variables may change from time to time in the program.
- the collected and stored data can be off-loaded, in whole or in part as specified by the host machine, without substantially interrupting the operation of the target machine or the monitored program, that is, while the target machine continues to operate.
- the pass-count for a trace point when the pass-count for a trace point is reached, the collection of data will automatically stop and the data will be made available to the host, either automatically or under user control at the host. For example, for a pass count of one, data will be collected when a particular trace point is first reached and can immediately be made available to the host for review and analysis.
- the collected data can be returned to the host while the additional data is being collected. This is indicated at step 120.
- the offloading process can be implemented and controlled by the host as indicated at step 130.
- the host sends a search query to the target to obtain a limited, well defined, data download.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP99967756A EP1145125B1 (en) | 1999-01-04 | 1999-12-30 | Online debugging and tracing system and method |
DE69919404T DE69919404T2 (en) | 1999-01-04 | 1999-12-30 | ON-LINE TROUBLESHOOTING AND EXHAUST TRACKING SYSTEM AND METHOD |
JP2000592736A JP2002534736A (en) | 1999-01-04 | 1999-12-30 | Apparatus and method for online debugging and tracking |
AT99967756T ATE273535T1 (en) | 1999-01-04 | 1999-12-30 | ON-LINE TROUBLESHOOTING AND TRACKING SYSTEM AND PROCEDURES |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/224,921 US6311326B1 (en) | 1999-01-04 | 1999-01-04 | Online debugging and tracing system and method |
US09/224,921 | 1999-01-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000041078A1 true WO2000041078A1 (en) | 2000-07-13 |
Family
ID=22842781
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1999/031208 WO2000041078A1 (en) | 1999-01-04 | 1999-12-30 | Online debugging and tracing system and method |
Country Status (6)
Country | Link |
---|---|
US (1) | US6311326B1 (en) |
EP (1) | EP1145125B1 (en) |
JP (2) | JP2002534736A (en) |
AT (1) | ATE273535T1 (en) |
DE (1) | DE69919404T2 (en) |
WO (1) | WO2000041078A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003003215A2 (en) * | 2001-06-28 | 2003-01-09 | Sun Microsystems, Inc. | Method and apparatus to facilitate debugging a platform-independent virtual machine |
EP1335292A2 (en) * | 2002-02-07 | 2003-08-13 | Matsushita Electric Industrial Co., Ltd. | Apparatus, method and program for breakpoint setting |
US7143394B1 (en) * | 2001-12-21 | 2006-11-28 | Emc Corporation | Analyzing software behavior |
US7739664B2 (en) | 2002-10-17 | 2010-06-15 | International Business Machines Corporation | Collection and detection of differences of values of expressions/variables when debugging a computer process |
Families Citing this family (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6754891B1 (en) * | 1998-08-31 | 2004-06-22 | Red Hat, Inc. | Debugger system using tracepoints for computer software |
US6606671B1 (en) * | 1999-04-19 | 2003-08-12 | Unisys Corporation | Method for analyzing input/output operations of a data processing system |
US6490690B1 (en) * | 1999-07-22 | 2002-12-03 | International Business Machines Corporation | Method and apparatus for unix system catastrophic recovery aid |
US6948095B2 (en) * | 2000-04-20 | 2005-09-20 | Stmicroelectronics Limited | Methods and apparatus for dynamically loading a file on a target computer system |
GB0009943D0 (en) * | 2000-04-20 | 2000-06-07 | Sgs Thomson Microelectronics | Operating a computer system |
GB0009945D0 (en) * | 2000-04-20 | 2000-06-07 | Sgs Thomson Microelectronics | Debugging device nad method |
GB0009939D0 (en) * | 2000-04-20 | 2000-06-07 | Sgs Thomson Microelectronics | Input/output in embedded systems |
GB0009941D0 (en) * | 2000-04-20 | 2000-06-07 | Sgs Thomson Microelectronics | Computer system |
US6978444B1 (en) * | 2000-08-01 | 2005-12-20 | International Business Machines Corporation | Computer-implemented method and system for automatically invoking a predetermined debugger command at a desired location of a single thread of a program |
US6817014B2 (en) * | 2001-04-11 | 2004-11-09 | Hewlett-Packard Development Company, L.P. | Analysis of executable program code using compiler-generated function entry points and endpoints with other sources of function entry points and endpoints |
US6918110B2 (en) * | 2001-04-11 | 2005-07-12 | Hewlett-Packard Development Company, L.P. | Dynamic instrumentation of an executable program by means of causing a breakpoint at the entry point of a function and providing instrumentation code |
US7134116B1 (en) | 2001-04-30 | 2006-11-07 | Mips Technologies, Inc. | External trace synchronization via periodic sampling |
US7181728B1 (en) * | 2001-04-30 | 2007-02-20 | Mips Technologies, Inc. | User controlled trace records |
CA2347647A1 (en) * | 2001-05-15 | 2002-11-15 | Ibm Canada Limited-Ibm Canada Limitee | Storing and restoring snapshots of a computer process |
US7376937B1 (en) * | 2001-05-31 | 2008-05-20 | Oracle International Corporation | Method and mechanism for using a meta-language to define and analyze traces |
US7380239B1 (en) | 2001-05-31 | 2008-05-27 | Oracle International Corporation | Method and mechanism for diagnosing computer applications using traces |
US8473922B2 (en) * | 2001-09-19 | 2013-06-25 | Hewlett-Packard Development Company, L.P. | Runtime monitoring in component-based systems |
US6941492B1 (en) | 2002-02-05 | 2005-09-06 | Emc Corporation | Debugging tool for efficient switching between targets in a multi-processor environment |
CA2383832A1 (en) * | 2002-04-24 | 2003-10-24 | Ibm Canada Limited-Ibm Canada Limitee | System and method for intelligent trap analysis |
US7165190B1 (en) | 2002-07-29 | 2007-01-16 | Oracle International Corporation | Method and mechanism for managing traces within a computer system |
US7512954B2 (en) * | 2002-07-29 | 2009-03-31 | Oracle International Corporation | Method and mechanism for debugging a series of related events within a computer system |
US7200588B1 (en) | 2002-07-29 | 2007-04-03 | Oracle International Corporation | Method and mechanism for analyzing trace data using a database management system |
US20040111706A1 (en) * | 2002-12-07 | 2004-06-10 | Mogul Jeffrey Clifford | Analysis of latencies in a multi-node system |
US20050039169A1 (en) * | 2003-08-14 | 2005-02-17 | Yu-Cheng Hsu | Integrated source code debugging apparatus method and system |
JP2005301640A (en) * | 2004-04-12 | 2005-10-27 | Hitachi Ltd | Switch device, storage control system and method for obtaining trace data |
US8640114B2 (en) * | 2006-09-07 | 2014-01-28 | Oracle America, Inc. | Method and apparatus for specification and application of a user-specified filter in a data space profiler |
US8185868B1 (en) | 2004-12-20 | 2012-05-22 | The Mathworks, Inc. | System and method for cell-based code editing and publishing |
US7817293B2 (en) * | 2005-01-07 | 2010-10-19 | Infoprint Solutions Company, Llc | Trace and debug tool for high speed printer systems |
US9152531B2 (en) * | 2005-02-18 | 2015-10-06 | Green Hills Sofware, Inc. | Post-compile instrumentation of object code for generating execution trace data |
US8266608B2 (en) * | 2005-02-18 | 2012-09-11 | Green Hills Software, Inc. | Post-compile instrumentation of object code for generating execution trace data |
US20070006166A1 (en) * | 2005-06-20 | 2007-01-04 | Seagate Technology Llc | Code coverage for an embedded processor system |
US8813055B2 (en) * | 2006-11-08 | 2014-08-19 | Oracle America, Inc. | Method and apparatus for associating user-specified data with events in a data space profiler |
US8762956B1 (en) * | 2007-01-31 | 2014-06-24 | The Mathworks, Inc. | Generating a report document from code |
US8762951B1 (en) | 2007-03-21 | 2014-06-24 | Oracle America, Inc. | Apparatus and method for profiling system events in a fine grain multi-threaded multi-core processor |
US20090254888A1 (en) * | 2008-04-07 | 2009-10-08 | International Business Machines Corporation | Debug tours for software debugging |
JP5252014B2 (en) * | 2011-03-15 | 2013-07-31 | オムロン株式会社 | Control device, control system, tool device, and collection instruction program |
CN103778044B (en) * | 2012-10-23 | 2017-05-17 | 伊姆西公司 | Method and device for diagnosing system faults |
US9304849B2 (en) | 2013-06-12 | 2016-04-05 | International Business Machines Corporation | Implementing enhanced error handling of a shared adapter in a virtualized system |
US9323620B2 (en) | 2013-06-12 | 2016-04-26 | International Business Machines Corporation | Implementing shared adapter configuration updates concurrent with maintenance actions in a virtualized system |
US9720775B2 (en) | 2013-06-12 | 2017-08-01 | International Business Machines Corporation | Implementing concurrent adapter firmware update for an SRIOV adapter in a virtualized system |
US9400704B2 (en) | 2013-06-12 | 2016-07-26 | Globalfoundries Inc. | Implementing distributed debug data collection and analysis for a shared adapter in a virtualized system |
US9317317B2 (en) | 2013-06-12 | 2016-04-19 | International Business Machines Corporation | Implementing concurrent device driver maintenance and recovery for an SRIOV adapter in a virtualized system |
US9111046B2 (en) | 2013-06-12 | 2015-08-18 | International Business Machines Corporation | Implementing capacity and user-based resource allocation for a shared adapter in a virtualized system |
US8990784B2 (en) | 2013-06-28 | 2015-03-24 | International Business Machines Corporation | Determining control flow divergence due to variable value difference |
US9477579B2 (en) * | 2013-08-09 | 2016-10-25 | Freescale Semiconductor, Inc. | Embedded software debug system with partial hardware acceleration |
US9547581B2 (en) | 2013-10-01 | 2017-01-17 | Wipro Limited | Systems and methods for fixing software defects in a binary or executable file |
TWI615708B (en) * | 2017-03-17 | 2018-02-21 | 致伸科技股份有限公司 | Embedded device debugging system and method thereof |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5127103A (en) * | 1987-10-14 | 1992-06-30 | North American Philips Corporation | Real-time tracing of dynamic local data in high level languages in the presence of process context switches |
US5175856A (en) * | 1990-06-11 | 1992-12-29 | Supercomputer Systems Limited Partnership | Computer with integrated hierarchical representation (ihr) of program wherein ihr file is available for debugging and optimizing during target execution |
JPH0520122A (en) * | 1991-07-12 | 1993-01-29 | Nippon Telegr & Teleph Corp <Ntt> | Remote debug method |
JPH0540658A (en) * | 1991-08-06 | 1993-02-19 | Shikoku Nippon Denki Software Kk | Magnetic disk controller |
US5450586A (en) * | 1991-08-14 | 1995-09-12 | Hewlett-Packard Company | System for analyzing and debugging embedded software through dynamic and interactive use of code markers |
JPH05241891A (en) * | 1992-02-26 | 1993-09-21 | Nec Corp | Tracer circuit |
EP0596591B1 (en) * | 1992-10-09 | 1998-04-15 | Sun Microsystems, Inc. | Method and apparatus for a real-time data collection and display system |
US6158045A (en) * | 1995-11-13 | 2000-12-05 | Object Technology Licensing Corporation | Portable debugging services utilizing a client debugger object and a server debugger object with flexible addressing support |
JPH09259004A (en) * | 1996-03-27 | 1997-10-03 | Nippon Denki Ido Tsushin Kk | Debugging method |
JPH1011321A (en) * | 1996-06-25 | 1998-01-16 | Saitama Nippon Denki Kk | Microprocessor with execution tracing function |
US5832205A (en) * | 1996-08-20 | 1998-11-03 | Transmeta Corporation | Memory controller for a microprocessor for detecting a failure of speculation on the physical nature of a component being addressed |
US6199152B1 (en) * | 1996-08-22 | 2001-03-06 | Transmeta Corporation | Translated memory protection apparatus for an advanced microprocessor |
JP3260083B2 (en) * | 1996-09-03 | 2002-02-25 | 株式会社東芝 | Debug system and debugging method |
JPH10283222A (en) * | 1997-04-03 | 1998-10-23 | Mitsubishi Electric Corp | Emulator method |
US6154856A (en) * | 1997-04-08 | 2000-11-28 | Advanced Micro Devices, Inc. | Debug interface including state machines for timing synchronization and communication |
US6161216A (en) * | 1998-04-29 | 2000-12-12 | Emc Corporation | Source code debugging tool |
-
1999
- 1999-01-04 US US09/224,921 patent/US6311326B1/en not_active Expired - Lifetime
- 1999-12-30 WO PCT/US1999/031208 patent/WO2000041078A1/en active IP Right Grant
- 1999-12-30 DE DE69919404T patent/DE69919404T2/en not_active Expired - Lifetime
- 1999-12-30 JP JP2000592736A patent/JP2002534736A/en active Pending
- 1999-12-30 EP EP99967756A patent/EP1145125B1/en not_active Expired - Lifetime
- 1999-12-30 AT AT99967756T patent/ATE273535T1/en not_active IP Right Cessation
-
2006
- 2006-09-27 JP JP2006262594A patent/JP2006344249A/en active Pending
Non-Patent Citations (1)
Title |
---|
ANDREAS DANUSER ET AL.: "Was geschieht wann wo im Programm?", TECHNISCHE RUNDSCHAU., vol. 82, no. 35, 31 August 1990 (1990-08-31), HALLWAG VERLAG. BERN., CH, pages 48 - 57, XP000151488, ISSN: 1023-0823 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003003215A2 (en) * | 2001-06-28 | 2003-01-09 | Sun Microsystems, Inc. | Method and apparatus to facilitate debugging a platform-independent virtual machine |
WO2003003215A3 (en) * | 2001-06-28 | 2004-02-12 | Sun Microsystems Inc | Method and apparatus to facilitate debugging a platform-independent virtual machine |
US6912708B2 (en) | 2001-06-28 | 2005-06-28 | Sun Microsystems, Inc. | Method and apparatus to facilitate debugging a platform-independent virtual machine |
US7143394B1 (en) * | 2001-12-21 | 2006-11-28 | Emc Corporation | Analyzing software behavior |
EP1335292A2 (en) * | 2002-02-07 | 2003-08-13 | Matsushita Electric Industrial Co., Ltd. | Apparatus, method and program for breakpoint setting |
EP1335292A3 (en) * | 2002-02-07 | 2007-06-13 | Matsushita Electric Industrial Co., Ltd. | Apparatus, method and program for breakpoint setting |
US7739664B2 (en) | 2002-10-17 | 2010-06-15 | International Business Machines Corporation | Collection and detection of differences of values of expressions/variables when debugging a computer process |
Also Published As
Publication number | Publication date |
---|---|
EP1145125A1 (en) | 2001-10-17 |
JP2002534736A (en) | 2002-10-15 |
US6311326B1 (en) | 2001-10-30 |
DE69919404D1 (en) | 2004-09-16 |
ATE273535T1 (en) | 2004-08-15 |
JP2006344249A (en) | 2006-12-21 |
EP1145125B1 (en) | 2004-08-11 |
DE69919404T2 (en) | 2005-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6311326B1 (en) | Online debugging and tracing system and method | |
US6634020B1 (en) | Uninitialized memory watch | |
US5896536A (en) | Data triggered trace support for debugging object oriented programs | |
US5574855A (en) | Method and apparatus for testing raid systems | |
US7185320B2 (en) | System and method for processing breakpoint events in a child process generated by a parent process | |
US7017084B2 (en) | Tracing method and apparatus for distributed environments | |
US9342437B2 (en) | Backward post-execution software debugger | |
EP1130518B1 (en) | Software analysis system having an apparatus for selectively collecting analysis data from a target system executing software instrumented with tag statements and method for use thereof | |
US5748878A (en) | Method and apparatus for analyzing software executed in embedded systems | |
US5911073A (en) | Method and apparatus for dynamic process monitoring through an ancillary control code system | |
US8584097B2 (en) | Post-execution software debugger with event display | |
US6658653B1 (en) | Debugging methods for heap misuse | |
US20120317550A1 (en) | Forward post-execution software debugger | |
US6378087B1 (en) | System and method for dynamically detecting unchecked error condition values in computer programs | |
US20050268195A1 (en) | Apparatus and method for improving emulation speed of high-level languages in on-chip emulation systems | |
US6629158B1 (en) | System, apparatus, and method for configuring an array controller | |
US7546585B2 (en) | Method, system and computer program product for testing computer programs | |
US7096339B2 (en) | System and method for detecting memory management programming errors | |
US7177791B1 (en) | Offline emulated input/output processor debugger | |
US6415436B1 (en) | Mechanism for cross validating emulated states between different emulation technologies in a dynamic compiler | |
US6971046B1 (en) | System and method for performing input/output diagnostics | |
CN109542341B (en) | Read-write IO monitoring method, device, terminal and computer readable storage medium | |
US6983454B2 (en) | Extended “run to” function | |
US20030018957A1 (en) | Debugger monitor with anticipatory highlights | |
US9417987B2 (en) | Advisory warning and workaround indications to user when stopped between load and store conditional instructions while using source level debuggers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): IL JP KR |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2000 592736 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1999967756 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1999967756 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 1999967756 Country of ref document: EP |