1. 首先添加这样的一段代码到头文件中。
#ifdef _DEBUG
#define DEBUG_CLIENTBLOCK new( _CLIENT_BLOCK, __FILE__, __LINE__)
#else
#define DEBUG_CLIENTBLOCK
#endif // _DEBUG
#define _CRTDBG_MAP_ALLOC
#include <stdlib.h>
#include <crtdbg.h>
#ifdef _DEBUG
#define new DEBUG_CLIENTBLOCK
#endif // _DEBUG
2. 在程序开始处,一般是main中
_CrtSetDbgFlag(_CRTDBG_ALLOC_MEM_DF|_CRTDBG_LEAK_CHECK_DF);
3. 将windbg路径添加到path中
4. gflags /i mem_leak.exe +ust
5. windbg -g mem_leak.exe
mem_leak退出之后会在windbg中打印:
CommandLine: mem_leak.exe
Symbol search path is: srv*D:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
ModLoad: 00400000 0041d000 mem_leak.exe
ModLoad: 772a0000 773dc000 ntdll.dll
ModLoad: 769e0000 76ab4000 C:\Windows\system32\kernel32.dll
ModLoad: 75540000 7558a000 C:\Windows\system32\KERNELBASE.dll
ModLoad: 5b5d0000 5b6f1000 C:\Windows\WinSxS\x86_microsoft.vc80.debugcrt_1fc8b3b9a1e18e3b_8.0.50727.6195_none_e4a70117006762dd\MSVCR80D.dll
ModLoad: 77420000 774cc000 C:\Windows\system32\msvcrt.dll
ModLoad: 5cbe0000 5ccde000 C:\Windows\WinSxS\x86_microsoft.vc80.debugcrt_1fc8b3b9a1e18e3b_8.0.50727.6195_none_e4a70117006762dd\MSVCP80D.dll
Detected memory leaks!
Dumping objects ->
f:\study\code\mem_leak\mem_leak\mem_leak.cpp(29) : {171} client block at 0x01509250, subtype 0, 100 bytes long.
Data: < > CD CD CD CD CD CD CD CD CD CD CD CD CD CD CD CD
Object dump complete.
eax=00000000 ebx=00000000 ecx=0012fe5c edx=00000020 esi=77377380 edi=77377340
eip=772e7094 esp=0012feac ebp=0012fec8 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
ntdll!KiFastSystemCallRet:
772e7094 c3 ret
6. 使用!heap命令。使用!heap -p -a <泄漏的地址>,这里是0x01509250
0:000> !heap -p -a 0x01509250
address 01509250 found in
_HEAP @ 1500000
HEAP_ENTRY Size Prev Flags UserPtr UserSize - state
01509218 0014 0000 [00] 01509230 00088 - (busy)
Trace: 179798
7731ddac ntdll!RtlAllocateHeap+0x00000274
5b5e2f4c MSVCR80D!_heap_alloc_base+0x0000005c
5b5eae15 MSVCR80D!_heap_alloc_dbg+0x000001f5
5b5eaba9 MSVCR80D!_nh_malloc_dbg+0x00000019
5b5d13bd MSVCR80D!operator new+0x0000001d
5b5d14e9 MSVCR80D!operator new[]+0x00000019
*** WARNING: Unable to verify checksum for mem_leak.exe
411560 mem_leak!ThreadProc+0x00000060
76a2ed6c kernel32!BaseThreadInitThunk+0x0000000e
7730377b ntdll!__RtlUserThreadStart+0x00000070
7730374e ntdll!_RtlUserThreadStart+0x0000001b
到这里我们的这次内存泄漏的分析就结束了。大部分这样的泄漏都可以通过这样的方式进行解决。
还有一些是那种内存不断增加泄漏都的内存使用的是
定时使用!heap -s 命令查看泄漏情况.然后使用!heap -stat -h **.
!heap -flt -s **
最后还是!heap -p -a查看堆栈
还有一种是使用_DPH_BLOCK_INFORMATION信息进行的详见:http://book.51cto.com/art/200812/102533.htm
大体的方法就是这些了。
测试代码:
// mem_leak.cpp : 定义控制台应用程序的入口点。
//
#include "stdafx.h"
#include <Windows.h>
#include <iostream>
#ifdef _DEBUG
#define DEBUG_CLIENTBLOCK new( _CLIENT_BLOCK, __FILE__, __LINE__)
#else
#define DEBUG_CLIENTBLOCK
#endif // _DEBUG
#define _CRTDBG_MAP_ALLOC
#include <stdlib.h>
#include <crtdbg.h>
#ifdef _DEBUG
#define new DEBUG_CLIENTBLOCK
#endif // _DEBUG
using namespace std;
ULONG WINAPI ThreadProc(LPVOID)
{
cout<<"thread running"<<endl;
char* pBuffer = new char[100];
while(1)
{
Sleep(1000);
}
cout<<"thread exit"<<endl;
return 0;
}
int _tmain(int argc, _TCHAR* argv[])
{
_CrtSetDbgFlag(_CRTDBG_ALLOC_MEM_DF|_CRTDBG_LEAK_CHECK_DF);
cout<<"intput q to teminate thread"<<endl;
HANDLE hthread = ::CreateThread(NULL,NULL,ThreadProc,NULL,NULL,NULL);
char ch;
cin>>ch;
if(ch != 'q')
{
cin.clear();
cin >> ch;
}
TerminateThread(hthread,0);
//system("pause");
return 0;
}