Memory leak detection method and device

A memory leak and detection method technology, applied in the field of memory leak detection, can solve problems such as memory consumption, device stop, and computer performance reduction, so as to solve the memory leak phenomenon and ensure normal operation.

Active Publication Date: 2011-05-11
南京星云数字技术有限公司
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A memory leak can reduce the amount of memory available to the system, thereby reducing the performance of the computer
If the system does not detect and handle memory leaks, it may cause more and more memory to be consumed over time
Eventually, in the worst case, too much available memory is allocated and all or part of the device stops working properly, or the application crashes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory leak detection method and device
  • Memory leak detection method and device
  • Memory leak detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The memory leak detection method in the present invention will be described below with reference to the accompanying drawings.

[0017] It should be noted that, in the following embodiments, the technical solution of the present invention will be described in detail mainly by taking the memory management structure of the memory block chain as an example. Those skilled in the art should understand that in the prior art, the system also uses other modes to manage memory. Therefore, according to the description in this article, those skilled in the art can apply the technical solution of the present invention to other memory management structures other than the memory block chain without creative work, and this application must fall under the protection of the appended claims in range.

[0018] figure 2 A flow chart of a memory leak detection method according to a specific embodiment of the present invention is shown. Refer to the following figure 2 A first embodimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to provide a memory leak detection method. The method comprises the following steps: classifying memory blocks allocated to the process into a plurality of memory classes according to the lengths of the memory blocks, and respectively recording the application information and release information as well as address information of the memory blocks in each memory class; and based on the application information and release information as well as address information of the memory blocks in each memory class, determining a memory leak point. Through the method and corresponding device provided by the invention, the memory leak points in a system can be effectively detected, thereby ensuring the stable operation of programs.

Description

technical field [0001] The invention relates to a memory leak detection method and its device, in particular to a memory leak detection method and its device in a communication network. Background technique [0002] Memory leaks are a common error in program runtime. Generally refers to the situation that due to program design negligence or errors, the memory that is no longer used cannot be released when the program is running. A memory leak does not refer to the physical disappearance of memory, but the application program loses control of the memory allocated to the program, thus causing a waste of memory. [0003] Most memory leaks are heap memory leaks. Heap memory refers to the memory allocated by the program from the heap and should be released after use. According to system requirements, memory is often allocated and divided into multiple memory blocks, and the size of each memory block can be arbitrary. Such as figure 1 As shown in , multiple memory blocks can ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/50G06F11/36
Inventor 姚欣张少华方涛
Owner 南京星云数字技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products