Oracle® Solaris Modular Debugger Guide

Exit Print View

Updated: September 2014
 
 

Detecting Memory Corruption

One of the primary debugging facilities of the allocator is that it includes algorithms to recognize data corruption quickly. When corruption is detected, the allocator immediately panics the system. This section describes how the allocator recognizes data corruption. You must understand this to be able to debug these problems.

    Memory abuse typically falls into one of the following categories:

  • Writing past the end of a buffer

  • Accessing uninitialized data

  • Continuing to use a freed buffer

  • Corrupting kernel memory

Keep these problems in mind as you read the next three sections. They will help you to understand the allocator's design, and enable you to diagnose problems more efficiently.