Method of detecting memory leak causing portion and execution program thereof

Inactive Publication Date: 2005-12-01
HITACHI LTD
View PDF9 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0040] According to the invention, the weights are attached to the plurality of data constituting the reference relationship, the weights are made to constitute leak scores indicating a possibil

Problems solved by technology

When the operation of releasing the ensured region is not executed properly or when data of unfreed area become invisible from the executing system, there is generated a state in which the memory region used by the program continues to increase, that is, the memory leak.
In a case of a language explicitly instructing release of region in the heap region as in C language or C++ language, a memory leak may occur due to a deficiency in release of region.
Further, there may also occur a memory leak by disappearance of a reference to the data storage region ensured in the heap region when other reference is assigned erroneously to a field in the heap region holding the reference to the data storage region before release of the region.
The garbage col

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of detecting memory leak causing portion and execution program thereof
  • Method of detecting memory leak causing portion and execution program thereof
  • Method of detecting memory leak causing portion and execution program thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] An embodiment of a method of detecting a memory leak causing portion according to the present invention will be now explained in the followings in reference to the drawings.

[0056]FIG. 1 is a view showing a configuration of a computer 100 executing a method of detecting a memory leak causing portion according to the embodiment.

[0057] The computer 100 is a server connected to a network 1. The server 100 is provided with a processor 110 for executing various processings, a program memory 130 stored with various programs 131, 135 executed by the processor 110, a data memory 140 stored with various data, an external storage device 120, a display device 150, an interface 160 for communicating with other device via the network 1.

[0058] The external storage device 120 is stored with a program 121 for executing a Web service provided by the server 100. The program 121 is described in Java language.

[0059] The program memory 130 is stored with a program 131 in which the program 121 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

To reduce labor required in investigating on a source of memory leaks with regard to the memory leaks generated in executing a program using a language which does not explicitly indicate release of data region. With regard to a plurality of data stored in a memory, relationship of data is grasped twice after an time interval therebetween. Next, increased data C1, E2, E3 which are not present in data of a first time are extracted from data of a second time, and weights “1”, “2”, “2” in accordance with data sizes are attached to the increased data. Next, the weights are successively propagated from a lower order data of a destination of reference to a higher order data of a source of reference successively. At this occasion, when there are a plurality of lower order data E2, E3 for a higher order D0, a weight constituted by adding the weights “2”, “2” of the plurality of lower data E2, E3 is made to be a weight “4” of the higher order data D0, and the weights of the respective data represent leak scores which causes memory leak.

Description

CLAIM OF PRIORITY [0001] The present application claims priority form Japanese application P2004-116581 filed on Apr. 12, 2004, the content of which is hereby incorporated by reference into this application. BACKGROUND OF THE INVENTION [0002] The present invention relates to a method of detecting a memory leak causing portion generated in executing a program described in a programming language of Java language or the like capable of tracking a data relationship with regard to a plurality of data stored in a memory of a computer and an execution program thereof. [0003] As one of causes by which a computer program does not achieve a performance as expected, there is pointed out a phenomenon referred to as memory leak in which a data memory region used in the program continues to increase. Normally, data generated in executing a program is arranged at a memory region referred to as a heap region. The heap region is a kind of a memory region used in executing a program and is utilized f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/44G06F11/36
CPCG06F11/366
Inventor OBATA, MOTOKINISHIYAMA, HIROYASU
Owner HITACHI LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products