CN107741894A - The monitoring method and device of a kind of application process - Google Patents
The monitoring method and device of a kind of application process Download PDFInfo
- Publication number
- CN107741894A CN107741894A CN201611063616.9A CN201611063616A CN107741894A CN 107741894 A CN107741894 A CN 107741894A CN 201611063616 A CN201611063616 A CN 201611063616A CN 107741894 A CN107741894 A CN 107741894A
- Authority
- CN
- China
- Prior art keywords
- system file
- host process
- finger daemon
- read
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 412
- 230000008569 process Effects 0.000 title claims abstract description 375
- 238000012544 monitoring process Methods 0.000 title claims abstract description 32
- 230000037007 arousal Effects 0.000 claims description 34
- 230000004083 survival effect Effects 0.000 claims description 19
- 238000012360 testing method Methods 0.000 claims description 12
- 238000001514 detection method Methods 0.000 claims description 11
- 238000012217 deletion Methods 0.000 claims description 4
- 230000037430 deletion Effects 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 8
- 230000015654 memory Effects 0.000 description 19
- 230000006870 function Effects 0.000 description 15
- 230000000694 effects Effects 0.000 description 10
- 230000006854 communication Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 8
- 230000001360 synchronised effect Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 238000003860 storage Methods 0.000 description 6
- 230000036632 reaction speed Effects 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 2
- 230000000903 blocking effect Effects 0.000 description 2
- 230000005484 gravity Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000011112 process operation Methods 0.000 description 2
- 230000000630 rising effect Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- FFBHFFJDDLITSX-UHFFFAOYSA-N benzyl N-[2-hydroxy-4-(3-oxomorpholin-4-yl)phenyl]carbamate Chemical compound OC1=C(NC(=O)OCC2=CC=CC=C2)C=CC(=C1)N1CCOCC1=O FFBHFFJDDLITSX-UHFFFAOYSA-N 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 239000000725 suspension Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3051—Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3089—Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
The embodiment of the invention discloses a kind of monitoring method of application process and device;The present embodiment is using the host process and finger daemon for calling application to be monitored, the first system file and second system file are created by the host process, and it is configured by reading authority of the host process to the first system file, so that the first system file is after host process termination, it can just be read by finger daemon, and it is configured by reading authority of the finger daemon to second system file, so that second system file is after finger daemon termination, it can just be read by host process, then, second system file is read using host process, and the first system file is read using finger daemon, when host process reads second system file, arouse the finger daemon, when finger daemon reads the first system file, arouse the host process;The program in terms of existing technologies, can greatly save power consumption, and improve its applicability.
Description
Technical field
The present invention relates to communication technical field, and in particular to the monitoring method and device of a kind of application process.
Background technology
With the popularization of the development of computer technology, and terminal, the species of terminal applies is a variety of also increasingly to be various
The process (abbreviation application process) of terminal applies is run in same terminal, and some situations, such as some application occur unavoidably
Process is by force closed by another application, or some application process surprisingly stops, etc., for this reason, it is necessary to which application processes are entered
Row monitoring in real time, to ensure that important application process being capable of normal operation.
In the prior art, can typically be come periodically to be monitored by way of the subprocess poll parent process of Linux layers
The host process of application sends message, so as to reach the purpose being monitored to the host process.For example, specifically can be to be monitored by this
Using Native methods (a java class method) are performed, entered by producing a Linux in fork () function of Linux layers
Journey, then periodically sent using the process to host process and be intended to (Intent) request, if host process terminates (i.e. dead),
Because the request is aroused by system and (is drawn host process living);If host process does not terminate, host process ignores the request.In addition,
In order to ensure the time-to-live of host process, generally require using faster frequency to send intention request.
In the research and practice process to prior art, it was found by the inventors of the present invention that in existing scheme, due to needing
Request is intended to send using faster transmission frequency, therefore, electric quantity consumption is larger, if moreover, Linux processes are also unexpected
If termination, then it can not realize, so, the program may be only available for specific system, and adaptability is poor.
The content of the invention
The embodiment of the present invention provides a kind of monitoring method and device of application process;The consumption of electricity can be saved, and
Suitable for more number systems, improve its applicability.
The embodiment of the present invention provides a kind of monitoring method of application process, it is characterised in that including:
Call the host process and finger daemon of application to be monitored;
The first system file and second system file are created by the host process;
The reading authority of the first system file is configured by the host process so that the first system file
After host process termination, it can just be read by finger daemon, and by reading of the finger daemon to the second system file
Weighting limit is configured so that the second system file can just be read after finger daemon termination by host process;
Second system file is read by the host process, and the first system file is read using the finger daemon;
When host process reads second system file, arouse the finger daemon;
When finger daemon reads the first system file, arouse the host process.
Accordingly, the embodiment of the present invention also provides a kind of supervising device of application process, including:
Call unit, for calling the host process and finger daemon of application to be monitored;
Creating unit, for creating the first system file and second system file by the host process;
Setting unit, for being configured by the host process to the reading authority of the first system file so that institute
The first system file is stated after host process termination, can just be read by finger daemon, and by the finger daemon to described the
The reading authority of two system file is configured so that the second system file can just be led after finger daemon termination
Process is read;
Reading unit, for reading second system file by the host process, and read using the finger daemon
The first system file;
Arouse unit, for when host process reads second system file, arousing the finger daemon;Work as finger daemon
When reading the first system file, arouse the host process.
The embodiment of the present invention can call the host process and finger daemon of application to be monitored, and first is created by the host process
System file and second system file, and be configured by reading authority of the host process to the first system file so that the first system
File unite after host process termination, can just be read by finger daemon, and by reading of the finger daemon to second system file
Authority is configured so that second system file can just be read, then, using master after finger daemon termination by host process
Process reads second system file, and reads the first system file using finger daemon, when host process reads second system
During file, arouse the finger daemon, when finger daemon reads the first system file, arouse the host process;It can be seen that should
Scheme can pass through this medium of file so that two processes carry out deadlock request each other, so as to realize that process terminates real-time
Monitor and arouse, for relative to high-frequency sending intention request due to the deadlock request between this process, it is not necessary to disappear
Extra flow is consumed, moreover, reaction speed is faster, and does not require particularly system, therefore, the program is relative to existing skill
For art, power consumption can be greatlyd save, and improves its applicability.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those skilled in the art, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached
Figure.
Fig. 1 a are the schematic diagram of a scenario of the monitoring method of application process provided in an embodiment of the present invention;
Fig. 1 b are the flow charts of the monitoring method of application process provided in an embodiment of the present invention;
Fig. 2 a are another flow charts of the monitoring method of application process provided in an embodiment of the present invention;
Fig. 2 b be application process provided in an embodiment of the present invention monitoring method in the synchronous flow chart of host process;
Fig. 2 c be application process provided in an embodiment of the present invention monitoring method in the synchronous flow chart of finger daemon;
Fig. 3 a are the structural representations of the supervising device of application process provided in an embodiment of the present invention;
Fig. 3 b are another structural representations of the supervising device of application process provided in an embodiment of the present invention;
Fig. 4 is the structural representation of terminal provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, the every other implementation that those skilled in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
The embodiment of the present invention provides a kind of monitoring method and device of application process.
Wherein, the supervising device of the application process can be integrated in terminal, such as mobile phone, tablet personal computer, notebook computer
Or in the equipment such as personal computer (PC, Personal Computer).
For example, so that the supervising device of the application process is integrated in the terminal as an example, referring to Fig. 1 a, terminal, which can be called, to be waited to supervise
The host process and finger daemon of application are controlled, and these processes are initialized, such as, first can be created by the host process
System file and second system file etc., then, this two process is synchronized by file lock mode, to realize to the two
The deadlock monitoring of process, and when it is determined that process terminates (i.e. process is dead), the process of termination is carried out arousing operation, for example,
Specifically the reading authority of the first system file and second system file can be configured respectively so that the first system text
Part can just be read after host process termination by finger daemon, and cause the second system file to stop it in finger daemon
Afterwards, it can just be read by host process, then, second system file be read using the host process, and read using the finger daemon
The first system file, when host process reads second system file, then show that finger daemon has terminated, then arouse this and keep
Shield process, similarly, when finger daemon reads the first system file, then show that host process has terminated, so, execution is aroused
Operation of host process, etc..
It is described in detail individually below.It should be noted that the sequence number of following examples is not as preferably suitable to embodiment
The restriction of sequence.
Embodiment one,
The angle of the supervising device of application process will be described for the embodiment of the present invention, the supervising device of the application process
It can specifically integrate in the terminal, the terminal can include the equipment such as mobile phone, tablet personal computer, notebook computer or PC.
A kind of monitoring method of application process, including:Call the host process and finger daemon of application to be monitored;Pass through the master
Process creation the first system file and second system file;Reading power to the first system file and second system file respectively
Limit is configured so that the first system file can just be read after host process termination by finger daemon, and cause this
Two system file can just be read after finger daemon termination by host process;Second system file is read by the host process, with
And the first system file is read by the finger daemon;When host process reads second system file, arouse the finger daemon;
When finger daemon reads the first system file, arouse the host process.
As shown in Figure 1 b, the flow of the monitoring method of the application process specifically can be as follows:
101st, the host process and finger daemon (Daemon) of application to be monitored are called.
Wherein, the host process of application to be monitored refers to the parent process in application to be monitored, and finger daemon is a kind of fortune
Row backstage special processing, it can independently of control terminal, and periodically perform certain task or wait it is pending certain
The event occurred a bit, in embodiments of the present invention, finger daemon can mutual process monitorings with host process.
102nd, the first system file and second system file are created by the host process.
Wherein, the content and form of the first system file and second system file can according to the demand of practical application and
It is fixed.
In addition, in order to avoid host process and finger daemon are in the different stages, the state that can not be completed between two processes is same
Step, it can first clear up and last arouse the finger daemon remained during process, i.e. create the first system file passing through the host process
Before second system file, the monitoring method of application process can also include:
Clear up finger daemon.
For example the finger daemon of the calling can be specifically terminated, and finger daemon, etc. is aroused by host process again.
103rd, the reading authority of the first system file and second system file is configured respectively so that first system
File unite after host process termination, can just be read by finger daemon, and causes the second system file in finger daemon
After only, it can just be read by host process.
For example, it can be configured by reading authority of the host process to the first system file so that the first system file exists
It after host process stops, can just be read by finger daemon, and be carried out by reading authority of the finger daemon to second system file
Setting so that the second system file can just be read after finger daemon termination by host process, such as, specifically can be as follows:
Exclusive lock is established to the first system file by host process;And by finger daemon to second system text
Part establishes exclusive lock.
Because host process has added exclusive lock to the first system file, so, if finger daemon is attempted to obtain the first system text
When the read right of part, it can not be read because current file is locked, the process of lock file can only be waited (i.e. main
Process) abandon exclusive lock to file.Similarly, because finger daemon has added exclusive lock to second system file, so, if master enters
When journey attempts to obtain the read right of second system file, as current file is locked and can not read, can only
The process of lock file is waited, i.e. finger daemon is abandoned just may be used to the exclusive lock of file.That is, do not untied actively in program
Before exclusive lock, only when side's process terminates, system will discharge its all locking resource automatically.Therefore as a side
After process gets the read right of file destination, that is, think that the opposing party's process has terminated, subsequently will be described in more detail, refer to step
Rapid 104 to 106, it is as follows:
104th, second system file is read by the host process, and the first system file is read by the finger daemon.
Wherein, the mode of reading can be configured according to the demand of practical application.For example " obstruction is read " can be used
Mode be read out, i.e., step " reads second system file by the host process, and reads the by the finger daemon
One system file " specifically can be as follows:
Blocked by the host process and read second system file, and blocked by the finger daemon and read the first system text
Part.
Wherein, obstruction reading is referred to when current process needs to read file destination, if the file destination is by it
He reads task occupancy, then will read task suspension in the current process accordingly, until after other reading task uses,
The reading task is just waken up, to be read out to the file destination.
In addition, it should be noted that, " reading " here refers to attempting to obtain read right, i.e. host process is attempted to obtain second
The read right of system file, and finger daemon are attempted to obtain the read right of the first system file.
Optionally, in order to avoid two processes are during synchronization, judge other side's state of a process by accident, do not set up in other side
Judge other side's process when finishing by accident to terminate, and enter arouse and (draw and live) stage in advance, host process can be passed through during synchronization
The 3rd system file is created, and the 4th system file is created by finger daemon, and in the first system for reading other side's process
Before file or second system file, attempt to delete the 3rd system file of other side's process or the 4th system file (row
Except the possibility of erroneous judgement other side's process status), when deleting successfully, just it is read out.That is, " read in step by the host process
Second system file is taken, and the first system file is read by the finger daemon " before, the monitoring method of the application process is also
It can include:
(1) the 3rd system file is created by host process, and the 4th system file is created by finger daemon.
(2) the 4th system file is deleted by the host process, if deleting successfully, execution uses the host process
The step of reading second system file;If deleting failure, after preset time, return and perform by the host process to the 4th
The step of system file is deleted.
(3) the 3rd system file is deleted by the finger daemon, if deleting successfully, execution is guarded by this
Process reads the step of the first system file;If deleting failure, after preset time, return to execution and pass through the finger daemon pair
The step of 3rd system file is deleted.
Wherein, the preset time can be depending on the demand of practical application, preset time and step in step (2)
(3) preset time can be identical or different.In addition, it should be noted that, the execution of step (2) and (3)
Can be in no particular order.
105th, when host process reads second system file, the finger daemon is aroused.
Wherein, the mode of arousing can have a variety of, such as, can use quarter-bell (AlarManager), service (Service),
Broadcast the mode such as (Broadcast) or movable (Activity).
Optionally, arouse efficiency to improve, except can use it is above-mentioned any one arouse mode in addition to, can also adopt
The mode aroused with mixing, i.e., be combined to above-mentioned a variety of modes of arousing, specifically can be as follows:
The finger daemon is aroused using default a variety of arousal patterns successively.
Wherein, arousal pattern, arouse number and the execution sequence of this variety of arousal pattern can be according to practical application
Demand is configured.Such as a variety of arousal patterns can include AlarManager, Service, Broadcast and
Any combination of mode such as Activity, etc..
It should be noted that all kinds of modes of arousing need to be beforehand with initialization, necessary object resource is generated, to ensure to send out
Existing process terminate after can quick response, will not be repeated here.
Optionally, in order to ensure the validity aroused, after arousing to the finger daemon, one can also waited
After the section time, the survival condition of the finger daemon to being invoked detects, to ensure that it can successfully arouse, i.e., in step
After " arousing to the finger daemon ", the monitoring method of the application process can also include:
In the range of setting time, regularly the survival condition of the finger daemon to being invoked detects, if testing result
Indicate that the finger daemon being invoked is not survived, then return and perform the step of arousing to the finger daemon, for example return and hold
The step of row is aroused using default a variety of arousal patterns to the finger daemon successively.
Otherwise, if testing result indicates that the finger daemon being invoked has been survived, flow can terminate.
106th, when finger daemon reads the first system file, the host process is aroused.
Wherein, the mode of arousing can have a variety of, such as, can use AlarManager, Service, Broadcast or
The modes such as Activity.
With step 105 similarly, arouse efficiency to improve, except can use AlarManager, Service,
Broadcast or Activity etc. any one arouses outside mode, can also be that is, more to this by the way of mixing is aroused
The kind mode of arousing is combined, specifically can be as follows
The host process is aroused using default a variety of arousal patterns successively.
Wherein, arousal pattern, arouse number and the execution sequence of this variety of arousal pattern can be according to practical application
Demand is configured.
It should be noted that all kinds of modes of arousing need to be beforehand with initialization, necessary object resource is generated, to ensure to send out
Existing process terminate after can quick response, will not be repeated here.
It should be noted that step 105 and 106 execution can be in no particular order.
Optionally, in order to ensure the validity aroused, after arousing to the host process, one section can also waited
After time, the survival condition of the host process to being invoked detects, to ensure that it can successfully arouse, i.e., in step " to this
Host process is aroused " after, the monitoring method of the application process can also include:
The survival condition of host process of the timing to being invoked detects, if testing result indicates the host process being invoked
Do not survive, then return and perform the step of arousing to the host process, for example return to perform and a variety of arouse mould using default successively
The step of formula is aroused to the host process.
Conversely, if testing result indicates that the host process being invoked has been survived, flow can terminate.
It should be noted that in order to avoid arousing process without limit, cause resource consumption excessive, operation can be aroused to this
Regular hour scope is set, i.e. step " regularly the survival condition of the host process to being invoked detects " is specifically as follows:
In the range of setting time, regularly the survival condition of the host process to being invoked detects.
Wherein, the time range of the setting can be configured according to the demand of practical application, will not be repeated here.
From the foregoing, it will be observed that the present embodiment can call the host process and finger daemon of application to be monitored, created by the host process
The first system file and second system file are built, and respectively to the reading authority of the first system file and second system file
It is configured so that the first system file can just be read after host process termination by finger daemon, and cause second system
File can just be read after finger daemon termination by host process, then, second system file be read using host process, and
The first system file is read using finger daemon, when host process reads second system file, arouses the finger daemon, when
When finger daemon reads the first system file, arouse the host process;It can be seen that the program can by this medium of file,
So that two processes carry out deadlock request each other, so as to realize real-time monitoring and arouse that process terminates, due to this process it
Between deadlock request relative to high-frequency send intention request for, it is not necessary to extra flow is consumed, moreover, reaction speed
Faster, and to system do not require particularly, therefore, the program in terms of existing technologies, can greatly save power consumption,
And improve its applicability.
Embodiment two,
, below will be with linux system according to the method described by embodiment one, and the supervising device of the application process is specific
It is further illustrated exemplified by integrating in the terminal.
In addition, will be specially Linux files a with the first system file in embodiments of the present invention for convenience1,
Second system file is specially Linux files b1, the 3rd system file is specially Linux files a2, the 4th system file is specific
For Linux files b2Exemplified by illustrate.
As shown in Figure 2 a, a kind of monitoring method of application process, idiographic flow can be as follows:
201st, terminal calls the host process and finger daemon of application to be monitored.
202nd, terminal initializes to host process and finger daemon respectively, such as, it can be created by the host process
Linux files a1With Linux files b1, etc., then perform step 203.
Wherein, Linux files a1With Linux files b1Content and form can be depending on the demand of practical application.
Optionally, in order to avoid host process and finger daemon are in the different stages, the state between two processes can not be completed
It is synchronous, before the first system file and second system file is created, it can first clear up and last arouse keeping of being remained during process
Shield process, the finger daemon of the calling can be specifically terminated, and finger daemon, etc. is aroused by host process again.
In addition, create Linux files a in host process1With Linux files b1Before, host process can also carry out Native
(a kind of locally applied) code.
203rd, terminal is synchronized, with right by way of establishment file lock to the host process after initialization and finger daemon
The host process and finger daemon carry out deadlock monitoring.
From host process and the angle of finger daemon, its synchronous flow will be illustrated respectively, for example, specifically respectively below
Can be as follows:
(1) host process.
Referring to Fig. 2 b, the synchronous flow of host process can be as follows:
A2031, host process are to Linux files a1Establish exclusive lock.
So, when finger daemon is attempted to obtain Linux files a1Read right when, can be because Linux files a1By
Lock and can not obtain, host process can only be waited to abandon to Linux files a1Exclusive lock, that is, wait host process terminate (i.e. extremely
Die) when, it can just get.
A2032, host process create Linux files a2。
Create Linux files a2, primarily to finger daemon is avoided during with the host process synchronization, erroneous judgement master
State of a process the occurrence of, such as, when host process does not set up and finished, erroneous judgement host process terminate, and in advance enter call out
Play and (draw and live) stage, etc..By to Linux files a2Deletion action is performed, finger daemon can clearly know this
The current state of host process, refers to step B2033.
A2033, host process are to Linux files b2Deleted, if deleting successfully, perform step A2035, if deleting
Failure, then perform step A2034.
A2034, after preset time, return perform step A2033, that is, wait preset time after, return perform step
A2033。
Wherein, the preset time can be depending on the demand of practical application.
A2035, host process read Linux files b1, i.e. host process trial acquisition Linux files b1Read right.
A2036, read Linux files b when host process1When, determine that finger daemon has terminated.
Because when host process reads Linux files b1When, then show that host process has got Linux files b1
Read right, and from step B2031, finger daemon is to Linux files b1Added exclusive lock, so, guard into
During the survival of journey, other processes are can not to obtain Linux files b1 read right, only when finger daemon terminates (i.e. extremely
Die) when, it is only possible to get Linux files b1 read right, so, if now, host process can read Linux files
B1, then it can determine that finger daemon has terminated.
Otherwise, when host process is read less than Linux files b1When, then it can continue executing with step A2035.
(2) finger daemon.
Referring to Fig. 2 c, the synchronous flow of finger daemon can be as follows:
B2031, finger daemon are to Linux files b1Establish exclusive lock.
So, when host process is attempted to obtain Linux files b1Read right when, can be because Linux files b1Locked
Determine and can not obtain, finger daemon can only be waited to abandon to Linux files b1Exclusive lock, that is, wait finger daemon terminate (i.e.
It is dead) when, it can just get.
B2032, finger daemon create Linux files b2。
Create Linux files b2, primarily to avoiding host process, erroneous judgement is kept during with the finger daemon synchronization
Protect state of a process the occurrence of, such as, when finger daemon does not set up and finished, erroneous judgement finger daemon terminate, and in advance
Into arousing (draw live) stage, etc..By to Linux files b2Deletion action is performed, finger daemon can be clearly
Know the current state of the finger daemon, refer to step A2033.
B2033, finger daemon are to Linux files a2Deleted, if deleting successfully, step B2035 is performed, if deleting
Except failure, then step B2034 is performed.
B2034, after preset time, return perform step B2033, that is, wait preset time after, return perform step
B2033。
Wherein, the preset time can be depending on the demand of practical application.
B2035, finger daemon read Linux files a1, i.e. finger daemon trial acquisition Linux files a1Read right.
B2036, read Linux files a when finger daemon1When, determine that host process has terminated.
Because when finger daemon reads Linux files a1When, then show that finger daemon has got Linux
File a1Read right, and from step A2031, host process is to Linux files a1Add exclusive lock, so, enter in master
During the survival of journey, other processes are can not to obtain Linux files a1Read right, only when host process terminates (i.e. death)
When, it is only possible to get Linux files a1Read right, so, if now, finger daemon can read Linux files
a1, then can determine that host process has terminated.
Otherwise, when finger daemon is read less than Linux files a1When, then it can continue executing with step B2035.
204th, when terminal monitoring to host process or finger daemon terminate, successively using default a variety of arousal patterns to the end
Process only is aroused.For example, specifically can be as follows:
When it is determined that finger daemon terminates, terminal can be carried out using default a variety of arousal patterns to the finger daemon successively
Arouse.
When it is determined that host process terminates constantly, terminal can be called out the host process using default a variety of arousal patterns successively
Rise.
Wherein, arousal pattern can including AlarManager, Service, Broadcast and Activity etc. mode
Any combination.Arousal pattern, arouse number and the execution sequence of this variety of arousal pattern can be according to the need of practical application
Ask and be configured, such as, exemplified by using AlarManager, Service, Broadcast and Activity successively, then have
Body can be as follows:
Process of the terminal using AlarManager to termination, such as host process or finger daemon are aroused, if arousing into
Work(, then step 205 is performed, if arousing unsuccessfully, the process of termination is aroused using Service, if arousing success, held
Row step 205, if arousing unsuccessfully, the process of termination is aroused using Broadcast, if arousing success, performs step
Rapid 205, if arousing unsuccessfully, the process of termination is aroused using Activity, if arousing success, performs step 205,
If arousing unsuccessfully, return and perform the step of arousing using AlarManager to the process of termination.
It should be noted that all kinds of modes of arousing need to be beforehand with initialization, necessary object resource is generated, to ensure to send out
Existing process terminate after can quick response, will not be repeated here.
Optionally, in order to ensure the validity aroused, after arousing to the host process, one section can also waited
After time, the survival condition of the host process to being invoked detects, to ensure that it can successfully arouse, i.e. the application process
Monitoring method can also include step 205, as follows:
205th, in the range of setting time, the survival condition of process of the terminal timing to being invoked detects, if detection
As a result indicate that the process being invoked is not survived, then return and perform step 204, otherwise, if testing result indicates what this was invoked
Process has been survived, then flow can terminate.
For example, can be arranged in the range of the regular hour, examined per the survival condition of process of the Y milliseconds to being invoked
Survey once, etc., wherein, Y is positive number, and time range and Y specific value can be depending on the demands of practical application.
From the foregoing, it will be observed that the present embodiment can call the host process and finger daemon of application to be monitored, created by the host process
Build Linux files a1With Linux files b1, and respectively to the Linux files a1With Linux files b1Reading authority carry out
Set so that Linux files a1It after host process termination, can just be read by finger daemon, and cause Linux files b1
It after finger daemon stops, can just be read by host process, then, Linux files b be read using host process1, and use and guard
Process reads Linux files a1, when host process reads Linux files b1When, arouse the finger daemon, when finger daemon is read
Get Linux files a1When, arouse the host process;It can be seen that the program can pass through this medium of file so that two processes
Deadlock request is carried out each other, so as to realize the real-time monitoring of process termination and arouse, due to the deadlock request between this process
For relative to high-frequency sending intention request, it is not necessary to extra flow is consumed, moreover, reaction speed is faster, and to being
System does not require that therefore, the program in terms of existing technologies, can greatly save power consumption, and improve it particularly
Applicability.
Further, since the program when arousing termination process, employs the mode that mixing is aroused, and hence it is also possible to significantly
Raising arouses efficiency and improves the effect aroused.
Embodiment three,
In order to preferably implement above method, the embodiment of the present invention also provides a kind of supervising device of application process, such as schemes
Shown in 3a, the supervising device of the application process can include call unit 301, creating unit 302, setting unit 303, reading list
Member 304 and arouses unit 305, as follows:
(1) call unit 301;
Call unit 301, for calling the host process and finger daemon of application to be monitored.
(2) creating unit 302;
Creating unit 302, for creating the first system file and second system file by the host process.
Wherein, the content and form of the first system file and second system file can according to the demand of practical application and
It is fixed.
In addition, in order to avoid host process and finger daemon are in the different stages, the state that can not be completed between two processes is same
Step, can first clear up it is last arouse the finger daemon remained during process, i.e.,:
Creating unit 302, it can be also used for clearing up finger daemon, such as, the finger daemon of the calling can be specifically terminated,
And finger daemon, etc. is aroused by host process again.
(3) setting unit 303;
Setting unit 303, for being configured respectively to the reading authority of the first system file and second system file,
So that the first system file can just be read after host process termination by finger daemon, and cause the second system file
After finger daemon termination, it can just be read by host process.
For example, setting unit 303, specifically can be used for being set by reading authority of the host process to the first system file
To put so that the first system file can just be read after host process termination by finger daemon, and by finger daemon to the second system
The reading authority of system file is configured so that and second system file can just be read after finger daemon termination by host process,
Such as specifically can be as follows:
Exclusive lock is established to the first system file by host process, and by finger daemon to the second system file
Establish exclusive lock.
(4) reading unit 304;
Reading unit 304, for reading second system file by the host process, and the is read by the finger daemon
One system file.
Wherein, the mode of reading can be configured according to the demand of practical application.For example " obstruction is read " can be used
Mode be read out, i.e.,:
Reading unit 304, it specifically can be used for blocking by the host process and read second system file, and kept by this
Protect process blocking and read the first system file.
(5) unit 305 is aroused;
Arouse unit 305, for when host process reads second system file, arousing the finger daemon;When guard into
When journey reads the first system file, arouse the host process.
Wherein, the mode of arousing can have a variety of, such as, can use AlarManager, Service, Broadcast or
The modes such as Activity.
Optionally, arouse efficiency to improve, except can use it is above-mentioned any one arouse mode in addition to, can also adopt
The mode aroused with mixing, i.e., be combined to above-mentioned a variety of modes of arousing, specifically can be as follows:
This arouses unit 305, specifically can be used for successively calling out the finger daemon using default a variety of arousal patterns
Rise.
And this arouses unit 305, specifically can be used for successively carrying out the host process using default a variety of arousal patterns
Arouse.
Wherein, arousal pattern, arouse number and the execution sequence of this variety of arousal pattern can be according to practical application
Demand is configured.
It should be noted that all kinds of modes of arousing need to be beforehand with initialization, necessary object resource is generated, to ensure to send out
Existing process terminate after can quick response, will not be repeated here.
Optionally, in order to ensure the validity aroused, after arousing to the finger daemon, one can also waited
After the section time, the survival condition of the finger daemon to being invoked detects, to ensure that it can successfully arouse, i.e., such as Fig. 3 b institutes
Show, the supervising device of the application process can also include the first detection unit 306 and the second detection unit 307, as follows:
First detection unit 306, can be used in the range of setting time, regularly depositing to the finger daemon that is invoked
Situation living is detected;If testing result indicates that the finger daemon being invoked is not survived, triggering is aroused unit and performed successively
The operation aroused using a variety of arousal patterns are preset to the finger daemon.
Second detection unit 307, can be used in the range of setting time, regularly to the survival for the host process being invoked
Situation is detected;If testing result indicates that the host process being invoked is not survived, triggering is aroused unit execution and used successively
Preset the operation that a variety of arousal patterns are aroused to the host process.
Optionally, in order to avoid two processes are during synchronization, judge other side's state of a process by accident, do not set up in other side
Judge other side's process when finishing by accident to terminate, and enter arouse and (draw and live) stage in advance, host process can be passed through during synchronization
The 3rd system file is created, and the 4th system file is created by finger daemon, and in the first system for reading other side's process
Before file or second system file, attempt to delete the 3rd system file of other side's process or the 4th system file (row
Except the possibility of erroneous judgement other side's process status), when deleting successfully, just it is read out.I.e. as shown in Figure 3 b, the application process
Supervising device can also include deleting unit, as follows:
It the creating unit 302, can be also used for creating the 3rd system file by host process, and created by finger daemon
Build the 4th system file.
The deletion unit 308, can be used for deleting the 4th system file by the host process, if delete into
Work(, then trigger reading unit 304 and perform the operation that second system file is read by the host process;If failure is deleted, pre-
If after the time, return to the operation for performing and being deleted by the host process the 4th system file;And by this guard into
Journey is deleted the 3rd system file, if deleting successfully, triggering reading unit 304 performs to be read by the finger daemon
The operation of the first system file;If deleting failure, after preset time, return and perform by the finger daemon to the 3rd system
The operation that system file is deleted.
Wherein, the preset time can will not be repeated here depending on the demand of practical application.
When it is implemented, above unit can be realized respectively as independent entity, any group can also be carried out
To close, realized as same or several entities, the specific implementation of above unit can be found in embodiment of the method above,
This is repeated no more.
The supervising device of the application process can specifically integrate in the terminal, the terminal can include mobile phone, tablet personal computer,
The equipment such as notebook computer or PC.
From the foregoing, it will be observed that the supervising device of the application process of the present embodiment can call to be monitored answer by call unit 301
Host process and finger daemon, and the first system file and second system are created by the host process by creating unit 302
File, and the reading authority of the first system file and second system file is configured respectively by reading unit 303, make
The first system file is obtained after host process termination, can just be read by finger daemon, and second system file is being guarded
It after process stops, can just be read by host process, then, second system file be read using host process by reading unit 304, with
And the first system file is read using finger daemon, when host process reads second system file, aroused by arousing unit 305
The finger daemon, when finger daemon reads the first system file, arouse the host process by arousing unit 305;It can be seen that
The program can pass through this medium of file so that two processes carry out deadlock request each other, so as to realize the reality of process termination
When monitor and arouse, due between this process deadlock request relative to high-frequency send intention request for, it is not necessary to
Extra flow is consumed, moreover, reaction speed is faster, and does not require particularly system, therefore, the program is relative to existing
For technology, power consumption can be greatlyd save, and improves its applicability.
Example IV,
Accordingly, the embodiment of the present invention also provides a kind of terminal, as shown in figure 4, the terminal can include radio frequency (RF,
Radio Frequency) circuit 401, include the memories 402, defeated of one or more computer-readable recording mediums
Enter unit 403, display unit 404, sensor 405, voicefrequency circuit 406, Wireless Fidelity (WiFi, Wireless Fidelity)
Module 407, include the part such as one or the processor 408 of more than one processing core and power supply 409.This area skill
Art personnel are appreciated that the restriction of the terminal structure shown in Fig. 4 not structure paired terminal, can include more more or more than illustrating
Few part, either combine some parts or different parts arrangement.Wherein:
RF circuits 401 can be used for receive and send messages or communication process in, the reception and transmission of signal, especially, by base station
After downlink information receives, transfer to one or more than one processor 408 is handled;In addition, it is sent to up data are related to
Base station.Generally, RF circuits 401 include but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, use
Family identity module (SIM, Subscriber Identity Module) card, transceiver, coupler, low-noise amplifier
(LNA, Low Noise Amplifier), duplexer etc..In addition, RF circuits 401 can also pass through radio communication and network and its
His equipment communication.The radio communication can use any communication standard or agreement, including but not limited to global system for mobile telecommunications system
Unite (GSM, Global System of Mobile communication), general packet radio service (GPRS, General
Packet Radio Service), CDMA (CDMA, Code Division Multiple Access), wideband code division it is more
Location (WCDMA, Wideband Code Division Multiple Access), Long Term Evolution (LTE, Long Term
Evolution), Email, Short Message Service (SMS, Short Messaging Service) etc..
Memory 402 can be used for storage software program and module, and processor 408 is stored in memory 402 by operation
Software program and module, so as to perform various function application and data processing.Memory 402 can mainly include storage journey
Sequence area and storage data field, wherein, storing program area can storage program area, the application program (ratio needed at least one function
Such as sound-playing function, image player function) etc.;Storage data field can store uses created data according to terminal
(such as voice data, phone directory etc.) etc..In addition, memory 402 can include high-speed random access memory, can also include
Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.Phase
Ying Di, memory 402 can also include Memory Controller, to provide processor 408 and input block 403 to memory 402
Access.
Input block 403 can be used for the numeral or character information for receiving input, and generation is set with user and function
Control relevant keyboard, mouse, action bars, optics or the input of trace ball signal.Specifically, in a specific embodiment
In, input block 403 may include touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or tactile
Control plate, collect user on or near it touch operation (such as user using any suitable object such as finger, stylus or
Operation of the annex on touch sensitive surface or near touch sensitive surface), and corresponding connection dress is driven according to formula set in advance
Put.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined
The touch orientation of user is surveyed, and detects the signal that touch operation is brought, transmits a signal to touch controller;Touch controller from
Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 408, and can reception processing
Order that device 408 is sent simultaneously is performed.It is furthermore, it is possible to a variety of using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Type realizes touch sensitive surface.Except touch sensitive surface, input block 403 can also include other input equipments.Specifically, other are defeated
Physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse can be included but is not limited to by entering equipment
One or more in mark, action bars etc..
Display unit 404 can be used for display by user input information or be supplied to user information and terminal it is various
Graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.Display
Unit 404 may include display panel, optionally, can use liquid crystal display (LCD, Liquid Crystal Display),
The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configure display panel.Further
, touch sensitive surface can cover display panel, after touch sensitive surface detects the touch operation on or near it, send processing to
Device 408 is followed by subsequent processing device 408 and provided on a display panel accordingly according to the type of touch event to determine the type of touch event
Visual output.Although in Fig. 4, touch sensitive surface realizes input and input with display panel is the part independent as two
Function, but in some embodiments it is possible to touch sensitive surface and display panel are integrated and realize input and output function.
Terminal may also include at least one sensor 405, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel, proximity transducer can close display panel and/or the back of the body when terminal is moved in one's ear
Light.As one kind of motion sensor, gravity accelerometer can detect in all directions (generally three axles) acceleration
Size, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal
Gyroscope, barometer, hygrometer, thermometer, the other sensors such as infrared ray sensor, will not be repeated here.
Voicefrequency circuit 406, loudspeaker, microphone can provide the COBBAIF between user and terminal.Voicefrequency circuit 406 can
Electric signal after the voice data received is changed, is transferred to loudspeaker, and voice signal output is converted to by loudspeaker;It is another
The voice signal of collection is converted to electric signal by aspect, microphone, and voice data is converted to after being received by voicefrequency circuit 406, then
After voice data output processor 408 is handled, through RF circuits 401 to be sent to such as another terminal, or by voice data
Export to memory 402 further to handle.Voicefrequency circuit 406 is also possible that earphone jack, with provide peripheral hardware earphone with
The communication of terminal.
WiFi belongs to short range wireless transmission technology, and terminal can help user's transceiver electronicses postal by WiFi module 407
Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 4 is shown
WiFi module 407, but it is understood that, it is simultaneously not belonging to must be configured into for terminal, can not change as needed completely
Become in the essential scope of invention and omit.
Processor 408 is the control centre of terminal, using various interfaces and the various pieces of connection whole mobile phone, is led to
Cross operation or perform the software program and/or module being stored in memory 402, and call and be stored in memory 402
Data, the various functions and processing data of terminal are performed, so as to carry out integral monitoring to mobile phone.Optionally, processor 408 can wrap
Include one or more processing cores;Preferably, processor 408 can integrate application processor and modem processor, wherein, should
Operating system, user interface and application program etc. are mainly handled with processor, modem processor mainly handles radio communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 408.
Terminal also includes the power supply 409 (such as battery) to all parts power supply, it is preferred that power supply can pass through power supply pipe
Reason system and processor 408 are logically contiguous, so as to realize management charging, electric discharge and power managed by power-supply management system
Etc. function.Power supply 409 can also include one or more direct current or AC power, recharging system, power failure inspection
The random component such as slowdown monitoring circuit, power supply changeover device or inverter, power supply status indicator.
Although being not shown, terminal can also include camera, bluetooth module etc., will not be repeated here.Specifically in this implementation
In example, the processor 408 in terminal can be according to following instruction, by corresponding to the process of one or more application program
Executable file is loaded into memory 402, and runs the application program being stored in memory 402 by processor 408, from
And realize various functions:
Call the host process and finger daemon of application to be monitored;The first system file and the second system are created by the host process
System file;It is configured by reading authority of the host process to the first system file so that the first system file stops in host process
Afterwards, it can just be read by finger daemon, and be configured by reading authority of the finger daemon to second system file so that should
Second system file can just be read after finger daemon termination by host process;Second system file is read by the host process,
And the first system file is read by the finger daemon;When host process reads second system file, arouse this guard into
Journey;When finger daemon reads the first system file, arouse the host process.
For example, specifically exclusive lock can be established to the first system file by host process;And pass through finger daemon pair
The second system file establishes exclusive lock, to be configured to the reading authority of the first system file and second system file,
So that the first system file can just be read after host process termination by finger daemon, and cause the second system file
After finger daemon termination, it can just be read by host process.
Optionally, in order to avoid two processes are during synchronization, other side's state of a process is judged by accident, can also be in synchronization
During, the 3rd system file is created by host process, and the 4th system file is created by finger daemon, and in reading pair
Before Fang Jincheng the first system file or second system file, attempt to the 3rd system file of other side's process or the 4th system
File is deleted (possibility for excluding erroneous judgement other side's process status), when deleting successfully, is just read out.I.e. this is stored in
Application program in memory 402, following functions can also be realized:
3rd system file is created by host process, and the 4th system file is created by finger daemon, passes through the master
Process is deleted the 4th system file, if deleting successfully, is performed and is read second system file by the host process
Operation;If deleting failure, after preset time, return and perform the 4th system file is deleted by the host process
Operation;The 3rd system file is deleted by the finger daemon, if deleting successfully, execution is read by the finger daemon
Take the operation of the first system file;If deleting failure, after preset time, return and perform by the finger daemon to the 3rd
The operation that system file is deleted.
Optionally, efficiency is aroused in order to improve, except single mode of arousing can be used to call out the process of termination
Outside rising, the process of termination can also be aroused, i.e., this is stored in the application in memory 402 by the way of mixing
Program, following functions can also be realized:
The finger daemon is aroused using default a variety of arousal patterns successively, and, use preset a variety of call out successively
The pattern of rising is aroused to the host process.
Wherein, arousal pattern can including AlarManager, Service, Broadcast and Activity etc. mode
Any combination.Arousal pattern, arouse number and the execution sequence of this variety of arousal pattern can be according to the need of practical application
Ask and be configured, will not be repeated here.
It should be noted that all kinds of modes of arousing need to be beforehand with initialization, necessary object resource is generated, to ensure to send out
Existing process terminate after can quick response, will not be repeated here.
Optionally, in order to ensure the validity aroused, after arousing to the host process, one section can also waited
After time, the survival condition of the host process to being invoked detects, and to ensure that it can successfully arouse, i.e., this is stored in storage
Application program in device 402, following functions can also be realized:
Timing detects to the survival condition for being invoked process (such as host process or finger daemon), if testing result refers to
Show that the process being invoked is not survived, then return to the operation for performing and being aroused to the process, for example return to perform and use successively
Preset the operation that a variety of arousal patterns are aroused to the process.
The specific implementation of each operation can be found in embodiment above above, will not be repeated here.
From the foregoing, it will be observed that the terminal of the present embodiment can call the host process and finger daemon of application to be monitored, pass through the master
Process creation the first system file and second system file, and set by reading authority of the host process to the first system file
To put so that the first system file can just be read after host process termination by finger daemon, and by finger daemon to the second system
The reading authority of system file is configured so that and second system file can just be read after finger daemon termination by host process,
Then, second system file is read using host process, and the first system file is read using finger daemon, when host process is read
During to second system file, arouse the finger daemon, when finger daemon reads the first system file, arouse the master and enter
Journey;It can be seen that the program can pass through this medium of file so that two processes carry out deadlock request each other, so as to realize process
Terminate real-time monitoring and arouse, due between this process deadlock request relative to high-frequency send intention request and
Speech, it is not necessary to extra flow is consumed, moreover, reaction speed is faster, and does not require particularly system, and therefore, the program
In terms of existing technologies, power consumption can be greatlyd save, and improves its applicability.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage
Medium can include:Read-only storage (ROM, Read Only Memory), random access memory (RAM, Random
Access Memory), disk or CD etc..
The monitoring method and device of a kind of application process provided above the embodiment of the present invention, have carried out detailed Jie
Continue, specific case used herein is set forth to the principle and embodiment of the present invention, and the explanation of above example is only
It is the method and its core concept for being used to help understand the present invention;Meanwhile for those skilled in the art, according to the present invention's
Thought, there will be changes in specific embodiments and applications, in summary, this specification content should not be construed as
Limitation of the present invention.
Claims (14)
- A kind of 1. monitoring method of application process, it is characterised in that including:Call the host process and finger daemon of application to be monitored;The first system file and second system file are created by the host process;The reading authority of the first system file is configured by the host process so that the first system file is in master It after process stops, can just be read by finger daemon, and be weighed by reading of the finger daemon to the second system file Limit is configured so that the second system file can just be read after finger daemon termination by host process;Second system file is read by the host process, and the first system file is read by the finger daemon;When host process reads second system file, arouse the finger daemon;When finger daemon reads the first system file, arouse the host process.
- 2. according to the method for claim 1, it is characterised in thatIt is described that the reading authority of the first system file is configured by the host process so that the first system file After host process termination, it can just be read by finger daemon, including:The first system file is established by host process exclusive Lock;AndIt is described that the reading authority of the second system file is configured by the finger daemon so that the second system text Part can just be read after finger daemon termination by host process, including:The second system file is established by finger daemon Exclusive lock.
- 3. according to the method for claim 1, it is characterised in that it is described that second system file is read by the host process, And by the finger daemon read the first system file before, in addition to:3rd system file is created by host process, and the 4th system file is created by finger daemon;The 4th system file is deleted by the host process, if deleting successfully, execution passes through the host process The step of reading second system file;If deleting failure, after preset time, return and perform by the host process to described The step of 4th system file is deleted;The 3rd system file is deleted by the finger daemon, if deleting successfully, performs and is guarded by described Process reads the step of the first system file;If deleting failure, after preset time, return to execution and pass through the finger daemon The step of deleting the 3rd system file.
- 4. according to the method described in any one of claims 1 to 3, it is characterised in that it is described to arouse the finger daemon, including:The finger daemon is aroused using default a variety of arousal patterns successively.
- 5. according to the method for claim 4, it is characterised in that described to be kept successively using default a variety of arousal patterns described After shield process is aroused, in addition to:In the range of setting time, regularly the survival condition of the finger daemon to being invoked detects;If the finger daemon that is invoked described in testing result instruction is not survived, return to perform and a variety of arouse mould using default successively The step of formula is aroused to the finger daemon.
- 6. according to the method described in any one of claims 1 to 3, it is characterised in that it is described to arouse the host process, including:The host process is aroused using default a variety of arousal patterns successively.
- 7. according to the method for claim 6, it is characterised in that described successively using default a variety of arousal patterns to the master After process is aroused, in addition to:In the range of setting time, regularly the survival condition of the host process to being invoked detects;If the host process being invoked described in testing result instruction is not survived, return and perform successively using default a variety of arousal patterns The step of arousing to the host process.
- A kind of 8. supervising device of application process, it is characterised in that including:Call unit, for calling the host process and finger daemon of application to be monitored;Creating unit, for creating the first system file and second system file by the host process;Setting unit, for being configured by the host process to the reading authority of the first system file so that described One system file can just be read after host process termination by finger daemon, and by the finger daemon to second system The reading authority of system file is configured so that the second system file, just can be by host process after finger daemon termination Read;Reading unit, for reading second system file by the host process, and first is read by the finger daemon System file;Arouse unit, for when host process reads second system file, arousing the finger daemon;When finger daemon is read During to the first system file, arouse the host process.
- 9. device according to claim 8, it is characterised in thatSetting unit, specifically for establishing exclusive lock to the first system file by host process, and pass through finger daemon Exclusive lock is established to the second system file.
- 10. device according to claim 8, it is characterised in that also include deleting unit;The creating unit, it is additionally operable to create the 3rd system file by host process, and the 4th system is created by finger daemon System file;The deletion unit, for being deleted by the host process the 4th system file, if deleting successfully, touch Send out reading unit and perform the operation that second system file is read by the host process;If deleting failure, after preset time, Return to the operation for performing and being deleted by the host process the 4th system file;And pass through the finger daemon 3rd system file is deleted, if deleting successfully, triggering reading unit performs to be read by the finger daemon The operation of the first system file;If deleting failure, after preset time, return and perform by the finger daemon to described the The operation that three system files are deleted.
- 11. according to the device described in any one of claim 8 to 10, it is characterised in thatIt is described to arouse unit, specifically for being aroused successively using default a variety of arousal patterns to the finger daemon.
- 12. device according to claim 11, it is characterised in that also including the first detection unit;First detection unit, in the range of setting time, regularly the survival condition of the finger daemon to being invoked to be entered Row detection;If the finger daemon being invoked described in testing result instruction is not survived, triggering is aroused unit and performed successively using pre- If the operation that a variety of arousal patterns are aroused to the finger daemon.
- 13. according to the device described in any one of claim 8 to 10, it is characterised in thatIt is described to arouse unit, specifically for being aroused successively using default a variety of arousal patterns to the host process.
- 14. device according to claim 13, it is characterised in that also including the second detection unit;Second detection unit, in the range of setting time, regularly the survival condition of the host process to being invoked to be carried out Detection;If the host process being invoked described in testing result instruction is not survived, triggering is aroused unit and performed successively using default more The operation that kind arousal pattern is aroused to the host process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611063616.9A CN107741894B (en) | 2016-11-25 | 2016-11-25 | application process monitoring method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611063616.9A CN107741894B (en) | 2016-11-25 | 2016-11-25 | application process monitoring method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107741894A true CN107741894A (en) | 2018-02-27 |
CN107741894B CN107741894B (en) | 2020-01-31 |
Family
ID=61235087
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611063616.9A Active CN107741894B (en) | 2016-11-25 | 2016-11-25 | application process monitoring method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107741894B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109637118A (en) * | 2018-12-28 | 2019-04-16 | 武汉征原电气有限公司 | A kind of intelligent vehicle operation management system |
CN111416821A (en) * | 2020-03-20 | 2020-07-14 | 杭州物源科技有限公司 | Internet of things equipment information acquisition method, system and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102103676A (en) * | 2011-02-28 | 2011-06-22 | 南京邮电大学 | Method for protecting Java program progress based on inheritance relationship among progresses |
CN102200941A (en) * | 2010-03-25 | 2011-09-28 | 杭州华三通信技术有限公司 | Method and unit for monitoring process state |
CN103678084A (en) * | 2012-09-21 | 2014-03-26 | 成都勤智数码科技股份有限公司 | Flexible application process guarding method |
US20160132340A1 (en) * | 2014-11-12 | 2016-05-12 | Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd | Dual-processor electronic device and method for quick boot up |
CN105630659A (en) * | 2015-12-23 | 2016-06-01 | 北京奇虎科技有限公司 | Application crash log acquisition method and apparatus |
-
2016
- 2016-11-25 CN CN201611063616.9A patent/CN107741894B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102200941A (en) * | 2010-03-25 | 2011-09-28 | 杭州华三通信技术有限公司 | Method and unit for monitoring process state |
CN102103676A (en) * | 2011-02-28 | 2011-06-22 | 南京邮电大学 | Method for protecting Java program progress based on inheritance relationship among progresses |
CN103678084A (en) * | 2012-09-21 | 2014-03-26 | 成都勤智数码科技股份有限公司 | Flexible application process guarding method |
US20160132340A1 (en) * | 2014-11-12 | 2016-05-12 | Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd | Dual-processor electronic device and method for quick boot up |
CN105630659A (en) * | 2015-12-23 | 2016-06-01 | 北京奇虎科技有限公司 | Application crash log acquisition method and apparatus |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109637118A (en) * | 2018-12-28 | 2019-04-16 | 武汉征原电气有限公司 | A kind of intelligent vehicle operation management system |
CN111416821A (en) * | 2020-03-20 | 2020-07-14 | 杭州物源科技有限公司 | Internet of things equipment information acquisition method, system and device |
Also Published As
Publication number | Publication date |
---|---|
CN107741894B (en) | 2020-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104519485B (en) | Communication means, device and system between a kind of terminal | |
CN103389863B (en) | A kind of display control method and device | |
CN103942113B (en) | The detection method of system reboot reason, device and terminal unit | |
CN104571838B (en) | A kind of quick method and apparatus for starting application program | |
CN106657251A (en) | Data synchronizing method and apparatus | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN103365419B (en) | A kind of method and apparatus triggering alarm clock control command | |
CN104123276B (en) | The hold-up interception method of pop-up, device and system in a kind of browser | |
CN106570358A (en) | Method and device for setting application permissions | |
CN103312597B (en) | A kind of speech message generation method and device | |
CN104657666A (en) | Method and device for optimizing terminal operation environment | |
CN106506820A (en) | A kind of backup method of mobile terminal data and device | |
CN103246847B (en) | A kind of method and apparatus of macrovirus killing | |
CN106980439A (en) | The method and device of hiden application icon | |
CN106454976A (en) | Switching method and device for wireless network and terminal | |
CN108270757A (en) | A kind of user account switching method, device, client and system | |
CN103793267B (en) | The access method and device of queue | |
CN107104930A (en) | It is a kind of that the methods, devices and systems for checking authority are set | |
CN106681884B (en) | A kind of monitoring method and device of system calling | |
CN106817489A (en) | The reminding method and mobile terminal of message | |
CN107741894A (en) | The monitoring method and device of a kind of application process | |
CN106407779A (en) | Information acquisition method and apparatus, and terminal | |
CN106708641A (en) | Process protection method and device | |
CN103310155B (en) | A kind of method and apparatus searching viral parent | |
CN104468102A (en) | Method and device for operation management of network account |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240102 Address after: 518057 Tencent Building, No. 1 High-tech Zone, Nanshan District, Shenzhen City, Guangdong Province, 35 floors Patentee after: TENCENT TECHNOLOGY (SHENZHEN) Co.,Ltd. Patentee after: TENCENT CLOUD COMPUTING (BEIJING) Co.,Ltd. Address before: 518000 Tencent Building, No. 1 High-tech Zone, Nanshan District, Shenzhen City, Guangdong Province, 35 Floors Patentee before: TENCENT TECHNOLOGY (SHENZHEN) Co.,Ltd. |
|
TR01 | Transfer of patent right |