zoukankan      html  css  js  c++  java
  • Valgrind 内存泄漏工具

    Valgrind 是一款 Linux下(支持 x86、x86_64和ppc32)程序的内存调试工具,它可以对编译后的二进制程序进行内存使用监测(C语言中的malloc和free,以及C++中的new和delete),找出内存泄漏问题。

      Valgrind 中包含的 Memcheck 工具可以检查以下的程序错误:

      使用未初始化的内存 (Use of uninitialised memory)
      使用已经释放了的内存 (Reading/writing memory after it has been free’d)
      使用超过malloc分配的内存空间(Reading/writing off the end of malloc’d blocks)
      对堆栈的非法访问 (Reading/writing inappropriate areas on the stack)
      申请的空间是否有释放 (Memory leaks – where pointers to malloc’d blocks are lost forever)
      malloc/free/new/delete申请和释放内存的匹配(Mismatched use of malloc/new/new [] vs free/delete/delete [])
      src和dst的重叠(Overlapping src and dst pointers in memcpy() and related functions)
      重复free

      1、编译安装 Valgrind:

    wget http://valgrind.org/downloads/valgrind-3.4.1.tar.bz2
    tar xvf valgrind-3.4.1.tar.bz2
    cd valgrind-3.4.1/
    ./configure --prefix=/usr/local/webserver/valgrind
    make
    make install



      2、使用示例:对“ls”程序进程检查,返回结果中的“definitely lost: 0 bytes in 0 blocks.”表示没有内存泄漏。

    [root@xoyo42 /]# /usr/local/webserver/valgrind/bin/valgrind --tool=memcheck --leak-check=full ls /
    ==1157== Memcheck, a memory error detector.
    ==1157== Copyright (C) 2002-2008, and GNU GPL'd, by Julian Seward et al.
    ==1157== Using LibVEX rev 1884, a library for dynamic binary translation.
    ==1157== Copyright (C) 2004-2008, and GNU GPL'd, by OpenWorks LLP.
    ==1157== Using valgrind-3.4.1, a dynamic binary instrumentation framework.
    ==1157== Copyright (C) 2000-2008, and GNU GPL'd, by Julian Seward et al.
    ==1157== For more details, rerun with: -v
    ==1157== 
    bin   data0  dev  home  lib64       media  mnt  opt   root  selinux  sys       tcsql.db.idx.pkey.dec  ttserver.pid  var
    boot  data1  etc  lib   lost+found  misc   net  proc  sbin  srv      tcsql.db  tmp                    usr
    ==1157== 
    ==1157== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 5 from 1)
    ==1157== malloc/free: in use at exit: 28,471 bytes in 36 blocks.
    ==1157== malloc/free: 166 allocs, 130 frees, 51,377 bytes allocated.
    ==1157== For counts of detected errors, rerun with: -v
    ==1157== searching for pointers to 36 not-freed blocks.
    ==1157== checked 174,640 bytes.
    ==1157== 
    ==1157== LEAK SUMMARY:
    ==1157==    definitely lost: 0 bytes in 0 blocks.
    ==1157==      possibly lost: 0 bytes in 0 blocks.
    ==1157==    still reachable: 28,471 bytes in 36 blocks.
    ==1157==         suppressed: 0 bytes in 0 blocks.
    ==1157== Reachable blocks (those to which a pointer was found) are not shown.
    ==1157== To see them, rerun with: --leak-check=full --show-reachable=yes
  • 相关阅读:
    操作SQL Server Mobile数据库的常用C#代码
    关于asp.net c#中对cookie的操作
    javascript的常用string操作——join,replace和replaceAll的实现
    类似google日历的web日历控件——FullCalendar
    javascript的常用string操作——join,replace和replaceAll的实现
    类似google日历的web日历控件——FullCalendar
    Axure RP 6.5中文汉化包及汉化方法
    在python中使用cx_Oracle模块出现“DLL Load failed”的处理方法
    在python中使用cx_Oracle模块出现“DLL Load failed”的处理方法
    Axure RP 6.5中文汉化包及汉化方法
  • 原文地址:https://www.cnblogs.com/ahuo/p/4241013.html
Copyright © 2011-2022 走看看