Solved

LI-14190 - Looking for best memory leak procedure for linux

Posted on 2010-11-19
12
539 Views
Last Modified: 2012-05-10
We are using gcc --version 4.1.2.20080704 (Red Hat 4.1.2-48).  We have memory leaks that rival the water supply lines in Boston.  

We have considered making our own "new" and "delete" wrapper functions to track where this is happening, but prefer to use gdb/sdb or something else already written that would let us discover where we are not deleting objects, etc.  We are only somewhat familiar with gdb/sdb, but willing to try anything.

Anyone have suggestions/sites we can go to, to find a good procedure for finding these leaks?

Thanks!
0
Comment
Question by:dgintz1217
  • 4
  • 4
  • 2
  • +1
12 Comments
 
LVL 8

Accepted Solution

by:
Anthony2000 earned 500 total points
ID: 34175367
Have you thought of using something like Valgrind?

http://valgrind.org/docs/manual/quick-start.html#quick-start.intro
0
 
LVL 8

Expert Comment

by:Anthony2000
ID: 34175740
Another technique I used in my daemon:

from in my app, I read the /proc/<my process id>/mem (I don't remember the name of the entry) it contained the amount of memory my application was consuming.

I wrote a function that would read this value and I kept a static copy of it. Later in my code, I would call call a function I called CheckMemory(). This function compared the current /proc/<my process id>mem value of my memory consumption. if it increased/decreased, I wrote to syslog. I then ran Tail on the syslog output and watched my memory change.  The CheckMemory function was really a macro that passed the __LINE__ and __FILE__ information to the log. I could then place these instrategic places in my code.

I only suggest this because it is fairly easy to do. I might even be able to find the guts of my program and share them with you. I just have to look for it.

The benefit of using this is that you don't have to learn another tool. I was able to quickly find the areas of my program that were leaking memory. In many cases it was not my New() function that was causing the problem, but, rather places where I forgot to call the close function on an open handle, etc.

0
 
LVL 34

Expert Comment

by:Duncan Roe
ID: 34186589
I hacked Tcl's memory debug package so it could be used stand_alone (without Tcl) for just this purpose.
You need to ensure that every single module which uses malloc / realloc / free has the ckalloc.h header. (If you use calloc, you'll have to write your own macro (using mallocmemset)).
At any time you like, you can call Tcl_DumpActiveMemory to get a map of all allocated memory areas with file and line number where they were allocated. You should spot the leaks fairly quickly. Good luck!
ckalloc.h
tclCkalloc.c
0
Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

 
LVL 34

Expert Comment

by:Duncan Roe
ID: 34186613
You also have to build with -DTCL_MEM_DEBUG
0
 

Author Comment

by:dgintz1217
ID: 34191033
This is c++, so its "new" and "delete".  duncan, does your solution still apply?

Thanks!
0
 
LVL 34

Expert Comment

by:Duncan Roe
ID: 34191948
Sorry no. I missed that you mentioned "new" and "delete" in your original Q. These call constructors / destructors - way out of the scope of ckalloc
0
 

Author Comment

by:dgintz1217
ID: 34320288
So I will try the valgrind then at this point.
0
 

Author Comment

by:dgintz1217
ID: 34764904
Will I still have access to the question and answers in my account even if the question gets closed out?
Thanks!
0
 
LVL 34

Expert Comment

by:Duncan Roe
ID: 34765436
Yes - it'll be there. You can also bookmark it by touching "save"
0
 

Author Comment

by:dgintz1217
ID: 34765577
ok, we will let it close if I don't mark accept on something before 2/5.
THanks very much!
Richard
0
 
LVL 40

Expert Comment

by:evilrix
ID: 34824221
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Windows programmers of the C/C++ variety, how many of you realise that since Window 9x Microsoft has been lying to you about what constitutes Unicode (http://en.wikipedia.org/wiki/Unicode)? They will have you believe that Unicode requires you to use…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
The goal of this video is to provide viewers with basic examples to understand and use pointers in the C programming language.
This tutorial explains how to use the VisualVM tool for the Java platform application. This video goes into detail on the Threads, Sampler, and Profiler tabs.

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question