Memory leak detecting method and device

A memory leak and detection method technology, applied in the field of memory detection, can solve problems such as incomplete data, and achieve the effects of accurate time point, accurate memory leak information, and comprehensive data

Active Publication Date: 2017-05-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF10 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a memory leak detection method for the problem that the traditional memory leak detection manually speci...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory leak detecting method and device
  • Memory leak detecting method and device
  • Memory leak detecting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] It can be understood that the terms "first", "second" and the like used in the present invention can be used to describe various elements herein, but these elements are not limited by these terms. These terms are only used to distinguish one element from another element. For example, a first client could be termed a second client, and, similarly, a second client could be termed a first client, without departing from the scope of the present invention. Both the first client and the second client are clients, but they are not the same client.

[0035] Figure 1A It is a schematic diagram of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a memory leak detecting method and device. The method comprises the following steps: loading a preset memory monitoring dynamic link library when a detected process is started; hooking a memory allocation function and/or a windows system application programming interface via the memory monitoring dynamic link library; calling the memory allocation function and/or the windows system application programming interface via a hook function, acquiring memory allocation information when the detected process is started, and acquiring memory allocation information when the detected process exits; and comparing the memory allocation information when the detected process is started with the memory allocation information when the detected process exits to obtain memory leak information. By adopting the memory leak detecting method and device, the memory allocation information of the detected process in the whole process from start to exit, so the monitoring time is accurate, the obtained data is comprehensive, the statistical result is not released all the time, and the obtained memory leak information is more accurate.

Description

technical field [0001] The invention relates to the field of memory detection, in particular to a memory leak detection method and device. Background technique [0002] A memory leak is a leak of heap memory. Heap memory refers to the memory allocated by the program from the heap, with any size, and the released memory must be displayed after use. Applications generally use functions such as malloc, realloc, and new to allocate a block of memory from the heap. After use, the program must be responsible for calling free or delete to release the memory block. Otherwise, this memory cannot be used again, that is, This memory is leaked. [0003] In routine client performance special tests, memory usage is an indicator that focuses on. The UMDH tool in the Debugging Tools for Windows (the Debugging Tools for Windows) can monitor the problem points of memory leaks and get the stack where the memory leaks. UMDH monitors the memory allocation function in the Windows system funct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36G06F12/02
Inventor 毕研涛周海陈诚
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products