CN104050080B - User space debugs the method and system of linux kernel - Google Patents
User space debugs the method and system of linux kernel Download PDFInfo
- Publication number
- CN104050080B CN104050080B CN201410251095.4A CN201410251095A CN104050080B CN 104050080 B CN104050080 B CN 104050080B CN 201410251095 A CN201410251095 A CN 201410251095A CN 104050080 B CN104050080 B CN 104050080B
- Authority
- CN
- China
- Prior art keywords
- function
- debugging
- proc
- kernel
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000012905 input function Methods 0.000 claims description 10
- 230000006855 networking Effects 0.000 abstract description 3
- 230000006870 function Effects 0.000 description 153
- 230000004048 modification Effects 0.000 description 7
- 238000012986 modification Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 241000208340 Araliaceae Species 0.000 description 2
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 2
- 235000003140 Panax quinquefolius Nutrition 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 235000008434 ginseng Nutrition 0.000 description 2
- 241000282326 Felis catus Species 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 239000002253 acid Substances 0.000 description 1
- 150000007513 acids Chemical class 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
Landscapes
- Debugging And Monitoring (AREA)
Abstract
The invention discloses a kind of method and system of User space debugging linux kernel, it is related to kernel debugging technology field, the described method comprises the following steps:S1:A proc file for being used to debug is created in kernel;S2:The debug command of user's input is received in User space, and the debug command is sent to the proc files;S3:The proc files parse to the debug command, perform corresponding debugging function according to analysis result, and debugging result is back into the User space.The present invention passes through the cooperation between each step, simply and easily realize the debugging to kernel, it can be run in any linux kernel version embedded environment, independent of host, compiled without complicated networking and configuration, after creating proc files in kernel, the simple debugging of kernel can be completed directly under Shell.
Description
Technical field
The present invention relates to kernel debugging technology field, more particularly to a kind of User space debugs the method for linux kernel and is
System.
Background technology
As embedded device is more and more common, many functions are all developed inside linux kernel, i.e., function is realized
Code be integrated in inside linux kernel, not as application program User space realize, can not thus be convenient to use
The debugging acids such as GDB remove debugging positioning application program running state.Although there are the instruments such as such as KGDB and KDB to realize kernel tailoring
Function, but use need change kernel code, debug needs environment be also relied on it is more.For example user wants to check kernel somewhere
Whether the value of code is correct;Some chained list is traveled through, looks at that current chained list there are these simple debugging demands such as which value, uses these
Instrument, which just seems, wastes one's talent on a petty job.
When using KGDB debugging kernels, one extra PC of this scene needs is as host, built-in equipment operation
The GDB server, long-range PC of kernel are connected to embedded device by serial ports or netting twine, can so be adjusted in host
Kernel is tried, checks internal memory, calls kernel function etc..But its shortcoming is that networking is more complicated, it is also necessary to extra PC hosts, structure
The cumbersome completion debugging, it is necessary to which embedded device and host cooperate jointly of environment is built, sometimes not such environment
Debugged for user.
When adding KDB support using KDB debugging kernels, the kernel of Linux highest versions, KDB and kernel are integrated in one
Rise, by SysRq orders or other modes startup KDB, this spline kernel can stop User space, user KDB order line,
The order of KDB supports can be performed, debugs kernel.But its shortcoming is if that the kernel comparison that sometimes user is used is old,
KDB (kernel later 2.6.35 is just supported) is not supported then, or the patch for needing to beat KDB could be supported.
The content of the invention
To simplify the environment of debugging, and reduce the requirement to linux versions.
The invention provides a kind of method of User space debugging linux kernel, the described method comprises the following steps:
S1:A proc file for being used to debug is created in kernel;
S2:The debug command of user's input is received in User space, and the debug command is sent to the proc files;
S3:The proc files are parsed to the debug command, and corresponding debugging function is performed according to analysis result,
And debugging result is back to the User space.
Wherein, the debug command includes:Command string and parameter, each command string with the proc files
In debugging function pair should;
Step S3 is specifically included:
S301:The proc files parse to the debug command, to obtain the parameter and the command character
The corresponding debugging function of string;
S302:The parameter is substituted into the debugging function and performs corresponding debugging function by the proc files, to obtain
Debugging result;
S303:The debugging result is back to the User space by the proc files.
Wherein, the debug command includes:Function name and parameter;
Step S3 is specifically included:
S311:The proc files parse to the debug command, to obtain the parameter and the function name
Corresponding function address;
S312:The function address is converted to function pointer by the proc files, and the parameter is substituted into the letter
Corresponding debugging function is performed in number pointer, to obtain debugging result;
S313:The debugging result is back to the User space by the proc files.
Wherein, also include before step S1:
S0:The kernel module or kernel code of user's input are received in the User space;
Step S1 is specifically included:The kernel module received or kernel code are compiled, to create in interior core
Build one be used for debug proc files.
Wherein, step S2 is specifically included:
The debug command of user's input is received in User space, judges whether the user has administrator right, if so, then
The debug command is sent to the proc files.
The invention also discloses a kind of system of User space debugging linux kernel, the system includes:
Creating unit, for creating a proc file for being used to debug in kernel;
Transmitting element, for receiving the debug command of user's input in User space, and to described in proc files transmission
Debug command;
Debugging unit is parsed, the debug command is parsed for the proc files, performed according to analysis result
Corresponding debugging function, and debugging result is back to the User space.
Wherein, the debug command includes:Command string and parameter, each command string with the proc files
In debugging function pair should;
The parsing debugging unit specifically includes:
Subelement is parsed, the debug command is parsed for the proc files, to obtain the parameter and institute
State the debugging function corresponding to command string;
Subelement is debugged, the parameter is substituted into the debugging function for the proc files performs corresponding debugging work(
Can, to obtain debugging result;
Subelement is returned, the debugging result is back to the User space for the proc files.
Wherein, the debug command includes:Function name and parameter;
The parsing debugging unit specifically includes:
Subelement is parsed, the debug command is parsed for the proc files, to obtain the parameter and institute
State the function address corresponding to function name;
Subelement is debugged, the function address is converted into function pointer for the proc files, and by the parameter
Substitute into the function pointer and perform corresponding debugging function, to obtain debugging result;
Subelement is returned, the debugging result is back to the User space for the proc files.
Wherein, the system also includes:
Receiving unit, for receiving the kernel module or kernel code of user's input in the User space;
Creating unit, is additionally operable to the kernel module that will receive or kernel code is compiled, to create in interior core
Build one be used for debug proc files.
Wherein, the transmitting element, it is additionally operable to receive the debug command of user's input in User space, judges that the user is
It is no that there is administrator right, if so, then sending the debug command to the proc files.
The present invention simply and easily realizes the debugging to kernel by the cooperation between each step, can be in any Linux
Core version embedded environment is run, and independent of host, is compiled without complicated networking and configuration, proc files are created in kernel
Afterwards, the simple debugging of kernel can be completed directly under Shell.
The present invention can also flexibly give debugger increase New function, or modification debugger it is functional.Because debugging is to utilize
Linux kernel Proc files realize that debugger can be compiled as kernel module in itself.After having changed code, kernel is recompilated
Module, then module loading is entered into kernel, it is possible to use new debugger code.
The present invention directly can call kernel function in User space, enhance tune by the function of dynamic call kernel function
Try the availability of device.For example user directly can call the related debugging explicit function of kernel in User space, kernel some are checked
State.
Brief description of the drawings
Fig. 1 is the method flow diagram of the User space debugging linux kernel of one embodiment of the present invention;
Fig. 2 is the system architecture diagram of the User space debugging linux kernel of one embodiment of the present invention.
Embodiment
With reference to the accompanying drawings and examples, the embodiment of the present invention is described in further detail.Implement below
Example is used to illustrate the present invention, but is not limited to the scope of the present invention.
Proc is the Virtual File System that Linux is supported, user can create proc texts by kernel module or kernel code
Corresponding file under part system, by writing I/O read/write functions corresponding to this document, the I/O operation of this document is encapsulated, so as to logical
Cross this document and access some resources for checking kernel.
Idea of the invention is that:By creating debug proc files, this document is unified to realize all tune needed
Trial work section, equivalent to one debugger, by writing the input/output function of this document, realizes desired debugging function.
Fig. 1 is the method flow diagram of the User space debugging linux kernel of one embodiment of the present invention;Reference picture 1, it is described
Method comprises the following steps:
S1:A proc file for being used to debug is created in kernel;
S2:The debug command of user's input is received in User space, and the debug command is sent to the proc files;
S3:The proc files are parsed to the debug command, and corresponding debugging function is performed according to analysis result,
And debugging result is back to the User space.
Debug, can be realized using the debug command of multiple format for ease of realizing, use two kinds of debug commands below
Form, a kind of form for command string, another kind are the form of function name;
When the form using command string is to realize debugging, it is preferable that the debug command includes:Command string
And parameter, each command string should with the debugging function pair in the proc files;
Step S3 is specifically included:
S301:The proc files parse to the debug command, to obtain the parameter and the command character
The corresponding debugging function of string;
S302:The parameter is substituted into the debugging function and performs corresponding debugging function by the proc files, to obtain
Debugging result;
S303:The debugging result is back to the User space by the proc files.
When the form using function name is to realize debugging, it is preferable that the debug command includes:Function name and ginseng
Number;
Step S3 is specifically included:
S311:The proc files parse to the debug command, to obtain the parameter and the function name
Corresponding function address;
S312:The function address is converted to function pointer by the proc files, and the parameter is substituted into the letter
Corresponding debugging function is performed in number pointer, to obtain debugging result;
S313:The debugging result is back to the User space by the proc files.
Embodiment 1
The present invention is illustrated with specific embodiment below, but does not limit protection scope of the present invention.To realize
The function of proc files is stated, the composition of the proc files can be roughly divided into following three part:
One:Each debugging function subfunction, these functions perform function for small debugging function, can individually write.Such as check
The debugging function of internal memory, the debugging function of internal memory is changed, call the debugging function of kernel function, check the debugging letter of CPU information
Number etc..Each debugging function, has executable debugging function, also has this function pair to answer a command string, such as:
md:Internal memory (memory display) is checked, it is corresponding to debug function mem_read.
mm:Change internal memory (memory modify), respective function mem_modify.
call:Perform and call kernel function (call function), respective function call_functon.
The input function of proc files is found corresponding debugging function subfunction, performed corresponding by corresponding character string
Debugging function.
Two:This proc files input (write) function.Receive user to input and explain execution.Its functional sequence is as follows:
(1) receives the character string debug command for explaining that User space transmits.
(2) resolves to the character string debug command that User space transmits the implication of debugger understanding.
(3) finds corresponding debugging function function, the parameter of User space input is passed according to the analysis result of second step
Enter debugging function function and perform.
Three:This proc exports (read) function.Export the debugging function function and parameter of this proc supports.
Embodiment 2
Illustrate the present invention by taking the form of command string as an example below, but do not limit protection scope of the present invention.In reality
On the basis of applying example 1, User space input, the output of this proc files, it can be realized with echo the and cat orders that Linux is carried.
Such as the entitled debug_proc of this proc files, under/proc/debug_proc catalogues.
User wants to check the internal memory of kernel address, such as the internal memory of 0xffff1234 addresses by debug_proc.
Check that User space input is " md " corresponding to internal memory, then inputs in Linux Shell
echo md 0xffff1234>/ proc/debug_proc,
Thus equivalent to by " this character string of md 0xffff1234 ", write-in/proc/debug_proc files.As for
What can occur after write-in, the input function by debug_proc goes to explain completely.
For the debug_proc of the present invention, it is as follows that input function performs flow:
(1) receive User space input " md 0xffff1234 " character strings, is separator by space or Tab, by character string
It is divided into " md " and " 0xffff1234 "
(2) md orders are to check the order of internal memory, and input parameter is memory address, and debug_proc input function will
Character string " 0xffff1234 " is converted to 32 bit variable 0xffff1234, by character string " md ", finds the tune for checking internal memory
Try the function pointer of power function.Such as entitled mem_read functions
(3) 0xffff1234 is passed to mem_read functions, calls and perform.Mem_read functions are with reading 0xffff1234
Internal memory at location, by printk, dump is exported to User space.
Embodiment 3
Illustrate the present invention by taking the form of command string as an example below, but do not limit protection scope of the present invention.In reality
On the basis of applying example 1, user checks the debugging function function of internal memory calling, or during other debugging function functions, it is not necessary to it is defeated
Enter complete virtual address, the address of kernel variable can be obtained by inputting the title of kernel variable, this is by debug_
Proc input function is realized.
For example the variable net_dev_list of kernel address is 0xffff1234, user inputs echo md net_
dev_list>/proc/debug_proc
" md net_dev_list " are by the way that character string " net_dev_list " is passed for the input of input function reception User space
Enter kallsyms_lookup_name functions, return value is exactly the address of the kernel variable in kernel, i.e. 0xffff1234, and this is just
Greatly facilitate debugging.The premise that can so do is that the linux kernel of debugging opens kallsyms's when compiling and configuring
Support.
In order to further illustrate the completeness of proc files, you can to realize the function of many debuggers, now by modification
The realization of the mem_modify debugging functions function and the call_function debugging function functions of calling kernel function deposited is brief
It is described as follows:
(1) mem_modify debugging functions function realizes explanation
Mem_modify debugging functions function is the function of modification kernel internal memory, and its input parameter is for the internal memory to be changed
Location, and the content and length of the value of modification.For example user thinks that the value of 128 bytes is backward at modification 0xffff1234 addresses
0x12, then inputted in shell
echo mm0xffff1234 0x12 128>/proc/debug_proc
Debug_proc finds mem_modify functions, by " 0x,fff,f12,340,x12 128 " is passed to according to mm
Mem_modify functions.
Its function of mem_modify is realized as follows:
(1) input of User space is changed, character string " 0xffff1234 " is converted into numerical value 0xffff1234, character string
" 0x12 " is converted to numerical value 0x12, and character string " 128 " is converted to numerical value 128.
(2) detect whether 0xffff1234 addresses are legal addressable address, because debugging function is run in kernel, such as
Fruit address illegally can be abnormal, so whether need to first detect address legal.
(3) memset (0xffff1234,0x12,128) function is called, by 128 byte backward at 0xffff1234 addresses
Value be all revised as 0x12.This completes the function to kernel modifications internal memory.
(2) call_function debugging functions function realizes explanation
Call_function debugging functions function is the function name and parameter inputted according to user, and it is right in kernel to perform
The function answered.Here a key point has two:One be how according to function name obtain function execution address, in addition
How one be according to the address of function, goes to perform this function.
The function name that first key point can be passed to according to User space, parameter is used as using string format.Call
Kallsyms_lookup_name functions, return value are the address of function.I.e. this function performs the position of first instruction.
The function address that second key point can return according to previous step, converts the address into specific function pointer,
The incoming parameter of this function pointer is all unsigned long types, and the number of parameters that function pointer is received is then user
The number of parameters of state input, return value is also unsigned long types.For example the parameter of User space input is two, then will
The address conversion that the first step returns is following function pointer type:
unsigned long(*funccall_2)(unsigned long,unsigned long)
Then the parameter being again passed to User space is passed to as the parameter of this function pointer, calls this function pointer,
Corresponding function can be called.
The principle of the method for call function, which can so be realized, is:C language function call, for most parameters type
(char, short, int, long, pointer), parameter is incoming be as a unsinged long type width it is incoming.Again
By the function really performed, parameter is taken out from register or storehouse, be converted to corresponding to really (char, short,
Int, long, pointer) type.When string format is as parameter, and as pointer transmission, the method for this Transfer Parameters
Also it is out of question.For float and double types, this method slightly has problem, but consider kernel be rarely employed float and
Double, therefore this scene can almost be ignored, without considering.
Illustrate the execution of lower call_function debugging functions function with an example below, for example want to perform kernel
Function test_func, think that incoming function parameter " hello world ", that is, is wanted to hold for 123, devlock address and character string
OK:test_func(123,&devlock,“hello world”)
Then user performs and kernel execution flow is:
(1) user inputs in shell
echo call test_func 123 devlock\”hello world\”>/proc/debug_proc
Here hello world or so add ", be to pass through ", tell the debug_proc input functions of kernel, input character
The beginning and end of string, and in echo, input " need input carry out escape.
(2) kernel obtains the character string " devlock " hello of call test_func 123 of User space input
World " ", user is obtained according to call and is intended to perform call_function debugging function functions;Call kallsyms_
Lookup_name (" test_func ") obtains test_func function address;
Character string " 123 " is converted into numeral 123, calls kallsyms_lookup_name (" devlock ") to obtain
The address of devlock variables;Store that " address of hello world " character strings, respective code example are with temporary variable:
Unsigned long funcargv [16]={ 0 };
Funcargv [0]=kallsyms_lookup_name (" test_func ");
Funcargv [1]=atoi (" 123 ");
Funcargv [2]=kallsyms_lookup_name (" devlock ");
Funcargv [3]=(unsigned long) " hello world ";
(3) debug_proc input function judges that user have input 123, devlock, " three ginsengs of hello world "
Number, then by test_func obtained in the previous step function address, be i.e. funcargv [0], be converted to following types of function and refer to
Pin, for example, typedef for new type:
typedef unsigned long(*funccall_3)(unsigned long,unsigned long,
unsigned long);
(4) call the function pointer after conversion to perform, function parameter is passed to successively.Test_func can be directly invoked
Function.Specific execution code is as follows:
*((funccall_3)funcargv[0])(funcargv[1],funcargv[2],funcargv[3]);
(5) after tested, this method and function test_func (123 , &devlock, " hello world ") is directly invoked
Effect be the same.This has just reached the purpose that kernel function is called in User space.Realize in User space call function
Function, this practicality for going to debug the method for kernel by the input of proc files just greatly strengthen.
On the basis of any one of above-described embodiment 1~3, for ease of establishing the proc files for debugging, it is preferable that
Also include before step S1:
S0:The kernel module or kernel code of user's input are received in the User space;
Step S1 is specifically included:The kernel module received or kernel code are compiled, to create in interior core
Build one be used for debug proc files.
On the basis of any one of above-described embodiment 1~3, in order to ensure security, it is preferable that step S2 is specifically wrapped
Include:
The debug command of user's input is received in User space, judges whether the user has administrator right, if so, then
The debug command is sent to the proc files.
The invention also discloses a kind of system of User space debugging linux kernel, reference picture 2, the system to include:
Creating unit, for creating a proc file for being used to debug in kernel;
Transmitting element, for receiving the debug command of user's input in User space, and to described in proc files transmission
Debug command;
Debugging unit is parsed, the debug command is parsed for the proc files, performed according to analysis result
Corresponding debugging function, and debugging result is back to the User space.
Preferably, the debug command includes:Command string and parameter, each command string are literary with the proc
Debugging function pair in part should;
The parsing debugging unit specifically includes:
Subelement is parsed, the debug command is parsed for the proc files, to obtain the parameter and institute
State the debugging function corresponding to command string;
Subelement is debugged, the parameter is substituted into the debugging function for the proc files performs corresponding debugging work(
Can, to obtain debugging result;
Subelement is returned, the debugging result is back to the User space for the proc files.
Preferably, the debug command includes:Function name and parameter;
The parsing debugging unit specifically includes:
Subelement is parsed, the debug command is parsed for the proc files, to obtain the parameter and institute
State the function address corresponding to function name;
Subelement is debugged, the function address is converted into function pointer for the proc files, and by the parameter
Substitute into the function pointer and perform corresponding debugging function, to obtain debugging result;
Subelement is returned, the debugging result is back to the User space for the proc files.
Preferably, the system also includes:
Receiving unit, for receiving the kernel module or kernel code of user's input in the User space;
Creating unit, is additionally operable to the kernel module that will receive or kernel code is compiled, to create in interior core
Build one be used for debug proc files.
Preferably, the transmitting element, it is additionally operable to receive the debug command of user's input in User space, judges the user
Whether there is administrator right, if so, then sending the debug command to the proc files.
Embodiment of above is merely to illustrate the present invention, and not limitation of the present invention, about the common of technical field
Technical staff, without departing from the spirit and scope of the present invention, it can also make a variety of changes and modification, thus it is all
Equivalent technical scheme falls within scope of the invention, and scope of patent protection of the invention should be defined by the claims.
Claims (6)
- A kind of 1. method of User space debugging linux kernel, it is characterised in that the described method comprises the following steps:S1:A proc file for being used to debug is created in kernel;S2:The debug command of user's input is received in User space, and the debug command is sent to the proc files;S3:The proc files are parsed to the debug command, and corresponding debugging function is performed according to analysis result, and will Debugging result is back to the User space;The proc files include:Debugging function function, the debugging function function are that debugging function performs function;Input function, input for receiving user and explain execution;Output function, for exporting debugging function function and parameter;The debug command includes:Command string and parameter, each command string with the debugging in the proc files Function pair should;Step S3 is specifically included:S301:The proc files parse to the debug command, to obtain the parameter and command string institute Corresponding debugging function;S302:The parameter is substituted into the debugging function and performs corresponding debugging function by the proc files, to be debugged As a result;S303:The debugging result is back to the User space by the proc files;Or,The debug command includes:Function name and parameter;Step S3 is specifically included:S311:The proc files parse to the debug command, right to obtain the parameter and function name institute The function address answered;S312:The function address is converted to function pointer by the proc files, and the parameter is substituted into the function and referred to Corresponding debugging function is performed in pin, to obtain debugging result;S313:The debugging result is back to the User space by the proc files.
- 2. the method as described in claim 1, it is characterised in that also include before step Sl:S0:The kernel module or kernel code of user's input are received in the User space;Step Sl is specifically included:The kernel module received or kernel code are compiled, to create one in interior core The individual proc files for being used to debug.
- 3. such as method according to any one of claims 1 to 2, it is characterised in that step S2 is specifically included:The debug command of user's input is received in User space, judges whether the user has administrator right, if so, then to institute State proc files and send the debug command.
- 4. a kind of system of User space debugging linux kernel, it is characterised in that the system includes:Creating unit, for creating a proc file for being used to debug in kernel;Transmitting element, the debugging is sent for receiving the debug command of user's input in User space, and to the proc files Order;Debugging unit is parsed, the debug command is parsed for the proc files, is performed according to analysis result corresponding Debugging function, and debugging result is back to the User space;The proc files include:Debugging function function, the debugging function function are that debugging function performs function;Input function, input for receiving user and explain execution;Output function, for exporting debugging function function and parameter;The debug command includes:Command string and parameter, each command string with the debugging in the proc files Function pair should;The parsing debugging unit specifically includes:Subelement is parsed, the debug command is parsed for the proc files, to obtain the parameter and the life Make the debugging function corresponding to character string;Subelement is debugged, the parameter is substituted into the debugging function for the proc files performs corresponding debugging function, To obtain debugging result:Subelement is returned, the debugging result is back to the User space for the proc files;Or,The debug command includes:Function name and parameter;The parsing debugging unit specifically includes:Subelement is parsed, the debug command is parsed for the proc files, to obtain the parameter and the letter Function address corresponding to several titles;Subelement is debugged, the function address is converted into function pointer for the proc files, and the parameter is substituted into Corresponding debugging function is performed in the function pointer, to obtain debugging result;Subelement is returned, the debugging result is back to the User space for the proc files.
- 5. system as claimed in claim 4, it is characterised in that the system also includes:Receiving unit, for receiving the kernel module or kernel code of user's input in the User space;Creating unit, is additionally operable to the kernel module that will receive or kernel code is compiled, to create one in interior core The individual proc files for being used to debug.
- 6. the system as any one of claim 4~5, it is characterised in that the transmitting element, be additionally operable in User space The debug command of user's input is received, judges whether the user has administrator right, if so, then being sent out to the proc files Send the debug command.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410251095.4A CN104050080B (en) | 2014-06-09 | 2014-06-09 | User space debugs the method and system of linux kernel |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410251095.4A CN104050080B (en) | 2014-06-09 | 2014-06-09 | User space debugs the method and system of linux kernel |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104050080A CN104050080A (en) | 2014-09-17 |
CN104050080B true CN104050080B (en) | 2017-11-28 |
Family
ID=51502966
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410251095.4A Active CN104050080B (en) | 2014-06-09 | 2014-06-09 | User space debugs the method and system of linux kernel |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104050080B (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104461815A (en) * | 2014-12-11 | 2015-03-25 | 深圳芯邦科技股份有限公司 | Chip debugging method and system-on-chip |
CN105094910A (en) * | 2015-07-31 | 2015-11-25 | 上海斐讯数据通信技术有限公司 | Driving function user state debugging system and method |
CN105159739A (en) * | 2015-08-24 | 2015-12-16 | 上海斐讯数据通信技术有限公司 | Method for storing application compiling information of Linux |
CN105204937B (en) * | 2015-10-28 | 2018-09-28 | 上海斐讯数据通信技术有限公司 | Kernel function call method, apparatus and operating system |
CN105760306A (en) * | 2016-03-10 | 2016-07-13 | 上海斐讯数据通信技术有限公司 | Command issuing method and system and debugging method |
CN107608717B (en) * | 2016-07-12 | 2021-02-12 | 迈普通信技术股份有限公司 | User mode information collection method, device and system |
CN108615545A (en) * | 2016-12-09 | 2018-10-02 | 北京京存技术有限公司 | EMMC adjustment methods and EMMC |
CN109684202B (en) * | 2018-11-27 | 2022-06-17 | 国电南瑞科技股份有限公司 | Method for debugging function in embedded system program in application |
CN111240683A (en) * | 2018-11-29 | 2020-06-05 | 熠智网络科技(上海)有限公司 | Embedded thermal programming method and system |
CN112965892B (en) * | 2019-12-12 | 2024-06-21 | 大唐移动通信设备有限公司 | Abnormal information acquisition method and device of software system, electronic equipment and medium |
CN112905472B (en) * | 2021-03-04 | 2024-08-13 | 黑芝麻智能科技(上海)有限公司 | Kernel debugging system and method |
CN114003487A (en) * | 2021-09-22 | 2022-02-01 | 中标软件有限公司 | Method for rapidly reproducing display card fault under linux system |
CN113835755B (en) * | 2021-09-24 | 2023-08-22 | 天津津航计算技术研究所 | Method for realizing serial port control console in operating system-free environment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101894069A (en) * | 2010-06-10 | 2010-11-24 | 中兴通讯股份有限公司 | Debugging method and device of early serial port printing in Linux |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020099953A1 (en) * | 2000-11-30 | 2002-07-25 | International Business Machines Corporation | Debugging of chipcards |
-
2014
- 2014-06-09 CN CN201410251095.4A patent/CN104050080B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101894069A (en) * | 2010-06-10 | 2010-11-24 | 中兴通讯股份有限公司 | Debugging method and device of early serial port printing in Linux |
Non-Patent Citations (1)
Title |
---|
Linux虚拟调试系统关键技术的研究与实现;舒长林;《中国优秀硕士学位论文全文数据库》;20110415;第7页第2.1节-第39页第3.5节 * |
Also Published As
Publication number | Publication date |
---|---|
CN104050080A (en) | 2014-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104050080B (en) | User space debugs the method and system of linux kernel | |
CN110096338B (en) | Intelligent contract execution method, device, equipment and medium | |
CN110716715B (en) | Application program development method, device, equipment and medium | |
US5600579A (en) | Hardware simulation and design verification system and method | |
Schmerl et al. | Discovering architectures from running systems | |
CN104346274B (en) | Program debugger and a kind of adjustment method of program | |
CN102117241A (en) | Multi-core system debugging method and multi-core system | |
CN112256321A (en) | Static library packaging method and device, computer equipment and storage medium | |
CN104461898A (en) | Application testing method, center control server, test terminal and system | |
CN110245467B (en) | Android application program protection method based on Dex2C and LLVM | |
CN113835945B (en) | Chip testing method, device, equipment and system | |
CN114610640B (en) | Fuzzy test method and system for trusted execution environment of Internet of things | |
CN112286746A (en) | Universal verification platform and method for AXI slave device interface | |
CN102480467A (en) | SOC (System on a Chip) software and hardware collaborative simulation verification method based on network communication protocol | |
CN110069259A (en) | Analytic method, device, electronic equipment and storage medium based on idl file | |
CN106933642B (en) | Application program processing method and processing device | |
CN110609703B (en) | Performance detection tool implementation method and device, readable storage medium and terminal equipment | |
EP2972880B1 (en) | Kernel functionality checker | |
CN111259042B (en) | Dynamic query method and system | |
CN117743145A (en) | Test script generation method and device based on coding template and processing equipment | |
Lauwaerts et al. | WARDuino: An embedded WebAssembly virtual machine | |
US8745605B2 (en) | Execution contexts with polymorphic type implementations | |
CN115022312B (en) | Method and device for realizing multi-intelligent contract engine, electronic equipment and storage medium | |
CN106843875A (en) | The method and apparatus of cross-platform transplanting Python programs | |
CN109783417A (en) | A kind of serial communication device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PP01 | Preservation of patent right |
Effective date of registration: 20180528 Granted publication date: 20171128 |
|
PP01 | Preservation of patent right | ||
PD01 | Discharge of preservation of patent |
Date of cancellation: 20240528 Granted publication date: 20171128 |
|
PD01 | Discharge of preservation of patent |