CN112035318A - Abnormal process positioning method, system and related device - Google Patents

Abnormal process positioning method, system and related device Download PDF

Info

Publication number
CN112035318A
CN112035318A CN202010887678.1A CN202010887678A CN112035318A CN 112035318 A CN112035318 A CN 112035318A CN 202010887678 A CN202010887678 A CN 202010887678A CN 112035318 A CN112035318 A CN 112035318A
Authority
CN
China
Prior art keywords
log
user mode
kernel
mode
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010887678.1A
Other languages
Chinese (zh)
Other versions
CN112035318B (en
Inventor
黄玉龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Inspur Data Technology Co Ltd
Original Assignee
Beijing Inspur Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Inspur Data Technology Co Ltd filed Critical Beijing Inspur Data Technology Co Ltd
Priority to CN202010887678.1A priority Critical patent/CN112035318B/en
Publication of CN112035318A publication Critical patent/CN112035318A/en
Application granted granted Critical
Publication of CN112035318B publication Critical patent/CN112035318B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • G06F11/3433Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment for load management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application provides a method for positioning an abnormal process, which comprises the following steps: when an abnormal process positioning request is received, starting a user mode and kernel mode interactive interface; mapping a ring memory log database in a kernel to a user mode through a user mode and kernel mode interactive interface; the annular memory log database is used for storing process logs corresponding to all process running states and system call records; acquiring a process log from a ring memory log database in a user mode; and analyzing the process log to determine the abnormal process. The method and the device are convenient for acquiring and analyzing the process logs in the user mode, the abnormal process can be located in time through the process monitoring information suspicion provided by the process logs, and the process load performance can be counted through the process logs so as to achieve performance optimization of the process, and therefore the data processing capacity of the electronic equipment for tasks is improved. The application also provides a positioning system of the abnormal process, a computer readable storage medium and an electronic device, which have the beneficial effects.

Description

Abnormal process positioning method, system and related device
Technical Field
The present application relates to the field of operating systems, and in particular, to a method, a system, and a related device for locating an abnormal process.
Background
Linux is a complex operating system, all subsystems can complete efficient tasks by cooperation with each other, and process scheduling is complex and diverse. However, since the process usually runs in the kernel state, it is difficult for the user to effectively monitor the process in the kernel state, which is not favorable for tracing when the process is abnormal.
Disclosure of Invention
The application aims to provide a method, a system, a computer readable storage medium and an electronic device for positioning an abnormal process, which can realize the calling tracking of the process in a kernel mode.
In order to solve the above technical problem, the present application provides a method for positioning an abnormal process, and a specific technical scheme includes:
when an abnormal process positioning request is received, starting a user mode and kernel mode interactive interface;
mapping the annular memory log database in the kernel to the user mode through the user mode and kernel mode interactive interfaces; the annular memory log database is used for storing process logs corresponding to all process running states and system call records;
acquiring the process log from the annular memory log database in a user mode;
and analyzing the process log to determine an abnormal process.
Optionally, before receiving the abnormal process positioning request, the method further includes:
establishing a scheduler function in a kernel mode and establishing a ring memory log database;
and calling the scheduler function to record the process running state and the system call record of the process, generating a process log corresponding to the process, and storing the process log to the annular memory log database.
Optionally, the method further includes:
and managing the opening or closing of the scheduler function through an Ioctl function.
Optionally, mapping the ring memory log database in the kernel to the user mode through the user mode and kernel mode interactive interfaces includes:
and when the user mode and kernel mode interactive interfaces are started, mapping the annular memory log database in the kernel to the user mode by using an Mmap interface.
Optionally, the Mmap interface is further configured to derive a process log in a user mode in a preset format.
Optionally, the process log at least includes a process name, a current time, a process start time, and a system call record, and further includes any one or a combination of any several of a current process PID, a next process PID, a current process CPU, a current instruction, a load record, and a load record time.
The present application further provides a system for locating an abnormal process, including:
the request receiving module is used for starting a user mode and kernel mode interactive interface when receiving an abnormal process positioning request;
the log mapping module is used for mapping the annular memory log database in the kernel to the user mode through the user mode and kernel mode interactive interfaces; the annular memory log database is used for storing process logs corresponding to all process running states and system call records;
the log acquisition module is used for acquiring the process log from the annular memory log database in a user mode;
and the abnormal positioning module is used for analyzing the process log and determining an abnormal process.
Optionally, the method further includes:
the creating module is used for creating a scheduler function in a kernel mode and creating a ring memory log database;
and the tracking module is used for executing the running state and the call record of the function record process of the scheduler, generating a process log corresponding to the process, and storing the process log to the annular memory log database.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method as set forth above.
The present application further provides an electronic device, comprising a memory and a processor, wherein the memory stores a computer program, and the processor implements the steps of the method described above when calling the computer program in the memory.
The application provides a method for positioning an abnormal process, which comprises the following steps: when an abnormal process positioning request is received, starting a user mode and kernel mode interactive interface; mapping the annular memory log database in the kernel to the user mode through the user mode and kernel mode interactive interfaces; the annular memory log database is used for storing process logs corresponding to all process running states and system call records; acquiring the process log from the annular memory log database in a user mode; and analyzing the process log to determine an abnormal process.
According to the method and the device, the user mode and the kernel mode interactive interface are configured, so that the process log of the annular memory log database in the kernel can be converted into the user mode from the kernel mode, the process log can be conveniently obtained and analyzed in the user mode, the abnormal process can be timely located in a suspicious mode through process monitoring information provided by the process log, on the basis, the process load performance can be counted through the process log, the performance optimization of the process can be conveniently realized, and the data processing capacity of the electronic device for tasks is improved.
The application also provides a positioning system of the abnormal process, a computer readable storage medium and an electronic device, which have the beneficial effects and are not described herein again.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic diagram of an abnormal process scheduling process and a process state provided in an embodiment of the present application;
fig. 2 is a flowchart of a method for locating an abnormal process according to an embodiment of the present disclosure;
fig. 3 is a flowchart of a method for locating an exception process according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a schematic diagram of an abnormal process scheduling process and a process state according to an embodiment of the present application, and as can be seen from fig. 1, a process mainly includes the following states:
the RUNNING state (TASK RUNNING) refers to a process as RUNNING when it is being executed by the CPU or is ready to be executed by the scheduler. The process may run in kernel mode or user mode. When system resources are already available, the process wakes up to enter a ready-to-run state, referred to as the ready state. These states (the middle column in fig. 1, that is, states corresponding to three circles including 0) are represented in the same manner in the kernel, and are all set to be in the TASK _ RUNNING state.
A TASK interrupt sleep state (TASK _ interrupt), in which the system does not schedule a process to execute while the process is in an interrupt-ready state. The process may be awakened to a ready state (run state) when an interrupt is generated by the system or a resource on which the process is waiting is released, or a signal is received by the process.
A non-interruptible sleep state (TASK _ uniterroptible), similar to the interruptible sleep state. But a process in this state can only transition to an operational ready state if it is explicitly awakened using the wake _ up () function.
The suspended state (TASK _ STOPPED) is entered when the process receives the signal SIGTOP, SIGSTP, SIGTIN or SIGTTOU. A sigcontrol signal may be sent to it to cause the process to transition to an operational state. In Linux 0.11, the conversion processing for this state has not been implemented yet. A process in this state will be treated as a process termination.
Dead State (TASK _ ZOMBIE) when a process has stopped running but its parent process has not yet asked its state, the process is said to be dead. When the running time slice of one process is used up, the system uses the scheduling program to force the switch to other processes to execute. In addition, if a process needs to wait for some resource of the system when executing in kernel mode, the process calls sleep _ on () or sleep _ on _ interrupt () to voluntarily give up the use right of the CPU and let the scheduler execute other processes. The process enters a sleep state (TASK _ unitruptile or TASK _ interrupt).
The kernel performs a process switching operation only when the process transitions from the "kernel run state" to the "sleep state". A process running in kernel mode cannot be preempted by other processes and one process cannot change the state of another process. In order to avoid kernel data errors caused by process switching, the kernel can prohibit all interrupts when executing critical section codes.
In order to solve the problem that the abnormal process cannot be positioned due to the fact that the process in the kernel is difficult to monitor, the application provides a positioning method of the abnormal process, and the specific implementation process is as follows:
referring to fig. 2, fig. 2 is a flowchart of a method for locating an abnormal process according to an embodiment of the present application, where the present application provides a method for locating an abnormal process, and a specific technical solution includes:
s101: when an abnormal process positioning request is received, starting a user mode and kernel mode interactive interface;
the method comprises the steps of starting a user mode interactive interface and a kernel mode interactive interface when an abnormal process positioning request is received, realizing mapping of user mode data and kernel mode data when the user mode interactive interface and the kernel mode interactive interface are started, realizing data conversion between the two states, and obtaining data in the kernel mode in the user mode.
How to start the user-mode and kernel-mode interactive interfaces is not specifically limited, and the user-mode and kernel-mode interactive interfaces can be enabled and disabled by creating a process corresponding to the miscellaneous device. Specifically, a miscellaneous device/dev/monitor _ process can be created, and a user-mode and kernel-mode interactive interface can be started through the/dev/monitor _ process. Of course, those skilled in the art may also configure other functions or processes based on the embodiment to implement the enablement of the user-mode and kernel-mode interactive interfaces.
In addition, it can be understood that when the abnormal process positioning request is correspondingly closed, in order to avoid disorder of the kernel-mode data and the user-mode data, the user-mode and kernel-mode interactive interfaces can be closed.
S102: mapping the annular memory log database in the kernel to the user mode through the user mode and kernel mode interactive interfaces;
after the user mode and kernel mode interactive interfaces are enabled, the annular memory log database in the kernel can be mapped to the user mode through the user mode and kernel mode interactive interfaces. It should be noted that even if the ring memory log database is opened, it does not mean that the user-mode data and the kernel-mode data can be directly imported and exported with each other. And storing process logs corresponding to all process running states and system call records in the annular memory log database, which is equivalent to establishing the same database in the user mode, so that the data of the annular memory log database in the kernel mode is mapped to the database in the user mode, and the kernel mode data is exported to the user mode. But the mapping does not actually build the database in the user mode.
As a preferred execution mode, when the user mode and the kernel mode interactive interface are enabled, the Mmap interface may be used to map the ring memory log database in the kernel to the user mode, and the Mmap interface may also be used to export the process log in the user mode in a preset format, that is, the data formats of the process log file in the kernel mode and the process log file operable in the user mode may be different, so that the Mmap interface may be called to perform corresponding format conversion.
S103: acquiring the process log from the annular memory log database in a user mode;
s104: and analyzing the process log to determine an abnormal process.
When the process log is mapped to the user mode, the log can be directly obtained in the user mode to be analyzed so as to determine the abnormal process. The content of the process log is not particularly limited, and the process log at least includes a process name, a current time, a process start time, and a system call record, and may further include any one or a combination of any several of a current process PID, a next process PID, a current process CPU, a current instruction, a load record, and a load record time. In other words, all relevant parameters and information of process execution can be added to the process log so that those skilled in the art can quickly confirm that the abnormal process is located.
According to the method and the device, the user mode and the kernel mode interactive interface are configured, so that the process log of the annular memory log database in the kernel can be converted into the user mode from the kernel mode, the process log can be conveniently obtained and analyzed in the user mode, the abnormal process can be timely located in a suspicious mode through the process monitoring information provided by the process log, on the basis, the process load performance can be counted through the process log, the performance optimization of the process can be conveniently realized, and the data processing capacity of the electronic device for tasks is improved.
Based on the above embodiment, as a preferred embodiment, before receiving the abnormal process positioning request, the process tracking may be established in the kernel mode, and the specific process is as follows:
establishing a scheduler function in a kernel mode and establishing a ring memory log database;
and calling the scheduler function to record the process running state and the system call record of the process, generating a process log corresponding to the process, and storing the process log to the annular memory log database.
A specific implementation process of this embodiment may be as follows, and the following processes are all implemented in a kernel mode:
firstly, creating miscellaneous equipment/dev/monitor _ process and a ring memory log database, and initializing an ioctl interface and an Mmap interface; the starting or closing of the scheduler function can be managed by calling an Ioctl (input/output control) function through an Ioctl interface.
And secondly, calling a scheduler function schedule trace to track process scheduling, generating a corresponding process log and storing the process log to an annular log database.
It is easy to understand that, when creating the ring memory log database, the kernel needs to apply for allocating the ring memory to create the ring memory log database. In the embodiment, how to perform process tracking in the kernel mode is described on the basis of the above embodiment, a person skilled in the art may use other same or similar process tracking methods on the basis of the embodiment, for example, may use other databases for recording process logs, or perform process tracking by using other functions, and the like, which are all within the scope of the present application.
Based on the above embodiment, as a preferred embodiment, the scheduler function may also be managed to be turned on or off through an Ioctl function. Because the process is not required to be monitored in the whole process, the number of processes in the system is large, and the performance of the system is greatly occupied when the process global monitoring is adopted, a switch for monitoring the process can be set, namely whether the process monitoring is executed or not is realized through an Ioctl function.
In the following, a positioning system for an abnormal process provided by the embodiment of the present application is introduced, and the positioning system described below and the positioning method for an abnormal process described above may be referred to correspondingly.
Referring to fig. 3, fig. 3 is a flowchart of a method for locating an abnormal process according to an embodiment of the present application, and the present application further provides a system for locating an abnormal process, including:
a request receiving module 100, configured to start a user-mode and kernel-mode interaction interface when receiving an abnormal process positioning request;
the log mapping module 200 is configured to map the ring memory log database in the kernel to the user mode through the user mode and kernel mode interactive interfaces; the annular memory log database is used for storing process logs corresponding to all process running states and system call records;
a log obtaining module 300, configured to obtain the process log from the annular memory log database in a user mode;
and an exception positioning module 400, configured to analyze the process log and determine an exception process.
Based on the above embodiment, as a preferred embodiment, the method may further include:
the creating module is used for creating a scheduler function in a kernel mode and creating a ring memory log database before receiving the abnormal process positioning request;
and the tracking module is used for executing the running state and the call record of the function record process of the scheduler, generating a process log corresponding to the process, and storing the process log to the annular memory log database.
The present application also provides a computer readable storage medium having stored thereon a computer program which, when executed, may implement the steps provided by the above-described embodiments. The storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The application further provides an electronic device, which may include a memory and a processor, where the memory stores a computer program, and the processor may implement the steps provided by the foregoing embodiments when calling the computer program in the memory. Of course, the electronic device may also include various network interfaces, power supplies, and the like.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the system provided by the embodiment, the description is relatively simple because the system corresponds to the method provided by the embodiment, and the relevant points can be referred to the method part for description.
The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. A method for locating an abnormal process is characterized by comprising the following steps:
when an abnormal process positioning request is received, starting a user mode and kernel mode interactive interface;
mapping the annular memory log database in the kernel to the user mode through the user mode and kernel mode interactive interfaces; the annular memory log database is used for storing process logs corresponding to all process running states and system call records;
acquiring the process log from the annular memory log database in a user mode;
and analyzing the process log to determine an abnormal process.
2. The method of claim 1, wherein before receiving the abnormal process positioning request, further comprising:
establishing a scheduler function in a kernel mode and establishing a ring memory log database;
and calling the scheduler function to record the process running state and the system call record of the process, generating a process log corresponding to the process, and storing the process log to the annular memory log database.
3. The positioning method according to claim 2, further comprising:
and managing the opening or closing of the scheduler function through an Ioctl function.
4. The method of claim 1, wherein mapping the ring memory log database in the kernel to the user mode via the user mode and kernel mode interactive interfaces comprises:
and when the user mode and kernel mode interactive interfaces are started, mapping the annular memory log database in the kernel to the user mode by using an Mmap interface.
5. The location method according to claim 4, wherein the Mmap interface is further configured to export a process log in a user mode in a preset format.
6. The location method according to claim 1, wherein the process log comprises at least a process name, a current time, a process start time, and a system call record, and further comprises any one or a combination of any of a current process PID, a next process PID, a current process CPU, a current instruction, a load record, and a load record time.
7. A system for locating an exception process, comprising:
the request receiving module is used for starting a user mode and kernel mode interactive interface when receiving an abnormal process positioning request;
the log mapping module is used for mapping the annular memory log database in the kernel to the user mode through the user mode and kernel mode interactive interfaces; the annular memory log database is used for storing process logs corresponding to all process running states and system call records;
the log acquisition module is used for acquiring the process log from the annular memory log database in a user mode;
and the abnormal positioning module is used for analyzing the process log and determining an abnormal process.
8. The positioning system of claim 7, further comprising:
the creating module is used for creating a scheduler function in a kernel mode and creating a ring memory log database;
and the tracking module is used for executing the running state and the call record of the function record process of the scheduler, generating a process log corresponding to the process, and storing the process log to the annular memory log database.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
10. An electronic device, comprising a memory in which a computer program is stored and a processor which, when called upon in the memory, implements the steps of the method according to any one of claims 1-6.
CN202010887678.1A 2020-08-28 2020-08-28 Abnormal process positioning method, system and related device Active CN112035318B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010887678.1A CN112035318B (en) 2020-08-28 2020-08-28 Abnormal process positioning method, system and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010887678.1A CN112035318B (en) 2020-08-28 2020-08-28 Abnormal process positioning method, system and related device

Publications (2)

Publication Number Publication Date
CN112035318A true CN112035318A (en) 2020-12-04
CN112035318B CN112035318B (en) 2022-03-22

Family

ID=73586810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010887678.1A Active CN112035318B (en) 2020-08-28 2020-08-28 Abnormal process positioning method, system and related device

Country Status (1)

Country Link
CN (1) CN112035318B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112506799A (en) * 2020-12-22 2021-03-16 北京百度网讯科技有限公司 Business abnormity positioning method and device, electronic equipment, medium and product
CN113535660A (en) * 2021-07-28 2021-10-22 展讯通信(天津)有限公司 Android log storage method and device
CN114003470A (en) * 2021-12-30 2022-02-01 北京中科网威信息技术有限公司 User mode process exception handling method, device, equipment and medium
CN115080355A (en) * 2022-07-20 2022-09-20 北京未来智安科技有限公司 Method and device for generating monitoring log
CN115437881A (en) * 2022-08-25 2022-12-06 北京万里开源软件有限公司 Database process exception handling method based on user mode file system
CN116701320A (en) * 2022-12-01 2023-09-05 荣耀终端有限公司 Log generation method and related device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107229867A (en) * 2017-06-12 2017-10-03 北京奇虎科技有限公司 Kernel bug excavation method, device, computing device and computer-readable storage medium
CN109992480A (en) * 2019-04-11 2019-07-09 苏州浪潮智能科技有限公司 A kind of log rank amending method, system and electronic equipment and storage medium
US20200210591A1 (en) * 2018-12-28 2020-07-02 AO Kaspersky Lab System and method of forming a log when executing a file with vulnerabilities in a virtual machine

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107229867A (en) * 2017-06-12 2017-10-03 北京奇虎科技有限公司 Kernel bug excavation method, device, computing device and computer-readable storage medium
US20200210591A1 (en) * 2018-12-28 2020-07-02 AO Kaspersky Lab System and method of forming a log when executing a file with vulnerabilities in a virtual machine
CN109992480A (en) * 2019-04-11 2019-07-09 苏州浪潮智能科技有限公司 A kind of log rank amending method, system and electronic equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JUNGWON YU等: ""A novel hybrid of auto-associative kernel regression and dynamic independent component analysis for fault detection in nonlinear multimode processes"", 《JOURNAL OF PROCESS CONTROL》 *
崔竞松等: ""支持多种虚拟化技术的进程非代理监控方法"", 《华中科技大学学报(自然科学版)》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112506799A (en) * 2020-12-22 2021-03-16 北京百度网讯科技有限公司 Business abnormity positioning method and device, electronic equipment, medium and product
CN112506799B (en) * 2020-12-22 2023-11-10 北京百度网讯科技有限公司 Business abnormality positioning method and device, electronic equipment, medium and product
CN113535660A (en) * 2021-07-28 2021-10-22 展讯通信(天津)有限公司 Android log storage method and device
CN113535660B (en) * 2021-07-28 2023-09-05 展讯通信(天津)有限公司 Android log storage method and device
CN114003470A (en) * 2021-12-30 2022-02-01 北京中科网威信息技术有限公司 User mode process exception handling method, device, equipment and medium
CN115080355A (en) * 2022-07-20 2022-09-20 北京未来智安科技有限公司 Method and device for generating monitoring log
CN115080355B (en) * 2022-07-20 2022-11-29 北京未来智安科技有限公司 Method and device for generating monitoring log
CN115437881A (en) * 2022-08-25 2022-12-06 北京万里开源软件有限公司 Database process exception handling method based on user mode file system
CN116701320A (en) * 2022-12-01 2023-09-05 荣耀终端有限公司 Log generation method and related device
CN116701320B (en) * 2022-12-01 2024-05-14 荣耀终端有限公司 Log generation method and related device

Also Published As

Publication number Publication date
CN112035318B (en) 2022-03-22

Similar Documents

Publication Publication Date Title
CN112035318B (en) Abnormal process positioning method, system and related device
US8201029B2 (en) Method and apparatus for operating system event notification mechanism using file system interface
US6035321A (en) Method for enforcing a hierarchical invocation structure in real time asynchronous software applications
US8612805B2 (en) Processor system optimization supporting apparatus and supporting method
JP2692609B2 (en) Multitask program debugging method and apparatus
US20060268967A1 (en) Supplying instruction to operational stations
CN108958729B (en) Data processing method, device and storage medium
CN113010275A (en) Interrupt processing method and device
De Oliveira et al. Timing analysis of the PREEMPT RT Linux kernel
CN108173840B (en) Intelligent logistics terminal integration system based on cloud platform
US8312466B2 (en) Restricting resources consumed by ghost agents
EP1652086A2 (en) Kernel-level method of flagging problems in applications
CN115858499A (en) Database partition processing method and device, computer equipment and storage medium
CN109426556B (en) Process scheduling method and device
CN110990227A (en) Numerical pool application characteristic performance acquisition and monitoring system and operation method thereof
CN115794355A (en) Task processing method and device, terminal equipment and storage medium
CN107632893B (en) Message queue processing method and device
JP2009048358A (en) Information processor and scheduling method
JP3207564B2 (en) Event recording method and device
CN112540886B (en) CPU load value detection method and device
CN112540885B (en) CPU load value detection method and device based on user space
CN112988365B (en) Thread management method, device, equipment and medium
CN117435320B (en) Man-machine interaction control method and device, server and storage medium
CN114443255A (en) Thread calling method and device
Jackson et al. The proposed IEEE 855 microprocessor operating systems interface standard

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant