|
por este dispositivo também tem outras instruções :
Facilidade de uso
Contents
Introduction..............................................................................................................................4
Intended Audience....................................................................................................................4
Typographic Conventions...........................................................................................................4
Related Information...................................................................................................................4
Prerequisites.............................................................................................................................5
Limitations...............................................................................................................................5
Memory-Related Errors..............................................................................................................6
Heap Corruption..................................................................................................................6
Causes for Heap Corruption.............................................................................................6
Double-Free...............................................................................................................6
Freeing Unallocated/Uninitialized Memory....................................................................6
Memory Leaks.....................................................................................................................6
When to Suspect a Memory Leak......................................................................................7
Types of Memory Leaks....................................................................................................7
Physical Leaks............................................................................................................7
Logical Leaks.............................................................................................................7
Access Errors.......................................................................................................................8
Using Native Inspect to Debug Memory Problems.........................................................................8
Memory-Debugging Features of Native Inspect.............................................................................8
Heap Profiling.....................................................................................................................9
Example 1 Filtered Heap Reporting for Allocations Exceeding
Call-Site.......................................................................................................................10
Leak Profiling.....................................................................................................................11
Event Monitoring...............................................................................................................12
Monitoring Heap Events.................................................................................................12
Monitoring Allocations Greater Than a Specified size........................................................12
Example 2 Monitoring allocations greater than a specified size...........................................13
Monitoring De-allocations to Detect Double-Frees..............................................................13
Monitoring Heap Corruption..........................................................................................13
Monitoring String Corruption..........................................................................................14
Example 3 Monitoring heap-corruption caused by erroneous handling of string functions........14
Detecting Out-of-Bounds Writes with the Bounds-Checking Feature.......................................15
Example 4 Bounds-checking to detect out-of-bounds writes..................................................15
Detecting Heap Corruption.............................................................................................16
Example 5 Detecting heap corruption using the info corruption command.............................16
Settings to Manage Performance Degradation............................................................................17
Supported Modes of Memory-debugging in Native Inspect..........................................................18
Debugging Programs Launched Under Debugger Control........................................................18
Debugging a Running Process..................................................................................................18
Summary of Memory Debugging Commands.............................................................................19
Conclusion............................................................................................................................19
Additional Examples...............................................................................................................19
Example 6 Detecting a double-free error...............................................................................19
Example 7 Detecting de-allocation of memory that has not been initialized...............................20
Example 8 Detecting de-allocation of unallocated blocks........................................................20
Example 9 Detecting memory leaks caused when an application overwrites a pointer that currently
addresses a block of memory with another address or data.....................................................21
Example 10 Detecting memory leaks that are caused when a pointer variable in an application
addresses memory that is out of the scope of the application...................................................21
Example 11 Detecting memory leaks when you free a structure or an array that has pointers which
are not freed.....................................................................................................................22
FAQ......................................................................................................................................23
Contents
3
... Este manual também é adequado para os modelos :
Computadores - HP Integrity NonStop J-Series (262.79 kb)
Computadores - HP NonStop L-Series (262.79 kb)