用mtrace检查内存泄漏

摘要:
http://blog.csdn.net/ixidof/article/details/6638066内存泄漏检查方法(适用于Linux)如果您希望阅读原始文档,请参阅glibcinfo的“分配调试”一章(执行infolibc);Glibc提供了一种检查内存泄漏的方法,前提是您的程序使用Glibc的标准函数来分配内存(例如malloc、alloc…):1.当需要内存泄漏时

http://blog.csdn.net/ixidof/article/details/6638066
内存泄漏检查方法(for Linux)
如果你更想读原始文档, 请参考glibc info的"Allocation Debugging" 一章 (执行info libc);
glibc提供了一个检查内存泄漏的方法, 前提是你的程序使用glibc的标准函数 分配内存(如malloc, alloc...):
1. 在需要内存泄漏检查的代码的开始调用void mtrace(void) (在mcheck.h中有声明). mtrace为malloc等函数安装hook, 用于记录内存分配信息. 在需要内存泄漏检查的代码的结束调用void muntrace(void).
注意: 一般情况下不要调用muntrace, 而让程序自然结束. 因为可能有些释放内存代码要到muntrace之后才运行.
2. 用debug模式编译被检查代码(-g或-ggdb)
3. 设置环境变量MALLOC_TRACE为一文件名, 这一文件将存有内存分配信息.
4. 运行被检查程序, 直至结束或muntrace被调用.
5. 用mtrace命令解析内存分配Log文件($MALLOC_TRACE) , (mtrace foo $MALLOC_TRACE, where foo is the executible name) ,如果有内存泄漏, mtrace会输出分配泄漏内存的代码位置,以及分配数量. 其他东西
1. 可以将mtrace, muntrace放入信号处理函数(USR1, USR2), 以动态地进行内存泄漏检查控制.
2. mtrace是个perl代码, 如果你对符号地址与代码文本的转换感兴趣, 可以读一下.
3. again, 尽量不要用muntrace()

For C++ Leak:
检查内存泄漏的方法除glibc提供外还可以试试一些专用的程序;如:
ccmalloc(http://www.inf.ethz.ch/personal/biere/projects/ccmalloc/ccmalloc-english.html)
mpatrol(http://www.cbmamiga.demon.co.uk/mpatrol/)
这俩个工具的功能相当不错,能对程序进行相当全面的检查
很奇怪,redhat 9 居然不带mtrace perl脚本,只好下载gcc源码编译了
wget --passive-ftpftp://rpmfind.net/linux/redhat/9/en/os/i386/SRPMS/glibc-2.3.2-11.9.src.rpm
rpm -ivh glibc*.src.rpm
cd /usr/src/redhat/SPECS/
rpmbuild -ba glibc-9.spec
cd /var/tmp/glibc-2.3.2-root/usr/bin/
cp mtrace /usr/bin/
调试方法如下:
vi a.c

  1. 1#include<mcheck.h>
  2. 2
  3. 3intmain()
  4. 4{
  5. 5mtrace();
  6. 6malloc(10);
  7. 7malloc(16);
  8. 8return0;
  9. 9}

$gcc -g a.c #记得编译带-g调试选项
$export MALLOC_TRACE=a.log
$./a.out
$unset MALLOC_TRACE #记得执行完后unset变量,否则可能运行其他命令可能覆盖log
$mtrace a.out a.log
Memory not freed:
-----------------
Address Size Caller
0x09b08378 0xa at /XXX/a.c:6
0x09b08388 0x10 at /XXX/a.c:7

可以看到,会显示未释放动态空间的代码具体位置.

MTRACE(3)                 Linux Programmer's Manual                MTRACE(3)

NAME top

       mtrace, muntrace - malloc tracing

SYNOPSIS top

       #include <mcheck.h>
       void mtrace(void);
       void muntrace(void);

DESCRIPTION top

       The mtrace() function installs hook functions for the memory-
       allocation functions (malloc(3), realloc(3) memalign(3), free(3)).
       These hook functions record tracing information about memory
       allocation and deallocation.  The tracing information can be used to
       discover memory leaks and attempts to free nonallocated memory in a
       program.
       The muntrace() function disables the hook functions installed by
       mtrace(), so that tracing information is no longer recorded for the
       memory-allocation functions.  If no hook functions were successfully
       installed by mtrace(), muntrace() does nothing.
       When mtrace() is called, it checks the value of the environment
       variable MALLOC_TRACE, which should contain the pathname of a file in
       which the tracing information is to be recorded.  If the pathname is
       successfully opened, it is truncated to zero length.
       If MALLOC_TRACE is not set, or the pathname it specifies is invalid
       or not writable, then no hook functions are installed, and mtrace()
       has no effect.  In set-user-ID and set-group-ID programs,
       MALLOC_TRACE is ignored, and mtrace() has no effect.

ATTRIBUTES top

       For an explanation of the terms used in this section, see
       attributes(7).
       ┌─────────────────────┬───────────────┬───────────┐
       │Interface            Attribute     Value     │
       ├─────────────────────┼───────────────┼───────────┤
       │mtrace(), muntrace() │ Thread safety │ MT-Unsafe │
       └─────────────────────┴───────────────┴───────────┘

CONFORMING TO top

       These functions are GNU extensions.

NOTES top

       In normal usage, mtrace() is called once at the start of execution of
       a program, and muntrace() is never called.
       The tracing output produced after a call to mtrace() is textual, but
       not designed to be human readable.  The GNU C library provides a Perl
       script, mtrace(1), that interprets the trace log and produces human-
       readable output.  For best results, the traced program should be
       compiled with debugging enabled, so that line-number information is
       recorded in the executable.
       The tracing performed by mtrace() incurs a performance penalty (if
       MALLOC_TRACE points to a valid, writable pathname).

BUGS top

       The line-number information produced by mtrace(1) is not always
       precise: the line number references may refer to the previous or
       following (nonblank) line of the source code.

EXAMPLE top

       The shell session below demonstrates the use of the mtrace() function
       and the mtrace(1) command in a program that has memory leaks at two
       different locations.  The demonstration uses the following program:
           $ cat t_mtrace.c
           #include <mcheck.h>
           #include <stdlib.h>
           #include <stdio.h>
           int
           main(int argc, char *argv[])
           {
               int j;
               mtrace();
               for (j = 0; j < 2; j++)
                   malloc(100);            /* Never freed--a memory leak */
               calloc(16, 16);             /* Never freed--a memory leak */
               exit(EXIT_SUCCESS);
           }
       When we run the program as follows, we see that mtrace() diagnosed
       memory leaks at two different locations in the program:
           $ cc -g t_mtrace.c -o t_mtrace
           $ export MALLOC_TRACE=/tmp/t
           $ ./t_mtrace
           $ mtrace ./t_mtrace $MALLOC_TRACE
           Memory not freed:
           -----------------
              Address     Size     Caller
           0x084c9378     0x64  at /home/cecilia/t_mtrace.c:12
           0x084c93e0     0x64  at /home/cecilia/t_mtrace.c:12
           0x084c9448    0x100  at /home/cecilia/t_mtrace.c:16
       The first two messages about unfreed memory correspond to the two
       malloc(3) calls inside the for loop.  The final message corresponds
       to the call to calloc(3) (which in turn calls malloc(3)).

SEE ALSO top

       mtrace(1), malloc(3), malloc_hook(3), mcheck(3)

COLOPHON top

       This page is part of release 4.07 of the Linux man-pages project.  A
       description of the project, information about reporting bugs, and the
       latest version of this page, can be found at
       https://www.kernel.org/doc/man-pages/.
GNU                              2015-03-02                        MTRACE(3)

免责声明:文章转载自《用mtrace检查内存泄漏》仅用于学习参考。如对内容有疑问,请及时联系本站处理。

上篇根据RadioButtonList动态显示隐藏DivUnity3D常用网络框架与实战解析 学习下篇

宿迁高防,2C2G15M,22元/月;香港BGP,2C5G5M,25元/月 雨云优惠码:MjYwNzM=

相关文章

Web 应用内存分析与内存泄漏定位【转】

作者:王下邀月熊    https://juejin.im/post/6844903508337164296 内存分析与内存泄漏定位是笔者现代 Web 开发工程化实践之调试技巧的一部分,主要介绍 Web 开发中需要了解的内存分析与内存泄露定位手段,本部分涉及的参考资料统一声明在Web 开发界面调试资料索引。 无论是分布式计算系统、服务端应用程序还是 iOS...

python 监控主机tcp状态脚本

脚本如下: #!/usr/bin/env python # Creator: Nicolas Magliaro - Version: 0.7 # date: 16/05/2018 import sys import json from optparse import OptionParser def _parse_args(): parse...

sql server2014中的内存优化表/内存表(续写)

【0】基本介绍 【0.1】概述介绍 官网:https://docs.microsoft.com/zh-cn/sql/relational-databases/in-memory-oltp/introduction-to-memory-optimized-tables?view=sql-server-ver15 内存优化表是使用 CREATE TABLE (...

java内存溢出与内存泄漏

内存溢出(OOM)   内存溢出相对于内存泄漏来说,尽管更容易被理解,但是同样的,内存溢出也是引发程序崩溃的罪魁祸首之一。  由于GC一直在发展,所有一般情况下,除非应用程序占用的内存增长速度非常快,造成垃圾回收已经跟不上内存消耗的速度,否则不太容易出现OOM的情况。  大多数情况下,GC会进行各种年龄段的垃圾回收,实在不行了就放大招,来一次独占式的Ful...

stressapptest使用介绍【转】

转自:https://blog.csdn.net/vichie2008/article/details/50457566 stressapptest 其是:Stressful Application Test (stressapptest) 的简称 Stressful Application Test试图让来自处理器和I/O到内存的数据尽量随机化,以创...

solidity中的memory和 storage详解

Solidity是一种智能合约高级语言,运行在Ethereum虚拟机(EVM)之上。这里我会讲解一下关键字storage和memory的区别。 storage的结构是在合约部署创建时,根据你的合约中状态变量的声明,就固定下来了,并且不能在将来的合约方法调用中改变这个结构。但是,storage中的内容是可以通过交易来改变的。这些交易调用因此将修改合约的状态。...