CN107656753A - A kind of patch-realizing method and device - Google Patents
A kind of patch-realizing method and device Download PDFInfo
- Publication number
- CN107656753A CN107656753A CN201610595842.5A CN201610595842A CN107656753A CN 107656753 A CN107656753 A CN 107656753A CN 201610595842 A CN201610595842 A CN 201610595842A CN 107656753 A CN107656753 A CN 107656753A
- Authority
- CN
- China
- Prior art keywords
- patch
- file
- address
- symbol
- function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The invention provides a kind of patch-realizing method, this method includes:Patch file is generated according to the symbol place file that section is relocated by patch function and patch and offset address of extraction, for the internal memory regional address that patch file is reserved, and the patch file is loaded onto internal memory, wherein, the place file, the offset address and for the patch file reserve memory field address information be stored in the symbol table of image file and dynamic library file;Obtain the absolute address of the symbol of reorientation section in the patch file;Specified bytes jump instruction area is constructed in the reserved memory field according to the absolute address, wherein, the jump instruction area is used for the address that current execute instruction jumps to aiming symbol in reorientation list item;Change it is described by patch function entry instruction to jump to the patch function in the patch file.
Description
Technical field
The present invention relates to communication and computer realm, more particularly to a kind of patch-realizing method and device.
Background technology
Software version usually needs patch in the case of not restarting equipment in use, to current software version
Defect is modified, the embedded system being widely used at present, and one side image release file uses static linkage, symbolic address
It is fixing address after compiling, will not changes, another aspect software size because of the difference of loading sequence and loading equipemtn
Smaller, it is all that short address redirects (within 32M) to be redirected between code segment and data segment, and function is completed using the short can that redirects
Between calling.According to the two of current embedded system features, dynamic patch technology is replaced by patch function sequence
First instruction of speech part, is revised as jump instruction, and code segment performs where jumping to repair function, to realize a pair event
Hinder the replacement of function.But increase and modular use with built-in system software scale, dynamic base are applied to
For inevitable development trend, current patch makes and occupation mode to function failure in dynamic base due to the fact that can not carry out
Dynamic patch reparation, on the one hand because the address of dynamic base loading has uncertainty, same image release running paper exists
In different equipment, the address of dynamic base loading also can be inconsistent, so can not confirm patch when patch file is made
Memory address where function, it can not also confirm to relocate the memory address of option in patch function, on the other hand due to insertion
The increasingly increase of formula system software scale, code segment in software, data segment address realm will be beyond the big of short address (32M)
It is small, when the jump instruction of reorientation is so changed in dynamic patch, it finds that address size exceedes range of instructions, single instrction
Redirecting to go wrong.For problem above, effective solution is not yet proposed at present.
The content of the invention
The invention provides a kind of patch method and device, with least in the prior art thus make patch file when
Time can not confirm the memory address where patch function, can not also confirm to relocate the memory address of option in patch function, soft
Code segment, the address realm of data segment will exceed the size of short address (32M) in part, and causing can not be to function event in dynamic base
Barrier carries out the problem of patch reparation.
According to an aspect of the present invention, there is provided, a kind of patch method, including according to extraction by patch function and patch weight
File and offset address where the symbol of positioning section, patch file is generated for the internal memory regional address that patch file is reserved, and will
The patch file is loaded onto internal memory, wherein, the place file, the offset address and for the patch file reserve
Memory field address information is stored in the symbol table of image file and dynamic library file;Obtain reorientation section in the patch file
Symbol absolute address;Specified bytes jump instruction area is constructed in the reserved memory field according to the absolute address,
Wherein, the jump instruction area is used for the address that current execute instruction jumps to aiming symbol in reorientation list item;Described in modification
By patch function entry instruction to jump to the patch function in the patch file.
Further, methods described, which also includes patch file, also includes patch function information, wherein the patch function is believed
Breath includes code segment, data segment, read-only data section, relocates segment information.
Further, methods described is also extracted from patch function file destination including the patch function information and obtained.
Further, methods described also refers to including described constructed according to the absolute address in the reserved memory field
Determining byte jump instruction area includes:Code segment and data segment are constructed according to the absolute address, jumped with obtaining the specified bytes
Turn instruction area;Wherein, the code segment includes adding 8 content to be assigned to IP registers in PC registers, by the content of IP registers
It is assigned to PC registers;The data segment adds 4 including current address, call function address.
Further, the methods described also length including the specified bytes jump instruction area is 16 bytes.
Further, methods described, which also includes the patch file, also includes patch management head, wherein the patch pipe
Managing head includes patch release number, patch name, patch generation time and patch check code information.
Further, methods described also includes the absolute address bag for obtaining the symbol of reorientation section in the patch file
Include:If the symbol in the patch file in reorientation section is external symbol, the symbol is obtained in image file or dynamic base
Relative address in file;After the patch file is loaded into target pusher side, the relative address adds the image file
Or the absolute address of dynamic library file first address with obtain in the patch file relocate section symbol absolute address.
According to another aspect of the present invention, a kind of patch realization device is additionally provided, including, generation module, for basis
The symbol place file that section is relocated by patch function and patch and offset address of extraction, the internal memory reserved for patch file
Regional address generates patch file, and the patch file is loaded onto into internal memory, wherein, the place file, the offset address
And it is stored in for the memory field address information that the patch file is reserved in the symbol table of image file and dynamic library file;Obtain
Modulus block, for obtaining the absolute address for the symbol that section is relocated in the patch file;Constructing module, for according to described exhausted
Specified bytes jump instruction area is constructed in the reserved memory field to address, wherein, the jump instruction area is used for ought
Preceding execute instruction jumps to the address of aiming symbol in reorientation list item;Modified module, described entered for changing by patch function
Mouth is instructed to jump to the patch function in the patch file.
Further, the acquisition module includes:First acquisition unit, for being relocated in the patch file in section
Symbol when being external symbol, obtain relative address of the symbol in image file or dynamic library file;Second obtains list
Member is after the patch file is loaded into target pusher side, and the relative address is plus the image file or the first ground of dynamic library file
The absolute address of location with obtain in the patch file relocate section symbol absolute address.
Further, the constructing module is additionally operable to construct code segment and data segment according to the absolute address, to obtain
The specified bytes jump instruction area;Wherein, the code segment includes adding 8 content to be assigned to IP registers in PC registers, will
The content of IP registers is assigned to PC registers;The data segment adds 4 including current address, call function address.
The present invention is by searching the symbol table in image release file and dynamic library file, using finding by patch letter
File where number and the symbol of patch reorientation section and offset address, it is the memory field address information generation that patch file is reserved
Patch file;And the jump instruction area of a specified bytes is constructed in patch storage region reserved location when loading patch
Mode, with solve the problems, such as current patch can not in dynamic base function failure carry out patch reparation.
Brief description of the drawings
Fig. 1 is patch-realizing method flow chart according to embodiments of the present invention;
Fig. 2 is patch realization device structured flowchart according to embodiments of the present invention;
Fig. 3 is the schematic diagram according to embodiments of the present invention based on arm processor dynamic base patch complete procedure
Fig. 4 is a kind of structural representation of patch file according to embodiments of the present invention;
Fig. 5 is that patch area according to embodiments of the present invention forms schematic diagram;
Fig. 6 is that instruction according to embodiments of the present invention redirects area's schematic diagram;
Fig. 7 is function call schematic flow sheet according to embodiments of the present invention
Embodiment
Describe the present invention in detail below with reference to accompanying drawing and in conjunction with the embodiments.It should be noted that do not conflicting
In the case of, the feature in embodiment and embodiment in the application can be mutually combined.
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, "
Two " etc. be for distinguishing similar object, without for describing specific order or precedence.
According to an aspect of the present invention, there is provided a kind of patch-realizing method, Fig. 1 are patches according to embodiments of the present invention
Implementation method flow chart, as shown in figure 1, this method includes
S102:According to symbol place file and the offset address that section is relocated by patch function and patch of extraction, it is
The reserved internal memory regional address generation patch file of patch file, and the patch file is loaded onto internal memory, wherein, the place
File, the offset address and for the patch file reserve memory field address information be stored in image file and dynamic base
In the symbol table of file;
S104:Obtain the absolute address of the symbol of reorientation section in the patch file;According to the absolute address in institute
State and specified bytes jump instruction area is constructed in reserved memory field, wherein, the jump instruction area is jumped for current execute instruction
Go to the address of aiming symbol in reorientation list item;
S106:Change it is described by patch function entry instruction to jump to the patch function in the patch file.Tradition
Method because only that static compilation could confirm functional symbol load address in compiling, therefore may be only available in static library
Patch function, and the present invention is obtained by patch function and benefit by the lookup to image file and the symbol table of dynamic library file
File and offset address where the symbol of fourth reorientation section, image file and dynamic library text are added according to obtained offset address
First address after part loading obtains the absolute address of functional symbol, so as to solve this technical problem, the present invention is supported
Dynamic base patch.
Further, methods described, which also includes patch file, also includes patch function information, wherein the patch function is believed
Breath includes code segment, data segment, read-only data section, relocates segment information.
Further, methods described is also extracted from patch function file destination including the patch function information and obtained.
In general information can obtain from the file destination of patch function, but directly extraction is by the related section of patch function
Hold and feasible.
Further, methods described also refers to including described constructed according to the absolute address in the reserved memory field
Determining byte jump instruction area includes:Code segment and data segment are constructed according to the absolute address, jumped with obtaining the specified bytes
Turn instruction area;Wherein, the code segment includes adding 8 content to be assigned to IP registers in PC registers, by the content of IP registers
It is assigned to PC registers;The data segment adds 4 including current address, call function address.
Further, the methods described also length including the specified bytes jump instruction area is 16 bytes.Support 4G's
Addressing range, the embedded OS for current 32 have been enough, but can also subsequently increase byte length so as to
Improve addressing range.
Further, methods described, which also includes the patch file, also includes patch management head, wherein the patch pipe
Managing head includes patch release number, patch name, patch generation time and patch check code information.
Further, methods described also includes the absolute address for obtaining the symbol of reorientation section in the patch file, bag
Include:If the symbol in the patch file in reorientation section is external symbol, the symbol is obtained in image file or dynamic base
Relative address in file;After the patch file is loaded into target pusher side, the relative address adds the image file
Or the absolute address of dynamic library file first address with obtain in the patch file relocate section symbol absolute address.
According to another aspect of the present invention, a kind of patch realization device is additionally provided, Fig. 2 is according to embodiments of the present invention
Patch realization device structured flowchart, including:Generation module 22 as shown in Figure 2, for according to extraction by patch function and patch
File where relocating the symbol of section and offset address, it is that the internal memory regional address that patch file is reserved generates patch file, and
The patch file is loaded onto internal memory, wherein, the place file, the offset address and reserve for the patch file
Memory field address information be stored in the symbol table of image file and dynamic library file;Acquisition module 24, it is described for obtaining
The absolute address of the symbol of reorientation section in patch file;Constructing module, for according to the absolute address described reserved
Specified bytes jump instruction area is constructed in memory field, wherein, the jump instruction area is used to current execute instruction jumping to weight
Position the address of aiming symbol in list item;Modified module 26, for change it is described by patch function entry instruction to jump to
State the patch function in patch file.
Further, the acquisition module includes:First acquisition unit, for being relocated in the patch file in section
Symbol when being external symbol, obtain relative address of the symbol in image file or dynamic library file;Second obtains list
Member is after the patch file is loaded into target pusher side, and the relative address is plus the image file or the first ground of dynamic library file
The absolute address of location with obtain in the patch file relocate section symbol absolute address.
Further, the constructing module is additionally operable to construct code segment and data segment according to the absolute address, to obtain
The specified bytes jump instruction area, Fig. 3 are the jump instruction area schematic diagrames of the embodiment of the present invention, as shown in Figure 3;The code
Section includes adding 8 content to be assigned to IP registers in PC registers, and the content of IP registers is assigned into PC registers;The data segment
Including current address plus 4, call function address.
The present invention is further described with the specific embodiment of an other patch-realizing method below, the present invention is another
Preferred embodiment is the concrete application below arm processor system environments as this patch-realizing method, it is clear that described
Embodiment is part of the embodiment of the present invention, rather than whole embodiments.
Fig. 3 is the schematic diagram according to embodiments of the present invention based on arm processor dynamic base patch complete procedure, as schemed institute
Show, this example needs the steps as follows:
S302 reserved patch when compiling treats that patch installing program compiles image release file, for depositing in patch
Hold, the code segment of such as described patch function, read-only data section section, patch function information, relocation information;Alternatively, the benefit
Fourth area is when there is patch file to need loading, dynamic assigning memory space.Using the dynamic assigning memory space address as patch
Area originates absolute address, recalculates and section symbol is relocated in the patch file resets place value.
The source code that goes wrong of S304 modifications, extract to by the related section content of patch function, forming new patch letter
Number file destination;New patch function file destination can not also be generated, is proceeded as follows.
S306 reads the symbol table in former image release file and dynamic library file, finds by patch function and patch function
File and relative offset address in related relocation table where the symbol of each list item, and record;By step (2) Suo Shu
The each section of information extracted with this record in patch function file destination, plus patch management head, form mend together
Fourth file, Fig. 4 are a kind of structural representations of patch file according to embodiments of the present invention;In the embedded system being currently running
In, the patch file of generation is downloaded, reads patch file content respectively, being deposited into corresponding position, Fig. 5 in reserved patch is
Patch area according to embodiments of the present invention forms schematic diagram;
The address that S308 lookup process main program and each dynamic library file store in the process virtual internal memory, calculate and mend
Absolute memory address of the patch function and reorientation list item recorded in fourth file in by patching process;
The jump instruction area that S310 constructs 16 bytes in patch reserved area is used as middle springboard, jump instruction area reality
Aiming symbol address in reorientation list item now is jumped to from current location, stores the absolute address of aiming symbol, then modification needs
The command content where item is relocated, it is relatively branched to jump instruction area, Fig. 6 is instruction according to embodiments of the present invention
Redirect area's schematic diagram;
S312:16 bytes before patch function in main program or dynamic base (4 instructions) are replaced with jump instruction area
Hold so that when patching process is run to by patch function, instruction can be jumped directly in amended patch function
Fig. 7 is function call schematic flow sheet according to embodiments of the present invention, as shown in fig. 7, the embodiment of the present invention is completed
Realization to dynamic library file patch, solve in the prior art without the technical problem solved.
Obviously, those skilled in the art should be understood that above-mentioned each module of the invention or each step can be with general
Computing device realize that they can be concentrated on single computing device, or be distributed in multiple computing devices and formed
Network on, alternatively, they can be realized with the program code that computing device can perform, it is thus possible to they are stored
Performed in the storage device by computing device, and in some cases, can be with different from shown in order execution herein
The step of going out or describing, they are either fabricated to each integrated circuit modules respectively or by multiple modules in them or
Step is fabricated to single integrated circuit module to realize.So, the present invention is not restricted to any specific hardware and software combination.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies
Change, equivalent substitution, improvement etc., should be included in the scope of the protection.
Claims (10)
1. a kind of patch-realizing method, it is characterised in that this method includes:
According to where extraction relocates the symbol of section by patch function and patch file and offset address, for patch file it is pre-
The internal memory regional address generation patch file stayed, and is loaded onto internal memory by the patch file, wherein, it is the place file, described
Offset address and the symbol that image file and dynamic library file are stored in for the memory field address information that the patch file is reserved
In number table;
Obtain the absolute address of the symbol of reorientation section in the patch file;
Specified bytes jump instruction area is constructed in the reserved memory field according to the absolute address, wherein, it is described to redirect
Instruction area is used for the address that current execute instruction jumps to aiming symbol in reorientation list item;
Change it is described by patch function entry instruction to jump to the patch function in the patch file.
2. according to the method for claim 1, it is characterised in that the patch file also includes patch function information, wherein
The patch function information includes code segment, data segment, read-only data section, relocates segment information.
3. according to the method for claim 2, it is characterised in that the patch function information is from patch function file destination
Extraction obtains.
4. according to the method for claim 1, it is characterised in that it is described according to the absolute address in the reserved internal memory
Specified bytes jump instruction area is constructed in area to be included:
Code segment and data segment are constructed according to the absolute address, to obtain the specified bytes jump instruction area;
Wherein, the code segment includes adding 8 content to be assigned to IP registers in PC registers, and the content of IP registers is assigned into PC
Register;
The data segment adds 4 including current address, call function address.
5. according to the method for claim 4, it is characterised in that:The length in the specified bytes jump instruction area is 16 words
Section.
6. according to the method for claim 1, the patch file also includes patch management head, wherein the patch management
Head includes patch release number, patch name, patch generation time and patch check code information.
7. according to the method for claim 1, it is characterised in that obtain the exhausted of the symbol of the interior reorientation section of the patch file
Address is included:
If the symbol in the patch file in reorientation section is external symbol, the symbol is obtained in image file or shared text
Relative address in part;
After the patch file is loaded into target pusher side, the relative address is plus the image file or the first ground of shared file
The absolute address of location with obtain in the patch file relocate section symbol absolute address.
8. a kind of patch realization device, it is characterised in that the device includes:
Generation module, for file where relocating the symbol of section by patch function and patch according to extraction and skew ground
Location, the internal memory regional address generation patch file reserved for patch file, and the patch file is loaded onto internal memory, wherein, institute
File where stating, the offset address and for the memory field address information that the patch file is reserved be stored in image file and
In the symbol table of dynamic library file;
Acquisition module, for obtaining the absolute address for the symbol that section is relocated in the patch file;
Constructing module, for constructing specified bytes jump instruction area in the reserved memory field according to the absolute address,
Wherein, the jump instruction area is used for the address that current execute instruction is jumped to aiming symbol in reorientation list item;
Modified module, for change it is described by patch function entry instruction to jump to the patch function in the patch file.
9. device according to claim 8, it is characterised in that acquisition module includes:
First acquisition unit, when the symbol for being relocated in the patch file in section is external symbol, obtain the symbol
Relative address number in image file or shared file;
Second acquisition unit after the patch file is loaded into target pusher side, the relative address plus the image file or
The absolute address of shared file first address with obtain in the patch file relocate section symbol absolute address.
10. device according to claim 8, it is characterised in that the constructing module is additionally operable to according to the absolute address
Code segment and data segment are constructed, to obtain the specified bytes jump instruction area;Wherein, the code segment is included PC registers
Add 8 content to be assigned to IP registers, the content of IP registers is assigned to PC registers;The data segment adds 4 including current address,
Call function address.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610595842.5A CN107656753A (en) | 2016-07-25 | 2016-07-25 | A kind of patch-realizing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610595842.5A CN107656753A (en) | 2016-07-25 | 2016-07-25 | A kind of patch-realizing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107656753A true CN107656753A (en) | 2018-02-02 |
Family
ID=61126436
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610595842.5A Withdrawn CN107656753A (en) | 2016-07-25 | 2016-07-25 | A kind of patch-realizing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107656753A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109840105A (en) * | 2018-12-24 | 2019-06-04 | 苏州蜗牛数字科技股份有限公司 | A kind of hot update method that do not withdraw |
CN110673837A (en) * | 2019-08-29 | 2020-01-10 | 腾讯科技(深圳)有限公司 | Code repairing method and device, electronic equipment and computer readable storage medium |
WO2022111262A1 (en) * | 2020-11-25 | 2022-06-02 | 北京金山云网络技术有限公司 | Hotfix generation method and apparatus, server, and machine readable storage medium |
WO2024146324A1 (en) * | 2023-01-04 | 2024-07-11 | 中兴通讯股份有限公司 | Hotfix processing method and device under arm architecture, storage medium, and electronic device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070132774A1 (en) * | 2005-12-01 | 2007-06-14 | Samsung Electronics Co., Ltd. | System and method for a patch minimization tool |
CN101882094A (en) * | 2010-06-10 | 2010-11-10 | 中兴通讯股份有限公司 | Method and system for making patch by embedded system |
CN101937340A (en) * | 2009-06-29 | 2011-01-05 | 中兴通讯股份有限公司 | Method and device for dynamically updating and controlling software by using patches |
WO2016101503A1 (en) * | 2014-12-24 | 2016-06-30 | 中兴通讯股份有限公司 | Hot patching realization method and apparatus |
-
2016
- 2016-07-25 CN CN201610595842.5A patent/CN107656753A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070132774A1 (en) * | 2005-12-01 | 2007-06-14 | Samsung Electronics Co., Ltd. | System and method for a patch minimization tool |
CN101937340A (en) * | 2009-06-29 | 2011-01-05 | 中兴通讯股份有限公司 | Method and device for dynamically updating and controlling software by using patches |
CN101882094A (en) * | 2010-06-10 | 2010-11-10 | 中兴通讯股份有限公司 | Method and system for making patch by embedded system |
WO2016101503A1 (en) * | 2014-12-24 | 2016-06-30 | 中兴通讯股份有限公司 | Hot patching realization method and apparatus |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109840105A (en) * | 2018-12-24 | 2019-06-04 | 苏州蜗牛数字科技股份有限公司 | A kind of hot update method that do not withdraw |
CN110673837A (en) * | 2019-08-29 | 2020-01-10 | 腾讯科技(深圳)有限公司 | Code repairing method and device, electronic equipment and computer readable storage medium |
WO2022111262A1 (en) * | 2020-11-25 | 2022-06-02 | 北京金山云网络技术有限公司 | Hotfix generation method and apparatus, server, and machine readable storage medium |
WO2024146324A1 (en) * | 2023-01-04 | 2024-07-11 | 中兴通讯股份有限公司 | Hotfix processing method and device under arm architecture, storage medium, and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101697131B (en) | Method and device for dynamically loading relocatable file | |
Reijers et al. | Efficient code distribution in wireless sensor networks | |
CN110275722B (en) | Method, apparatus, device and storage medium for upgrading application | |
CN100583032C (en) | Method and system for dynamic providing local base and relativity thereof | |
EP2966566B1 (en) | Driver program loading method and embedded device | |
CN107577491B (en) | Weex-based method and system for updating version in mobile application | |
JP5236367B2 (en) | Shared Java JAR file | |
JP5663006B2 (en) | System and method for building a runtime environment | |
CN107656753A (en) | A kind of patch-realizing method and device | |
EP3267308B1 (en) | Application loading method and device | |
US10929149B2 (en) | Method and system for updating firmware | |
EP1669866A2 (en) | Management method for managing software module and information processor | |
CN107506221A (en) | Application program updating method, apparatus and equipment | |
JP2007511816A (en) | Dynamic addressing (DA) using centralized DA manager | |
KR102052776B1 (en) | Installation engine and package format for parallelizable, reliable installations | |
JP2004094935A (en) | Object state transfer method, object state transfer device, object state transfer program, and storage medium therefor | |
JP2013084153A (en) | Information processing device, information processing method, and program | |
US20120222023A1 (en) | Automatic runtime dependency lookup | |
US20050060378A1 (en) | Method and apparatus for providing language modularization | |
JP5895616B2 (en) | Information processing apparatus and program execution method | |
US20170228243A1 (en) | Non-transitory computer-readable recording medium storing control program, control device and control method | |
CN109947407B (en) | Data acquisition method and device | |
CN107153561A (en) | The method of firmware, apparatus and system in a kind of renewal expansion card | |
CN114676372B (en) | Data processing method and device for web game, electronic equipment and storage medium | |
CN113327639B (en) | Firmware storage reading method and device based on LVGL |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180202 |