一种面向云计算的服务器内存泄漏检测方法An Approach to Memory Leak Detecting for Server Oriented to Virtualized Cloud Computing Platform
姜军;肖如良;
摘要(Abstract):
云计算服务要求虚拟化服务器能提供可靠的系统性能,而服务器软件的内存泄漏会使整个服务体系变得不稳定,大大增加维护成本.基于Xen虚拟化平台设计了一个可靠的内存泄漏检测系统,首先对Xen内核进行修改,新增超级调用接口,然后构建了调用这些接口的基本组件,并对Windows和Linux服务器环境做了具体的实现.经过测试,系统能够在x86架构的计算机上正常运行,并验证了各项功能.
关键词(KeyWords): 云计算服务;Xen虚拟化;内存泄漏
基金项目(Foundation): 福建省科技计划重大项目(2011H6006)
作者(Authors): 姜军;肖如良;
参考文献(References):
- [1]Wodon P L.Data structure and storage allocation[J].BIT Numerical Mathematics,1969,9:270-282.
- [2]Nick Mitchell,Gary Sevitsky.LeakBot:an automated and lightweight tool for diagnosing memory leaks in large java applications[J].Lecture Notes in Computer Science,2003,2743:351-377.
- [3]Qin Feng,Lu Shan,Zhou Yuanyuan.Safemem:exploiting ECC-memory for detecting memory leaks and memory corruption during production runs[C]∥In Proceedings of the 11th International Symposium on High-Performance Computer Architecture,2005.Washington,DC:IEEE Computer Society,2005:291-302.
- [4]Song Yi bing,Cheng Jian.Framework of server and storage virtualization[J].Communications in Computer and Information Science,2012,308:15-20.
- [5]Amazon.Amazon EC2[EB/OL].[2013-03-10].http:∥aws.amazon.com/cn/ec2.
- [6]Xen.Xen homepage[EB/OL].[2013-03-10].http:∥www.xen.org.
- [7]Roberto R Expósito,Guillermo L Taboada,Sabela Ramos,et al.Evaluation of messaging middleware for high-performance cloud computing[J].(2012-09-01).[2013-03-10].http:∥link.springer.com/content/pdf/10.1007%2Fs00779-012-0605-3.pdf.
- [8]Robert Basmadjian,Hermann De Meer,Ricardo Lent,et al.Cloud computing and its interest in saving energy:the use case of a private cloud[EB/OL].(2012-06-08).[2013-03-10].http:∥www.journalofcloudcomputing.com/content/1/1/5.
- [9]Anthony Desnos,Eric Filiol,Ivan Lefou.Detecting(and creating!)a HVM rootkit(aka BluePill-like)[J].Journal in Computer Virology,2011,7(1):23-49.
- [10]Microsoft.——cdecl[EB/OL].[2013-03-10].http:∥msdn.microsoft.com/en-us/library/zkwh 89ks(v=vs.110).aspx.
- [11]Binu A,Santhosh Kumar G.Virtualization techniques:a methodical review of XEN and KVM[J].Communications in Computer and Information Science,2011,190:399-410.
- [12]Abimbola A A,Munoz J M,Buchanan W J.NetHost-sensor:monitoring a target host’s application via system calls[J].Information Security Technical ReportⅡ,2006,11(4):166-175.
- [13]杨广翔.Linux进程热升级[EB/OL].(2011-12-22).[2013-03-10].http:∥www.ibm.com/developerworks/cn/linux/l-cn-prcss-hotupgrd/index.html.