CN101075204A - Black-box technology for universal software - Google Patents

Black-box technology for universal software Download PDF

Info

Publication number
CN101075204A
CN101075204A CN 200710017808 CN200710017808A CN101075204A CN 101075204 A CN101075204 A CN 101075204A CN 200710017808 CN200710017808 CN 200710017808 CN 200710017808 A CN200710017808 A CN 200710017808A CN 101075204 A CN101075204 A CN 101075204A
Authority
CN
China
Prior art keywords
module
software
black box
data
black
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200710017808
Other languages
Chinese (zh)
Inventor
刘明真
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200710017808 priority Critical patent/CN101075204A/en
Publication of CN101075204A publication Critical patent/CN101075204A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

A universal software black-box technique includes utilizing nonvolatile random storage as software black-box by expanding internal memory of said storage, recording information of software module shift series and module in/out time as well as module key data in real time during program operation into said black-box and enabling to carry out diagnosis on fault of software by fetching relevant information in black-box when software is failure.

Description

A kind of general software " black box " technology
Technical field
The present invention relates to software fault diagnosis based on " black box " technology, by standard coding to program module, utilize information such as software " black box " technical notes program circuit path and module working time, the position and the reason that help the diagnostic software fault to take place, thereby the reliability and the security that help improving software.
Background technology
Along with the development of IT industry, the complexity of software is more and more higher, and its reliability and security more and more cause people's attention." faults that caused by software, shock scientific and technological circle are constant; software fault even considerably beyond hardware in the equipment of some type; become the major failure source of system " (the yellow tin of Chen Guang space is grown: software reliability discipline development present situation and prospect, " technical management research " the 99th page, University of Electronic Science and Technology's journal social sciences version, IV rolled up for the 3rd phase in 2002).The relative hardware of software industry is also very immature, lacks effective standard, and the reliability of software generally is lower than the reliability of hardware system, has restricted the raising of total system reliability.Therefore, the mentality of designing of standard software how further improves the design concept of software reliability, in fact be imminent, and be the fact that software developers should pay close attention to.
The reliability and the hardware of software are very different, and outstanding behaviours is the growth of its reliability.That is to say, for software, inefficacy of every discovery, and in time correct, just must mean the once growth of software reliability.Therefore, for software, the timely diagnosis of trouble or failure has very important meaning.
In recent years, the dynamic debugging of software and emulation technology have had very big development, and this debugging and fault diagnosis for software has great importance undoubtedly, but often because real-time and versatility are restricted its application.Particularly in real-time system, the actual environment of software failure is difficult to reappear with emulation tool.The actual environment of running software varies, for real logging software was losing efficacy constantly for information about, there is the scholar to propose the technology of software " black box ", as Elbaum S., Munson J.C.:Software Black Box-an Alternative Mechanism for Failure Analysis (Software Reliability Engineering, 2000.ISSRE 2000.Proceedings.11thInternational Symposium on, P365-376, hereinafter to be referred as " document 1 "), Computer system software " black box " capture device (US2005010812 and for example, H04L9/00,2005-01-13, this patent derives from EUROPEAN PATENT OFFICE and searches on the net, hereinafter to be referred as " document 2 ") etc.This thought source is in the emulation to aircraft black box technology, for the diagnosis of software fault provides new method.
Software " black box " though technology have a lot of remarkable advantages, yet effective simple and easy to do again scheme is only its extensively prerequisite of utilization.Document 2 has been introduced with the pen recorder of external memory storage as software " black box ", though external memory storage has comparatively broad storage space, write down abundant information, but speed is often slow, the information that program is moved in internal memory has the suitable mistiming from issuing commands to be recorded in the external memory storage, and this time official post software may also have little time to preserve and system paralyses in the information of moment of failure.If program run is to shift gradually to another module from a module, so clearly, losing efficacy constantly, main analysis be work as front module, and last module, last again module, its degree of influence is minimizing gradually in general.The formation of writing down this transfer does not in most of the cases need oversize, and document 1 has been considered this demand, has introduced the way of estimating this queue length, only preserves a up-to-date n sequence when preserving this formation.Its software " black box " (SBBR) is divided into front end, core and rear end three parts and forms.Fore-end mainly is valid data of accepting goal systems; The core is relevant metastasis sequence, transition frequency matrix and a storehouse; Rear end part is that relevant information regularly or by triggering is transferred in non-volatile storing apparatus.Mainly there is the problem of two aspects in this scheme: the one, and the transition frequency matrix, it is the matrix of the number of modules M * M of software, wherein each element pij is the frequency that reflection module mi shifts to mj.Shift the difference of frequency and the module transition frequency of program structure reaction according to the module of record, as the foundation at failure judgement generation position.This method has certain saving grace, and the ample evidence specification module shifts frequency and how many relevances software failure has but do not have.And such matrix along with the increase of software module number may be too much the jamming target system.The 2nd, this " black box " gets access to dump to from information the suitable mistiming equally in non-volatile storing apparatus, and the key message of software failure moment is lost.Described in document 1: " the simple approach that guarantees software ' black box ' survivability is that its recorded content is transferred in the Nonvolatile memory device, and this transfer may regularly be carried out, perhaps by specific Event triggered.If the interval of shifting is smaller, so seldom or do not have information to be lost.Yet goal systems just suffers damage like this.On the other hand, the triggering frequency that data shift is smaller, has but reduced the performance of ' black box ' record.Very unfortunate, a thrashing may cause losing of some significant datas.(The simplest method to ensure thesurvivability of the SBBR is transferring the content of the recorder to a nonvolatile storagedevice.This transfer can occur periodically, or triggered by a specific event.If the chosentransfer intervals are small, little or no information loss occurs during the failure.However, the performance of the target system suffers.On the other hand, triggering the data transferless frequently decreases the impact on performance.Unfortunately, a system failure maylead to a significant amount ofdata loss.) " disappearance of losing the real key message that often causes software failure moment of this data.
In a word, present existing software " black box " technical scheme is imperfection also, and its validity and practicality remain new measure and guarantee.The present invention just is being based on this and is proposing new implementation, has not only guaranteed validity and practicality, and has paid attention to versatility.
Summary of the invention
The present invention is according to the imperfection of prior art, catch this principal contradiction of module metastasis sequence, proposed unique identity coding of module when module taking place shift, Login Register is in the software of being constructed by non-volatile RAM " black box " in real time, and when entering and leave module, note time of its turnover, together write in " black box " of software.Moreover, if module has indivedual critical datas that can reflect the module health degree, also can be recorded in its " black box ".The module metastasis sequence that is write down like this will be a broad sense, when behind software failure, carrying out fault diagnosis, according to such metastasis sequence, by comparison program module process flow diagram, and by means of the execution time and the critical data of module, common as the foundation of judging software fault.
The above-mentioned non-volatile RAM that relates to can be the common random access memory that has back-up source, also can be that (MRAM can replace traditional SRAM to magnetic RAM MRAM at present, its speed and performance are compatible fully) class, " black box " data that write down after system's dead electricity, still can be preserved.So only use random access memory, its objective is that the speed of moving with program is complementary in internal memory, the module metastasis sequence can be in program run writes direct in " black box " just as depositing internal memory in like this, link without any need for the centre, thereby the information that guarantees last module before software failure also can be noted, and has avoided the losing of key message constantly of losing efficacy.Realize the function of software " black box " as the exented memory of system with non-volatile RAM, perhaps more generally the internal memory of system itself is marked a part, and this partial memory changed with non-volatile random access memory, as MRAM, as the software " black box " of indication of the present invention.Though do the resource of the system that taken like this, for the development of computer nowadays memory techniques, and the memory limited module metastasis sequence that requires from thought of the present invention, this taking almost is very little.The present invention does not only need more hardware input, even be few for the transformation of destination software systems yet.This just software and hardware input seldom makes the present invention can have extensive applicability.
Content of the present invention comprises the delimitation of target software module, the identity coding of module, the composition of software " black box " and several parts of Analysis on Fault Diagnosis of being done according to the module metastasis sequence that software " black box " is write down.Explanation respectively below:
1. the delimitation of software module
Hypothetical target software of the present invention can be transformed, and perhaps can set up by modular structure.Module Division is unsuitable excessive, and is also unsuitable too small.Excessive module can resolve into less module, reduces the scope when being convenient to fault diagnosis like this.Module is too small, and it is bigger that then the operation of logging modle metastasis sequence takies time of system relatively, and the module metastasis sequence is longer, and demanding system is inapplicable for real-time.Therefore the delimitation of block size can be made balance as the case may be.The present invention allows the statements such as conditional branching in the master routine not to be included in any module, does the also not obvious effect of software " black box " in fault diagnosis that influence like this.
2. the identity coding of software module
The present invention proposes the standard coding of software module, with this as the identify label that is recorded in the software " black box ".Module numbering can be expressed with a byte, two bytes or a plurality of byte, and the scale of system and total number of modules what depend on.
The broad sense module metastasis sequence that software of the present invention " black box " is write down is divided into module identity coding and module data (module data comprise again time of passing in and out module and the critical data of module) two classes.Each byte most significant digit set all the time of module coding is as the module coding zone bit.The module data most significant digit is always " 0 ", as the Data Labels position.So the actual significance bit of data of record only is 7 in " black box ".As with two byte representation module codings, i.e. A 16A 15A 1A 0, the significance bit of wherein encoding is A 15A 8And A 6A 0, and A 16And A 7In " black box " as module coding zone bit, set.Regulation module coding significance bit is A 15A 8And A 6A 0Totally 14 binary codings are not got complete " 0 " and complete " 1 "." 0 " entirely (composite coding 8080H), complete " 1 " (composite coding FFFFH) are as the sign of turnover module.The number of modules that can express is 1 to 16382, two byte module coding and encoding flag such as table 1 like this.If number of modules surpasses 16382, can increase a byte again as the module coding space.The system that number of modules is less, a then available byte represents that wherein most significant digit is " 1 ", as the coding maker special use, the codified scope is 0000001 to 1111110 totally 126 module's addresss, and complete " 0 " (composite coding 80H) and complete " 1 " (composite coding FFH) are as turnover module sign.
Table 1: two byte module coding and encoding flags
The module sequence number Coding maker The coding significance bit Coding maker The coding significance bit Composite coding
A15 A14 A13 A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1 A0
Keep 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 Go out to indicate 8080H
1 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 8081H
2 1 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 8082H
3 1 0 0 0 0 0 0 0 1 0 0 0 0 0 1 1 8083H
127 1 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 80FFH
128 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 8180H
129 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 8181H
16382 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 FFFEH
Keep 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Advance to indicate FFFFH
3. the composition of software " black box "
Software of the present invention " black box " utilizes the exented memory of non-volatile random access memory as system, and directly deposits in when program run, has avoided losing of software failure moment part of module transinformation.The information of the broad sense module metastasis sequence that software of the present invention " black box " is stored is successively: enter module sign (FFH, the byte number of module sign takies byte number with module coding, module coding is with two byte codes, then enter sign with the FFH of 2 bytes), module coding, the time of progressive die piece, the critical data of reflection module health degree, depanning block mark (80H, byte number is with entering sign), module time of numbering, going out module.The storage of module metastasis sequence can be used the formation of loop structure, also available external stack.Owing to only in this storer, write data during program run, therefore there are not first in first out or the problem that last in, first out.It is consistent selecting the principle of formation and storehouse for use, and the present invention is the example explanation with the formation.
The time of record turnover module can be adopted " hour, minute, second, percentage second ", takies 4 bytes, and wherein the most significant digit of each byte is " 0 " (time data is all less than 127).
The critical data that reflects each module health degree is tried not too much, because can take too much system resource too much, the critical data amount of each module can be different, can also not have critical data, and this needs to determine as the case may be.Only with low 7 of byte, the 8th constant is " 0 " to critical data, as non-module coding sign (being Data Labels).The length of critical data surpasses 7 bits, can increase byte.
The form such as the table 2 of turnover module time and module critical data.By table 2 as seen, the turnover module time is identical with the form of module critical data, and the present invention used followed by four bytes of module coding time as the turnover module, is the critical data of module before the depanning block mark after the progressive die piece time.
Table 2: module data form
Module data Sign The data significance bit
d7 d6 d5 d4 d3 d2 d1 d0
The turnover time 0 × × × × × × ×
Critical data 0 × × × × × × ×
Fig. 1 is that the present invention is the exemplary plot that specification module shifts.Wherein 110,120,130,140 distinguish respective modules 1, module 2, module 3, module 4.Fig. 2 is the storage mode synoptic diagram of the broad sense module metastasis sequence of corresponding diagram 1 module flow process Figure 100 in software of the present invention " black box " lining.The 200th, to the storage queue of dependent variable 150 greater than 0 broad sense module metastasis sequence, corresponding module metastasis sequence is in proper order: module 1---module 2---module 4 The 201st, to the storage queue of dependent variable 150 smaller or equal to 0 broad sense module metastasis sequence, corresponding module metastasis sequence is in proper order: module 1---module 3---module 4 ... the address of head of the queue 260 and tail of the queue 270 is left the bottom 280 and 290 of non-volatile random access memory in.Other data storage explanation in the software " black box " sees description of drawings for details.
The used non-volatile random access memory of software " black box " space size N should equal module metastasis sequence length n and the each product that shifts required memory size C of record, adds that head of the queue tail of the queue pointer address takies byte number, promptly
N=n*C+ head of the queue tail of the queue address pointer takies byte number
Module metastasis sequence length n can be by the estimation of the method for document 1, and also one of desirable total number of modules M to two times, i.e. n=(1~2) * M.
With reference to figure 2, a module takes place shift required memory
The C=turnover module banner word joint number * 2+ module coding byte number * 2+ time takies byte number * 2+ module critical data and takies byte average
Suppose that the software module number is 500, module coding adopts two byte codes, the record turnover module time is 4 bytes, if it is 3 that the module critical data on average takies byte number, then module metastasis sequence n gets 1.5M=750, module once shifts required memory C=2*2+2*2+4*2+3=19Bytes, and " black box " required storage space is 750*19+4 (head of the queue tail of the queue address pointer takies byte number)=14254Bytes like this.As seen, be about 500 software systems for number of modules, can meet the demands with the non-volatile random access memory of 16Kb.
Module metastasis sequence in " black box " adopts round-robin queue, arrive the bottom (reserving head of the queue tail of the queue pointer takes up space) of storage space when formation, if there are data need add formation again, then the tail of the queue pointer is got back to the storage space top, when the tail of the queue pointer is caught up with the head of the queue pointer, illustrate that formation is full, the head of the queue pointer need add 1, one data forward and will be capped.By that analogy, always preserve the information of up-to-date n pack module metastasis sequence in the software " black box ".
4. Analysis on Fault Diagnosis
Behind the software failure, the powered-down restarting systems makes it to work in fault diagnosis model.The software diagnosis program reads the broad sense module metastasis sequence of record in " black box ", (be based upon in the fault diagnostic program with broad sense module transition matrix simultaneously, pre-service has been done in this fault diagnostic program supposition, can when system restart, select to enable, promptly normal the startup or the fault diagnosis startup, alternative) content is compared, and the two different part is the contingent related position of fault.The broad sense module transition matrix of corresponding illustration 1 is as shown in table 3.The capable element representation module m that equals 1 of i wherein iTo module m jShift, j classifies 1 element representation module m as jFrom module m iShift.The module running time T iRepresentation module m iWorking time, it may be a fixed numbers, also may be certain term of reference.Module critical data D IkRepresentation module m iK critical data reference value, it may be a scope equally.
The broad sense module metastasis sequence that obtains from software " black box " is compared with the broad sense module transition matrix that prestores in fault diagnostic program, do not exist together if having, and so just may be the position that fault is associated, this is the primitive decision of fault of the present invention.When the order that shifts when module had certain restriction relation with the critical data of module working time and module, this judgement was just more effective, and this is effective judgement of fault of the present invention; If the hardware of system has failure logging equally, the comprehensive state of contrast moment of failure software and hardware can define the scope that whether belongs to software fault, and this is the senior judgement of fault of the present invention.
Table 3: broad sense module transition matrix
Module
1 2 3 4 Module working time Module critical data 1 Module critical data 2
1 0 1 1 0 T1 D11 D12
2 0 0 0 1 T2 D21 D22
3 0 0 0 1 T3 D31 D32
4 0 0 0 0 T4 D41 D42
The present invention is to be the unit with the module for the transformation of destination software systems, each modular unit only adds the statement of several memory module codings and turnover time and some critical datas, if the certain module of destination software systems itself has been worked out maturation, just so also can change slightly and can realize at the head and the tail of module.
Description of drawings
Fig. 1 is that the present invention is the exemplary plot that specification module shifts.Wherein 110,120,130,140 distinguish respective modules 1, module 2, module 3, module 4, and variable 150 is a condition judgment.Module 4 that variable 150 greater than 0 module metastasis sequence is: module 1---module 2---Module 4 that variable 150 smaller or equal to 0 module metastasis sequence is: module 1---module 3---
Fig. 2 is the storage mode synoptic diagram of broad sense module metastasis sequence in non-volatile RAM of corresponding diagram 1 module flow process Figure 100.The 200th, to the storage queue of dependent variable 150 greater than 0 broad sense module metastasis sequence, 270 storage order is from head of the queue 260 to tail of the queue:
210 progressive die block marks---
211 modules, 1 composite coding---
1 time of 212 progressive die pieces---
213 modules, 1 critical data---
250 depanning block marks---
211 modules, 1 composite coding---
214 go out 1 time of module---
210 progressive die block marks---
221 modules, 2 composite codings---
2 times of 222 progressive die pieces---
223 modules, 2 critical datas---
250 depanning block marks---
221 modules, 2 composite codings---
224 go out 2 times of module---
210 progressive die block marks---
241 modules, 4 composite codings---
4 times of 242 progressive die pieces---
243 modules, 4 critical datas---
250 depanning block marks---
241 modules, 4 composite codings---
244 go out 4 times of module
The 201st, to the storage queue of dependent variable 150 smaller or equal to 0 broad sense module metastasis sequence, 270 storage order is from head of the queue 260 to tail of the queue:
210 progressive die block marks---
211 modules, 1 composite coding---
1 time of 212 progressive die pieces---
213 modules, 1 critical data---
250 depanning block marks---
211 modules, 1 composite coding---
214 go out 1 time of module---
210 progressive die block marks---
231 modules, 3 composite codings---
3 times of 232 progressive die pieces---
233 modules, 3 critical datas---
250 depanning block marks---
231 modules, 3 composite codings---
234 go out 3 times of module---
210 progressive die block marks---
241 modules, 4 composite codings---
4 times of 242 progressive die pieces---
243 modules, 4 critical datas---
250 depanning block marks---
241 modules, 4 composite codings---
244 go out 4 times of module
The address of head of the queue 260 and tail of the queue 270 is left the bottom 280 and 290 of non-volatile random access memory in.
Fig. 3 is the applicable cases explanation of the present invention at the multitask multi-window system, and non-volatile RAM 300 can be divided into K1, k2, k3 is total to r subarea up to Kr, and the function of " black box " can be provided for r software simultaneously.
Embodiment
The present invention can be used for any software systems in principle, because it does not need extra hardware supported, only need increase a part of non-volatile random access memory, perhaps the original a part of internal memory of system directly be changed with non-volatile random access memory, as MRAM one class.The present invention also is seldom to the transformation of destination software systems, only needs depositing in real time in the middle of the internal storage of being made up of non-volatile random access memory for information about the turnover module when module shifts.Therefore, the present invention has extensive applicability.For more convenient understanding implementation method of the present invention, now be exemplified below:
1. the application of the present invention in embedded system
For embedded system or special purpose computer integrated application system, system scale is generally less, and software and hardware combining is tight, and real-time requires high, usually is that single software systems are in operation.Therefore, this situation is comparatively simple, only needs a part of internal memory is converted to non-volatile random access memory.Perhaps expand a part of storage space, be loaded as non-volatile RAM, be used for " black box " of software.Suppose the system module number less than 126, available byte coding carries out the module identity coding.Press preceding method, sequence of modules is counted the number of modules M of the desirable twice of n, and promptly n=2*126=252 is 2 if the module critical data takies byte average, then once shifts required storage space
The C=turnover module banner word joint number * 2+ module coding byte number * 2+ time takies byte number * 2+ module critical data and takies byte average=1*2+1*2+4*2+2=14Bytes
So the required storage space N=252*14+4 of software " black box " (head of the queue tail of the queue address pointer takies byte)=3532Bytes. as seen, little embedded system only needs the non-volatile random access memory of not enough 4K can constitute software of the present invention " black box ".
For bigger embedded system, can calculate " black box " needed storage space according to the byte of how many determination modules coding of number of modules.As previously mentioned, the software systems of a number of modules 500 promptly can be used as its software " black box " generally speaking with the non-volatile RAM of 16K.
2. the present invention is in the application of multitask, multiwindow software systems
For normally multitask multiwindowing of large software system, the CPU of computing machine is enjoyed in the timesharing under the support of operating system of a plurality of softwares, and the present invention provides support equally in this case.As shown in Figure 3, the software " black box " that is made of non-volatile RAM 300 can be divided into plurality of sub piece K1, K2, K3-up to Kr, and it can provide the function of " black box " simultaneously for r software like this.
Suppose that system has 100 softwares or process to move simultaneously, the average case of software size is 500 modules, and by previous example as can be known, the software of 500 modules needs the software " black box " of not enough 16K, so 100 softwares need 1600K, the memory headroom of about 1.5M altogether.This is inappreciable for computer system now.
For a plurality of softwares based on same operating system provide centralized software " black box ", a more favourable superiority is arranged.This is because software of the present invention " black box " has write down the turnover time that module shifts, therefore the mutual relationship between each software of operation simultaneously that easily can comparison software loses efficacy constantly, judging easily lost efficacy is which module by which software is caused.This diagnosis for software fault is undoubtedly extremely beneficial.
3. the present invention is for the application of operating system
Operating system software itself adopts this " black box " technology, and centralized configuration and management provides the service of " black box " as the non-volatile RAM of software " black box " for application software.Because the singularity of operating system can also be opened up independent " black box " zone, register system status switch in " black box " for system status information according to thought of the present invention.System state can be encoded as module, and periodically or at the key position register system status switch of state variation, method is with reference to the module metastasis sequence.Different is that the system state sequence is comparatively simple, is system state coding, system state time, system status information content successively, as shown in table 4.
Table 4: system state sequence
System state
1 coding
1 time of system state
System state
1 information content
System state 2 codings
2 times of system state
System state 2 information contents
In sum, the present invention utilizes non-volatile random access memory to construct " black box " of software in the mode of internal memory, does not need more hardware supported.By less transformation to software, realize real time record to broad sense module metastasis sequence, avoided losing of moment of failure key message.Based on thought of the present invention, can realize following function:
A. the module metastasis sequence that provides with software " black box ", module working time (turnover module mistiming), module critical data are as the foundation of software fault diagnosis.
B. with the foundation of the mutual restriction relation of module metastasis sequence, module working time (turnover module mistiming), module critical data as software fault diagnosis.
C. same operating system provides concentrated software " black box " for different software, and by the relation between the inefficacy moment different software information of record in the comparison " black box ", the source of determining fault is caused by which software.
D. operating system self adopts this " black box " technology, " black box " of centralized configuration and management application software.Can open up independent " black box " zone, register system status switch for system status information.
E. according to the information of software " black box " record, comparing the record of hardware system when thrashing, help to define the reason of thrashing, is that hardware or software cause.
Software of the present invention " black box " is simple and easy to do, thereby has extensive applicability.The method that module identity coding that the present invention proposes and module transinformation (comprising turnover module time and module critical data) are recorded in " black box " provides software specificationsization standardized a kind of thinking, can be generalized to all software fields, comprise operation system of computer.This is as aircraft must dispose black box, and software " black box " also should become the necessary accessory of software systems.

Claims (8)

1. a general software " black box " technical method is characterized in that: with the information of the finite length of non-volatile RAM real time record running software, as the method for software fault diagnosis.
2. according to claim 1, it is characterized in that non-volatile random access memory is with the mode of internal memory or exented memory " black box " as the logging software operation information.
3. according to claim 1,2, it is characterized in that target software is carried out less transformation: comprise that the standard coding of module and module add in real time memory module metastasis sequence and module data (module data is divided into the critical data that passes in and out module time and reaction module health again) from beginning to end in non-volatile random access memory.
4. a general software " black box " technical method is characterized in that: with software module metastasis sequence, module working time (turnover module mistiming), the module critical data foundation as software fault diagnosis.
5. according to claim 4, with the foundation of the mutual restriction relation of module metastasis sequence, module working time (turnover module mistiming), module critical data as software fault diagnosis.
6. a general software " black box " technical method, it is characterized in that: same operating system provides concentrated software " black box " for different software, and, carry out the diagnosis in fault source by each module metastasis sequence of comparison inefficacy moment different software and the relation between module data.
7. a general software " black box " technical method is characterized in that: operating system self employing this " black box " technology, " black box " of centralized configuration and management application software.For system status information is opened up independent " black box " zone, register system status switch.
8. a general software " black box " technical method, its feature also is: according to the information of software " black box " record, the record of comparison hardware system when thrashing helps to define the reason of thrashing, is that hardware or software cause.
CN 200710017808 2007-05-09 2007-05-09 Black-box technology for universal software Pending CN101075204A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200710017808 CN101075204A (en) 2007-05-09 2007-05-09 Black-box technology for universal software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200710017808 CN101075204A (en) 2007-05-09 2007-05-09 Black-box technology for universal software

Publications (1)

Publication Number Publication Date
CN101075204A true CN101075204A (en) 2007-11-21

Family

ID=38976267

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200710017808 Pending CN101075204A (en) 2007-05-09 2007-05-09 Black-box technology for universal software

Country Status (1)

Country Link
CN (1) CN101075204A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8234526B2 (en) 2009-09-18 2012-07-31 Asustek Computer Inc. Computer system and monitoring device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8234526B2 (en) 2009-09-18 2012-07-31 Asustek Computer Inc. Computer system and monitoring device

Similar Documents

Publication Publication Date Title
US8117137B2 (en) Field-programmable gate array based accelerator system
CN1104680C (en) Apparatus for processing instruction in computer system
US8015385B2 (en) Arrangements for memory allocation
CN105022670A (en) Heterogeneous distributed task processing system and processing method in cloud computing platform
CN1894662A (en) Processor cache memory as ram for execution of boot code
CN87100507A (en) Stack frame cache on the microprocessor chip
CN104133780A (en) Cross-page prefetching method, device and system
CN102985910A (en) GPU support for garbage collection
US20120254542A1 (en) Gather cache architecture
CN101178701B (en) Communicating method and system between multi-processor
CN103914398B (en) Method and device for managing utilization of memory including physical address space
CN103559148B (en) Scratch-pad storage management method on the sheet of multi-task embedded operation system
CN103678571A (en) Multithreaded web crawler execution method applied to single host with multi-core processor
Helttula et al. Graphical specification of algorithm animations with Aladdin
US20050228971A1 (en) Buffer virtualization
CN1521636A (en) A high-speed buffer and method for reading data from high-speed buffer and computation logic thereof
US8738877B2 (en) Processor with garbage-collection based classification of memory
CN109656868B (en) Memory data transfer method between CPU and GPU
CN100449494C (en) State tracking and recovering method and system in multi-processing computer system
US20160092182A1 (en) Methods and systems for optimizing execution of a program in a parallel processing environment
CN101075204A (en) Black-box technology for universal software
CN106569961B (en) Cache module based on memory access continuity and memory access method thereof
CN100520737C (en) Caching system, method and computer system
CN102193843A (en) Method for accelerating virtual machine system breakdown on-site storage
US8577936B2 (en) Fixup cache tool for object memory compaction in an information handling system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20071121