O'Reilly logo

Memory Dump Analysis Anthology, Volume 7 by Dmitry Vostokov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Punctuated Memory Leak

An example of this pattern is somewhat similar to a large block allocation leak for process heap (please see a modeling example in Volume 5, page 315). An application has some functionality and after each command its committed memory was increasing by 50 - 60 Mb. 3 process memory dumps were taken with one before failures and then after each failure:

// Before failures

0:000> !address -summary

--- Usage Summary ---------------- RgnCount ----------- Total Size --------  %ofBusy %ofTotal
Free                                    267          76c50000 (   1.856 Gb)            92.79%
<unclassified>                          270           4d6f000 (  77.434 Mb)  52.45%     3.78% Image 620 31bf000 ( 49.746 Mb) 33.70% 2.43% Stack 60 1400000 ( 20.000 Mb) 13.55% 0.98% ActivationContextData 48 35000 ( 212.000 kb) 0.14% 0.01% NlsTables ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required