Tagged articles
16 articles
Page 1 of 1
IT Services Circle
IT Services Circle
Nov 15, 2025 · Fundamentals

How to Use GDB Watchpoints to Catch Memory Modifications in C/C++

This guide explains why memory bugs are hard to locate in C/C++ programs, introduces GDB watchpoints as a way to monitor specific memory addresses, and walks through a complete example—including source code, compilation, breakpoint setting, watchpoint creation, and interpreting the hardware watchpoint output—to pinpoint the exact line that modifies a variable.

DebuggingMemory Debugginghardware-watchpoint
0 likes · 6 min read
How to Use GDB Watchpoints to Catch Memory Modifications in C/C++
Deepin Linux
Deepin Linux
Nov 3, 2025 · Operations

Master Linux Memory Bugs with KASAN: From Fundamentals to Real‑World Debugging

This guide walks Linux developers and operators through the fundamentals of kernel memory management, common memory bugs, and step‑by‑step configuration and usage of KASAN—including shadow memory, compile‑time instrumentation, kernel build options, and practical code examples—to quickly locate and fix out‑of‑bounds, use‑after‑free, and leak issues.

C programmingKASANKernel
0 likes · 30 min read
Master Linux Memory Bugs with KASAN: From Fundamentals to Real‑World Debugging
Deepin Linux
Deepin Linux
May 24, 2025 · Information Security

Understanding KASAN: Kernel Address Sanitizer for Detecting Memory Errors in Linux

The article introduces KASAN, a Kernel Address Sanitizer for Linux that uses shadow memory and redzones to accurately detect out‑of‑bounds accesses, use‑after‑free, and double‑free errors, explains its underlying mechanisms, shows how to enable it in the kernel, and provides extensive example code and log analysis.

KASANKernel Address SanitizerLinux kernel
0 likes · 34 min read
Understanding KASAN: Kernel Address Sanitizer for Detecting Memory Errors in Linux
Open Source Linux
Open Source Linux
Mar 25, 2024 · Fundamentals

Master Linux Memory Debugging with BPFTrace: Leaks, OOM, and More

This article explains common memory errors, lists kernel and user‑space event sources for tracing memory activity, and demonstrates how to use BPFTrace, kprobes, and USDT probes to detect out‑of‑bounds accesses, use‑after‑free, memory leaks, OOM killer events, mmap/brk usage, shared memory operations, page faults, and reclaim processes on Linux.

Memory DebuggingOOM killerbpftrace
0 likes · 28 min read
Master Linux Memory Debugging with BPFTrace: Leaks, OOM, and More
Liangxu Linux
Liangxu Linux
Nov 7, 2023 · Fundamentals

Mastering Valgrind: Installation, Core Tools, and Cross‑Compilation Guide

This article introduces Valgrind, outlines its main debugging tools, provides step‑by‑step installation and usage instructions on Linux, demonstrates memory‑error detection with a sample C program, and explains how to cross‑compile Valgrind for ARM targets.

Debugging ToolsMemory Debuggingcross-compilation
0 likes · 10 min read
Mastering Valgrind: Installation, Core Tools, and Cross‑Compilation Guide
iQIYI Technical Product Team
iQIYI Technical Product Team
Aug 11, 2023 · Artificial Intelligence

Debugging Random OOM Issues in PyTorch Distributed Training on A100 Clusters

The iQIYI backend team traced random OOM crashes in PyTorch Distributed Data Parallel on an A100 cluster to a malformed DDP message injected by a security scan, which forced a near‑terabyte allocation; using jemalloc for diagnostics, they mitigated the issue by adjusting scan policies and collaborating with PyTorch to harden the protocol.

Distributed TrainingMemory DebuggingOOM
0 likes · 9 min read
Debugging Random OOM Issues in PyTorch Distributed Training on A100 Clusters
Soul Technical Team
Soul Technical Team
Mar 29, 2023 · Mobile Development

Crash Governance and Stability Practices for Mobile Applications

This article describes a comprehensive crash governance framework for a fast‑growing mobile app, covering monitoring, root‑cause attribution, systematic remediation steps, and detailed case studies—including MIUI system bugs, 32‑bit address‑space limits, memory corruption, and WebView crashes—while outlining future challenges and automation strategies.

AndroidHotfixMemory Debugging
0 likes · 13 min read
Crash Governance and Stability Practices for Mobile Applications
ByteDance SYS Tech
ByteDance SYS Tech
Dec 9, 2022 · Fundamentals

How Sanitizer Interceptors Detect Memory Bugs in Linux C++ Programs

This article explains the principles behind Google’s sanitizer tools, especially AddressSanitizer, covering symbol interposition, the interceptor mechanism, and how these techniques replace libc functions to reliably locate memory and thread errors in C++ applications on Linux.

AddressSanitizerC++Memory Debugging
0 likes · 18 min read
How Sanitizer Interceptors Detect Memory Bugs in Linux C++ Programs
Liangxu Linux
Liangxu Linux
Oct 19, 2022 · Fundamentals

Mastering Linux Kernel Debugging: Tools, Configurations, and Practical Tips

This guide explains why kernel debugging is challenging and walks through preparation steps, essential kernel configuration options, useful macros like BUG() and WARN(), logging with printk(), memory‑debugging utilities such as MEMWATCH, YAMD, Electric Fence and strace, handling OOPS messages, dynamic debugging, and setting up kdump/kexec for crash dumps.

BUG macroKDUMPMemory Debugging
0 likes · 28 min read
Mastering Linux Kernel Debugging: Tools, Configurations, and Practical Tips
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Nov 13, 2020 · Information Security

Understanding KASAN: Principles and Usage in the Linux Kernel

KASAN, the Kernel Address Sanitizer, is a built‑in Linux kernel tool that uses shadow memory to mark each 8‑byte block’s accessibility, enabling detection of out‑of‑bounds and use‑after‑free errors while consuming about one‑eighth of RAM and requiring kernel configuration changes to activate.

KASANLinux kernelMemory Debugging
0 likes · 8 min read
Understanding KASAN: Principles and Usage in the Linux Kernel
Top Architect
Top Architect
Jul 29, 2020 · Backend Development

Investigation of Excessive Off‑Heap Memory Usage After Migrating a Spring Boot Project to the MDP Framework

The article details a step‑by‑step forensic analysis of why a Spring Boot application migrated to the MDP framework consumed far more physical memory than its configured 4 GB heap, uncovering off‑heap allocations caused by native code, package‑scanning, and glibc memory‑pool behavior, and explains how limiting scan paths or upgrading Spring Boot resolves the issue.

JVMMemory DebuggingNative Memory
0 likes · 12 min read
Investigation of Excessive Off‑Heap Memory Usage After Migrating a Spring Boot Project to the MDP Framework
Liangxu Linux
Liangxu Linux
Feb 25, 2020 · Operations

Master Linux Performance Debugging with Flame Graphs and System Tools

This guide explains how to use Linux performance analysis tools—including top, vmstat, perf, flame graphs, and differential flame graphs—to diagnose CPU, memory, I/O, and network bottlenecks, with step‑by‑step commands, methodology, and real‑world case studies.

CPU profilingI/O MonitoringMemory Debugging
0 likes · 18 min read
Master Linux Performance Debugging with Flame Graphs and System Tools
Tencent TDS Service
Tencent TDS Service
May 28, 2015 · Mobile Development

Turning Random Obj‑C Wild‑Pointer Crashes into Deterministic Bugs

This article explains why Obj‑C wild‑pointer crashes appear random, analyzes various memory‑state scenarios after object deallocation, and shows how to force deterministic crashes by filling freed memory with inaccessible patterns using Xcode's Enable Scribble and a custom free‑hook implementation.

Crash DetectionMemory DebuggingObj-C
0 likes · 8 min read
Turning Random Obj‑C Wild‑Pointer Crashes into Deterministic Bugs