When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Segmentation fault - Wikipedia

    en.wikipedia.org/wiki/Segmentation_fault

    Segmentation faults can also occur independently of page faults: illegal access to a valid page is a segmentation fault, but not an invalid page fault, and segmentation faults can occur in the middle of a page (hence no page fault), for example in a buffer overflow that stays within a page but illegally overwrites memory.

  3. Bus error - Wikipedia

    en.wikipedia.org/wiki/Bus_error

    The GDB debugger shows that the immediate value 0x2a is being stored at the location stored in the EAX register, using X86 assembly language. This is an example of register indirect addressing. Printing the low order bits of the address shows that it is not aligned to a word boundary ("dword" using x86 terminology).

  4. GNU Debugger - Wikipedia

    en.wikipedia.org/wiki/GNU_Debugger

    The GNU Debugger (GDB) is a portable debugger that runs on many Unix-like systems and works for many programming languages, including Ada, Assembly, C, C++, D, Fortran, Haskell, Go, Objective-C, OpenCL C, Modula-2, Pascal, Rust, [2] and partially others.

  5. Valgrind - Wikipedia

    en.wikipedia.org/wiki/Valgrind

    Valgrind (/ ˈ v æ l ɡ r ɪ n d /) [6] is a programming tool for memory debugging, memory leak detection, and profiling.. Valgrind was originally designed to be a freely licensed memory debugging tool for Linux on x86, but has since evolved to become a generic framework for creating dynamic analysis tools such as checkers and profilers.

  6. Off-by-one error - Wikipedia

    en.wikipedia.org/wiki/Off-by-one_error

    Off-by-one errors are common in using the C library because it is not consistent with respect to whether one needs to subtract 1 byte – functions like fgets() and strncpy will never write past the length given them (fgets() subtracts 1 itself, and only retrieves (length − 1) bytes), whereas others, like strncat will write past the length given them.

  7. Dangling pointer - Wikipedia

    en.wikipedia.org/wiki/Dangling_pointer

    In many languages (e.g., the C programming language) deleting an object from memory explicitly or by destroying the stack frame on return does not alter associated pointers. The pointer still points to the same location in memory even though that location may now be used for other purposes. A straightforward example is shown below:

  8. Program slicing - Wikipedia

    en.wikipedia.org/wiki/Program_slicing

    In computer programming, program slicing is the computation of the set of program statements, the program slice, that may affect the values at some point of interest, referred to as a slicing criterion. Program slicing can be used in debugging to locate source of errors more easily.

  9. Memory debugger - Wikipedia

    en.wikipedia.org/wiki/Memory_debugger

    A memory debugger is a debugger for finding software memory problems such as memory leaks and buffer overflows. These are due to bugs related to the allocation and deallocation of dynamic memory . Programs written in languages that have garbage collection , such as managed code , might also need memory debuggers, e.g. for memory leaks due to ...