期刊文献+

基于Valgrind的嵌入式应用程序调试技术 被引量:1

debug technology of embedded program based on Valgrind A
下载PDF
导出
摘要 本文介绍了一种利用调试软件Valgrind进行嵌入式应用程序错误查找的技术,利用它可以高效、自动地查找出程序中的多种错误。首先介绍了嵌入式程序常见错误,接着研究了Valgrind的工作原理,最后介绍了利用Valgrind进行程序错误检测的步骤和应用实例。 In this paper, a technology to detect the errors of program by using Valgrind is introduced. Many errors of program can be found automatically and efficiently with the help of Valgrind. Firstly, some familiar errors of embedded program are introduced. Secondly the principle of Vatgrind is studied. Finally the steps of using Valgrind to avoid errors are brought forward.
出处 《微计算机信息》 2009年第5期58-59,244,共3页 Control & Automation
基金 <面向起升和运输设备的嵌入式安全监控系统的研究与开发> 上海市科委科技攻关计划基金项目(04DZ15011) <面向谐波检测的嵌入式系统的研究与开发> 浙江省科技攻关计划基金项目(2006C21018)
关键词 Valgrind 嵌入式系统 LINUX 内存操作 Valgrind Embedded system Linux Memory operation
  • 相关文献

参考文献7

  • 1彭闻宇,陈朔鹰.Linux应用程序调试技术的研究[J].微计算机信息,2006(10Z):181-183. 被引量:7
  • 2Julian Seward, Nicholas Nethercote, Jeremy Fitzhardinge, et al. Valgrind. http://www.valgrind.org/.
  • 3张红光,张健民,李福才.嵌入式系统虚拟运行平台的设计与研究[J].微电子学与计算机,2005,22(6):101-103. 被引量:6
  • 4Julian Seward and Nicholas Nethercote. Using Valgrind to detect undefined value errors with bit-precision. In Proceedings of the USENIX Annual Technical Conference, pages 17-30, USA, 2005.
  • 5Reed Hastings and Bob Joyce. Purify: Fast detection of memory leaks and access errors. In Proceedings of the Winter USENIX Conference, pages 125 - 136, San Francisco, California, USA, January 1992.
  • 6J. C. Huang. Detection of data flow anomaly through program instrumentation. IEEE Transactions on Software Engineering, 5(3): 226 - 236, May 1979.
  • 7周红波.嵌入式系统软件开发环境中调试器的设计[J].微计算机信息,2006(05Z):60-61. 被引量:10

二级参考文献11

  • 1李俊平,梅洪,单家元.基于Linux的实时平台的研究[J].微计算机信息,2005,21(06Z):21-23. 被引量:15
  • 2林涛,孙鹤旭,云立军,梁涛,穆滢.Linux在嵌入式系统中的实现[J].微计算机信息,2005,21(06Z):27-28. 被引量:10
  • 3Bill Blunden. Virtual machine Implementation in C/C++[M]. Wordware Publishing inc, 2002: 5~200.
  • 4Michael Podanoffsky. Dissecting DOS [M]. Addison-Wesley, 1995: 167~320.
  • 5K Jain and R Sekar. User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. In Proceedings of the Network and Distributed System Security Symposium, Feb. 2000: 1~20.
  • 6《Linux》与嵌入式系统,李善平等著.清华大学出版社,2002.12
  • 7Craig A.HaUer The ZEN of BDM
  • 8MPC860 User's Manual.Motorola Inc.1988
  • 9Maurice Bach,The Design of the UNIX Operating System,Prentice Hall,Upper Saddle River,NJ,1986,ISBN 0-13-201757-1.
  • 10Daniel Bovet & Marco Cesati,Understanding the Linux Kernel,O' Reilly & Associates,Inc.,Sebastopol,CA,January 2001,ISBN 0-596-00002-2.

共引文献20

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部