目的:
本文是《一種定位內存泄露的方法(
Solaris
)》對應的
Linux
版本,調試器使用
gdb
。主要介紹實例部分。其他請見《一種定位內存泄露的方法(
Solaris
)》。
實例:
模擬
new
失敗的程序:
#include <stdexcept>
class ABC
{
public:
??????? virtual ~ABC(){}
??????? int i;
??????? int j;
};
?
void f()
{
??????? for (int i = 0; i < 1000; ++i)
??????? {
??????????????? ABC* p = new ABC;
??????? }
??????? throw std::bad_alloc();
}
?
int main()
{
??????? f();
??????? return 0;
}
1)
編譯運行此段代碼。產(chǎn)生一個
core
文件
2)
用
gdb
打開這個
core
文件:
gdb a.out core
(gdb)run
Starting program: /test/new_fail/a.out
terminate called after throwing an instance of 'std::bad_alloc'
? what():? std::bad_alloc
?
Program received signal SIGABRT, Aborted.
0x00007ffff733f645 in raise () from /lib64/libc.so.6
(gdb)info proc
process 10683
cmdline = '/test/new_fail/a.out'
cwd = '/test/new_fail'
exe = '/test/new_fail/a.out'
(gdb) shell pmap 10683
10683: a.out
START?????????????? SIZE???? RSS???? PSS?? DIRTY??? SWAP PERM MAPPING
0000000000400000????? 4K????? 4K????? 4K????? 0K????? 0K r-xp /test/new_fail/a.out
0000000000600000????? 4K????? 4K????? 4K????? 4K????? 0K r--p /test/new_fail/a.out
0000000000601000????? 4K????? 4K????? 4K????? 4K????? 0K rw-p /test/new_fail/a.out
0000000000602000??? 132K???? 32K???? 32K???? 32K????? 0K rw-p [heap]
…
(略)
Total:??????????? 11468K?? 1048K??? 684K??? 180K????? 0K
?
360K writable-private, 11108K readonly-private, 0K shared, and 1048K referenced
?
可以看到
heap
空間的起始地址是
0x0000000000602000
,共
132K
字節(jié),即
132*1024=135168
字節(jié)。
3)
因為是
64
位應用程序,所以指針占
8
字節(jié)。所以需要遍歷的指針個數(shù)為
135168/8=16896
。
4)
將結果輸出到日志文件
gdb.txt
中:
(gdb) set height 0
(gdb) set logging on
Copying output to gdb.txt.
(gdb) x/16896a 0x0000000000602000
gdb.txt
的內容:
0x602000:?????? 0x0???? 0x21
0x602010:?????? 0x400b30 <_ZTV3ABC+16>? 0x0
0x602020:?????? 0x0???? 0x21
0x602030:?????? 0x400b30 <_ZTV3ABC+16>? 0x0
….
5)
過濾
gdb.txt
:
awk '{print $2"/n"$3}' gdb.txt|c++filt|grep vtable>gdb_vtable.txt
gdb_vtable.txt
的內容為:
<vtable for ABC+16>
<vtable for ABC+16>
<vtable for ABC+16>
<vtable for ABC+16>
….
6)
將
gdb_vtable.txt
的內容導入到
SQLServer
中(如果記錄不多,可以用
Excel
代替)。表名為
gdb_vtable
,第一列
Col001
為符號。對其分組求和:
select Col001, count(1) quantity from gdb_vtable
group by Col001
order by quantity desc
結果為:
Col001????????????????????????????????????????????????????????????????????????????????????quantity
<vtable for ABC+16>????? ?????????????????????????????????????????????? ???????? 1000
<vtable for std::bad_alloc@@GLIBCXX_3.4+16>??????????????? 1
可知
core
里有
1000
個
ABC
,遍歷使用
ABC
的代碼,可知存在泄漏。