Method for leaking memory of positioning virtual operation system

A virtual operating system and memory leak technology, applied in the field of locating memory leaks in virtual operating systems, can solve problems such as insufficient memory, no unified structure, and difficult analysis, and achieve the effects of easy memory leak location, small impact, and simple data structure.

Inactive Publication Date: 2007-01-17
BEIJING YUANXIN SCI & TECH
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] According to the general method of locating memory leaks, each piece of allocated memory can be tracked where the virtual operating system allocates and releases memory, but it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for leaking memory of positioning virtual operation system
  • Method for leaking memory of positioning virtual operation system
  • Method for leaking memory of positioning virtual operation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Combine below image 3 The implementation of the present invention is described in detail:

[0026] 1. First, you need to set the criteria for judging memory leaks and the threshold for recording files to the hard disk. If the available memory is less than 30%, it is considered that a memory leak has occurred. When the available memory is less than 10%, start saving the linked list to the hard disk.

[0027] 2. Construct a structure UBLEAK_REG to save the system running status of the leak point. The structure ( image 3 A box on the right represents a structure) The system running state information saved at least includes the following content, mainly the PCB content of the scheduled process at the leak point:

[0028] The line number where the memory allocation function (GET_UB) was called

[0029] The name of the file that calls the free memory function (GET_UB)

[0030] The address of the memory block (UB)

[0031] current task number

[0032] current process ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for positioning leakage of internal memory in virtual operation includes setting up a chain table, storing system state information of leakage point and leaked internal memory in said chain table when leakage of internal memory is occurred and storing chain table into storage media before system is collapsed, then carrying out analysis on recorded file and positioning leakage point of internal memory by restoring system state of leakage point and content of leaked internal memory.

Description

Technical field: [0001] The invention relates to a method for locating the memory leak of a virtual operating system, and is especially suitable for a virtual operating system built on an embedded real-time operating system (RTOS). Background technique: [0002] A memory leak is when memory is not freed after it is used. There are two types of memory leaks: heap memory leaks and system memory leaks. Heap memory leaks occur in the application program, and system memory leaks occur in the system scheduler. This method is only for heap memory leaks that occur in the virtual operating system. [0003] Here we first introduce the virtual operating system (also called the running support platform). To develop applications on the real-time embedded operating system, we usually build a virtual operating system on the RTOS. The virtual operating system is between the application program and the RTOS, which shields the details of the operating system, provides functions such as mem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/00G06F9/46
Inventor 孙小伟梅森王洪涛
Owner BEIJING YUANXIN SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products