-
公开(公告)号:US11055159B2
公开(公告)日:2021-07-06
申请号:US16393067
申请日:2019-04-24
Applicant: Cisco Technology, Inc.
Inventor: Sivakumar Ganapathy , Ram Regar , Navya Patimalla , Sohayb Aiyub
Abstract: Disclosed is a method that includes obtaining a list of processes in an application centric infrastructure fabric, sorting the list of processes according to an amount of memory increase associated with each respective process in the list of processes to yield a sorted list, selecting a group of processes from the sorted list and collecting a respective live process core for each process in the group of processes without pausing or killing any process in the group of processes. The method includes applying an offline leak detection tool to each process in the group of processes to yield a list of leaked memory addresses for a given process of the group of processes and transmitting a message to the given process with the list of leaked memory addresses, whereby the given process calls a function to release leaked memory associated with the given process as identified in the message.
-
公开(公告)号:US10303534B2
公开(公告)日:2019-05-28
申请号:US15654906
申请日:2017-07-20
Applicant: Cisco Technology, Inc.
Inventor: Sivakumar Ganapathy , Ram Regar , Navya Patimalla , Sohayb Aiyub
Abstract: Disclosed is a method that includes obtaining a list of processes in an application centric infrastructure fabric, sorting the list of processes according to an amount of memory increase associated with each respective process in the list of processes to yield a sorted list, selecting a group of processes from the sorted list and collecting a respective live process core for each process in the group of processes without pausing or killing any process in the group of processes. The method includes applying an offline leak detection tool to each process in the group of processes to yield a list of leaked memory addresses for a given process of the group of processes and transmitting a message to the given process with the list of leaked memory addresses, whereby the given process calls a function to release leaked memory associated with the given process as identified in the message.
-
3.
公开(公告)号:US20190250972A1
公开(公告)日:2019-08-15
申请号:US16393067
申请日:2019-04-24
Applicant: Cisco Technology, Inc.
Inventor: Sivakumar Ganapathy , Ram Regar , Navya Patimalla , Sohayb Aiyub
CPC classification number: G06F11/0715 , G06F9/5077 , G06F11/0751 , G06F11/0793 , G06F11/3648 , G06F12/0253 , G06F12/0269 , G06F2212/152 , G06F2212/154 , G06F2212/163
Abstract: Disclosed is a method that includes obtaining a list of processes in an application centric infrastructure fabric, sorting the list of processes according to an amount of memory increase associated with each respective process in the list of processes to yield a sorted list, selecting a group of processes from the sorted list and collecting a respective live process core for each process in the group of processes without pausing or killing any process in the group of processes. The method includes applying an offline leak detection tool to each process in the group of processes to yield a list of leaked memory addresses for a given process of the group of processes and transmitting a message to the given process with the list of leaked memory addresses, whereby the given process calls a function to release leaked memory associated with the given process as identified in the message.
-
4.
公开(公告)号:US20190026176A1
公开(公告)日:2019-01-24
申请号:US15654906
申请日:2017-07-20
Applicant: Cisco Technology, Inc.
Inventor: Sivakumar Ganapathy , Ram Regar , Navya Patimalla , Sohayb Aiyub
Abstract: Disclosed is a method that includes obtaining a list of processes in an application centric infrastructure fabric, sorting the list of processes according to an amount of memory increase associated with each respective process in the list of processes to yield a sorted list, selecting a group of processes from the sorted list and collecting a respective live process core for each process in the group of processes without pausing or killing any process in the group of processes. The method includes applying an offline leak detection tool to each process in the group of processes to yield a list of leaked memory addresses for a given process of the group of processes and transmitting a message to the given process with the list of leaked memory addresses, whereby the given process calls a function to release leaked memory associated with the given process as identified in the message.
-
-
-