GNU   davin.50webs.com/research
Bringing to you notes for the ages

       Main Menu          Research Projects         Photo Album            Curriculum Vitae      The Greatest Artists
    Email Address       Computer Games          Web Design          Java Training Wheels      The Fly (A Story)   
  Political Activism   Scruff the Cat       My Life Story          Smoking Cessation          Other Links      
Debugging Macros     String Class I     Linked List System I Java for C Programmers Naming Convention
    String Class II         How I use m4              Strings III                 Symmetrical I/O             Linked Lists II     
Run-Time Type Info   Virtual Methods      An Array System        Science & Religion            Submodes       
  Nested Packages      Memory Leaks    Garbage Collection      Internet & Poverty      What is Knowledge?
Limits of Evolution   Emacs Additions      Function Plotter           Romantic Love        The Next Big Thing
    Science Fiction     Faster Compilation Theory of Morality         Elisp Scoping               Elisp Advice      
  S.O.G.M. Pattern       Safe Properties         School Bullying          Charisma Control          Life and Death    
     Splitting Java          Multiple Ctors       Religious Beliefs         Conversation 1           Conversation 2    
   J.T.W. Language    Emacs Additions II      Build Counter             Relation Plotter          Lisp++ Language  
  Memory Leaks II   Super Constructors CRUD Implementation Order a Website Form There Is An Afterlife
More Occam's Razor C to Java Translator Theory of Morality II More Occam's Razor


A memory leak detection system for C++ Version II Free Stuff

Abstract

This article presents a memory leak detection system called D.M.M. (Debug Memory Management) for finding memory leaks in C++ programs when the symbol NDEBUG is not set. The system uses hash tables to keep track of allocated memory which is an improvement on using arrays to keep track of allocated memory which was what the earlier system used.

1. The system

  1. Here is the enum_debug_code enum:
  2. Here is the Root class:
  3. Here is the single-inheritance supporting Single class:
  4. Here is the multiple-inheritance supporting Multi class:
  5. Here is the DMM header file dmm.hh:
  6. Here is the DMM implementation file dmm.ch:
  7. Here is the Array template class:
  8. Here is the List template class:
  9. Here is the List_Node template class:
  10. Here is the List_Iterator template class:
  11. Here is the Boolean bool wrapper class:
  12. Here is the Integer int wrapper class:
  13. Here is the Double double wrapper class and the Float float wrapper class:
  14. Here is the String string wrapper class:
Here is a diagram of the hash table in action:
Hash table
Note that the size of the array is a prime number. The index into the array i is computed like so:
void* operator new (size_t size)
{
   void* address = ::calloc(size,1);
   unsigned int address_int = reinterpret_cast<unsigned int>(address);
   unsigned int i = address_int % ARRAY_SIZE_PRIME_NUMBER;
   Node* n = reinterpret_cast<Node*>(::malloc(sizeof(Node)));
   ASSERT(n != null);
   n->data = address;
   n->next = dmm_array[i];
   dmm_array[i] = n;
   return address;
}
Here is operator delete:
void operator delete (void* p)
{
   if (p == null)
   {
      return;
   }
   unsigned int address_int = reinterpret_cast<unsigned int>(p);
   unsigned int i           = address_int % ARRAY_SIZE_PRIME_NUMBER;
   Node* n_old = null;
   for (Node* n = dmm_array[i]; n != null; n = n->next)
   {
      void* q = n->data;
      if (q == p)
      {
         if (n_old == null)
         {
            dmm_array[i] = null;
         }
         else
         {
            n_old->next = n->next;
         }
         ASSERT(n != null);
         ::free(n);
         break;
      }
      n_old = n;
   }
   ::free(p);
}
Here is the debug_dmm_print function:

void debug_dmm_print()
{
   dmp::cout << "[\n";
   for (int i=0; i<ARRAY_SIZE_PRIME_NUMBER; i++)
   {
      for (Node* n = dmm_array[i]; n != null; n = n->next)
      {
         Root_G_C* r = reinterpret_cast<Root_G_C*>(n->data);
         dmp::cout << "   " << dmm_decode(r->debug_code) << '\n';
      }
   }
   dmp::cout << "]\n";
}

Here is the dmm_decode function:
#undef DCODE_CASE
#define DCODE_CASE(var) case var: return #var;

const char* dmm_decode(enum_debug_code code)
{
   switch (code)
   {
      DCODE_CASE(DCODE_GENERIC);

      DCODE_CASE(DCODE_BOOL);
      DCODE_CASE(DCODE_INT);
      DCODE_CASE(DCODE_QUICK);
      DCODE_CASE(DCODE_FLOAT);
      DCODE_CASE(DCODE_DOUBLE);
      DCODE_CASE(DCODE_STRING);

      DCODE_CASE(DCODE_XYI);
      DCODE_CASE(DCODE_XYQ);
      DCODE_CASE(DCODE_XYD);
      DCODE_CASE(DCODE_V3I);
      DCODE_CASE(DCODE_V3Q);
      DCODE_CASE(DCODE_V3D);

      DCODE_CASE(DCODE_BITMAP);
      DCODE_CASE(DCODE_SAMPLE);
      DCODE_CASE(DCODE_GULPER);

      DCODE_CASE(DCODE_LIST);
      DCODE_CASE(DCODE_LIST_NODE);
      DCODE_CASE(DCODE_LIST_ITERATOR);

      DCODE_CASE(DCODE_ARRAY);

      DCODE_CASE(DCODE_MENU_BUTTON);
      DCODE_CASE(DCODE_MENU_LIST);

      DCODE_CASE(DCODE_SPRITE);
      DCODE_CASE(DCODE_SPRITE_2);
      DCODE_CASE(DCODE_SPRITE_GRABBER_ACTION);

      DCODE_CASE(DCODE_SPRITE_EDITOR_RECT);

      DCODE_CASE(DCODE_WIDGET);
      DCODE_CASE(DCODE_FILE);

      DCODE_CASE(DCODE_TRI_RANDOM_OUTER);
      DCODE_CASE(DCODE_TRI_INPUT_DEVICE);
      DCODE_CASE(DCODE_TRI_PLAYER);
      DCODE_CASE(DCODE_TRI_PONG_FADER);
      DCODE_CASE(DCODE_TRI_PONG_BALL);
      DCODE_CASE(DCODE_TRI_SLIMER);
      DCODE_CASE(DCODE_TRI_STRATEGY);
      DCODE_CASE(DCODE_TRI_TRICKS_NODE);
      DCODE_CASE(DCODE_TRI_TRICKS);
      DCODE_CASE(DCODE_TRI_PAIR);

      DCODE_CASE(DCODE_R4_SAVE);
   }
   return "<Unknown>";
}
Back to Research Projects
This page has the following hit count:
| Main Menu | Research Projects | Photo Album | Curriculum Vitae | The Greatest Artists |
| Email Address | Computer Games | Web Design | Java Training Wheels | The Fly (A Story) |
| Political Activism | Scruff the Cat | My Life Story | Smoking Cessation | Other Links |
| Debugging Macros | String Class I | Linked List System I | Java for C Programmers | Naming Convention |
| String Class II | How I use m4 | Strings III | Symmetrical I/O | Linked Lists II |
| Run-Time Type Info | Virtual Methods | An Array System | Science & Religion | Submodes |
| Nested Packages | Memory Leaks | Garbage Collection | Internet & Poverty | What is Knowledge? |
| Limits of Evolution | Emacs Additions | Function Plotter | Romantic Love | The Next Big Thing |
| Science Fiction | Faster Compilation | Theory of Morality | Elisp Scoping | Elisp Advice |
| S.O.G.M. Pattern | Safe Properties | School Bullying | Charisma Control | Life and Death |
| Splitting Java | Multiple Ctors | Religious Beliefs | Conversation 1 | Conversation 2 |
| J.T.W. Language | Emacs Additions II | Build Counter | Relation Plotter | Lisp++ Language |
| Memory Leaks II | Super Constructors | CRUD Implementation | Order a Website Form | There Is An Afterlife |
| Occam's Razor | C to Java Translator | Theory of Morality II |More Occam's Razor
Last modified: Sun Sep 25 16:12:22 NZDT 2016
Best viewed at 800x600 or above resolution.
© Copyright 1999-2016 Davin Pearson.
Please report any broken links to