# memory-leak-detector
**Repository Path**: sillycatcoding/memory-leak-detector
## Basic Information
- **Project Name**: memory-leak-detector
- **Description**: https://github.com/bytedance/memory-leak-detector,字节开源的native检测工具
- **Primary Language**: Java
- **License**: Apache-2.0
- **Default Branch**: master
- **Homepage**: None
- **GVP Project**: No
## Statistics
- **Stars**: 0
- **Forks**: 0
- **Created**: 2021-12-06
- **Last Updated**: 2024-06-02
## Categories & Tags
**Categories**: Uncategorized
**Tags**: None
## README
# MemoryLeakDetector
[](https://github.com/bytedance/memory-leak-detector/blob/master/LICENSE)
[](https://developer.android.com)
[](https://developer.android.com/about/dashboards)
MemoryLeakDetector 是西瓜视频基础技术团队开发的一款 native 内存泄漏监控工具,具有接入简单、监控范围广、性能优良、
稳定性好的特点。广泛用于字节跳动旗下各大 App 的 native 内存泄漏治理,收益显著!
## Apps using MemoryLeakDetector
## Get started
Step 1: Add the JitPack repository to your build file
```gradle
allprojects {
repositories {
maven { url 'https://jitpack.io' }
}
}
```
Step 2: Add the dependency
```gradle
dependencies {
implementation 'com.github.bytedance:memory-leak-detector:0.1.8'
}
```
Step 3: Add code for simple usage (This step is not necessary for using broadcast control)
```java
// 监控指定的so
Raphael.start(
Raphael.MAP64_MODE|Raphael.ALLOC_MODE|0x0F0000|1024,
"/storage/emulated/0/raphael", // need sdcard permission
".*libxxx\\.so$"
);
```
```java
// 监控整个进程
Raphael.start(
Raphael.MAP64_MODE|Raphael.ALLOC_MODE|0x0F0000|1024,
"/storage/emulated/0/raphael", // need sdcard permission
null
);
```
```shell
## 通过本地广播监控指定的so
## 0x0CF0400=Raphael.MAP64_MODE|Raphael.ALLOC_MODE|0x0F0000|1024
adb shell am broadcast -a com.bytedance.raphael.ACTION_START -f 0x01000000 --es configs 0xCF0400 --es regex ".*libXXX\\.so$"
```
```shell
## 监控整个进程(RaphaelReceiver 组件所在的进程)
## 0x0CF0400=Raphael.MAP64_MODE|Raphael.ALLOC_MODE|0x0F0000|1024
adb shell am broadcast -a com.bytedance.raphael.ACTION_START -f 0x01000000 --es configs 0xCF0400
```
Step 4: Print result
```java
// 代码控制
Raphael.print();
```
```shell
## 本地广播
adb shell am broadcast -a com.bytedance.raphael.ACTION_PRINT -f 0x01000000
```
Step 5: Analysis
```shell
## 聚合 report,该文件在 print/stop 之后生成,需要手动 pull 出来
## 用到离线符号符号化功能的,需将raphael.py里的addr2line改为自己本地的NDK路径
## -r: 日志路径, 必需,手机端生成的report文件
## -o: 输出文件名,非必需,默认为 leak-doubts.txt
## -s: 符号表目录,非必需,有符号化需求时可传,符号表文件需跟so同名,如:libXXX.so,多个文件需放在同一目录下儿
python3 library/src/main/python/raphael.py -r report -o leak-doubts.txt -s ./symbol/
## 数据格式说明
## 201,852,591 totals // 单指raphael拦截到的未释放的虚拟内存总和
## 118,212,424 libandroid_runtime.so
## 28,822,002 libhwui.so
## 24,145,920 libstagefright.so
## 15,679,488 libv8.cr.so
## 9,566,192 libc++_shared.so
## 25,536 libsqlite.so
## 12,288 libv8_libbase.cr.so
## 5,388,741 extras // raphael.py里预设了一些通用配置,可以通过修改规则进一步识别分组到extras里的数据
##
##
## bdb11000, 70828032, 66 => bdb11000是report里此堆栈第一次分配出的内存地址,70828032是report里此堆栈的内存总和,66是report里此堆栈的总次数
## 0x000656cf /system/lib/libc.so (pthread_create + 246)
## 0x0037c129 /system/lib/libart.so (art::Thread::CreateNativeThread(_JNIEnv*, _jobject*, unsigned int, bool) + 448)
## 0x00112137 /system/framework/arm/boot.oat (java.lang.Thread.nativeCreate + 142)
```
```shell
## 分析 maps
## -m: maps文件路径,必需
python3 library/src/main/python/mmap.py -m maps
```
Step 6: Stop monitoring
```java
// 代码控制
Raphael.stop();
```
```shell
## 广播控制
adb shell am broadcast -a com.bytedance.raphael.ACTION_STOP -f 0x01000000
```
## Extra
1. [Android Camera内存问题剖析](https://mp.weixin.qq.com/s/-oaN-bOqHDjN30UP1FMpgA)
2. [西瓜视频稳定性治理体系建设一:Tailor 原理及实践](https://mp.weixin.qq.com/s/DWOQ9MSTkKSCBFQjPswPIQ)
3. [西瓜视频稳定性治理体系建设二:Raphael 原理及实践](https://mp.weixin.qq.com/s/RF3m9_v5bYTYbwY-d1RloQ)
## Support
1. 在[GitHub issues](https://github.com/bytedance/memory-leak-detector/issues)上交流
2. 邮件: shentianzhou.stz@gmail.com
3. 微信: 429013449