发明名称 |
System level memory leak detection |
摘要 |
A method for detecting memory leaks with an administrative client begins by transmitting to all of the processes running on at least one computing device, a first command to return memory track information. The administrative client receives memory track information from each of the processes, and combines them into a first system wide memory allocation. The administrative client transmits an instruction to run a test case process, and then transmits, to each of the processes, a second command to return memory track information. The administrative client receives the second set of memory track information and combines it to generate a second system wide memory allocation. To generate a list of potential memory leaks originating from the test case process, the administrative client compares the first system wide memory allocation with the second system wide memory allocation. |
申请公布号 |
US9558055(B2) |
申请公布日期 |
2017.01.31 |
申请号 |
US201414184150 |
申请日期 |
2014.02.19 |
申请人 |
Cisco Technology, Inc. |
发明人 |
Qin Xianlong;Ganapathy Sivakumar;Xu Fei |
分类号 |
G06F11/00;G06F11/07;G06F11/36;G06F9/50;G06F12/02 |
主分类号 |
G06F11/00 |
代理机构 |
Edell, Shapiro & Finnan, LLC |
代理人 |
Edell, Shapiro & Finnan, LLC |
主权项 |
1. A method comprising:
transmitting to a plurality of processes running on a system comprising a plurality of computing devices connected via at least one network, each of the plurality of processes associated with a process identifier, a first command to return an indication of a memory allocation by each of the plurality of processes; receiving a first plurality of indications of memory allocation corresponding to the plurality of processes; combining the first plurality of indications of memory allocation to generate a first system wide memory allocation; transmitting an instruction to run a test case process on at least one computing device of the plurality of computing devices; transmitting to the plurality of processes a second command to return an indication of a memory allocation by each of the plurality of processes; receiving a second plurality of indications of memory allocation corresponding to the plurality of processes; combining the second plurality of indications of memory allocation to generate a second system wide memory allocation; and comparing the first system wide memory allocation to the second system wide memory allocation to generate a list of potential memory leaks originating from the test case process. |
地址 |
San Jose CA US |