A method for locating packet memory leaks

A memory leak and message technology, applied in the network field, can solve problems such as costing a lot of manpower and narrowing the scope of the problem

Active Publication Date: 2017-11-28
OPZOON TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing technology does not provide a good, general method to solve such problems, it takes a lot of manpower to tackle key problems, and even cannot narrow down the scope of the problem in a short period of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for locating packet memory leaks
  • A method for locating packet memory leaks
  • A method for locating packet memory leaks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0037] see figure 1 , the embodiment of the present invention provides a method for locating message memory leaks, including the following steps:

[0038] Step 101: Set the first flag bit used to indicate whether the message memory is occupied and the second flag bit used to indicate the processing stage of the message in the message header, and hang all the messages on a linked list.

[0039] Step 102: When a packet memory leak occurs, traverse the linked li...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method for locating message memory leaks, the method comprising: setting a first flag bit for indicating whether the message memory is occupied and a second flag for indicating the message processing stage in the message header bit, and hang all messages on a linked list; when a message memory leak occurs, traverse the linked list to obtain the first flag and the second flag of all messages; find out the memory by the value of the first flag Occupied messages; count the value of the second flag bit of all messages whose memory is occupied, and find out the value of the second flag bit that occurs most frequently; find the corresponding message according to the value of the second flag bit that occurs most frequently The processing stage is where the packet memory leaks. The invention can narrow down the scope of the problem in a short time, thereby achieving the purpose of quickly locating message memory leaks.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method for locating message memory leaks. Background technique [0002] The processing of network packets is the basis of network devices. When the hardware such as the network card of the network device receives a message, it will save the message in a pre-allocated memory, and the CPU in the network device will obtain the content of the message in the memory, and analyze and process the content of the message , and send or discard the message according to the processing result. No matter whether the message is finally sent or discarded, the memory corresponding to the message will be released, otherwise it will cause a memory leak. When a memory leak occurs, the hardware of the network card cannot store the network packets in the memory because the memory cannot be applied for, the CPU cannot receive the packets, and the entire network device cannot work. [0003] Because...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/70H04L12/24
Inventor 李鹏
Owner OPZOON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products