CN112181830B - Memory leak detection method, device, terminal and medium - Google Patents

Memory leak detection method, device, terminal and medium Download PDF

Info

Publication number
CN112181830B
CN112181830B CN202011038408.XA CN202011038408A CN112181830B CN 112181830 B CN112181830 B CN 112181830B CN 202011038408 A CN202011038408 A CN 202011038408A CN 112181830 B CN112181830 B CN 112181830B
Authority
CN
China
Prior art keywords
memory
target objects
target
determining
object type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011038408.XA
Other languages
Chinese (zh)
Other versions
CN112181830A (en
Inventor
陈方毅
陈剑雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meishao Co ltd
Original Assignee
Xiamen Meishao Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meishao Co ltd filed Critical Xiamen Meishao Co ltd
Priority to CN202011038408.XA priority Critical patent/CN112181830B/en
Publication of CN112181830A publication Critical patent/CN112181830A/en
Application granted granted Critical
Publication of CN112181830B publication Critical patent/CN112181830B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/366Software debugging using diagnostics

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application discloses a method, a device, a terminal and a medium for detecting memory leakage. The method comprises the following steps: determining memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on a memory snapshot file of a target application; determining object types to which the target objects respectively belong and memory sizes corresponding to the target objects respectively according to memory related information corresponding to the target objects respectively; determining preset memory thresholds aiming at object types to which a plurality of target objects respectively belong; and if the memory size corresponding to any target object is larger than the memory threshold value aiming at the object type of the any target object, determining that the memory leakage occurs in the any target object. According to the memory leak detection method and device, the memory leak of the object types of the target objects is determined in advance, so that the purpose of judging the memory leak of the object types is achieved, and the detection efficiency of the memory leak detection is improved.

Description

Memory leak detection method, device, terminal and medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a terminal, and a medium for detecting memory leakage.
Background
Among the drawbacks of application programs, memory leak is a relatively difficult error to find. The causes of memory leaks may vary. For example, it may be caused by a software design defect or by an operating system. If the defect of memory leakage exists in the application, especially for software needing long-term uninterrupted operation, the available memory of the system is reduced, the operation efficiency is reduced, and even the system memory is exhausted until paralysis occurs.
Current memory leak tools are only capable of detecting objects of one type. Therefore, the related art has a problem that the memory leak detection cannot be performed on a plurality of objects at the same time.
Disclosure of Invention
In order to solve at least one technical problem, the present application provides a method, an apparatus, a terminal, and a medium for detecting memory leakage.
According to a first aspect of the present application, a method for detecting memory leak is provided, the method including:
determining memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on a memory snapshot file of a target application;
determining object types to which the target objects respectively belong and memory sizes corresponding to the target objects respectively according to memory related information corresponding to the target objects respectively;
determining preset memory thresholds aiming at object types to which a plurality of target objects respectively belong;
and if the memory size corresponding to any target object is larger than the memory threshold value aiming at the object type of any target object, determining that the memory leakage occurs in any target object.
According to a second aspect of the present application, there is provided a memory leak detection apparatus, comprising:
the memory information determining module is used for determining memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on the memory snapshot file of the target application;
the object information determining module is used for determining object types to which the target objects belong respectively and memory sizes corresponding to the target objects respectively according to the memory related information corresponding to the target objects respectively;
the memory threshold value determining module is used for determining preset memory threshold values aiming at object types to which the target objects respectively belong;
and the memory leak detection module is used for determining that memory leak occurs in any target object if the size of the memory corresponding to the target object is larger than the memory threshold value of the object type of the target object.
According to a third aspect of the present application, there is provided a terminal comprising: the memory, the processor and the computer program stored on the memory and capable of running on the processor, when the processor executes the computer program, the memory leak detection method is realized.
According to a fourth aspect of the present application, there is provided a computer-readable storage medium storing computer-executable instructions for performing the method for detecting a memory leak.
The embodiment of the application determines the memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on the memory snapshot file of the target application, determining the object types of the target objects according to the memory related information corresponding to the target objects respectively, and the memory size corresponding to each of the plurality of target objects, determining a preset memory threshold for the object type to which each of the plurality of target objects belongs, if the memory size corresponding to any one of the target objects is larger than the memory threshold for the object type to which the any one of the target objects belongs, the memory leak of any target object is determined, and the memory leak can be judged for multiple object types at the same time by presetting the memory threshold value of the object type to which the target object belongs, so that the detection efficiency of the memory leak detection is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flow chart illustrating a method for detecting memory leakage according to an embodiment of the present disclosure; and
fig. 2 is a block diagram structure diagram of a device for detecting memory leak according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It should be noted that although functional blocks are partitioned in a schematic diagram of an apparatus and a logical order is shown in a flowchart, in some cases, the steps shown or described may be performed in a different order than the partitioning of blocks in the apparatus or the order in the flowchart.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
According to an embodiment of the present application, a method for detecting a memory leak is provided, as shown in fig. 1, the method includes steps S101 to S104.
Step S101: and determining memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on the memory snapshot file of the target application.
Specifically, the memory leak detection tool determines, based on a memory snapshot file of the target application, memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects, respectively.
Specifically, the terminal running the memory leak detection tool and the terminal running the target application may be the same terminal or different terminals. For example, if the memory leak detection tool runs on a PC and the target application runs on a mobile phone, after the mobile phone is connected to the PC, the PC obtains a memory snapshot file for the target application in the mobile phone. The mobile phone and the PC can be connected through a USB data line or through wireless communication protocols such as Bluetooth and the like.
In the embodiment of the present application, the memory snapshot file is used to represent specific information of a plurality of memory indexes applied in a specified time period.
In the embodiment of the application, the memory related information is used for representing information such as a memory occupied by each object of the target application in the running process, a storage path of the object and the like.
Specifically, the target object may be a picture, a character string, an operation interface, or the like. Wherein, the operation interface can be represented by Activity or Fragment.
Step S102: and determining the object types of the target objects and the memory sizes corresponding to the target objects according to the memory related information corresponding to the target objects.
In embodiments of the present application, object types are used to characterize a classification of an object. Specifically, the object type may be generally set to a picture, a character string, an operation interface, or the like.
It should be noted that, in the actual application, the object type may be set according to the business requirement, for example, the object type is divided according to the functional model of the target application.
Step S103: and determining preset memory thresholds aiming at the object types to which the target objects respectively belong.
Specifically, the memory thresholds corresponding to different object types are different. For example, if the object type is a picture, the memory threshold is the maximum value of the memory occupied by the picture; if the object type is a string, then the memory threshold is the maximum value of the string length.
Step S104: and if the memory size corresponding to any target object is larger than the memory threshold value aiming at the object type of any target object, determining that the memory leakage occurs in any target object.
The embodiment of the application determines the memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on the memory snapshot file of the target application, determining the object types of the target objects according to the memory related information corresponding to the target objects respectively, and the memory size corresponding to each of the plurality of target objects, determining a preset memory threshold for the object type to which each of the plurality of target objects belongs, if the memory size corresponding to any one of the target objects is larger than the memory threshold for the object type to which the any one of the target objects belongs, the memory leak of any target object is determined, and the memory leak can be judged for multiple object types at the same time by presetting the memory threshold value of the object type to which the target object belongs, so that the detection efficiency of the memory leak detection is improved.
In some embodiments, the method further comprises;
step S105 (not shown in the figure): and generating memory leakage prompt information according to the memory related information of any target object, so as to optimize the target application according to the memory leakage prompt information.
Specifically, the memory leak prompt refinement system can be displayed through a preset interactive interface, a message prompt window, a pre-bound mailbox account and the like.
In some embodiments, step S102 further comprises:
determining file information description items corresponding to the target objects respectively according to the memory related information corresponding to the target objects respectively;
and determining the object types of the target objects based on the file information description items corresponding to the target objects respectively.
Specifically, the file information description item may uniquely determine an identifier of an object type for a file format, an object identifier, and the like.
Before application, the corresponding relation between the object type and the file information descriptor is preset, so that after the file information descriptors corresponding to the multiple target objects are determined, query is carried out in the corresponding relation, and the object type to which each target object belongs is determined.
In some embodiments, the object types include at least one of:
pictures, character strings and destroyed operation interfaces.
In some embodiments, before step S103, the method further comprises:
generating an interactive interface for selecting pictures, character strings and destroyed interfaces according to the object types to which the target objects belong respectively;
and determining the selected at least one selected object type based on the interactive interface, so as to determine a memory threshold value for the at least one selected object type according to the at least one selected object type.
Specifically, if the selected object type is a picture, performing memory leak detection on all pictures of the target application; and if the selected object type is a character string, performing memory leak detection on all the character strings in the target application. For example, if the first memory threshold is the maximum value of memory occupied for a picture, when the target object includes the picture, if the memory occupied by the picture is greater than the first threshold, it indicates that the picture is leaked, otherwise, the picture is not leaked; if the second memory threshold is the maximum value for the length of the character string, when the target object includes the character string, if the length of the character string is greater than the second threshold, it indicates that the character string is leaked, otherwise, the character string is not leaked.
In some embodiments, step S103 comprises:
and if the object type of any target object is the selected object type, determining a memory threshold value aiming at the object type of any target object.
According to the method and the device, whether the memory leak detection is carried out on the target object is determined by judging the object type of the target object, so that the problem of resource waste caused by indiscriminate memory leak detection of objects of various object types is solved.
In some embodiments, before step S101, the method further comprises:
acquiring a terminal memory snapshot file of a terminal based on a terminal running a target application;
and determining a memory snapshot file aiming at the target application according to the terminal memory snapshot file.
Specifically, the terminal memory snapshot file includes memory snapshot files corresponding to respective applications installed in the terminal. More specifically, the application identifier may be used to search in the terminal memory snapshot file to obtain a memory snapshot file corresponding to the application identifier of the target application.
Another embodiment of the present application provides a device for detecting memory leak, as shown in fig. 2, where the device 20 includes: a memory information determination module 201, an object information determination module 202, a memory threshold determination module 203, and a memory leak detection module 204.
A memory information determining module 201, configured to determine, based on a memory snapshot file of a target application, memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects, respectively;
an object information determining module 202, configured to determine, according to the memory related information corresponding to each of the multiple target objects, an object type to which each of the multiple target objects belongs, and a memory size corresponding to each of the multiple target objects;
a memory threshold determining module 203, configured to determine preset memory thresholds for object types to which the multiple target objects respectively belong;
the memory leak detection module 204 is configured to determine that a memory leak occurs in any target object if the size of the memory corresponding to the target object is greater than a memory threshold for the object type to which the target object belongs.
The embodiment of the application determines the memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on the memory snapshot file of the target application, determining the object types of the target objects according to the memory related information corresponding to the target objects respectively, and the memory size corresponding to each of the plurality of target objects, determining a preset memory threshold for the object type to which each of the plurality of target objects belongs, if the memory size corresponding to any one of the target objects is larger than the memory threshold for the object type to which the any one of the target objects belongs, the memory leak of any target object is determined, and the memory leak can be judged for multiple object types at the same time by presetting the memory threshold value of the object type to which the target object belongs, so that the detection efficiency of the memory leak detection is improved.
Further, the memory leak detection module also comprises;
and the prompt information generation submodule is used for generating memory leakage prompt information according to the memory related information of any target object so as to optimize the target application according to the memory leakage prompt information.
Further, the object information determination module includes:
the description item determining submodule is used for determining file information description items corresponding to the target objects according to the memory related information corresponding to the target objects respectively;
and the object type determining submodule is used for determining the object types of the target objects based on the file information description items corresponding to the target objects respectively.
Further, the object type includes at least one of:
pictures, character strings and destroyed operation interfaces.
Further, before determining the preset memory threshold values for the object types to which the plurality of target objects respectively belong based on the base, the memory threshold value determining module further includes:
the interface generation submodule is used for generating an interactive interface for selecting pictures, character strings and a destroyed interface according to the object types to which the target objects belong respectively;
and the threshold determination submodule is used for determining the selected at least one selected object type based on the interactive interface so as to determine the memory threshold value aiming at the at least one selected object type according to the at least one selected object type.
Further, the memory threshold determination module includes:
and the type judgment sub-module is used for determining the memory threshold value aiming at the object type to which any target object belongs if the object type to which any target object belongs is the selected object type.
Further, before determining the memory related information corresponding to the target objects to be detected and the memory related information corresponding to the target objects respectively based on the memory snapshot file of the target application, the apparatus further includes:
the terminal file acquisition module is used for acquiring a terminal memory snapshot file of the terminal based on the terminal running the target application;
and the snapshot file determining submodule is used for determining the memory snapshot file aiming at the target application according to the terminal memory snapshot file.
Another embodiment of the present application provides a terminal, including: the memory, the processor and the computer program stored on the memory and capable of running on the processor, when the processor executes the computer program, the memory leak detection method is realized.
In particular, the processor may be a CPU, general purpose processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. A processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, a DSP and a microprocessor, or the like.
In particular, the processor is coupled to the memory via a bus, which may include a path for communicating information. The bus may be a PCI bus or an EISA bus, etc. The bus may be divided into an address bus, a data bus, a control bus, etc.
The memory may be, but is not limited to, a ROM or other type of static storage device that can store static information and instructions, a RAM or other type of dynamic storage device that can store information and instructions, an EEPROM, a CD-ROM or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
Optionally, the memory is used for storing codes of computer programs for executing the scheme of the application, and the processor is used for controlling the execution. The processor is configured to execute the application program codes stored in the memory to implement the operations of the apparatus for detecting memory leak according to the embodiment shown in fig. 2.
Yet another embodiment of the present application provides a computer-readable storage medium storing computer-executable instructions for performing the method for detecting a memory leak shown in fig. 1.
The above-described embodiments of the apparatus are merely illustrative, and the units illustrated as separate components may or may not be physically separate, may be located in one place, or may be distributed over a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
One of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
While the present invention has been described with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (7)

1. A method for detecting memory leak is characterized by comprising the following steps:
determining a plurality of target objects to be detected and memory related information corresponding to the target objects respectively based on a memory snapshot file of a target application;
determining object types to which the target objects belong respectively and memory sizes corresponding to the target objects respectively according to the memory related information corresponding to the target objects respectively;
determining preset memory threshold values aiming at object types to which the target objects respectively belong;
if the memory size corresponding to any target object is larger than a memory threshold value aiming at the object type of any target object, determining that memory leakage occurs in any target object;
wherein the object type comprises at least one of: pictures, character strings and destroyed operation interfaces;
before the step of determining the preset memory threshold values for the object types to which the plurality of target objects respectively belong, the method for detecting memory leak further includes:
generating an interactive interface for selecting the picture, the character string and the destroyed interface according to the object types to which the target objects respectively belong;
determining at least one selected object type selected based on the interactive interface, so as to determine a memory threshold value for at least one selected object type according to at least one selected object type;
the step of determining a preset memory threshold value for each object type to which the target objects belong includes:
if the object type to which any one of the target objects belongs is the selected object type, determining the memory threshold value of the object type to which the any one of the target objects belongs.
2. The method of claim 1, further comprising;
and generating memory leak prompt information according to the memory related information of any one target object, so as to optimize the target application according to the memory leak prompt information.
3. The method according to claim 1, wherein the step of determining the object types to which the plurality of target objects belong and the memory sizes corresponding to the plurality of target objects according to the memory-related information comprises:
determining file information description items corresponding to the target objects respectively according to the memory related information corresponding to the target objects respectively;
and determining the object types of the target objects based on the file information description items corresponding to the target objects respectively.
4. The method according to claim 1, wherein before the step of determining the memory related information corresponding to the target objects to be detected and the target objects respectively based on the memory snapshot file of the target application, the method further comprises:
acquiring a terminal memory snapshot file of the terminal based on the terminal running the target application;
and determining the memory snapshot file aiming at the target application according to the terminal memory snapshot file.
5. A memory leak detection apparatus, comprising:
the memory information determining module is used for determining memory related information corresponding to a plurality of target objects to be detected and a plurality of target objects respectively based on a memory snapshot file of a target application;
an object information determining module, configured to determine, according to the memory-related information corresponding to each of the multiple target objects, an object type to which each of the multiple target objects belongs, and a memory size corresponding to each of the multiple target objects;
a memory threshold determination module, configured to determine a preset memory threshold for each object type to which the target objects belong;
a memory leak detection module, configured to determine that a memory leak occurs in any one of the target objects if the size of the memory corresponding to the any one of the target objects is greater than a memory threshold for an object type to which the any one of the target objects belongs;
wherein the object type comprises at least one of: pictures, character strings and destroyed operation interfaces;
the memory threshold determination module further comprises:
an interface generation submodule, configured to generate an interactive interface for selecting the picture, the character string, and the destroyed interface according to the object types to which the plurality of target objects respectively belong;
the threshold value determining submodule is used for determining at least one selected object type based on the interactive interface so as to determine a memory threshold value aiming at the at least one selected object type according to the at least one selected object type;
a type judgment sub-module, configured to determine the memory threshold for the object type to which any one of the target objects belongs if the object type to which the any one of the target objects belongs is the selected object type.
6. A terminal, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor executes the computer program to implement the method of any of claims 1 to 4.
7. A computer-readable storage medium storing computer-executable instructions for performing the method of any one of claims 1-4.
CN202011038408.XA 2020-09-28 2020-09-28 Memory leak detection method, device, terminal and medium Active CN112181830B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011038408.XA CN112181830B (en) 2020-09-28 2020-09-28 Memory leak detection method, device, terminal and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011038408.XA CN112181830B (en) 2020-09-28 2020-09-28 Memory leak detection method, device, terminal and medium

Publications (2)

Publication Number Publication Date
CN112181830A CN112181830A (en) 2021-01-05
CN112181830B true CN112181830B (en) 2022-08-09

Family

ID=73945191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011038408.XA Active CN112181830B (en) 2020-09-28 2020-09-28 Memory leak detection method, device, terminal and medium

Country Status (1)

Country Link
CN (1) CN112181830B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113434429A (en) * 2021-07-09 2021-09-24 青岛海尔科技有限公司 Memory fault detection method, device and equipment for application program
CN117149477A (en) * 2023-02-08 2023-12-01 荣耀终端有限公司 Memory leakage detection method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105446871A (en) * 2014-08-26 2016-03-30 华为技术有限公司 Resource leakage detection method, apparatus and system
CN110377977A (en) * 2019-06-28 2019-10-25 南方电网科学研究院有限责任公司 Detection method, device and the storage medium of sensitive information leakage

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100504811C (en) * 2007-06-13 2009-06-24 中兴通讯股份有限公司 Method for detecting RAM leakage
CN103064784B (en) * 2012-11-29 2016-01-27 福建师范大学 Towards Xen environment run-time memory leakage detection method and realize system
CN107967205B (en) * 2016-10-18 2020-12-29 阿里巴巴(中国)有限公司 Memory analysis method, device and system and computing equipment
KR102148736B1 (en) * 2018-08-23 2020-10-14 세메스 주식회사 A method of monitoring usage of memory and a substrate processing apparatus
CN111258797B (en) * 2020-01-13 2023-04-18 北京字节跳动网络技术有限公司 Memory leak detection method, device, medium and electronic equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105446871A (en) * 2014-08-26 2016-03-30 华为技术有限公司 Resource leakage detection method, apparatus and system
CN110377977A (en) * 2019-06-28 2019-10-25 南方电网科学研究院有限责任公司 Detection method, device and the storage medium of sensitive information leakage

Also Published As

Publication number Publication date
CN112181830A (en) 2021-01-05

Similar Documents

Publication Publication Date Title
CN112181830B (en) Memory leak detection method, device, terminal and medium
CN104268055A (en) Program exception monitoring method and device
CN108664394B (en) Memory leakage process tracing method and device
CN109672608B (en) Method for transmitting messages according to time
CN111857712A (en) Form processing method, device, terminal and medium
CN103379145B (en) The method, apparatus and system of information processing
CN112241362A (en) Test method, test device, server and storage medium
CN108133026B (en) Multi-data processing method, system and storage medium
CN110647463B (en) Method and device for restoring test breakpoint and electronic equipment
CN110442353B (en) Installation package management method and device and electronic equipment
CN105975567B (en) Method and device for processing internal file of application program
CN110704302B (en) Mapping relation establishing method and device, and system breakdown shunting method and device
CN115033927A (en) Method, device, equipment and medium for detecting data integrity
CN111158565B (en) Page turning prompting method and device, electronic equipment and storage medium
CN104407846B (en) Information processing method and device
CN111538651A (en) Interface testing method, device, server and storage medium
CN109491699B (en) Resource checking method, device, equipment and storage medium of application program
CN115080504A (en) File management method, terminal and storage medium
CN112988776A (en) Method, device and equipment for updating text parsing rule and readable storage medium
CN113821193A (en) Information generation method and device and storage medium
CN112202760A (en) Webpage access method, device, terminal and medium
CN112182377A (en) Message pushing processing method, device, terminal and medium
CN111309410B (en) Program object determining method and device
CN115048364A (en) Method and device for writing data into database and database server
CN116010108A (en) Binary rearrangement pre-analysis method, binary rearrangement pre-analysis device, binary rearrangement pre-analysis equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant