Log:
Assessments - 0, GPA: 0 ( )

Instruções de Operação HP, Modelo HP Integrity NonStop H-Series

Fabricante : HP
Arquivo Tamanho: 262.79 kb
Arquivo Nome :
Língua de Ensino: en
Ir para baixar



por este dispositivo também tem outras instruções :

Facilidade de uso


Contents
Introduction..............................................................................................................................4
Intended Audience....................................................................................................................4
Typographic Conventions...........................................................................................................4
Related Information...................................................................................................................4
Prerequisites.............................................................................................................................5
Limitations...............................................................................................................................5
Memory-Related Errors..............................................................................................................6
Heap Corruption..................................................................................................................6
Causes for Heap Corruption.............................................................................................6
Double-Free...............................................................................................................6
Freeing Unallocated/Uninitialized Memory....................................................................6

Memory Leaks.....................................................................................................................6
When to Suspect a Memory Leak......................................................................................7
Types of Memory Leaks....................................................................................................7

Physical Leaks............................................................................................................7
Logical Leaks.............................................................................................................7

Access Errors.......................................................................................................................8
Using Native Inspect to Debug Memory Problems.........................................................................8
Memory-Debugging Features of Native Inspect.............................................................................8

Heap Profiling.....................................................................................................................9
Example 1 Filtered Heap Reporting for Allocations Exceeding at a Particular
Call-Site.......................................................................................................................10

Leak Profiling.....................................................................................................................11
Event Monitoring...............................................................................................................12
Monitoring Heap Events.................................................................................................12
Monitoring Allocations Greater Than a Specified size........................................................12
Example 2 Monitoring allocations greater than a specified size...........................................13
Monitoring De-allocations to Detect Double-Frees..............................................................13
Monitoring Heap Corruption..........................................................................................13
Monitoring String Corruption..........................................................................................14
Example 3 Monitoring heap-corruption caused by erroneous handling of string functions........14
Detecting Out-of-Bounds Writes with the Bounds-Checking Feature.......................................15
Example 4 Bounds-checking to detect out-of-bounds writes..................................................15
Detecting Heap Corruption.............................................................................................16
Example 5 Detecting heap corruption using the info corruption command.............................16

Settings to Manage Performance Degradation............................................................................17
Supported Modes of Memory-debugging in Native Inspect..........................................................18
Debugging Programs Launched Under Debugger Control........................................................18
Debugging a Running Process..................................................................................................18
Summary of Memory Debugging Commands.............................................................................19
Conclusion............................................................................................................................19
Additional Examples...............................................................................................................19

Example 6 Detecting a double-free error...............................................................................19
Example 7 Detecting de-allocation of memory that has not been initialized...............................20
Example 8 Detecting de-allocation of unallocated blocks........................................................20
Example 9 Detecting memory leaks caused when an application overwrites a pointer that currently
addresses a block of memory with another address or data.....................................................21
Example 10 Detecting memory leaks that are caused when a pointer variable in an application
addresses memory that is out of the scope of the application...................................................21
Example 11 Detecting memory leaks when you free a structure or an array that has pointers which
are not freed.....................................................................................................................22

FAQ......................................................................................................................................23
Contents
3


...

Este manual também é adequado para os modelos :
Computadores - HP Integrity NonStop J-Series (262.79 kb)
Computadores - HP NonStop L-Series (262.79 kb)

Escreva a sua própria avaliação do dispositivo



Mensagem
Seu nome :
Introduza os dois dígitos :
capcha





categorias