首页>
外国专利>
Application-centric analysis of leak suspect operations
Application-centric analysis of leak suspect operations
展开▼
机译:以应用程序为中心的可疑泄漏操作分析
展开▼
页面导航
摘要
著录项
相似文献
摘要
To identify a source of a memory leak in an application, a pattern of objects is identified in an object hierarchy of a heap dump, the pattern including an indication of the memory leak. The pattern is matched with a metadata of the application. A static entry in the metadata describes a relationship between a component of the application and an object of a class used in the component. A flow entry in the metadata describes a relationship between a pattern of instantiation of a set of objects corresponding to a set of classes and an operation performed using the application. When the pattern matches the flow entry in the flow section of the metadata, a conclusion is drawn that the memory leak is caused in the operation identified in the flow entry. A portion of a code that participates in the operation is selected for modification.
展开▼