Method and device for determining memory exception, equipment and storage medium

A memory and exception technology, applied in response to error generation, non-redundancy-based fault handling, instrumentation, etc., can solve problems such as undetermined memory exceptions

Active Publication Date: 2020-06-12
GUANGZHOU HUYA TECH CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a method, device, device and storage medium for determining memory abnormality, so as to solve the problem of collecting relatively comprehensive information when the system crashes and routine information when the application program is running, and not being able to determine memory abnormality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for determining memory exception, equipment and storage medium
  • Method and device for determining memory exception, equipment and storage medium
  • Method and device for determining memory exception, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] figure 1 It is a flow chart of a method for determining memory abnormality provided by Embodiment 1 of the present invention. This embodiment is suitable for receiving log information uploaded by an application program, and identifying memory exceptions before the application program crashes according to the log information. The method can be executed by a device for determining memory abnormality, and the device can be implemented by software and / or hardware. It can be configured in computer equipment, such as servers, workstations, personal computers, etc., and the method specifically includes the following steps:

[0090] S101. Receive log information uploaded by an application program.

[0091] In computers, log information is a file that records events that occur during the operation of an operating system or other software, or messages between different users of communicating software. Log information records events that occur during the execution of the system...

Embodiment 2

[0113] figure 2 It is a flowchart of a method for determining memory abnormality provided by Embodiment 2 of the present invention. This embodiment is refined on the basis of the first embodiment, and describes the specific steps of identifying memory exceptions before the application program crashes according to two or more types of memory information. The method specifically includes the following steps:

[0114] S201. Receive log information uploaded by an application program.

[0115] Generally, the log information includes the page when the application program crashes, and two or more types of memory information before the application program crashes.

[0116] S202. Determine a constraint relationship between the two or more types of memory information.

[0117] In general, each memory message is used to identify a memory exception. Memory information includes: heap memory information, resident memory information and virtual memory information. Memory exceptions inclu...

Embodiment 3

[0133] image 3 It is a flow chart of a method for determining memory abnormality provided by Embodiment 3 of the present invention. This embodiment is refined on the basis of Embodiment 1 and Embodiment 2, and describes the order of determining the two or more types of memory information according to the constraint relationship, and the specific steps for judging memory abnormality according to the order . The method specifically includes the following steps:

[0134] S301. Receive log information uploaded by an application program.

[0135] The log information includes a page when the application program crashes, and two or more types of memory information before the application program crashes.

[0136] S302. Determine a constraint relationship between the two or more types of memory information.

[0137] The memory information includes: heap memory information, resident memory information and virtual memory information, the heap memory information is used to identify j...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for determining memory exception, equipment and a storage medium. The method comprises the steps that log information uploaded by an application program isreceived, and the log information comprises a page when the application program crashes and two or more kinds of memory information before the application program crashes; according to the two or morethan two kinds of memory information, that a memory exception exists before the application program crashes is identified; it is determined that crash is caused by memory exception when the application program applies for the memory in the skip page,. By means of the method, comprehensive information generated, when each memory exception possibly causing system crash occurs, is collected, and thememory exception causing system crash can be judged according to the comprehensive information.

Description

technical field [0001] The embodiments of the present invention relate to memory abnormality collection technology, and in particular to a method, device, device and storage medium for determining memory abnormality. Background technique [0002] Memory leak (Memory Leak) refers to the heap memory that has been dynamically allocated in the program is not released or cannot be released for some reason, resulting in a waste of system memory, resulting in serious consequences such as slowing down the running speed of the program and even system crashes. [0003] Memory leak defects are concealed and cumulative, and are more difficult to detect than other memory illegal access errors. Because the cause of the memory leak is that the memory block is not released, it is an omission defect rather than a fault defect. In addition, memory leaks usually do not directly produce observable error symptoms, but accumulate gradually, reducing the overall performance of the system, and in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/07G06F11/36
CPCG06F11/073G06F11/0766G06F11/079G06F11/366Y02D10/00
Inventor 陈文俊
Owner GUANGZHOU HUYA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products