Linux Kernel Space Debugging

  • Soujanya
  • 8 (Registered)
  • (3 Reviews)
Linux kernel space debugging
12
Mar

Description:

This training is targeted primarily at software professionals – tech leads, system programmers / developers, maintainers and testers – who would like to delve much deeper into the internal functioning of the Linux operating system. This may be in order to work on a project involving this directly or indirectly (for example, for those on an application development project on the Linux platform, this training would give them tremendous insight into optimization and code tweaking based on internal factors). Opensource (and closed-source commercial) contributors / developers (or to-be contributors) would find this training very useful as well.
This training is based on the latest 2.6.x / 3.x / 4.x Linux kernel. It starts with a quick and comprehensive look at the overall Linux OS architecture, monolithic kernel approach. It then moves into deep technical discussion of various kernel internal topics: kernel architecture, process descriptor, task list, task creation (with code walkthrough), CPU scheduler design and implementation, virtual memory and memory management.
In-depth coverage continues on: kernel space debugging.
Throughout, professional / industry best practices are taught and encouraged.

 Duration:

1 Day or 8 hours

 Prerequisites:

It is very important that the prerequisite(s) marked as Mandatory below be met by all participants intending to attend this training, either by having successfully attended a training program (mentioned below), or having the equivalent knowledge / skill sets.

Mandatory:

  • Good working knowledge of and experience programming using the ‘C’
  • Successfully attended the “LINUX Fundamentals for Software Developers” training program -or-have the equivalent knowledge / skill
  • Successfully attended the “Advanced LINUX Programming” training program -or-have the equivalent knowledge / skill Implies knowledge / skill sets of: POSIX library and system call API set, process management, IPC mechanisms, etc.

Optional / Advantageous:

  • Extensive user-space development experience on a POSIX

Detailed Coverage:

  • Kernel Code-based Techniques for Debugging
  • Debugging by Printing with the printk
  • Loglevels
  • Programatically turning Messages On and Off
  • Rate Limiting
  • Where you can and cannot use printk
  • trace_printk as an alternative.
  • Ftrace
  • The Need
  • Kernel configuration
  • Usage
  • Example Usage
  • Manually
  • Automated with shell scripts.
  • A Header of Convenience.
  • Using debugfs programatically
  • Introduction
  • Debugfs pre-requisites
  • The debugfs API (ABI)
  • Full example walk-through.
  • Debugging System Faults
  • Oops Messages
  • Generating a (trivial) Oops
  • Analyzing an Oops dump
  • Article: “The foggy crystal ball: Understanding Oopses”
  • Generating a mixed source-assembly-machine-language dump
  •   Lab Assignment:
  • System Hangs
  • Using the Magic SysRq Facility
  • WARN, BUG, etc macros
  • Kernel Panic:
  • Setting up your own panic handler using the kernel
  • panic chain notifier mechanism.
  • A note on Watchdog Timers.
  • Kernel-Level Debuggers
  • Using gdb for kernel-space
  • gdb and loadable kernel modules.
  • KGDB
  • Introduction
  • kgdb setup
  • Initiating a debugging session on the target system
  • Using the kernel debugger kgdb
  • Useful gdb Macros
  • Debugging kernel modules
  • Using QEMU and [k]gdb for source-level kernel debugging
  • Stand-alone kernel debug
  • Building a root filesystem for Qemu VM
  • Sample Debug Session – KGDB with ARM
  • objdump
  • gcc : setting debug flags
  • For debug symbolic information
  • For mixed source-assembly-machine language listing.
  • Kernel-Level Tools
  • Dynamic Probes – Kprobes & Jprobes – Essentials
  • Introduction
  • Kernel build and setup
  • Kprobe Interfaces
  • Using Jumper Probes (jprobes)
  • Kprobes, JProbes and Loadable Kernel Modules
  • A basic automated framework
  • Usage
  • KRetprobes
  • SystemTap.
  •  Essentials of Kdump, kexec and crash
  • Motivation
  • The kexec with kdump feature
  • Tools and kernel installation
  • Usage Procedure documentation.
  • Real-world eg.: Setting up and using kdump/crash on a Qemu ARM embedded Linux.
  • Kernel Hacking Config Options.

Enroll Now

Course Content

Time: 3 days

Curriculum is empty

Instructor

4.7

3 rating

5 stars
67%
4 stars
33%
3 stars
0%
2 stars
0%
1 star
0%
  • Amrendu Kumar

    lively and informative training session

    The important tools used for debugging and monitoring the kernel, and how security features are implemented and controlled. This course provided me an experience with a solid understanding of Linux kernel, debugging techniques and tools.
  • Saravanan R

    The trainer was enthusiastic and kept me interested

    This is the one of the best course to enhance our skills. Every Person with programming knowledge can develop good skills and also because of good environment of lab. Assignments and notes of every topic were provided with proper knowledge
  • Venkatesh

    Meeting Objectives, More Confident now

    It covers the technology which leading into market. The trainer himself has a great work experience in industry of respective technologies. We never left in doubt at any point of the course timeline
Free

Customized, Immersive, Hands-On Driven

Includes

  • Real time virtual classes
  • Pre course reading material
  • Suppliment resources
  • Language: English
  • Certificate of completion

Enroll Now

Your Dream Course Is Only A Step Away




<


Your Dream Course Is Only A Step Away




<


Your Dream Course Is Only A Step Away




<