CN101281488A - Inner core debug method of Linux operating system - Google Patents
Inner core debug method of Linux operating system Download PDFInfo
- Publication number
- CN101281488A CN101281488A CNA200710039207XA CN200710039207A CN101281488A CN 101281488 A CN101281488 A CN 101281488A CN A200710039207X A CNA200710039207X A CN A200710039207XA CN 200710039207 A CN200710039207 A CN 200710039207A CN 101281488 A CN101281488 A CN 101281488A
- Authority
- CN
- China
- Prior art keywords
- kernel
- interim
- function
- module
- linux
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses a debugging method for kernel of a Linux operating system, which comprises the following steps: a kernel part needed to be modified or debugged is compiled to a temporary kernel by means of kernel module; the temporary kernel is loaded to the user space of the kernel by using a kernel loading tool, a function jump table is disposed on the entrance of replaced original kernel functions, the calls of original kernel functions are intercepted, when an original kernel functions is called, a replacing function of the temporary kernel is automatically jumped to; the temporary kernel is debugged; when the debug is finished, the temporary kernel is unloaded from the modified kernel by a kernel unloading tool, and the original state of the kernel is restored. The kernel compiling process is only limited to specific related functions, the kernel needs not to be started again, recompiling and relink, loading time and kernel start time in kernel debugging process are avoided; the developing and debugging time of an operating system is shorted, the developing and debugging efficiency is improved.
Description
Technical field
The present invention relates to a kind of adjustment method of computer software, particularly relate to a kind of inner core debug method that is applicable to the (SuSE) Linux OS under the various hardware platforms.
Background technology
On (SuSE) Linux OS, do not have good kernel debug mechanism at present.Because the frequent cisco unity malfunction of the special-purpose debugging acid kgdb of kernel, so the method for the most frequently used debugging kernel is to adopt the mode of adding printk (printf in the kernel) in the kernel source code, by to the obtaining and analyzing of type information, to check the operation conditions of (SuSE) Linux OS kernel.But wish the kernel information difference of each output during debugging, if adopt the mode that kernel adds new print statement of revising, all must experience very time-consuming procedure such as recompility, link and download linux kernel at every turn, influence the speed of the debugging and the exploitation of linux kernel.
Summary of the invention
The technical problem to be solved in the present invention provides a kind of inner core debug method of (SuSE) Linux OS, can avoid in the kernel debug process recompility, link, download the process of linux kernel again, improve the debugging and the development efficiency of (SuSE) Linux OS.
For solving the problems of the technologies described above, the inner core debug method of (SuSE) Linux OS of the present invention is to adopt following technical scheme to realize, at first, the kernel portion that needs are revised and debugged is compiled into interim kernel in the mode of kernel module; Utilize kernel loading appliance (inskern) with the user's space of described interim kernel loads then to kernel, inlet at the function of the original kernel that is replaced is placed the function jump list, intercept and capture all function calls, when calling the function of original kernel, jump to the replacement function place of interim kernel automatically original kernel; Carry out the debugging of interim kernel; After debug process is finished, utilize kernel tool of unloading (rmkern) that interim kernel is unloaded from the kernel of revising, recover the virgin state of kernel.
The present invention adopts kernel dynamic replacement and recovery technology that the kernel of (SuSE) Linux OS is debugged.Because kernel compilation process of the present invention only limits to the related function of appointment, and need not to restart kernel, therefore can avoid recompility, link again, download time and kernel start-up time in the kernel debug process.Like this, can greatly shorten the exploitation and the debug time of (SuSE) Linux OS, improve the exploitation and the debugging efficiency of (SuSE) Linux OS.
Description of drawings
The present invention is further detailed explanation below in conjunction with accompanying drawing and embodiment.
Fig. 1 is an adjustment method control flow chart of the present invention;
Fig. 2 is the kernel loading appliance frame construction drawing among the present invention;
Fig. 3 is that the kernel among the present invention is replaced process flow diagram;
Fig. 4 is the kernel tool of unloading frame construction drawing among the present invention;
Fig. 5 is the interim kernel unloading process flow diagram among the present invention.
Embodiment
The inner core debug method of (SuSE) Linux OS of the present invention depends on two prerequisites, the determinacy of the module machine of Linux and linux kernel symbolic address.
(SuSE) Linux OS provides a kind of brand-new mechanism, is called installable module (loadab-le module).Utilize this mechanism, can be as required under the condition that needn't recompilate, link to kernel, but installed module is dynamically inserted operating kernel, become an organic component of kernel; Perhaps remove the module of having installed from kernel.This just mechanism makes the memory mapping of kernel keep minimum, but has very big dirigibility and expandability.
The determinacy of linux kernel symbolic address, promptly in linux kernel, load address of nuclear symbol is just determined after compiling in it.About the load address of linux kernel symbol, obtain in the kernel symbol table that can from the linux kernel compilation process, be produced, such as from the System.map file, obtaining.The determinacy of this kernel symbolic address provides possibility for carrying out dynamic kernel replacement.Because replacement target of the present invention had both comprised the external function that kernel provides, also comprise the employed intrinsic function of kernel simultaneously.
The external function that described kernel provides is promptly provided the function that uses for other module of (export) by kernel.For the kernel symbolic address of this class function, the function chained list that provides by kernel obtains among the present invention.
The intrinsic function that described kernel uses, in described function chained list, common kernel module can't directly not use.For the kernel symbolic address of this class function, obtain among the present invention by the kernel symbol table.
As shown in Figure 1, the inner core debug method of (SuSE) Linux OS of the present invention comprises following four processes: the unloading of the loading of the compiling of interim kernel, interim kernel, the debugging of interim kernel, interim kernel.
The compiling of described interim kernel is meant and needs is revised and the kernel portion of debugging is compiled into interim kernel in the mode of kernel module.At the function that is defined in the interim kernel, the external function that the kernel of interim kernel calls provides, the intrinsic function that the kernel of interim kernel calls uses adopts different Compilation Methods respectively.
For the function that is defined in the interim kernel, adopt the compiling rule of general module.
The external function that provides for the kernel that calls, the related function explanation that must comprise kernel when compiling could compile to be passed through.The compiling compiling rule regular and general module that is these functions is consistent.
For the intrinsic function of the kernel use of calling, owing to only be used for kernel inside, the therefore not statement of this function (promptly in header file, generally can not find the statement of described intrinsic function) in the external function tabulation that kernel provides out.According to the compiling rule, in fact this class function will be failed when compiling.For fear of this class compile error, in interim kernel, comprise the statement of this class function.Promptly need earlier this function declaration to be compiled into the external function of target, when compiling, needn't handle at above-mentioned function with the notice compiler.And unification is handled this class function when kernel loads.
The loading of described interim kernel adopts kernel loading appliance (inskern) to replace original kernel automatically.The realization of kernel loading appliance is a core of the present invention, and its system frame structure comprises symbol locating module, kernel copy module, kernel modifications module, kernel spacing distribution module, kernel load module, kernel inlet preservation module as shown in Figure 2.
Described symbol locating module is used for three class functions that the compilation process of interim kernel is mentioned are positioned (the kernel symbolic address of promptly obtaining respective function).This symbol locating module is to the localization process mode difference of this three class function.
For the function that is defined in the interim kernel, the inner directly mode of redirect is adopted in its symbol reorientation; Only need calculate relative offset address to this class function inserts and gets final product.
External function for kernel provides will position by the function chained list that kernel provided.The function chained list of search kernel takes out address wherein.The loading classes of its processing procedure and module seemingly.Jump address is not provided when being the compiling of interim kernel, and when interim kernel is loaded into kernel spacing, carries out the symbol reorientation by the symbol locating module.
For the intrinsic function of kernel use, because it not in the function chained list that kernel provided, therefore need obtain the pairing kernel symbolic address of this class function from kernel symbol table System.map.The basis of certainly, doing like this is the determinacy of the kernel symbolic address of Linux.This class function also is to carry out the symbol reorientation by the symbol locating module.
The kernel spacing distribution module: groundwork comprises statistics interim kernel shared kernel spacing capacity, and the memory allocation function of calling kernel is to distribute corresponding kernel spacing address, in order to deposit interim kernel.
Kernel load module: be used for interim kernel being assembled at user's space.At first the call sign locating module is resolved, and does not find out its address (searching according to the explanation in the symbol locating module) in kernel according to the CWinInetConnection that uses in the interim kernel.Make use fill out corresponding offset at all functions then.
Kernel copy module: the interim kernel that will revise after interim kernel assembling is finished copies the kernel spacing address that the kernel spacing distribution module is distributed to.Relate to the copy of user's space herein to kernel spacing.
Kernel modifications module: will revise linux kernel, and all put into a function jump list inlet, and jump to the replacement objective function in the interim kernel at the inlet for the treatment of replacement function of linux kernel.
The kernel function inlet is preserved module: because the present invention also provides the restore funcitons of kernel, therefore carry out also needing the call function inlet to preserve the code that module is preserved the inlet for the treatment of replacement function when kernel is replaced, so that uninstall process in the future recovers.
Adopt the kernel loading appliance to carry out control flow that kernel replaces as shown in Figure 3.
The dynamic replacement of kernel is about to original function in the kernel and replaces to respective function in the interim kernel.Because the present invention is primarily aimed at the kernel of function and replaces, consider that simultaneously the inconsistent mistake of register that may cause of function parameter is used, so the present invention only provides the kernel alternative patterns of the function with identical parameters.
For the convenience of describing, the original function that the need in the kernel are replaced is called objective function, and the function that goes to replace objective function in the interim kernel then is referred to as replacement function.Because the kernel virtual address of the objective function in the kernel can obtain by kernel symbol table and function chained list, therefore the kernel loading appliance need scan the interim kernel with the modular manner compiling, with definite objective function, and obtain the original address of objective function and the loading address of replacement function.Owing to use the mode of kernel module to load interim kernel, so the initial virtual address that kernel spacing has assigned the interim kernel in back fixes, and the side-play amount of replacement function fixes, so can obtain the kernel symbolic address of replacement function very easily.
After the address of objective function and replacement function is determined, just need make amendment, i.e. the assembling process of interim kernel to interim kernel.For the assembling process of interim kernel, relate generally to function and global variable.The processing procedure of global variable and function class are example with the function below seemingly.For function, whether can be divided into intrinsic function and external function in the inside of interim kernel according to function.The redirect relation of intrinsic function is identical with the processing mode of general module.For external function, its processing mode is as follows:
At first check the function chained list that current inner provides, search the kernel symbolic address of specified function.Symbol resolution in the core resource chained list is preferential.
When not having the kernel symbolic address of related function in the core resource chained list, being defaulted as this function is the function that kernel does not provide out, therefore can only obtain by searching the kernel symbol table.
If dual mode all obtains failure, illustrate that this function can not obtain in present kernel, the output warning message.The assembling process of kernel is failed and is directly withdrawed from.
After finishing the assembling process of interim kernel, call kernel copy module interim kernel is loaded into the kernel spacing address that the kernel spacing distribution module is distributed at user's space.
After the loading process of interim kernel is finished, just need make amendment, so that intercept and capture relevant kernel function call to kernel.In order to support the function call of diverse location, the mode that the present invention simulates PLT has proposed function jump list (FJT).The function jump list will be placed on the porch of objective function, therefore catch all function calls with minimum consumption.Another kind of mode is to revise all objective function places that jump to, but this undoubtedly consumption is very big.
The setting of function jump list is relevant with architecture, and different architectures has different function jump lists.But the cardinal rule of its jump list is to support the redirect of any address of existing architecture.Be example with the ARM architecture below.The difference of the instruction maximum of ARM architecture and i386 architecture is the determinacy of instruction length, and for 32 machines, the length of ARM instruction is 32 of fixed length.In order to jump to arbitrary address, the function jump list is made of two assembly instructions:
Assembly instruction | Describe |
LDR PC, [PC, #-4] | This assembly instruction will be loaded into the PC register to the address of next bar instruction, thereby can jump to 32 bit address arbitrarily. |
Replace the address of objective function | The address of objective function symbol position fixing process is in front finished. |
Owing to placed the instruction of function redirect in the porch of objective function, therefore can catch all calling to objective function.The another one benefit of doing like this is the function chained list that need not to change kernel.During the invocation target function, kernel jumps to the replacement function in the interim kernel automatically.
The debugging of interim kernel refers to after the replacement of kernel is finished, and initiates to order the whole process of kernel operation from user's space; The user can realize the printing of information as required in interim kernel.This process and common pass through the printk function to debug kernel similar is exported the relevant information of kernel by means of the printk function of kernel, such as the value of variable or function parameters etc.But different is its environment difference that relies on, and no longer needs whole kernel is recompilated link and download, does not also need to restart kernel, thereby has accelerated the progress of kernel debugging greatly.
The unloading (realization of rmkern instrument) and the unloading of kernel module of interim kernel are similar, and the present invention also provides the unloading of interim kernel, the work of adopting the kernel tool of unloading can recover original kernel according to order.Its system frame structure comprises that interim kernel locating module, kernel recover module, interim kernel dependence is confirmed module, interim kernel chain table handing module as shown in Figure 4.
Referring to Fig. 5, the control procedure of interim kernel unloading is:
(1) at first interim kernel locating module is according to the interim kernel title of need unloading, and the location needs the interim kernel of unloading and extracts its relevant kernel information.
(2) according to the interim kernel information that extracts, interim kernel dependence affirmation module will check whether this interim kernel can unload.If do not have other module or other interim kernel to use this interim kernel, this interim kernel could be unloaded by system.
(3) unloading the time need recover the objective function of having replaced inlets all in this interim kernel, and it recovers principle is that kernel recovers module the inlet content recovery that loads this objective function of being preserved in nuclear process in interim is become state before the kernel modifications.
(4) interim kernel chain table handing module will be deleted current interim kernel from the interim kernel chained list that has loaded.So far, the uninstall process of the unloading of interim kernel finishes.
Claims (8)
1. the inner core debug method of a (SuSE) Linux OS is characterized in that comprising the steps: at first, and the kernel portion that needs are revised and debugged is compiled into interim kernel in the mode of kernel module; Utilize the kernel loading appliance with the user's space of described interim kernel loads then to kernel, inlet at the function of the original kernel that is replaced is placed the function jump list, intercept and capture all function calls, when calling the function of original kernel, jump to the replacement function place of interim kernel automatically original kernel; Carry out the debugging of interim kernel; After debug process is finished, utilize the kernel tool of unloading that interim kernel is unloaded from the kernel of revising, recover the virgin state of kernel.
2. the inner core debug method of (SuSE) Linux OS as claimed in claim 1 is characterized in that: the function of the original kernel of replacing with interim kernel comprises the intrinsic function that external function that kernel provides and kernel use.
3. the inner core debug method of (SuSE) Linux OS as claimed in claim 1 is characterized in that: described kernel loading appliance comprises that symbol locating module, kernel copy module, kernel modifications module, kernel spacing distribution module, kernel load module, kernel inlet preserve module;
Described symbol locating module be used for to interim kernel compilation process compiled is defined in the function in the interim kernel, the external function that kernel provides, the intrinsic function that kernel uses and positions;
Described kernel spacing distribution module is used to add up the shared kernel spacing capacity of interim kernel, and the memory allocation function of calling kernel is to distribute corresponding kernel spacing address, in order to deposit interim kernel;
Described kernel load module is used at user's space interim kernel being assembled;
The interim kernel that described kernel copy module will be revised after interim kernel assembling is finished copies the kernel spacing address that the kernel spacing distribution module is distributed to;
Described kernel modifications module is revised linux kernel, puts into a function jump list inlet at the inlet for the treatment of replacement function of linux kernel, jumps to the replacement objective function in the interim kernel;
Described kernel function inlet is preserved the code that module is used to preserve the inlet for the treatment of replacement function.
4. the inner core debug method of (SuSE) Linux OS as claimed in claim 3, it is characterized in that: the method that described symbol locating module positions is:
For the function that is defined in the interim kernel, the inner directly mode of redirect is adopted in its symbol reorientation;
External function for kernel provides positions by the function chained list that kernel provided, and the function chained list of search kernel takes out address wherein;
Intrinsic function for kernel uses obtains the pairing kernel symbolic address of this function from the kernel symbol table.
5. the inner core debug method of (SuSE) Linux OS as claimed in claim 1 is characterized in that: described kernel loads instrument is according to the kernel symbolic address of kernel symbol table and the automatic mapping function of function chained list and carry out the replacement of kernel.
6. the inner core debug method of (SuSE) Linux OS as claimed in claim 5 is characterized in that: in the time can not obtaining the kernel symbolic address of related function by kernel symbol table and function chained list, and the automatic output alarm information of kernel loads instrument.
7. the inner core debug method of (SuSE) Linux OS as claimed in claim 1 is characterized in that: described kernel tool of unloading comprises that interim kernel locating module, kernel recover module, interim kernel dependence is confirmed module, interim kernel chain table handing module;
Interim kernel locating module is according to the interim kernel title of need unloading, and the location needs the interim kernel of unloading and extracts its relevant kernel information;
According to the interim kernel information that extracts, interim kernel dependence confirms module will check whether this interim kernel can unload, if do not have other module or other interim kernel to use this interim kernel, this interim kernel could be unloaded by system;
Need recover objective function of having replaced all in this interim kernel inlet during unloading, it recovers principle is that kernel recovers module the inlet content recovery that loads this objective function of being preserved in nuclear process in interim is become state before the kernel modifications;
Interim kernel chain table handing module will be deleted current interim kernel from the interim kernel chained list that has loaded.
8. the inner core debug method of (SuSE) Linux OS as claimed in claim 7, it is characterized in that: described kernel tool of unloading is supported in the system of a plurality of interim kernels and only unloads certain given core, if certain interim kernel can not unload, then to user's information that gives a warning.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA200710039207XA CN101281488A (en) | 2007-04-06 | 2007-04-06 | Inner core debug method of Linux operating system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA200710039207XA CN101281488A (en) | 2007-04-06 | 2007-04-06 | Inner core debug method of Linux operating system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101281488A true CN101281488A (en) | 2008-10-08 |
Family
ID=40013973
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA200710039207XA Pending CN101281488A (en) | 2007-04-06 | 2007-04-06 | Inner core debug method of Linux operating system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101281488A (en) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101840337A (en) * | 2010-05-06 | 2010-09-22 | 浪潮电子信息产业股份有限公司 | Method for customizing reducing system applied to packet capture application |
CN101984408A (en) * | 2010-11-03 | 2011-03-09 | 蓝汛网络科技(北京)有限公司 | Method for loading linux program codes and device thereof |
CN101446918B (en) * | 2008-12-10 | 2011-12-28 | 中兴通讯股份有限公司 | Method for realizing debugging of single function by user state debugger and system thereof |
WO2012106871A1 (en) * | 2011-07-06 | 2012-08-16 | 华为技术有限公司 | Method for debugging operating system kernel and virtual debugging service module |
CN102662844A (en) * | 2012-04-12 | 2012-09-12 | 深圳市共进电子股份有限公司 | Data tracking method at start time of linux inner core |
CN102722438A (en) * | 2012-06-01 | 2012-10-10 | 北京神州绿盟信息安全科技股份有限公司 | Kernel debugging method and equipment |
CN103024777A (en) * | 2012-11-15 | 2013-04-03 | 无锡赛思汇智科技有限公司 | Non-invasion wireless sensor network debugging device and non-invasion wireless sensor network debugging method |
CN101782860B (en) * | 2009-01-21 | 2013-10-09 | 华为技术有限公司 | Method and device for linking program |
WO2015078294A1 (en) * | 2013-11-27 | 2015-06-04 | Tencent Technology (Shenzhen) Company Limited | Kernel module loading method and apparatus |
CN104765634A (en) * | 2015-05-06 | 2015-07-08 | 山东中孚信息产业股份有限公司 | Method for increasing new functions of Linux system kernel |
CN104915209A (en) * | 2015-06-15 | 2015-09-16 | 上海斐讯数据通信技术有限公司 | Method for trace debugging and problem repairing of Linux kernels |
CN105204998A (en) * | 2015-09-30 | 2015-12-30 | 上海斐讯数据通信技术有限公司 | Debugging method and device for mobile terminal kernel symbol table |
CN105868639A (en) * | 2016-03-30 | 2016-08-17 | 百度在线网络技术(北京)有限公司 | Kernel vulnerability repair method and device |
CN106502755A (en) * | 2016-11-28 | 2017-03-15 | 杭州迪普科技股份有限公司 | A kind of method and device for checking Linux kernel module unknown symbols |
CN107451474A (en) * | 2016-05-31 | 2017-12-08 | 百度在线网络技术(北京)有限公司 | Software vulnerability restorative procedure and device for terminal |
CN107818034A (en) * | 2016-09-14 | 2018-03-20 | 华为技术有限公司 | The method and device of the running space of process in monitoring calculation machine equipment |
CN108052327A (en) * | 2017-12-11 | 2018-05-18 | 北京奇虎科技有限公司 | A kind of kernel module compiling, loading method and device |
US10019240B2 (en) | 2012-11-30 | 2018-07-10 | Huawei Technologies Co., Ltd. | Method and apparatus for detecting code change |
CN109828759A (en) * | 2018-12-15 | 2019-05-31 | 中国平安人寿保险股份有限公司 | Code compiling method, device, computer installation and storage medium |
CN112631897A (en) * | 2020-12-07 | 2021-04-09 | 麒麟软件有限公司 | Method for quickly debugging linux kernel |
CN116361195A (en) * | 2023-05-24 | 2023-06-30 | 麒麟软件有限公司 | Method for debugging Linux kernel |
CN116795726A (en) * | 2023-08-25 | 2023-09-22 | 麒麟软件有限公司 | Method for online debugging Linux kernel |
CN117234953A (en) * | 2023-11-14 | 2023-12-15 | 北京麟卓信息科技有限公司 | Kernel debugging method based on shadow code cache |
-
2007
- 2007-04-06 CN CNA200710039207XA patent/CN101281488A/en active Pending
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101446918B (en) * | 2008-12-10 | 2011-12-28 | 中兴通讯股份有限公司 | Method for realizing debugging of single function by user state debugger and system thereof |
CN101782860B (en) * | 2009-01-21 | 2013-10-09 | 华为技术有限公司 | Method and device for linking program |
CN101840337A (en) * | 2010-05-06 | 2010-09-22 | 浪潮电子信息产业股份有限公司 | Method for customizing reducing system applied to packet capture application |
CN101840337B (en) * | 2010-05-06 | 2013-01-23 | 浪潮电子信息产业股份有限公司 | Method for customizing reducing system applied to packet capture application |
CN101984408A (en) * | 2010-11-03 | 2011-03-09 | 蓝汛网络科技(北京)有限公司 | Method for loading linux program codes and device thereof |
CN101984408B (en) * | 2010-11-03 | 2013-11-27 | 蓝汛网络科技(北京)有限公司 | Method for loading linux program codes and device thereof |
WO2012106871A1 (en) * | 2011-07-06 | 2012-08-16 | 华为技术有限公司 | Method for debugging operating system kernel and virtual debugging service module |
CN102662844A (en) * | 2012-04-12 | 2012-09-12 | 深圳市共进电子股份有限公司 | Data tracking method at start time of linux inner core |
CN102662844B (en) * | 2012-04-12 | 2015-11-18 | 深圳市共进电子股份有限公司 | A kind of method of data tracking when linux kernel starts |
CN102722438B (en) * | 2012-06-01 | 2014-11-12 | 北京神州绿盟信息安全科技股份有限公司 | Kernel debugging method and equipment |
CN102722438A (en) * | 2012-06-01 | 2012-10-10 | 北京神州绿盟信息安全科技股份有限公司 | Kernel debugging method and equipment |
CN103024777B (en) * | 2012-11-15 | 2016-07-06 | 无锡赛思汇智科技有限公司 | The wireless sensor network debugging apparatus of a kind of non-invasive and adjustment method |
CN103024777A (en) * | 2012-11-15 | 2013-04-03 | 无锡赛思汇智科技有限公司 | Non-invasion wireless sensor network debugging device and non-invasion wireless sensor network debugging method |
US10019240B2 (en) | 2012-11-30 | 2018-07-10 | Huawei Technologies Co., Ltd. | Method and apparatus for detecting code change |
WO2015078294A1 (en) * | 2013-11-27 | 2015-06-04 | Tencent Technology (Shenzhen) Company Limited | Kernel module loading method and apparatus |
CN104765634B (en) * | 2015-05-06 | 2017-12-08 | 中孚信息股份有限公司 | A kind of linux system kernel New function increases method |
CN104765634A (en) * | 2015-05-06 | 2015-07-08 | 山东中孚信息产业股份有限公司 | Method for increasing new functions of Linux system kernel |
CN104915209A (en) * | 2015-06-15 | 2015-09-16 | 上海斐讯数据通信技术有限公司 | Method for trace debugging and problem repairing of Linux kernels |
CN105204998A (en) * | 2015-09-30 | 2015-12-30 | 上海斐讯数据通信技术有限公司 | Debugging method and device for mobile terminal kernel symbol table |
CN105868639A (en) * | 2016-03-30 | 2016-08-17 | 百度在线网络技术(北京)有限公司 | Kernel vulnerability repair method and device |
CN107451474B (en) * | 2016-05-31 | 2020-06-26 | 百度在线网络技术(北京)有限公司 | Software bug fixing method and device for terminal |
CN107451474A (en) * | 2016-05-31 | 2017-12-08 | 百度在线网络技术(北京)有限公司 | Software vulnerability restorative procedure and device for terminal |
CN107818034A (en) * | 2016-09-14 | 2018-03-20 | 华为技术有限公司 | The method and device of the running space of process in monitoring calculation machine equipment |
CN107818034B (en) * | 2016-09-14 | 2021-02-12 | 华为技术有限公司 | Method and device for monitoring running space of process in computer equipment |
CN106502755A (en) * | 2016-11-28 | 2017-03-15 | 杭州迪普科技股份有限公司 | A kind of method and device for checking Linux kernel module unknown symbols |
CN108052327A (en) * | 2017-12-11 | 2018-05-18 | 北京奇虎科技有限公司 | A kind of kernel module compiling, loading method and device |
CN109828759A (en) * | 2018-12-15 | 2019-05-31 | 中国平安人寿保险股份有限公司 | Code compiling method, device, computer installation and storage medium |
CN109828759B (en) * | 2018-12-15 | 2023-07-18 | 中国平安人寿保险股份有限公司 | Code compiling method, device, computer device and storage medium |
CN112631897A (en) * | 2020-12-07 | 2021-04-09 | 麒麟软件有限公司 | Method for quickly debugging linux kernel |
CN112631897B (en) * | 2020-12-07 | 2023-08-08 | 麒麟软件有限公司 | Method for rapidly debugging linux kernel |
CN116361195A (en) * | 2023-05-24 | 2023-06-30 | 麒麟软件有限公司 | Method for debugging Linux kernel |
CN116361195B (en) * | 2023-05-24 | 2023-08-22 | 麒麟软件有限公司 | Method for debugging Linux kernel |
CN116795726A (en) * | 2023-08-25 | 2023-09-22 | 麒麟软件有限公司 | Method for online debugging Linux kernel |
CN116795726B (en) * | 2023-08-25 | 2023-11-28 | 麒麟软件有限公司 | Method for online debugging Linux kernel |
CN117234953A (en) * | 2023-11-14 | 2023-12-15 | 北京麟卓信息科技有限公司 | Kernel debugging method based on shadow code cache |
CN117234953B (en) * | 2023-11-14 | 2024-01-26 | 北京麟卓信息科技有限公司 | Kernel debugging method based on shadow code cache |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101281488A (en) | Inner core debug method of Linux operating system | |
US8762971B2 (en) | Servicing a production program in an integrated development environment | |
US8589889B2 (en) | Apparatus and method of detecting errors in embedded software | |
US7380242B2 (en) | Compiler and software product for compiling intermediate language bytecodes into Java bytecodes | |
CN102402427B (en) | A kind of update method of java application and device | |
US6948164B2 (en) | Method and system for modifying executable code to add additional functionality | |
US7992141B2 (en) | Method and apparatus for building executable computer programs using compiled program libraries | |
CN101876940B (en) | Automatic test method and device | |
US20030154464A1 (en) | Stack unique signatures for program procedures and methods | |
US20020035722A1 (en) | Interactive instruction scheduling and block ordering | |
CN1704763A (en) | Electronic device diagnostic methods and systems | |
JP2006092544A (en) | Dynamic link of module in pre-operating system environment | |
WO2015117434A1 (en) | Method and device for manufacturing patch, and method and device for activating patch | |
US20110126179A1 (en) | Method and System for Dynamic Patching Software Using Source Code | |
US7523446B2 (en) | User-space return probes | |
CN101482845A (en) | Method and system for calling instant debugger | |
CN108762825A (en) | The realization method and system of dynamic base heavy duty | |
CN112130926B (en) | Application program running method, device, terminal equipment and storage medium | |
CN115617687B (en) | Program instrumentation method, device, equipment and storage medium | |
US20080127118A1 (en) | Method and system for dynamic patching of software | |
Gruzenkin et al. | N-version software module requirements to grant the software execution fault-tolerance | |
US20050039196A1 (en) | Method and system for using a library | |
US7213123B2 (en) | Method and apparatus for mapping debugging information when debugging integrated executables in a heterogeneous architecture | |
US20140196019A1 (en) | Method and Apparatus for Substituting Compiler Built-in Helper Functions with Machine Instructions | |
US7472380B1 (en) | Processing system with component architecture platform support |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20081008 |