CN101281488A - Inner core debug method of Linux operating system - Google Patents

Inner core debug method of Linux operating system Download PDF

Info

Publication number
CN101281488A
CN101281488A CNA200710039207XA CN200710039207A CN101281488A CN 101281488 A CN101281488 A CN 101281488A CN A200710039207X A CNA200710039207X A CN A200710039207XA CN 200710039207 A CN200710039207 A CN 200710039207A CN 101281488 A CN101281488 A CN 101281488A
Authority
CN
China
Prior art keywords
kernel
interim
function
module
linux
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200710039207XA
Other languages
Chinese (zh)
Inventor
刘通平
韩涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yumeng Communication Sci & Tech Co Ltd
Original Assignee
Shanghai Yumeng Communication Sci & Tech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yumeng Communication Sci & Tech Co Ltd filed Critical Shanghai Yumeng Communication Sci & Tech Co Ltd
Priority to CNA200710039207XA priority Critical patent/CN101281488A/en
Publication of CN101281488A publication Critical patent/CN101281488A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a debugging method for kernel of a Linux operating system, which comprises the following steps: a kernel part needed to be modified or debugged is compiled to a temporary kernel by means of kernel module; the temporary kernel is loaded to the user space of the kernel by using a kernel loading tool, a function jump table is disposed on the entrance of replaced original kernel functions, the calls of original kernel functions are intercepted, when an original kernel functions is called, a replacing function of the temporary kernel is automatically jumped to; the temporary kernel is debugged; when the debug is finished, the temporary kernel is unloaded from the modified kernel by a kernel unloading tool, and the original state of the kernel is restored. The kernel compiling process is only limited to specific related functions, the kernel needs not to be started again, recompiling and relink, loading time and kernel start time in kernel debugging process are avoided; the developing and debugging time of an operating system is shorted, the developing and debugging efficiency is improved.

Description

The inner core debug method of (SuSE) Linux OS
Technical field
The present invention relates to a kind of adjustment method of computer software, particularly relate to a kind of inner core debug method that is applicable to the (SuSE) Linux OS under the various hardware platforms.
Background technology
On (SuSE) Linux OS, do not have good kernel debug mechanism at present.Because the frequent cisco unity malfunction of the special-purpose debugging acid kgdb of kernel, so the method for the most frequently used debugging kernel is to adopt the mode of adding printk (printf in the kernel) in the kernel source code, by to the obtaining and analyzing of type information, to check the operation conditions of (SuSE) Linux OS kernel.But wish the kernel information difference of each output during debugging, if adopt the mode that kernel adds new print statement of revising, all must experience very time-consuming procedure such as recompility, link and download linux kernel at every turn, influence the speed of the debugging and the exploitation of linux kernel.
Summary of the invention
The technical problem to be solved in the present invention provides a kind of inner core debug method of (SuSE) Linux OS, can avoid in the kernel debug process recompility, link, download the process of linux kernel again, improve the debugging and the development efficiency of (SuSE) Linux OS.
For solving the problems of the technologies described above, the inner core debug method of (SuSE) Linux OS of the present invention is to adopt following technical scheme to realize, at first, the kernel portion that needs are revised and debugged is compiled into interim kernel in the mode of kernel module; Utilize kernel loading appliance (inskern) with the user's space of described interim kernel loads then to kernel, inlet at the function of the original kernel that is replaced is placed the function jump list, intercept and capture all function calls, when calling the function of original kernel, jump to the replacement function place of interim kernel automatically original kernel; Carry out the debugging of interim kernel; After debug process is finished, utilize kernel tool of unloading (rmkern) that interim kernel is unloaded from the kernel of revising, recover the virgin state of kernel.
The present invention adopts kernel dynamic replacement and recovery technology that the kernel of (SuSE) Linux OS is debugged.Because kernel compilation process of the present invention only limits to the related function of appointment, and need not to restart kernel, therefore can avoid recompility, link again, download time and kernel start-up time in the kernel debug process.Like this, can greatly shorten the exploitation and the debug time of (SuSE) Linux OS, improve the exploitation and the debugging efficiency of (SuSE) Linux OS.
Description of drawings
The present invention is further detailed explanation below in conjunction with accompanying drawing and embodiment.
Fig. 1 is an adjustment method control flow chart of the present invention;
Fig. 2 is the kernel loading appliance frame construction drawing among the present invention;
Fig. 3 is that the kernel among the present invention is replaced process flow diagram;
Fig. 4 is the kernel tool of unloading frame construction drawing among the present invention;
Fig. 5 is the interim kernel unloading process flow diagram among the present invention.
Embodiment
The inner core debug method of (SuSE) Linux OS of the present invention depends on two prerequisites, the determinacy of the module machine of Linux and linux kernel symbolic address.
(SuSE) Linux OS provides a kind of brand-new mechanism, is called installable module (loadab-le module).Utilize this mechanism, can be as required under the condition that needn't recompilate, link to kernel, but installed module is dynamically inserted operating kernel, become an organic component of kernel; Perhaps remove the module of having installed from kernel.This just mechanism makes the memory mapping of kernel keep minimum, but has very big dirigibility and expandability.
The determinacy of linux kernel symbolic address, promptly in linux kernel, load address of nuclear symbol is just determined after compiling in it.About the load address of linux kernel symbol, obtain in the kernel symbol table that can from the linux kernel compilation process, be produced, such as from the System.map file, obtaining.The determinacy of this kernel symbolic address provides possibility for carrying out dynamic kernel replacement.Because replacement target of the present invention had both comprised the external function that kernel provides, also comprise the employed intrinsic function of kernel simultaneously.
The external function that described kernel provides is promptly provided the function that uses for other module of (export) by kernel.For the kernel symbolic address of this class function, the function chained list that provides by kernel obtains among the present invention.
The intrinsic function that described kernel uses, in described function chained list, common kernel module can't directly not use.For the kernel symbolic address of this class function, obtain among the present invention by the kernel symbol table.
As shown in Figure 1, the inner core debug method of (SuSE) Linux OS of the present invention comprises following four processes: the unloading of the loading of the compiling of interim kernel, interim kernel, the debugging of interim kernel, interim kernel.
The compiling of described interim kernel is meant and needs is revised and the kernel portion of debugging is compiled into interim kernel in the mode of kernel module.At the function that is defined in the interim kernel, the external function that the kernel of interim kernel calls provides, the intrinsic function that the kernel of interim kernel calls uses adopts different Compilation Methods respectively.
For the function that is defined in the interim kernel, adopt the compiling rule of general module.
The external function that provides for the kernel that calls, the related function explanation that must comprise kernel when compiling could compile to be passed through.The compiling compiling rule regular and general module that is these functions is consistent.
For the intrinsic function of the kernel use of calling, owing to only be used for kernel inside, the therefore not statement of this function (promptly in header file, generally can not find the statement of described intrinsic function) in the external function tabulation that kernel provides out.According to the compiling rule, in fact this class function will be failed when compiling.For fear of this class compile error, in interim kernel, comprise the statement of this class function.Promptly need earlier this function declaration to be compiled into the external function of target, when compiling, needn't handle at above-mentioned function with the notice compiler.And unification is handled this class function when kernel loads.
The loading of described interim kernel adopts kernel loading appliance (inskern) to replace original kernel automatically.The realization of kernel loading appliance is a core of the present invention, and its system frame structure comprises symbol locating module, kernel copy module, kernel modifications module, kernel spacing distribution module, kernel load module, kernel inlet preservation module as shown in Figure 2.
Described symbol locating module is used for three class functions that the compilation process of interim kernel is mentioned are positioned (the kernel symbolic address of promptly obtaining respective function).This symbol locating module is to the localization process mode difference of this three class function.
For the function that is defined in the interim kernel, the inner directly mode of redirect is adopted in its symbol reorientation; Only need calculate relative offset address to this class function inserts and gets final product.
External function for kernel provides will position by the function chained list that kernel provided.The function chained list of search kernel takes out address wherein.The loading classes of its processing procedure and module seemingly.Jump address is not provided when being the compiling of interim kernel, and when interim kernel is loaded into kernel spacing, carries out the symbol reorientation by the symbol locating module.
For the intrinsic function of kernel use, because it not in the function chained list that kernel provided, therefore need obtain the pairing kernel symbolic address of this class function from kernel symbol table System.map.The basis of certainly, doing like this is the determinacy of the kernel symbolic address of Linux.This class function also is to carry out the symbol reorientation by the symbol locating module.
The kernel spacing distribution module: groundwork comprises statistics interim kernel shared kernel spacing capacity, and the memory allocation function of calling kernel is to distribute corresponding kernel spacing address, in order to deposit interim kernel.
Kernel load module: be used for interim kernel being assembled at user's space.At first the call sign locating module is resolved, and does not find out its address (searching according to the explanation in the symbol locating module) in kernel according to the CWinInetConnection that uses in the interim kernel.Make use fill out corresponding offset at all functions then.
Kernel copy module: the interim kernel that will revise after interim kernel assembling is finished copies the kernel spacing address that the kernel spacing distribution module is distributed to.Relate to the copy of user's space herein to kernel spacing.
Kernel modifications module: will revise linux kernel, and all put into a function jump list inlet, and jump to the replacement objective function in the interim kernel at the inlet for the treatment of replacement function of linux kernel.
The kernel function inlet is preserved module: because the present invention also provides the restore funcitons of kernel, therefore carry out also needing the call function inlet to preserve the code that module is preserved the inlet for the treatment of replacement function when kernel is replaced, so that uninstall process in the future recovers.
Adopt the kernel loading appliance to carry out control flow that kernel replaces as shown in Figure 3.
The dynamic replacement of kernel is about to original function in the kernel and replaces to respective function in the interim kernel.Because the present invention is primarily aimed at the kernel of function and replaces, consider that simultaneously the inconsistent mistake of register that may cause of function parameter is used, so the present invention only provides the kernel alternative patterns of the function with identical parameters.
For the convenience of describing, the original function that the need in the kernel are replaced is called objective function, and the function that goes to replace objective function in the interim kernel then is referred to as replacement function.Because the kernel virtual address of the objective function in the kernel can obtain by kernel symbol table and function chained list, therefore the kernel loading appliance need scan the interim kernel with the modular manner compiling, with definite objective function, and obtain the original address of objective function and the loading address of replacement function.Owing to use the mode of kernel module to load interim kernel, so the initial virtual address that kernel spacing has assigned the interim kernel in back fixes, and the side-play amount of replacement function fixes, so can obtain the kernel symbolic address of replacement function very easily.
After the address of objective function and replacement function is determined, just need make amendment, i.e. the assembling process of interim kernel to interim kernel.For the assembling process of interim kernel, relate generally to function and global variable.The processing procedure of global variable and function class are example with the function below seemingly.For function, whether can be divided into intrinsic function and external function in the inside of interim kernel according to function.The redirect relation of intrinsic function is identical with the processing mode of general module.For external function, its processing mode is as follows:
At first check the function chained list that current inner provides, search the kernel symbolic address of specified function.Symbol resolution in the core resource chained list is preferential.
When not having the kernel symbolic address of related function in the core resource chained list, being defaulted as this function is the function that kernel does not provide out, therefore can only obtain by searching the kernel symbol table.
If dual mode all obtains failure, illustrate that this function can not obtain in present kernel, the output warning message.The assembling process of kernel is failed and is directly withdrawed from.
After finishing the assembling process of interim kernel, call kernel copy module interim kernel is loaded into the kernel spacing address that the kernel spacing distribution module is distributed at user's space.
After the loading process of interim kernel is finished, just need make amendment, so that intercept and capture relevant kernel function call to kernel.In order to support the function call of diverse location, the mode that the present invention simulates PLT has proposed function jump list (FJT).The function jump list will be placed on the porch of objective function, therefore catch all function calls with minimum consumption.Another kind of mode is to revise all objective function places that jump to, but this undoubtedly consumption is very big.
The setting of function jump list is relevant with architecture, and different architectures has different function jump lists.But the cardinal rule of its jump list is to support the redirect of any address of existing architecture.Be example with the ARM architecture below.The difference of the instruction maximum of ARM architecture and i386 architecture is the determinacy of instruction length, and for 32 machines, the length of ARM instruction is 32 of fixed length.In order to jump to arbitrary address, the function jump list is made of two assembly instructions:
Assembly instruction Describe
LDR PC, [PC, #-4] This assembly instruction will be loaded into the PC register to the address of next bar instruction, thereby can jump to 32 bit address arbitrarily.
Replace the address of objective function The address of objective function symbol position fixing process is in front finished.
Owing to placed the instruction of function redirect in the porch of objective function, therefore can catch all calling to objective function.The another one benefit of doing like this is the function chained list that need not to change kernel.During the invocation target function, kernel jumps to the replacement function in the interim kernel automatically.
The debugging of interim kernel refers to after the replacement of kernel is finished, and initiates to order the whole process of kernel operation from user's space; The user can realize the printing of information as required in interim kernel.This process and common pass through the printk function to debug kernel similar is exported the relevant information of kernel by means of the printk function of kernel, such as the value of variable or function parameters etc.But different is its environment difference that relies on, and no longer needs whole kernel is recompilated link and download, does not also need to restart kernel, thereby has accelerated the progress of kernel debugging greatly.
The unloading (realization of rmkern instrument) and the unloading of kernel module of interim kernel are similar, and the present invention also provides the unloading of interim kernel, the work of adopting the kernel tool of unloading can recover original kernel according to order.Its system frame structure comprises that interim kernel locating module, kernel recover module, interim kernel dependence is confirmed module, interim kernel chain table handing module as shown in Figure 4.
Referring to Fig. 5, the control procedure of interim kernel unloading is:
(1) at first interim kernel locating module is according to the interim kernel title of need unloading, and the location needs the interim kernel of unloading and extracts its relevant kernel information.
(2) according to the interim kernel information that extracts, interim kernel dependence affirmation module will check whether this interim kernel can unload.If do not have other module or other interim kernel to use this interim kernel, this interim kernel could be unloaded by system.
(3) unloading the time need recover the objective function of having replaced inlets all in this interim kernel, and it recovers principle is that kernel recovers module the inlet content recovery that loads this objective function of being preserved in nuclear process in interim is become state before the kernel modifications.
(4) interim kernel chain table handing module will be deleted current interim kernel from the interim kernel chained list that has loaded.So far, the uninstall process of the unloading of interim kernel finishes.

Claims (8)

1. the inner core debug method of a (SuSE) Linux OS is characterized in that comprising the steps: at first, and the kernel portion that needs are revised and debugged is compiled into interim kernel in the mode of kernel module; Utilize the kernel loading appliance with the user's space of described interim kernel loads then to kernel, inlet at the function of the original kernel that is replaced is placed the function jump list, intercept and capture all function calls, when calling the function of original kernel, jump to the replacement function place of interim kernel automatically original kernel; Carry out the debugging of interim kernel; After debug process is finished, utilize the kernel tool of unloading that interim kernel is unloaded from the kernel of revising, recover the virgin state of kernel.
2. the inner core debug method of (SuSE) Linux OS as claimed in claim 1 is characterized in that: the function of the original kernel of replacing with interim kernel comprises the intrinsic function that external function that kernel provides and kernel use.
3. the inner core debug method of (SuSE) Linux OS as claimed in claim 1 is characterized in that: described kernel loading appliance comprises that symbol locating module, kernel copy module, kernel modifications module, kernel spacing distribution module, kernel load module, kernel inlet preserve module;
Described symbol locating module be used for to interim kernel compilation process compiled is defined in the function in the interim kernel, the external function that kernel provides, the intrinsic function that kernel uses and positions;
Described kernel spacing distribution module is used to add up the shared kernel spacing capacity of interim kernel, and the memory allocation function of calling kernel is to distribute corresponding kernel spacing address, in order to deposit interim kernel;
Described kernel load module is used at user's space interim kernel being assembled;
The interim kernel that described kernel copy module will be revised after interim kernel assembling is finished copies the kernel spacing address that the kernel spacing distribution module is distributed to;
Described kernel modifications module is revised linux kernel, puts into a function jump list inlet at the inlet for the treatment of replacement function of linux kernel, jumps to the replacement objective function in the interim kernel;
Described kernel function inlet is preserved the code that module is used to preserve the inlet for the treatment of replacement function.
4. the inner core debug method of (SuSE) Linux OS as claimed in claim 3, it is characterized in that: the method that described symbol locating module positions is:
For the function that is defined in the interim kernel, the inner directly mode of redirect is adopted in its symbol reorientation;
External function for kernel provides positions by the function chained list that kernel provided, and the function chained list of search kernel takes out address wherein;
Intrinsic function for kernel uses obtains the pairing kernel symbolic address of this function from the kernel symbol table.
5. the inner core debug method of (SuSE) Linux OS as claimed in claim 1 is characterized in that: described kernel loads instrument is according to the kernel symbolic address of kernel symbol table and the automatic mapping function of function chained list and carry out the replacement of kernel.
6. the inner core debug method of (SuSE) Linux OS as claimed in claim 5 is characterized in that: in the time can not obtaining the kernel symbolic address of related function by kernel symbol table and function chained list, and the automatic output alarm information of kernel loads instrument.
7. the inner core debug method of (SuSE) Linux OS as claimed in claim 1 is characterized in that: described kernel tool of unloading comprises that interim kernel locating module, kernel recover module, interim kernel dependence is confirmed module, interim kernel chain table handing module;
Interim kernel locating module is according to the interim kernel title of need unloading, and the location needs the interim kernel of unloading and extracts its relevant kernel information;
According to the interim kernel information that extracts, interim kernel dependence confirms module will check whether this interim kernel can unload, if do not have other module or other interim kernel to use this interim kernel, this interim kernel could be unloaded by system;
Need recover objective function of having replaced all in this interim kernel inlet during unloading, it recovers principle is that kernel recovers module the inlet content recovery that loads this objective function of being preserved in nuclear process in interim is become state before the kernel modifications;
Interim kernel chain table handing module will be deleted current interim kernel from the interim kernel chained list that has loaded.
8. the inner core debug method of (SuSE) Linux OS as claimed in claim 7, it is characterized in that: described kernel tool of unloading is supported in the system of a plurality of interim kernels and only unloads certain given core, if certain interim kernel can not unload, then to user's information that gives a warning.
CNA200710039207XA 2007-04-06 2007-04-06 Inner core debug method of Linux operating system Pending CN101281488A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200710039207XA CN101281488A (en) 2007-04-06 2007-04-06 Inner core debug method of Linux operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200710039207XA CN101281488A (en) 2007-04-06 2007-04-06 Inner core debug method of Linux operating system

Publications (1)

Publication Number Publication Date
CN101281488A true CN101281488A (en) 2008-10-08

Family

ID=40013973

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200710039207XA Pending CN101281488A (en) 2007-04-06 2007-04-06 Inner core debug method of Linux operating system

Country Status (1)

Country Link
CN (1) CN101281488A (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101840337A (en) * 2010-05-06 2010-09-22 浪潮电子信息产业股份有限公司 Method for customizing reducing system applied to packet capture application
CN101984408A (en) * 2010-11-03 2011-03-09 蓝汛网络科技(北京)有限公司 Method for loading linux program codes and device thereof
CN101446918B (en) * 2008-12-10 2011-12-28 中兴通讯股份有限公司 Method for realizing debugging of single function by user state debugger and system thereof
WO2012106871A1 (en) * 2011-07-06 2012-08-16 华为技术有限公司 Method for debugging operating system kernel and virtual debugging service module
CN102662844A (en) * 2012-04-12 2012-09-12 深圳市共进电子股份有限公司 Data tracking method at start time of linux inner core
CN102722438A (en) * 2012-06-01 2012-10-10 北京神州绿盟信息安全科技股份有限公司 Kernel debugging method and equipment
CN103024777A (en) * 2012-11-15 2013-04-03 无锡赛思汇智科技有限公司 Non-invasion wireless sensor network debugging device and non-invasion wireless sensor network debugging method
CN101782860B (en) * 2009-01-21 2013-10-09 华为技术有限公司 Method and device for linking program
WO2015078294A1 (en) * 2013-11-27 2015-06-04 Tencent Technology (Shenzhen) Company Limited Kernel module loading method and apparatus
CN104765634A (en) * 2015-05-06 2015-07-08 山东中孚信息产业股份有限公司 Method for increasing new functions of Linux system kernel
CN104915209A (en) * 2015-06-15 2015-09-16 上海斐讯数据通信技术有限公司 Method for trace debugging and problem repairing of Linux kernels
CN105204998A (en) * 2015-09-30 2015-12-30 上海斐讯数据通信技术有限公司 Debugging method and device for mobile terminal kernel symbol table
CN105868639A (en) * 2016-03-30 2016-08-17 百度在线网络技术(北京)有限公司 Kernel vulnerability repair method and device
CN106502755A (en) * 2016-11-28 2017-03-15 杭州迪普科技股份有限公司 A kind of method and device for checking Linux kernel module unknown symbols
CN107451474A (en) * 2016-05-31 2017-12-08 百度在线网络技术(北京)有限公司 Software vulnerability restorative procedure and device for terminal
CN107818034A (en) * 2016-09-14 2018-03-20 华为技术有限公司 The method and device of the running space of process in monitoring calculation machine equipment
CN108052327A (en) * 2017-12-11 2018-05-18 北京奇虎科技有限公司 A kind of kernel module compiling, loading method and device
US10019240B2 (en) 2012-11-30 2018-07-10 Huawei Technologies Co., Ltd. Method and apparatus for detecting code change
CN109828759A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Code compiling method, device, computer installation and storage medium
CN112631897A (en) * 2020-12-07 2021-04-09 麒麟软件有限公司 Method for quickly debugging linux kernel
CN116361195A (en) * 2023-05-24 2023-06-30 麒麟软件有限公司 Method for debugging Linux kernel
CN116795726A (en) * 2023-08-25 2023-09-22 麒麟软件有限公司 Method for online debugging Linux kernel
CN117234953A (en) * 2023-11-14 2023-12-15 北京麟卓信息科技有限公司 Kernel debugging method based on shadow code cache

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101446918B (en) * 2008-12-10 2011-12-28 中兴通讯股份有限公司 Method for realizing debugging of single function by user state debugger and system thereof
CN101782860B (en) * 2009-01-21 2013-10-09 华为技术有限公司 Method and device for linking program
CN101840337A (en) * 2010-05-06 2010-09-22 浪潮电子信息产业股份有限公司 Method for customizing reducing system applied to packet capture application
CN101840337B (en) * 2010-05-06 2013-01-23 浪潮电子信息产业股份有限公司 Method for customizing reducing system applied to packet capture application
CN101984408A (en) * 2010-11-03 2011-03-09 蓝汛网络科技(北京)有限公司 Method for loading linux program codes and device thereof
CN101984408B (en) * 2010-11-03 2013-11-27 蓝汛网络科技(北京)有限公司 Method for loading linux program codes and device thereof
WO2012106871A1 (en) * 2011-07-06 2012-08-16 华为技术有限公司 Method for debugging operating system kernel and virtual debugging service module
CN102662844A (en) * 2012-04-12 2012-09-12 深圳市共进电子股份有限公司 Data tracking method at start time of linux inner core
CN102662844B (en) * 2012-04-12 2015-11-18 深圳市共进电子股份有限公司 A kind of method of data tracking when linux kernel starts
CN102722438B (en) * 2012-06-01 2014-11-12 北京神州绿盟信息安全科技股份有限公司 Kernel debugging method and equipment
CN102722438A (en) * 2012-06-01 2012-10-10 北京神州绿盟信息安全科技股份有限公司 Kernel debugging method and equipment
CN103024777B (en) * 2012-11-15 2016-07-06 无锡赛思汇智科技有限公司 The wireless sensor network debugging apparatus of a kind of non-invasive and adjustment method
CN103024777A (en) * 2012-11-15 2013-04-03 无锡赛思汇智科技有限公司 Non-invasion wireless sensor network debugging device and non-invasion wireless sensor network debugging method
US10019240B2 (en) 2012-11-30 2018-07-10 Huawei Technologies Co., Ltd. Method and apparatus for detecting code change
WO2015078294A1 (en) * 2013-11-27 2015-06-04 Tencent Technology (Shenzhen) Company Limited Kernel module loading method and apparatus
CN104765634B (en) * 2015-05-06 2017-12-08 中孚信息股份有限公司 A kind of linux system kernel New function increases method
CN104765634A (en) * 2015-05-06 2015-07-08 山东中孚信息产业股份有限公司 Method for increasing new functions of Linux system kernel
CN104915209A (en) * 2015-06-15 2015-09-16 上海斐讯数据通信技术有限公司 Method for trace debugging and problem repairing of Linux kernels
CN105204998A (en) * 2015-09-30 2015-12-30 上海斐讯数据通信技术有限公司 Debugging method and device for mobile terminal kernel symbol table
CN105868639A (en) * 2016-03-30 2016-08-17 百度在线网络技术(北京)有限公司 Kernel vulnerability repair method and device
CN107451474B (en) * 2016-05-31 2020-06-26 百度在线网络技术(北京)有限公司 Software bug fixing method and device for terminal
CN107451474A (en) * 2016-05-31 2017-12-08 百度在线网络技术(北京)有限公司 Software vulnerability restorative procedure and device for terminal
CN107818034A (en) * 2016-09-14 2018-03-20 华为技术有限公司 The method and device of the running space of process in monitoring calculation machine equipment
CN107818034B (en) * 2016-09-14 2021-02-12 华为技术有限公司 Method and device for monitoring running space of process in computer equipment
CN106502755A (en) * 2016-11-28 2017-03-15 杭州迪普科技股份有限公司 A kind of method and device for checking Linux kernel module unknown symbols
CN108052327A (en) * 2017-12-11 2018-05-18 北京奇虎科技有限公司 A kind of kernel module compiling, loading method and device
CN109828759A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Code compiling method, device, computer installation and storage medium
CN109828759B (en) * 2018-12-15 2023-07-18 中国平安人寿保险股份有限公司 Code compiling method, device, computer device and storage medium
CN112631897A (en) * 2020-12-07 2021-04-09 麒麟软件有限公司 Method for quickly debugging linux kernel
CN112631897B (en) * 2020-12-07 2023-08-08 麒麟软件有限公司 Method for rapidly debugging linux kernel
CN116361195A (en) * 2023-05-24 2023-06-30 麒麟软件有限公司 Method for debugging Linux kernel
CN116361195B (en) * 2023-05-24 2023-08-22 麒麟软件有限公司 Method for debugging Linux kernel
CN116795726A (en) * 2023-08-25 2023-09-22 麒麟软件有限公司 Method for online debugging Linux kernel
CN116795726B (en) * 2023-08-25 2023-11-28 麒麟软件有限公司 Method for online debugging Linux kernel
CN117234953A (en) * 2023-11-14 2023-12-15 北京麟卓信息科技有限公司 Kernel debugging method based on shadow code cache
CN117234953B (en) * 2023-11-14 2024-01-26 北京麟卓信息科技有限公司 Kernel debugging method based on shadow code cache

Similar Documents

Publication Publication Date Title
CN101281488A (en) Inner core debug method of Linux operating system
US8762971B2 (en) Servicing a production program in an integrated development environment
US8589889B2 (en) Apparatus and method of detecting errors in embedded software
US7380242B2 (en) Compiler and software product for compiling intermediate language bytecodes into Java bytecodes
CN102402427B (en) A kind of update method of java application and device
US6948164B2 (en) Method and system for modifying executable code to add additional functionality
US7992141B2 (en) Method and apparatus for building executable computer programs using compiled program libraries
CN101876940B (en) Automatic test method and device
US20030154464A1 (en) Stack unique signatures for program procedures and methods
US20020035722A1 (en) Interactive instruction scheduling and block ordering
CN1704763A (en) Electronic device diagnostic methods and systems
JP2006092544A (en) Dynamic link of module in pre-operating system environment
WO2015117434A1 (en) Method and device for manufacturing patch, and method and device for activating patch
US20110126179A1 (en) Method and System for Dynamic Patching Software Using Source Code
US7523446B2 (en) User-space return probes
CN101482845A (en) Method and system for calling instant debugger
CN108762825A (en) The realization method and system of dynamic base heavy duty
CN112130926B (en) Application program running method, device, terminal equipment and storage medium
CN115617687B (en) Program instrumentation method, device, equipment and storage medium
US20080127118A1 (en) Method and system for dynamic patching of software
Gruzenkin et al. N-version software module requirements to grant the software execution fault-tolerance
US20050039196A1 (en) Method and system for using a library
US7213123B2 (en) Method and apparatus for mapping debugging information when debugging integrated executables in a heterogeneous architecture
US20140196019A1 (en) Method and Apparatus for Substituting Compiler Built-in Helper Functions with Machine Instructions
US7472380B1 (en) Processing system with component architecture platform support

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20081008