You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/windows-server/performance/troubleshoot-application-service-memory-leaks.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,8 +22,6 @@ Apart from this event, you also notice high memory consumption by checking live
22
22
23
23
The following troubleshooting process is helpful for both scenarios where first-party and third-party processes might be leaking memory. For first-party processes, you can use the public symbol store available. However, if you can't see the actual function in a third-party process, you can engage the vendor for further checking. Even if the function doesn't show, the allocation stack should indicate a third-party module.
24
24
25
-
A few SysInternals tools and Windows Performance Toolkit are used.
26
-
27
25
## Before you begin
28
26
29
27
You might see the following examples in the system event log and Task Manager.
@@ -64,7 +62,7 @@ During this stage, if the memory usage is growing over time and not releasing, w
64
62
65
63
At this point, with a leak pattern, you need to determine the leaking memory type. Open VMMap and select the process that has been identified as the leaking memory.
66
64
67
-
### Determining the memory type
65
+
### Determin the memory type
68
66
69
67
When virtual allocation memory is leaked, it's represented in VMMap as **Private Data**:
70
68
@@ -154,9 +152,9 @@ Heap tracing was successfully enabled for process **VirtMemTest64.exe**.
You can delete the registry key after the troubleshooting or set the value to `0`.
@@ -193,9 +191,9 @@ Replicate the following view by replacing the process with the one you've identi
193
191
194
192
Replicate the following view by replacing the process with the one you've already identified as relevant. Ensure that the **Handle** and **Stack** columns are on the left of the gold/yellow line. Drill down by expanding the stack, and you'll see the function that shows the allocation of heap memory. The driver listed before (up) the function is the one calling to that operation.
195
193
194
+
> [!NOTE]
195
+
> If you don't see the heap allocation graph, it's because the registry key isn't set correctly. Review the steps.
196
+
196
197
:::image type="content" source="./media/troubleshoot-application-service-memory-leaks/trace-data-heap-allocation.png" alt-text="Screenshot of the analysis of the trace data for heap allocation memory." lightbox="./media/troubleshoot-application-service-memory-leaks/trace-data-heap-allocation.png":::
197
198
198
199
:::image type="content" source="./media/troubleshoot-application-service-memory-leaks/heap-allocation-function-driver.png" alt-text="Screenshot of the analysis of the trace data for heap allocation memory with the drive listed." lightbox="./media/troubleshoot-application-service-memory-leaks/heap-allocation-function-driver.png":::
199
-
200
-
> [!NOTE]
201
-
> If you don't see the heap allocation graph, it's because the registry key isn't set correctly. Review the steps.
0 commit comments