glibc is actually able to report double-frees as double-frees directly, not just as generic heap corruption. He might have an older glibc though, which makes this less certain.
Yes, i'm using Sourcery G++ Lite 2008 Q3 version for arm-nonelinux-gnueabi 4.3.2.
The reason for I doesn't change to version 2010.09 4.5.1 is, if I use the newer compiler, my program will encounter an error on accessing eproms onboard while nothing difference in codes.
It's weird and I doesn't plan to check it right now.
---------- Post updated at 10:11 AM ---------- Previous update was at 09:39 AM ----------
Quote:
Originally Posted by kumaran_5555
you may be correct.
Try to use mtrace for tracing you allocation and free calls.
But for this you need change and recompile the code.
Thanks、I used mtrace, but the result is still strange.
First, i'm sure my code is compiled with -g option.
but after analysis of my mtrace.log, it still reports "Caller" column as addresses ... such as 0x400366c4 etc, but not the code line.
btw, I tried another little program on fedora:
but after glibc detected "double free or corruption", the mtrace.log is still 0 bytes....nothing logged.
Why?
hi,
I have made a small C program that make use of malloc and free for processing bitmap images. when i try to run the program, I am getting a error something like
*** glibc detected *** free(): invalid next size (normal): 0x0000000000503e70 ***
I am not sure of which free() is causing this... (1 Reply)
the code is below and the was run on Solaris 9.
-----------------------------
struct sched_param param;
param.sched_priority = 99;
if(sched_setscheduler(0, SCHED_RR, ¶m) == -1)
{
perror("setting priority");
exit(1);
}
-------------------------------
after the... (1 Reply)
I have an HP PPM (ITG) application that is running an awk command in cygwin bash shell as part of ITG process moving SAP transports on a Windows 2003 server. The awk command checks the first two characters of a file containing return code that was retrieved from the SAP server. It is throwing the... (3 Replies)
I find that when I want to cross-compier application for arm platform,Maybe it need to specify AR=arm-linux-ar,but if I don't specify it, it will use default one--ar,and both can works well,I think ar and arm-linux-ar is just a different ,I don't know whether I'm right.
I hope someone show me... (3 Replies)
I wrote a script to delete files which are older than "x" days, if the size of the directory is greater than "y"
#!/bin/bash
du -hs $1
while read SIZE ENTRY
do
if ;
then
find $1 -mtime +$2 -exec rm -f {} \;
echo "Files older than $2 days deleted"
else
echo "free Space available"... (4 Replies)
Hi ,
we have a issue in server, we are running a perl script to connect our clients, but we are not able to connect, every time we are getting the
"Invalid argument error"
Even i checked all the necessary perl modules are i installed in this server,
#create the listen socket
my... (2 Replies)
Hi 2 all,
i have had AIX 7.2
:/# /usr/IBMAHS/bin/apachectl -v
Server version: Apache/2.4.12 (Unix)
Server built: May 25 2015 04:58:27
:/#:/# /usr/IBMAHS/bin/apachectl -M
Loaded Modules:
core_module (static)
so_module (static)
http_module (static)
mpm_worker_module (static)
... (3 Replies)
Discussion started by: penchev
3 Replies
LEARN ABOUT DEBIAN
muntrace
MTRACE(3) Linux Programmer's Manual MTRACE(3)NAME
mtrace, muntrace - malloc tracing
SYNOPSIS
#include <mcheck.h>
void mtrace(void);
void muntrace(void);
DESCRIPTION
The mtrace() function installs hook functions for the memory-allocation functions (malloc(3), realloc(3)memalign(3), free(3)). These hook
functions record tracing information about memory allocation and deallocation. The tracing information can be used to discover memory
leaks and attempts to free nonallocated memory in a program.
The muntrace() function disables the hook functions installed by mtrace(), so that tracing information is no longer recorded for the mem-
ory-allocation functions. If no hook functions were successfully installed by mtrace(), muntrace() does nothing.
When mtrace(3) is called, it checks the value of the environment variable MALLOC_TRACE, which should contain the pathname of a file in
which the tracing information is to be recorded. If the pathname is successfully opened, it is truncated to zero length.
If MALLOC_TRACE is not set, or the pathname it specifies is invalid or not writable, then no hook functions are installed, and mtrace() has
no effect. In set-user-ID and set-group-ID programs, MALLOC_TRACE is ignored, and mtrace() has no effect.
CONFORMING TO
These functions are GNU extensions.
NOTES
In normal usage, mtrace() is called once at the start of execution of a program, and muntrace() is never called.
The tracing output produced after a call to mtrace() is textual, but not designed to be human readable. The GNU C library provides a Perl
script, mtrace(1), that interprets the trace log and produces human-readable output. For best results, the traced program should be com-
piled with debugging enabled, so that line-number information is recorded in the executable.
The tracing performed by mtrace() incurs a performance penalty (if MALLOC_TRACE points to a valid, writable pathname).
BUGS
The line-number information produced by mtrace(1) is not always precise: the line number references may refer to the previous or following
(non-blank) line of the source code.
EXAMPLE
The shell session below demonstrates the use of the mtrace() function and the mtrace(1) command in a program that has memory leaks at two
different locations. The demonstration uses the following program:
$ cat t_mtrace.c
#include <mcheck.h>
#include <stdlib.h>
#include <stdio.h>
int
main(int argc, char *argv[])
{
int j;
mtrace();
for (j = 0; j < 2; j++)
malloc(100); /* Never freed--a memory leak */
calloc(16, 16); /* Never freed--a memory leak */
exit(EXIT_SUCCESS);
}
When we run the program as follows, we see that mtrace() diagnosed memory leaks at two different locations in the program:
$ cc -g t_mtrace.c -o t_mtrace
$ export MALLOC_TRACE=/tmp/t
$ ./t_mtrace
$ mtrace ./t_mtrace $MALLOC_TRACE
Memory not freed:
-----------------
Address Size Caller
0x084c9378 0x64 at /home/cecilia/t_mtrace.c:12
0x084c93e0 0x64 at /home/cecilia/t_mtrace.c:12
0x084c9448 0x100 at /home/cecilia/t_mtrace.c:16
The first two messages about unfreed memory correspond to the two malloc(3) calls inside the for loop. The final message corresponds to
the call to calloc(3) (which in turn calls malloc(3)).
SEE ALSO mtrace(1), malloc(3), malloc_hook(3), mcheck(3)COLOPHON
This page is part of release 3.44 of the Linux man-pages project. A description of the project, and information about reporting bugs, can
be found at http://www.kernel.org/doc/man-pages/.
GNU 2012-04-18 MTRACE(3)