Memory leak detection method, device, equipment and storage medium

A technology for memory leaks and detection methods, applied in the fields of memory leak detection methods, devices, equipment, and storage media, can solve problems such as system paralysis, manual inspection, and memory leaks, achieve automatic detection of memory leaks, and reduce APP running time. Crash, solve the effect of memory overflow

Pending Publication Date: 2020-05-12
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In computer science, a memory leak (Memory Leak) refers to the allocation of memory for a process, but the process does not release the memory after using the memory, resulting in the allocation of memory cannot be recycled
As the process runs, less and less memory is available in the system, causing the system to crash because there is not enough memory to run the process
The cause of the memory leak may be due to hidden dangers in the code written by the developer or system exceptions.
[0003] At present, in order to avoid system paralysis caused by memory leaks, the terminal device is usually connected to the computer during the running of the application program, and experienced inspectors use memory analysis tools to perform memory analysis. Obviously, the analysis efficiency is low, and there may be loopholes in manual investigation. Check and wait

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory leak detection method, device, equipment and storage medium
  • Memory leak detection method, device, equipment and storage medium
  • Memory leak detection method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. Embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0057] The terminology used in the present disclosure is for the purpose of describing particular embodiments only, and is not intended to limit the present disclosure. As used in this disclosure and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a memory leak detection method, a device, equipment and a storage medium. According to the method of the invention, the life cycle of the to-be-detected object in the application program is monitored; determining a to-be-detected object total set and a to-be-detected object subset which has been recovered by garbage; and when a preset memory leak detection condition is met,judging whether a to-be-detected object which is not recycled by garbage exists in the to-be-detected object total set according to the determined to-be-detected object total set and the to-be-detected object subset which is recycled by garbage, and further obtaining a primary judgment result of whether memory leak occurs or not according to a judgment result. According to the method, the risk that the APP crashes due to memory overflow can be reduced, memory leakage is automatically detected, the learning cost is low, and the analysis efficiency is high.

Description

technical field [0001] The present application relates to the technical field of intelligent terminals, and in particular to a memory leak detection method, device, equipment and storage medium. Background technique [0002] In computer science, a memory leak (Memory Leak) refers to the allocation of memory for a process, and the process does not release the memory after using the memory, resulting in the allocation of memory cannot be recycled. As the process runs, less and less memory is available in the system, causing the system to crash because there is not enough memory to run the process. The cause of memory leaks may be due to hidden dangers in code written by developers or system exceptions. [0003] At present, in order to avoid system paralysis caused by memory leaks, the terminal device is usually connected to the computer during the running of the application program, and experienced inspectors use memory analysis tools to perform memory analysis. Obviously, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/07
CPCG06F11/073
Inventor 饶福贵
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products