http://blog.csdn.net/ixidof/article/details/6638066
内存泄漏检查方法(for Linux) 
如果你更想读原始文档, 请参考glibc info的"Allocation Debugging" 一章 (执行info libc);
glibc提供了一个检查内存泄漏的方法, 前提是你的程序使用glibc的标准函数 分配内存(如malloc, alloc...): 
1. 在需要内存泄漏检查的代码的开始调用void mtrace(void) (在mcheck.h中有声明). mtrace为malloc等函数安装hook, 用于记录内存分配信息. 在需要内存泄漏检查的代码的结束调用void muntrace(void). 
注意: 一般情况下不要调用muntrace, 而让程序自然结束. 因为可能有些释放内存代码要到muntrace之后才运行. 
2. 用debug模式编译被检查代码(-g或-ggdb) 
3. 设置环境变量MALLOC_TRACE为一文件名, 这一文件将存有内存分配信息. 
4. 运行被检查程序, 直至结束或muntrace被调用. 
5. 用mtrace命令解析内存分配Log文件($MALLOC_TRACE) , (mtrace foo $MALLOC_TRACE, where foo is the executible name) ,如果有内存泄漏, mtrace会输出分配泄漏内存的代码位置,以及分配数量. 其他东西
1. 可以将mtrace, muntrace放入信号处理函数(USR1, USR2), 以动态地进行内存泄漏检查控制. 
2. mtrace是个perl代码, 如果你对符号地址与代码文本的转换感兴趣, 可以读一下. 
3. again, 尽量不要用muntrace()

For C++ Leak: 
检查内存泄漏的方法除glibc提供外还可以试试一些专用的程序;如: 
ccmalloc(http://www.inf.ethz.ch/personal/biere/projects/ccmalloc/ccmalloc-english.html) 
mpatrol(http://www.cbmamiga.demon.co.uk/mpatrol/) 
这俩个工具的功能相当不错,能对程序进行相当全面的检查 
很奇怪,redhat 9 居然不带mtrace perl脚本,只好下载gcc源码编译了
wget --passive-ftp ftp://rpmfind.net/linux/redhat/9/en/os/i386/SRPMS/glibc-2.3.2-11.9.src.rpm
rpm -ivh glibc*.src.rpm
cd /usr/src/redhat/SPECS/
rpmbuild -ba glibc-9.spec 
cd /var/tmp/glibc-2.3.2-root/usr/bin/
cp mtrace /usr/bin/
 
调试方法如下:
vi a.c

  1. 1 #include <mcheck.h>
  2. 2
  3. 3 int main()
  4. 4 {
  5. 5     mtrace();
  6. 6     malloc(10);
  7. 7     malloc(16);
  8. 8     return 0;
  9. 9 }

$gcc -g a.c #记得编译带-g调试选项 
$export MALLOC_TRACE=a.log 
$./a.out 
$unset MALLOC_TRACE #记得执行完后unset变量,否则可能运行其他命令可能覆盖log 
$mtrace a.out a.log 
Memory not freed:
-----------------
   Address     Size     Caller
0x09b08378      0xa  at /XXX/a.c:6
0x09b08388     0x10  at /XXX/a.c:7

可以看到,会显示未释放动态空间的代码具体位置.

MTRACE(3)                 Linux Programmer's Manual                MTRACE(3)

NAME         top

       mtrace, muntrace - malloc tracing

SYNOPSIS         top

       #include <mcheck.h>

       void mtrace(void);

       void muntrace(void);

DESCRIPTION         top

       The mtrace() function installs hook functions for the memory-
allocation functions (malloc(3), realloc(3) memalign(3), free(3)).
These hook functions record tracing information about memory
allocation and deallocation. The tracing information can be used to
discover memory leaks and attempts to free nonallocated memory in a
program. The muntrace() function disables the hook functions installed by
mtrace(), so that tracing information is no longer recorded for the
memory-allocation functions. If no hook functions were successfully
installed by mtrace(), muntrace() does nothing. When mtrace() is called, it checks the value of the environment
variable MALLOC_TRACE, which should contain the pathname of a file in
which the tracing information is to be recorded. If the pathname is
successfully opened, it is truncated to zero length. If MALLOC_TRACE is not set, or the pathname it specifies is invalid
or not writable, then no hook functions are installed, and mtrace()
has no effect. In set-user-ID and set-group-ID programs,
MALLOC_TRACE is ignored, and mtrace() has no effect.

ATTRIBUTES         top

       For an explanation of the terms used in this section, see
attributes(7). ┌─────────────────────┬───────────────┬───────────┐
Interface Attribute Value
├─────────────────────┼───────────────┼───────────┤
mtrace(), muntrace() │ Thread safety │ MT-Unsafe │
└─────────────────────┴───────────────┴───────────┘

CONFORMING TO         top

       These functions are GNU extensions.

NOTES         top

       In normal usage, mtrace() is called once at the start of execution of
a program, and muntrace() is never called. The tracing output produced after a call to mtrace() is textual, but
not designed to be human readable. The GNU C library provides a Perl
script, mtrace(1), that interprets the trace log and produces human-
readable output. For best results, the traced program should be
compiled with debugging enabled, so that line-number information is
recorded in the executable. The tracing performed by mtrace() incurs a performance penalty (if
MALLOC_TRACE points to a valid, writable pathname).

BUGS         top

       The line-number information produced by mtrace(1) is not always
precise: the line number references may refer to the previous or
following (nonblank) line of the source code.

EXAMPLE         top

       The shell session below demonstrates the use of the mtrace() function
and the mtrace(1) command in a program that has memory leaks at two
different locations. The demonstration uses the following program: $ cat t_mtrace.c
#include <mcheck.h>
#include <stdlib.h>
#include <stdio.h> int
main(int argc, char *argv[])
{
int j; mtrace(); for (j = 0; j < 2; j++)
malloc(100); /* Never freed--a memory leak */ calloc(16, 16); /* Never freed--a memory leak */
exit(EXIT_SUCCESS);
} When we run the program as follows, we see that mtrace() diagnosed
memory leaks at two different locations in the program: $ cc -g t_mtrace.c -o t_mtrace
$ export MALLOC_TRACE=/tmp/t
$ ./t_mtrace
$ mtrace ./t_mtrace $MALLOC_TRACE
Memory not freed:
-----------------
Address Size Caller
0x084c9378 0x64 at /home/cecilia/t_mtrace.c:12
0x084c93e0 0x64 at /home/cecilia/t_mtrace.c:12
0x084c9448 0x100 at /home/cecilia/t_mtrace.c:16 The first two messages about unfreed memory correspond to the two
malloc(3) calls inside the for loop. The final message corresponds
to the call to calloc(3) (which in turn calls malloc(3)).

SEE ALSO         top

       mtrace(1), malloc(3), malloc_hook(3), mcheck(3)

COLOPHON         top

       This page is part of release 4.07 of the Linux man-pages project.  A
description of the project, information about reporting bugs, and the
latest version of this page, can be found at
https://www.kernel.org/doc/man-pages/. GNU 2015-03-02 MTRACE(3)

用mtrace检查内存泄漏的更多相关文章

  1. mtrace检查内存泄漏

    内存泄漏检查方法(for Linux) 如果你更想读原始文档, 请参考glibc info的"Allocation Debugging" 一章 (执行info libc);glib ...

  2. c++检查内存泄漏

    使用_CrtDumpMemoryLeaks()函数检查内存泄漏 #include <cstdio> #include <cstdlib> #include <crtdbg ...

  3. iOS开发 如何检查内存泄漏

    本文转载至 http://mobile.51cto.com/iphone-423391.htm 在开发的时候内存泄漏是不可避免的,但是也是我们需要尽量减少的,因为内存泄漏可能会很大程度的影响程序的稳定 ...

  4. ios--->instrument的leaks来检查内存泄漏

    instrument来检查内存泄漏 1.第一步打开 或者: 然后选择leaks 2.若此时编译出现如下问题,可能是非debug版本造成的,切换成debug版本即可 打开工程的Edit Scheme选项 ...

  5. UWP开发入门(十三)——用Diagnostic Tool检查内存泄漏

    因为.NET的垃圾回收机制相当完善,通常情况下我们是不需要关心内存泄漏的.问题人一但傻起来,连自己都会害怕,几个页面跳啊跳的,内存蹭蹭的往上涨,拉都拉不住.这种时候我们就需要冷静下来,泡一杯热巧克力. ...

  6. Android内存管理(14)*使用开源库LeakCanary检查内存泄漏

    1.简介 它是一个非常简单好用的内存泄漏检测工具库.可以轻松检测Activity,Fragment的内存泄漏.如果有内存泄漏,它会产生一个通知. 2.资料 官网: https://github.com ...

  7. 用windbg 检查内存泄漏

    1.下载编译https://github.com/0cch/luadbg 2.编写脚本1.txt .load luadbg_v15*.sympath+ srv*c:\MyServerSymbols*h ...

  8. valgrind 代码检查,内存泄漏

    使用平台 linux 下载 http://valgrind.org/ 文档 http://valgrind.org/docs/manual/manual.html 博客 https://www.osc ...

  9. malloc钩子和内存泄漏工具mtrace、Valgrind

    一:malloc钩子函数 static void* (* old_malloc_hook) (size_t,const void *);static void (* old_free_hook)(vo ...

随机推荐

  1. 在纯HTML的静态网页中添加一段统计网页访问量的JAVA Script代码?

    如何在网站上进行流量统计呢,可以找第三方服务网站去注册,但也可以在网站上直接添加代码,只需将以下代码copy到你的网页中,复制到</body>之前就可以啦!是不是很简单啊! <scr ...

  2. JS Resizable Panel 练习

    Resizable Panel HTML <!doctype html> <html> <head> <title>Resizable Panel< ...

  3. Developing a plugin framework in ASP.NET MVC with medium trust

    http://shazwazza.com/post/Developing-a-plugin-framework-in-ASPNET-with-medium-trust.aspx January 7, ...

  4. memcached 系列2:memcached实例(转载)

    在上一篇文章,我们讲了,为什么要使用memched做为缓存服务器(没看的同学请点 这里).下面让我们以memcached-1.2.1-win32版本的服务组件(安装后是以一个windows服务做dae ...

  5. 回家前的挣扎——SQLite增删改查

    引言 最后一天,公司就两个人,也不知道弄点什么,就在网上找了Sqlite的文档,看了看,这里也是现学现卖,给自己找点事做,感觉时间过得还是比较快的,不然焦急等待,滋味不好受啊. SQLite简介 SQ ...

  6. linux下查看当前用户的 三个命令

    linux下查看当前用户的 三个命令 1,whoami; 2,id -un; 3,who -H  可以列出当前所有的    NAME (用户名)    LINE (窗口列表)    TIME(开启时间 ...

  7. PHP函数之日期时间函数date()使用详解

    date()函数是我们在php开发中常碰到并且会使用到的一个日期函数,下面我来给大家介绍date()函数的一些基本扮靓和方法,有需要了解的朋友可进入参考   日期时间函数是PHP 的核心组成部分.无需 ...

  8. js数组常用操作方法小结(增加,删除,合并,分割等)

    本文实例总结了js数组常用操作方法.分享给大家供大家参考,具体如下: var arr = [1, 2, 3, 4, 5]; //删除并返回数组中第一个元素 var theFirst = arr.shi ...

  9. 利用nginx向现有网站添加登录验证功能(不添加修改现有网站代码)

    在不改变现有网站代码的前提下加入验证功能: 1.假设现有网站后端nodejs,端口3000,nginx配置如下 server { listen 80; server_name localhost; l ...

  10. 关于Java类加载双亲委派机制的思考(附一道面试题)

    预定义类加载器和双亲委派机制 JVM预定义的三种类型类加载器: 启动(Bootstrap)类加载器:是用本地代码实现的类装入器,它负责将 <Java_Runtime_Home>/lib下面 ...