CN106919454A - Memory pool positioning problems method and its system based on LTE protocol stack - Google Patents

Memory pool positioning problems method and its system based on LTE protocol stack Download PDF

Info

Publication number
CN106919454A
CN106919454A CN201710060454.1A CN201710060454A CN106919454A CN 106919454 A CN106919454 A CN 106919454A CN 201710060454 A CN201710060454 A CN 201710060454A CN 106919454 A CN106919454 A CN 106919454A
Authority
CN
China
Prior art keywords
memory block
memory
mark
pool
character string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710060454.1A
Other languages
Chinese (zh)
Other versions
CN106919454B (en
Inventor
朱有文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Sunnada Network Technology Co Ltd
Original Assignee
Fujian Sunnada Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Sunnada Network Technology Co Ltd filed Critical Fujian Sunnada Network Technology Co Ltd
Priority to CN202010057458.6A priority Critical patent/CN111324450B/en
Priority to CN201710060454.1A priority patent/CN106919454B/en
Priority to CN202010060440.1A priority patent/CN111324451B/en
Publication of CN106919454A publication Critical patent/CN106919454A/en
Application granted granted Critical
Publication of CN106919454B publication Critical patent/CN106919454B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • G06F9/5016Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals the resource being the memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • G06F9/5022Mechanisms to release resources
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)
  • Memory System (AREA)
  • Communication Control (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of memory pool positioning problems method and its system based on LTE protocol stack, method includes:The first mark, distribution mark, character string pointer and location variable are set in the head of memory block, setting second in afterbody marks;If a memory block is allocated, distribution mark is set to the first character, character string pointer is set to apply for function name, location variable is set to application location;After being released, distribution mark is set to the second character;When being reentered into memory pool, the mark of detection first and second marks whether correctly;If first marks correct and the second marked erroneous, judge to cross the border;According to character string pointer and location variable, the position of positioning EMS memory off-normal;Obtain memory block of the distribution labeled as the second character;According to character string pointer record and location variable, positioning RAM leakage position.The RAM leakage and memory overwriting of memory pool can be solved the problems, such as in the case where meeting critical timing requirements and not influenceing protocol stack normal work.

Description

Memory pool positioning problems method and its system based on LTE protocol stack
Technical field
The present invention relates to memory management technology field, more particularly to a kind of memory pool positioning problems based on LTE protocol stack Method and its system.
Background technology
Under C language environment, the distribution and release of internal memory can directly use system application/release function interface.But There is following drawback:
1st, calling system function, relatively takes;
2nd, frequent use can produce substantial amounts of memory fragmentation, so as to reduce program operational efficiency.
In order to avoid problem above, memory pool is generally used in the project to carry out memory management instead of system function.It is interior Deposit the initial configuration in pond as shown in figure 1, it is real using internal memory before, a number of memory block is allocated in advance, when needing Shen Please internal memory when, just selected from these pre-assigned memory blocks, rather than being directly allocated using system function.Memory block After being allocated, as shown in Figure 2.
Memory pool algorithm typically focuses on managing internal memory (allocation algorithm, Release Algorithm, random length internal memory block algorithm etc.), and The stabilization in memory pool is not concerned with, i.e., problem of being crossed the border when the leakage of quick positioning memory pool, memory block are used.
Memory pool leakage refers to after a memory block is distributed from memory pool, it should the feelings being released without being released Condition;Crossed the border when memory block is used similar with Array Bound, such as write the data of 20 bytes to the memory block of 10 byte-sizeds.It is interior Depositing pond leakage can cause internal memory finally to exhaust, and cross the border, and can cause program fluctuation of service.Good programming custom can be pre- The problems such as memory pool of an anti-part is revealed, crossed the border, but, increase and multiple person cooperational with item code amount keep away completely Exempt to be practically impossible to what is accomplished.RAM leakage and Array Bound are easily introduced, and are difficult to position, and especially size of code is huge Greatly, positioning is more difficult in the environment of multithreading.
Typically, RAM leakage is positioned using mtrace, valgrind.And for crossing the border, be then more difficult to treatment, such as it is following Code:
Program can not find when compiling, and not necessarily occur when program is run, and only exceed in outside input Can just be crossed the border when 10 characters.
For LTE protocol stack, due to the timing requirements of Access Layer, its dispatching cycle is 1 millisecond, i.e., in every 1 millisecond It is interior, it is necessary to complete scheduling, the distribution of resource, coding of access device etc., so, the timing requirements of LTE protocol stack are very tight Lattice, even if mtrace, valgrind can be transplanted and used under embedded environment, make to have more than is needed when LTE protocol stack is run, its meeting The runnability of protocol stack is had a strong impact on, causes cisco unity malfunction.
In the Chinese patent open file of Publication No. CN105988921A, it is proposed that a kind of detection side of memory overwriting Method and device, its method include:The initial address and memory management header of the memory block of program to be detected are distributed in acquisition, interior Depositing management header includes:The capacity and release mark of memory block;Detection release mark, if release mark has indicated memory block It is released, then judges that program to be detected occurs memory overwriting;If release mark indicates memory block not to be released, obtain to be detected First deflection address of program, the first deflection address is the deflection address farthest away from initial address;Capacity according to memory block and Initial address, detection first is partial to whether address falls in the memory range of memory block;If the first deflection address does not fall within internal memory In the memory range of block, then judge that program to be detected occurs memory overwriting.But the locating accuracy that crosses the border of the program is not high, example Such as, physically contiguous memory block 1-4, it is assumed that crossed the border in memory block 1 and change the content of memory block 2-4, what the program was found out It is probably crossing the border for memory block 4.
The content of the invention
The technical problems to be solved by the invention are:Propose a kind of memory pool positioning problems method based on LTE protocol stack And its system, can quickly orient RAM leakage position and memory overwriting position.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:A kind of memory pool based on LTE protocol stack Positioning problems method, including:
The first mark, distribution mark, character string pointer and location variable are set in the head of memory block, in the tail of memory block Portion sets second and marks, and first mark and second is labeled as default parameter value;
If a memory block is allocated, the distribution of memory block mark is set to default correspondence allocated the One character, the character string pointer of a memory block is set to apply the function name of a memory block, by an internal memory The location variable of block is set to apply the line number residing for the code of a memory block;
After a memory block is released, the distribution mark of a memory block is set to default correspondence unallocated The second character;
When a memory block is reentered into memory pool, first mark and the second mark of a memory block are detected respectively Whether note is consistent with default parameter value;
If the first of a memory block marks and second mark and its default parameter consistent with its default parameter value Value is inconsistent, then judge that a memory block crosses the border;
The line number of function name and the location variable record of the character string pointer record according to a memory block, in positioning Deposit the position crossed the border;
If the utilization rate of memory pool exceedes default threshold value, memory block of the distribution labeled as the second character is obtained;
The line number of function name and the location variable record of the character string pointer record according to acquired memory block, positioning RAM leakage position.
The invention further relates to a kind of memory pool positioning problems system based on LTE protocol stack, including:
First setup module, for setting the first mark, distribution mark, character string pointer and position in the head of memory block Variable, sets second and marks in the afterbody of memory block, and first mark and second is labeled as default parameter value;
Second setup module, if being allocated for a memory block, the distribution mark of a memory block is set to pre- If allocated first character of correspondence, the character string pointer of a memory block is set to apply the letter of a memory block It is several, the location variable of a memory block is set to apply the line number residing for the code of a memory block;
3rd setup module, for after a memory block is released, the distribution of a memory block being marked and being set It is unappropriated second character of default correspondence;
Detection module, for when a memory block is reentered into memory pool, detecting a memory block respectively One mark and second mark whether it is consistent with default parameter value;
Determination module, if for a memory block first mark it is consistent with its default parameter value and second mark and Its default parameter value is inconsistent, then judge that a memory block crosses the border;
First locating module, for the function name and location variable of the character string pointer record according to a memory block The line number of record, the position of positioning EMS memory off-normal;
Acquisition module, if exceeding default threshold value for the utilization rate of memory pool, obtains distribution and is labeled as the second character Memory block;
Second locating module, function name and position for the character string pointer record of the memory block acquired in basis become Measure the line number of record, positioning RAM leakage position.
The beneficial effects of the present invention are:By add in the memory block record the internal memory in distribute the distribution mark of state Note, and record applies for the function name of the memory block and the character string pointer and location variable of function position, you can let out in internal memory Dew, i.e., when exceeding the memory block of predetermined number in memory pool all in distribution state, quickly locate out the position of RAM leakage; Meanwhile, the first mark and the second mark are separately added into end to end in memory block, can be marked by detection first when memory block discharges Note and second marks to judge whether the memory block crosses the border, and the memory block for crossing the border is navigated to, further according to the memory block The function name for being recorded and function position, navigate to the particular location of memory overwriting;The present invention can be wanted LTE strict sequential orders are met Ask, (within every millisecond of increase time-consuming 1 is delicate, that is, influenceed within 1/1000th) in the case of protocol stack normal work is not influenceed Solve the problems, such as the RAM leakage and memory overwriting of memory pool.
Brief description of the drawings
Fig. 1 is the memory pool structural representation of prior art;
Fig. 2 for prior art memory block be allocated after schematic diagram;
Fig. 3 is a kind of memory pool positioning problems method flow diagram based on LTE protocol stack of the present invention;
The localization method flow chart that Fig. 4 is revealed for the memory pool of the embodiment of the present invention one;
The method flow diagram of the step of Fig. 5 is the embodiment of the present invention one S106;
The localization method flow chart that Fig. 6 crosses the border for the memory block of the embodiment of the present invention one;
The method flow diagram of the step of Fig. 7 is the embodiment of the present invention one S206;
Fig. 8 is the memory block structural representation of the embodiment of the present invention one;
Fig. 9 is the method flow diagram of the embodiment of the present invention two;
Figure 10 is the memory pool structural representation of the embodiment of the present invention two;
Figure 11 is the memory block distribution schematic diagram of the embodiment of the present invention two;
Figure 12 is the memory block release schematic diagram of the embodiment of the present invention two;
Figure 13 is that the embodiment of the present invention three distributes front and rear memory block structural representation;
Figure 14 is the memory pool situation schematic diagram of the embodiment of the present invention three;
Figure 15 crosses the border front and rear contrast schematic diagram for the memory block of the embodiment of the present invention three;
Figure 16 is a kind of structural representation of the memory pool positioning problems system based on LTE protocol stack;
Figure 17 is the system structure diagram of the embodiment of the present invention four.
Label declaration:
1st, the first setup module;2nd, the second setup module;3rd, the 3rd setup module;4th, detection module;
5th, determination module;6th, the first locating module;7th, acquisition module;8th, the second locating module;9th, definition module;10th, put Enter module;11st, link block;12nd, module is applied for;13rd, distribute module;
14th, first module is pointed to;15th, determining module;16th, second module is pointed to;
61st, first acquisition unit;62nd, second acquisition unit;63rd, the 3rd acquiring unit;64th, the first positioning unit;
81st, the 4th acquiring unit;82nd, the 5th acquiring unit;83rd, the second positioning unit.
Specific embodiment
It is to describe technology contents of the invention, the objects and the effects in detail, below in conjunction with implementation method and coordinates attached Figure is explained in detail.
The design of most critical of the present invention is:Apply for the letter of the memory block in add end to end mark and the record of memory block The character string pointer and location variable of several and function position.
Refer to Fig. 3, a kind of memory pool positioning problems method based on LTE protocol stack, including:
The first mark, distribution mark, character string pointer and location variable are set in the head of memory block, in the tail of memory block Portion sets second and marks, and first mark and second is labeled as default parameter value;
If a memory block is allocated, the distribution of memory block mark is set to default correspondence allocated the One character, the character string pointer of a memory block is set to apply the function name of a memory block, by an internal memory The location variable of block is set to apply the line number residing for the code of a memory block;
After a memory block is released, the distribution mark of a memory block is set to default correspondence unallocated The second character;
When a memory block is reentered into memory pool, first mark and the second mark of a memory block are detected respectively Whether note is consistent with default parameter value;
If the first of a memory block marks and second mark and its default parameter consistent with its default parameter value Value is inconsistent, then judge that a memory block crosses the border;
The line number of function name and the location variable record of the character string pointer record according to a memory block, in positioning Deposit the position crossed the border;
If the utilization rate of memory pool exceedes default threshold value, memory block of the distribution labeled as the second character is obtained;
The line number of function name and the location variable record of the character string pointer record according to acquired memory block, positioning RAM leakage position.
Knowable to foregoing description, the beneficial effects of the present invention are:LTE critical timing requirements can met, association is not being influenceed In the case of view stack normal work, the RAM leakage and memory overwriting of memory pool are solved the problems, such as.
Further, described " function name and the location variable note of the character string pointer record according to a memory block The line number of record, the position of positioning EMS memory off-normal " is specially:
The line number of function name and the location variable record of the character string pointer record according to a memory block, obtains Shen Please a memory block first code position;
Function stack information is obtained according to gdb or backtrace functions;
According to the function stack information, the second code position of release one memory block is obtained;
According to the first code position and second code position, the position of positioning EMS memory off-normal.
Seen from the above description, in the position and release by obtaining the memory block that application is crossed the border are crossed the border The position of counterfoil, that is, orient clue end to end, thus can navigate to the particular location for crossing the border.
It is further, described that " function name of the character string pointer record of the memory block according to the acquisition and position become Measure the line number of record, positioning RAM leakage position " it is specially:
Obtain function name and location variable note of the distribution labeled as the character string pointer record of the memory block of the second character The line number of record;
Obtain occurrence number in the function name and line number most function name and line number;
According to acquired function name and line number, positioning RAM leakage position.
Seen from the above description, by recording function and the function code position of application memory block, revealed in memory pool and sent out When raw, check in the memory block not discharged, the frequency abnormality which function occurs is more, you can confirm that the function there occurs internal memory Leakage.
Further, it is described " to set the first mark, distribution mark, character string pointer and position in the head of memory block to become Amount, sets second and marks in the afterbody of memory block, and first mark and second is labeled as default parameter value " before, enter one Step includes:
Define different size of memory block more than two, wherein, each memory block in same group it is in the same size;
Same group of memory block is put into same memory pool according to default order, and the linked list head of the memory pool is referred to Pin points to the memory block being finally putting into, and the chained list tail pointer of the memory pool is pointed to the memory block being put at first;
The chained list head pointer and chained list tail pointer of each memory pool are attached by array;
During application internal memory, internal memory block size and the immediate memory pool of apllied memory size are selected;
When memory block is distributed, first memory block in the memory pool is deleted as allocated memory block from chained list Remove, the next pointers of second memory block in the memory pool are pointed into sky, chained list tail pointer is pointed in described second Counterfoil;
The next pointers of allocated memory block are pointed into linked list head;
When memory block discharges, the linked list head according to pointed by it determines corresponding memory pool;
The next pointers of the memory block that will be released point to last memory block in corresponding memory pool, and will be described The chained list head pointer of memory pool points to the memory block.
Seen from the above description, to the operation of memory pool, only change the 2-4 operation of chain table pointer, effectively improve The treatment effeciency of memory pool.
Figure 16 is refer to, the invention allows for a kind of memory pool positioning problems system based on LTE protocol stack, including:
First setup module, for setting the first mark, distribution mark, character string pointer and position in the head of memory block Variable, sets second and marks in the afterbody of memory block, and first mark and second is labeled as default parameter value;
Second setup module, if being allocated for a memory block, the distribution mark of a memory block is set to pre- If allocated first character of correspondence, the character string pointer of a memory block is set to apply the letter of a memory block It is several, the location variable of a memory block is set to apply the line number residing for the code of a memory block;
3rd setup module, for after a memory block is released, the distribution of a memory block being marked and being set It is unappropriated second character of default correspondence;
Detection module, for when a memory block is reentered into memory pool, detecting a memory block respectively One mark and second mark whether it is consistent with default parameter value;
Determination module, if for a memory block first mark it is consistent with its default parameter value and second mark and Its default parameter value is inconsistent, then judge that a memory block crosses the border;
First locating module, for the function name and location variable of the character string pointer record according to a memory block The line number of record, the position of positioning EMS memory off-normal;
Acquisition module, if exceeding default threshold value for the utilization rate of memory pool, obtains distribution and is labeled as the second character Memory block;
Second locating module, function name and position for the character string pointer record of the memory block acquired in basis become Measure the line number of record, positioning RAM leakage position.
Further, first locating module includes:
First acquisition unit, for the function name and location variable of the character string pointer record according to a memory block The line number of record, obtains the first code position of application one memory block;
Second acquisition unit, for obtaining function stack information according to gdb or backtrace functions;
3rd acquiring unit, for according to the function stack information, obtaining the second generation code bit of release one memory block Put;
First positioning unit, for according to the first code position and second code position, the position of positioning EMS memory off-normal Put.
Further, second locating module includes:
4th acquiring unit, for obtaining function of the distribution labeled as the character string pointer record of the memory block of the second character The line number of name and location variable record;
5th acquiring unit, the function name and line number most for obtaining occurrence number in the function name and line number;
Second positioning unit, for function name and line number acquired in basis, positioning RAM leakage position.
Further, also include:
Definition module, for defining different size of memory block more than two, wherein, each memory block in same group it is big It is small consistent;
Module is put into, for same group of memory block to be put into same memory pool according to default order, and will be described interior The chained list head pointer for depositing pond points to the memory block being finally putting into, and the chained list tail pointer of the memory pool is pointed in being put at first Counterfoil;
Link block, for the chained list head pointer and chained list tail pointer of each memory pool to be attached by array;
Application module, for applying during internal memory, selects internal memory block size and the immediate internal memory of apllied memory size Pond;
Distribute module, when being distributed for memory block, using first memory block in the memory pool as in allocated Counterfoil is deleted from chained list, and the next pointers of second memory block in the memory pool are pointed into sky, and chained list tail pointer is referred to To second memory block;
First points to module, for the next pointers of allocated memory block to be pointed into linked list head;
Determining module, when being discharged for memory block, the linked list head according to pointed by it determines corresponding memory pool;
Second points to module, and the next pointers of memory block for that will be released point to last in corresponding memory pool Individual memory block, and the chained list head pointer of the memory pool is pointed into the memory block.
Embodiment one
Embodiments of the invention one are:A kind of memory pool positioning problems method based on LTE protocol stack, mainly to memory pool Leakage and memory overwriting are detected and positioned.
Wherein, as shown in figure 4, the localization method of memory pool leakage comprises the following steps:
S101:In the head of memory block, distribution mark, character string pointer and location variable are set;
S102:If a memory block is allocated, the distribution mark of a memory block is set to default correspondence and has been divided The first character matched somebody with somebody, the character string pointer of a memory block is set to apply the function name of a memory block, will be described The location variable of one memory block is set to apply the line number residing for the code of a memory block;
S103:After a memory block is released, the distribution mark of a memory block is set to default correspondence Unappropriated second character;
S104:Judge whether the utilization rate of memory pool exceedes default threshold value, if so, then performing step S105.
S105:Obtain memory block of the distribution labeled as the second character;
S106:The row of function name and the location variable record of the character string pointer record according to acquired memory block Number, positioning RAM leakage position.
Wherein, as shown in figure 5, the step S106 comprises the following steps:
S1061:Obtain function name and position of the distribution labeled as the character string pointer record of the memory block of the second character The line number of variable record;
S1062:Obtain occurrence number in the function name and line number most function name and line number;
S1063:According to acquired function name and line number, positioning RAM leakage position.
The present embodiment is revealed for memory pool and positioned, based on a rational hypothesis:Memory pool leakage be in a program certain Internal memory has been applied in individual position, without release, and without the frequency abnormality for discharging much.In a program, may have very many Internal memory has been applied in position, after one section is processed, in the presence of without BUG, can all be released, i.e., in normal operation, The amount of memory not discharged is a dynamic stability, such as during normal operation, the memory block accounting not discharged in memory pool exists Within 60%.And occur memory pool reveal when, after some time it is possible to reach 100%, finally, occur can not storage allocation situation.So, When there is RAM leakage, 40% internal memory is that internal memory has been applied in certain position in program, without release.Find out this 40% Internal memory is in which the position application of which function, it is possible to positions, that is, realizes the function of mtrace (if in timing requirements not In the case of strict, with mtrace).
Therefore, by recording function and the function code position of application memory block, when memory pool reveals generation, check not Have in the memory block of release, the frequency abnormality which function occurs is more, you can confirm that the function there occurs RAM leakage.
As shown in fig. 6, the localization method that memory block crosses the border comprises the following steps:
S201:The first mark, character string pointer and location variable are set in the head of memory block, are set in the afterbody of memory block The second mark is put, first mark and second are labeled as default parameter value;
S202:If a memory block is allocated, the character string pointer of a memory block is set in application described The function name of counterfoil, is set to apply the line number residing for the code of a memory block by the location variable of a memory block;
S203:When a memory block is reentered into memory pool, detect respectively a memory block first mark and Second mark whether it is consistent with default parameter value;
S204:Judge the first of a memory block mark whether it is consistent with its default parameter value and second mark and its Default parameter value is inconsistent, if so, performing step S205.
S205:Judge that a memory block crosses the border;
S206:The line number of function name and the location variable record of the character string pointer record according to a memory block, The position of positioning EMS memory off-normal.
Wherein, as shown in fig. 7, step S206 comprises the following steps:
S2061:The line number of function name and the location variable record of the character string pointer record according to a memory block, Obtain the first code position of application one memory block;
S2062:Function stack information is obtained according to gdb or backtrace functions;
S2063:According to the function stack information, the second code position of release one memory block is obtained;
S2064:According to the first code position and second code position, the position of positioning EMS memory off-normal.
Because program is general very big, so analyze all of code when there is memory overwriting be difficult with finding out BUG positions, Memory block cross the border positioning target be find out occur memory overwriting when that position i.e. BUG positions.The positioning of crossing the border of memory block Generally by will appear from the range shorter of BUG a to scope for very little, the scope of diminution is smaller then better.Existing positioning The mode that memory block crosses the border is to be arranged to page with mprotect to read and write, and its range shorter that will can cross the border is to uniquely A position be BUG positions, be that best memory block crosses the border positioning method at present.But in LTE protocol stack, due to sequential and (because the least unit of mprotect operations is a page, i.e. 4K byte-sizeds, memory block is less than for the limitation of memory size During 4K, memory block is made up of 2 pages, and 130,000 memory blocks are accomplished by the internal memory of 1G, is usually embedded formula equipment due to cost Consider, its memory size does not have too many residue after demand is met, it is assumed that the byte of memory block mean size 100 is calculated, use Mprotect then needs the internal memory that 8192 bytes increase by 80 times), it is impossible to mprotect is used, so, it is impossible to there is internal memory Can just be detected at once when crossing the border.
The present embodiment for the positioning that memory block crosses the border, by be arranged on internal memory block header the first mark and afterbody the Two mark to judge whether the memory block crosses the border.For example, a memory pool is made up of 4 physically contiguous memory blocks, Order is followed successively by linked list head, memory block 4, memory block 3, memory block 2, memory block 1, chained list tail;Assuming that internal memory block size is 8 words Section, in addition to memory block 4, other memory blocks are allocated away;Program has used 20 bytes when using memory block 3, then can be by To rewriting, i.e. memory overwriting, memory block 3 crosses the border continuous internal memory, causes memory block 1 and the content of memory block 2 to be written over (example Such as, it is rewritten as 0).
If memory block 1 first discharges, when memory pool is put into, its first marked erroneous is detected (i.e. with its default ginseng Numerical value is inconsistent), and the second mark is correct (i.e. consistent with its default parameter value), although illustrating that memory block 1 there occurs internal memory Cross the border, but be not that it causes, so ignore this memory overwriting and (neither processing, not also being put into memory pool, because now its head Portion's information is trustless).
If memory block 2 is released prior to memory block 3, when memory pool is put into, its first mark and the second mark are detected Note is all wrong, is illustrated nor its crossing the border of causing.
After memory block 3 has been used, when being put into chained list, correctly (explanation memory block above does not have to detect its first mark Cross the border, i.e., memory block 4 does not cross the border, be normal), and the second marked erroneous illustrate to be exactly that it there occurs and crosses the border, and now use Gdb or backtrace functions, positioning discharges the position of this memory block after there is memory overwriting, and it is fixed to combine memory pool leakage Position during Information locating this memory block distribution that position method is added, i.e. location hint information end to end, thus can navigate to BUG Put, remaining typically on code can exclude (for example, some positions only operate the 1st byte of this memory block, then, it is interior It is unrelated with it to deposit affirmative of crossing the border, and can be excluded).
The localization method that the localization method and memory block revealed according to above-mentioned memory pool cross the border, it is known that in memory block Head the first mark, distribution mark, character string pointer and location variable are set, setting second in the afterbody of memory block marks, First mark and second is labeled as default parameter value, you can while memory pool leakage and memory block are crossed the border and determined Position;Specifically, as shown in figure 8, wherein, magic1 is the first mark to the schematic diagram of memory block, and magic1 is the second mark; Alloced is marked for distribution;Represent the whether allocated flag of the memory block;Next is the original pointer of memory block, in internal memory Block points to next idle node when idle, and memory pool is pointed to when memory block is allocated;Char* is character string pointer, is used for Point to the function name character string of the function for applying for the memory block;Int is location variable, represents the code for applying for the memory block in journey Residing line number in sequence;Wherein, the first mark one is positioned at the position of memory block most head, and the second mark one is positioned at memory block The position of most end, distribution mark, the order between character string pointer and location variable can be exchanged mutually.
The present embodiment by add in the memory block record the internal memory in distribute the distribution of state and mark, and record application The function name of the memory block and the character string pointer of function position and location variable, you can surpass in RAM leakage, i.e. memory pool When crossing the memory block of predetermined number all in distribution state, the position of RAM leakage is quickly located out;Meanwhile, in memory block Be separately added into end to end the first mark and second mark, can when memory block discharge, by detection first mark and second mark come Judge whether the memory block crosses the border, navigate to the memory block for crossing the border, further according to the function name that the memory block is recorded With function position, the particular location of memory overwriting is navigated to;LTE critical timing requirements can met, not influence protocol stack normal The RAM leakage of solution memory pool (within every millisecond of increase time-consuming 1 is delicate, that is, is influenceed within 1/1000th) in the case of work And memory overwriting problem.
Embodiment two
Fig. 9 is refer to, the present embodiment is the further expansion of embodiment one.Also include before step S101 and S201 as follows Step:
S001:Define different size of memory block more than two, wherein, each memory block in same group it is in the same size; For example, defining three groups of memory blocks, size is respectively 8 bytes, 16 bytes and 32 bytes, wherein, memory block in first group it is big Small to be 8 bytes, the size of the memory block in second group is 16 bytes, and the size of the memory block in the 3rd group is 32 words Section.
S002:Same group of memory block is put into same memory pool according to default order, and by the chain of the memory pool Meter pointer points to the memory block being finally putting into, and the chained list tail pointer of the memory pool is pointed to the memory block being put at first;This When, the memory pool that first group of memory block is put into can be designated as 8 byte of memory ponds, the memory pool that second group of memory block is put into is designated as 16 byte of memory ponds, 32 byte of memory ponds are designated as by the memory pool that the 3rd group of memory block is put into.
S003:The chained list head pointer and chained list tail pointer of each memory pool are attached by array;What is now obtained is interior Deposit pool structure as shown in Figure 10.
S004:During application internal memory, internal memory block size and the immediate memory pool of apllied memory size are selected;Further Ground, selection internal memory block size is more than apllied memory size and internal memory block size is immediate with apllied memory size interior Deposit pond;For example, when apllied memory size is 15 byte, then 16 byte of memory ponds are selected, without 32 byte of memory ponds of selection; When apllied memory size is 20 bytes, though it is close with 16 bytes, but because 16 bytes are less than 20 bytes, therefore need selection 32 byte of memory ponds.
S005:When memory block is distributed, using first memory block in the memory pool as allocated memory block from chain Deleted in table, the next pointers of second memory block in the memory pool are pointed to empty, chained list tail pointer is pointed to described the Two memory blocks;
S006:The next pointers of allocated memory block are pointed into linked list head;Now, memory block distribution in the memory pool Schematic diagram is as shown in figure 11.
S007:When memory block discharges, the linked list head according to pointed by it determines corresponding memory pool;
S008:The next pointers of the memory block that will be released point to last memory block in corresponding memory pool, and The chained list head pointer of the memory pool is pointed into the memory block.Now, the structural representation that memory block discharges in the memory pool As described in Figure 12.
Operation of the present embodiment to memory pool, only changes the 2-4 operation of chain table pointer, if multithreading, then needs Operation is locked and unlocks, therefore the present embodiment is effectively improved the treatment effeciency of memory pool.
Embodiment three
The present embodiment is a concrete application scene of correspondence above-described embodiment.The present embodiment is with the memory block shown in Fig. 8 Example.
Figure 13 is refer to, before dispensing, char* and int positions are set to without any effective content, alloced marks 0x22 (is represented unallocated).After internal memory is allocated, alloced marks are set to 0x11 (expression has been distributed), char* and int Put be stored in be call function name and position.Upon discharge, alloced is again set at 0x22.Wherein there are memLeak variables to refer to To memory block occur in that RAM leakage, do not discharge.During normal operation, can only not discharged in the presence of one at most in memory pool Addr0, memLeak, addr1 memory block, i.e., in memory pool, in the memory block not discharged, testFunc functions at most only There can be 3.But, due to memLeak variable application internal memories after, do not discharge, after testFunc functions are performed a plurality of times, memory pool Leakage will be increasingly severe, until influence program operation.Now, memory pool situation is checked, as shown in figure 14, in memory pool Be made up of 22 memory blocks altogether, in normal operation, at most only occur that 3 internal memories are used, i.e., under normal circumstances, internal memory The utilization rate in pond is 13% (3/22).And in abnormal cases, as shown in FIG., there are 16 internal memories to be used, i.e. memory pool Utilization rate is 72%, it may be determined that there occurs RAM leakage.After revealing, with GDB scripts, (or printf functions are beaten Print) by all memory blocks not discharged in memory pool preserve function name and position print can discovery, The number of times that " testFunc " position 14 occurs is 14 times, each 1 time of the number of times of " testFunc " position 13 and 15, it can be determined that, The internal memory of the application of " testFunc " position 14 there occurs leakage, that is, be positioned at 14 rows of " testFunc ", realize the work(of mtrace Energy.
Crossed the border positioning for memory block, refer to Figure 15, it has applied for 3 memory blocks, and just physically continuous.Due to It is 8 bytes of application in application, and when using is 20 bytes, causes to cross the border.In a program, addr0 prior to addr1 and Addr2 is distributed and finally discharged.When addr2 discharges, first is detected labeled as 0, be wrong, and the second mark is correct , illustrate that physically continuous above memory block there occurs and cross the border and cross the border to this memory block, addr2 sensings are not processed Memory block (because its next pointers have damaged, it is impossible to correct chained list is pointed to, so not being added into free memory block chain Table).When addr1 discharges, it is all wrong to detect the mark of the first mark and the second mark, and explanation is physically continuous Before memory block there occurs and cross the border and cross the border to after this memory block, the internal memory of addr1 sensings is not processed.
When addr0 discharges, it is correct to detect the first mark, and the second mark is wrong, illustrates this memory block Memory overwriting is there occurs, accordingly, function stack information is obtained according to gdb or backtrace functions, you can navigate to testFunc 26 rows in function, and understand that internal memory application is in testFunc according to the function name and function positional information for being stored in memory block (if without this information, memory block discharges corresponding memory block application location may multiple, i.e. different functions to 13 rows of function The memory block of diverse location application, may discharge in same position), i.e., there are 13 rows in testFunc to 26 in memory overwriting Certain position between row, and 18 rows for there was only testFunc between this position are operated to addr0, so, it is exactly The memory overwriting that it is produced, the BUG for changing 18 rows of testFunc can solve the problems, such as this memory overwriting.
The present embodiment is revealed memory pool and the localization method that crosses the border of memory block, all several marks need to only be carried out assignment and Judge, the influence to performance can be what is ignored.
Example IV
Figure 17 is refer to, the present embodiment is that a kind of memory pool problem based on LTE protocol stack of correspondence above-described embodiment is determined Position system, including:
First setup module 1, for setting the first mark, distribution mark, character string pointer and position in the head of memory block Variable is put, setting second in the afterbody of memory block marks, first mark and second is labeled as default parameter value;
Second setup module 2, if being allocated for a memory block, the distribution mark of a memory block is set to pre- If allocated first character of correspondence, the character string pointer of a memory block is set to apply the letter of a memory block It is several, the location variable of a memory block is set to apply the line number residing for the code of a memory block;
3rd setup module 3, for after a memory block is released, the distribution of a memory block being marked and being set It is unappropriated second character of default correspondence;
Detection module 4, for when a memory block is reentered into memory pool, detecting a memory block respectively One mark and second mark whether it is consistent with default parameter value;
Determination module 5, if marking and second mark consistent with its default parameter value for the first of a memory block It is inconsistent with its default parameter value, then judge that a memory block crosses the border;
First locating module 6, function name and position for the character string pointer record according to a memory block become Measure the line number of record, the position of positioning EMS memory off-normal;
Acquisition module 7, if exceeding default threshold value for the utilization rate of memory pool, obtains distribution and is labeled as the second character Memory block;
Second locating module 8, function name and position for the character string pointer record of the memory block acquired in basis The line number of variable record, positioning RAM leakage position.
Further, first locating module 6 includes:
First acquisition unit 61, function name and position for the character string pointer record according to a memory block become The line number of record is measured, the first code position of application one memory block is obtained;
Second acquisition unit 62, for obtaining function stack information according to gdb or backtrace functions;
3rd acquiring unit 63, for according to the function stack information, obtaining the second code of release one memory block Position;
First positioning unit 64, for according to the first code position and second code position, positioning EMS memory off-normal Position.
Further, second locating module 8 includes:
4th acquiring unit 81, for obtaining letter of the distribution labeled as the character string pointer record of the memory block of the second character The line number of several and location variable record;
5th acquiring unit 82, the function name and line number most for obtaining occurrence number in the function name and line number;
Second positioning unit 83, for function name and line number acquired in basis, positioning RAM leakage position.
Further, also include:
Definition module 9, for defining different size of memory block more than two, wherein, each memory block in same group It is in the same size;
Module 10 is put into, for same group of memory block to be put into same memory pool according to default order, and will be described The chained list head pointer of memory pool points to the memory block being finally putting into, and the chained list tail pointer of the memory pool is pointed into what is be put at first Memory block;
Link block 11, for the chained list head pointer and chained list tail pointer of each memory pool to be attached by array;
Application module 12, for applying during internal memory, selection internal memory block size is immediate with apllied memory size interior Deposit pond;
Distribute module 13, when being distributed for memory block, using first memory block in the memory pool as allocated Memory block is deleted from chained list, the next pointers of second memory block in the memory pool is pointed into sky, by chained list tail pointer Point to second memory block;
First points to module 14, for the next pointers of allocated memory block to be pointed into linked list head;
Determining module 15, when being discharged for memory block, the linked list head according to pointed by it determines corresponding memory pool;
Second points to module 16, and the next pointers of memory block for that will be released point to last in corresponding memory pool One memory block, and the chained list head pointer of the memory pool is pointed into the memory block.
In sum, the present invention is provided a kind of memory pool positioning problems method and its system based on LTE protocol stack, lead to Cross to be added in memory block and record the distribution mark that state is distributed in the internal memory, and record apply the memory block function name and The character string pointer and location variable of function position, you can more than the memory block of predetermined number in RAM leakage, i.e. memory pool During all in distribution state, the position of RAM leakage is quickly located out;Meanwhile, the first mark is separately added into end to end in memory block Note and the second mark, can judge whether the memory block is sent out when memory block discharges by the mark of detection first and the second mark Life is crossed the border, and navigates to the memory block for crossing the border, the function name recorded further according to the memory block and function position, is navigated to interior Deposit the particular location for crossing the border;The present invention can meet LTE critical timing requirements, in the case of protocol stack normal work is not influenceed The RAM leakage and memory overwriting that (within every millisecond of increase time-consuming 1 is delicate, that is, influenceing within 1/1000th) solves memory pool are asked Topic.
Embodiments of the invention are the foregoing is only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair The equivalents that bright specification and accompanying drawing content are made, or the technical field of correlation is directly or indirectly used in, similarly include In scope of patent protection of the invention.

Claims (8)

1. a kind of memory pool positioning problems method based on LTE protocol stack, it is characterised in that including:
The first mark, distribution mark, character string pointer and location variable are set in the head of memory block, are set in the afterbody of memory block The second mark is put, first mark and second are labeled as default parameter value;
If a memory block is allocated, the distribution mark of a memory block is set to allocated first word of default correspondence Symbol, the character string pointer of a memory block is set to apply the function name of a memory block, by a memory block Location variable is set to apply the line number residing for the code of a memory block;
After a memory block is released, the distribution of memory block mark is set to default correspondence unappropriated the Two characters;
When a memory block is reentered into memory pool, first mark and the second mark of a memory block are detected respectively is It is no consistent with default parameter value;
If the first of a memory block marks and second mark consistent with its default parameter value with its default parameter value not Unanimously, then judge that a memory block crosses the border;
The line number of function name and the location variable record of the character string pointer record according to a memory block, positioning internal memory is got over The position on boundary;
If the utilization rate of memory pool exceedes default threshold value, memory block of the distribution labeled as the second character is obtained;
The line number of function name and the location variable record of the character string pointer record according to acquired memory block, positions internal memory Leakage position.
2. the memory pool positioning problems method based on LTE protocol the stack according to claim 1, it is characterised in that " root According to the line number that the function name and location variable of the character string pointer record of a memory block are recorded, the position of positioning EMS memory off-normal Put " it is specially:
The line number of function name and the location variable record of the character string pointer record according to a memory block, obtains application institute State the first code position of a memory block;
Function stack information is obtained according to gdb or backtrace functions;
According to the function stack information, the second code position of release one memory block is obtained;
According to the first code position and second code position, the position of positioning EMS memory off-normal.
3. the memory pool positioning problems method based on LTE protocol the stack according to claim 1, it is characterised in that " root According to the line number that the function name and location variable of the character string pointer record of the memory block of the acquisition are recorded, RAM leakage is positioned Position " is specially:
Distribution is obtained labeled as function name and the location variable record of the character string pointer record of the memory block of the second character Line number;
Obtain occurrence number in the function name and line number most function name and line number;
According to acquired function name and line number, positioning RAM leakage position.
4. the memory pool positioning problems method based on LTE protocol stack according to claim 1, it is characterised in that described " The head of memory block sets the first mark, distribution mark, character string pointer and location variable, and second is set in the afterbody of memory block Mark, first mark and second is labeled as default parameter value " before, further include:
Define different size of memory block more than two, wherein, each memory block in same group it is in the same size;
Same group of memory block is put into same memory pool according to default order, and the chained list head pointer of the memory pool is referred to To the memory block being finally putting into, the chained list tail pointer of the memory pool is pointed to the memory block being put at first;
The chained list head pointer and chained list tail pointer of each memory pool are attached by array;
During application internal memory, internal memory block size and the immediate memory pool of apllied memory size are selected;
When memory block is distributed, first memory block in the memory pool is deleted as allocated memory block from chained list, The next pointers of second memory block in the memory pool are pointed into sky, chained list tail pointer is pointed into second internal memory Block;
The next pointers of allocated memory block are pointed into linked list head;
When memory block discharges, the linked list head according to pointed by it determines corresponding memory pool;
The next pointers of the memory block that will be released point to last memory block in corresponding memory pool, and by the internal memory The chained list head pointer in pond points to the memory block.
5. a kind of memory pool positioning problems system based on LTE protocol stack, it is characterised in that including:
First setup module, becomes for setting the first mark, distribution mark, character string pointer and position in the head of memory block Amount, sets second and marks in the afterbody of memory block, and first mark and second is labeled as default parameter value;
Second setup module, if being allocated for a memory block, the distribution mark of a memory block is set to default Allocated first character of correspondence, the character string pointer of a memory block is set to apply the function of a memory block Name, is set to apply the line number residing for the code of a memory block by the location variable of a memory block;
3rd setup module, for after a memory block is released, the distribution mark of a memory block being set to pre- If unappropriated second character of correspondence;
Detection module, the first mark for when a memory block is reentered into memory pool, detecting a memory block respectively Note and second mark whether it is consistent with default parameter value;
Determination module, if for a memory block first mark it is consistent with its default parameter value and second mark it is pre- with it If parameter value it is inconsistent, then judge that a memory block crosses the border;
First locating module, function name and the location variable record for the character string pointer record according to a memory block Line number, the position of positioning EMS memory off-normal;
Acquisition module, if exceeding default threshold value for the utilization rate of memory pool, obtains distribution labeled as the interior of the second character Counterfoil;
Second locating module, function name and the location variable note for the character string pointer record of the memory block acquired in basis The line number of record, positioning RAM leakage position.
6. the memory pool positioning problems system based on LTE protocol stack according to claim 5, it is characterised in that described One locating module includes:
First acquisition unit, function name and the location variable record for the character string pointer record according to a memory block Line number, obtain the first code position of application one memory block;
Second acquisition unit, for obtaining function stack information according to gdb or backtrace functions;
3rd acquiring unit, for according to the function stack information, obtaining the second code position of release one memory block;
First positioning unit, for according to the first code position and second code position, the position of positioning EMS memory off-normal.
7. the memory pool positioning problems system based on LTE protocol stack according to claim 5, it is characterised in that described Two locating modules include:
4th acquiring unit, for obtain distribution labeled as the second character memory block character string pointer record function name with And the line number of location variable record;
5th acquiring unit, the function name and line number most for obtaining occurrence number in the function name and line number;
Second positioning unit, for function name and line number acquired in basis, positioning RAM leakage position.
8. the memory pool positioning problems system based on LTE protocol stack according to claim 5, it is characterised in that also include:
Definition module, for defining different size of memory block more than two, wherein, the size one of each memory block in same group Cause;
Module is put into, for same group of memory block to be put into same memory pool according to default order, and by the memory pool Chained list head pointer point to the memory block that is finally putting into, the chained list tail pointer of the memory pool is pointed to the internal memory being put at first Block;
Link block, for the chained list head pointer and chained list tail pointer of each memory pool to be attached by array;
Application module, for applying during internal memory, selects internal memory block size and the immediate memory pool of apllied memory size;
Distribute module, when being distributed for memory block, using first memory block in the memory pool as allocated memory block Deleted from chained list, the next pointers of second memory block in the memory pool are pointed into sky, chained list tail pointer is pointed into institute State second memory block;
First points to module, for the next pointers of allocated memory block to be pointed into linked list head;
Determining module, when being discharged for memory block, the linked list head according to pointed by it determines corresponding memory pool;
Second points to module, in last in the corresponding memory pool of next pointers sensing of the memory block that will be released Counterfoil, and the chained list head pointer of the memory pool is pointed into the memory block.
CN201710060454.1A 2017-01-25 2017-01-25 Memory pool problem positioning method and system based on LTE protocol stack Active CN106919454B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202010057458.6A CN111324450B (en) 2017-01-25 2017-01-25 Method and system for memory pool leakage based on LTE protocol stack
CN201710060454.1A CN106919454B (en) 2017-01-25 2017-01-25 Memory pool problem positioning method and system based on LTE protocol stack
CN202010060440.1A CN111324451B (en) 2017-01-25 2017-01-25 Memory block out-of-limit positioning method and system based on LTE protocol stack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710060454.1A CN106919454B (en) 2017-01-25 2017-01-25 Memory pool problem positioning method and system based on LTE protocol stack

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN202010057458.6A Division CN111324450B (en) 2017-01-25 2017-01-25 Method and system for memory pool leakage based on LTE protocol stack
CN202010060440.1A Division CN111324451B (en) 2017-01-25 2017-01-25 Memory block out-of-limit positioning method and system based on LTE protocol stack

Publications (2)

Publication Number Publication Date
CN106919454A true CN106919454A (en) 2017-07-04
CN106919454B CN106919454B (en) 2020-02-21

Family

ID=59454162

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202010060440.1A Active CN111324451B (en) 2017-01-25 2017-01-25 Memory block out-of-limit positioning method and system based on LTE protocol stack
CN201710060454.1A Active CN106919454B (en) 2017-01-25 2017-01-25 Memory pool problem positioning method and system based on LTE protocol stack
CN202010057458.6A Active CN111324450B (en) 2017-01-25 2017-01-25 Method and system for memory pool leakage based on LTE protocol stack

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202010060440.1A Active CN111324451B (en) 2017-01-25 2017-01-25 Memory block out-of-limit positioning method and system based on LTE protocol stack

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202010057458.6A Active CN111324450B (en) 2017-01-25 2017-01-25 Method and system for memory pool leakage based on LTE protocol stack

Country Status (1)

Country Link
CN (3) CN111324451B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451054A (en) * 2017-07-26 2017-12-08 武汉虹信通信技术有限责任公司 A kind of memory pool adjustment method being used in linux environment
CN108446122A (en) * 2018-03-22 2018-08-24 中国银行股份有限公司 A kind of parameter consistency verification method and device
CN109343953A (en) * 2018-08-29 2019-02-15 苏州科达科技股份有限公司 EMS memory management process, device and electronic equipment
CN109799992A (en) * 2018-12-05 2019-05-24 交控科技股份有限公司 A kind of city rail traffic signal system software buffer area range check method
CN109933525A (en) * 2019-02-22 2019-06-25 深圳市吉祥腾达科技有限公司 A kind of general method for detecting memory leakage
CN111078407A (en) * 2019-12-10 2020-04-28 Oppo(重庆)智能科技有限公司 Memory management method and device, storage medium and electronic equipment
CN113377522A (en) * 2020-03-09 2021-09-10 大唐移动通信设备有限公司 Method and device for processing memory blocks in memory pool, electronic equipment and storage medium
CN113744013A (en) * 2020-09-28 2021-12-03 北京沃东天骏信息技术有限公司 Order number generation method, device, server and storage medium
CN114896178A (en) * 2022-05-20 2022-08-12 广东天太机器人有限公司 Method, device and equipment for clearing memory and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115373964B (en) * 2022-10-24 2023-01-20 北京智芯微电子科技有限公司 Memory out-of-range detection method, device, equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100316031A1 (en) * 2009-06-12 2010-12-16 Ntt Docomo, Inc. Communication terminal and control method
CN102253897A (en) * 2011-07-26 2011-11-23 大唐移动通信设备有限公司 Method and device for managing memory pool
US20120072847A1 (en) * 2010-09-17 2012-03-22 Lg Electronics Inc. Method for displaying internet page and mobile terminal using the same
CN103457996A (en) * 2013-06-19 2013-12-18 重庆邮电大学 Method and system for storing internal data of protocol conformance testing system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100498740C (en) * 2007-09-11 2009-06-10 腾讯科技(深圳)有限公司 Data cache processing method, system and data cache device
CN101763305B (en) * 2009-12-29 2011-12-14 青岛海信宽带多媒体技术有限公司 Method for detecting memory leak of embedded system
CN103914355A (en) * 2014-03-12 2014-07-09 汉柏科技有限公司 Method and device for positioning memory repeated release
CN105988921A (en) * 2015-02-06 2016-10-05 中兴通讯股份有限公司 Method and device for detecting out of range problem of memory
CN105183542B (en) * 2015-08-13 2019-07-12 上海斐讯数据通信技术有限公司 A kind of EMS memory management process and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100316031A1 (en) * 2009-06-12 2010-12-16 Ntt Docomo, Inc. Communication terminal and control method
US20120072847A1 (en) * 2010-09-17 2012-03-22 Lg Electronics Inc. Method for displaying internet page and mobile terminal using the same
CN102253897A (en) * 2011-07-26 2011-11-23 大唐移动通信设备有限公司 Method and device for managing memory pool
CN103457996A (en) * 2013-06-19 2013-12-18 重庆邮电大学 Method and system for storing internal data of protocol conformance testing system

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451054A (en) * 2017-07-26 2017-12-08 武汉虹信通信技术有限责任公司 A kind of memory pool adjustment method being used in linux environment
CN108446122A (en) * 2018-03-22 2018-08-24 中国银行股份有限公司 A kind of parameter consistency verification method and device
CN108446122B (en) * 2018-03-22 2021-10-29 中国银行股份有限公司 Parameter consistency verification method and device
CN109343953A (en) * 2018-08-29 2019-02-15 苏州科达科技股份有限公司 EMS memory management process, device and electronic equipment
CN109799992A (en) * 2018-12-05 2019-05-24 交控科技股份有限公司 A kind of city rail traffic signal system software buffer area range check method
CN109799992B (en) * 2018-12-05 2022-07-19 交控科技股份有限公司 Method for checking software buffer area range of urban rail transit signal system
CN109933525A (en) * 2019-02-22 2019-06-25 深圳市吉祥腾达科技有限公司 A kind of general method for detecting memory leakage
CN111078407A (en) * 2019-12-10 2020-04-28 Oppo(重庆)智能科技有限公司 Memory management method and device, storage medium and electronic equipment
CN113377522A (en) * 2020-03-09 2021-09-10 大唐移动通信设备有限公司 Method and device for processing memory blocks in memory pool, electronic equipment and storage medium
CN113744013A (en) * 2020-09-28 2021-12-03 北京沃东天骏信息技术有限公司 Order number generation method, device, server and storage medium
CN113744013B (en) * 2020-09-28 2024-05-21 北京沃东天骏信息技术有限公司 Order number generation method, device, server and storage medium
CN114896178A (en) * 2022-05-20 2022-08-12 广东天太机器人有限公司 Method, device and equipment for clearing memory and storage medium

Also Published As

Publication number Publication date
CN111324450B (en) 2023-04-28
CN111324451A (en) 2020-06-23
CN111324451B (en) 2023-04-28
CN106919454B (en) 2020-02-21
CN111324450A (en) 2020-06-23

Similar Documents

Publication Publication Date Title
CN106919454A (en) Memory pool positioning problems method and its system based on LTE protocol stack
CN101946286B (en) Controller for one type of nand flash memory for emulating another type of nand flash memory
CN104820641B (en) The method for reducing FLASH erasing times
CN101599046B (en) Method and device for detecting memory
CN101799744B (en) Solid-state drive command divides into groups
US20070208904A1 (en) Wear leveling method and apparatus for nonvolatile memory
CN104461391A (en) Method and system for managing and processing metadata of storage equipment
CN101641679A (en) Mlc selected multi-program for system management
CN105988722B (en) Data storage method and embedded system
CN103699491B (en) data storage method, memory controller and memory storage device
CN110032396A (en) Storage system and its operating method
CN105988921A (en) Method and device for detecting out of range problem of memory
CN106980581A (en) Memory device and the method for operating it
CN106155917A (en) EMS memory management process and device
CN106445416A (en) Data record storage, query and retrieval method and device
CN106528123A (en) SoC (System on a Chip) startup method and device based on eFuse module
CN102103541A (en) Kernel-module memory management method for preventing memory leaks and multiple memory releases
CN107463506B (en) Data storage management method of electric energy meter
CN102681820B (en) The register file of dynamic clustering and use the Reconfigurable Computation device of this register file
CN106484308A (en) Data guard method, memorizer control circuit unit and memorizer memory devices
CN101493759B (en) Address control method of random capacity asynchronous first-in/first-out memory
CN107766174A (en) Electronic-controlled installation and its information storage means
CN103811071B (en) The read method of a kind of high reliability NAND Flash and system thereof
US8566562B2 (en) Method for sequentially writing data with an offset to a non-volatile memory
CN205541960U (en) Processing apparatus and NOT AND type flash memory of bad row in NOT AND type flash memory

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 350000 Building 28, Fuzhou Software Park C, 89 Software Avenue, Gulou District, Fuzhou City, Fujian Province

Applicant after: Ankexun (Fujian) Technology Co., Ltd.

Address before: 350400 Pingtan, Fuzhou Province comprehensive experimentation area central business headquarters

Applicant before: FUJIAN SUNNADA NETWORK TECHNOLOGY CO., LTD.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant