Unlock instant, AI-driven research and patent intelligence for your innovation.

Driver Configuration Debugging Method Based on Log Injection

A debugging method and log technology, applied in the field of computer security protection, can solve problems such as system crashes, function tests without too much consideration of system environment configuration, short test cycle, etc., and achieve the effect of improving reliability

Active Publication Date: 2016-09-21
TSINGHUA UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] According to the requirements of the device manual, the DMA address filled in the device must be a physical memory address, and the linear address of the kernel cannot be used
However, in some system implementation mechanisms, the linear address within 1G of the kernel is consistent with the physical address, so when the page table expands and the configuration table changes, directly filling the DMA with the unconverted linear memory address may cause the system to crash
[0007] Because programmers are often confident enough in their own programs, the test cycle is short, while the function and correctness tests of device drivers often depend on specific hardware, the test cycle is short, and there are few test scenarios. They only care about function realization without too much Consider related functional tests such as system environment configuration

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Driver Configuration Debugging Method Based on Log Injection
  • Driver Configuration Debugging Method Based on Log Injection
  • Driver Configuration Debugging Method Based on Log Injection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0026] The present invention provides a log injection-based driver configuration debugging method, including:

[0027] S1. Extract configuration specification documents such as device registers of the driver;

[0028] S2. Perform detection hook injection on the driver according to the driver configuration document;

[0029] S3. Add a relevant type of log function at the detection hook position;

[0030] S4. Run the modified driver, and dynamically monitor the operation of the driver during runtime. When a configuration exception occurs, it can catch the exception in time, and automatically handle some errors. For the exception that cannot be handled, submit the log to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a driver configuration debugging method based on log injection, comprising: S1. extracting the configuration specification document of the device register of the driver; S2. injecting the driver with a detection hook according to the configuration specification document; S3. at the location of the detection hook Add related types of log functions; S4. Run the modified driver, and dynamically monitor the operation of the driver during runtime. The log injection-based driver configuration debugging method of the present invention can insert inspection codes into the driver according to the requirements of the configuration document, dynamically check the configuration parameters in the driver configuration during operation, and record and process errors in time when errors occur, thereby improving the reliability of the driver sex.

Description

technical field [0001] The invention relates to the technical field of computer security protection, in particular to a log injection-based driver configuration debugging method. Background technique [0002] In the current general-purpose operating system, drivers are often loaded into the kernel in the form of modules to run, and call a large number of kernel extensions. In Linux, the driver occupies 70% of the code of the operating system, and causes 3-7 times more errors than the kernel code. In Windows, it is also reported that 85% of system crashes are related to driver errors. [0003] Drivers run in the form of kernel extensions, and most of them run in the kernel state, so the reliability of the driver is very important to the system. However, since driver development is often separated from system development, slight changes in kernel extension functions may cause driver instability. In addition, many driver developers violate the usage specification of kernel ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
Inventor 胡事民刘虎球白家驹马超
Owner TSINGHUA UNIV