memleax/memleax.spec
herengui 6d61ec045c 添加龙芯和申威架构支持
Signed-off-by: herengui <herengui@kylinsec.com.cn>
(cherry picked from commit f9dd70d0d108c5cdd48ddb677ef291ccc65c07c2)
2023-09-12 09:01:07 +08:00

67 lines
1.8 KiB
RPMSpec

Name: memleax
Version: 1.1.1
Release: 5
Summary: Memory lead detection tool
License: GPLv2
URL: https://github.com/WuBingzheng/memleax
Source0: https://github.com/WuBingzheng/memleax/archive/v%{version}.tar.gz#/memleax-%{version}.tar.gz
Patch1000: 1000-add-loongarch-support-not-upstream-modified.patch
Patch1001: 1001-add-sw_64-support-not-upstream-modified.patch
BuildRequires: make libunwind-devel elfutils-devel gdb gcc
%description
memleax debugs memory leak of a running process by attaching it.
It hooks the target process's invocation of memory allocation and free,
and reports the memory blocks which live long enough as memory leak, in real time.
The default expire threshold is 10 seconds, however you should always
set it by `-e` option according to your scenarios.
It is very *convenient* to use, and suitable for production environment.
There is no need to recompile the program or restart the target process.
You run `memleax` to monitor the target process, wait for the real-time memory
leak report, and then kill it (e.g. by Ctrl-C) to stop monitoring.
memleax follows new threads, but not forked processes.
If you want to debug multiple processes, just run multiple memleax.
%prep
%autosetup -p1
%build
./configure
make
%install
make install DESTDIR="%{buildroot}"
%pre
%preun
%post
%postun
%check
%files
%license LICENSE
%{_bindir}/%{name}
%{_mandir}/man1/%{name}.1*
%changelog
* Tue Aug 29 2023 herengui <herengui@kylinsec.com.cn> - 1.1.1-5
- add support for loongarch64 and sw_64
* Mon Jun 28 2021 wulei <wulei80@huawei.com> - 1.1.1-4
- fix missing gcc
* Mon Oct 19 2020 Qingqing Li <liqingqing3@huawei.com>
- fix source0 error
* Tue Oct 13 2020 Qingqing Li <liqingqing3@huawei.com>
- update source0
* Sun Mar 29 2020 Wei Xiong <myeuler@163.com>
- Package init