内存泄漏检测工具Valgrind交叉编译

目录

      • 一、Valgrind版本下载
      • 二、交叉编译脚本
      • 三、打包可执行程序和库:
      • 四、设备执行
      • 五、memcheck

一、Valgrind版本下载

官网下载地址: http://valgrind.org/downloads/old.html
解压:

tar -vxf valgrind-3.15.0.tar.bz2

二、交叉编译脚本

configure交叉编译介绍:

  • host 可认为 gcc 前缀
  • sysroot 作为 CFLGA 编译选项,gcc 会从 sysroot 的路径中查找需要的头文件和库文件
  • --prefix 安装目录

shell编译脚本build.sh:

#!/bin/sh

echo "Build..."
export PATH=$PATH:/opt/xxx/fsl-xxx/sysroots/i686-xxx-linux/usr/bin/xxx-xxx-linux
./configure --host=xxx-xxx-linux CFLAGS=--sysroot=/opt/xxx/fsl-xxx/sysroots/i686-xxx-linux --with-yielding-select=yes --prefix=${PWD}/OUT

make clean
make
make install

执行编译:

$ cd valgrind-3.15.0/
$ ./build.sh
$ ls OUT/
bin  include  lib  libexec  share

三、打包可执行程序和库:

打包脚本package.sh:

#!/bin/sh

cd ${PWD}/OUT
rm -rf ./usr
rm -rf ./valgrind.tar.gz
mkdir -p ./usr/lib/valgrind
mkdir -p ./usr/bin
cp ./bin/* ./usr/bin/ -rf
cp ./lib/valgrind/* ./usr/lib/valgrind/ -rf
rm ./usr/lib/valgrind/*.a
# strip
find ./usr/ -type f | xargs -I{} file "{}" | grep "ELF" | sed 's/\(.*\):.*/\1/' | xargs eu-strip
# tar
tar zcvf valgrind.tar.gz usr/
rm -rf ./usr
cd -

执行打包:

$ ./package.sh
$ ls OUT/
bin  include  lib  libexec  share  valgrind.tar.gz

四、设备执行

$ tar zxvf valgrind.tar.gz -C /
$ export VALGRIND_LIB=/usr/lib/valgrind
$ valgrind -h
usage: valgrind [options] prog-and-args

  tool-selection option, with default in [ ]:
    --tool=<name>             use the Valgrind tool named <name> [memcheck]

  basic user options for all Valgrind tools, with defaults in [ ]:
    -h --help                 show this message
    --help-debug              show this message, plus debugging options
    --version                 show version
    -q --quiet                run silently; only print error msgs
    -v --verbose              be more verbose -- show misc extra info
    --trace-children=no|yes   Valgrind-ise child processes (follow execve)? [no]
    --trace-children-skip=patt1,patt2,...    specifies a list of executables
                              that --trace-children=yes should not trace into
    --trace-children-skip-by-arg=patt1,patt2,...   same as --trace-children-skip=
                              but check the argv[] entries for children, rather
                              than the exe name, to make a follow/no-follow decision
    --child-silent-after-fork=no|yes omit child output between fork & exec? [no]
    --vgdb=no|yes|full        activate gdbserver? [yes]
                              full is slower but provides precise watchpoint/step
    --vgdb-error=<number>     invoke gdbserver after <number> errors [999999999]
                              to get started quickly, use --vgdb-error=0
                              and follow the on-screen directions
    --vgdb-stop-at=event1,event2,... invoke gdbserver for given events [none]
         where event is one of:
           startup exit valgrindabexit all none
    --track-fds=no|yes        track open file descriptors? [no]
    --time-stamp=no|yes       add timestamps to log messages? [no]
    --log-fd=<number>         log messages to file descriptor [2=stderr]
    --log-file=<file>         log messages to <file>
    --log-socket=ipaddr:port  log messages to socket ipaddr:port

  user options for Valgrind tools that report errors:
    --xml=yes                 emit error output in XML (some tools only)
    --xml-fd=<number>         XML output to file descriptor
    --xml-file=<file>         XML output to <file>
    --xml-socket=ipaddr:port  XML output to socket ipaddr:port
    --xml-user-comment=STR    copy STR verbatim into XML output
    --demangle=no|yes         automatically demangle C++ names? [yes]
    --num-callers=<number>    show <number> callers in stack traces [12]
    --error-limit=no|yes      stop showing new errors if too many? [yes]
    --exit-on-first-error=no|yes exit code on the first error found? [no]
    --error-exitcode=<number> exit code to return if errors found [0=disable]
    --error-markers=<begin>,<end> add lines with begin/end markers before/after
                              each error output in plain text mode [none]
    --show-error-list=no|yes  show detected errors list and
                              suppression counts at exit [no]
    -s                        same as --show-error-list=yes
    --keep-debuginfo=no|yes   Keep symbols etc for unloaded code [no]
                              This allows saved stack traces (e.g. memory leaks)
                              to include file/line info for code that has been
                              dlclose'd (or similar)
    --show-below-main=no|yes  continue stack traces below main() [no]
    --default-suppressions=yes|no
                              load default suppressions [yes]
    --suppressions= suppress errors described in 
    --gen-suppressions=no|yes|all    print suppressions for errors? [no]
    --input-fd=       file descriptor for input [0=stdin]
    --dsymutil=no|yes         run dsymutil on Mac OS X when helpful? [yes]
    --max-stackframe= assume stack switch for SP changes larger
                              than  bytes [2000000]
    --main-stacksize= set size of main thread's stack (in bytes)
                              [min(max(current 'ulimit' value,1MB),16MB)]

  user options for Valgrind tools that replace malloc:
    --alignment=<number>      set minimum alignment of heap allocations [16]
    --redzone-size=<number>   set minimum size of redzones added before/after
                              heap blocks (in bytes). [16]
    --xtree-memory=none|allocs|full   profile heap memory in an xtree [none]
                              and produces a report at the end of the execution
                              none: no profiling, allocs: current allocated
                              size/blocks, full: profile current and cumulative
                              allocated size/blocks and freed size/blocks.
    --xtree-memory-file=<file>   xtree memory report file [xtmemory.kcg.%p]

  uncommon user options for all Valgrind tools:
    --fullpath-after=         (with nothing after the '=')
                              show full source paths in call stacks
    --fullpath-after=string   like --fullpath-after=, but only show the
                              part of the path after 'string'.  Allows removal
                              of path prefixes.  Use this flag multiple times
                              to specify a set of prefixes to remove.
    --extra-debuginfo-path=path    absolute path to search for additional
                              debug symbols, in addition to existing default
                              well known search paths.
    --debuginfo-server=ipaddr:port    also query this server
                              (valgrind-di-server) for debug symbols
    --allow-mismatched-debuginfo=no|yes  [no]
                              for the above two flags only, accept debuginfo
                              objects that don't "match" the main object
    --smc-check=none|stack|all|all-non-file [all-non-file]
                              checks for self-modifying code: none, only for
                              code found in stacks, for all code, or for all
                              code except that from file-backed mappings
    --read-inline-info=yes|no read debug info about inlined function calls
                              and use it to do better stack traces.
                              [yes] on Linux/Android/Solaris for the tools
                              Memcheck/Massif/Helgrind/DRD only.
                              [no] for all other tools and platforms.
    --read-var-info=yes|no    read debug info on stack and global variables
                              and use it to print better error messages in
                              tools that make use of it (Memcheck, Helgrind,
                              DRD) [no]
    --vgdb-poll=      gdbserver poll max every  basic blocks [5000] 
    --vgdb-shadow-registers=no|yes   let gdb see the shadow registers [no]
    --vgdb-prefix=    prefix for vgdb FIFOs [/tmp/vgdb-pipe]
    --run-libc-freeres=no|yes free up glibc memory at exit on Linux? [yes]
    --run-cxx-freeres=no|yes  free up libstdc++ memory at exit on Linux
                              and Solaris? [yes]
    --sim-hints=hint1,hint2,...  activate unusual sim behaviours [none] 
         where hint is one of:
           lax-ioctls lax-doors fuse-compatible enable-outer
           no-inner-prefix no-nptl-pthread-stackcache fallback-llsc none
    --fair-sched=no|yes|try   schedule threads fairly on multicore systems [no]
    --kernel-variant=variant1,variant2,...
         handle non-standard kernel variants [none]
         where variant is one of:
           bproc android-no-hw-tls
           android-gpu-sgx5xx android-gpu-adreno3xx none
    --merge-recursive-frames=  merge frames between identical
           program counters in max  frames) [0]
    --num-transtab-sectors= size of translated code cache [32]
           more sectors may increase performance, but use more memory.
    --avg-transtab-entry-size= avg size in bytes of a translated
           basic block [0, meaning use tool provided default]
    --aspace-minaddr=0xPP     avoid mapping memory below 0xPP [guessed]
    --valgrind-stacksize= size of valgrind (host) thread's stack
                               (in bytes) [1048576]
    --show-emwarns=no|yes     show warnings about emulation limits? [no]
    --require-text-symbol=:sonamepattern:symbolpattern    abort run if the
                              stated shared object doesn't have the stated
                              text symbol.  Patterns can contain ? and *.
    --soname-synonyms=syn1=pattern1,syn2=pattern2,... synonym soname
              specify patterns for function wrapping or replacement.
              To use a non-libc malloc library that is
                  in the main exe:  --soname-synonyms=somalloc=NONE
                  in libxyzzy.so:   --soname-synonyms=somalloc=libxyzzy.so
    --sigill-diagnostics=yes|no  warn about illegal instructions? [yes]
    --unw-stack-scan-thresh=   Enable stack-scan unwind if fewer
                  than  good frames found  [0, meaning "disabled"]
                  NOTE: stack scanning is only available on arm-linux.
    --unw-stack-scan-frames=   Max number of frames that can be
                  recovered by stack scanning [5]
    --resync-filter=no|yes|verbose [yes on MacOS, no on other OSes]
              attempt to avoid expensive address-space-resync operations
    --max-threads=    maximum number of threads that valgrind can
                              handle [500]

  user options for Memcheck:
    --leak-check=no|summary|full     search for memory leaks at exit?  [summary]
    --leak-resolution=low|med|high   differentiation of leak stack traces [high]
    --show-leak-kinds=kind1,kind2,.. which leak kinds to show?
                                            [definite,possible]
    --errors-for-leak-kinds=kind1,kind2,..  which leak kinds are errors?
                                            [definite,possible]
        where kind is one of:
          definite indirect possible reachable all none
    --leak-check-heuristics=heur1,heur2,... which heuristics to use for
        improving leak search false positive [all]
        where heur is one of:
          stdstring length64 newarray multipleinheritance all none
    --show-reachable=yes             same as --show-leak-kinds=all
    --show-reachable=no --show-possibly-lost=yes
                                     same as --show-leak-kinds=definite,possible
    --show-reachable=no --show-possibly-lost=no
                                     same as --show-leak-kinds=definite
    --xtree-leak=no|yes              output leak result in xtree format? [no]
    --xtree-leak-file=         xtree leak report file [xtleak.kcg.%p]
    --undef-value-errors=no|yes      check for undefined value errors [yes]
    --track-origins=no|yes           show origins of undefined values? [no]
    --partial-loads-ok=no|yes        too hard to explain here; see manual [yes]
    --expensive-definedness-checks=no|auto|yes
                                     Use extra-precise definedness tracking [auto]
    --freelist-vol=          volume of freed blocks queue     [20000000]
    --freelist-big-blocks=   releases first blocks with size>= [1000000]
    --workaround-gcc296-bugs=no|yes  self explanatory [no].  Deprecated.
                                     Use --ignore-range-below-sp instead.
    --ignore-ranges=0xPP-0xQQ[,0xRR-0xSS]   assume given addresses are OK
    --ignore-range-below-sp=-  do not report errors for
                                     accesses at the given offsets below SP
    --malloc-fill=        fill malloc'd areas with given value
    --free-fill=<hexnumber>          fill free'd areas with given value
    --keep-stacktraces=alloc|free|alloc-and-free|alloc-then-free|none
        stack trace(s) to keep for malloc'd/free'd areas       [alloc-and-free]
    --show-mismatched-frees=no|yes   show frees that don't match the allocator? [yes]

  Extra options read from ~/.valgrindrc, $VALGRIND_OPTS, ./.valgrindrc

  Memcheck is Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
  Valgrind is Copyright (C) 2000-2017, and GNU GPL'd, by Julian Seward et al.
  LibVEX is Copyright (C) 2004-2017, and GNU GPL'd, by OpenWorks LLP et al.

  Bug reports, feedback, admiration, abuse, etc, to: www.valgrind.org.

五、memcheck

$ valgrind --tool=memcheck --error-limit=no --log-file=/tmp/test_exec_valgrind.log --quiet /usr/sbin/ntpd
$ cat /tmp/test_exec_valgrind.log 
==3068== Syscall param epoll_ctl(event) points to uninitialised byte(s)
==3068==    at 0x49BEF2C: epoll_ctl (syscall-template.S:82)
==3068==    by 0x125FA7: ??? (in /usr/sbin/ntpd)
==3068==    by 0x126133: ??? (in /usr/sbin/ntpd)
==3068==    by 0x129B6B: ??? (in /usr/sbin/ntpd)
==3068==    by 0x1218DB: ??? (in /usr/sbin/ntpd)
==3068==    by 0x122E5F: ??? (in /usr/sbin/ntpd)
==3068==    by 0x12EF1B: ??? (in /usr/sbin/ntpd)
==3068==    by 0x11BB1F: ??? (in /usr/sbin/ntpd)
==3068==    by 0x48E91AB: (below main) (libc-start.c:269)
==3068==  Address 0xfed3412c is on thread 1's stack
==3068==  in frame #0, created by epoll_ctl (syscall-template.S:81)
==3068== 
==3068== Syscall param epoll_ctl(event) points to uninitialised byte(s)
==3068==    at 0x49BEF2C: epoll_ctl (syscall-template.S:82)
==3068==    by 0x125FA7: ??? (in /usr/sbin/ntpd)
==3068==    by 0x126133: ??? (in /usr/sbin/ntpd)
==3068==    by 0x129A23: ??? (in /usr/sbin/ntpd)
==3068==    by 0x1218DB: ??? (in /usr/sbin/ntpd)
==3068==    by 0x122E5F: ??? (in /usr/sbin/ntpd)
==3068==    by 0x12EF1B: ??? (in /usr/sbin/ntpd)
==3068==    by 0x11BB1F: ??? (in /usr/sbin/ntpd)
==3068==    by 0x48E91AB: (below main) (libc-start.c:269)
==3068==  Address 0xfed3412c is on thread 1's stack
==3068==  in frame #0, created by epoll_ctl (syscall-template.S:81)
==3068== 
==3068== Syscall param epoll_ctl(event) points to uninitialised byte(s)
==3068==    at 0x49BEF2C: epoll_ctl (syscall-template.S:82)
==3068==    by 0x125FA7: ??? (in /usr/sbin/ntpd)
==3068==    by 0x126133: ??? (in /usr/sbin/ntpd)
==3068==    by 0x1294EB: ??? (in /usr/sbin/ntpd)
==3068==    by 0x12984F: ??? (in /usr/sbin/ntpd)
==3068==    by 0x1218DB: ??? (in /usr/sbin/ntpd)
==3068==    by 0x122E5F: ??? (in /usr/sbin/ntpd)
==3068==    by 0x12EF1B: ??? (in /usr/sbin/ntpd)
==3068==    by 0x11BB1F: ??? (in /usr/sbin/ntpd)
==3068==    by 0x48E91AB: (below main) (libc-start.c:269)
==3068==  Address 0xfed33f2c is on thread 1's stack
==3068==  in frame #0, created by epoll_ctl (syscall-template.S:81)
==3068== 
==3068== Syscall param epoll_ctl(event) points to uninitialised byte(s)
==3068==    at 0x49BEF2C: epoll_ctl (syscall-template.S:82)
==3068==    by 0x125FA7: ??? (in /usr/sbin/ntpd)
==3068==    by 0x129913: ??? (in /usr/sbin/ntpd)
==3068==    by 0x1218DB: ??? (in /usr/sbin/ntpd)
==3068==    by 0x122E5F: ??? (in /usr/sbin/ntpd)
==3068==    by 0x12EF1B: ??? (in /usr/sbin/ntpd)
==3068==    by 0x11BB1F: ??? (in /usr/sbin/ntpd)
==3068==    by 0x48E91AB: (below main) (libc-start.c:269)
==3068==  Address 0xfed3416c is on thread 1's stack
==3068==  in frame #0, created by epoll_ctl (syscall-template.S:81)
==3068== 
==3068== Syscall param epoll_ctl(event) points to uninitialised byte(s)
==3068==    at 0x49BEF2C: epoll_ctl (syscall-template.S:82)
==3068==    by 0x125F03: ??? (in /usr/sbin/ntpd)
==3068==    by 0x185257: ??? (in /usr/sbin/ntpd)
==3068==    by 0x185C37: ??? (in /usr/sbin/ntpd)
==3068==    by 0x17FAAF: ??? (in /usr/sbin/ntpd)
==3068==    by 0x17E5D7: ??? (in /usr/sbin/ntpd)
==3068==    by 0x17EB03: ??? (in /usr/sbin/ntpd)
==3068==    by 0x12F13B: ??? (in /usr/sbin/ntpd)
==3068==    by 0x11BB1F: ??? (in /usr/sbin/ntpd)
==3068==    by 0x48E91AB: (below main) (libc-start.c:269)
==3068==  Address 0xfed341cc is on thread 1's stack
==3068==  in frame #0, created by epoll_ctl (syscall-template.S:81)
==3068== 

你可能感兴趣的:(Linux系统调试,linux,memcheck,valgrind)