Memory leak detection method and device
A memory leak and memory technology, applied in the computer field, can solve the problems of increasing system resource consumption and increasing the uncertainty of system operation, so as to restore the leaked memory, improve the accuracy, and avoid the effect of manual operation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.
[0050] refer to figure 1 , which shows a flow chart of the steps of Embodiment 1 of a method for detecting memory leaks of the present application, which may specifically include the following steps:
[0051] Step 101, determine the memory node that executes the memory application operation;
[0052]Usually, when writing the code of the signaling processing subsystem of the PGW network element, the software developer can predetermine the nodes that need to perform memory operations, and the memory operations include memory application operations, and / or memory release operations. Moreover, for the software version that has been officially released, the locations where memory application operations and m...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


