CN1141644C - Test and monitor method for embedded in processor memory - Google Patents

Test and monitor method for embedded in processor memory Download PDF

Info

Publication number
CN1141644C
CN1141644C CNB991246225A CN99124622A CN1141644C CN 1141644 C CN1141644 C CN 1141644C CN B991246225 A CNB991246225 A CN B991246225A CN 99124622 A CN99124622 A CN 99124622A CN 1141644 C CN1141644 C CN 1141644C
Authority
CN
China
Prior art keywords
memory
memory block
information
processor
agent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNB991246225A
Other languages
Chinese (zh)
Other versions
CN1286429A (en
Inventor
徐遂斐
李韫晖
李桂平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNB991246225A priority Critical patent/CN1141644C/en
Publication of CN1286429A publication Critical patent/CN1286429A/en
Application granted granted Critical
Publication of CN1141644C publication Critical patent/CN1141644C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The present invention discloses a detecting and monitoring method for a memory of an inserted processor. An original program is not newly inserted by the method, and a hardware resource does not need to be added either. By marking a memory block of the inserted processor, a real-time image in a memory environment of the inserted processor can be arranged on a man-machine interface of a monitoring machine. The leakage of the memory in the inserted processor and errors of out-of-range writing, etc., are detected in real time, and detailed journals are provided. The present invention can be used for tracking and analyzing an error and a defect of a program and saves the time for checking the error and positioning a fault.

Description

A kind of detection and method for supervising that embeds processor memory
The present invention relates to a kind of detection and method for supervising of calculator memory.
In the operational process of program, each program segment is dynamically applied for some storage spaces through regular meeting, discharges the storage space of being applied for after finishing using again.Like this, storer just be divided into some have a certain size, the memory block of certain life span.Each memory block can only be used by specific program segment in its term of validity.That is to say that each piece memory block all should be able to successfully be applied for or be discharged.But because the defective of programmer's maloperation, system design or program design, memory block might finish and not be released the mistake generation of (leakages) by other program block maloperation (crossing the border) or in its life cycle.
In embedding processor, program run is under specific hardware platform, and its system resource is limited.Require the long-time continuous operation owing to embed processor, requirement to program stability and reliability wants high more than the program on the general PC, not only do not allow to occur mistakes such as memory overwriting, leakage, and require to avoid occurring the situation of internal memory application failure as far as possible and the NULL pointer is carried out releasing operation.
When design embeds processor, determine the configuration of processor hardware resource often according to the demand of system software, determine the capacity of external memory storage.How to determine the size of required memory span under the actual motion environment, common way is that the memory environment in the system is carried out real-time detection and monitoring, memory mapping in the system dynamically is provided, writes down its maximum requirements, and preserve the usage log of its storer.
In the prior art,, generally adopt the way of in original program, carrying out plug-in mounting, changed the program structure of original program about the error-detecting of program committed memory and the method for memory maintenance.As: patent " recognition methods of internal stored operation error in the program design " (publication number CN 1188933A).The target platform of these technology or product generally is PC or workstation, environment for use is Windows 95 or Windows NT, even the detection method that can be used for embedding in real time the processor environment is arranged, but can't provide statistics and analysis, not to discharging the wrong detection of NULL pointer and Memory Allocation failure to EMS memory error; Other has some specially at the debugging acid that embeds the processor environment, has the partial memory measuring ability, but all needs the support of specialized hardware, and cost is higher.
The objective of the invention is to overcome the deficiencies in the prior art, a kind of method that the memory block that embeds processor is carried out detection of dynamic and monitoring is provided.
In order to reach the purpose that the internal memory that embeds processor is carried out detection of dynamic and monitoring, the treatment step of the method for the invention is as follows:
1 mark memory block
The internal memory operation function that is redirected carries out heavy duty with embedding function relevant with release with the Dram application in the processor.Program is when dynamically applying for internal memory, collect present procedure running environment and memory block information by embedding processor, be its storage allocation piece, and label information be set, in order to the user mode and the relevant information of preserving this memory block at the head and the afterbody of the memory block of distributing to it.
2 handle or transmit memory block information
When embedding the processor startup, start an Agent task simultaneously, this task is responsible for setting up communication with monitoring equipment, finishes to the collection of memory block information with to monitoring equipment and transmits, and receive the order of sending from monitoring equipment, finishes corresponding operation; If there is not monitoring equipment, this task also can be analyzed and handle memory block information in this locality.
In the Agent task, keep the interface of some small tools, be used to receive the instruction that monitoring equipment is sent.As: the order that issues according to monitoring equipment memory block is detected, controls whether releasing memory is filled to functions such as fixed value.
3 statistical treatment memory block information
Monitoring equipment is connected with the embedding processor by communication interface, receives and embeds the memory block information that processor Agent task is sent, and memory block information is analyzed, handled, and generates dynamic memory mapping and various daily record.
The present invention is described in further detail below in conjunction with drawings and Examples.
Fig. 1 detects the supervising device structural drawing.
Fig. 2 embeds the structural drawing of mark memory block in the processor.
Each functional module structure figure of Fig. 3.
Internal memory application process figure during the heavily loaded system function of Fig. 4 (a).
Internal memory discharges process flow diagram during the heavily loaded system function of Fig. 4 (b).
Fig. 5 Agent task initialization function process flow diagram.
Fig. 6 Agent mission flow diagram.
Fig. 7 monitoring equipment receives handles the memory block information flow chart.
As depicted in figs. 1 and 2, the present invention is when implementing, embed processor and monitoring equipment and adopt the distribution process mode, by the system function that embeds Agent on the processor and heavy duty finish information acquisition and to each functional module control, and on monitoring equipment, provide man-machine interface and data processing function, record also to preserve more detailed logging, also can be by control command, by Agent each functional module is controlled, and its operating result is reported to monitoring equipment.
1 mark embeds the memory block of processor
The internal memory operation function that is redirected is not replaced by macro definition and is embedded the internal memory application that processor provides and the function of release, comprise interior store function two parts to internal memory application and release, main status information of being responsible for gathering internal memory applicant and memory block is finished the memory block of application is carried out the mark packing end to end.
Shown in Fig. 4 (a) and Fig. 4 (b), before overload function, at first call its original internal memory application function, apply for that a ratio requires big storage block, in order to the information header of generation storage block and the information header of afterbody.System function after the heavy duty includes storer is carried out dynamic assignment and discharges two classes.
In the system function that discharges, judge at first whether the function parameter of input is legal, the information that the head and the tail of the memory block that utilizes in the application process again to be generated are preserved judges whether memory block has the situation generation of crossing the border in the process of using.If have, generation error report information then; If do not have, then memory block carried out releasing operation.After release is finished, will fill relevant report information, send it to the Agent task of collecting and putting memory information in order then.
The treatment step of mark memory block is as follows:
(1) calls the internal memory application function that embeds processor;
(2) information of generation internal memory build, tail;
(3) generate memory block and caller information, and send to Agent;
Internal memory after the heavy duty discharges function and mainly may further comprise the steps:
(1) judges whether input is the illegal memory piece
(2) releasing memory piece;
(3) generate memory block and caller information, and send to Agent.
2 by processing of Agent task or forwarding memory block information
The Agent task is finished the collection of memory block information and forwarding, and reception is finished corresponding operation from the order that far-end computer sends.If no monitoring equipment also can be analyzed and handle data in this locality.As: check operations such as memory block.Also comprise one in the Agent task when embedding the processor startup, have to embed the Agent startup function that processor calls, be responsible for setting up communication and start the Agent task.
As shown in Figure 5, the Agent task is when initialization, and system function starts, required system resource when at first the Agent task run of background information collection and processing is responsible in application.If the application failure then provides miscue, program is returned, but the not operation of interrupt system; If need carry out communication with monitoring equipment, then set up communication link again, the failure if connect, then provide miscue, and sign is set, the memory block information processing is placed on this locality handles, and apply for starting this and manage the required system resource of process everywhere, program is not returned, not the operation of interrupt system.
As shown in Figure 6, the Agent task is responsible for embedding the collection and the Processing tasks of processor memory block message, and the communication of Agent task and monitoring equipment is by message trigger, and program is in sleep state during the data message of the system function transmission after not receiving heavy duty.After receiving message, memory block information can be carried out analyzing and processing in this locality; If memory block information is handled by monitoring equipment, then this task is only finished the function of forwarding, transmits memory block information to monitoring equipment.
Agent task handling step is as follows:
(1) calls Agent and start function startup Agent task;
(2) receive memory information or error message;
(3) information of receiving is transmitted to far-end computer;
(4) control command of reception far-end computer;
(5) according to the order that receives, finish corresponding operating.
3 by monitoring equipment statistical treatment memory block pager
Information gathering in the remote monitoring machine and handling procedure are according to the memory block information and the error message of sending from the Agent task, put out the report of the environment of internal memory in order, detailed memory mapping is provided, generates friendly man-machine interface, and user's order is handed down to Agent.
As shown in Figure 7, monitoring equipment is added up the data that receive, if the information that receives is the memory block application and discharges proper messages, then write down the sum of the memory block that has used in the current embedding processor, and judge whether greater than peak value, if then peak value is refreshed; If the information that receives is the memory block application and discharges the message of makeing mistakes, then the misregistration type and the environment of makeing mistakes, as: the row of caller number, function name, type of error, the start address of memory block, length etc., and provide fault alarm; Add up embedding the memory block that surpasses certain storage time in the processor memory, and independent record.
The monitoring equipment treatment step is as follows:
(1) information for correct application and releasing memory that receives is revised memory mapping according to the information content, and preserves daily record;
(2) error message to receiving provides false alarm and is saved in error log file;
(3) receive user command from the interface, be transmitted to Agent.And the operation of Agent tied returned to the user;
(4) add up in the time period of user's appointment, effective memory block, and provide statistics.
Carry in operating system under the situation of memory allocation function, the treatment step when calling malloc and free in the program is as follows:
1 call malloc and free before, in header file (mem.h) by macro definition #define malloc (size) bk_malloc (size, _ FILE_, _ LINE_) #define free (ptr) bk_free (ptr, _ FILE_, _ LINE)) replace.
After 2 system start-ups were finished, at first calling system started function bk_start, sets up message queue, and is created as the semaphore of the synchronous usefulness of message queue.Start-up system initiating task (bk_DealTask) then, and with the handle of reservation message formation, semaphore, task in global variable.
During 3 family function call malloc, current filename is sent in the heavy duty system function excessively as input parameter with capable number.The processing of this function bk_malloc comprises following step:
1) calling original malloc function application one block length is the internal memory of size+sizeof (MemHead)+sizeof (Mem Tail).If the application failure carry out step 2), otherwise carry out step 3).
2) fill in error message, issue background information collection and Processing tasks (bk_DealTask) by message queue, in error message, comprise information such as the TID of the filename of caller, row number, the size that requires the memory block of application, current task, the type function (malloc) of internal memory application, current time.
3) in MemHead, insert start address, length, the applicant's of applicant's type, memory block message such as filename, call statement row hereof number, and generate verification and.With verification with insert the afterbody of memory block.At the stem of memory block, memory block between the afterbody is the spendable region of memory of user; and leave some bytes as the protected location near place, user memory district at stem and afterbody; fill specific data (as 0x3CC33CC3,0xA55AA55A), buffer zone be not counted in verification and.And generate report message according to memory block information, by message queue send to task bk_DealTask verification and.After generation is finished, fill one in order to send to collection that after operating system kernel is finished initialization, starts and the task of putting the internal memory daily record in order.Memory environment such as figure seven:
4) after being sent completely, system function is removed the memory block of the part of storage build as Gong the user program use of application gained with storage block, uses for the user.Shown below is the structure of MemHead
typedef struct sMemHead{ unsigned short usMemID; / * User memory ID*/unsigned short usBufSize; The big or small * of/* user memory piece/unsigned long ulStartAddr; The start address * of/* user memory piece/unsigned short usCallerType; Which kind of internal memory application function call */unsigned short usFlag/* is; The Status Flag * of/* memory block/unsigned char ucCheck[LEN CHECK]/fixed character that * is used for isolating internal memory head and memory block is wherein, LEN CHECK defaults to 4 (MemHead is gathered into an integer long word), */MemHead; 
4 task bk DealTask are waiting by the time after the message that malloc sends, handle.Judge message process mode,, then add up if in this locality.If do not handle, then send to the computing machine of another appointment in this locality.For obtaining the form of detailed as far as possible memory environment, and consider that the system resource in the embedded system is limited, employing is transmitted to another computing machine (HOST), HOST is after receiving original memory block information data, data are analyzed, provide the memory mapping in the current system, safeguard error log.And raw data is saved in file,
5 when user function calls free, judges at first then whether input parameter ptr is NULL.If NULL, then fill-error information and report to bk_DealTask.If be not NULL, judge whether protected location, memory block front and back is destroyed.If destroyed, releasing memory, and report this mistake to bk_DealTask.Check to calculate the verification of internal memory head and and judge whether the data consistent preserved with afterbody.Inconsistent then first releasing memory is reported this mistake to Uk_DealTask then.If above all-pass mistake, then releasing memory according to memory information, is filled report message and transmission.
Message Processing that 6 task bk_DealTask send over free and the processing symmetry of malloc.Promptly from the internal memory sum that system uses, deduct the size of the memory block of release, preserve error log and raw readings.
Program on 7 monitoring equipments can adopt the diagram form man-machine interface to realize the real-time rendering memory mapping.And in monitoring equipment, increase interface, by receiving the memory block information that order receives the self-embedding processor, add up the situation that current memory block application is used, the situation of change that statistics special time period internal memory uses etc.
Adopt the method for the invention, need not carry out plug-in mounting again to original program, also need not to increase hardware resource, the real-time reflection that embeds the processor memory environment just can be provided on the man-machine interface of monitoring equipment, can detect in real time and embed internal memory leakage in the processor, mistakes such as write-overflow, and provide detailed daily record, prompting development﹠ testing personnel follow the tracks of solution to the mistake and the defective of program, reduced the time of carrying out bug check and localization of fault widely, under the embedding processor environment of ask for something long-time continuous operation, have very practical meaning and good effect; And the implementation of this method is very flexible, can only finish in embedding processor, also can connect by the various means of communication and monitoring equipment, carries out distribution process, can be configured its function flexibly as requested, uses flexibly, and is convenient.

Claims (3)

1 one kinds of detection and method for supervising that embed processor memory is characterized in that:
Described method treatment step is as follows:
(1) mark embeds the memory block of processor
The internal memory operation function that is redirected carries out heavy duty with embedding function relevant with release with the Dram application in the processor; Program is when dynamically applying for internal memory, collect present procedure running environment and memory block information by embedding processor, be its storage allocation piece, and label information be set, in order to the user mode and the relevant information of preserving this memory block at the head and the afterbody of the memory block of distributing to it;
(2) handle or transmit memory block information by the Agent task
When embedding the processor startup, start an Agent task simultaneously, this task is responsible for setting up communication with monitoring equipment, finishes to the collection of memory block information with to monitoring equipment and transmits, and receive the order of sending from monitoring equipment, finishes corresponding operation; If there is not monitoring equipment, this task also can be analyzed and handle memory block information in this locality; In the Agent task, keep the interface of some small tools, be used to receive the instruction that monitoring equipment is sent;
(3) by monitoring equipment statistical treatment memory block information
Monitoring equipment is connected with the embedding processor by communication interface, receives and embeds the memory block information that processor Agent task is sent, and memory block information is analyzed, handled, and generates dynamic memory mapping and various daily record, that is:
1. the information for correct application and releasing memory that receives is revised memory mapping according to the information content,
And preservation daily record;
2. the error message to receiving provides false alarm and is saved in error log file;
3. receive user command from the interface, be transmitted to Agent, and the operation of Agent tied return to usefulness
The family;
4. add up in the time period of user's appointment, effective memory block, and provide statistics.
The detection of 2 embedding processor memories as claimed in claim 1 and method for supervising is characterized in that: in the treatment step (1), the mark that carries out end to end of the internal memory applied in embedding processor is handled, generated the information end to end of memory block, its treatment step is as follows:
The treatment step of mark memory block is as follows:
1. call the internal memory application function that embeds processor;
2. generate the information of internal memory build, tail;
3. generate memory block and caller information, and send to Agent;
Internal memory after the heavy duty discharges function and mainly may further comprise the steps:
1. judge whether input is the illegal memory piece
2. releasing memory piece;
3. generate memory block and caller information, and send to Agent.
The detection of 3 embedding processor memories as claimed in claim 1 and method for supervising is characterized in that: in the treatment step (2), when embedding the processor startup, start an Agent task therein, its treatment step is as follows:
Agent task handling step is as follows:
1. call Agent and start function startup Agent task;
2. receive memory information or error message;
3. the information of receiving is transmitted to far-end computer;
4. receive the control command of far-end computer;
5. according to the order that receives, finish corresponding operating.
CNB991246225A 1999-11-20 1999-11-20 Test and monitor method for embedded in processor memory Expired - Lifetime CN1141644C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB991246225A CN1141644C (en) 1999-11-20 1999-11-20 Test and monitor method for embedded in processor memory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB991246225A CN1141644C (en) 1999-11-20 1999-11-20 Test and monitor method for embedded in processor memory

Publications (2)

Publication Number Publication Date
CN1286429A CN1286429A (en) 2001-03-07
CN1141644C true CN1141644C (en) 2004-03-10

Family

ID=5283511

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB991246225A Expired - Lifetime CN1141644C (en) 1999-11-20 1999-11-20 Test and monitor method for embedded in processor memory

Country Status (1)

Country Link
CN (1) CN1141644C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100462925C (en) * 2005-12-08 2009-02-18 中兴通讯股份有限公司 Method for automatically releasing applied programe module leaked memory in inlaid system

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1298119C (en) * 2001-12-19 2007-01-31 中兴通讯股份有限公司 Method of operating mistake capture and recording of embedded type real time operation system
CN1324475C (en) * 2002-10-24 2007-07-04 联想(北京)有限公司 Internal storage error generator and internal storage error correction function test method of computer main board
CN100382043C (en) * 2004-09-20 2008-04-16 华为技术有限公司 Device and method for internal storage monitoring
DE102004046611A1 (en) * 2004-09-25 2006-03-30 Robert Bosch Gmbh Method for processing a computer program on a computer system
CN100377104C (en) * 2005-02-28 2008-03-26 中国科学院计算技术研究所 RAM accessing information real-time capturing device and method
CN100375060C (en) * 2005-06-20 2008-03-12 中兴通讯股份有限公司 Embedded system and real-time monitoring and processing method thereof
CN100392606C (en) * 2005-07-14 2008-06-04 中兴通讯股份有限公司 Method for leaking memory of positioning virtual operation system
CN100432955C (en) * 2005-09-02 2008-11-12 中兴通讯股份有限公司 Detecting method for illegal memory reading and writing
CN100410967C (en) * 2005-11-30 2008-08-13 财团法人工业技术研究院 Wire-less radio-frequency book lebel with internal inlaid memory detection function and detection method
CN101206616B (en) * 2006-12-19 2010-06-09 中国电信股份有限公司 Method for testing resource leakage of graphical interface program and method for locating question
CN101272551B (en) * 2007-03-23 2011-04-20 中兴通讯股份有限公司 Initialization method for maximum stack space of embedded system
CN101539870A (en) * 2008-03-21 2009-09-23 中兴通讯股份有限公司 Device and method for detecting memory leak
CN101847121B (en) * 2010-05-07 2012-01-18 北京大学 Method for discovering software vulnerabilities
CN102214147A (en) * 2011-06-29 2011-10-12 深圳市五巨科技有限公司 Method and device for detecting transborder memory access
CN104239192A (en) * 2013-06-21 2014-12-24 中兴通讯股份有限公司 Memory monitoring and processing method and device
CN105302662B (en) * 2014-07-25 2020-11-06 腾讯科技(深圳)有限公司 Multi-machine backup method and system
CN104461918A (en) * 2014-12-05 2015-03-25 上海斐讯数据通信技术有限公司 Method and system for performing statistic operation on dynamically-applied memory blocks
CN105869309A (en) * 2016-03-24 2016-08-17 广州广电运通信息科技有限公司 Drive module memory data monitoring method and device
CN106294176B (en) * 2016-08-19 2018-11-06 暴风集团股份有限公司 The method and system that application failure positions in Mac OS systems
CN107066390B (en) * 2017-04-24 2020-01-17 许继集团有限公司 Dynamic memory leak detection method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100462925C (en) * 2005-12-08 2009-02-18 中兴通讯股份有限公司 Method for automatically releasing applied programe module leaked memory in inlaid system

Also Published As

Publication number Publication date
CN1286429A (en) 2001-03-07

Similar Documents

Publication Publication Date Title
CN1141644C (en) Test and monitor method for embedded in processor memory
US7971010B2 (en) Mechanism for performing loitering trace of objects that cause memory leaks in a post-garbage collection heap
US7689558B2 (en) Application monitoring using profile points
US8601469B2 (en) Method and system for customizing allocation statistics
US8667471B2 (en) Method and system for customizing profiling sessions
US8336033B2 (en) Method and system for generating a hierarchical tree representing stack traces
US7953772B2 (en) Method and system for inspecting memory leaks and analyzing contents of garbage collection files
US8234631B2 (en) Method and system for tracing individual transactions at the granularity level of method calls throughout distributed heterogeneous applications without source code modifications
Ansel et al. DMTCP: Transparent checkpointing for cluster computations and the desktop
US9582312B1 (en) Execution context trace for asynchronous tasks
US20080244547A1 (en) Method and system for integrating profiling and debugging
US20080244546A1 (en) Method and system for providing on-demand profiling infrastructure for profiling at virtual machines
US20040003327A1 (en) Method and system to implement a system event log for system manageability
CN103109276B (en) System detection method
US20080320336A1 (en) System and Method of Client Side Analysis for Identifying Failing RAM After a User Mode or Kernel Mode Exception
CN101354675A (en) Method for detecting embedded software dynamic memory
CN101819550A (en) Interface testing system for serial connecting small computer system
CN109669822A (en) The creation method and computer readable storage medium of electronic device, spare memory pool
US8713537B2 (en) Monitoring heap in real-time by a mobile agent to assess performance of virtual machine
CN1105352C (en) Fault data collection as part of computer unit restart
CN109783284A (en) Information acquisition method, system and server, computer readable storage medium
US6513133B1 (en) Uniformly distributed induction of exceptions for testing computer software
CN111966603A (en) Memory leak detection method and device, readable storage medium and electronic equipment
Seo et al. A profiling method by PCB hooking and its application for memory fault detection in embedded system operational test
CN100530110C (en) System for automatically monitoring memory leakage and memory out-of-range in inlaid system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: ZTE CO., LTD.

Free format text: FORMER NAME OR ADDRESS: SHENZHENG CITY ZTE CO., LTD.

CP03 Change of name, title or address

Address after: 518057 Zhongxing building, science and technology south road, Nanshan District hi tech Industrial Park, Guangdong, Shenzhen

Patentee after: ZTE Corporation

Address before: 518057 Zhongxing building, hi tech Industrial Park, Shenzhen, Guangdong, Nanshan District Province, Wang Yuzhong

Patentee before: Zhongxing Communication Co., Ltd., Shenzhen City

REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1037501

Country of ref document: HK

CX01 Expiry of patent term

Granted publication date: 20040310

CX01 Expiry of patent term