CN112463632A - Memory leak detection method and device - Google Patents

Memory leak detection method and device Download PDF

Info

Publication number
CN112463632A
CN112463632A CN202011445457.5A CN202011445457A CN112463632A CN 112463632 A CN112463632 A CN 112463632A CN 202011445457 A CN202011445457 A CN 202011445457A CN 112463632 A CN112463632 A CN 112463632A
Authority
CN
China
Prior art keywords
function
traversed
linked list
functions
classes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011445457.5A
Other languages
Chinese (zh)
Other versions
CN112463632B (en
Inventor
闫利华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202011445457.5A priority Critical patent/CN112463632B/en
Publication of CN112463632A publication Critical patent/CN112463632A/en
Application granted granted Critical
Publication of CN112463632B publication Critical patent/CN112463632B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/366Software debugging using diagnostics

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a method and a device for detecting memory leakage, wherein the method comprises the following steps: traversing classes contained in the project, and recording classes possibly having memory leak risks and member variables having risks in the classes to form a risk class diagram; traversing all functions contained in the project, and constructing a linked list between function calls according to the call relation between the functions to form a function linked list; and detecting memory leakage existing in the items based on the risk class diagram and the function linked list. By using the scheme of the invention, the false alarm and the false alarm in the memory leakage detection can be reduced, and the quality and the efficiency of scanning and checking the memory leakage are improved.

Description

Memory leak detection method and device
Technical Field
The field relates to the field of computers, and more particularly to a method and apparatus for memory leak detection.
Background
Memory leaks are the waste of memory caused by the fact that dynamically allocated heap memory in a program cannot be released or cannot be released for some reason. Memory leaks may reduce the performance of the computer by reducing the amount of available memory, and even cause all or part of the devices to stop working properly or cause application program to crash, thereby bringing serious security risks to enterprises and clients.
Memory leaks are characterized by being covert, cumulative, and more difficult to detect. With the increasing demand of computer applications, effective memory allocation and release are performed, and the problem of preventing memory leakage is more and more prominent. The static scanning mode and the dynamic execution mode are common for detecting the memory leak, but the two modes have the situations of missing report or false report. In order to confirm whether the false alarm is caused, a developer needs to perform secondary verification and confirmation on the false alarm, so that the working efficiency of the developer is reduced, the performance of a computer is reduced due to the false alarm. Therefore, it is very necessary to improve the accuracy of memory leak detection.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method and a device for detecting a memory leak, which can reduce false negative and false positive in memory leak detection, and improve quality and efficiency of scanning and auditing memory leak.
In view of the above, an aspect of the embodiments of the present invention provides a method for detecting memory leak, including the following steps:
traversing classes contained in the project, and recording classes possibly having memory leak risks and member variables having risks in the classes to form a risk class diagram;
traversing all functions contained in the project, and constructing a linked list between function calls according to the call relation between the functions to form a function linked list;
and detecting memory leakage existing in the items based on the risk class diagram and the function linked list.
According to an embodiment of the present invention, traversing the classes included in the project, and recording the classes that may have the risk of memory leak and the member variables that have the risk in the classes to form the risk class diagram includes:
traversing all classes in the project, and recording the classes which contain pointers or structural class member variables and have no destructor;
records classes that contain pointers or structural class member variables and are not released in the destructor.
According to an embodiment of the present invention, traversing all functions included in the item, and constructing a linked list between function calls according to a call relation between the functions to form the function linked list includes:
acquiring a function which is not traversed in the project, and judging whether the entry parameter of the function which is not traversed contains a pointer or a structure variable;
responding to the fact that the entries of the functions which are not traversed do not contain pointers or structure variables, and judging that the functions which are not traversed are the starting ends of the linked lists;
responding to the fact that the entries of the functions which are not traversed contain pointers or structure variables and the functions which are not traversed are called in the traversed function chain table, and inserting the functions which are not traversed into the function chain table;
responding to the function which is not traversed and calling the function in the traversed function linked list, and inserting the function which is not traversed before the function in the traversed function linked list;
and responding to the situation that the function which is not traversed does not call the function in the traversed function linked list, and judging that the function which is not traversed is the starting end of the linked list.
According to an embodiment of the present invention, detecting memory leaks existing in items based on a risk class diagram and a function linked list includes:
traversing each function in the linked list, and judging whether the function contains a pointer or a structure variable;
responding to the fact that the function does not contain a pointer or a structure variable, and judging that the function does not have memory leakage;
and responding to the existence of a pointer or a structure variable in the function, checking the variable and recording the existence of memory leakage.
According to one embodiment of the invention, checking the variables includes checking pointer class variables, class object checks, and structure class variables.
In another aspect of the embodiments of the present invention, there is also provided a device for detecting memory leak, where the device includes:
the recording module is configured to traverse the classes contained in the project, and record the classes possibly having the memory leakage risk and the member variables having the risks in the classes to form a risk class diagram;
the construction module is configured to traverse all functions contained in the project and construct a linked list between function calls according to the call relation between the functions to form a function linked list;
and the detection module is configured to detect memory leakage existing in the project based on the risk class diagram and the function linked list.
According to an embodiment of the invention, the recording module is further configured to:
traversing all classes in the project, and recording the classes which contain pointers or structural class member variables and have no destructor;
records classes that contain pointers or structural class member variables and are not released in the destructor.
According to one embodiment of the invention, the construction module is further configured to:
acquiring a function which is not traversed in the project, and judging whether the entry parameter of the function which is not traversed contains a pointer or a structure variable;
responding to the fact that the entries of the functions which are not traversed do not contain pointers or structure variables, and judging that the functions which are not traversed are the starting ends of the linked lists;
responding to the fact that the entries of the functions which are not traversed contain pointers or structure variables and the functions which are not traversed are called in the traversed function chain table, and inserting the functions which are not traversed into the function chain table;
responding to the function which is not traversed and calling the function in the traversed function linked list, and inserting the function which is not traversed before the function in the traversed function linked list;
and responding to the situation that the function which is not traversed does not call the function in the traversed function linked list, and judging that the function which is not traversed is the starting end of the linked list.
According to one embodiment of the invention, the detection module is further configured to:
traversing each function in the linked list, and judging whether the function contains a pointer or a structure variable;
responding to the fact that the function does not contain a pointer or a structure variable, and judging that the function does not have memory leakage;
and responding to the existence of a pointer or a structure variable in the function, checking the variable and recording the existence of memory leakage.
According to one embodiment of the invention, checking the variables includes checking pointer class variables, class object checks, and structure class variables.
The invention has the following beneficial technical effects: according to the memory leak detection method provided by the embodiment of the invention, a risk class diagram is formed by traversing classes contained in a project and recording classes possibly having memory leak risks and member variables having risks in the classes; traversing all functions contained in the project, and constructing a linked list between function calls according to the call relation between the functions to form a function linked list; the technical scheme for detecting the memory leak in the project based on the risk class diagram and the function linked list can reduce the false alarm and the false alarm in the memory leak detection, and improve the quality and the efficiency of scanning and checking the memory leak.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram of a method of memory leak detection according to one embodiment of the present invention;
FIG. 2 is a diagram illustrating an apparatus for memory leak detection according to an embodiment of the present invention;
FIG. 3 is a schematic flow diagram of constructing a risk class diagram according to one embodiment of the present invention;
FIG. 4 is a schematic flow diagram of a constructor list according to one embodiment of the invention;
FIG. 5 is a schematic flow chart diagram of memory leak detection according to one embodiment of the present invention;
FIG. 6 is a schematic flow diagram of checking pointers or structure class variables in a function according to one embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
In view of the above-mentioned objects, a first aspect of the embodiments of the present invention provides an embodiment of a method for detecting a memory leak. Fig. 1 shows a schematic flow diagram of the method.
As shown in fig. 1, the method may include the steps of:
s1 traversing the classes contained in the project, recording the classes possibly having memory leak risks and the member variables having risks in the classes to form a risk class diagram, and treating the classes without memory leak risks as common variables without extra attention;
s2 traversing all functions contained in the project, and constructing a linked list between function calls according to the call relation between the functions to form a function linked list, wherein the linked list represents the trend of data space flow in the functions, and whether the space is released or not can be judged by tracking the process;
s3, based on the risk class diagram and the function linked list, detecting the memory leak existing in the project, traversing the function linked list, and detecting and recording the memory leak existing in the code by judging the scene of the common memory leak in combination with the function detection process.
By the technical scheme of the invention, the false alarm and the false alarm in the memory leakage detection can be reduced, and the quality and the efficiency of scanning and checking the memory leakage are improved.
Memory leaks occur primarily in the mishandling of occupied memory space, which is often inseparable from pointers, as will be described in more detail below with respect to pointer types and handling of pointers.
In project development, a common pointer type major class can be divided into a pointer type and a class (structure) variable.
(1) Pointer variables: can be divided into an intelligent pointer, a structural pointer variable and a common pointer variable.
The intelligent pointer behaves like a conventional pointer, but is responsible for automatically releasing the memory space pointed to, and therefore does not need to consider the problem of memory leakage.
Global pointer variable: the life cycle of the pointer of the type exists in the whole project process, the project program is finished, and the pointer variable is also naturally released, so that the problem of memory leakage does not need to be considered.
The structure pointer variable: the space pointed by the pointer is a structure type such as class, structure, array, vector and the like, and data types needing to be released independently are stored in the space.
The common pointer variable: that is, after the space occupied by the current variable pointer is released, the problem that the space occupied by the variable is not released does not exist.
(2) The structure class variable is as follows: if a pointer type variable exists in the structure, the problem of memory leak needs to be considered.
Common memory leak cases are analyzed for the above types:
structure type pointer: when the space occupied by the pointer of the type is released, only the space of the current pointer is released, and the space in the structure is not released; releasing only the space inside the structure, not releasing the space of the current pointer, etc., all of which may result in memory leakage.
The common pointer variable: the common pointer variable in the function is divided into two cases and is released in the current function; use continues through shallow copy assignments or direct returns.
The structure class variable is as follows: if pointer type variables exist in the structure, and are not released outside and inside the structure, therefore, when the life cycle of the structure type variables is finished, unreleased space exists.
And others: namely, the memory leak is caused because the code logic design is not reasonable. If the pointer variable is assigned, the space before assignment is not released; an exception occurs before the variable is released, the function ends early, the variable does not come, the variable is released, and the like, so that memory leakage is caused.
Common static scan tools mainly focus on memory leaks caused by changes of common pointers in current functions, structural class pointers and logic errors of partial codes. And no additional consideration is given to the condition that the structure type variable and the pointer variable return to be used continuously. The invention carries out the detection on the whole framework of the flow of the structure class and the function variable through the detailed analysis of the memory leakage, and reduces the false alarm and the false negative in the memory leakage detection.
As shown in fig. 3, in a preferred embodiment of the present invention, traversing the classes included in the project, and recording the classes that may have risk of memory leak and the member variables that have risk in the classes to form the risk class diagram includes:
traversing all classes in the project, and recording the classes which contain pointers or structural class member variables and have no destructor;
records classes that contain pointers or structural class member variables and are not released in the destructor.
As shown in fig. 4, in a preferred embodiment of the present invention, traversing all functions contained in the entry, and constructing a linked list between function calls according to a call relation between the functions to form the function linked list includes:
acquiring a function which is not traversed in the project, and judging whether the entry parameter of the function which is not traversed contains a pointer or a structure variable;
responding to the fact that the entries of the functions which are not traversed do not contain pointers or structure variables, and judging that the functions which are not traversed are the starting ends of the linked lists;
responding to the fact that the entries of the functions which are not traversed contain pointers or structure variables and the functions which are not traversed are called in the traversed function chain table, and inserting the functions which are not traversed into the function chain table;
responding to the function which is not traversed and calling the function in the traversed function linked list, and inserting the function which is not traversed before the function in the traversed function linked list;
and responding to the situation that the function which is not traversed does not call the function in the traversed function linked list, and judging that the function which is not traversed is the starting end of the linked list.
As shown in fig. 5, in a preferred embodiment of the present invention, detecting memory leaks existing in items based on a risk class diagram and a function linked list includes:
traversing each function in the linked list, and judging whether the function contains a pointer or a structure variable;
responding to the fact that the function does not contain a pointer or a structure variable, and judging that the function does not have memory leakage;
and responding to the existence of a pointer or a structure variable in the function, checking the variable and recording the existence of memory leakage.
In a preferred embodiment of the present invention, checking the variables includes checking a pointer class variable, a class object, and a structure class variable. The process of checking a pointer or a structure variable in a function is shown in fig. 6, and mainly includes judgment of the pointer variable, the class object, and the structure variable, where the judgment of the class variable needs to be performed in combination with a risk class diagram, and the specific process is as follows:
detection of pointer type variables:
(1) the method is a singleton or global variable, and no memory leak exists;
(2) the variable is transmitted, the trend of the variable is tracked according to the function linked list, and if the variable is released, no memory leakage exists; otherwise, memory leak exists;
(3) if the variable is not assigned and not released, the memory leakage exists; if the variable is circularly assigned and the variable is not released before being assigned, then there is memory leak.
Detection of class objects:
(1) traversing the risk class diagram, and if the class is not in the risk class, then no memory leak exists;
(2) if the variables are not released or abnormal before the variables are released in the risk classes, the memory leakage exists;
(3) if the variable is circularly assigned, the variable is not released before the assignment, or whether an exception occurs before the assignment, then a memory leak exists.
And (3) detecting a structure class variable: the judgment process of the process is the same as the detection process of the class object.
By the technical scheme of the invention, the false alarm and the false alarm in the memory leakage detection can be reduced, and the quality and the efficiency of scanning and checking the memory leakage are improved.
It should be noted that, as will be understood by those skilled in the art, all or part of the processes in the methods of the above embodiments may be implemented by instructing relevant hardware through a computer program, and the above programs may be stored in a computer-readable storage medium, and when executed, the programs may include the processes of the embodiments of the methods as described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
Furthermore, the method disclosed according to an embodiment of the present invention may also be implemented as a computer program executed by a CPU, and the computer program may be stored in a computer-readable storage medium. The computer program, when executed by the CPU, performs the above-described functions defined in the method disclosed in the embodiments of the present invention.
In view of the above object, according to a second aspect of the embodiments of the present invention, there is provided an apparatus for detecting memory leak, as shown in fig. 2, the apparatus 200 includes:
the recording module is configured to traverse the classes contained in the project, and record the classes possibly having the memory leakage risk and the member variables having the risks in the classes to form a risk class diagram;
the construction module is configured to traverse all functions contained in the project and construct a linked list between function calls according to the call relation between the functions to form a function linked list;
and the detection module is configured to detect memory leakage existing in the project based on the risk class diagram and the function linked list.
In a preferred embodiment of the present invention, the recording module is further configured to:
traversing all classes in the project, and recording the classes which contain pointers or structural class member variables and have no destructor;
records classes that contain pointers or structural class member variables and are not released in the destructor.
In a preferred embodiment of the invention, the construction module is further configured to:
acquiring a function which is not traversed in the project, and judging whether the entry parameter of the function which is not traversed contains a pointer or a structure variable;
responding to the fact that the entries of the functions which are not traversed do not contain pointers or structure variables, and judging that the functions which are not traversed are the starting ends of the linked lists;
responding to the fact that the entries of the functions which are not traversed contain pointers or structure variables and the functions which are not traversed are called in the traversed function chain table, and inserting the functions which are not traversed into the function chain table;
responding to the function which is not traversed and calling the function in the traversed function linked list, and inserting the function which is not traversed before the function in the traversed function linked list;
and responding to the situation that the function which is not traversed does not call the function in the traversed function linked list, and judging that the function which is not traversed is the starting end of the linked list.
In a preferred embodiment of the present invention, the detection module is further configured to:
traversing each function in the linked list, and judging whether the function contains a pointer or a structure variable;
responding to the fact that the function does not contain a pointer or a structure variable, and judging that the function does not have memory leakage;
and responding to the existence of a pointer or a structure variable in the function, checking the variable and recording the existence of memory leakage.
In a preferred embodiment of the present invention, checking the variables includes checking a pointer class variable, a class object, and a structure class variable.
The embodiments described above, particularly any "preferred" embodiments, are possible examples of implementations and are presented merely to clearly understand the principles of the invention. Many variations and modifications may be made to the above-described embodiments without departing from the spirit and principles of the technology described herein. All such modifications are intended to be included within the scope of this disclosure and protected by the following claims.

Claims (10)

1. A method for memory leak detection, comprising:
traversing classes contained in the project, and recording classes possibly having memory leak risks and member variables having risks in the classes to form a risk class diagram;
traversing all functions contained in the project, and constructing a linked list between function calls according to the call relation between the functions to form a function linked list;
and detecting memory leakage existing in the item based on the risk class diagram and the function linked list.
2. The method of claim 1, wherein traversing the classes included in the project and recording the classes that may have risk of memory leaks and the member variables that have risk in the classes to form a risk class graph comprises:
traversing all classes in the project, and recording the classes which contain pointers or structural class member variables and have no destructor;
records classes that contain pointers or structural class member variables and are not released in the destructor.
3. The method of claim 1, wherein traversing all functions contained in the item and constructing a linked list between function calls according to call relationships between the functions to form the linked list of functions comprises:
acquiring a function which is not traversed in a project, and judging whether the entry parameter of the function which is not traversed contains a pointer or a structure variable;
responding to the fact that the entries of the functions which are not traversed do not contain pointers or structure variables, and judging that the functions which are not traversed are the starting ends of the linked lists;
responding to the fact that the entries of the functions which are not traversed contain pointers or structure type variables and the functions which are not traversed are called in the traversed function chain table, and inserting the functions which are not traversed into the function chain table;
responding to the function which is not traversed and calling the function in the traversed function linked list, and inserting the function which is not traversed to the front of the function in the traversed function linked list;
and responding to the situation that the function which is not traversed does not call the function in the traversed function linked list, and judging that the function which is not traversed is the starting end of the linked list.
4. The method of claim 1, wherein detecting the memory leak in the item based on the risk class diagram and the function linked list comprises:
traversing each function in the linked list, and judging whether the function contains a pointer or a structure variable;
responding to the fact that the function does not contain a pointer or a structure variable, and judging that the function does not have memory leakage;
and responding to the existence of a pointer or a structure variable in the function, checking the variable and recording the existence of memory leakage.
5. The method of claim 4, wherein checking variables comprises checking pointer class variables, class object checks, and structure class variables.
6. An apparatus for memory leak detection, the apparatus comprising:
the recording module is configured to traverse classes contained in the project, and record classes possibly having memory leak risks and member variables having risks in the classes to form a risk class diagram;
the construction module is configured to traverse all functions contained in the project and construct a linked list between function calls according to the call relation between the functions to form a function linked list;
and the detection module is configured to detect memory leak existing in the project based on the risk class diagram and the function linked list.
7. The device of claim 6, wherein the recording module is further configured to:
traversing all classes in the project, and recording the classes which contain pointers or structural class member variables and have no destructor;
records classes that contain pointers or structural class member variables and are not released in the destructor.
8. The apparatus of claim 6, wherein the construction module is further configured to:
acquiring a function which is not traversed in a project, and judging whether the entry parameter of the function which is not traversed contains a pointer or a structure variable;
responding to the fact that the entries of the functions which are not traversed do not contain pointers or structure variables, and judging that the functions which are not traversed are the starting ends of the linked lists;
responding to the fact that the entries of the functions which are not traversed contain pointers or structure type variables and the functions which are not traversed are called in the traversed function chain table, and inserting the functions which are not traversed into the function chain table;
responding to the function which is not traversed and calling the function in the traversed function linked list, and inserting the function which is not traversed to the front of the function in the traversed function linked list;
and responding to the situation that the function which is not traversed does not call the function in the traversed function linked list, and judging that the function which is not traversed is the starting end of the linked list.
9. The device of claim 6, wherein the detection module is further configured to:
traversing each function in the linked list, and judging whether the function contains a pointer or a structure variable;
responding to the fact that the function does not contain a pointer or a structure variable, and judging that the function does not have memory leakage;
and responding to the existence of a pointer or a structure variable in the function, checking the variable and recording the existence of memory leakage.
10. The apparatus of claim 9, wherein checking variables comprises checking pointer class variables, class object checks, and structure class variables.
CN202011445457.5A 2020-12-11 2020-12-11 Memory leak detection method and device Active CN112463632B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011445457.5A CN112463632B (en) 2020-12-11 2020-12-11 Memory leak detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011445457.5A CN112463632B (en) 2020-12-11 2020-12-11 Memory leak detection method and device

Publications (2)

Publication Number Publication Date
CN112463632A true CN112463632A (en) 2021-03-09
CN112463632B CN112463632B (en) 2022-06-07

Family

ID=74801433

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011445457.5A Active CN112463632B (en) 2020-12-11 2020-12-11 Memory leak detection method and device

Country Status (1)

Country Link
CN (1) CN112463632B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112882943A (en) * 2021-03-11 2021-06-01 腾讯音乐娱乐科技(深圳)有限公司 Interface updating collapse risk detection method and device, electronic equipment and storage medium
CN117707920A (en) * 2023-08-31 2024-03-15 荣耀终端有限公司 Memory leakage positioning method, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763305A (en) * 2009-12-29 2010-06-30 青岛海信宽带多媒体技术有限公司 Method for detecting memory leak of embedded system
CN104572460A (en) * 2014-12-30 2015-04-29 大唐移动通信设备有限公司 Memory leak detecting method and memory leak detecting device
CN109144872A (en) * 2018-08-20 2019-01-04 杭州迪普科技股份有限公司 Detection method, device, terminal device and the readable storage medium storing program for executing of memory overflow

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763305A (en) * 2009-12-29 2010-06-30 青岛海信宽带多媒体技术有限公司 Method for detecting memory leak of embedded system
CN104572460A (en) * 2014-12-30 2015-04-29 大唐移动通信设备有限公司 Memory leak detecting method and memory leak detecting device
CN109144872A (en) * 2018-08-20 2019-01-04 杭州迪普科技股份有限公司 Detection method, device, terminal device and the readable storage medium storing program for executing of memory overflow

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112882943A (en) * 2021-03-11 2021-06-01 腾讯音乐娱乐科技(深圳)有限公司 Interface updating collapse risk detection method and device, electronic equipment and storage medium
CN117707920A (en) * 2023-08-31 2024-03-15 荣耀终端有限公司 Memory leakage positioning method, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN112463632B (en) 2022-06-07

Similar Documents

Publication Publication Date Title
CN112463632B (en) Memory leak detection method and device
US20080127112A1 (en) Software tracing
US7434206B2 (en) Identifying memory leaks in computer systems
US8074116B2 (en) Exception raised notification
KR101143214B1 (en) Method and system for detecting potential races in multithreaded program
CN110134385B (en) Method for recording C language function call chain and C language general log frame
CN108197032B (en) Main thread jamming monitoring method, medium, equipment and system for IOS application
US8806462B2 (en) Identifying code that wastes time switching tasks
US7865901B2 (en) Managing memory resident objects to optimize a runtime environment
CN103699480A (en) WEB dynamic security flaw detection method based on JAVA
US20080215305A1 (en) Emulated Memory Management
US8793289B2 (en) Method and system for detecting memory leaks and copying garbage collection files
CN101763305A (en) Method for detecting memory leak of embedded system
US20070156939A1 (en) Deadlock detection by lock classification
Hu et al. A memory-related vulnerability detection approach based on vulnerability features
CN110688245B (en) Information acquisition method, device, storage medium and equipment
US20040143824A1 (en) Method and apparatus for detecting an overflow condition in a kernel stack during operating system development
CN114428733A (en) Kernel data competition detection method based on static program analysis and fuzzy test
JP2007004413A (en) Memory leak detection means
CN112596823B (en) Safety control method and device and electronic equipment
US20120159457A1 (en) Validating run-time references
Dahlgren et al. Improving scientific software component quality through assertions
CN112528331A (en) Privacy disclosure risk detection method, device and system
CN116502239B (en) Memory vulnerability detection method, device, equipment and medium for binary program
CN117608890A (en) Method and device for detecting memory fault

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant