Claims
- 1. A system for analyzing software being executed in a target system having a cache memory, a data bus and an address bus, the software containing a plurality of executable tag statements which, when executed, cause the target system to perform an operation outside of the cache memory, the tag statements containing respective tag values corresponding to locations in the software of the tag statements, the system comprising:a detector that detects the operation outside of the cache memory, the detector capturing a tag value of an executable tag statement when the detector detects the operation; and a processor connected to the detector, the processor determining the software locations that have been executed based on the respective tag values of the captured tags.
- 2. The system recited in claim 1 wherein the detector is a probe connected to the address and data buses of the target system that detects the operation while the target system is executing the software.
- 3. The system recited in claim 1 wherein the operation is a write operation and the detector is a file that receives tag values.
- 4. The system recited in claim 1 wherein the detector stores the tag values in a persistent memory during execution and writes the tag values to a file following execution.
- 5. The system recited in claim 1 wherein the operation is a function call across a communications network.
- 6. The system recited in claim 5 wherein the communications network is an Ethernet network.
- 7. A method of analyzing software being executed in a target system having a cache memory, a data bus and an address bus, the method comprising:inserting a plurality of executable tag statements at locations in the software, each of the tag statements, when executed, causing the target system to execute an operation outside of the cache memory, the tag statements containing respective tag values corresponding to the locations in the software of the tag statements; allowing the target system to execute the software; monitoring execution of the operation outside the cache memory of the target system while the target system is executing the software and detecting when the operation has been executed; capturing a tag by a detector when the operation has been executed; and determining the software locations that have been executed based on the respective tag values of the captured tags.
- 8. The method of claim 7 wherein the operation is a function call statement outside of the target system and across a communications network having a network address, and wherein the step of detecting when the function call statement has been executed includes determining that the communications network has been addressed.
- 9. The method of claim 7 wherein the communications network is an Ethernet network.
CROSS-REFERENCE TO RELATED APPLICATION
This application is a continuation of U.S. patent application Ser. No. 09/250,126, filed Feb. 12, 1999, now issued as U.S. Pat. No. 6,311,327 on Oct. 30, 2001, which is a continuation-in-part of U.S. patent application Ser. No. 09/035,308, filed Mar. 2, 1998, now issued as U.S. Pat. No. 6,161,200 on Dec. 12, 2000.
US Referenced Citations (18)
Continuations (1)
|
Number |
Date |
Country |
| Parent |
09/250126 |
Feb 1999 |
US |
| Child |
09/942508 |
|
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
| Parent |
09/035308 |
Mar 1998 |
US |
| Child |
09/250126 |
|
US |