Supercharge Your Innovation With Domain-Expert AI Agents!

Destruction methods, media, devices, and computing devices for objects

An object and destructuring technology, applied in the field of communications and computers, can solve problems such as inaccuracy, difficulty in reproducing crash scenarios, and failure to properly solve the original problem, achieving the effect of improving stability and facilitating troubleshooting and repairing

Active Publication Date: 2020-12-08
NETEASE (HANGZHOU) NETWORK CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Since Solution 1 needs to release a new APP version to solve the corresponding crash problem, there is no effective way to avoid the BAD ACCESS type of crash before the new APP version is released, so this type of crash cannot be solved during this period. Timely processing, reducing the user experience
At the same time, the BAD ACCESS type of crash is difficult to reproduce because of its crash scene, which makes troubleshooting and repairing very difficult, and once the error is fixed, not only the original problem has not been properly resolved, but also the risk of causing other problems, so for this type The acquisition of real-time information of crash scenarios is particularly important, but the existing methods of capturing real-time information through crash logs are usually not accurate enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Destruction methods, media, devices, and computing devices for objects
  • Destruction methods, media, devices, and computing devices for objects
  • Destruction methods, media, devices, and computing devices for objects

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present invention, rather than to limit the scope of the present invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0045] Those skilled in the art know that the embodiments of the present invention can be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure can be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0046] According to the embodiments of the present invention, a method, medium, device and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an object destruction method, a medium, a device and a computing device. The object destruction method comprises the steps that when the life cycle of a targetobject is finished, the target object is subjected to delay destruction; during the period that the target object is subjected delay destruction, a method sent to the target object formerly is forwarded to an empty function pointer. According to the technical field, even if the problem that the object of which the life cycle is over is accessed arises, normal running of a program can be guaranteed by forwarding the method sent to the object to the empty function pointer, the problem that the program is subjected to BAD ACCESS type crash, and then use of a user is affected is solved, and the stability of program running is improved.

Description

technical field [0001] Embodiments of the present invention relate to the fields of communication and computer technologies, and more specifically, embodiments of the present invention relate to object destruction methods, media, devices, and computing equipment. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] In the software development industry, it is inevitable to encounter the problem of APP (Application, application program) crash. Among them, the crash of BAD ACCESS type accounts for a high proportion and is difficult to troubleshoot. The crash of BAD ACCESS type is the crash caused by the program accessing wild pointers. . [0004] At present, there are mainly two solutions for BAD ACCESS type crashes in the industry: Solution 1 is to directly crash the APP, anal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/14G06F11/34G06F9/448
CPCG06F11/1479G06F11/3452
Inventor 陶泽宇
Owner NETEASE (HANGZHOU) NETWORK CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More