CN112181830B - Memory leak detection method, device, terminal and medium - Google Patents
Memory leak detection method, device, terminal and medium Download PDFInfo
- Publication number
- CN112181830B CN112181830B CN202011038408.XA CN202011038408A CN112181830B CN 112181830 B CN112181830 B CN 112181830B CN 202011038408 A CN202011038408 A CN 202011038408A CN 112181830 B CN112181830 B CN 112181830B
- Authority
- CN
- China
- Prior art keywords
- memory
- target objects
- target
- determining
- object type
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/366—Software debugging using diagnostics
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
The application discloses a method, a device, a terminal and a medium for detecting memory leakage. The method comprises the following steps: determining memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on a memory snapshot file of a target application; determining object types to which the target objects respectively belong and memory sizes corresponding to the target objects respectively according to memory related information corresponding to the target objects respectively; determining preset memory thresholds aiming at object types to which a plurality of target objects respectively belong; and if the memory size corresponding to any target object is larger than the memory threshold value aiming at the object type of the any target object, determining that the memory leakage occurs in the any target object. According to the memory leak detection method and device, the memory leak of the object types of the target objects is determined in advance, so that the purpose of judging the memory leak of the object types is achieved, and the detection efficiency of the memory leak detection is improved.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a terminal, and a medium for detecting memory leakage.
Background
Among the drawbacks of application programs, memory leak is a relatively difficult error to find. The causes of memory leaks may vary. For example, it may be caused by a software design defect or by an operating system. If the defect of memory leakage exists in the application, especially for software needing long-term uninterrupted operation, the available memory of the system is reduced, the operation efficiency is reduced, and even the system memory is exhausted until paralysis occurs.
Current memory leak tools are only capable of detecting objects of one type. Therefore, the related art has a problem that the memory leak detection cannot be performed on a plurality of objects at the same time.
Disclosure of Invention
In order to solve at least one technical problem, the present application provides a method, an apparatus, a terminal, and a medium for detecting memory leakage.
According to a first aspect of the present application, a method for detecting memory leak is provided, the method including:
determining memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on a memory snapshot file of a target application;
determining object types to which the target objects respectively belong and memory sizes corresponding to the target objects respectively according to memory related information corresponding to the target objects respectively;
determining preset memory thresholds aiming at object types to which a plurality of target objects respectively belong;
and if the memory size corresponding to any target object is larger than the memory threshold value aiming at the object type of any target object, determining that the memory leakage occurs in any target object.
According to a second aspect of the present application, there is provided a memory leak detection apparatus, comprising:
the memory information determining module is used for determining memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on the memory snapshot file of the target application;
the object information determining module is used for determining object types to which the target objects belong respectively and memory sizes corresponding to the target objects respectively according to the memory related information corresponding to the target objects respectively;
the memory threshold value determining module is used for determining preset memory threshold values aiming at object types to which the target objects respectively belong;
and the memory leak detection module is used for determining that memory leak occurs in any target object if the size of the memory corresponding to the target object is larger than the memory threshold value of the object type of the target object.
According to a third aspect of the present application, there is provided a terminal comprising: the memory, the processor and the computer program stored on the memory and capable of running on the processor, when the processor executes the computer program, the memory leak detection method is realized.
According to a fourth aspect of the present application, there is provided a computer-readable storage medium storing computer-executable instructions for performing the method for detecting a memory leak.
The embodiment of the application determines the memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on the memory snapshot file of the target application, determining the object types of the target objects according to the memory related information corresponding to the target objects respectively, and the memory size corresponding to each of the plurality of target objects, determining a preset memory threshold for the object type to which each of the plurality of target objects belongs, if the memory size corresponding to any one of the target objects is larger than the memory threshold for the object type to which the any one of the target objects belongs, the memory leak of any target object is determined, and the memory leak can be judged for multiple object types at the same time by presetting the memory threshold value of the object type to which the target object belongs, so that the detection efficiency of the memory leak detection is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flow chart illustrating a method for detecting memory leakage according to an embodiment of the present disclosure; and
fig. 2 is a block diagram structure diagram of a device for detecting memory leak according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It should be noted that although functional blocks are partitioned in a schematic diagram of an apparatus and a logical order is shown in a flowchart, in some cases, the steps shown or described may be performed in a different order than the partitioning of blocks in the apparatus or the order in the flowchart.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
According to an embodiment of the present application, a method for detecting a memory leak is provided, as shown in fig. 1, the method includes steps S101 to S104.
Step S101: and determining memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on the memory snapshot file of the target application.
Specifically, the memory leak detection tool determines, based on a memory snapshot file of the target application, memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects, respectively.
Specifically, the terminal running the memory leak detection tool and the terminal running the target application may be the same terminal or different terminals. For example, if the memory leak detection tool runs on a PC and the target application runs on a mobile phone, after the mobile phone is connected to the PC, the PC obtains a memory snapshot file for the target application in the mobile phone. The mobile phone and the PC can be connected through a USB data line or through wireless communication protocols such as Bluetooth and the like.
In the embodiment of the present application, the memory snapshot file is used to represent specific information of a plurality of memory indexes applied in a specified time period.
In the embodiment of the application, the memory related information is used for representing information such as a memory occupied by each object of the target application in the running process, a storage path of the object and the like.
Specifically, the target object may be a picture, a character string, an operation interface, or the like. Wherein, the operation interface can be represented by Activity or Fragment.
Step S102: and determining the object types of the target objects and the memory sizes corresponding to the target objects according to the memory related information corresponding to the target objects.
In embodiments of the present application, object types are used to characterize a classification of an object. Specifically, the object type may be generally set to a picture, a character string, an operation interface, or the like.
It should be noted that, in the actual application, the object type may be set according to the business requirement, for example, the object type is divided according to the functional model of the target application.
Step S103: and determining preset memory thresholds aiming at the object types to which the target objects respectively belong.
Specifically, the memory thresholds corresponding to different object types are different. For example, if the object type is a picture, the memory threshold is the maximum value of the memory occupied by the picture; if the object type is a string, then the memory threshold is the maximum value of the string length.
Step S104: and if the memory size corresponding to any target object is larger than the memory threshold value aiming at the object type of any target object, determining that the memory leakage occurs in any target object.
The embodiment of the application determines the memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on the memory snapshot file of the target application, determining the object types of the target objects according to the memory related information corresponding to the target objects respectively, and the memory size corresponding to each of the plurality of target objects, determining a preset memory threshold for the object type to which each of the plurality of target objects belongs, if the memory size corresponding to any one of the target objects is larger than the memory threshold for the object type to which the any one of the target objects belongs, the memory leak of any target object is determined, and the memory leak can be judged for multiple object types at the same time by presetting the memory threshold value of the object type to which the target object belongs, so that the detection efficiency of the memory leak detection is improved.
In some embodiments, the method further comprises;
step S105 (not shown in the figure): and generating memory leakage prompt information according to the memory related information of any target object, so as to optimize the target application according to the memory leakage prompt information.
Specifically, the memory leak prompt refinement system can be displayed through a preset interactive interface, a message prompt window, a pre-bound mailbox account and the like.
In some embodiments, step S102 further comprises:
determining file information description items corresponding to the target objects respectively according to the memory related information corresponding to the target objects respectively;
and determining the object types of the target objects based on the file information description items corresponding to the target objects respectively.
Specifically, the file information description item may uniquely determine an identifier of an object type for a file format, an object identifier, and the like.
Before application, the corresponding relation between the object type and the file information descriptor is preset, so that after the file information descriptors corresponding to the multiple target objects are determined, query is carried out in the corresponding relation, and the object type to which each target object belongs is determined.
In some embodiments, the object types include at least one of:
pictures, character strings and destroyed operation interfaces.
In some embodiments, before step S103, the method further comprises:
generating an interactive interface for selecting pictures, character strings and destroyed interfaces according to the object types to which the target objects belong respectively;
and determining the selected at least one selected object type based on the interactive interface, so as to determine a memory threshold value for the at least one selected object type according to the at least one selected object type.
Specifically, if the selected object type is a picture, performing memory leak detection on all pictures of the target application; and if the selected object type is a character string, performing memory leak detection on all the character strings in the target application. For example, if the first memory threshold is the maximum value of memory occupied for a picture, when the target object includes the picture, if the memory occupied by the picture is greater than the first threshold, it indicates that the picture is leaked, otherwise, the picture is not leaked; if the second memory threshold is the maximum value for the length of the character string, when the target object includes the character string, if the length of the character string is greater than the second threshold, it indicates that the character string is leaked, otherwise, the character string is not leaked.
In some embodiments, step S103 comprises:
and if the object type of any target object is the selected object type, determining a memory threshold value aiming at the object type of any target object.
According to the method and the device, whether the memory leak detection is carried out on the target object is determined by judging the object type of the target object, so that the problem of resource waste caused by indiscriminate memory leak detection of objects of various object types is solved.
In some embodiments, before step S101, the method further comprises:
acquiring a terminal memory snapshot file of a terminal based on a terminal running a target application;
and determining a memory snapshot file aiming at the target application according to the terminal memory snapshot file.
Specifically, the terminal memory snapshot file includes memory snapshot files corresponding to respective applications installed in the terminal. More specifically, the application identifier may be used to search in the terminal memory snapshot file to obtain a memory snapshot file corresponding to the application identifier of the target application.
Another embodiment of the present application provides a device for detecting memory leak, as shown in fig. 2, where the device 20 includes: a memory information determination module 201, an object information determination module 202, a memory threshold determination module 203, and a memory leak detection module 204.
A memory information determining module 201, configured to determine, based on a memory snapshot file of a target application, memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects, respectively;
an object information determining module 202, configured to determine, according to the memory related information corresponding to each of the multiple target objects, an object type to which each of the multiple target objects belongs, and a memory size corresponding to each of the multiple target objects;
a memory threshold determining module 203, configured to determine preset memory thresholds for object types to which the multiple target objects respectively belong;
the memory leak detection module 204 is configured to determine that a memory leak occurs in any target object if the size of the memory corresponding to the target object is greater than a memory threshold for the object type to which the target object belongs.
The embodiment of the application determines the memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on the memory snapshot file of the target application, determining the object types of the target objects according to the memory related information corresponding to the target objects respectively, and the memory size corresponding to each of the plurality of target objects, determining a preset memory threshold for the object type to which each of the plurality of target objects belongs, if the memory size corresponding to any one of the target objects is larger than the memory threshold for the object type to which the any one of the target objects belongs, the memory leak of any target object is determined, and the memory leak can be judged for multiple object types at the same time by presetting the memory threshold value of the object type to which the target object belongs, so that the detection efficiency of the memory leak detection is improved.
Further, the memory leak detection module also comprises;
and the prompt information generation submodule is used for generating memory leakage prompt information according to the memory related information of any target object so as to optimize the target application according to the memory leakage prompt information.
Further, the object information determination module includes:
the description item determining submodule is used for determining file information description items corresponding to the target objects according to the memory related information corresponding to the target objects respectively;
and the object type determining submodule is used for determining the object types of the target objects based on the file information description items corresponding to the target objects respectively.
Further, the object type includes at least one of:
pictures, character strings and destroyed operation interfaces.
Further, before determining the preset memory threshold values for the object types to which the plurality of target objects respectively belong based on the base, the memory threshold value determining module further includes:
the interface generation submodule is used for generating an interactive interface for selecting pictures, character strings and a destroyed interface according to the object types to which the target objects belong respectively;
and the threshold determination submodule is used for determining the selected at least one selected object type based on the interactive interface so as to determine the memory threshold value aiming at the at least one selected object type according to the at least one selected object type.
Further, the memory threshold determination module includes:
and the type judgment sub-module is used for determining the memory threshold value aiming at the object type to which any target object belongs if the object type to which any target object belongs is the selected object type.
Further, before determining the memory related information corresponding to the target objects to be detected and the memory related information corresponding to the target objects respectively based on the memory snapshot file of the target application, the apparatus further includes:
the terminal file acquisition module is used for acquiring a terminal memory snapshot file of the terminal based on the terminal running the target application;
and the snapshot file determining submodule is used for determining the memory snapshot file aiming at the target application according to the terminal memory snapshot file.
Another embodiment of the present application provides a terminal, including: the memory, the processor and the computer program stored on the memory and capable of running on the processor, when the processor executes the computer program, the memory leak detection method is realized.
In particular, the processor may be a CPU, general purpose processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. A processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, a DSP and a microprocessor, or the like.
In particular, the processor is coupled to the memory via a bus, which may include a path for communicating information. The bus may be a PCI bus or an EISA bus, etc. The bus may be divided into an address bus, a data bus, a control bus, etc.
The memory may be, but is not limited to, a ROM or other type of static storage device that can store static information and instructions, a RAM or other type of dynamic storage device that can store information and instructions, an EEPROM, a CD-ROM or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
Optionally, the memory is used for storing codes of computer programs for executing the scheme of the application, and the processor is used for controlling the execution. The processor is configured to execute the application program codes stored in the memory to implement the operations of the apparatus for detecting memory leak according to the embodiment shown in fig. 2.
Yet another embodiment of the present application provides a computer-readable storage medium storing computer-executable instructions for performing the method for detecting a memory leak shown in fig. 1.
The above-described embodiments of the apparatus are merely illustrative, and the units illustrated as separate components may or may not be physically separate, may be located in one place, or may be distributed over a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
One of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
While the present invention has been described with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (7)
1. A method for detecting memory leak is characterized by comprising the following steps:
determining a plurality of target objects to be detected and memory related information corresponding to the target objects respectively based on a memory snapshot file of a target application;
determining object types to which the target objects belong respectively and memory sizes corresponding to the target objects respectively according to the memory related information corresponding to the target objects respectively;
determining preset memory threshold values aiming at object types to which the target objects respectively belong;
if the memory size corresponding to any target object is larger than a memory threshold value aiming at the object type of any target object, determining that memory leakage occurs in any target object;
wherein the object type comprises at least one of: pictures, character strings and destroyed operation interfaces;
before the step of determining the preset memory threshold values for the object types to which the plurality of target objects respectively belong, the method for detecting memory leak further includes:
generating an interactive interface for selecting the picture, the character string and the destroyed interface according to the object types to which the target objects respectively belong;
determining at least one selected object type selected based on the interactive interface, so as to determine a memory threshold value for at least one selected object type according to at least one selected object type;
the step of determining a preset memory threshold value for each object type to which the target objects belong includes:
if the object type to which any one of the target objects belongs is the selected object type, determining the memory threshold value of the object type to which the any one of the target objects belongs.
2. The method of claim 1, further comprising;
and generating memory leak prompt information according to the memory related information of any one target object, so as to optimize the target application according to the memory leak prompt information.
3. The method according to claim 1, wherein the step of determining the object types to which the plurality of target objects belong and the memory sizes corresponding to the plurality of target objects according to the memory-related information comprises:
determining file information description items corresponding to the target objects respectively according to the memory related information corresponding to the target objects respectively;
and determining the object types of the target objects based on the file information description items corresponding to the target objects respectively.
4. The method according to claim 1, wherein before the step of determining the memory related information corresponding to the target objects to be detected and the target objects respectively based on the memory snapshot file of the target application, the method further comprises:
acquiring a terminal memory snapshot file of the terminal based on the terminal running the target application;
and determining the memory snapshot file aiming at the target application according to the terminal memory snapshot file.
5. A memory leak detection apparatus, comprising:
the memory information determining module is used for determining memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on a memory snapshot file of a target application;
an object information determining module, configured to determine, according to the memory-related information corresponding to each of the multiple target objects, an object type to which each of the multiple target objects belongs, and a memory size corresponding to each of the multiple target objects;
a memory threshold determination module, configured to determine a preset memory threshold for each object type to which the target objects belong;
a memory leak detection module, configured to determine that a memory leak occurs in any one of the target objects if the size of the memory corresponding to the any one of the target objects is greater than a memory threshold for an object type to which the any one of the target objects belongs;
wherein the object type comprises at least one of: pictures, character strings and destroyed operation interfaces;
the memory threshold determination module further comprises:
an interface generation submodule, configured to generate an interactive interface for selecting the picture, the character string, and the destroyed interface according to the object types to which the plurality of target objects respectively belong;
the threshold value determining submodule is used for determining at least one selected object type based on the interactive interface so as to determine a memory threshold value aiming at the at least one selected object type according to the at least one selected object type;
a type judgment sub-module, configured to determine the memory threshold for the object type to which any one of the target objects belongs if the object type to which the any one of the target objects belongs is the selected object type.
6. A terminal, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor executes the computer program to implement the method of any of claims 1 to 4.
7. A computer-readable storage medium storing computer-executable instructions for performing the method of any one of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011038408.XA CN112181830B (en) | 2020-09-28 | 2020-09-28 | Memory leak detection method, device, terminal and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011038408.XA CN112181830B (en) | 2020-09-28 | 2020-09-28 | Memory leak detection method, device, terminal and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112181830A CN112181830A (en) | 2021-01-05 |
CN112181830B true CN112181830B (en) | 2022-08-09 |
Family
ID=73945191
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011038408.XA Active CN112181830B (en) | 2020-09-28 | 2020-09-28 | Memory leak detection method, device, terminal and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112181830B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113434429A (en) * | 2021-07-09 | 2021-09-24 | 青岛海尔科技有限公司 | Memory fault detection method, device and equipment for application program |
CN117149477A (en) * | 2023-02-08 | 2023-12-01 | 荣耀终端有限公司 | Memory leakage detection method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105446871A (en) * | 2014-08-26 | 2016-03-30 | 华为技术有限公司 | Resource leakage detection method, apparatus and system |
CN110377977A (en) * | 2019-06-28 | 2019-10-25 | 南方电网科学研究院有限责任公司 | Detection method, device and the storage medium of sensitive information leakage |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100504811C (en) * | 2007-06-13 | 2009-06-24 | 中兴通讯股份有限公司 | Method for detecting RAM leakage |
CN103064784B (en) * | 2012-11-29 | 2016-01-27 | 福建师范大学 | Towards Xen environment run-time memory leakage detection method and realize system |
CN107967205B (en) * | 2016-10-18 | 2020-12-29 | 阿里巴巴(中国)有限公司 | Memory analysis method, device and system and computing equipment |
KR102148736B1 (en) * | 2018-08-23 | 2020-10-14 | 세메스 주식회사 | A method of monitoring usage of memory and a substrate processing apparatus |
CN111258797B (en) * | 2020-01-13 | 2023-04-18 | 北京字节跳动网络技术有限公司 | Memory leak detection method, device, medium and electronic equipment |
-
2020
- 2020-09-28 CN CN202011038408.XA patent/CN112181830B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105446871A (en) * | 2014-08-26 | 2016-03-30 | 华为技术有限公司 | Resource leakage detection method, apparatus and system |
CN110377977A (en) * | 2019-06-28 | 2019-10-25 | 南方电网科学研究院有限责任公司 | Detection method, device and the storage medium of sensitive information leakage |
Also Published As
Publication number | Publication date |
---|---|
CN112181830A (en) | 2021-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112181830B (en) | Memory leak detection method, device, terminal and medium | |
CN104268055A (en) | Program exception monitoring method and device | |
CN108664394B (en) | Memory leakage process tracing method and device | |
CN109672608B (en) | Method for transmitting messages according to time | |
CN111857712A (en) | Form processing method, device, terminal and medium | |
CN103379145B (en) | The method, apparatus and system of information processing | |
CN112241362A (en) | Test method, test device, server and storage medium | |
CN108133026B (en) | Multi-data processing method, system and storage medium | |
CN110647463B (en) | Method and device for restoring test breakpoint and electronic equipment | |
CN110442353B (en) | Installation package management method and device and electronic equipment | |
CN105975567B (en) | Method and device for processing internal file of application program | |
CN110704302B (en) | Mapping relation establishing method and device, and system breakdown shunting method and device | |
CN115033927A (en) | Method, device, equipment and medium for detecting data integrity | |
CN111158565B (en) | Page turning prompting method and device, electronic equipment and storage medium | |
CN104407846B (en) | Information processing method and device | |
CN111538651A (en) | Interface testing method, device, server and storage medium | |
CN109491699B (en) | Resource checking method, device, equipment and storage medium of application program | |
CN115080504A (en) | File management method, terminal and storage medium | |
CN112988776A (en) | Method, device and equipment for updating text parsing rule and readable storage medium | |
CN113821193A (en) | Information generation method and device and storage medium | |
CN112202760A (en) | Webpage access method, device, terminal and medium | |
CN112182377A (en) | Message pushing processing method, device, terminal and medium | |
CN111309410B (en) | Program object determining method and device | |
CN115048364A (en) | Method and device for writing data into database and database server | |
CN116010108A (en) | Binary rearrangement pre-analysis method, binary rearrangement pre-analysis device, binary rearrangement pre-analysis equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |