CN104050080A - Method and system for debugging linux kernel in user mode - Google Patents

Method and system for debugging linux kernel in user mode Download PDF

Info

Publication number
CN104050080A
CN104050080A CN201410251095.4A CN201410251095A CN104050080A CN 104050080 A CN104050080 A CN 104050080A CN 201410251095 A CN201410251095 A CN 201410251095A CN 104050080 A CN104050080 A CN 104050080A
Authority
CN
China
Prior art keywords
debug
function
user
kernel
proc file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410251095.4A
Other languages
Chinese (zh)
Other versions
CN104050080B (en
Inventor
宁志明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Opzoon Technology Co Ltd
Original Assignee
Opzoon Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Opzoon Technology Co Ltd filed Critical Opzoon Technology Co Ltd
Priority to CN201410251095.4A priority Critical patent/CN104050080B/en
Publication of CN104050080A publication Critical patent/CN104050080A/en
Application granted granted Critical
Publication of CN104050080B publication Critical patent/CN104050080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a method and a system for debugging the linux kernel in a user mode, and relates to the technical field of kernel debugging. The method comprises the following steps: S1: creating a proc file for debugging in a kernel; S2: receiving a debugging command input by a user in the user mode and sending the debugging command to the proc file; S3: parsing the debugging command by the proc file, executing a corresponding debugging function according to the parsing result, and returning a debugging result to the user mode. Through the cooperation between the steps, debugging of the kernel is realized simply and conveniently, operation in any Linux kernel version embedded environment can be realized, a host machine is not relied on, the complex networking and configure compiling are not needed, and after the proc file is created in the kernel, simple kernel debugging under the Shell can be performed directly.

Description

The method and system of user's state debugging linux kernel
Technical field
The present invention relates to kernel debugging technique field, particularly a kind of method and system of user's state debugging linux kernel.
Background technology
Along with embedded device is more and more general, a lot of functions are all in the inner exploitation of linux kernel, be that the code that function realizes is integrated in linux kernel inside, as application program, in user's state, do not realize, so just cannot be convenient to use the debugging acids such as GDB and go to debug position-location application running status.Although have such as the instruments such as KGDB and KDB are realized kernel debug function, use and need to revise kernel code, the environment that debugging needs also relies on more.Such as user wants to check that whether the value of kernel somewhere code is correct; Travel through certain chained list, look at that current chained list has these simple debugging demands such as which value, just seems and has wasted one's talent on a petty job with these instruments.
When using KGDB debugging kernel, this scene needs an extra PC as host, the GDB server of built-in equipment operation kernel, long-range PC is connected to embedded device by serial ports or netting twine, at host, can debug kernel like this, check internal memory, call kernel function etc.But its shortcoming is networking more complicated, also need extra PC host, constructing environment is cumbersome, needs the common debugging that cooperated of embedded device and host, does not sometimes have such environment for user's debugging.
When using KDB debugging kernel, the kernel of Linux highest version has added the support of KDB, and KDB and kernel integrate, user's state starts KDB by SysRq order or other modes, and this spline kernel can stop, and user is in the order line of KDB, can carry out the order that KDB supports, debugging kernel.If but its shortcoming is that the kernel that sometimes user is using is older, do not support KDB (the later kernel of 2.6.35 is just supported), or the patch that need to beat KDB could be supported.
Summary of the invention
For simplifying the environment of debugging, and reduce the requirement to linux version.
A kind of method that the invention provides user's state debugging linux kernel, said method comprising the steps of:
S1: create a proc file for debugging in kernel;
S2: receive the debug command of user's input in user's state, and send described debug command to described proc file;
S3: described proc file is resolved described debug command, carries out corresponding debug function according to analysis result, and debug results is back to described user's state.
Wherein, described debug command comprises: command string and parameter, and each command string is all corresponding with the debug function in described proc file;
Step S3 specifically comprises:
S301: described proc file is resolved described debug command, to obtain described parameter and the corresponding debug function of described command string;
S302: described proc file is carried out corresponding debug function by debug function described in described parameter substitution, to obtain debug results;
S303: described proc file is back to described user's state by described debug results.
Wherein, described debug command comprises: function name and parameter;
Step S3 specifically comprises:
S311: described proc file is resolved described debug command, to obtain described parameter and the corresponding function address of described function name;
S312: described proc file is converted to function pointer by described function address, and by carrying out corresponding debug function in function pointer described in described parameter substitution, to obtain debug results;
S313: described proc file is back to described user's state by described debug results.
Wherein, before step S1, also comprise:
S0: the kernel module or the kernel code that receive user's input in described user's state;
Step S1 specifically comprises: the kernel module receiving or kernel code are compiled, so that create a proc file for debugging in kernel.
Wherein, step S2 specifically comprises:
In user's state, receive the debug command of user's input, judge whether described user has administrator right, if having, to described proc file, send described debug command.
The system that the invention also discloses a kind of user's state debugging linux kernel, described system comprises:
Creating unit, for creating a proc file for debugging at kernel;
Transmitting element, for receive the debug command of user's input in user's state, and sends described debug command to described proc file;
Resolve debugging unit, for described proc file, described debug command is resolved, according to analysis result, carry out corresponding debug function, and debug results is back to described user's state.
Wherein, described debug command comprises: command string and parameter, and each command string is all corresponding with the debug function in described proc file;
Described parsing debugging unit specifically comprises:
Resolve subelement, for described proc file, described debug command is resolved, to obtain described parameter and the corresponding debug function of described command string;
Debugging subelement, carries out corresponding debug function for described proc file by debug function described in described parameter substitution, to obtain debug results;
Return to subelement, for described proc file, described debug results is back to described user's state.
Wherein, described debug command comprises: function name and parameter;
Described parsing debugging unit specifically comprises:
Resolve subelement, for described proc file, described debug command is resolved, to obtain described parameter and the corresponding function address of described function name;
Debugging subelement, is converted to function pointer for described proc file by described function address, and by carrying out corresponding debug function in function pointer described in described parameter substitution, to obtain debug results;
Return to subelement, for described proc file, described debug results is back to described user's state.
Wherein, described system also comprises:
Receiving element, for receiving kernel module or the kernel code of user's input in described user's state;
Creating unit, also for the kernel module receiving or kernel code are compiled, so that create a proc file for debugging in kernel.
Wherein, described transmitting element, also, for receive the debug command of user's input in user's state, judges whether described user has administrator right, if having, to described proc file, sends described debug command.
The present invention is by the cooperation between each step, realize simply and easily the debugging to kernel, can be in any linux kernel version embedded environment operation, do not rely on host, need not complicated networking compile with configuration, in kernel, create after proc file, can directly under Shell, complete the simple debugging of kernel.
The present invention also can increase new function to debugger flexibly, or revises the existing function of debugger.Because debugging is to utilize linux kernel Proc file to realize, debugger itself can be compiled as kernel module.Revised after code, recompilated kernel module, then module loading is entered to kernel, just can use new debugger code.
The present invention, by the function of dynamic call kernel function, can directly call kernel function in user's state, has strengthened the availability of debugger.Such as user can directly call in user's state the debugging explicit function that kernel is relevant, check some states of kernel.
Accompanying drawing explanation
Fig. 1 is the method flow diagram of user's state debugging linux kernel of one embodiment of the present invention;
Fig. 2 is the system architecture diagram of user's state debugging linux kernel of one embodiment of the present invention.
Embodiment
Below in conjunction with drawings and Examples, the specific embodiment of the present invention is described in further detail.Following examples are used for illustrating the present invention, but are not used for limiting the scope of the invention.
Proc is the Virtual File System that Linux supports, user can pass through kernel module or kernel code, creates file corresponding under proc file system, by writing the I/O read/write function that this document is corresponding, the IO operation of encapsulation this document, thus some resources of checking kernel by this document, accessed.
Thought of the present invention is: by creating the proc file of a debug, the unified all debugging methods that need that realize of this document, are equivalent to a debugger, by writing the I/O function of this document, realize the debug function of wanting.
Fig. 1 is the method flow diagram of user's state debugging linux kernel of one embodiment of the present invention; With reference to Fig. 1, said method comprising the steps of:
S1: create a proc file for debugging in kernel;
S2: receive the debug command of user's input in user's state, and send described debug command to described proc file;
S3: described proc file is resolved described debug command, carries out corresponding debug function according to analysis result, and debug results is back to described user's state.
For ease of realizing debugging, can adopt the debug command of multiple format to realize, adopt the form of two kinds of debug commands below, a kind of is the form of command string, another kind is the form of function name;
When adopting the form of command string to realize debugging, preferably, described debug command comprises: command string and parameter, and each command string is all corresponding with the debug function in described proc file;
Step S3 specifically comprises:
S301: described proc file is resolved described debug command, to obtain described parameter and the corresponding debug function of described command string;
S302: described proc file is carried out corresponding debug function by debug function described in described parameter substitution, to obtain debug results;
S303: described proc file is back to described user's state by described debug results.
When adopting the form of function name to realize debugging, preferably, described debug command comprises: function name and parameter;
Step S3 specifically comprises:
S311: described proc file is resolved described debug command, to obtain described parameter and the corresponding function address of described function name;
S312: described proc file is converted to function pointer by described function address, and by carrying out corresponding debug function in function pointer described in described parameter substitution, to obtain debug results;
S313: described proc file is back to described user's state by described debug results.
Embodiment 1
With a specific embodiment, the present invention is described below, but does not limit protection scope of the present invention.For realizing the function of described proc file, the composition of described proc file can roughly be divided into following three parts:
One: each debug function subfunction, these functions are that little debug function is carried out function, can write separately.As the debug function of checking internal memory, revise the debug function of internal memory, call the debug function of kernel function, check the debug function of CPU information etc.Each debug function, has executable debug function, also has the corresponding command string of this function, such as:
Md: check internal memory (memory display), corresponding debug function mem_read.
Mm: revise internal memory (memory modify), respective function mem_modify.
Call: carry out and call kernel function (call function), respective function call_functon.
The input function of proc file, by corresponding character string, finds corresponding debug function subfunction, carries out corresponding debug function.
Two: this proc file input (write) function.Accept user and input and explain execution.Its functional sequence is as follows:
(1). receive the character string debug command that interpreting user state transmits.
(2). the character string debug command that user's state is transmitted resolves to the implication that debugger is understood.
(3). according to the analysis result of second step, find corresponding debug function function, the parameter of user's state input is imported into debug function function and carried out.
Three: this proc exports (read) function.Export debug function function and parameter that this proc supports.
Embodiment 2
The form of command string of take below illustrates the present invention as example, but does not limit protection scope of the present invention.On the basis of embodiment 1, the input of user's state of this proc file, output, the echo that can carry with Linux and cat order realize.Such as the name of, this proc file is called debug_proc, under/proc/debug_proc catalogue.
User wants to check by debug_proc the internal memory of kernel address, such as the internal memory of 0xffff1234 address.
Check that user's state that internal memory is corresponding is input as " md ", inputs in the Shell of Linux
echo?md?0xffff1234>/proc/debug_proc,
So just be equivalent to this character string by " md 0xffff1234 ", write/proc/debug_proc file.As for what there is after writing, the input function by debug_proc goes to explain completely.
For debug_proc of the present invention, it is as follows that input function is carried out flow process:
(1) receiving " md 0xffff1234 " character string of user's state input, is separator by space or Tab, character string is divided into " md " and " 0xffff1234 "
(2) md order is for checking the order of internal memory, input parameter is memory address, and the input function of debug_proc is converted to 32 bit variable 0xffff1234 by character string " 0xffff1234 ", by character string " md ", find the function pointer of the debug function function of checking internal memory.Such as name is called mem_read function
(3) 0xffff1234 is imported into mem_read function, call execution.Mem_read function reads the internal memory at place, 0xffff1234 address, by printk, exports dump to user state.
Embodiment 3
The form of command string of take below illustrates the present invention as example, but does not limit protection scope of the present invention.On the basis of embodiment 1, user is calling the debug function function of checking internal memory, or during other debug function functions, needn't input complete virtual address, can by the title of input kernel variable, obtain the address of kernel variable, this input function by debug_proc is realized.
Such as, the address of the variable net_dev_list of kernel is 0xffff1234, user inputs echo md net_dev_list>/proc/debug_proc
Input function receives the input " md net_dev_list " of user's state by importing character string " net_dev_list " into kallsyms_lookup_name function, rreturn value is exactly the address of this kernel variable in kernel, be 0xffff1234, this just greatly facilitates debugging.The prerequisite that can do is like this, the support that the linux kernel of debugging has been opened kallsyms when compiling configuration.
In order to further illustrate the completeness of proc file, can realize the function of a lot of debuggers, existing by revise the mem_modify debug function function of internal memory and call kernel function call_function debug function function to realize brief description as follows:
(1) mem_modify debug function function is realized explanation
Mem_modify debug function function is for revising the function of kernel internal memory, and its input parameter is the memory address that will revise, and content and the length of the value of revising.Such as, user want to revise place, 0xffff1234 address backward the value of 128 bytes be 0x12, in shell, input
echo?mm0xffff1234?0x12?128>/proc/debug_proc
Debug_proc, according to mm, finds mem_modify function, and " 0x,fff,f12,340,x12 128 " are passed to mem_modify function.
Its function of mem_modify is achieved as follows:
(1) input of converting users state, is converted to numerical value 0xffff1234 by character string " 0xffff1234 ", and character string " 0x12 " is converted to numerical value 0x12, and character string " 128 " is converted to numerical value 128.
(2) whether be legal addressable address, because debug function is moved at kernel, understand extremely, so whether need first detect address legal if address is illegal if detecting 0xffff1234 address.
(3) call memset (0xffff1234,0x12,128) function, the value of 128 bytes is backward located in 0xffff1234 address and be all revised as 0x12.So just completed the function to kernel modifications internal memory.
(2) call_function debug function function is realized explanation
Call_function debug function function is according to function name and the parameter of user's input, carries out function corresponding in kernel.How here a key point has two: one is how according to function name, to obtain the address that function is carried out, and another one is according to the address of function, removes to carry out this function.
The function name that first key point can be imported into according to user's state, usings string format as parameter.Call kallsyms_lookup_name function, rreturn value is the address of function.It is the position that this function is carried out article one instruction.
Second function address that key point can be returned according to previous step, by address translation, it is specific function pointer, the parameter that this function pointer imports into is all unsigned long type, the number of parameters that function pointer is accepted is the number of parameters of user's state input, and rreturn value is also unsigned long type.The parameter of inputting such as user's state is two, and the address translation of first step being returned is following function pointer type:
unsigned?long(*funccall_2)(unsigned?long,unsigned?long)
And then the parameter that user's state is imported into imports into as the parameter of this function pointer, call this function pointer, can call corresponding function.
The square ratio juris that can realize like this call function is: C language function calls, and for most parameters type (char, short, int, long, pointer), parameter imports that the width that is as a unsinged long type imports into into.By the function of really carrying out, from register or storehouse, take out parameter again, be converted to corresponding real (char, short, int, long, pointer) type.String format during as parameter, is also transmitted as pointer, and the method for this Transfer Parameters is also out of question.For float and double type, this method is problem slightly, but considers that kernel is seldom used float and double, and therefore this scene almost can be ignored, and need not consider.
The execution of lower call_function debug function function is described with an example below, such as wanting to carry out kernel function test_func, want that the function parameter importing into is 123, address and the character string " hello world " of devlock, want to carry out: test_func (123, & devlock, " hello world ")
User's execution and kernel execution flow process are:
(1) user inputs in shell
echo?call?test_func?123?devlock\”hello?world\”>/proc/debug_proc
Here about hello world add ", be by ", tell the debug_proc input function of kernel, the beginning of input of character string and end, and in echo, input " need to input carry out escape.
(2) kernel obtains the character string " call test_func 123 devlock " hello world " " of user's state input, obtains user want to carry out call_function debug function function according to call; Call the function address that kallsyms_lookup_name (" test_func ") obtains test_func;
Character string " 123 " is converted to numeral 123, calls the address that kallsyms_lookup_name (" devlock ") obtains devlock variable; With the address of temporary variable storage " hello world " character string, respective code is exemplified as:
unsigned?long?funcargv[16]={0};
funcargv[0]=kallsyms_lookup_name(“test_func”);
funcargv[1]=atoi(“123”);
funcargv[2]=kallsyms_lookup_name(“devlock”);
funcargv[3]=(unsigned?long)“hello?world”;
(3) input function of debug_proc judgement user has inputted 123, devlock, " hello world " three parameters, by the function address of test_func obtained in the previous step, be funcargv[0], be converted to the function pointer as Types Below, such as typedef is for newtype:
typedef?unsigned?long(*funccall_3)(unsigned?long,unsigned?long,unsigned?long);
(4) function pointer calling after conversion is carried out, and function parameter is imported into successively.Test_func function can directly have been called.Concrete run time version is as follows:
*((funccall_3)funcargv[0])(funcargv[1],funcargv[2],funcargv[3]);
(5) after tested, the effect of this method and direct call function test_func (123, & devlock, " hello world ") is the same.This has just reached the object of calling kernel function in user's state.Realized the function at user's state call function, this practicality of going to debug the method for kernel by proc file input has just strengthened greatly.
In above-described embodiment 1~3, on the basis of any one, for ease of setting up the proc file for debugging, preferably, before step S1, also comprise:
S0: the kernel module or the kernel code that receive user's input in described user's state;
Step S1 specifically comprises: the kernel module receiving or kernel code are compiled, so that create a proc file for debugging in kernel.
In above-described embodiment 1~3, on the basis of any one, in order to guarantee security, preferably, step S2 specifically comprises:
In user's state, receive the debug command of user's input, judge whether described user has administrator right, if having, to described proc file, send described debug command.
The system that the invention also discloses a kind of user's state debugging linux kernel, with reference to Fig. 2, described system comprises:
Creating unit, for creating a proc file for debugging at kernel;
Transmitting element, for receive the debug command of user's input in user's state, and sends described debug command to described proc file;
Resolve debugging unit, for described proc file, described debug command is resolved, according to analysis result, carry out corresponding debug function, and debug results is back to described user's state.
Preferably, described debug command comprises: command string and parameter, and each command string is all corresponding with the debug function in described proc file;
Described parsing debugging unit specifically comprises:
Resolve subelement, for described proc file, described debug command is resolved, to obtain described parameter and the corresponding debug function of described command string;
Debugging subelement, carries out corresponding debug function for described proc file by debug function described in described parameter substitution, to obtain debug results;
Return to subelement, for described proc file, described debug results is back to described user's state.
Preferably, described debug command comprises: function name and parameter;
Described parsing debugging unit specifically comprises:
Resolve subelement, for described proc file, described debug command is resolved, to obtain described parameter and the corresponding function address of described function name;
Debugging subelement, is converted to function pointer for described proc file by described function address, and by carrying out corresponding debug function in function pointer described in described parameter substitution, to obtain debug results;
Return to subelement, for described proc file, described debug results is back to described user's state.
Preferably, described system also comprises:
Receiving element, for receiving kernel module or the kernel code of user's input in described user's state;
Creating unit, also for the kernel module receiving or kernel code are compiled, so that create a proc file for debugging in kernel.
Preferably, described transmitting element, also, for receive the debug command of user's input in user's state, judges whether described user has administrator right, if having, to described proc file, sends described debug command.
Above embodiment is only for illustrating the present invention; and be not limitation of the present invention; the those of ordinary skill in relevant technologies field; without departing from the spirit and scope of the present invention; can also make a variety of changes and modification; therefore all technical schemes that are equal to also belong to category of the present invention, and scope of patent protection of the present invention should be defined by the claims.

Claims (10)

1. a method for user's state debugging linux kernel, is characterized in that, said method comprising the steps of:
S1: create a proc file for debugging in kernel;
S2: receive the debug command of user's input in user's state, and send described debug command to described proc file;
S3: described proc file is resolved described debug command, carries out corresponding debug function according to analysis result, and debug results is back to described user's state.
2. the method for claim 1, is characterized in that, described debug command comprises: command string and parameter, and each command string is all corresponding with the debug function in described proc file;
Step S3 specifically comprises:
S301: described proc file is resolved described debug command, to obtain described parameter and the corresponding debug function of described command string;
S302: described proc file is carried out corresponding debug function by debug function described in described parameter substitution, to obtain debug results;
S303: described proc file is back to described user's state by described debug results.
3. the method for claim 1, is characterized in that, described debug command comprises: function name and parameter;
Step S3 specifically comprises:
S311: described proc file is resolved described debug command, to obtain described parameter and the corresponding function address of described function name;
S312: described proc file is converted to function pointer by described function address, and by carrying out corresponding debug function in function pointer described in described parameter substitution, to obtain debug results;
S313: described proc file is back to described user's state by described debug results.
4. the method as described in any one in claim 1~3, is characterized in that, before step S1, also comprises:
S0: the kernel module or the kernel code that receive user's input in described user's state;
Step S1 specifically comprises: the kernel module receiving or kernel code are compiled, so that create a proc file for debugging in kernel.
5. the method as described in any one in claim 1~3, is characterized in that, step S2 specifically comprises:
In user's state, receive the debug command of user's input, judge whether described user has administrator right, if having, to described proc file, send described debug command.
6. a system for user's state debugging linux kernel, is characterized in that, described system comprises:
Creating unit, for creating a proc file for debugging at kernel;
Transmitting element, for receive the debug command of user's input in user's state, and sends described debug command to described proc file;
Resolve debugging unit, for described proc file, described debug command is resolved, according to analysis result, carry out corresponding debug function, and debug results is back to described user's state.
7. system as claimed in claim 6, is characterized in that, described debug command comprises: command string and parameter, and each command string is all corresponding with the debug function in described proc file;
Described parsing debugging unit specifically comprises:
Resolve subelement, for described proc file, described debug command is resolved, to obtain described parameter and the corresponding debug function of described command string;
Debugging subelement, carries out corresponding debug function for described proc file by debug function described in described parameter substitution, to obtain debug results;
Return to subelement, for described proc file, described debug results is back to described user's state.
8. system as claimed in claim 6, is characterized in that, described debug command comprises: function name and parameter;
Described parsing debugging unit specifically comprises:
Resolve subelement, for described proc file, described debug command is resolved, to obtain described parameter and the corresponding function address of described function name;
Debugging subelement, is converted to function pointer for described proc file by described function address, and by carrying out corresponding debug function in function pointer described in described parameter substitution, to obtain debug results;
Return to subelement, for described proc file, described debug results is back to described user's state.
9. the system as described in any one in claim 6~8, is characterized in that, described system also comprises:
Receiving element, for receiving kernel module or the kernel code of user's input in described user's state;
Creating unit, also for the kernel module receiving or kernel code are compiled, so that create a proc file for debugging in kernel.
10. the system as described in any one in claim 6~8, is characterized in that, described transmitting element, also for receive the debug command of user's input in user's state, judge whether described user has administrator right, if having, to described proc file, send described debug command.
CN201410251095.4A 2014-06-09 2014-06-09 User space debugs the method and system of linux kernel Active CN104050080B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410251095.4A CN104050080B (en) 2014-06-09 2014-06-09 User space debugs the method and system of linux kernel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410251095.4A CN104050080B (en) 2014-06-09 2014-06-09 User space debugs the method and system of linux kernel

Publications (2)

Publication Number Publication Date
CN104050080A true CN104050080A (en) 2014-09-17
CN104050080B CN104050080B (en) 2017-11-28

Family

ID=51502966

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410251095.4A Active CN104050080B (en) 2014-06-09 2014-06-09 User space debugs the method and system of linux kernel

Country Status (1)

Country Link
CN (1) CN104050080B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104461815A (en) * 2014-12-11 2015-03-25 深圳芯邦科技股份有限公司 Chip debugging method and system-on-chip
CN105094910A (en) * 2015-07-31 2015-11-25 上海斐讯数据通信技术有限公司 Driving function user state debugging system and method
CN105159739A (en) * 2015-08-24 2015-12-16 上海斐讯数据通信技术有限公司 Method for storing application compiling information of Linux
CN105204937A (en) * 2015-10-28 2015-12-30 上海斐讯数据通信技术有限公司 Kernel function call method, device and operation system
CN105760306A (en) * 2016-03-10 2016-07-13 上海斐讯数据通信技术有限公司 Command issuing method and system and debugging method
CN107608717A (en) * 2016-07-12 2018-01-19 迈普通信技术股份有限公司 User space formation gathering method, device and system
CN108615545A (en) * 2016-12-09 2018-10-02 北京京存技术有限公司 EMMC adjustment methods and EMMC
CN109684202A (en) * 2018-11-27 2019-04-26 国电南瑞科技股份有限公司 A method of function performance in debugging embedded system program in the application
CN111240683A (en) * 2018-11-29 2020-06-05 熠智网络科技(上海)有限公司 Embedded thermal programming method and system
CN112905472A (en) * 2021-03-04 2021-06-04 黑芝麻智能科技(上海)有限公司 Kernel debugging system and method
CN113835755A (en) * 2021-09-24 2021-12-24 天津津航计算技术研究所 Method for realizing serial port console in operating system-free environment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020099953A1 (en) * 2000-11-30 2002-07-25 International Business Machines Corporation Debugging of chipcards
CN101894069A (en) * 2010-06-10 2010-11-24 中兴通讯股份有限公司 Debugging method and device of early serial port printing in Linux

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020099953A1 (en) * 2000-11-30 2002-07-25 International Business Machines Corporation Debugging of chipcards
CN101894069A (en) * 2010-06-10 2010-11-24 中兴通讯股份有限公司 Debugging method and device of early serial port printing in Linux

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
舒长林: "Linux虚拟调试系统关键技术的研究与实现", 《中国优秀硕士学位论文全文数据库》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104461815A (en) * 2014-12-11 2015-03-25 深圳芯邦科技股份有限公司 Chip debugging method and system-on-chip
CN105094910A (en) * 2015-07-31 2015-11-25 上海斐讯数据通信技术有限公司 Driving function user state debugging system and method
CN105159739A (en) * 2015-08-24 2015-12-16 上海斐讯数据通信技术有限公司 Method for storing application compiling information of Linux
CN105204937B (en) * 2015-10-28 2018-09-28 上海斐讯数据通信技术有限公司 Kernel function call method, apparatus and operating system
CN105204937A (en) * 2015-10-28 2015-12-30 上海斐讯数据通信技术有限公司 Kernel function call method, device and operation system
CN105760306A (en) * 2016-03-10 2016-07-13 上海斐讯数据通信技术有限公司 Command issuing method and system and debugging method
CN107608717A (en) * 2016-07-12 2018-01-19 迈普通信技术股份有限公司 User space formation gathering method, device and system
CN107608717B (en) * 2016-07-12 2021-02-12 迈普通信技术股份有限公司 User mode information collection method, device and system
CN108615545A (en) * 2016-12-09 2018-10-02 北京京存技术有限公司 EMMC adjustment methods and EMMC
CN109684202A (en) * 2018-11-27 2019-04-26 国电南瑞科技股份有限公司 A method of function performance in debugging embedded system program in the application
CN109684202B (en) * 2018-11-27 2022-06-17 国电南瑞科技股份有限公司 Method for debugging function in embedded system program in application
CN111240683A (en) * 2018-11-29 2020-06-05 熠智网络科技(上海)有限公司 Embedded thermal programming method and system
CN112905472A (en) * 2021-03-04 2021-06-04 黑芝麻智能科技(上海)有限公司 Kernel debugging system and method
CN113835755A (en) * 2021-09-24 2021-12-24 天津津航计算技术研究所 Method for realizing serial port console in operating system-free environment
CN113835755B (en) * 2021-09-24 2023-08-22 天津津航计算技术研究所 Method for realizing serial port control console in operating system-free environment

Also Published As

Publication number Publication date
CN104050080B (en) 2017-11-28

Similar Documents

Publication Publication Date Title
CN104050080A (en) Method and system for debugging linux kernel in user mode
CN110096338B (en) Intelligent contract execution method, device, equipment and medium
US9703678B2 (en) Debugging pipeline for debugging code
CN112270149B (en) Verification platform automatic integration method and system, electronic equipment and storage medium
US20100153693A1 (en) Code execution with automated domain switching
CN109783340B (en) SoC test code programming method, IP test method and device
US20180246706A1 (en) Using dynamic information to refine control flow graphs
WO2020019490A1 (en) Interface testing method, electronic device and storage medium
Nu1L Team Reverse engineering
WO2015183767A1 (en) Emulation-based expression evaluation for diagnostic tools
Dennis Raspberry pi computer architecture essentials
CN113722020A (en) Interface calling method, device and computer readable storage medium
Larsen et al. Overture vdm-10 tool support: User guide
WO2009009138A1 (en) A programming environment with support for handle and non-handle user-created classes
KR20240047468A (en) ECU upgrade method and device, and readable storage medium
CN106293687A (en) The control method of a kind of flow process of packing, and device
CN106933642B (en) Application program processing method and processing device
EP2972880B1 (en) Kernel functionality checker
Chen et al. Fragdroid: Automated user interface interaction with activity and fragment analysis in android applications
Seitz Gray Hat Python: Python programming for hackers and reverse engineers
CN110609703B (en) Performance detection tool implementation method and device, readable storage medium and terminal equipment
Bodden Stateful breakpoints: A practical approach to defining parameterized runtime monitors
CN113835952B (en) Linux system call monitoring method based on compiler code injection
Itsykson Formalism and language tools for specification of the semantics of software libraries
KR20050063023A (en) Embedded system debugger based on jtag interface and the method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20180528

Granted publication date: 20171128

PP01 Preservation of patent right