CN1645339A - Debugging method for applied programm in simulator of embedded system - Google Patents

Debugging method for applied programm in simulator of embedded system Download PDF

Info

Publication number
CN1645339A
CN1645339A CN 200510049298 CN200510049298A CN1645339A CN 1645339 A CN1645339 A CN 1645339A CN 200510049298 CN200510049298 CN 200510049298 CN 200510049298 A CN200510049298 A CN 200510049298A CN 1645339 A CN1645339 A CN 1645339A
Authority
CN
China
Prior art keywords
debugging
simulator
module
address
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510049298
Other languages
Chinese (zh)
Other versions
CN100365590C (en
Inventor
卜佳俊
陈纯
沈格俊
赵军
柯化成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CNB2005100492986A priority Critical patent/CN100365590C/en
Publication of CN1645339A publication Critical patent/CN1645339A/en
Application granted granted Critical
Publication of CN100365590C publication Critical patent/CN100365590C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A method for debugging application program on simulator in embedded system includes fetching out core symbol file generated during compile of operation system to obtain process control block information of application program in simulator memory as result to obtain control ability of corresponding application program for realizing the debugging of application program operated in simulator and above operation system.

Description

The method of debugging utility on embedded system simulator
Technical field
The present invention relates to the computer program debugging technology, particularly the method for debugging utility on embedded system simulator.
Background technology
Along with embedded device is popularized, personal digital assistant (PDA) for example, mobile phones etc. are based on the application emerge in multitude of portable mobile equipment.And the application program on the embedded device general all with the machine environment of target platform isomery under develop, can not under development environment, debug, and the simulation hardware equipment of the exploitation of embedded device assessment generally all compares expensive, and therefore debugging becomes the key factor that is restricting embedded software developing.
The Computer Systems Simulator technology is the process of carrying out by hardware characteristics and its instruction of simulated target framework computing machine in the computing machine of certain framework, thereby is implemented in the technology that fictionalizes many computing machines on the computing machine.Popular Computer Systems Simulator is for example: Bochs, the computing machine that can simulate many Intel 80 * 86 systems on the machine of multiple architecture, and Intel80 * 86 versions of operating systems such as operation Linux, freebsd; Armulator, the computing machine that can on the machine of Intel 80 * 86 architectures, simulate the ARM system, and the ARM of operation ucLinux transplants version etc.
Utilize the characteristics of Computer Systems Simulator, the debugging of carrying out embedded software on simulator becomes a solution that solves the embedded systems debugging problem, but existing debugging technique based on simulator usually can only the operating system of commissioning test on embedded system simulator, and powerless to the application program on the operating system, this has limited the space that plays a role based on the simulator debugging technique; Perhaps by extra operation debugger on operating system, gdb for example, if but on this operating system no available debugger (as ucLinux), then can't use; Perhaps the operation debugger is acted on behalf of on operating system, gdb server for example, operating system must realize network protocol stacks such as TCP/IP but the network that requires the simulator virtual support connects simultaneously, and these require many embedded OSs not satisfy, instant satisfied, also increase the program that simulator is carried out, influenced the simulator performance.
Process is the base unit that computer program is carried out, and also is the base unit of debugging.Essential information about process all is stored in the process control block (PCB) structure of operating system, comprises the unique identification for the treatment of debug procedures and the contextual information (state relevant with CPU comprises register, page table base, segment base etc.) of process.Thereby the key that sees through the operating system debugging application software on the simulator just is to obtain the process control block (PCB) information in the operating system memory space.
Summary of the invention
The object of the present invention is to provide a kind of on embedded system simulator the method for debugging utility.
The technical solution used in the present invention is:
1) the debugger user specifies and treats debugging utility process identification number in the operating system on simulator;
2) symbolic analysis load-on module, the kernel symbol table that generates when operating system is compiled carries out scanning analysis, obtain the memory address of process control block (PCB) structure example, and travel through all process control block (PCB) structure examples, obtain the memory address of the process control block (PCB) for the treatment of debugging utility according to the process identification number of appointment in the step 1), whether support the virtual address according to operating system, this memory address may be a virtual address, also may be physical address;
3) virtual memory access module, if operating system is supported virtual address mechanism, then this module realize with simulator on the same address translation algorithm of operating system that moves, according to 2) in the virtual address that obtains calculate physical address corresponding, if meet pairing page not in physical memory, then need to be loaded on internal memory with the piece at its place from the simulation files system number and with page or leaf, if the operating system of upper strata operation is not supported virtual address mechanism, then this step can be saved;
4) debugging interface module, this module is accepted the various debug commands from the program development personnel, delivers to the debugging proxy module, and the Debugging message that debugging proxy module acceptance instruction back produces is accepted and demonstration;
5) debugging proxy module, this module is received the debug command that debugging interface transmits, if debug command is for inserting breakpoint, it then is the break-poing instruction of definition format voluntarily with the modifying of order of purpose breakpoint address correspondence, the former instruction that is capped is saved together with breakpoint location, when virtual machine runs into this break-poing instruction, then shut down and wait for the debug command that sends from debugger; If debug command is on-the-spot query statement or on-the-spot modify instruction, then according to 2) in the process control block (PCB) that obtains canned data operate accordingly at the memory address that belongs to process or by the register of simulator simulation; If the former instruction recovery that debug command for continue carrying out, then will be preserved, allow the virtual machine state that resumes operation; If show process tabulation instruction, then call sign is analyzed load-on module according to 2) describedly obtain the memory address of process list data structure in kernel, and travel through this structure; If specify the debug procedures instruction, then in the data structure of a current debug procedures information of simulator internal maintenance.
The present invention compares the useful effect that has with technology: it is advantageous that the network support that does not need operating system, do not need to move extra debugger program, thereby avoided the problem of shortage debugger on the embedded OS; Simultaneously, this method is not carried out extra program on the operating system of virtual machine, has improved the performance of simulator, improves response speed.
Embodiment
In certain ARM simulator, realized the explanation of ARMv4 version command is carried out, simulated the AT91EV40 of Atmel company development board, can move ucLinux version 2 .0.0 thereon.Generating the kernel symbol file during this version ucLinux compiling is/boot/system.map.Program name to be debugged is assumed to be debuggedproc, and debugger is debugger, and simulator is called simon, has realized symbolic analysis load-on module, virtual memory access module, debugging proxy module in simulator.Comprised the debugging interface module simultaneously in the debugger client of other independent operating, the debugging proxy module of this module and simulator is carried out communication by socket, and communication format is followed GDB remote debugging agreement.
1) process list that obtains by the symbolic analysis load-on module of debugger debugger determines to treat the process ID of debugged program debuggedproc on destination OS, is assumed to be 1000.At this moment, debugger can be by attach 1000 instruction according in the technical scheme 1) described appointment process ID to be debugged.
2) symbolic analysis load-on module, the kernel symbol table system.map that generates when operating system is compiled carries out scanning analysis, obtain process control block (PCB) structural array task corresponding memory address, item in the task array is the process control block (PCB) structure, by traveling through all process control block (PCB) structure examples, according in the technical scheme 1) in the process identification number of appointment obtain the memory address of the process control block (PCB) for the treatment of debugging utility.Whether support the virtual address according to operating system, this memory address may be a virtual address, also may be physical address;
3) virtual memory access module, if operating system is supported virtual address mechanism, then this module realize with simulator on the same address translation algorithm of operating system that moves, according in the technical scheme 1) in the virtual address that obtains calculate physical address corresponding, if meet pairing page not in physical memory, then need further to resolve internal storage data structure in the process control block (PCB) structure and obtain the piece number at its place in simulation files system or swap file and page or leaf is loaded on internal memory; If the operating system of upper strata operation is not supported virtual address mechanism, then this step can be saved;
4) debugging interface module, this module is accepted the various debug commands (tabulate, specify debug procedures, check internal memory, revise internal memory, insert breakpoint, check breakpoint, delete breakpoint, check register, revise register, single step execution etc. as show process) from the program development personnel, requirement according to gdb remote debugging protocol format parses debug command and tuning parameter thereof and delivers to the debugging proxy module, and the feedback Debugging message that debugging proxy module acceptance instruction back produces is accepted and demonstration;
5) debugging proxy module, this module is received debug command and the tuning parameter thereof that debugging interface transmits, if debug command is for inserting breakpoint, it then is the break-poing instruction of definition format voluntarily with the modifying of order of purpose breakpoint address correspondence, the former instruction that is capped is saved together with breakpoint location, when virtual machine runs into this instruction, then shut down and wait for other debug command; If debug command is on-the-spot query statement or on-the-spot revises the class instruction, then according in the technical scheme 2) in the process control block (PCB) that obtains canned data operate accordingly at the memory address that belongs to process or by the register of simulator simulation; If the former instruction recovery that debug command for continue carrying out, then will be preserved, allow the virtual machine state that resumes operation.If show process tabulation instruction, then call sign is analyzed load-on module according in the technical scheme 2) describedly obtain the memory address of process list data structure in kernel, and travel through this structure.If specify the debug procedures instruction, then in the data structure of a current debug procedures information of simulator internal maintenance.
Use this method need under ucLinux, not move extra debugged program (for example GDB), do not require that also this ucLinux realizes ICP/IP protocol, reduced the performance loss that simulator is caused greatly when the instruction of these programs of parsing or agreement.

Claims (1)

1 one kinds of methods that are used in debugging utility on the embedded system simulator is characterized in that:
1) the debugger user specifies and treats debugging utility process identification number in the operating system on simulator;
2) symbolic analysis load-on module, the kernel symbol table that generates when operating system is compiled carries out scanning analysis, obtain the memory address of process control block (PCB) structure example, and travel through all process control block (PCB) structure examples, obtain the memory address of the process control block (PCB) for the treatment of debugging utility according to the process identification number of appointment in the step 1), whether support the virtual address according to operating system, this memory address may be a virtual address, also may be physical address;
3) virtual memory access module, if operating system is supported virtual address mechanism, then this module realize with simulator on the same address translation algorithm of operating system that moves, according to 2) in the virtual address that obtains calculate physical address corresponding, if meet pairing page not in physical memory, then need to be loaded on internal memory with the piece at its place from the simulation files system number and with page or leaf, if the operating system of upper strata operation is not supported virtual address mechanism, then this step can be saved;
4) debugging interface module, this module is accepted the various debug commands from the program development personnel, delivers to the debugging proxy module, and the Debugging message that debugging proxy module acceptance instruction back produces is accepted and demonstration;
5) debugging proxy module, this module is received the debug command that debugging interface transmits, if debug command is for inserting breakpoint, it then is the break-poing instruction of definition format voluntarily with the modifying of order of purpose breakpoint address correspondence, the former instruction that is capped is saved together with breakpoint location, when virtual machine runs into this break-poing instruction, then shut down and wait for the debug command that sends from debugger; If debug command is on-the-spot query statement or on-the-spot modify instruction, then according to 2) in the process control block (PCB) that obtains canned data operate accordingly at the memory address that belongs to process or by the register of simulator simulation; If the former instruction recovery that debug command for continue carrying out, then will be preserved, allow the virtual machine state that resumes operation; If show process tabulation instruction, then call sign is analyzed load-on module according to 2) describedly obtain the memory address of process list data structure in kernel, and travel through this structure; If specify the debug procedures instruction, then in the data structure of a current debug procedures information of simulator internal maintenance.
CNB2005100492986A 2005-01-31 2005-01-31 Debugging method for applied programm in simulator of embedded system Expired - Fee Related CN100365590C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100492986A CN100365590C (en) 2005-01-31 2005-01-31 Debugging method for applied programm in simulator of embedded system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100492986A CN100365590C (en) 2005-01-31 2005-01-31 Debugging method for applied programm in simulator of embedded system

Publications (2)

Publication Number Publication Date
CN1645339A true CN1645339A (en) 2005-07-27
CN100365590C CN100365590C (en) 2008-01-30

Family

ID=34876565

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100492986A Expired - Fee Related CN100365590C (en) 2005-01-31 2005-01-31 Debugging method for applied programm in simulator of embedded system

Country Status (1)

Country Link
CN (1) CN100365590C (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100416513C (en) * 2005-11-15 2008-09-03 中兴通讯股份有限公司 Compile-debugging method of embedded software
CN100456260C (en) * 2006-12-21 2009-01-28 华为技术有限公司 Interpreter language debugging method and device
CN101262366B (en) * 2008-02-01 2010-10-27 杭州华三通信技术有限公司 Debugging method, system and distributed device for target single board
CN101221608B (en) * 2006-09-29 2011-03-02 英特尔公司 Method, computing device and system for monitoring target proxy execution mode of VT system
CN102063366A (en) * 2009-11-18 2011-05-18 中兴通讯股份有限公司 Method and system for debugging process
CN102124442A (en) * 2008-08-20 2011-07-13 飞思卡尔半导体公司 Debug instruction for use in a multi-threaded data processing system
CN101609429B (en) * 2009-07-22 2011-09-07 大唐微电子技术有限公司 Method for debugging embedded operating system and device therefor
CN101329638B (en) * 2007-06-18 2011-11-09 国际商业机器公司 Method and system for analyzing parallelism of program code
CN102301344A (en) * 2011-07-06 2011-12-28 华为技术有限公司 Method for debugging kernel of operating system and virtual debugging service module
CN101207604B (en) * 2006-12-20 2012-03-28 联想(北京)有限公司 Virtual machine system and communication processing method thereof
CN101681280B (en) * 2007-05-25 2012-12-19 微软公司 In-process debugging using external debugging infrastructure
CN103064723A (en) * 2011-10-18 2013-04-24 财团法人工业技术研究院 Method and computer system for identifying virtual machine memory
CN103235755A (en) * 2013-04-16 2013-08-07 合肥联宝信息技术有限公司 Basic input output system (BIOS) remote network debugging method
CN103443775A (en) * 2011-03-15 2013-12-11 现代自动车株式会社 Communication test device and method thereof
CN104503915A (en) * 2014-12-31 2015-04-08 北京奇虎科技有限公司 System and method for evaluating spam short message blocking tool
CN105843690A (en) * 2016-03-14 2016-08-10 乐视移动智能信息技术(北京)有限公司 Method for transmitting debugging information and mobile terminal
WO2018028055A1 (en) * 2016-08-10 2018-02-15 北京奇虎科技有限公司 Method and apparatus for running android application program on windows system
WO2018028056A1 (en) * 2016-08-10 2018-02-15 北京奇虎科技有限公司 Android emulator and method for implementing android emulator
CN107870855A (en) * 2016-09-27 2018-04-03 北京计算机技术及应用研究所 Debugging system based on the bright embedded OS in day
CN110673878A (en) * 2019-09-11 2020-01-10 上海高性能集成电路设计中心 Instruction information query and execution debugging method based on instruction set simulator
CN110990018A (en) * 2019-10-29 2020-04-10 北京全路通信信号研究设计院集团有限公司 Compiling deployment method, compiling method and compiling system of embedded system
CN111025166A (en) * 2019-12-27 2020-04-17 深圳市新威尔电子有限公司 Debugger for battery detection system
CN111209193A (en) * 2019-12-30 2020-05-29 北京健康之家科技有限公司 Program debugging method and device
CN111880863A (en) * 2020-07-10 2020-11-03 Oppo广东移动通信有限公司 Application program running method and device, electronic equipment and storage medium
CN112799816A (en) * 2021-02-01 2021-05-14 安徽芯纪元科技有限公司 Multitask program specified task debugging method of embedded operating system
CN112925700A (en) * 2019-12-06 2021-06-08 西安诺瓦星云科技股份有限公司 Program debugging method, device and system and embedded equipment
CN113535487A (en) * 2020-04-16 2021-10-22 杭州中天微系统有限公司 Test system and method
CN114327648A (en) * 2021-12-16 2022-04-12 北京安天网络安全技术有限公司 Drive debugging method and device, electronic equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6604184B2 (en) * 1999-06-30 2003-08-05 Intel Corporation Virtual memory mapping using region-based page tables
CN1164065C (en) * 1999-11-04 2004-08-25 中兴通讯股份有限公司 Universal protocol testing method for embedded system
CN1139876C (en) * 1999-11-30 2004-02-25 深圳市中兴通讯股份有限公司 Embedded software aided debugging method
JP2001318805A (en) * 2000-05-08 2001-11-16 Nec Corp Test method for built-in system and test system
US20040040013A1 (en) * 2002-08-26 2004-02-26 Mohit Kalra Time-based breakpoints in debuggers

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100416513C (en) * 2005-11-15 2008-09-03 中兴通讯股份有限公司 Compile-debugging method of embedded software
CN101221608B (en) * 2006-09-29 2011-03-02 英特尔公司 Method, computing device and system for monitoring target proxy execution mode of VT system
CN101207604B (en) * 2006-12-20 2012-03-28 联想(北京)有限公司 Virtual machine system and communication processing method thereof
CN100456260C (en) * 2006-12-21 2009-01-28 华为技术有限公司 Interpreter language debugging method and device
CN101681280B (en) * 2007-05-25 2012-12-19 微软公司 In-process debugging using external debugging infrastructure
CN101329638B (en) * 2007-06-18 2011-11-09 国际商业机器公司 Method and system for analyzing parallelism of program code
US8316355B2 (en) 2007-06-18 2012-11-20 International Business Machines Corporation Method and system for analyzing parallelism of program code
US9047114B2 (en) 2007-06-18 2015-06-02 International Business Machines Corporation Method and system for analyzing parallelism of program code
CN101262366B (en) * 2008-02-01 2010-10-27 杭州华三通信技术有限公司 Debugging method, system and distributed device for target single board
CN102124442A (en) * 2008-08-20 2011-07-13 飞思卡尔半导体公司 Debug instruction for use in a multi-threaded data processing system
CN102124442B (en) * 2008-08-20 2015-02-25 飞思卡尔半导体公司 Debug instruction for use in a multi-threaded data processing system
CN101609429B (en) * 2009-07-22 2011-09-07 大唐微电子技术有限公司 Method for debugging embedded operating system and device therefor
CN102063366A (en) * 2009-11-18 2011-05-18 中兴通讯股份有限公司 Method and system for debugging process
CN102063366B (en) * 2009-11-18 2014-12-31 中兴通讯股份有限公司 Method and system for debugging process
CN103443775B (en) * 2011-03-15 2018-06-12 现代自动车株式会社 communication test device and method
CN103443775A (en) * 2011-03-15 2013-12-11 现代自动车株式会社 Communication test device and method thereof
CN102301344B (en) * 2011-07-06 2013-12-04 华为技术有限公司 Method for debugging kernel of operating system and virtual debugging service module
CN102301344A (en) * 2011-07-06 2011-12-28 华为技术有限公司 Method for debugging kernel of operating system and virtual debugging service module
CN103064723B (en) * 2011-10-18 2016-01-20 财团法人工业技术研究院 Method and computer system for identifying virtual machine memory
CN103064723A (en) * 2011-10-18 2013-04-24 财团法人工业技术研究院 Method and computer system for identifying virtual machine memory
CN103235755A (en) * 2013-04-16 2013-08-07 合肥联宝信息技术有限公司 Basic input output system (BIOS) remote network debugging method
CN104503915A (en) * 2014-12-31 2015-04-08 北京奇虎科技有限公司 System and method for evaluating spam short message blocking tool
CN105843690A (en) * 2016-03-14 2016-08-10 乐视移动智能信息技术(北京)有限公司 Method for transmitting debugging information and mobile terminal
WO2018028055A1 (en) * 2016-08-10 2018-02-15 北京奇虎科技有限公司 Method and apparatus for running android application program on windows system
WO2018028056A1 (en) * 2016-08-10 2018-02-15 北京奇虎科技有限公司 Android emulator and method for implementing android emulator
CN107870855A (en) * 2016-09-27 2018-04-03 北京计算机技术及应用研究所 Debugging system based on the bright embedded OS in day
CN110673878A (en) * 2019-09-11 2020-01-10 上海高性能集成电路设计中心 Instruction information query and execution debugging method based on instruction set simulator
CN110990018A (en) * 2019-10-29 2020-04-10 北京全路通信信号研究设计院集团有限公司 Compiling deployment method, compiling method and compiling system of embedded system
CN110990018B (en) * 2019-10-29 2023-03-24 北京全路通信信号研究设计院集团有限公司 Compiling method and compiling system of embedded system
CN112925700A (en) * 2019-12-06 2021-06-08 西安诺瓦星云科技股份有限公司 Program debugging method, device and system and embedded equipment
CN111025166A (en) * 2019-12-27 2020-04-17 深圳市新威尔电子有限公司 Debugger for battery detection system
CN111209193A (en) * 2019-12-30 2020-05-29 北京健康之家科技有限公司 Program debugging method and device
CN111209193B (en) * 2019-12-30 2023-09-22 北京水滴科技集团有限公司 Program debugging method and device
CN113535487A (en) * 2020-04-16 2021-10-22 杭州中天微系统有限公司 Test system and method
CN111880863A (en) * 2020-07-10 2020-11-03 Oppo广东移动通信有限公司 Application program running method and device, electronic equipment and storage medium
CN111880863B (en) * 2020-07-10 2023-10-24 Oppo广东移动通信有限公司 Application program running method and device, electronic equipment and storage medium
CN112799816A (en) * 2021-02-01 2021-05-14 安徽芯纪元科技有限公司 Multitask program specified task debugging method of embedded operating system
CN112799816B (en) * 2021-02-01 2023-03-31 安徽芯纪元科技有限公司 Multitask program specified task debugging method of embedded operating system
CN114327648A (en) * 2021-12-16 2022-04-12 北京安天网络安全技术有限公司 Drive debugging method and device, electronic equipment and storage medium
CN114327648B (en) * 2021-12-16 2024-02-02 北京安天网络安全技术有限公司 Driving debugging method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN100365590C (en) 2008-01-30

Similar Documents

Publication Publication Date Title
CN100365590C (en) Debugging method for applied programm in simulator of embedded system
US7174544B2 (en) JAVA compile-on-demand service system for accelerating processing speed of JAVA program in data processing system and method thereof
US9766867B2 (en) Systems and methods for improving performance of mobile applications
CN100550907C (en) The method and system of using for the goal systems run-time optimizing in the deployment server
US20050108690A1 (en) System and method of generating applications for mobile devices
US8332818B1 (en) Flash testing framework
CN102279765A (en) Pre-compiling hosted managed code
CN101840415A (en) Method for controlling local resources through LUA scripts under B/S structure
CN103176899A (en) Mobile phone emulator and method for emulating mobile phone functions on host machine
CN111338925A (en) Applet test method, device and system, electronic equipment and storage medium
CN1929399A (en) Embedded Web network management system and its interactive method
CN102622263A (en) Method for implementing embedded system based virtual machine on set-top box
CN112631915B (en) Method, system, device and medium for PCIE device software simulation
CN103678099B (en) A kind of method and device realizing hardware platform and software platform communication
CN114047949A (en) Application system domestic platform migration adaptation method
CN111831395A (en) Behavior monitoring and analyzing method and system
CN109144575B (en) Device and method for running application across operating systems, electronic equipment and memory
CN116431155A (en) Front-end application construction method, medium, device and computing equipment
CN115525282A (en) Method for realizing cross-platform desktop application program and related equipment thereof
Hood et al. A debugger for computational grid applications
CN114443052A (en) Dynamic specialization method and device during IL instruction operation
WO2021230879A1 (en) Generating executables for target operational environments
CN113438273A (en) User-level simulation method and device for application program in Internet of things equipment
CN112559336A (en) Method, device and system for adaptively debugging heterogeneous computing chip and mainboard chip
EP2597568A1 (en) Method and device for improving performance of mobile widget

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Assignee: Yangzhou Inno Intelligent Technology Co., Ltd.

Assignor: Zhejiang University

Contract record no.: 2010320000554

Denomination of invention: Debugging method for applied programm in simulator of embedded system

Granted publication date: 20080130

License type: Exclusive License

Open date: 20050727

Record date: 20100507

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080130

Termination date: 20180131

CF01 Termination of patent right due to non-payment of annual fee