A method, device, medium and electronic equipment for obtaining memory leak information

A technology of memory leakage and memory, which is applied in the directions of multi-channel program device, program control design, electrical digital data processing, etc., can solve the problems that plague R&D personnel, memory leakage, low memory efficiency, etc., and improve the success rate and stability, Improve efficiency and reduce interference

Active Publication Date: 2021-11-16
BEIJING BYTEDANCE NETWORK TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it also has obvious defects. For example, problems such as wild pointers and memory leaks have always plagued developers.
The traditional memory leak monitoring solution is to obtain memory leak information through the aggregation of abnormal call stacks. Because the cause of memory leaks is not directly related to the call stack, it is inefficient to monitor memory leaks through the call stack.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device, medium and electronic equipment for obtaining memory leak information
  • A method, device, medium and electronic equipment for obtaining memory leak information
  • A method, device, medium and electronic equipment for obtaining memory leak information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although certain embodiments of the present disclosure are shown in the drawings, it should be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein; A more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the present disclosure are for exemplary purposes only, and are not intended to limit the protection scope of the present disclosure.

[0033] It should be understood that the various steps described in the method implementations of the present disclosure may be executed in different orders, and / or executed in parallel. Additionally, method embodiments may include additional steps and / or omit performing illustrated steps. The scope of the present disclosure is not limited in this respect. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosure provides a method, device, medium and electronic equipment for acquiring memory leak information. The method includes: the main process obtains its abnormal crash information; based on the triggering of the abnormal crash information, the main process creates and runs an emergency sub-process; the emergency sub-process obtains the memory state information shared by the main process, and saves it in the memory state Data collection; when the main process runs again, obtain memory state information from the memory state data set; when the memory state information meets the memory exception condition, the main process generates memory leak information. The disclosure directly acquires the size information of the virtual memory, thereby quickly locating the memory leak information, and accurately aggregates the memory leak information, thereby improving the efficiency of locating program faults. Creating a copy-on-write subprocess reduces the interference of other threads and / or processes, avoids interrupting the exception handling process, and improves the success rate and stability of obtaining exception information.

Description

technical field [0001] The present disclosure relates to the field of locating process exceptions, in particular, to a method, device, medium and electronic equipment for acquiring memory leak information. Background technique [0002] C language is a process-oriented, abstract general-purpose programming language, which is widely used in low-level development. C language has the characteristics of high efficiency, flexibility, rich functions, strong expressive power and high portability, and is favored in programming. C language compilers are ubiquitous in various operating systems, such as Microsoft Windows, macOS, Linux, Unix, etc. The design of the C language has influenced many subsequent programming languages, such as C++, Objective-C, Java, C#, etc. [0003] C++ was originally called C with classes. It is an object-oriented computer programming language. It is a general-purpose programming language that checks static data types and supports multiple programming par...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/07G06F9/50
CPCG06F9/5016G06F11/073
Inventor 朴英敏
Owner BEIJING BYTEDANCE NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products