Tag

Memory Debugging

2 views collected around this technical thread.

Deepin Linux
Deepin Linux
May 24, 2025 · Information Security

Understanding KASAN: Kernel Address Sanitizer for Detecting Memory Errors in Linux

The article introduces KASAN, a Kernel Address Sanitizer for Linux that uses shadow memory and redzones to accurately detect out‑of‑bounds accesses, use‑after‑free, and double‑free errors, explains its underlying mechanisms, shows how to enable it in the kernel, and provides extensive example code and log analysis.

KASANKernel Address SanitizerLinux kernel
0 likes · 34 min read
Understanding KASAN: Kernel Address Sanitizer for Detecting Memory Errors in Linux
Deepin Linux
Deepin Linux
Feb 15, 2025 · Fundamentals

Debugging Memory Out-of-Bounds Errors in Linux: Techniques, Tools, and Best Practices

This article explains what memory out-of-bounds errors are, why they are dangerous in Linux C programs, and provides step‑by‑step debugging methods using logs, GDB, Valgrind, core dumps, mprotect, static analysis, and preventive coding practices.

C programmingGDBMemory Debugging
0 likes · 24 min read
Debugging Memory Out-of-Bounds Errors in Linux: Techniques, Tools, and Best Practices
Deepin Linux
Deepin Linux
Dec 27, 2024 · Fundamentals

Comprehensive Guide to Using Valgrind for Memory Debugging and Performance Analysis

This article provides an in‑depth overview of Valgrind, explaining its architecture, the capabilities of its various tools such as Memcheck, Cachegrind, Callgrind, Helgrind and Massif, and offers step‑by‑step installation, configuration, and practical code examples for detecting memory errors, leaks, and performance bottlenecks in C/C++ programs.

C++Leak DetectionMemory Debugging
0 likes · 28 min read
Comprehensive Guide to Using Valgrind for Memory Debugging and Performance Analysis
iQIYI Technical Product Team
iQIYI Technical Product Team
Aug 11, 2023 · Artificial Intelligence

Debugging Random OOM Issues in PyTorch Distributed Training on A100 Clusters

The iQIYI backend team traced random OOM crashes in PyTorch Distributed Data Parallel on an A100 cluster to a malformed DDP message injected by a security scan, which forced a near‑terabyte allocation; using jemalloc for diagnostics, they mitigated the issue by adjusting scan policies and collaborating with PyTorch to harden the protocol.

AI infrastructureMemory DebuggingPyTorch
0 likes · 9 min read
Debugging Random OOM Issues in PyTorch Distributed Training on A100 Clusters
ByteDance SYS Tech
ByteDance SYS Tech
Jul 21, 2023 · Fundamentals

How HWAddressSanitizer Leverages AArch64 TBI to Detect Memory Errors Efficiently

This article explains the principles behind HWAddressSanitizer (HWASAN), how it uses the AArch64 Top‑Byte‑Ignore hardware feature to provide lower‑overhead memory error detection than ASAN, and walks through practical examples, implementation details, and LLVM integration for C/C++ developers.

Aarch64AddressSanitizerHWASAN
0 likes · 29 min read
How HWAddressSanitizer Leverages AArch64 TBI to Detect Memory Errors Efficiently
Soul Technical Team
Soul Technical Team
Mar 29, 2023 · Mobile Development

Crash Governance and Stability Practices for Mobile Applications

This article describes a comprehensive crash governance framework for a fast‑growing mobile app, covering monitoring, root‑cause attribution, systematic remediation steps, and detailed case studies—including MIUI system bugs, 32‑bit address‑space limits, memory corruption, and WebView crashes—while outlining future challenges and automation strategies.

AndroidMemory Debuggingcrash management
0 likes · 13 min read
Crash Governance and Stability Practices for Mobile Applications
ByteDance SYS Tech
ByteDance SYS Tech
Dec 9, 2022 · Fundamentals

How Sanitizer Interceptors Detect Memory Bugs in Linux C++ Programs

This article explains the principles behind Google’s sanitizer tools, especially AddressSanitizer, covering symbol interposition, the interceptor mechanism, and how these techniques replace libc functions to reliably locate memory and thread errors in C++ applications on Linux.

AddressSanitizerC++Dynamic Linking
0 likes · 18 min read
How Sanitizer Interceptors Detect Memory Bugs in Linux C++ Programs
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Nov 13, 2020 · Information Security

Understanding KASAN: Principles and Usage in the Linux Kernel

KASAN, the Kernel Address Sanitizer, is a built‑in Linux kernel tool that uses shadow memory to mark each 8‑byte block’s accessibility, enabling detection of out‑of‑bounds and use‑after‑free errors while consuming about one‑eighth of RAM and requiring kernel configuration changes to activate.

KASANLinux kernelMemory Debugging
0 likes · 8 min read
Understanding KASAN: Principles and Usage in the Linux Kernel
Top Architect
Top Architect
Jul 29, 2020 · Backend Development

Investigation of Excessive Off‑Heap Memory Usage After Migrating a Spring Boot Project to the MDP Framework

The article details a step‑by‑step forensic analysis of why a Spring Boot application migrated to the MDP framework consumed far more physical memory than its configured 4 GB heap, uncovering off‑heap allocations caused by native code, package‑scanning, and glibc memory‑pool behavior, and explains how limiting scan paths or upgrading Spring Boot resolves the issue.

JVMMemory DebuggingNative Memory
0 likes · 12 min read
Investigation of Excessive Off‑Heap Memory Usage After Migrating a Spring Boot Project to the MDP Framework