Method and system for internal memory monitoring management

A technology of memory management and monitoring management, applied in the direction of multi-program device, resource allocation, etc., can solve problems such as difficulty in locating source code, achieve the effects of ensuring safe use, saving development and debugging time, and improving memory allocation efficiency

Inactive Publication Date: 2009-07-08
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In short, since memory leaks and illegal access to memory occur during the runtime of the program, it is often difficult to locate the relevant source code after such problems occur.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for internal memory monitoring management
  • Method and system for internal memory monitoring management
  • Method and system for internal memory monitoring management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The purpose of the embodiment of the present invention is to provide an efficient memory monitoring and management module for C language (comprising VC, C++, etc.) Monitor and access, track and record memory leaks and illegal access information, and provide traceability basis for developers to quickly and accurately locate program problems.

[0044] The method described in the embodiment of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0045] First, integrate the memory management module into the application; specifically, figure 1 as shown, figure 1 It is a schematic flow chart of integrating the memory management module into the application program, which specifically includes the following steps:

[0046] Step 101: Add the source code of the memory management module to the target project.

[0047] Step 102: Add #include ". / mem / dmalloc.h" reference in the target C file to introduce overloaded functions; spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The utility model discloses a method and a system to control the memory management, which comprises: A. Integrate the memory management module into the application program; B. the memory management module can monitor the memory allocation and access when the application program is running, so as to keep track of and record the memory leakage and / or illegal access information; C. regularly report the memory leakage and / or illegal access information to the users, so that the users can locate the relevant codes as per the memory leakage and / or illegal access information. In conclusion, the utility model provides a method and a system to control memory management through keeping track of and recording the memory allocation information. When the illegal use or leakage of the memory occurs, the running logs can be timely recorded as the adequate proof for the developers to analyze and ascertain the location, thus a great amount of time on the development and debugging can be saved.

Description

technical field [0001] The invention relates to the technical field of software, in particular to the technical field of memory monitoring and management. Background technique [0002] The C language has no memory recovery management mechanism and memory access out-of-bounds check, so application developers are more likely to encounter memory leaks and illegal memory access problems when programming. [0003] Memory leaks are mainly due to the fact that the continuously allocated memory cannot be released in time, and over time, the system's memory is exhausted. There are many reasons for memory leaks. It may be a bug in the library itself, or it may be because the programmers did not understand their interface documentation correctly and caused misuse. [0004] Illegal access to memory refers to the error caused by software when accessing memory. This error generally manifests in two forms: one is the error of reading and writing address reference; the other is the violati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/50
Inventor 高洪郑兴友
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products