Memory leak positioning method, server, client and system

A memory leak and server-side technology, applied in the network field, can solve problems such as memory leaks and impossibility, and achieve the effect of improving speed and efficiency and being easy to operate

Active Publication Date: 2011-08-10
SHENZHEN KINGDEE MIDDLEWARE
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above technologies rely on special tools, which need to be used on the server side to complete the location and display of memory leak sources, and the location and di

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory leak positioning method, server, client and system
  • Memory leak positioning method, server, client and system
  • Memory leak positioning method, server, client and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] For remote location of memory leaks, see figure 1 , this embodiment provides a method for locating memory leaks, including:

[0048]101: Analyze the heap dump file to obtain memory leak information. The memory leak information includes information about the first object corresponding to the source of the memory leak, and information about the reference relationship that causes the memory leak. The termination object of the reference relationship is the first object. object;

[0049] In this embodiment, the source of the memory leak refers to the place where the memory leak directly occurs during the running of the program. The program usually includes multiple objects, and multiple reference relationships usually exist among the multiple objects. One memory leak may occur when the program is running, or multiple memory leaks may occur, and each memory leak source corresponds to an object. When multiple memory leaks occur, analyze the heap dump file to obtain objects ...

Embodiment 2

[0057] For remote location of memory leaks, see figure 2 , this embodiment provides a method for locating memory leaks, including:

[0058] 201: Send a request to locate a memory leak to the server in B / S mode;

[0059] 202: Receive the memory leak information returned by the server. The memory leak information includes the information of the first object corresponding to the source of the memory leak and the information of the reference relationship causing the memory leak. The end object of the reference relationship is the first object, and the The memory leak information is obtained after analyzing the heap dump file on the server side;

[0060] 203: Acquire the first object and the reference relationship according to the received information of the first object and the information of the reference relationship, and display the first object and the reference relationship.

[0061] The method provided by this embodiment is usually implemented on the client side, which us...

Embodiment 3

[0064] In order to realize remote location of memory leaks and prevent memory leak information confusion caused by multiple requests, see image 3 , this embodiment provides a method for locating memory leaks, including:

[0065] 301: The server analyzes the heap dump file to obtain memory leak information. The memory leak information includes information about the first object corresponding to the source of the memory leak, and information about the reference relationship that causes the memory leak. The termination object of the reference relationship is first object;

[0066] 302: The client sends a request to locate a memory leak to the server in B / S mode;

[0067] In this embodiment, the server and the client interact based on the web. The client sends a request to the server through an existing browser, and the browser receives the information returned by the server, and then displays it to the user. Specifically, AJAX (Asynchronous JavaScript and Extensible Markup Lan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a memory leak positioning method, a server, a client and a memory leak positioning system, which belong to the technical field of networks. The method comprises the following steps of: analyzing a dump file to obtain memory leak information comprising information about a first object corresponding to a memory leak source and the information about a citation relationship causing memory leak; receiving a memory leak positioning request transmitted in a browser/server (B/S) mode from the client; and transmitting the information about the first object and the information about the citation relationship to the client, so that the client acquires the first object and the citation relationship for display according to the received information. The server comprises an analysis module, a receiving module and a transmission module. The client comprises a transmission module, the receiving module and a processing module. The system comprises the server and the client. By the method, the server, the client and the system, remote memory leak positioning is realized in a web way without the special tool usage of the client and the excessive participation of a user, and the effect of remotely and rapidly positioning the memory leak can be achieved.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method for locating memory leaks, a server end, a client end and a system. Background technique [0002] When a problem occurs during the running of the application, the JVM (Java Virtual Machine, Java Virtual Machine) can record the running state of the system when the problem occurs, and store it in the heap dump file, which is the dump file, for easy development. It provides an important basis for analyzing and diagnosing problems. The running state recorded in the heap dump file usually includes the data in the system memory and the reference relationship between objects. Problems that occur while the application is running are usually memory leaks. Using special tools to analyze the heap dump file, the object at the source of the memory leak and the reference relationship between the objects can be located and displayed to the user. [0003] In the prior art, an analys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/34H04L29/08
Inventor 周庆益
Owner SHENZHEN KINGDEE MIDDLEWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products