memory-dump

How to debug Azure Web App memory leaks?

爱⌒轻易说出口 提交于 2021-02-06 20:06:46
问题 There is the excellent Start Profiling button in the SCM portal that works perfect for CPU. Then there are some sources that refer to a Download GC Dump button: https://stackoverflow.com/a/27987593/647845 But that doesn't seem to be available anymore. Then there is the Download memory dump button. But for now I can't figure out how/if I can see the Type / Refcount / Size stastistics that I'm used too. What is the recommended way to look for memory leaks in a C# Azure Web App? 回答1: Try using

Parse the crash dump in WinDbg for private bytes (other than managed heap)?

家住魔仙堡 提交于 2020-01-13 09:37:42
问题 I want to parse the full crash dump (*.dmp) file and get the private bytes data. I know that VMMap of SysInternals can tell me how much my private bytes, heap etc are all but what I need is if I have the dump, I should be able to parse it and get the Heap (managed Heap) Structure and data in the heap. I am already done with this by reading the PEB and then walking through heaps. What I am not able to figure out is how to read the private bytes (other than Heap, which is supposed to be the

investigating memory-leaks in azure without powershell

时光怂恿深爱的人放手 提交于 2020-01-06 01:28:45
问题 Can I investigate memory-leaks in azure without powershell? I know it is discribed to download memorydumps with use of powershell-commands on several places on the web but I just hate to work with error-prone handtyped commands. 回答1: Yes, actually it is very easy. Navigate to the website in question with use of the internal url. For example http://yourwebsitename.azurewebsites.net/. Then add the letters .scm. after your websitename. you 'll then get : http://yourwebsitename.scm.azurewebsites

Dump memory of a process

a 夏天 提交于 2019-12-29 13:31:28
问题 When reading the /proc/$PID/maps you get the mapped memory regions. Is ther a way to dump one of this regions? $ cat /proc/18448/maps ...[snip]... 0059e000-005b1000 r-xp 00000000 08:11 40 /usr/local/lib/libgstlightning.so.0.0.0 005b1000-005b2000 r--p 00012000 08:11 40 /usr/local/lib/libgstlightning.so.0.0.0 005b2000-005b3000 rw-p 00013000 08:11 40 /usr/local/lib/libgstlightning.so.0.0.0 ...[snip]... Thanks 回答1: Nah! Call ptrace() with PTRACE ATTACH . Then open /proc/<pid>/mem, seek to the

How can I create objects based on dump file memory in a WinDbg extension?

十年热恋 提交于 2019-12-20 14:39:43
问题 I work on a large application, and frequently use WinDbg to diagnose issues based on a DMP file from a customer. I have written a few small extensions for WinDbg that have proved very useful for pulling bits of information out of DMP files. In my extension code I find myself dereferencing c++ class objects in the same way, over and over, by hand. For example: Address = GetExpression("somemodule!somesymbol"); ReadMemory(Address, &addressOfPtr, sizeof(addressOfPtr), &cb); // get the actual

Taking memory dump using C#

元气小坏坏 提交于 2019-12-20 11:19:18
问题 I've got a System.Diagnostics.Process object. My C# program is monitoring it for some condition. When the condition is hit, I want to take a full memory dump of the Process. What is the best way to achieve this? Is there a way that is provided by the CLR ? 回答1: You could use ProcDump from Sysinternals and make your C# program call it when needed. Process.Start("procdump " + otherProgramPID.ToString()); 回答2: You can try calling the C++ method from your C# code. Here's an example of how you

How to remove string from process memory?

别等时光非礼了梦想. 提交于 2019-12-18 09:14:47
问题 I have an application which takes a string from the Windows Forms text box and passes it to an API which uses a string as the parameter. I see that the string can still be queried from the process memory after the task is complete. I have come across suggestions to use SecureString for string memory management capabilities. But, if I understand correctly, the purpose of the string is defeated if the secure string is built from a string or the value of the secure string is ultimately stored in

Microsoft debug symbol don't work

只谈情不闲聊 提交于 2019-12-12 04:23:36
问题 I try to analyze some memory dump. But I stack on debug symbols of some Microsoft dll ( sechost.dll ). What I do: 1) !sym noisy 2) .symfix 3) .sympath My .sympath is: Symbol search path is: srv* Expanded Symbol search path is: cache*;SRV*http://msdl.microsoft.com/download/symbols 4) analyze -v After it I saw symbols loading. But for some symbols I have ...... SYMSRV: The operation timed out SYMSRV: http://msdl.microsoft.com/download/symbols/sechost.pdb/C4FD72A96E384F62A5F796624D37EAB42

Dump global datas to disk in assembly code

♀尐吖头ヾ 提交于 2019-12-11 13:50:00
问题 The experiment is on Linux, x86 32-bit. So suppose in my assembly program, I need to periodically (for instance every time after executing 100000 basic blocks) dump an array in .bss section from memory to the disk. The starting address and size of the array is fixed. The array records the executed basic block's address, the size is 16M right now. I tried to write some native code, to memcpy from .bss section to the stack, and then write it back to disk. But it seems to me that it is very