Recording Or Statistical Evaluation Of Computer Activity, E.g., Of Down Time, Of Input/output Operation, Etc. (epo) Patents (Class 714/E11.189)
-
Publication number: 20140122930Abstract: Diagnostic tests are performed in a data center that includes servers of various types and a management console, where each server provides an error log in a format specific to the type of the server. The management console receives an error log indicating an error produced by a hardware component, parses the error log into an error notification that describes the error and a type of the hardware component, and provides the error notification to other servers. Each of the other servers determines whether the server includes a hardware component of the same type, and if so, performs one or more diagnostic tests on the hardware component and reports results of the diagnostic tests to the management console.Type: ApplicationFiled: October 25, 2012Publication date: May 1, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SANTOSH DEVALE, RAJAT Y. JOSHI, VISHAL KULKARNI, VENKATESH SAINATH
-
Publication number: 20140101494Abstract: A method of tracking repeated performance problems in a machine is disclosed. The method comprises storing the faults in a computer memory, and assigning a classification value to the machine based on the frequency and number of the faults. Based on the classification value of the cash handing device it is determined whether the cash handing device needs to be serviced. The faults can be related to one of the hardware, the cash reject rate, image handling, crash rate, user claim rate, and check handling accuracy of the machine.Type: ApplicationFiled: October 10, 2012Publication date: April 10, 2014Applicant: BANK OF AMERICA CORPORATIONInventors: Cheryl S. Bond, Rebecca L. Bell, Dion L. Bellamy, Pat Burton, Kristy M. Crist, Carol Giordano, James D. Goodwin, Jeffrey Hipple, Maggie M. Peretto, Devin D. Rhodes, Karen Y. Stavinoha, Susan A. Wilson
-
Publication number: 20140075248Abstract: When a software component is starting (305), such as but not limited to a task or a subtask, the component pushes (310) its identification (ID) onto a stack. The component then executes (315) its other instructions. If the component completes its instructions so that it can terminate normally (320), then it pops (325) the stack, which removes its ID from the stack. If the component fails, such as by not being able to complete its instructions, then it will not be able to pop the stack so its ID will remain in the stack. Another software process can then read the IDs in the stack to identify (330) which components have failed and can automatically take a specified action (335), such as by sending an email message to, sending a text message to, or calling by telephone, a person or persons responsible for that software component.Type: ApplicationFiled: September 13, 2012Publication date: March 13, 2014Applicant: Microsoft CorporationInventors: Tarkan Sevilmis, Arshish Cyrus Kapadia, Maxim Lukiyanov, Tittu Jose, Gheorghita Irimescu, Janak Madhusudan Agarwal, Stephen John Clark, Hardik Shah, Sreekanth Lingannapeta
-
Publication number: 20140059391Abstract: A method, computer program product, and computer system for receiving, by a processor, an initiation indication that a test is initiating on a computing device. A logging process is activated to record to a log one or more log messages generated as a result of the test in response to receiving the initiation indication that the test is initiating. A completion indication is received that the test is complete. The logging process is deactivated to stop recording to the log in response to receiving the completion indication that the test is complete. The one or more log messages are associated with the test in response to receiving the completion indication that the test is complete.Type: ApplicationFiled: August 27, 2012Publication date: February 27, 2014Applicant: International Business Machines CorporationInventors: PHILIP SEIK POON CHAN, Matthew J. Ponsford
-
Publication number: 20140053027Abstract: An integrated circuit with debug capability includes a first packer and synchronizer to combine a multiple number of values of a first trigger signal received from a first circuit to form a first packed trigger signal and to output a synchronized first packed trigger signal in response to a trigger clock signal, the first trigger signal being synchronous with a first source clock signal, a first logic gate to provide a first output trigger signal indicative of whether any of the first multiple number of values of the first trigger signal in the first synchronized packed trigger signal is in a first state, and a debug state machine responsive to the first output trigger signal to selectively provide a first action signal.Type: ApplicationFiled: August 16, 2012Publication date: February 20, 2014Applicant: ADVANCED MICRO DEVICES, INC.Inventors: Scott P. Nixon, Eric M. Rentschler
-
Publication number: 20140040671Abstract: In a computer storage system, crash dump files are secured without power fencing in a cluster of a plurality of nodes connected to a storage system. Upon an occurrence of a panic of a crashing node and prior to receiving a panic message of the crashing node by a surviving node loading, in the cluster, a capturing node to become active, prior to a totem token being declared lost by the surviving node, for capturing the crash dump files of the crashing node, while manipulating the surviving node to continue to operate under the assumption the power fencing was performed on the crashing node.Type: ApplicationFiled: July 31, 2012Publication date: February 6, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shay AKIRAV, Roman BARSKY, Rafael BUCHBINDER, Dan MELAMED
-
Publication number: 20140040672Abstract: Methods and structure are provided for trapping incoming requests directed to hardware registers of an electronic device. The electronic device that comprises a set of hardware registers that define a configuration of the electronic device, circuitry that implements programmable logic defining which hardware registers have been flagged for trapping incoming requests, and a shadow memory that includes values corresponding to the flagged hardware registers. The circuitry is further operable to access a value in shadow memory that corresponds to a flagged hardware register, responsive to receiving a request from an external device to access the flagged hardware register.Type: ApplicationFiled: August 6, 2012Publication date: February 6, 2014Applicant: LSI CORPORATIONInventors: Eugene Saghi, Richard Solomon
-
Publication number: 20140032974Abstract: A method of managing a debug trace data stream by detecting conditions where the trace data generated exceeds the available transmission bandwidth, and inserting a trace data gap into the trace data stream. The gap may contain additional information relating to the amount and type of data that is being lost during the overflow condition. In an alternate embodiment the generated trace may be throttled to ensure the available bandwidth is not exceeded.Type: ApplicationFiled: July 25, 2012Publication date: January 30, 2014Applicant: TEXAS INSTRUMENTS INCORPORATEDInventor: Jason L. Peck
-
Publication number: 20140006874Abstract: Provided are a computer program product, system, and method for managing traces to capture data for memory regions in a memory. A trace includes a monitor parameter used by a trace procedure to monitor data in a memory device. A frequency is determined at which the trace procedure monitors the memory device. The trace procedure is invoked at the determined frequency to perform trace procedure operations comprising determining a region in the memory device according to the monitor parameter and copying data in the determined region to trace data in a data space.Type: ApplicationFiled: June 27, 2012Publication date: January 2, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Neal E. Bohling, Joseph V. Malinowski, David C. Reed, Max D. Smith
-
Publication number: 20140006875Abstract: Transactions in a multi-component system have corresponding local identifiers uniquely identifying the transaction among transactions within a particular functional block of the device under test. For each transaction, it is determined whether the transaction is a new request, a handshake request corresponding to a previously generated request, or a response. In response to determining that a transaction of the plurality of transactions is a new request, a global identifier is assigned to the new request which uniquely identifies the new request among new requests of all functional blocks of the device under test. A global entry corresponding to the new request is stored that includes the global identifier of the new request, an indicator of a functional block of the device under test which generated the new request, and a local identifier uniquely identifying the new request within the first functional block.Type: ApplicationFiled: June 29, 2012Publication date: January 2, 2014Inventors: VIVEKANANDA M. VEDULA, Jayanta Bhadra
-
Publication number: 20130346806Abstract: Data fields within a trace data set are interpreted by a processor using a data field declaration of each data field that identifies a data type of the respective data field. An actual data value of the interpreted data field is compared with the data field declaration for each interpreted data field. Based upon each comparison, a determination is made as to whether the actual data value of the interpreted data field contains an erroneous data value based upon the data field declaration.Type: ApplicationFiled: June 21, 2012Publication date: December 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen J. Burghard, David J. Harman, Neil W. Leedham, Andrew Wright
-
Publication number: 20130339802Abstract: A method and system for tracing in a data processing system. The method includes receiving a plurality of signals associated with an operation during execution of the operation. The method also includes, in response to an indication that the operation is a multiphase operation, during execution of the operation, selection logic, during a first phase of the multiphase operation, selecting and outputting as a trace signal a first signal of the plurality of signals, and during a second phase of the multiphase operation, selecting and outputting as the trace signal a second signal of the plurality of signals.Type: ApplicationFiled: June 15, 2012Publication date: December 19, 2013Applicant: International Business Machines CorporationInventors: Steven R. Carlough, Juergen Haess, Michael K. Kroener, Silvia M. Mueller
-
Publication number: 20130339803Abstract: A process for managing interrupts, which may be performed using electronic circuitry, includes: receiving interrupts bound for a processing device, where the interrupts are received from hardware devices that are configured to communicate with the processing device; generating data containing information corresponding to the interrupts; and sending the data to the processing device.Type: ApplicationFiled: June 19, 2012Publication date: December 19, 2013Inventors: David Vandervalk, Lloyd K. Frick
-
Publication number: 20130332778Abstract: The current application is directed to architected hardware support within computer processors for detecting and monitoring various types of potential performance imbalances with respect to simultaneously executing hardware threads in simultaneous multi-threading (“SMT”) processors and SMT-processor cores. The architected hardware support may include various types of performance-imbalance-monitoring registers that accumulate indications of performance imbalances and that can be used, by performance-monitoring software and by human analysts to detect performance-degrading conflicts between simultaneously executing hardware threads. Such conflicts can be ameliorated by changing the scheduling of virtual machines, tasks, and other computational entities, by redesigning and re-implementing all or portions of performance-limited and performance-degrading applications, by altering resource-allocation strategies, and by other means.Type: ApplicationFiled: June 7, 2012Publication date: December 12, 2013Applicant: VMware, Inc.Inventor: Lawrence Andrew Spracklen
-
Publication number: 20130290787Abstract: A method for recording managing SELs of a server includes the following steps. Periodically determining a current number of the SELs stored in a storage unit of the server. Comparing the current number with a historical number to determine newly generated SELs. If the current number is greater than the historical number, determining whether the storage unit is full. If the storage unit is full, controlling the BMC to transfer the newly generated SELs to a cache unit. The stored SELs are erased in the storage unit. Transferring the SELs in the cache unit to the storage unit when the SELs in the storage unit are erased. The historical number is updated.Type: ApplicationFiled: July 27, 2012Publication date: October 31, 2013Applicants: HON HAI PRECISIION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD.Inventors: XIAN-KUI CHEN, HAI-LI WANG
-
Publication number: 20130227350Abstract: Recording and playback of trace log data and video log data for programs is described. In one aspect, a method for viewing log data recorded during execution of a program includes causing a display of recorded images depicting prior visual user interaction with the program during a particular time period. The method also includes causing a display of messages tracing and describing prior execution of the program during the particular time period. The display of the messages and the display of the recorded images are synchronized.Type: ApplicationFiled: February 23, 2012Publication date: August 29, 2013Applicant: Cadence Design Systems, Inc.Inventors: Donald J. O'RIORDAN, David VARGHESE
-
Publication number: 20130219228Abstract: Automated testing of application software is performed by recording the output of at least one sensor that produces sensor information. A harnessed app being tested requests sensor information. Those requests are intercepted and recorded information that corresponds to the requested sensor information is retrieved and sent to the harnessed app as sensor information.Type: ApplicationFiled: February 17, 2012Publication date: August 22, 2013Applicant: WAVEMARKET, INC.Inventor: Brian Martin
-
Publication number: 20130198574Abstract: A method and system for providing autonomous event logging and retrieval for failure analysis. In one implementation, storage device firmware monitors and records events (e.g., storage device errors and/or failures) to the storage device flash in substantially real time from power on of the storage device to power off. Additionally, diagnostic data relating to an event, including a time stamp and storage device environmental conditions are recorded. The logged event data may be utilized to streamline failure analysis by determining whether the storage device failed and if so, when the storage device failed and what the conditions of the storage device were at the time of the failure. Such information may be used for failure, warranty, integrator, and/or troubleshooting analysis.Type: ApplicationFiled: January 27, 2012Publication date: August 1, 2013Applicant: SEAGATE TECHNOLOGY LLCInventors: Brian John Higley, Bradley John Gill
-
Publication number: 20130198571Abstract: A system and method for processing data for use with a microcontroller having a processing unit provides for sending an input data address to a memory as part of a read request for input data stored in the memory, receiving the input data from the memory, generating a plurality of trace signals, generating a first plurality of signatures based upon the plurality of trace signals, receiving a second plurality of corresponding signatures from a second microcontroller, comparing each signature of the first plurality of signatures to each corresponding signature of the second plurality of corresponding signatures, generating a first error signal if the comparison produces at least one mismatch, and utilizing the first error signal to generate one or more disable signals for disabling operation of one or more devices under control of the microcontroller.Type: ApplicationFiled: January 31, 2012Publication date: August 1, 2013Applicant: Infineon Technologies AGInventors: Simon Brewerton, Neil Hastie, Glenn Farrall, Boyko Traykov, Antonio Vilela
-
Publication number: 20130185601Abstract: In accordance with one aspect of the invention, a system for generating compact function trace data for leaf functions includes a central processing unit (CPU), configured to output program flow information needed for generating a program flow trace, and a trace unit, coupled to the CPU. The trace unit is configured to receive the program flow information from the CPU for generating compact function trace data. The trace unit further comprises a first output mode and a second output mode and is further configured to select either the first output mode or the second output mode for generating compact function trace data.Type: ApplicationFiled: January 18, 2012Publication date: July 18, 2013Applicant: Infineon Technologies AGInventors: Albrecht Mayer, Harry Siebert
-
Publication number: 20130185602Abstract: Detection of heap dump occurrence is facilitated through maintenance of a heap dump location registry. The heap dump location registry indicates tools for which heap dump occurrence is to be detected. Based on periodically referencing the heap dump location registry, it is determined whether heap dump of a tool of the one or more tools has occurred. In one embodiment, startup and shutdown events of the tool are tracked to update execution status and process identifiers in the heap dump location registry, and the periodically references determines based on the indicators whether heap dump has occurred for the tool. In another embodiment, a heap dump location for heap dumps of the tool is obtained from the registry and the heap dump location is checked for the presence of heap dump files, which presence indicates occurrence of a heap dump for the tool.Type: ApplicationFiled: January 18, 2012Publication date: July 18, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ahamed JALALDEEN, Ashish MUNGI
-
Publication number: 20130185600Abstract: Dynamically collecting data pertaining to a program execution. A method can include monitoring execution of the program in a plurality of threads and, responsive to identifying an exception triggered by the program execution in a first of the plurality of threads, initiating at least one data collector to collect data exclusively relevant to the program execution in the first thread.Type: ApplicationFiled: January 12, 2012Publication date: July 18, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: PETER R. MACFARLANE
-
Publication number: 20130159782Abstract: Example systems and methods of generating and distributing user-specified application information are presented. In one example, an informational code to be generated during execution of a software application is accessed. A character string specified by a first user of the software application that is descriptive of the informational code is received. The informational code and the character string are stored in a data storage device, which stores a plurality of information codes in association with corresponding character strings for the software application. The informational code is received in response to the first information code being generated during execution of the software for a second user. The character string is retrieved from the data storage device after the execution of the application based on the informational code, and transmitted for display to the second user.Type: ApplicationFiled: December 20, 2011Publication date: June 20, 2013Applicant: Business Objects Software Ltd.Inventor: Radim Bacinschi
-
Publication number: 20130159781Abstract: A method of tracing processor instructions includes forming a compressed trace stream with a dynamic unit width indicator and a value block. The dynamic unit width indicator includes an address/data width indicator qualified by a unit indicator. The unit value block has a width that is a function of the address/data width indicator and the unit indicator.Type: ApplicationFiled: December 16, 2011Publication date: June 20, 2013Applicant: MIPS TECHNOLOGIES, INC.Inventor: James Hippisley Robinson
-
Publication number: 20130151899Abstract: A debug system includes a debug device and a computer. The debug device includes a decoding module, a first storing module, a first control module; and a signal receiving and transmitting module. The computer includes a second control module, a second storing module, and a display module. The decoding module decodes data from the LPC bus. The first storing module stores decoded data. The second control module sends a set address data to the first control module via the signal receiving and transmitting module. The first control module obtains a corresponding data from the first storing module according to the set address data and send the corresponding data to the second control module via the signal receiving and transmitting module. The second control module stores the corresponding data to the second storing module and displays the corresponding data on the display module.Type: ApplicationFiled: July 31, 2012Publication date: June 13, 2013Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (ShenZhen) Co., LTDInventor: KANG-BIN WANG
-
Publication number: 20130097463Abstract: An approach to root cause determination in a complex systems based on monitoring and event data is disclosed. It includes a historical analysis of events with their probabilistic correlations. Applying information measures between the random variables which embody those events one can detect origins of problems and generate real-time recommendations for their locations in a hierarchical system. Estimation of system bottlenecks, as well as the risk of “black swan”-type events are also computed. The processes are based on a statistical processing of a virtual directed graph produced from historical events.Type: ApplicationFiled: October 12, 2011Publication date: April 18, 2013Applicant: VMWARE, INC.Inventors: Mazda A. MARVASTI, Arnak POGHOSYAN, Ashot HARUTYUNYAN, Naira GRIGORYAN
-
Publication number: 20130086411Abstract: Various exemplary embodiments relate to a method and related network node including one or more of the following: identifying a hardware failure of a failed component of a plurality of hardware components; determining a set of agent devices currently configured to utilize the failed component; reconfiguring an agent device to utilize a working component of the plurality of hardware components. Various exemplary embodiments additionally or alternatively relate to a method and related network node including one or more of the following: projecting a failure date for the hardware module; determining whether the projected failure date is acceptable based on a target replacement date for the hardware module; if the projected failure date is not acceptable: selecting a parameter adjustment for a hardware component, wherein the parameter adjustment is selected to move the projected failure date closer to the target replacement date, and applying the parameter adjustment to the hardware component.Type: ApplicationFiled: September 30, 2011Publication date: April 4, 2013Applicant: Alcatel-Lucent USA, Inc.Inventors: Eric J. Bauer, Randee S. Adams, William D. Reents, Mark M. Clougherty
-
Publication number: 20130061096Abstract: A method and system for collecting data for diagnosing a failure of a computer hardware device. After an indication of the failure of the computer hardware device that results in a full system crash is received, an address translation table of a central processing unit (CPU) of the computer hardware device is collected. A format of call stack frames of an operating system (OS) image of the computer hardware device is retrieved. Based on the collected address translation table and the retrieved format of the plurality of call stack frames, the call stack frames are retrieved and output to a computer file.Type: ApplicationFiled: September 7, 2011Publication date: March 7, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Doyle J. McCoy
-
Publication number: 20130055032Abstract: A method for priority buffering of trace data in a computing system includes receiving instances of trace data by a priority assignment module, the trace data being generated by events that occur during execution of computer software in the computing system; assigning a priority to each instance of trace data, wherein the priority is assigned based on the event that generated the instance of trace data; and inserting the instances of trace data into a plurality of priority buffers based on their respective assigned priorities.Type: ApplicationFiled: August 25, 2011Publication date: February 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gary L. Cole, Michael J. Howland, Paul E. Rogers
-
Publication number: 20130031419Abstract: Mechanisms, in a processor chip, are provided for obtaining debug data from on-chip logic of the processor chip while the processor chip is in a secure mode of operation. The processor chip is placed into a secure mode of operation in which access to internal logic of the processor chip to control the internal logic of the processor chip, by mechanisms external to the processor chip, is disabled on a debug interface of the processor chip. A triggering condition of the processor chip is detected that is a trigger for initiated debug data collection from the on-chip logic. Debug data collection is performed from the on-chip logic to generate debug data. Data is output, by the processor chip to an external mechanism, on the debug interface based on the debug data.Type: ApplicationFiled: July 28, 2011Publication date: January 31, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frank Haverkamp, Heiko Michel, Joerg-Stephan Vogt
-
Publication number: 20130031420Abstract: Mechanisms, in a processor chip, are provided for obtaining debug data from on-chip logic of the processor chip while the processor chip is in a secure mode of operation. The processor chip is placed into a secure mode of operation in which access to internal logic of the processor chip to control the internal logic of the processor chip, by mechanisms external to the processor chip, is disabled on a debug interface of the processor chip. A triggering condition of the processor chip is detected that is a trigger for initiated debug data collection from the on-chip logic. Debug data collection is performed from the on-chip logic to generate debug data. Data is output, by the processor chip to an external mechanism, on the debug interface based on the debug data.Type: ApplicationFiled: June 12, 2012Publication date: January 31, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frank Haverkamp, Heiko Michel, Joerg-Stephan Vogt
-
Publication number: 20130007517Abstract: Systems and methods may provide for conducting a recursive dependency analysis of an application file to identify a set of original libraries associated with the application file, and creating a set of interceptor libraries based on the set of original libraries. In addition, an execution environment may be prepared to support the execution of the interceptor libraries in conjunction with the execution of the original libraries, and the application file may be executed. Moreover, one or more execution characteristics of the interceptor libraries can be recorded and output via a utility interface.Type: ApplicationFiled: June 30, 2011Publication date: January 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James P. Eberwein, Erik A. Kirk
-
Publication number: 20130007535Abstract: Embodiments of the present invention provide a method, system and computer program product for trace capture of successfully completed transactions for trace debugging of failed transactions. In an embodiment of the invention, a method for trace capture of successfully completed transactions for trace debugging of failed transactions is provided. The method includes storing entries in a log with information pertaining to successfully completed transactions in a transaction processing system executing in memory of a host server, detecting a failed transaction in the transaction processing system, generating a trace for the failed transaction, and providing with the generated trace an entry from the log with information pertaining to a successful completion of the failed transaction.Type: ApplicationFiled: February 28, 2012Publication date: January 3, 2013Applicant: International Business Machines CorporationInventor: Darren R. Beard
-
Publication number: 20120331354Abstract: A method of generating timestamped trace messages includes generating a trace message in response to an event at an instruction pipeline of a data processing device. If timestamping is enabled, timestamps are only included in the trace message only if a programmable condition is detected. For example, a timestamp can be included in the trace message if the amount of space used to store messages at a trace message buffer exceeds a watermark value. The condition that results in a timestamped trace message is programmable, and can be selected via a debug interface. Because timestamps are only included in trace messages when the programmable condition is satisfied, some trace messages will not include a timestamp, thereby reducing the amount of buffer space needed to store the trace messages.Type: ApplicationFiled: September 5, 2012Publication date: December 27, 2012Applicant: FREESCALE SEMICONDUCTOR, INC.Inventors: Zheng Xu, Suraj Bhaskaran, Richard G. Collins, Jason T. Nearing
-
Publication number: 20120272102Abstract: A system and method for efficiently and easily capturing data dumps generated by a network device is disclosed. In one embodiment, a storage management device is disposed between a network device and a storage device. The network device is programmed with a virtual address that is associated with the storage management device. Upon generating a data dump, the network device writes the data dump to the virtual address where the storage management device receives the data dump and redirects it to a long-term storage location. Additionally, the storage management device can generate a record of each data dump that indicates the network device that generated the data dump and where the data dump was stored.Type: ApplicationFiled: July 5, 2012Publication date: October 25, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Glen Tindal, Jeffery A. Schenk
-
Publication number: 20120260136Abstract: A method of detection of erroneous memory usage is provided. The method includes starting a computer and executing a program and a monitoring tool to collect calls to a memory during execution of the program, detecting a call to the memory using the monitoring tool, extracting lines of code which request access to a memory address via the call to the memory, detecting a set of variables to which access is granted via the call to the memory, extracting, after execution of the predetermined program, the set of variables for each of the lines of code, detecting erroneous memory usage by matching the extracted lines of code with the set of variables, and determining the call as erroneous upon access being granted to the memory corresponding to the set of variables during execution of the predetermined program when access is not possible during the execution of the program.Type: ApplicationFiled: April 6, 2012Publication date: October 11, 2012Applicant: SAMSUNG ELECTRONICS CO. LTD.Inventors: Jae-Hoon JEONG, Ekaterina Anatolievna GORELKINA, Hyun-Joo AHN
-
Publication number: 20120254668Abstract: This document relates to apparatus and methods to store and retrieve trace information in on-chip system memory of microcontrollers. A microcontroller comprises a microprocessor and a memory device accessible through a data bus and an address bus coupled to the microprocessor. The microcontroller includes on-chip debug logic coupled to the microprocessor. Trace data can be retrieved from system memory using a debug port of the debug logic. A system in accordance with the present invention will lower the cost of implementation of trace features in microcontrollers, and strongly reduce the cost of supporting such features in debug tools.Type: ApplicationFiled: June 19, 2012Publication date: October 4, 2012Applicant: ATMEL CORPORATIONInventors: Frode Milch Pedersen, Are Arseth
-
Publication number: 20120246518Abstract: Trace data is periodically written to a trace table. A software trap is run. If the software trap does not fire, a run marker is set to a predefined distance behind a position of an old run marker in the trace table. The trace data is periodically written to the trace table, and, if necessary, earlier written trace table data is overwritten. Most recently written trace data is detected to have reached the run marker and the software trap is run.Type: ApplicationFiled: March 2, 2012Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anne P. Francis, David E. Knibb, Neil W. Leedham, Andrew Wright
-
Publication number: 20120216080Abstract: An electronic tracing process includes packing both stall (215) and reason (219) data into a single high priority timing information stream. An integrated circuit includes an electronic processor (110), and a tracing circuit (120) operable to pack both stall and events data into a single timing information stream. Other circuits, processes and systems are also disclosed.Type: ApplicationFiled: February 14, 2012Publication date: August 23, 2012Applicant: Texas Instruments IncorporatedInventors: Kanika Ghai Bansal, Dipan Kumar Mandal, Gary A. Cooper, Bryan J. Thome
-
Publication number: 20120159268Abstract: A hosting provider operates a server system that provides a service to one or more tenants. The server system receives configuration data from the tenants. As part of providing the service to a given tenant, the server system attempts to access an external service due to the configuration data received from the given tenant identifying the external service. Service access errors can occur when attempting to access the external service. In response to determining that an error has occurred when attempting to access the external service, the server system sends a service access alert to a recipient associated with the given tenant. The service access alert notifies the recipient that the error has occurred.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: MICROSOFT CORPORATIONInventors: Jonathan LeCroy, Wilson Li, Mayank Mehta, Ayse Yesim Koman, Victor William Habib Boctor, Mayerber Loureiro De Carvalho Neto, Christopher Barnes, Frank David Byrum
-
Publication number: 20120151274Abstract: Systems, methods, and computer readable media for collecting run-time error information for an executing script through the use of a double code-injection technique are described. A first native code injection into a user's client-side application (e.g., a browser application) is made. The second injection is thereafter made by the user's client-side application itself (when the first injected program code is executed) into the application's associated scripting engine and only when a script error has been detected. The second injected program code or scripts collect detailed run-time script error information within the context of the application's scripting engine. The second injected program code can then return the collected error information to the user application's context where it may be provided to a debug tool or recorded for later review (by the first injected program code).Type: ApplicationFiled: December 14, 2010Publication date: June 14, 2012Applicant: BMC SOFTWARE, INC.Inventors: Daniel Liberty, Moshe Kravchik
-
Publication number: 20120151275Abstract: A method of assessing a computer program under actual working conditions according to one embodiment comprises executing the computer program multiple times under actual working conditions, in response to each unhandled exception encountered during execution of the computer program, creating a corresponding stack frame signature to characterize the state of the program, and comparing the stack frame signatures to determine which unhandled exceptions are likely to have resulted from similar features.Type: ApplicationFiled: February 24, 2012Publication date: June 14, 2012Applicant: CBS INTERACTIVE, INC.Inventors: Scott Clementson Elliott, Kenneth A. Gengler
-
Publication number: 20120124429Abstract: An apparatus and method for tracing memory access information of a user program while ensuring a normal operation of the user program. An access permission about a memory region may be set to trace the memory access information. An instruction of the user program encounters a page fault according to the set access permission. If the page fault occurs, memory access information is stored based on the page fault, and apparatus executes an instruction causing the page fault while in a supervisor mode.Type: ApplicationFiled: July 28, 2011Publication date: May 17, 2012Inventors: Hyun-Joo AHN, Jae-Hoon JEONG, Sung-Hwan HYUN
-
Publication number: 20120102370Abstract: A data processing device for memory dump collection, the data processing device includes: a processor to issue a first interrupt upon instructions to collect a memory dump being entered, to issue a second interrupt for running a program put in an address indicated by a reset vector upon the first interrupt being issued, and to record the memory dump in a storage unit in a process of running the program upon the second interrupt being issued.Type: ApplicationFiled: April 26, 2011Publication date: April 26, 2012Applicant: FUJITSU LIMITEDInventors: Kazuhiro YOSHIDA, Masakazu Watanabe, Nobuhiro Tachino, Kenji Kaneshige
-
Publication number: 20120102366Abstract: A meta attribute useful for functional coverage is computed based on values comprised by two or more matching fields in a trace. The two or more matching fields may be comprised by a single entry of the trace or by a plurality of entries of the trace. A definition of the meta attribute may define which fields of the entries comprise values useful for computation of the meta attributes. The matching entries may be identified based on identifying values within the entries.Type: ApplicationFiled: October 24, 2010Publication date: April 26, 2012Inventors: Yoram Simha Adler, Noam Behar, Dale E. Blue, Orna Raz-Pelleg
-
Publication number: 20120102365Abstract: A functional coverage model may be generated based on a trace. The functional coverage model may comprise values of attributes. The values may be extracted from one or more entries comprised by the trace. Based upon a selection of a field of an exemplary entry, content of the corresponding fields in other entries may be extracted and utilized. In some exemplary embodiments, names of attributes may be extracted from the trace. In some exemplary embodiments, a reference trace may be utilized as a comparative baseline coverage by generating a functional coverage model based upon the reference trace and comparing coverage of a second trace in respect to the functional coverage model with the coverage of the reference trace.Type: ApplicationFiled: October 24, 2010Publication date: April 26, 2012Inventors: Yoram Simha Adler, Behar Noam, Dale E. Blue, Orna Raz-Pelleg
-
Publication number: 20120089876Abstract: In existing mobile networks, users may be traced to troubleshoot problematic user connections, monitor generic network performance, and to perform root cause analysis to identify network problems. However, the existing tracing methods provide incomplete trace information. To address this and other issues, early tracing recording is enabled in which an involved trace entity starts recording the trace data when any initial activity related to the user equipment is detected. The trace entity can continue the trace if a trace trigger is later confirmed or may discard the trace data if the trigger is not confirmed.Type: ApplicationFiled: October 6, 2010Publication date: April 12, 2012Inventors: András Rácz, Tamás Borsos, László Kovács
-
Publication number: 20120084606Abstract: A device management apparatus acquires the state of a device (image forming apparatus), and determines whether or not an error occurring in the image forming apparatus is the already-occurred error based on the change in the state of the image forming apparatus. When the error occurring in the image forming apparatus is an already-occurred error, the device management apparatus determines whether or not the error continues for a period of time equal to or longer than a predetermined period of time. When the error continues for a period of time equal to or longer than a predetermined period of time, the device management apparatus changes an error notification destination, and retransmits an electronic mail regarding the error to the changed notification destination.Type: ApplicationFiled: September 14, 2011Publication date: April 5, 2012Applicant: CANON KABUSHIKI KAISHAInventor: TOSHIAKI IGARASHI
-
Publication number: 20120066547Abstract: A method for problem determination and resolution in an information technology (IT) system includes receiving a problem ticket, searching a database for a plurality of problem features based on data included in the problem ticket, extracting the plurality of problem features from the database, and generating a problem signature corresponding to the problem ticket, wherein the problem signature comprises at least one non-textual feature extracted from the plurality of problem features.Type: ApplicationFiled: September 13, 2010Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Allen M. Gilbert, Laura Zaihua Luan, Daniela Rosu, Christopher Ward
-
Publication number: 20120036397Abstract: A log event can be received from a log source within an application server environment. The log event can be an error message which is associated with a log level. In one embodiment, the application server environment can be a JAVA 2 ENTERPRISE EDITION runtime environment. The log event can be analyzed to determine the ontology of the log event which can comprise of the log event, the user context, and the relationship of the log event to the user context. The log event can be associated with the user context as determined by the relationship of the log event.Type: ApplicationFiled: August 4, 2010Publication date: February 9, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: NAVEEN G. BALANI, RAMKISHOR SINGH