CN117478547A - Method, device, equipment and storage medium for detecting memory leakage of TCP protocol stack of DPU network card - Google Patents
Method, device, equipment and storage medium for detecting memory leakage of TCP protocol stack of DPU network card Download PDFInfo
- Publication number
- CN117478547A CN117478547A CN202311560432.3A CN202311560432A CN117478547A CN 117478547 A CN117478547 A CN 117478547A CN 202311560432 A CN202311560432 A CN 202311560432A CN 117478547 A CN117478547 A CN 117478547A
- Authority
- CN
- China
- Prior art keywords
- memory
- server
- dpu
- network card
- protocol stack
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000015654 memory Effects 0.000 title claims abstract description 113
- 238000000034 method Methods 0.000 title claims abstract description 70
- 238000012360 testing method Methods 0.000 claims abstract description 67
- 238000001514 detection method Methods 0.000 claims abstract description 64
- 238000013515 script Methods 0.000 claims description 35
- 230000008569 process Effects 0.000 claims description 34
- 238000004590 computer program Methods 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 12
- 238000004891 communication Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000036962 time dependent Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013135 deep learning Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/18—Protocol analysers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The embodiment of the application provides a method, a device, equipment and a storage medium for detecting memory leakage of a TCP protocol stack of a DPU network card, wherein the method comprises the following steps: determining at least two servers, wherein the at least two servers comprise a first server; acquiring a test environment; in the test environment, configuring an IP address and a test file for the DPU network card of the first server; and performing leakage detection on the memory of the TCP protocol stack operated by the DPU network card on the first server according to the IP address and the test file. Therefore, according to the protocol stack calling and detecting method in the embodiment of the application, whether the memory of the protocol stack has leakage phenomenon can be tested, and judgment is performed quickly according to the test result, so that compared with a traditional mode, the method has more pertinence and intuitiveness, and the efficiency of testing the memory leakage of the protocol stack of the DPU network card is improved.
Description
Technical Field
The embodiment of the application relates to the technical field of network communication, in particular to a method, a device, equipment and a storage medium for detecting memory leakage of a TCP protocol stack of a DPU network card.
Background
With the continuous development of service informatization, the performances of a CPU and a GPU are far behind the growth speed of data, and the DPU (Data Processing Unit, data processor) appears, so that the operations of the infrastructures are unloaded from the CPU to the DPU, the combination of software definition and hardware acceleration in the aspects of safety, communication, storage, virtualization and the like is realized, the computing resources of the CPU are released, and the application requirements are better supported.
However, in the process of using the DPU, there is a problem of memory leakage, and in the existing detection method, an execution machine running script needs to be additionally arranged, the memory occupation is collected once at intervals by logging in the test equipment for the process with high memory occupation rate of the test equipment, and the memory occupation is recorded and stored, so that the operation cost is increased, and the detection efficiency is reduced.
Disclosure of Invention
The embodiment of the application provides a method for detecting the leakage of the memory of a TCP protocol stack of a DPU network card, which can realize the test on whether the memory of the protocol stack has the leakage phenomenon or not, judge according to the test result and greatly improve the efficiency of the memory leakage test of the protocol stack.
In a first aspect, an embodiment of the present application provides a method for detecting memory leakage of a TCP protocol stack of a DPU network card, including:
determining at least two servers, wherein the at least two servers comprise a first server;
acquiring a test environment; in the test environment, configuring an IP address and a test file for the DPU network card operated by the first server;
and performing leakage detection on the memory of the TCP protocol stack of the DPU network card running on the first server according to the IP address and the test file.
Therefore, according to the protocol stack calling and detecting method in the embodiment of the application, whether the leakage phenomenon exists in the memory of the protocol stack can be tested, and judgment is performed quickly according to the test result.
In one possible implementation, the test file includes at least one of: TCP long/short connection transceiving scripts, UPD transceiving scripts, memory collection scripts and drawing scripts.
In one possible implementation, the IP address includes: the IP address and the traffic IP address are managed.
In one possible implementation manner, the at least two servers further comprise a second server, and the first server and the second server are connected through a network.
In one possible implementation manner, the performing leak detection on the memory of the TCP stack of the DPU network card running on the first server according to the IP address and the test file includes:
the test file comprises a memory detection interval and detection times;
and performing leakage detection on the memory of the TCP protocol stack of the DPU network card running on the first server according to the IP address, the memory detection interval and the detection times.
In one possible implementation manner, the detecting interval includes performing memory detection on at least three business processes at preset intervals, where the at least three business processes include: TCP long connection receive/transmit packets, short connection receive/transmit packets, and udp receive/transmit packets.
In a second aspect, an embodiment of the present application provides a device for detecting memory leakage of a TCP protocol stack of a DPU network card, including:
the system comprises a determining module, a first server and a second server, wherein the determining module is used for determining at least two servers, and the at least two servers comprise a first server;
the acquisition module is used for acquiring a test environment; in the test environment, configuring an IP address and a test file for the DPU network card operated by the first server;
and the detection module is used for detecting the leakage of the memory of the TCP protocol stack of the DPU network card running on the first server according to the IP address and the test file.
Therefore, according to the protocol stack calling and detecting method in the embodiment of the application, whether the leakage phenomenon exists in the memory of the protocol stack can be tested, and judgment is performed quickly according to the test result.
In one possible implementation, the test file includes at least one of: TCP long/short connection transceiving scripts, UPD transceiving scripts, memory collection scripts and drawing scripts.
In one possible implementation, the IP address includes: the IP address and the traffic IP address are managed.
In one possible implementation manner, the at least two servers further comprise a second server, and the first server and the second server are connected through a network.
In one possible implementation manner, the detection module is configured to:
the test file comprises a memory detection interval and detection times;
and performing leakage detection on the memory of the TCP protocol stack of the DPU net acarid running on the first server according to the IP address, the memory detection interval and the detection times.
In one possible implementation manner, the detection interval includes performing leak detection on at least three service processes at preset time intervals, where the at least three service processes include: TCP long connection send/receive packets, short connection send/receive packets, and udp send/receive packets.
In a third aspect, embodiments of the present application further provide an electronic device, including:
at least one processor;
and a memory communicatively coupled to the at least one processor;
the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor, so that the electronic device performs a memory detection method according to any one of the embodiments in the first aspect of the application.
In a fourth aspect, embodiments of the present application further provide a computer readable storage medium, where computer executable instructions are stored, where the computer executable instructions are configured to implement a memory detection method according to any one of the first aspect of the embodiments of the present application when executed by a processor.
In a fifth aspect, the present disclosure also provides a computer program product comprising computer-executable instructions for implementing a memory detection method according to any embodiment corresponding to the first aspect of the present disclosure when the computer-executable instructions are executed by a processor.
Therefore, according to the protocol stack calling and detecting method in the embodiment of the application, whether the leakage phenomenon exists in the memory of the protocol stack can be tested, and judgment is performed quickly according to the test result.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments of the present disclosure or the solutions in the prior art, the drawings that are required for the description of the embodiments or the prior art will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
Fig. 1 is a schematic diagram of a networking architecture for implementing a memory detection method according to an embodiment of the present application;
fig. 2 is a schematic diagram of a method for detecting a memory of a TCP protocol stack of a DPU network card according to an embodiment of the present disclosure;
fig. 3 is a schematic diagram of a memory detection configuration directory of a TCP protocol stack of a DPU network card according to an embodiment of the present disclosure;
FIG. 4 is a schematic diagram showing a time-varying process memory usage according to an embodiment of the present application;
FIG. 5 is a graph illustrating a time-dependent use of a further memory according to an embodiment of the present application;
FIG. 6 is a graph illustrating a time-dependent use of a further memory according to an embodiment of the present application;
fig. 7 is a schematic diagram of a memory detection device of a TCP protocol stack of a DPU network card according to an embodiment of the present disclosure;
fig. 8 is a memory detection electronic device of a TCP protocol stack of a DPU network card provided in an embodiment of the present application.
Detailed Description
When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary embodiments are merely examples of apparatus and methods consistent with aspects of embodiments of the present application as detailed in the accompanying claims.
The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the process of using the DPU, the problem of memory leakage exists, an execution machine operation script is required to be additionally arranged in the existing detection method, the memory occupation is collected once at intervals by logging in the test equipment for the process with high memory occupation rate of the test equipment, and the memory occupation is recorded and stored, so that the operation cost is increased, and the detection efficiency is reduced.
Aiming at the problems, the embodiment of the application provides a memory leakage detection method for a TCP protocol stack of a DPU network card, which aims to realize the memory leakage detection of the TCP protocol stack of the DPU network card and is used for testing scenes such as TCP long connection packet receiving/sending, short connection packet receiving/sending, udp packet receiving/sending and the like.
As shown in fig. 1, in order to implement the memory leak detection method shown in the embodiment of the present application, a built networking architecture diagram includes two Linux hosts (for installing a DPU network card under test), one end is a client (client), and the other end is a server. In practical application, clients and servers can construct communication connection to realize TCP short connection communication, TCP long connection communication, UDP transceiving communication and the like. In the embodiment of the application, the Linux host may also be called a server.
Exemplary, deployment is performed on the test networking and the test environment related to the embodiment of the application: two Linux hosts (provided with tested DPU network cards) are directly connected through the tested network cards. The Linux host installs python3 and necessary third party modules, such as gnuplot, sshpass tools.
The terms related to the embodiments of the present application are first described as an example below.
(1) DPU: a data processor is a specially designed hardware unit for data processing, whose main function is to achieve efficient, fast and reliable data processing and analysis. DPU plays an important role in various application scenes, and can provide excellent performance and efficiency from a data center to Internet of things equipment and from edge calculation to deep learning reasoning. The DPU is taken as a special data processing unit, is one of key technologies indispensable in the modern digital age, and has important significance for promoting technical innovation and application development in various fields.
(2) TCP short connection: the client initiates a connection request to the server, the server receives the connection request, the two parties establish TCP connection, the client sends a message to the server, and the server responds to the client message. The read-write is completed once, and at this time, any one of the two parties can initiate a close connection request, namely a close operation. The operation process of short connection: establish connection > transfer data > close connection.
(3) TCP long connection: the client initiates a connection request to the server, the server receives the connection request, the two parties establish TCP connection, the client sends a message to the server, and the server responds to the client message. And after the read-write is finished once, the TCP connection is not closed, and after long-time operation, the client initiates a connection closing request. TCP long connections refer to maintaining a connection so that it is not broken after a connection is successfully established even if both parties have no data to transmit. The operation steps of long connection are as follows: establish connection, > transmit data, > maintain connection.
(4) gnuplot: gnupport is a command line interactive drawing tool (command-driven interactive function plotting program).
(5) sshpass: the sshpass tool is installed on the client and the server, and the opposite-end server can be logged in through the sshpass.
Fig. 2 is a schematic diagram of a method for detecting memory leakage of a TCP protocol stack of a DPU network card according to an embodiment of the present application, where the method includes steps S201 to S203 as shown in fig. 2. Steps S201 to 203 are described in detail as follows.
Step S201, determining at least two servers, wherein the at least two servers comprise a first server;
in one possible implementation manner, the at least two servers further comprise a second server, and the first server and the second server are connected through a network.
In the embodiment of the application, two servers are respectively provided with python3 and gnupport tools, each host is provided with a tested DPU network card, and the two servers are directly connected through the tested network card. And both servers are test hosts.
Step S202, acquiring a test environment; in the test environment, configuring an IP address and a test file for the DPU network card operated by the first server;
in one possible implementation, the IP address includes: the IP address and the traffic IP address are managed. In the embodiment of the application, a test environment is firstly built between two servers, and a management port IP address and a network card service port IP address are configured for the servers.
By configuring the management port IP address, the two hosts can be ensured to access each other, and access is performed through the third party server, and the user can configure according to actual requirements by logging in the server through the management port IP.
By configuring the service port IP address, the server can be effectively ensured to directly access the service.
In one possible implementation, the test file includes at least one of: TCP long/short connection transceiving scripts, UPD transceiving scripts, memory collection scripts and drawing scripts.
As shown in fig. 3, a schematic diagram of a possible configuration directory provided in this embodiment of the present application is shown, where a test file includes a Python script and a sh script, the test file is copied to a test host, and a running script mem_check_c.sh (main function) is modified at a client to configure a directory where a server login information, a service port IP, and a script are located.
Executing mem_check_c.sh:
[root@localhost~]#./mem_check_c.sh interval count
parameter description:
interval is the memory detection interval;
count: detecting times;
and step 203, performing leak detection on the memory of the first server according to the IP address and the test file.
In one possible implementation manner, the performing leak detection on the memory of the TCP stack of the DPU network card running on the first server according to the IP address and the test file includes:
the test file comprises a memory detection interval and detection times;
and performing leakage detection on the memory of the TCP protocol stack of the DPU network card running on the first server according to the IP address, the memory detection interval and the detection times.
In one possible implementation manner, the detecting interval includes performing memory detection on at least three business processes at intervals of a preset time, where the at least three business processes include: TCP long connection receive/transmit packets, short connection receive/transmit packets, and udp receive/transmit packets.
It can be understood that after the service is run, the memory usage is collected for three service processes every interval until the detection count is reached. After the detection is finished, outputting a line graph, and generating three line graphs of the business processes changing along with time in a script execution catalog through gnupplot after the detection is finished, wherein the processes of a client and a server are generated; judging whether the corresponding process has memory leakage behavior according to the line diagram change trend.
The test environment principle built in the embodiment of the application is described in detail as follows.
Firstly, executing 'mem_check_cSh2500' on a client to start testing; the mem_check_c.sh script calls a TCP long connection monitoring script (tcp_Trs.py) of the opposite terminal service terminal and a TCP long connection multithreading sending script (tcp_Tsr.py) of the client terminal to establish a link and continuously send data packets; continuously calling a server TCP short connection monitoring script (epoll_thread.py) and a local TCP short connection multithreading sending script to repeatedly build a chain and send a data packet; finally, a server UDP monitoring script (udp_recv.py) and a local UDP multithreading sending script (udp_Tend.py) are called to continuously send UDP data packets;
after all protocol stack scripts are run, checking the memory use of the server and the client at intervals of interval through process numbers, and when the test times count is reached, drawing graphs of the memory use of the client process and the server process along with time by gnuplot respectively.
As shown in the line diagrams of fig. 4 to 6, the horizontal axis represents time (time), the vertical axis represents memory usage (memory use), if the memory usage of the line diagram is continuously increasing with time, it can be determined that the process has a risk of memory leakage; if alternating up and down (jagged) or the trend is smoother, no memory leak is considered to occur.
In fig. 4, (a) is a TCP long connection receiving process, the memory occupation of the server does not rise with time, the memory is unchanged, and no memory leakage exists. (b) For the short connection receiving process, the memory is lifted, the memory is correspondingly applied, the memory is released by lifting, the memory is continuously applied and released, and the balance is maintained, namely, no memory leakage and dynamic balance are realized. (c) For the UDP receiving process, before 225s, the memory usage is 50740, and the memory is not released; after 225s, the memory usage jumps, suddenly rises, i.e. a large number of connections are established at 225s, a large number of memories are applied, and after the connection is stable, the memory usage is stable, i.e. no memory leakage occurs.
In fig. 5, (a) is a TCP long connection sending process, (b) is a short connection sending process, and (c) is a UDP sending process, the memory occupation of the server does not rise with time, the memory is unchanged, and no memory leakage exists.
As shown in fig. 6, in the case where there is a memory leak detected by using the method of the embodiment of the present application, in fig. 6, the usage amount of the memory on the vertical axis continuously increases with the change of the time on the horizontal axis, and the memory always changes, which is the case where there is a memory leak.
Therefore, according to the protocol stack calling and detecting method in the embodiment of the application, whether the leakage phenomenon exists in the memory of the protocol stack can be tested, and judgment is performed quickly according to the test result.
Fig. 7 is a memory leak detection apparatus of a TCP protocol stack of a DPU network card provided in an embodiment of the present application, as shown in fig. 4, including: a determining module 701, an acquiring module 702 and a detecting module 703. Wherein,
a determining module 701, configured to determine at least two servers, where the at least two servers include a first server;
an acquisition module 702, configured to acquire a test environment; in the test environment, configuring an IP address and a test file for the DPU network card operated by the first server;
and the detection module 703 is configured to perform leak detection on the memory of the TCP stack of the DPU network card operated by the first server according to the IP address and the test file.
Therefore, according to the protocol stack calling and detecting method in the embodiment of the application, whether the leakage phenomenon exists in the memory of the protocol stack can be tested, and judgment is performed quickly according to the test result.
In one possible implementation, the test file includes at least one of: TCP long/short connection transceiving scripts, UPD transceiving scripts, memory collection scripts and drawing scripts.
In one possible implementation, the IP address includes: the IP address and the traffic IP address are managed.
In one possible implementation manner, the at least two servers further comprise a second server, and the first server and the second server are connected through a network.
In one possible implementation, the detection module 703 is configured to:
the test file comprises a memory detection interval and detection times;
and performing leakage detection on the memory of the TCP protocol stack of the DPU network card running on the first server according to the IP address, the memory detection interval and the detection times.
In one possible implementation, the detecting interval includes timing detection of at least three business processes, the at least three business processes including: TCP long connection receive/transmit packets, short connection receive/transmit packets, and udp receive/transmit packets.
Fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application, as shown in fig. 8, the electronic device 800 includes: memory 810 and processor 820.
Wherein the memory 810 stores a computer program executable by the at least one processor 820. The computer program is executed by at least one processor 820 to cause an electronic device to implement the method as provided in any of the embodiments above.
Wherein the memory 810 and the processor 820 may be connected by a bus 830.
The relevant descriptions and effects corresponding to the relevant description and effects corresponding to the method embodiments may be understood, and are not repeated herein.
An embodiment of the present application provides a computer readable storage medium having stored thereon a computer program that is executed by a processor to implement a method as in any of the embodiments corresponding to fig. 2-6.
The computer readable storage medium may be, among other things, ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
An embodiment of the present application provides a computer program product containing computer-executable instructions for implementing the method of any of the embodiments as corresponding to fig. 2 to 6 when executed by a processor.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of modules is merely a logical function division, and there may be additional divisions of actual implementation, e.g., multiple modules or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or modules, which may be in electrical, mechanical, or other forms.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope of the application being indicated by the following claims.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof.
Claims (10)
1. The method for detecting the memory leakage of the TCP protocol stack of the DPU network card is characterized by comprising the following steps of:
determining at least two servers, wherein the at least two servers comprise a first server;
acquiring a test environment; in the test environment, configuring an IP address and a test file for the DPU network card operated by the first server;
and performing leakage detection on the memory of the TCP protocol stack of the DPU network card running on the first server according to the IP address and the test file.
2. The method of claim 1, wherein the test file comprises at least one of: TCP long/short connection transceiving scripts, UDP transceiving scripts, memory collection scripts and drawing scripts.
3. The method of claim 1, wherein the IP address comprises: the IP address and the traffic IP address are managed.
4. The method of claim 1, wherein the at least two servers further comprise a second server, the first server and the second server being connected via a network.
5. The method according to any one of claims 1-4, wherein performing leak detection on a memory of a TCP protocol stack of a DPU network card running on the first server according to the IP address and the test file includes:
the test file comprises a memory detection interval and detection times;
and performing leakage detection on the memory of the TCP protocol stack of the DPU network card running on the first server according to the IP address, the memory detection interval and the detection times.
6. The method of claim 5, wherein the detection interval is a memory leak detection performed on at least three business processes at intervals of a preset time, and the at least three business processes include:
TCP long connection receive/transmit packets, short connection receive/transmit packets, and udp receive/transmit packets.
7. The device for detecting the memory leakage of the TCP protocol stack of the DPU network card is characterized by comprising the following components:
the system comprises a determining module, a first server and a second server, wherein the determining module is used for determining at least two servers, and the at least two servers comprise a first server;
the acquisition module is used for acquiring a test environment; in the test environment, configuring an IP address and a test file for the DPU network card operated by the first server;
and the detection module is used for detecting the leakage of the memory of the TCP protocol stack of the DPU network card running on the first server according to the IP address and the test file.
8. An electronic device, comprising:
at least one processor;
and a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor to cause the electronic device to perform the method of any one of claims 1 to 6.
9. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are adapted to carry out the method of any one of claims 1 to 6.
10. A computer program product comprising computer-executable instructions for performing the method of any one of claims 1 to 6 when the computer-executable instructions are executed by a processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311560432.3A CN117478547A (en) | 2023-11-21 | 2023-11-21 | Method, device, equipment and storage medium for detecting memory leakage of TCP protocol stack of DPU network card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311560432.3A CN117478547A (en) | 2023-11-21 | 2023-11-21 | Method, device, equipment and storage medium for detecting memory leakage of TCP protocol stack of DPU network card |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117478547A true CN117478547A (en) | 2024-01-30 |
Family
ID=89629094
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311560432.3A Pending CN117478547A (en) | 2023-11-21 | 2023-11-21 | Method, device, equipment and storage medium for detecting memory leakage of TCP protocol stack of DPU network card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117478547A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118264589A (en) * | 2024-04-11 | 2024-06-28 | 宁畅信息技术(杭州)有限公司 | Network card testing method and device, computer equipment and storage medium |
CN118467273A (en) * | 2024-07-09 | 2024-08-09 | 微晶数实(山东)装备科技有限公司 | DPU performance test method, system and medium |
-
2023
- 2023-11-21 CN CN202311560432.3A patent/CN117478547A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118264589A (en) * | 2024-04-11 | 2024-06-28 | 宁畅信息技术(杭州)有限公司 | Network card testing method and device, computer equipment and storage medium |
CN118467273A (en) * | 2024-07-09 | 2024-08-09 | 微晶数实(山东)装备科技有限公司 | DPU performance test method, system and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN117478547A (en) | Method, device, equipment and storage medium for detecting memory leakage of TCP protocol stack of DPU network card | |
CN108768730B (en) | Method and device for operating intelligent network card | |
CN109951359B (en) | Asynchronous scanning method and device for distributed network assets | |
CN109600280B (en) | Pressure testing system, method, device and computer readable storage medium | |
CN110943984B (en) | Asset safety protection method and device | |
CN111597099B (en) | Non-invasive simulation method for monitoring running quality of application deployed on cloud platform | |
CN111224980A (en) | Detection method and device for denial of service attack, electronic equipment and medium | |
CN114338068A (en) | Multi-node vulnerability scanning method and device, electronic equipment and storage medium | |
CN109873732B (en) | Test method and device for proxy server | |
CN110166322B (en) | Detection method and related device for metering automation terminal | |
CN110598419A (en) | Block chain client vulnerability mining method, device, equipment and storage medium | |
CN112235300B (en) | Cloud virtual network vulnerability detection method, system, device and electronic equipment | |
CN109214189B (en) | Method, device, storage medium and electronic equipment for identifying program bugs | |
CN116170235B (en) | Database optimized access method, system, equipment and medium | |
CN115454856B (en) | Multi-application security detection method, device, medium and electronic equipment | |
CN111130948A (en) | Network quality detection method and device | |
CN117176802A (en) | Full-link monitoring method and device for service request, electronic equipment and medium | |
CN108363922B (en) | Automatic malicious code simulation detection method and system | |
Biao et al. | FFUZZ: A fast fuzzing test method for stateful network protocol implementation | |
CN106789979B (en) | Method and device for diagnosing effectiveness of active domain name in IDC machine room | |
CN107342917B (en) | Method and apparatus for detecting network device performance | |
CN112541183B (en) | Data processing method and device, edge computing equipment and storage medium | |
CN113778780A (en) | Application stability determination method and device, electronic equipment and storage medium | |
CN113032255A (en) | Response noise recognition method, model, electronic device, and computer storage medium | |
CN117041114B (en) | Automatic test method and device for terminal communication protocol safety test |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |