CN111352829A - Memory leak test method, device and equipment - Google Patents
Memory leak test method, device and equipment Download PDFInfo
- Publication number
- CN111352829A CN111352829A CN201911151179.XA CN201911151179A CN111352829A CN 111352829 A CN111352829 A CN 111352829A CN 201911151179 A CN201911151179 A CN 201911151179A CN 111352829 A CN111352829 A CN 111352829A
- Authority
- CN
- China
- Prior art keywords
- memory
- node
- network equipment
- test
- memory information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000015654 memory Effects 0.000 title claims abstract description 202
- 238000010998 test method Methods 0.000 title description 3
- 238000012360 testing method Methods 0.000 claims abstract description 156
- 238000000034 method Methods 0.000 claims abstract description 46
- 238000004590 computer program Methods 0.000 claims description 4
- 238000001514 detection method Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Prevention of errors by analysis, debugging or testing of software
- G06F11/362—Debugging of software
- G06F11/366—Debugging of software using diagnostics
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Testing Of Individual Semiconductor Devices (AREA)
Abstract
The application discloses a method, a device and equipment for testing memory leakage, wherein the method comprises the following steps: determining any node in the network equipment as a target test node; acquiring current memory information of the network equipment as memory information before testing; aiming at the target test node, after executing preset test operation for preset times, acquiring current memory information of the network equipment as tested memory information; and if the difference value between the memory information after the test and the memory information before the test is not less than a preset threshold value, determining that the target test node is a node with memory leakage. The method and the device can position the node with memory leakage in the network equipment.
Description
Technical Field
The present application relates to the field of testing, and in particular, to a method, an apparatus, and a device for testing memory leakage.
Background
Memory Leak (Memory Leak) refers to that a heap Memory dynamically allocated in a program is not released or cannot be released for some reason, which may cause waste of a system Memory, and seriously results in slow program running speed and even system crash.
For a network device to be shipped from a factory, in order to ensure the quality of the network device, a memory leak test needs to be performed on the network device. At present, only whether the network equipment has memory leakage can be tested, and the node with the memory leakage in the network equipment cannot be positioned.
Disclosure of Invention
In view of this, the present application provides a method, an apparatus, and a device for testing memory leakage, which can locate a node with memory leakage in a network device.
In a first aspect, to achieve the above object, the present application provides a method for testing memory leakage, where the method includes:
determining any node in the network equipment as a target test node;
acquiring current memory information of the network equipment as memory information before testing;
aiming at the target test node, after executing preset test operation for preset times, acquiring current memory information of the network equipment as tested memory information;
and if the difference value between the memory information after the test and the memory information before the test is not less than a preset threshold value, determining that the target test node is a node with memory leakage.
In an optional implementation manner, before determining any node in the network device as the target test node, the method further includes:
detecting whether memory leakage exists in the network equipment;
and when determining that the memory leakage exists in the network equipment, triggering and executing the step of determining any node in the network equipment as a target test node.
In an optional implementation manner, the obtaining current memory information of the network device includes:
and acquiring the current memory information of the network equipment by utilizing a preset memory occupation command of the checking process.
In an optional implementation manner, before determining any node in the network device as the target test node, the method further includes:
acquiring an Object Identifier (OID) of each node in network equipment;
correspondingly, the executing preset test operation for a preset number of times for the target test node includes:
and executing preset test operation for preset times on the target test node based on the OID of the target test node.
In an optional embodiment, the preset test operation includes a Get operation in a simple network management protocol SNMP.
In a second aspect, the present application further provides a device for testing memory leakage, where the device includes:
the first determining module is used for determining any node in the network equipment as a target testing node;
the first acquisition module is used for acquiring the current memory information of the network equipment as the memory information before testing;
a second obtaining module, configured to, after a preset test operation is performed for a preset number of times on the target test node, obtain current memory information of the network device, where the current memory information is used as the tested memory information;
and the second determining module is used for determining the target test node as a node with memory leakage when the difference value between the memory information after the test and the memory information before the test is not less than a preset threshold value.
In an alternative embodiment, the apparatus further comprises:
the detection module is used for detecting whether the memory leakage exists in the network equipment;
and the triggering model is used for triggering the first determining module when the memory leakage exists in the network equipment.
In an optional implementation manner, the first obtaining module includes:
and the obtaining submodule is used for obtaining the current memory information of the network equipment by utilizing a preset checking process to occupy the memory command.
In a third aspect, the present application also provides a computer-readable storage medium having stored therein instructions that, when run on a terminal device, cause the terminal device to perform the method according to any one of the above.
In a fourth aspect, the present application further provides a device for testing memory leakage, including: a memory, a processor, and a computer program stored on the memory and executable on the processor, when executing the computer program, implementing the method as in any one of the above.
In the method for testing memory leak provided by the embodiment of the application, preset test operations are respectively executed for preset times for each node in network equipment, and whether memory leak exists in the corresponding node is determined by comparing the memory information change conditions before and after the execution of the preset test operations, so that the node with the memory leak is positioned.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a flowchart of a method for testing memory leakage according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a memory leak testing apparatus according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a memory leak test apparatus according to an embodiment of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
For the case of memory leakage of network equipment, currently, only whether the memory leakage exists in the network equipment can be tested, and a node with the memory leakage in the network equipment cannot be accurately positioned.
Therefore, the application provides a method for testing memory leakage, which respectively executes preset test operations for preset times for each node in network equipment, determines whether memory leakage exists in the corresponding node by comparing memory information change conditions before and after the execution of the preset test operations, and realizes positioning of the node with the memory leakage.
Therefore, the conclusion whether the memory leakage exists in the network equipment can be obtained by testing the memory leakage of the network equipment, and the node with the memory leakage can be accurately positioned.
Based on this, the present application provides a method for testing memory leak, and referring to fig. 1, it is a flowchart of a method for testing memory leak provided in an embodiment of the present application. Specifically, the method for testing memory leak includes:
s101: any node in the network device is determined to be a target test node.
In the embodiment of the present application, a network device refers to a physical entity connected to a network, and includes, for example, a computer, a switch, and the like. A network device typically comprises several functional nodes, such as routing functional nodes or the like.
The embodiment of the application can test whether the network equipment has the memory leakage or not, and can test whether each node has the memory leakage or not by taking the node of the network equipment as the minimum unit, so that the node with the memory leakage in the network equipment is positioned.
For each node in the network device, the embodiment of the present application may determine that the node is a target test node, and subsequently, S102 to S104 may determine whether a memory leak occurs for the target test node. The embodiments of the present application are not limited to the order in which each node in the network device is determined as a target test node.
In an alternative embodiment, before performing S101, whether a memory leak occurs in the network device may be first detected. If the memory leakage is determined to occur in the network equipment, S101 is continuously executed so as to locate the node with the memory leakage in the network equipment; otherwise, S101 does not need to be executed continuously.
It should be noted that, the above-mentioned manner for detecting whether a memory leak occurs in a network device is not limited in the embodiments of the present application, and an optional implementation manner is to sequentially and cyclically execute the walk operation of all nodes in the network device, and determine whether a memory leak occurs in the network device by way of a long-time (e.g. 12-hour) copy test.
In addition, in order to determine a node included in the network device that needs to perform the memory leak test, in the embodiment of the present application, before performing S101, an Object Identifier (OID) of each node in the network device may be obtained, so that a preset test operation is performed on each node based on the OID of each node in the following step. Wherein the OID is used to uniquely identify the node in the network device.
S102: and acquiring the current memory information of the network equipment as the memory information before testing.
In the embodiment of the application, before the preset test operation is performed on the target test node, the current memory information of the network device is firstly acquired and stored as the memory information before the test. The current memory information may be current memory occupation information, or may also be current memory remaining information, and the like.
In an optional implementation manner, the current memory information of the network device may be obtained from the network device by using a preset memory occupation command of the viewing process. It is to be noted that, in the embodiment of the present application, a manner of obtaining the current memory information of the network device is not limited.
S103: and aiming at the target test node, after executing preset test operation for preset times, acquiring the current memory information of the network equipment as the tested memory information.
In the embodiment of the application, after a target test node is determined, a preset test operation is performed on the target test node for a preset number of times, so that a large number of preset test operations are cyclically performed to generate a large number of memory accesses, and if the target test node is a node with memory leakage, a large number of memories generated by cyclically performing the preset test operation on the target test node are not released, so that memory information of network equipment is changed. Therefore, the embodiment of the application can determine whether the target test node has memory leakage according to the memory change condition of the network device before and after the preset test operation is executed.
In an alternative embodiment, a predetermined test operation may be performed for a target test node in a cycle of, for example, ten thousand times. The preset test operation may be any operation that can change a memory of the network device, for example, a Get operation in a simple network management protocol SNMP.
In practical application, after the preset test operation is performed for the target test node for the preset number of times, the current memory information of the network device is obtained again and used as the memory information after the test to be compared with the memory information before the test, so as to determine whether the target test node has memory leakage.
S104: and if the difference value between the memory information after the test and the memory information before the test is not less than a preset threshold value, determining that the target test node is a node with memory leakage.
In the embodiment of the present application, since the change condition of the memory information of the network device before and after the execution of the preset test operation can reflect whether the execution of the preset test operation causes the memory leak, the embodiment of the present application finally determines whether the target test node is a node having the memory leak by determining the difference between the memory information after the test and the memory information before the test, and then comparing whether the difference is not less than the preset threshold.
Specifically, if the difference between the memory information after the test and the memory information before the test is not less than the preset threshold, it is determined that the target test node is a node with memory leakage; otherwise, it indicates that the target test node has no memory leak.
In the embodiment of the present application, after the test of the memory leak is completed for the target test node, another node in the network device is determined as the target test node again, and the operations of S101 to S104 are continuously performed until all nodes in the network device complete the test of the memory leak, and finally all nodes in the network device with the memory leak may be determined. According to the embodiment of the application, all nodes with memory leakage in the network equipment can be tested, and a worker can further detect the network equipment according to all the determined nodes with memory leakage.
In the method for testing memory leak provided by the embodiment of the application, preset test operations are respectively executed for preset times for each node in network equipment, and whether memory leak exists in the corresponding node is determined by comparing the memory information change conditions before and after the execution of the preset test operations, so that the node with the memory leak is positioned.
The method for testing memory leak provided by the application can be applied to network equipment based on various network management protocols, and the network equipment based on SNMP is taken as an example below.
Before a memory leak test is performed on the SNMP-based network device, related tools such as SNMPutil are installed on the network device in advance, and environment variables and the like are configured on the network device. In practical application, firstly, through an OS library control command line of python, a walk operation is executed in a loop for all nodes of the network device in sequence, and whether a memory leak exists on the network device is determined through a 12-hour copy test, for example. Secondly, after determining that there is a memory leak on the network device, storing the OIDs of all nodes obtained by performing the walk operation in a circulating manner into a preset file (for example, a txt file) through a file read-write interface of an os (operating system) module, where the OIDs of the nodes are, for example, in the form of system.
After the OIDs of all the nodes in the network equipment are obtained, the nodes are sequentially determined as target test nodes, and the Get operation of the target test nodes for the preset times is executed based on the OIDs of the target test nodes, so that the memory occupation of the network equipment is increased. In addition, before and after executing Get operation, the memory use condition of the network device is obtained, then another window can be opened through an OS library control command line of python, the serial port of the network device is connected through a telnetlib module, and whether memory leakage exists in the target test node or not is judged based on comparison of memory use of the network device.
Based on the implementation mode, the memory leakage condition of each node in the network equipment is tested until all the nodes are determined to be tested, and the nodes with the memory leakage are finally output and fed back to developers, so that the developers can efficiently and pertinently position and solve the problems.
In the method for testing memory leakage provided by the embodiment of the application, preset test operations are respectively executed for preset times for each node in network equipment based on an SNMP, and whether memory leakage exists in the corresponding node is determined by comparing the memory information change conditions before and after the execution of the preset test operations, so that the node with the memory leakage is positioned.
Based on the description of the foregoing method embodiment, the present application further provides a device for testing memory leakage, and with reference to fig. 2, a schematic structural diagram of the device for testing memory leakage provided in the present application embodiment is shown, where the device includes:
a first determining module 201, configured to determine any node in the network device as a target test node;
a first obtaining module 202, configured to obtain current memory information of the network device, where the current memory information is used as memory information before testing;
a second obtaining module 203, configured to, after executing preset test operations for preset times for the target test node, obtain current memory information of the network device, where the current memory information is used as the tested memory information;
a second determining module 204, configured to determine that the target test node is a node with memory leakage when a difference between the post-test memory information and the pre-test memory information is not smaller than a preset threshold.
In an optional implementation manner, the apparatus further includes:
the detection module is used for detecting whether the memory leakage exists in the network equipment;
and the triggering model is used for triggering the first determining module when the memory leakage exists in the network equipment.
Specifically, the first obtaining module includes:
and the obtaining submodule is used for obtaining the current memory information of the network equipment by utilizing a preset checking process to occupy the memory command.
The device for testing memory leakage provided by the embodiment of the application executes preset test operations for preset times respectively for each node in network equipment, and determines whether memory leakage exists in the corresponding node or not by comparing the memory information change conditions before and after the execution of the preset test operations, so that the node with the memory leakage is positioned.
In addition, an embodiment of the present application further provides a device for testing memory leak, as shown in fig. 3, where the device may include:
a processor 301, a memory 302, an input device 303, and an output device 304. The number of the processors 301 in the memory leak test device may be one or more, and one processor is taken as an example in fig. 3. In some embodiments of the present invention, the processor 301, the memory 302, the input device 303 and the output device 304 may be connected by a bus or other means, wherein the connection by the bus is taken as an example in fig. 3.
The memory 302 may be used to store software programs and modules, and the processor 301 executes various functional applications and data processing of the memory leak test apparatus by operating the software programs and modules stored in the memory 302. The memory 302 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like. Further, the memory 302 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. The input device 303 may be used to receive input numeric or character information and generate signal inputs related to user settings and functional control of the memory leak testing apparatus.
Specifically, in this embodiment, the processor 301 loads the executable file corresponding to the process of one or more application programs into the memory 302 according to the following instructions, and the processor 301 runs the application programs stored in the memory 302, thereby implementing various functions in the above-mentioned memory leak test method.
In addition, the present application also provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed on a terminal device, the terminal device is caused to execute the above-mentioned memory leak testing method.
It is understood that for the apparatus embodiments, since they correspond substantially to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The method, the device and the equipment for testing the memory leak provided by the embodiment of the application are introduced in detail, a specific example is applied in the description to explain the principle and the implementation mode of the application, and the description of the embodiment is only used for helping to understand the method and the core idea of the application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.
Claims (10)
1. A method for testing for memory leaks, the method comprising:
determining any node in the network equipment as a target test node;
acquiring current memory information of the network equipment as memory information before testing;
aiming at the target test node, after executing preset test operation for preset times, acquiring current memory information of the network equipment as tested memory information;
and if the difference value between the memory information after the test and the memory information before the test is not less than a preset threshold value, determining that the target test node is a node with memory leakage.
2. The method of claim 1, wherein prior to determining any node in the network device as the target test node, further comprising:
detecting whether memory leakage exists in the network equipment;
and when determining that the memory leakage exists in the network equipment, triggering and executing the step of determining any node in the network equipment as a target test node.
3. The method of claim 1, wherein the obtaining current memory information of the network device comprises:
and acquiring the current memory information of the network equipment by utilizing a preset memory occupation command of the checking process.
4. The method of claim 1, wherein prior to determining any node in the network device as the target test node, further comprising:
acquiring an Object Identifier (OID) of each node in network equipment;
correspondingly, the executing preset test operation for a preset number of times for the target test node includes:
and executing preset test operation for preset times on the target test node based on the OID of the target test node.
5. The method of claim 1, wherein the predetermined test operation comprises a Get operation in a Simple Network Management Protocol (SNMP).
6. An apparatus for testing for memory leaks, the apparatus comprising:
the first determining module is used for determining any node in the network equipment as a target testing node;
the first acquisition module is used for acquiring the current memory information of the network equipment as the memory information before testing;
a second obtaining module, configured to, after a preset test operation is performed for a preset number of times on the target test node, obtain current memory information of the network device, where the current memory information is used as the tested memory information;
and the second determining module is used for determining the target test node as a node with memory leakage when the difference value between the memory information after the test and the memory information before the test is not less than a preset threshold value.
7. The apparatus of claim 6, further comprising:
the detection module is used for detecting whether the memory leakage exists in the network equipment;
and the triggering model is used for triggering the first determining module when the memory leakage exists in the network equipment.
8. The apparatus of claim 6, wherein the first obtaining module comprises:
and the obtaining submodule is used for obtaining the current memory information of the network equipment by utilizing a preset checking process to occupy the memory command.
9. A computer-readable storage medium having stored therein instructions that, when executed on a terminal device, cause the terminal device to perform the method of any one of claims 1-5.
10. A memory leak test apparatus, comprising: memory, a processor, and a computer program stored on the memory and executable on the processor, when executing the computer program, implementing the method of any of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911151179.XA CN111352829A (en) | 2019-11-21 | 2019-11-21 | Memory leak test method, device and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911151179.XA CN111352829A (en) | 2019-11-21 | 2019-11-21 | Memory leak test method, device and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111352829A true CN111352829A (en) | 2020-06-30 |
Family
ID=71196910
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911151179.XA Pending CN111352829A (en) | 2019-11-21 | 2019-11-21 | Memory leak test method, device and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111352829A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113407442A (en) * | 2021-05-27 | 2021-09-17 | 杭州电子科技大学 | Pattern-based Python code memory leak detection method |
CN113722133A (en) * | 2021-07-28 | 2021-11-30 | 苏州浪潮智能科技有限公司 | Memory leak detection method, device and equipment |
WO2023284877A1 (en) * | 2021-07-16 | 2023-01-19 | 维沃移动通信有限公司 | Detection method and apparatus, and electronic device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060212852A1 (en) * | 2005-03-16 | 2006-09-21 | Jinwoo Hwang | Methods, systems and computer program products for detecting memory leaks |
CN103714004A (en) * | 2014-01-02 | 2014-04-09 | 金蝶软件(中国)有限公司 | JVM online memory leak analysis method and system |
CN104965779A (en) * | 2015-05-22 | 2015-10-07 | 浪潮电子信息产业股份有限公司 | Detecting and locating method and device for memory leakage based on PoolMon |
CN109144872A (en) * | 2018-08-20 | 2019-01-04 | 杭州迪普科技股份有限公司 | Detection method, device, terminal device and the readable storage medium storing program for executing of memory overflow |
-
2019
- 2019-11-21 CN CN201911151179.XA patent/CN111352829A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060212852A1 (en) * | 2005-03-16 | 2006-09-21 | Jinwoo Hwang | Methods, systems and computer program products for detecting memory leaks |
CN103714004A (en) * | 2014-01-02 | 2014-04-09 | 金蝶软件(中国)有限公司 | JVM online memory leak analysis method and system |
CN104965779A (en) * | 2015-05-22 | 2015-10-07 | 浪潮电子信息产业股份有限公司 | Detecting and locating method and device for memory leakage based on PoolMon |
CN109144872A (en) * | 2018-08-20 | 2019-01-04 | 杭州迪普科技股份有限公司 | Detection method, device, terminal device and the readable storage medium storing program for executing of memory overflow |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113407442A (en) * | 2021-05-27 | 2021-09-17 | 杭州电子科技大学 | Pattern-based Python code memory leak detection method |
WO2023284877A1 (en) * | 2021-07-16 | 2023-01-19 | 维沃移动通信有限公司 | Detection method and apparatus, and electronic device |
CN113722133A (en) * | 2021-07-28 | 2021-11-30 | 苏州浪潮智能科技有限公司 | Memory leak detection method, device and equipment |
CN113722133B (en) * | 2021-07-28 | 2023-05-26 | 苏州浪潮智能科技有限公司 | Memory leakage detection method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111352829A (en) | Memory leak test method, device and equipment | |
CN108694320B (en) | Method and system for measuring sensitive application dynamic under multiple security environments | |
US10212058B2 (en) | System and method for detecting system's performance regression | |
US10241847B2 (en) | Anomaly detection using sequences of system calls | |
CN110879781B (en) | Program debugging method, device, electronic equipment and computer readable storage medium | |
CN111309602A (en) | Software testing method, device and system | |
US10846206B2 (en) | Adaptive software testing | |
CN110618853B (en) | Detection method, device and equipment for zombie container | |
CN114386045B (en) | Web application program vulnerability detection method, device and storage medium | |
US9646252B2 (en) | Template clauses based SAT techniques | |
CN113360366A (en) | Web page testing method, testing device, electronic equipment and storage medium | |
CN114564903A (en) | Chip simulation design verification method, device, equipment and medium | |
US11036624B2 (en) | Self healing software utilizing regression test fingerprints | |
CN110442370B (en) | Test case query method and device | |
CN118550755B (en) | Heap memory boundary crossing positioning method, device, equipment and medium | |
CN113722133B (en) | Memory leakage detection method, device and equipment | |
CN107291613B (en) | Functional node abnormity simulation method and device | |
CN114978973B (en) | Communication interface testing method and device, testing machine and storage medium | |
CN112015640B (en) | Software testing method and system | |
CN117192343B (en) | Chip testing method based on auxiliary system, electronic equipment and medium | |
CN114328228B (en) | Software error verification method, device and system based on test case extension | |
US11017085B2 (en) | Methods and nodes for anomaly detection in computer applications | |
CN110798385B (en) | Method, device, equipment and medium for testing wide area network access setting function | |
CN112463500A (en) | Hard disk partition testing method, device, equipment and storage medium | |
CN109413452B (en) | Bullet screen checking method and device based on different modes, terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200630 |