CN104050080B - User space debugs the method and system of linux kernel - Google Patents

User space debugs the method and system of linux kernel Download PDF

Info

Publication number
CN104050080B
CN104050080B CN201410251095.4A CN201410251095A CN104050080B CN 104050080 B CN104050080 B CN 104050080B CN 201410251095 A CN201410251095 A CN 201410251095A CN 104050080 B CN104050080 B CN 104050080B
Authority
CN
China
Prior art keywords
function
debugging
proc
kernel
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410251095.4A
Other languages
Chinese (zh)
Other versions
CN104050080A (en
Inventor
宁志明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Opzoon Technology Co Ltd
Original Assignee
Opzoon Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Opzoon Technology Co Ltd filed Critical Opzoon Technology Co Ltd
Priority to CN201410251095.4A priority Critical patent/CN104050080B/en
Publication of CN104050080A publication Critical patent/CN104050080A/en
Application granted granted Critical
Publication of CN104050080B publication Critical patent/CN104050080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a kind of method and system of User space debugging linux kernel, it is related to kernel debugging technology field, the described method comprises the following steps:S1:A proc file for being used to debug is created in kernel;S2:The debug command of user's input is received in User space, and the debug command is sent to the proc files;S3:The proc files parse to the debug command, perform corresponding debugging function according to analysis result, and debugging result is back into the User space.The present invention passes through the cooperation between each step, simply and easily realize the debugging to kernel, it can be run in any linux kernel version embedded environment, independent of host, compiled without complicated networking and configuration, after creating proc files in kernel, the simple debugging of kernel can be completed directly under Shell.

Description

User space debugs the method and system of linux kernel
Technical field
The present invention relates to kernel debugging technology field, more particularly to a kind of User space debugs the method for linux kernel and is System.
Background technology
As embedded device is more and more common, many functions are all developed inside linux kernel, i.e., function is realized Code be integrated in inside linux kernel, not as application program User space realize, can not thus be convenient to use The debugging acids such as GDB remove debugging positioning application program running state.Although there are the instruments such as such as KGDB and KDB to realize kernel tailoring Function, but use need change kernel code, debug needs environment be also relied on it is more.For example user wants to check kernel somewhere Whether the value of code is correct;Some chained list is traveled through, looks at that current chained list there are these simple debugging demands such as which value, uses these Instrument, which just seems, wastes one's talent on a petty job.
When using KGDB debugging kernels, one extra PC of this scene needs is as host, built-in equipment operation The GDB server, long-range PC of kernel are connected to embedded device by serial ports or netting twine, can so be adjusted in host Kernel is tried, checks internal memory, calls kernel function etc..But its shortcoming is that networking is more complicated, it is also necessary to extra PC hosts, structure The cumbersome completion debugging, it is necessary to which embedded device and host cooperate jointly of environment is built, sometimes not such environment Debugged for user.
When adding KDB support using KDB debugging kernels, the kernel of Linux highest versions, KDB and kernel are integrated in one Rise, by SysRq orders or other modes startup KDB, this spline kernel can stop User space, user KDB order line, The order of KDB supports can be performed, debugs kernel.But its shortcoming is if that the kernel comparison that sometimes user is used is old, KDB (kernel later 2.6.35 is just supported) is not supported then, or the patch for needing to beat KDB could be supported.
The content of the invention
To simplify the environment of debugging, and reduce the requirement to linux versions.
The invention provides a kind of method of User space debugging linux kernel, the described method comprises the following steps:
S1:A proc file for being used to debug is created in kernel;
S2:The debug command of user's input is received in User space, and the debug command is sent to the proc files;
S3:The proc files are parsed to the debug command, and corresponding debugging function is performed according to analysis result, And debugging result is back to the User space.
Wherein, the debug command includes:Command string and parameter, each command string with the proc files In debugging function pair should;
Step S3 is specifically included:
S301:The proc files parse to the debug command, to obtain the parameter and the command character The corresponding debugging function of string;
S302:The parameter is substituted into the debugging function and performs corresponding debugging function by the proc files, to obtain Debugging result;
S303:The debugging result is back to the User space by the proc files.
Wherein, the debug command includes:Function name and parameter;
Step S3 is specifically included:
S311:The proc files parse to the debug command, to obtain the parameter and the function name Corresponding function address;
S312:The function address is converted to function pointer by the proc files, and the parameter is substituted into the letter Corresponding debugging function is performed in number pointer, to obtain debugging result;
S313:The debugging result is back to the User space by the proc files.
Wherein, also include before step S1:
S0:The kernel module or kernel code of user's input are received in the User space;
Step S1 is specifically included:The kernel module received or kernel code are compiled, to create in interior core Build one be used for debug proc files.
Wherein, step S2 is specifically included:
The debug command of user's input is received in User space, judges whether the user has administrator right, if so, then The debug command is sent to the proc files.
The invention also discloses a kind of system of User space debugging linux kernel, the system includes:
Creating unit, for creating a proc file for being used to debug in kernel;
Transmitting element, for receiving the debug command of user's input in User space, and to described in proc files transmission Debug command;
Debugging unit is parsed, the debug command is parsed for the proc files, performed according to analysis result Corresponding debugging function, and debugging result is back to the User space.
Wherein, the debug command includes:Command string and parameter, each command string with the proc files In debugging function pair should;
The parsing debugging unit specifically includes:
Subelement is parsed, the debug command is parsed for the proc files, to obtain the parameter and institute State the debugging function corresponding to command string;
Subelement is debugged, the parameter is substituted into the debugging function for the proc files performs corresponding debugging work( Can, to obtain debugging result;
Subelement is returned, the debugging result is back to the User space for the proc files.
Wherein, the debug command includes:Function name and parameter;
The parsing debugging unit specifically includes:
Subelement is parsed, the debug command is parsed for the proc files, to obtain the parameter and institute State the function address corresponding to function name;
Subelement is debugged, the function address is converted into function pointer for the proc files, and by the parameter Substitute into the function pointer and perform corresponding debugging function, to obtain debugging result;
Subelement is returned, the debugging result is back to the User space for the proc files.
Wherein, the system also includes:
Receiving unit, for receiving the kernel module or kernel code of user's input in the User space;
Creating unit, is additionally operable to the kernel module that will receive or kernel code is compiled, to create in interior core Build one be used for debug proc files.
Wherein, the transmitting element, it is additionally operable to receive the debug command of user's input in User space, judges that the user is It is no that there is administrator right, if so, then sending the debug command to the proc files.
The present invention simply and easily realizes the debugging to kernel by the cooperation between each step, can be in any Linux Core version embedded environment is run, and independent of host, is compiled without complicated networking and configuration, proc files are created in kernel Afterwards, the simple debugging of kernel can be completed directly under Shell.
The present invention can also flexibly give debugger increase New function, or modification debugger it is functional.Because debugging is to utilize Linux kernel Proc files realize that debugger can be compiled as kernel module in itself.After having changed code, kernel is recompilated Module, then module loading is entered into kernel, it is possible to use new debugger code.
The present invention directly can call kernel function in User space, enhance tune by the function of dynamic call kernel function Try the availability of device.For example user directly can call the related debugging explicit function of kernel in User space, kernel some are checked State.
Brief description of the drawings
Fig. 1 is the method flow diagram of the User space debugging linux kernel of one embodiment of the present invention;
Fig. 2 is the system architecture diagram of the User space debugging linux kernel of one embodiment of the present invention.
Embodiment
With reference to the accompanying drawings and examples, the embodiment of the present invention is described in further detail.Implement below Example is used to illustrate the present invention, but is not limited to the scope of the present invention.
Proc is the Virtual File System that Linux is supported, user can create proc texts by kernel module or kernel code Corresponding file under part system, by writing I/O read/write functions corresponding to this document, the I/O operation of this document is encapsulated, so as to logical Cross this document and access some resources for checking kernel.
Idea of the invention is that:By creating debug proc files, this document is unified to realize all tune needed Trial work section, equivalent to one debugger, by writing the input/output function of this document, realizes desired debugging function.
Fig. 1 is the method flow diagram of the User space debugging linux kernel of one embodiment of the present invention;Reference picture 1, it is described Method comprises the following steps:
S1:A proc file for being used to debug is created in kernel;
S2:The debug command of user's input is received in User space, and the debug command is sent to the proc files;
S3:The proc files are parsed to the debug command, and corresponding debugging function is performed according to analysis result, And debugging result is back to the User space.
Debug, can be realized using the debug command of multiple format for ease of realizing, use two kinds of debug commands below Form, a kind of form for command string, another kind are the form of function name;
When the form using command string is to realize debugging, it is preferable that the debug command includes:Command string And parameter, each command string should with the debugging function pair in the proc files;
Step S3 is specifically included:
S301:The proc files parse to the debug command, to obtain the parameter and the command character The corresponding debugging function of string;
S302:The parameter is substituted into the debugging function and performs corresponding debugging function by the proc files, to obtain Debugging result;
S303:The debugging result is back to the User space by the proc files.
When the form using function name is to realize debugging, it is preferable that the debug command includes:Function name and ginseng Number;
Step S3 is specifically included:
S311:The proc files parse to the debug command, to obtain the parameter and the function name Corresponding function address;
S312:The function address is converted to function pointer by the proc files, and the parameter is substituted into the letter Corresponding debugging function is performed in number pointer, to obtain debugging result;
S313:The debugging result is back to the User space by the proc files.
Embodiment 1
The present invention is illustrated with specific embodiment below, but does not limit protection scope of the present invention.To realize The function of proc files is stated, the composition of the proc files can be roughly divided into following three part:
One:Each debugging function subfunction, these functions perform function for small debugging function, can individually write.Such as check The debugging function of internal memory, the debugging function of internal memory is changed, call the debugging function of kernel function, check the debugging letter of CPU information Number etc..Each debugging function, has executable debugging function, also has this function pair to answer a command string, such as:
md:Internal memory (memory display) is checked, it is corresponding to debug function mem_read.
mm:Change internal memory (memory modify), respective function mem_modify.
call:Perform and call kernel function (call function), respective function call_functon.
The input function of proc files is found corresponding debugging function subfunction, performed corresponding by corresponding character string Debugging function.
Two:This proc files input (write) function.Receive user to input and explain execution.Its functional sequence is as follows:
(1) receives the character string debug command for explaining that User space transmits.
(2) resolves to the character string debug command that User space transmits the implication of debugger understanding.
(3) finds corresponding debugging function function, the parameter of User space input is passed according to the analysis result of second step Enter debugging function function and perform.
Three:This proc exports (read) function.Export the debugging function function and parameter of this proc supports.
Embodiment 2
Illustrate the present invention by taking the form of command string as an example below, but do not limit protection scope of the present invention.In reality On the basis of applying example 1, User space input, the output of this proc files, it can be realized with echo the and cat orders that Linux is carried. Such as the entitled debug_proc of this proc files, under/proc/debug_proc catalogues.
User wants to check the internal memory of kernel address, such as the internal memory of 0xffff1234 addresses by debug_proc.
Check that User space input is " md " corresponding to internal memory, then inputs in Linux Shell
echo md 0xffff1234>/ proc/debug_proc,
Thus equivalent to by " this character string of md 0xffff1234 ", write-in/proc/debug_proc files.As for What can occur after write-in, the input function by debug_proc goes to explain completely.
For the debug_proc of the present invention, it is as follows that input function performs flow:
(1) receive User space input " md 0xffff1234 " character strings, is separator by space or Tab, by character string It is divided into " md " and " 0xffff1234 "
(2) md orders are to check the order of internal memory, and input parameter is memory address, and debug_proc input function will Character string " 0xffff1234 " is converted to 32 bit variable 0xffff1234, by character string " md ", finds the tune for checking internal memory Try the function pointer of power function.Such as entitled mem_read functions
(3) 0xffff1234 is passed to mem_read functions, calls and perform.Mem_read functions are with reading 0xffff1234 Internal memory at location, by printk, dump is exported to User space.
Embodiment 3
Illustrate the present invention by taking the form of command string as an example below, but do not limit protection scope of the present invention.In reality On the basis of applying example 1, user checks the debugging function function of internal memory calling, or during other debugging function functions, it is not necessary to it is defeated Enter complete virtual address, the address of kernel variable can be obtained by inputting the title of kernel variable, this is by debug_ Proc input function is realized.
For example the variable net_dev_list of kernel address is 0xffff1234, user inputs echo md net_ dev_list>/proc/debug_proc
" md net_dev_list " are by the way that character string " net_dev_list " is passed for the input of input function reception User space Enter kallsyms_lookup_name functions, return value is exactly the address of the kernel variable in kernel, i.e. 0xffff1234, and this is just Greatly facilitate debugging.The premise that can so do is that the linux kernel of debugging opens kallsyms's when compiling and configuring Support.
In order to further illustrate the completeness of proc files, you can to realize the function of many debuggers, now by modification The realization of the mem_modify debugging functions function and the call_function debugging function functions of calling kernel function deposited is brief It is described as follows:
(1) mem_modify debugging functions function realizes explanation
Mem_modify debugging functions function is the function of modification kernel internal memory, and its input parameter is for the internal memory to be changed Location, and the content and length of the value of modification.For example user thinks that the value of 128 bytes is backward at modification 0xffff1234 addresses 0x12, then inputted in shell
echo mm0xffff1234 0x12 128>/proc/debug_proc
Debug_proc finds mem_modify functions, by " 0x,fff,f12,340,x12 128 " is passed to according to mm Mem_modify functions.
Its function of mem_modify is realized as follows:
(1) input of User space is changed, character string " 0xffff1234 " is converted into numerical value 0xffff1234, character string " 0x12 " is converted to numerical value 0x12, and character string " 128 " is converted to numerical value 128.
(2) detect whether 0xffff1234 addresses are legal addressable address, because debugging function is run in kernel, such as Fruit address illegally can be abnormal, so whether need to first detect address legal.
(3) memset (0xffff1234,0x12,128) function is called, by 128 byte backward at 0xffff1234 addresses Value be all revised as 0x12.This completes the function to kernel modifications internal memory.
(2) call_function debugging functions function realizes explanation
Call_function debugging functions function is the function name and parameter inputted according to user, and it is right in kernel to perform The function answered.Here a key point has two:One be how according to function name obtain function execution address, in addition How one be according to the address of function, goes to perform this function.
The function name that first key point can be passed to according to User space, parameter is used as using string format.Call Kallsyms_lookup_name functions, return value are the address of function.I.e. this function performs the position of first instruction.
The function address that second key point can return according to previous step, converts the address into specific function pointer, The incoming parameter of this function pointer is all unsigned long types, and the number of parameters that function pointer is received is then user The number of parameters of state input, return value is also unsigned long types.For example the parameter of User space input is two, then will The address conversion that the first step returns is following function pointer type:
unsigned long(*funccall_2)(unsigned long,unsigned long)
Then the parameter being again passed to User space is passed to as the parameter of this function pointer, calls this function pointer, Corresponding function can be called.
The principle of the method for call function, which can so be realized, is:C language function call, for most parameters type (char, short, int, long, pointer), parameter is incoming be as a unsinged long type width it is incoming.Again By the function really performed, parameter is taken out from register or storehouse, be converted to corresponding to really (char, short, Int, long, pointer) type.When string format is as parameter, and as pointer transmission, the method for this Transfer Parameters Also it is out of question.For float and double types, this method slightly has problem, but consider kernel be rarely employed float and Double, therefore this scene can almost be ignored, without considering.
Illustrate the execution of lower call_function debugging functions function with an example below, for example want to perform kernel Function test_func, think that incoming function parameter " hello world ", that is, is wanted to hold for 123, devlock address and character string OK:test_func(123,&devlock,“hello world”)
Then user performs and kernel execution flow is:
(1) user inputs in shell
echo call test_func 123 devlock\”hello world\”>/proc/debug_proc
Here hello world or so add ", be to pass through ", tell the debug_proc input functions of kernel, input character The beginning and end of string, and in echo, input " need input carry out escape.
(2) kernel obtains the character string " devlock " hello of call test_func 123 of User space input World " ", user is obtained according to call and is intended to perform call_function debugging function functions;Call kallsyms_ Lookup_name (" test_func ") obtains test_func function address;
Character string " 123 " is converted into numeral 123, calls kallsyms_lookup_name (" devlock ") to obtain The address of devlock variables;Store that " address of hello world " character strings, respective code example are with temporary variable:
Unsigned long funcargv [16]={ 0 };
Funcargv [0]=kallsyms_lookup_name (" test_func ");
Funcargv [1]=atoi (" 123 ");
Funcargv [2]=kallsyms_lookup_name (" devlock ");
Funcargv [3]=(unsigned long) " hello world ";
(3) debug_proc input function judges that user have input 123, devlock, " three ginsengs of hello world " Number, then by test_func obtained in the previous step function address, be i.e. funcargv [0], be converted to following types of function and refer to Pin, for example, typedef for new type:
typedef unsigned long(*funccall_3)(unsigned long,unsigned long, unsigned long);
(4) call the function pointer after conversion to perform, function parameter is passed to successively.Test_func can be directly invoked Function.Specific execution code is as follows:
*((funccall_3)funcargv[0])(funcargv[1],funcargv[2],funcargv[3]);
(5) after tested, this method and function test_func (123 , &devlock, " hello world ") is directly invoked Effect be the same.This has just reached the purpose that kernel function is called in User space.Realize in User space call function Function, this practicality for going to debug the method for kernel by the input of proc files just greatly strengthen.
On the basis of any one of above-described embodiment 1~3, for ease of establishing the proc files for debugging, it is preferable that Also include before step S1:
S0:The kernel module or kernel code of user's input are received in the User space;
Step S1 is specifically included:The kernel module received or kernel code are compiled, to create in interior core Build one be used for debug proc files.
On the basis of any one of above-described embodiment 1~3, in order to ensure security, it is preferable that step S2 is specifically wrapped Include:
The debug command of user's input is received in User space, judges whether the user has administrator right, if so, then The debug command is sent to the proc files.
The invention also discloses a kind of system of User space debugging linux kernel, reference picture 2, the system to include:
Creating unit, for creating a proc file for being used to debug in kernel;
Transmitting element, for receiving the debug command of user's input in User space, and to described in proc files transmission Debug command;
Debugging unit is parsed, the debug command is parsed for the proc files, performed according to analysis result Corresponding debugging function, and debugging result is back to the User space.
Preferably, the debug command includes:Command string and parameter, each command string are literary with the proc Debugging function pair in part should;
The parsing debugging unit specifically includes:
Subelement is parsed, the debug command is parsed for the proc files, to obtain the parameter and institute State the debugging function corresponding to command string;
Subelement is debugged, the parameter is substituted into the debugging function for the proc files performs corresponding debugging work( Can, to obtain debugging result;
Subelement is returned, the debugging result is back to the User space for the proc files.
Preferably, the debug command includes:Function name and parameter;
The parsing debugging unit specifically includes:
Subelement is parsed, the debug command is parsed for the proc files, to obtain the parameter and institute State the function address corresponding to function name;
Subelement is debugged, the function address is converted into function pointer for the proc files, and by the parameter Substitute into the function pointer and perform corresponding debugging function, to obtain debugging result;
Subelement is returned, the debugging result is back to the User space for the proc files.
Preferably, the system also includes:
Receiving unit, for receiving the kernel module or kernel code of user's input in the User space;
Creating unit, is additionally operable to the kernel module that will receive or kernel code is compiled, to create in interior core Build one be used for debug proc files.
Preferably, the transmitting element, it is additionally operable to receive the debug command of user's input in User space, judges the user Whether there is administrator right, if so, then sending the debug command to the proc files.
Embodiment of above is merely to illustrate the present invention, and not limitation of the present invention, about the common of technical field Technical staff, without departing from the spirit and scope of the present invention, it can also make a variety of changes and modification, thus it is all Equivalent technical scheme falls within scope of the invention, and scope of patent protection of the invention should be defined by the claims.

Claims (6)

  1. A kind of 1. method of User space debugging linux kernel, it is characterised in that the described method comprises the following steps:
    S1:A proc file for being used to debug is created in kernel;
    S2:The debug command of user's input is received in User space, and the debug command is sent to the proc files;
    S3:The proc files are parsed to the debug command, and corresponding debugging function is performed according to analysis result, and will Debugging result is back to the User space;
    The proc files include:Debugging function function, the debugging function function are that debugging function performs function;
    Input function, input for receiving user and explain execution;
    Output function, for exporting debugging function function and parameter;
    The debug command includes:Command string and parameter, each command string with the debugging in the proc files Function pair should;
    Step S3 is specifically included:
    S301:The proc files parse to the debug command, to obtain the parameter and command string institute Corresponding debugging function;
    S302:The parameter is substituted into the debugging function and performs corresponding debugging function by the proc files, to be debugged As a result;
    S303:The debugging result is back to the User space by the proc files;
    Or,
    The debug command includes:Function name and parameter;
    Step S3 is specifically included:
    S311:The proc files parse to the debug command, right to obtain the parameter and function name institute The function address answered;
    S312:The function address is converted to function pointer by the proc files, and the parameter is substituted into the function and referred to Corresponding debugging function is performed in pin, to obtain debugging result;
    S313:The debugging result is back to the User space by the proc files.
  2. 2. the method as described in claim 1, it is characterised in that also include before step Sl:
    S0:The kernel module or kernel code of user's input are received in the User space;
    Step Sl is specifically included:The kernel module received or kernel code are compiled, to create one in interior core The individual proc files for being used to debug.
  3. 3. such as method according to any one of claims 1 to 2, it is characterised in that step S2 is specifically included:
    The debug command of user's input is received in User space, judges whether the user has administrator right, if so, then to institute State proc files and send the debug command.
  4. 4. a kind of system of User space debugging linux kernel, it is characterised in that the system includes:
    Creating unit, for creating a proc file for being used to debug in kernel;
    Transmitting element, the debugging is sent for receiving the debug command of user's input in User space, and to the proc files Order;
    Debugging unit is parsed, the debug command is parsed for the proc files, is performed according to analysis result corresponding Debugging function, and debugging result is back to the User space;
    The proc files include:Debugging function function, the debugging function function are that debugging function performs function;
    Input function, input for receiving user and explain execution;
    Output function, for exporting debugging function function and parameter;
    The debug command includes:Command string and parameter, each command string with the debugging in the proc files Function pair should;
    The parsing debugging unit specifically includes:
    Subelement is parsed, the debug command is parsed for the proc files, to obtain the parameter and the life Make the debugging function corresponding to character string;
    Subelement is debugged, the parameter is substituted into the debugging function for the proc files performs corresponding debugging function, To obtain debugging result:
    Subelement is returned, the debugging result is back to the User space for the proc files;
    Or,
    The debug command includes:Function name and parameter;
    The parsing debugging unit specifically includes:
    Subelement is parsed, the debug command is parsed for the proc files, to obtain the parameter and the letter Function address corresponding to several titles;
    Subelement is debugged, the function address is converted into function pointer for the proc files, and the parameter is substituted into Corresponding debugging function is performed in the function pointer, to obtain debugging result;
    Subelement is returned, the debugging result is back to the User space for the proc files.
  5. 5. system as claimed in claim 4, it is characterised in that the system also includes:
    Receiving unit, for receiving the kernel module or kernel code of user's input in the User space;
    Creating unit, is additionally operable to the kernel module that will receive or kernel code is compiled, to create one in interior core The individual proc files for being used to debug.
  6. 6. the system as any one of claim 4~5, it is characterised in that the transmitting element, be additionally operable in User space The debug command of user's input is received, judges whether the user has administrator right, if so, then being sent out to the proc files Send the debug command.
CN201410251095.4A 2014-06-09 2014-06-09 User space debugs the method and system of linux kernel Active CN104050080B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410251095.4A CN104050080B (en) 2014-06-09 2014-06-09 User space debugs the method and system of linux kernel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410251095.4A CN104050080B (en) 2014-06-09 2014-06-09 User space debugs the method and system of linux kernel

Publications (2)

Publication Number Publication Date
CN104050080A CN104050080A (en) 2014-09-17
CN104050080B true CN104050080B (en) 2017-11-28

Family

ID=51502966

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410251095.4A Active CN104050080B (en) 2014-06-09 2014-06-09 User space debugs the method and system of linux kernel

Country Status (1)

Country Link
CN (1) CN104050080B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104461815A (en) * 2014-12-11 2015-03-25 深圳芯邦科技股份有限公司 Chip debugging method and system-on-chip
CN105094910A (en) * 2015-07-31 2015-11-25 上海斐讯数据通信技术有限公司 Driving function user state debugging system and method
CN105159739A (en) * 2015-08-24 2015-12-16 上海斐讯数据通信技术有限公司 Method for storing application compiling information of Linux
CN105204937B (en) * 2015-10-28 2018-09-28 上海斐讯数据通信技术有限公司 Kernel function call method, apparatus and operating system
CN105760306A (en) * 2016-03-10 2016-07-13 上海斐讯数据通信技术有限公司 Command issuing method and system and debugging method
CN107608717B (en) * 2016-07-12 2021-02-12 迈普通信技术股份有限公司 User mode information collection method, device and system
CN108615545A (en) * 2016-12-09 2018-10-02 北京京存技术有限公司 EMMC adjustment methods and EMMC
CN109684202B (en) * 2018-11-27 2022-06-17 国电南瑞科技股份有限公司 Method for debugging function in embedded system program in application
CN111240683A (en) * 2018-11-29 2020-06-05 熠智网络科技(上海)有限公司 Embedded thermal programming method and system
CN112965892B (en) * 2019-12-12 2024-06-21 大唐移动通信设备有限公司 Abnormal information acquisition method and device of software system, electronic equipment and medium
CN112905472B (en) * 2021-03-04 2024-08-13 黑芝麻智能科技(上海)有限公司 Kernel debugging system and method
CN114003487A (en) * 2021-09-22 2022-02-01 中标软件有限公司 Method for rapidly reproducing display card fault under linux system
CN113835755B (en) * 2021-09-24 2023-08-22 天津津航计算技术研究所 Method for realizing serial port control console in operating system-free environment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894069A (en) * 2010-06-10 2010-11-24 中兴通讯股份有限公司 Debugging method and device of early serial port printing in Linux

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020099953A1 (en) * 2000-11-30 2002-07-25 International Business Machines Corporation Debugging of chipcards

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894069A (en) * 2010-06-10 2010-11-24 中兴通讯股份有限公司 Debugging method and device of early serial port printing in Linux

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Linux虚拟调试系统关键技术的研究与实现;舒长林;《中国优秀硕士学位论文全文数据库》;20110415;第7页第2.1节-第39页第3.5节 *

Also Published As

Publication number Publication date
CN104050080A (en) 2014-09-17

Similar Documents

Publication Publication Date Title
CN104050080B (en) User space debugs the method and system of linux kernel
CN110096338B (en) Intelligent contract execution method, device, equipment and medium
CN110716715B (en) Application program development method, device, equipment and medium
US5600579A (en) Hardware simulation and design verification system and method
Schmerl et al. Discovering architectures from running systems
CN104346274B (en) Program debugger and a kind of adjustment method of program
CN102117241A (en) Multi-core system debugging method and multi-core system
CN112256321A (en) Static library packaging method and device, computer equipment and storage medium
CN104461898A (en) Application testing method, center control server, test terminal and system
CN110245467B (en) Android application program protection method based on Dex2C and LLVM
CN113835945B (en) Chip testing method, device, equipment and system
CN114610640B (en) Fuzzy test method and system for trusted execution environment of Internet of things
CN112286746A (en) Universal verification platform and method for AXI slave device interface
CN102480467A (en) SOC (System on a Chip) software and hardware collaborative simulation verification method based on network communication protocol
CN110069259A (en) Analytic method, device, electronic equipment and storage medium based on idl file
CN106933642B (en) Application program processing method and processing device
CN110609703B (en) Performance detection tool implementation method and device, readable storage medium and terminal equipment
EP2972880B1 (en) Kernel functionality checker
CN111259042B (en) Dynamic query method and system
CN117743145A (en) Test script generation method and device based on coding template and processing equipment
Lauwaerts et al. WARDuino: An embedded WebAssembly virtual machine
US8745605B2 (en) Execution contexts with polymorphic type implementations
CN115022312B (en) Method and device for realizing multi-intelligent contract engine, electronic equipment and storage medium
CN106843875A (en) The method and apparatus of cross-platform transplanting Python programs
CN109783417A (en) A kind of serial communication device and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20180528

Granted publication date: 20171128

PP01 Preservation of patent right
PD01 Discharge of preservation of patent

Date of cancellation: 20240528

Granted publication date: 20171128

PD01 Discharge of preservation of patent