10 More Discussions You Might Find Interesting
1. UNIX for Beginners Questions & Answers
I am looking at a log file which just tells me the filename and the line number inside that file that has the Error. What I am interested is knowing the encapsulating function. For example, here are the contents of the log file
Error: foo.file on line wxy
Error: foo.file... (3 Replies)
Discussion started by: kaaliakahn
3 Replies
2. Shell Programming and Scripting
Hi,
Using solaris 10 5.10 o/s
I am learning awk as I work here on the job.
What I need to do is isolate the trace file for the last 24 hours. After that I need to open those trace files and search for 'TNS-|ORA-' message from each one. These trace files MAY HAVE an occurance of them. I... (5 Replies)
Discussion started by: bdby
5 Replies
3. IP Networking
hi,
i want to get the hostname for the specified IP address.
# host www.google.com
www.google.com has address 173.194.69.104
www.google.com has address 173.194.69.105
www.google.com has address 173.194.69.106
www.google.com has address 173.194.69.147
www.google.com has address... (3 Replies)
Discussion started by: kavitha rao
3 Replies
4. Shell Programming and Scripting
I have a file which consist of some class 4 IP address as
172.16.112.50
172.16.112.50
172.16.112.50
172.16.112.100
192.168.1.30
172.16.112.100
172.16.112.50
172.16.112.50
172.16.112.50
i want to store them in pure decimal notations instead of the given dotted decimal formats
e.g.... (2 Replies)
Discussion started by: vaibhavkorde
2 Replies
5. UNIX for Dummies Questions & Answers
Hello Everyone.
I am trying to display contains of a file from a specific line to a specific line(let say, from line number 3 to line number 5). For this I got the shell script as shown below:
if ; then
if ; then
tail +$1 $3 | head -n $2
else
... (5 Replies)
Discussion started by: grc
5 Replies
6. Programming
Is/are there any function(s) in C that convert(s) character/ASCII/Decimal to binary and vice versa?
what about bcopy and strcpy? (1 Reply)
Discussion started by: Peevish
1 Replies
7. Shell Programming and Scripting
Hi,
I have a huge file & I want to add a specific text in column. But I want to add this text from a specific line number to a specific line number & another text in to another range of line numbers.
To be more specific: lets say my file has 1000 lines & 4 Columns. I want to add text "Hello"... (2 Replies)
Discussion started by: Ezy
2 Replies
8. Shell Programming and Scripting
Does anyone know if there is a util out there to run through a shell script and be able to trace the function call tree. I have inherited some code and the original author was ****mad**** keen on functions - even ones called only once!
If anyone knows of anything I would appreciate it - web... (3 Replies)
Discussion started by: ajcannon
3 Replies
9. UNIX for Dummies Questions & Answers
Hello,
does somebody knows about a function that would convert a date like:
YYMMDD into a date like YYYY-MM-DD ?
Thank you for your ideas
:) (9 Replies)
Discussion started by: Cecile
9 Replies
10. UNIX for Advanced & Expert Users
m using unix c with curses
im trying out the conversion of an existing code in c to i18n for the japanese language.
the problem is that, the input which is given as the japanese characters is not taken correctly.
and what it outputs is question marks(i.e. ???), equivalent to the number o f... (4 Replies)
Discussion started by: nirnay_s
4 Replies
leaks(1) BSD General Commands Manual leaks(1)
NAME
leaks -- Search a process's memory for unreferenced malloc buffers
SYNOPSIS
leaks pid | partial-executable-name [-nocontext] [-nostacks] [-exclude symbol] [-trace address]
DESCRIPTION
leaks identifies leaked memory -- memory that the application has allocated, but has been lost and cannot be freed. Specifically, leaks
examines a specified process's memory for values that may be pointers to malloc-allocated buffers. Any buffer reachable from a pointer in
writable global memory (e.g., __DATA segments), a register, or on the stack is assumed to be memory in use. Any buffer reachable from a
pointer in a reachable malloc-allocated buffer is also assumed to be in use. The buffers which are not reachable are leaks; the buffers
could never be freed because no pointer exists in memory to the buffer, and thus free() could never be called for these buffers. Such buf-
fers waste memory; removing them can reduce swapping and memory usage. Leaks are particularly dangerous for long-running programs, for even-
tually the leaks could fill memory and cause the application to crash.
leaks requires one parameter -- either the process ID or executable name of the process to examine. It also takes several arguments for mod-
ifying its behavior.
For each leaked buffer that is found, leaks prints the address of the leaked memory and its size. If leaks can determine that the object is
an instance of an Objective-C, CoreFoundation, or C++ class, or a CFType, it also specifies the name and type of the class, and the binary
image that implements the class. It then prints a string or hexadecimal representation of the contents of the memory, unless the -nocontext
option was specified.
If the MallocStackLogging environment variable was set when the application was launched, leaks also prints a stack trace describing where
the buffer was allocated.
OPTIONS
-nocontext Do not print the string or hex representation of leaked memory. Although that information can be useful for recognizing the
contents of the buffer and understanding why it might be leaked, it can also provide overwhelming detail, and could expose
confidential information from your process if you, for example, file bug reports with that output included.
-nostacks Do not print backtraces of leaked blocks even if the target process has the MallocStackLogging environment variable set.
-exclude symbol
Exclude leaked blocks whose backtraces include the specified symbol. This option can be repeated for multiple symbols. This
allows ignoring leaks that, for example, are allocated in libraries for which you do not have source code.
-trace address
Print chains of references from process 'roots' (e.g., global data, registers, or locations on stacks) to the given block.
This is useful for determining what is holding onto a buffer such that it has not been freed.
ENVIRONMENT
The leaks command may detect more leaks if the target process is run with the MallocScribble environment variable. If this variable is set
then when malloc blocks are deallocated they are filled with 0x55 bytes, thus overwriting any "stale" data such as pointers remaining in
those blocks. This reduces the number of false pointers remaining in the process memory.
EXIT STATUS
The leaks command exits with one of the following values:
0 No leaks were detected.
1 One or more leaks were detected.
>1 An error occurred.
SEE ALSO
malloc(3), heap(1), malloc_history(1), stringdups(1), vmmap(1), DevToolsSecurity(1)
The Xcode developer tools also include Instruments, a graphical application that can give information similar to that provided by leaks. The
Allocations instrument graphically displays dynamic, real-time information about the object and memory use in an application, including back-
traces of where the allocations occurred. The Leaks instrument performs memory leak analysis.
BSD
Mar. 16, 2013 BSD