CN109857615B - Method and device for detecting memory leakage - Google Patents

Method and device for detecting memory leakage Download PDF

Info

Publication number
CN109857615B
CN109857615B CN201811646001.8A CN201811646001A CN109857615B CN 109857615 B CN109857615 B CN 109857615B CN 201811646001 A CN201811646001 A CN 201811646001A CN 109857615 B CN109857615 B CN 109857615B
Authority
CN
China
Prior art keywords
memory
occupancy rate
specified object
memory occupancy
change condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811646001.8A
Other languages
Chinese (zh)
Other versions
CN109857615A (en
Inventor
张晨阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qax Technology Group Inc
Original Assignee
Qax Technology Group Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qax Technology Group Inc filed Critical Qax Technology Group Inc
Priority to CN201811646001.8A priority Critical patent/CN109857615B/en
Publication of CN109857615A publication Critical patent/CN109857615A/en
Application granted granted Critical
Publication of CN109857615B publication Critical patent/CN109857615B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the invention provides a method and a device for detecting memory leakage, wherein the method comprises the following steps: in the process of monitoring a specified object, when each operation on the specified object is monitored, acquiring the memory occupancy rate of the specified object after each operation; and detecting whether the specified object has memory leakage or not according to the memory occupancy rate of the specified object after each operation. The embodiment of the invention improves the accuracy of memory leak detection.

Description

Method and device for detecting memory leakage
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a method and a device for detecting memory leakage.
Background
A memory leak refers to a condition in which a program fails to release memory that has been unused due to negligence or error, i.e., fails to correctly release previously allocated memory. Memory leaks may cause various problems, for example, a program leaking a large amount of memory or a program leaking more and more may cause poor performance, completely exhausted memory, and the like, and a leaked program may consume too much memory, so that another program fails, thereby causing a user to find a true source of the problem.
In combination with products of firewall type and the like, if only one command line leaks, only a very small block of memory is occupied, the memory leak can accumulate months or even years to be exposed in the normal use process of the product, and at this time, the memory leak cannot be basically discovered if special tests are not performed. In addition, when products such as firewalls provide a plurality of command lines for user operation, if the command line has a memory leak, the memory leak may be discovered only when several hundreds or even thousands of commands are issued in the existing testing process of the memory leak. In addition, for memory leakage of a certain process or module, at present, a tester basically judges whether the memory occupied by the process is in a reasonable range after using the process for a period of time only by experience, and an effective and targeted test mode is not available to accurately detect whether the memory is leaked.
In summary, in the prior art, the accuracy is low when detecting whether the memory leaks.
Disclosure of Invention
The embodiment of the invention provides a method and a device for detecting memory leakage, which aim to solve the problem of lower accuracy in detecting whether memory is leaked or not in the prior art.
In a first aspect, an embodiment of the present invention provides a method for detecting a memory leak, where the method includes:
in the monitoring process of a specified object, when each operation of the specified object is monitored, the memory occupancy rate of the specified object after each operation is obtained;
and detecting whether the specified object has memory leakage or not according to the memory occupancy rate of the specified object after each operation.
In a second aspect, an embodiment of the present invention provides a device for detecting a memory leak, where the device includes:
the system comprises an acquisition module, a monitoring module and a control module, wherein the acquisition module is used for acquiring the memory occupancy rate of a specified object after each operation when each operation on the specified object is monitored in the monitoring process of the specified object;
and the detection module is used for detecting whether the specified object has memory leakage or not according to the memory occupancy rate of the specified object after each operation.
In a third aspect, an embodiment of the present invention provides an electronic device, which includes a memory, a processor, and a computer program that is stored in the memory and is executable on the processor, where the processor implements the steps of the method and apparatus for detecting a memory leak when executing the computer program.
In a fourth aspect, an embodiment of the present invention provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the method and apparatus for detecting a memory leak.
According to the method and the device for detecting the memory leak, provided by the embodiment of the invention, when each operation on the designated object is detected, the memory occupancy rate of the designated object after each operation is obtained, and whether the memory leak exists in the designated object is detected according to the memory occupancy rate of the designated object after each operation, so that whether the memory leak exists in the designated object is detected only according to the operation on the designated object, namely, the event-triggered memory leak detection on the designated object is realized, the interference of other factors on the judgment of the memory occupancy condition of the designated object is eliminated, and the accuracy of the memory leak detection is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flowchart illustrating steps of a method for detecting memory leaks according to an embodiment of the present invention;
FIG. 2 is a block diagram of an apparatus for detecting memory leak according to an embodiment of the present invention;
fig. 3 is a schematic physical structure diagram of an electronic device in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
As shown in fig. 1, a flowchart of steps of a method for detecting memory leak in an embodiment of the present invention is shown, where the method includes the following steps:
step 101: in the process of monitoring the designated object, when each operation on the designated object is monitored, the memory occupancy rate of the designated object after each operation is obtained.
In this step, specifically, the designated object is a program module, a process, a function, a command line, or the like.
It should be noted that the designated object may be a designated object in a firewall, a Virtual Private Network (VPN) gateway, a probe, a router, a switch, or other devices.
In addition, in the monitoring process of the specified object, the memory occupancy rate after each operation of the specified object may be recorded.
For example, when the designated object is a program module, the operation on the program module may be a call or release operation on the program module, and at this time, in the monitoring process on the program module, when the call or release operation on the program module is monitored, the memory occupancy rate after the call or release operation is performed on the program module is acquired. In addition, when the designated object is a process, the operation on the process may be a call or release operation on the process, and at this time, in the process of monitoring the process, when the call or release operation on the process is monitored, the memory occupancy rate after the call or release operation on the process is executed is acquired. In addition, when the designated object is a function, the operation on the function may be a call or a no operation on the function, and at this time, in the monitoring process on the function, when the call or the release operation on the function is monitored, the memory occupancy rate after the call or the release operation is performed on the function is acquired. In addition, when the designated object is a command line, the operation on the command line is an issuing or releasing operation on the command line, and at this time, in the monitoring process of whether the command line is issued or not, when the issuing or releasing operation on the command line is monitored, the memory occupancy rate after the command line is issued or released is obtained. Of course, the present embodiment may also set the issuing times and issuing time intervals of the command line correspondingly, and set the calling times and calling intervals of the program module, the process, or the function correspondingly.
In this way, by acquiring the memory occupancy rate of the designated object after each operation when each operation on the designated object is monitored, the memory occupancy rate is acquired only when the designated object is operated, and the memory occupancy rate of the designated object is not acquired at other moments, so that the situation that the judgment on the memory occupancy rate of the designated object is influenced when other objects cause overall memory change is avoided, namely, the problem that the memory occupancy rate of the designated object is interfered by other factors when the memory occupancy rate of the designated object is acquired in real time within a long period in the prior art is avoided, the number of the acquired memory occupancy rates is reduced, and the accuracy in memory leak detection is improved.
Step 102: and detecting whether the specified object has memory leakage or not according to the memory occupancy rate of the specified object after each operation.
In this step, specifically, after the memory occupancy rate of the designated object after each operation is obtained, whether the designated object has memory leakage may be detected according to the memory occupancy rate of the designated object after each operation.
When detecting whether the specified object has memory leakage according to the memory occupancy rate of the specified object after each operation, for each operation, detecting whether the change condition of the memory occupancy rate of the specified object after the operation is consistent with the preset change condition of the memory occupancy rate corresponding to the operation type of the operation; the operation type comprises a call specified object and a release specified object; when the operation type is the release designated object, the preset change condition of the memory occupancy rate is that the preset value is reduced for the memory; when the operation type is the call designated object, the preset change condition of the memory occupancy rate is that a preset value is added to the memory; and when the change condition of the memory occupancy rate of the specified object after the operation is detected to be inconsistent with the preset change condition of the memory occupancy rate corresponding to the operation type of the operation, determining that the specified object has memory leakage.
Specifically, when it is detected that the change condition of the memory occupancy rate of the specified object after the operation is inconsistent with the preset change condition of the memory occupancy rate corresponding to the operation type of the operation, when it is detected that the operation type of the operation is the release specified object, the change condition of the memory occupancy rate of the specified object after the operation is the unreduced preset value; when the operation type of the operation is detected to be calling the designated object, the change condition of the memory occupancy rate of the designated object after the operation is that the added value is not a preset value.
It should be noted that, each designated object corresponds to a preset value, and the preset value is obtained by calculation according to the memory value initially allocated to the designated object, that is, the ratio of the initial memory value to the total memory, that is, the memory occupancy rate, for example, when the designated object is a function, the preset value is the memory occupancy rate initially allocated to the function itself, and when the designated object is a process, the preset value is the memory occupancy rate initially allocated to the process itself.
In addition, specifically, the change of the memory occupancy rate of the designated object after the operation is relative to the memory occupancy rate of the designated object before the operation. For example, when the memory occupancy of the specified object after the operation is a1, and the memory occupancy before the operation is a2, the memory occupancy varies as the difference between a1 and a 2.
The above-described case will be described below by way of example.
For example, assume that the designated object is a function, and the memory occupancy rate initially allocated to the function is B1, i.e., the preset value is B1. If the operation type of the current operation on the function is detected to be the release specified object, that is, the preset change condition of the memory occupancy rate is the preset memory reduction value B1, whether the change condition of the memory occupancy rate of the function after the operation is consistent with the preset change condition of the memory occupancy rate corresponding to the operation type of the operation is detected, that is, whether the memory occupancy rate of the function after the release operation is reduced by the preset value B1 is detected. At this time, if it is detected that the memory occupancy rate of the function after the operation is reduced by the preset value B1, it is described that the memory occupied by the function is released, that is, the memory leakage problem does not occur, and of course, if it is detected that the memory occupancy rate of the function after the operation is not reduced by the preset value B1, it is described that the memory occupied by the function is not released, that is, it is determined that the function has the memory leakage problem at this time.
Therefore, whether the change condition of the memory occupancy rate of the designated object after each operation is consistent with the preset change condition of the memory occupancy rate corresponding to the operation type of the operation is detected, and if the change condition of the memory occupancy rate of the designated object is inconsistent with the preset change condition of the memory occupancy rate corresponding to the operation type of the operation, the memory leakage of the designated object is determined, so that the problem that the memory leakage cannot be accurately detected due to uncertain change trend caused by correlation of the memory change condition and the operation type when the memory leakage of the designated object is detected according to the change trend of the memory in the prior art is solved, the authenticity and the accuracy of the detected memory occupancy condition of the designated object are ensured, and the accuracy of judging the memory leakage according to the memory occupancy condition of the designated object after each operation is further ensured.
In addition, after it is determined that the specified object has a memory leak, alarm information may be output.
Specifically, the alarm information may be an alarm prompt tone or an alarm caption, that is, the specific form of the alarm information is not specifically limited herein. Therefore, by outputting alarm information, testers can timely position memory leakage, and timeliness of memory leakage detection is improved.
In addition, in this embodiment, when each operation on the designated object is monitored, after the memory occupancy rate of the designated object after each operation is obtained, the visualized information of the memory occupancy rate of the designated object after each operation may also be output.
Specifically, the visualization information may be a data chart, such as a bar chart, a broken line chart, an area chart, or a curved surface chart, of the memory occupancy rate of the specified object after each operation. It should be noted that, of course, the visualization information may be in other forms, such as a table, and the specific form of the output visualization information is not limited in detail here.
Therefore, by outputting the visual information of the memory occupancy rate of the specified object after each operation, a tester with memory leakage can pay attention to the memory occupancy rate of the specified object at any time, so that the memory leakage can be positioned in time, and the timeliness of memory leakage detection is realized.
In this way, the method for detecting memory leak according to this embodiment obtains the memory occupancy rate of the designated object after each operation when each operation on the designated object is detected, and detects whether the designated object has memory leak according to the memory occupancy rate of the designated object after each operation, so that whether the designated object has memory leak is detected only according to the operation on the designated object, that is, the event-triggered memory leak detection on the designated object is realized, interference of other factors on judgment of the memory occupancy of the designated object is eliminated, and accuracy in memory leak detection is improved.
As shown in fig. 2, a block diagram of a device for detecting memory leakage in an embodiment of the present invention is shown, where the device includes:
an obtaining module 201, configured to obtain, in a monitoring process of a specified object, a memory occupancy rate of the specified object after each operation when each operation on the specified object is monitored;
the detecting module 202 is configured to detect whether a memory leak exists in the designated object according to the memory occupancy rate of the designated object after each operation.
Optionally, the apparatus further comprises: and the first output module is used for outputting the visual information of the memory occupancy rate of the specified object after each operation.
Optionally, the detection module includes:
the detection unit is used for detecting whether the change condition of the memory occupancy rate of the specified object after the operation is consistent with the preset change condition of the memory occupancy rate corresponding to the operation type of the operation or not for each operation; the operation type comprises a call specified object and a release specified object; when the operation type is the release designated object, the preset change condition of the memory occupancy rate is that the preset value of the memory is reduced; when the operation type is the call designated object, the preset change condition of the memory occupancy rate is that a preset value is added to the memory;
and the determining unit is used for determining that the specified object has memory leakage when the change condition of the memory occupancy rate of the specified object after the operation is detected to be inconsistent with the preset change condition of the memory occupancy rate corresponding to the operation type of the operation.
Optionally, the apparatus further comprises:
and the second output module is used for outputting alarm information.
In this way, the detection apparatus for memory leak provided in this embodiment, when detecting each operation on the designated object, obtains the memory occupancy rate of the designated object after each operation, and detects whether the designated object has a memory leak according to the memory occupancy rate of the designated object after each operation, thereby implementing targeted and event-triggered memory leak detection on the designated object, avoiding interference of other factors on a detection result when performing memory leak detection on the designated object, and improving accuracy when detecting a memory leak.
In addition, as shown in fig. 3, an entity structure schematic diagram of the electronic device provided in the embodiment of the present invention is shown, where the electronic device may include: a processor (processor)310, a communication Interface (communication Interface)320, a memory (memory)330 and a communication bus 340, wherein the processor 310, the communication Interface 320 and the memory 330 communicate with each other via the communication bus 340. The processor 310 may invoke a computer program stored on the memory 330 and executable on the processor 310 to perform the methods provided by the various embodiments described above, including, for example: in the process of monitoring a specified object, when each operation on the specified object is monitored, acquiring the memory occupancy rate of the specified object after each operation; and detecting whether the specified object has memory leakage or not according to the memory occupancy rate of the specified object after each operation.
In addition, the logic instructions in the memory 330 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Embodiments of the present invention further provide a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform the method provided in the foregoing embodiments when executed by a processor, for example, the method includes: in the process of monitoring a specified object, when each operation on the specified object is monitored, acquiring the memory occupancy rate of the specified object after each operation; and detecting whether the specified object has memory leakage or not according to the memory occupancy rate of the specified object after each operation.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. Based on the understanding, the above technical solutions substantially or otherwise contributing to the prior art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the various embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. A method for detecting a memory leak, the method comprising:
in the process of monitoring a specified object, when each operation aiming at the specified object is monitored, acquiring the memory occupancy rate of the specified object after each operation; wherein the designated object comprises at least one of a program module, a process, a function, or a command line;
detecting whether the specified object has memory leakage or not according to the memory occupancy rate of the specified object after each operation;
wherein, the detecting whether the specified object has memory leakage according to the memory occupancy rate after each operation for the specified object includes:
for each operation, detecting whether the change condition of the memory occupancy rate of the specified object after the operation is consistent with the preset change condition of the memory occupancy rate corresponding to the operation type of the operation; the operation type comprises a calling specified object and a releasing specified object; when the operation type is the release designated object, the preset change condition of the memory occupancy rate is that the preset value of the memory is reduced; when the operation type is the call designated object, the preset change condition of the memory occupancy rate is that a preset value is added to the memory;
and when the situation that the change of the memory occupancy rate of the specified object after the operation is inconsistent with the preset change of the memory occupancy rate corresponding to the operation type of the operation is detected, determining that the specified object has memory leakage.
2. The method of claim 1, wherein after the obtaining the memory occupancy rate after each operation for the designated object when each operation for the designated object is monitored, the method further comprises:
and outputting the visualized information of the memory occupancy rate of the specified object after each operation.
3. The method of claim 1, wherein after determining that the specified object has a memory leak, the method further comprises:
and outputting alarm information.
4. A memory leak detection apparatus, comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring the memory occupancy rate of a specified object after each operation when each operation of the specified object is monitored in the monitoring process of the specified object; wherein the designated object comprises at least one of a program module, a process, a function, or a command line;
the detection module is used for detecting whether the specified object has memory leakage or not according to the memory occupancy rate of the specified object after each operation; wherein the detection module comprises:
the detection unit is used for detecting whether the change condition of the memory occupancy rate of the specified object after the operation is consistent with the preset change condition of the memory occupancy rate corresponding to the operation type of the operation or not for each operation; the operation type comprises a call specified object and a release specified object; when the operation type is the release designated object, the preset change condition of the memory occupancy rate is that the preset value of the memory is reduced; when the operation type is the call designated object, the preset change condition of the memory occupancy rate is that a preset value is added to the memory;
and the determining unit is used for determining that the specified object has memory leakage when the change condition of the memory occupancy rate after the operation of the specified object is detected to be inconsistent with the preset change condition of the memory occupancy rate corresponding to the operation type of the operation.
5. The apparatus of claim 4, further comprising:
and the first output module is used for outputting the visualized information of the memory occupancy rate of the specified object after each operation.
6. The apparatus of claim 4, further comprising:
and the second output module is used for outputting alarm information.
7. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method for detecting memory leaks according to any one of claims 1 to 3 when executing the computer program.
8. A non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for detecting a memory leak according to any one of claims 1 to 3.
CN201811646001.8A 2018-12-29 2018-12-29 Method and device for detecting memory leakage Active CN109857615B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811646001.8A CN109857615B (en) 2018-12-29 2018-12-29 Method and device for detecting memory leakage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811646001.8A CN109857615B (en) 2018-12-29 2018-12-29 Method and device for detecting memory leakage

Publications (2)

Publication Number Publication Date
CN109857615A CN109857615A (en) 2019-06-07
CN109857615B true CN109857615B (en) 2022-07-19

Family

ID=66893530

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811646001.8A Active CN109857615B (en) 2018-12-29 2018-12-29 Method and device for detecting memory leakage

Country Status (1)

Country Link
CN (1) CN109857615B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113268392A (en) * 2020-02-14 2021-08-17 北京字节跳动网络技术有限公司 Video memory monitoring method and device, readable medium and electronic equipment
CN111488256B (en) * 2020-04-09 2024-04-09 网易(杭州)网络有限公司 Memory monitoring method, device, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010043176A1 (en) * 2008-10-17 2010-04-22 华为技术有限公司 Memory leak detecting method and device
CN103927230A (en) * 2014-03-25 2014-07-16 优视科技有限公司 Memory usage feedback method and device
CN105260117A (en) * 2015-09-30 2016-01-20 小米科技有限责任公司 Application control method and apparatus
CN105740122A (en) * 2016-01-26 2016-07-06 广东欧珀移动通信有限公司 Method and system for monitoring mobile phone memory leak
CN106227565A (en) * 2016-07-27 2016-12-14 北京金山安全软件有限公司 Application control method and device and terminal
CN108182146A (en) * 2017-12-27 2018-06-19 北京奇艺世纪科技有限公司 The detection method and system of a kind of memory overflow

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010043176A1 (en) * 2008-10-17 2010-04-22 华为技术有限公司 Memory leak detecting method and device
CN103927230A (en) * 2014-03-25 2014-07-16 优视科技有限公司 Memory usage feedback method and device
CN105260117A (en) * 2015-09-30 2016-01-20 小米科技有限责任公司 Application control method and apparatus
CN105740122A (en) * 2016-01-26 2016-07-06 广东欧珀移动通信有限公司 Method and system for monitoring mobile phone memory leak
CN106227565A (en) * 2016-07-27 2016-12-14 北京金山安全软件有限公司 Application control method and device and terminal
CN108182146A (en) * 2017-12-27 2018-06-19 北京奇艺世纪科技有限公司 The detection method and system of a kind of memory overflow

Also Published As

Publication number Publication date
CN109857615A (en) 2019-06-07

Similar Documents

Publication Publication Date Title
CN106951364B (en) Test method and device
US20180107196A1 (en) Method of Detecting Home Appliance Bus Control System
CN105787364B (en) Automatic testing method, device and system for tasks
CN109857615B (en) Method and device for detecting memory leakage
CN103973515A (en) Network card stability testing method
JP5692414B2 (en) Detection device, detection program, and detection method
CN109918292B (en) Processor instruction set testing method and device
CN107908539A (en) A kind of method, terminal and computer-readable recording medium for detecting application program RAM leakage
CN109254922A (en) A kind of automated testing method and device of server B MC Redfish function
CN104809054B (en) Realize the method and system of program test
JP2007133870A (en) Method for measuring autonomic ability of computing system, system, and computer program
US10999180B2 (en) System for defining and implementing performance monitoring requirements for applications and hosted computing environment infrastructure
CN110362435B (en) PCIE fault positioning method, device, equipment and medium for Purley platform server
CN107122305B (en) Software testing device and method
CN105245591B (en) A kind of monitoring method and system of the experience of desktop cloud performance
CN111124818B (en) Monitoring method, device and equipment for Expander
CN106533812B (en) Application server
CN109980789B (en) State detection method, device, equipment and medium of direct current control protection system
CN112068935A (en) Method, device and equipment for monitoring deployment of kubernets program
CN108965053B (en) Method, device and system for testing software pressure of upper computer
WO2016011732A1 (en) Line diagnosis method and apparatus
CN110825542B (en) Method, device and system for detecting fault disc in distributed system
CN115795475A (en) Method and device for determining software system risk and electronic equipment
CN108845932B (en) Unit testing method and device of network library, storage medium and terminal
CN107797915B (en) Fault repairing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088

Applicant after: QAX Technology Group Inc.

Address before: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing.

Applicant before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant