Date: Mon, 22 Sep 2008 02:31:57 +0100 From: RW <fbsd06@mlists.homeunix.com> To: freebsd-questions@freebsd.org Subject: Re: Segmentation fault when free Message-ID: <20080922023157.6668b46f@gumby.homeunix.com.> In-Reply-To: <266527.92897.qm@web110502.mail.gq1.yahoo.com> References: <200809210206.52409.fbsd.questions@rachie.is-a-geek.net> <266527.92897.qm@web110502.mail.gq1.yahoo.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 21 Sep 2008 05:57:06 -0700 (PDT)
Nash Nipples <trashy_bumper@yahoo.com> wrote:
> but even if you kill -SEGV `pgrep this` (Segmentation fault (core
> dumped) the memory is getting freed anyway (presumably by the
> glorious kernel). which you can see dynamicly by typing top in the
> console.
The idea that malloc() allocates memory is really a C language
abstraction. What it actually does is allocate a region in the
process's virtual address space. The mapping of physical memory to
virtual address space is handled at a lower-level and doesn't rely on
malloc() or free().
> in other words segmentation fault when free() is not a scary thing
> here. it is a matter of style and the way to find own errors. or
> maybe reading warnings if you compile with the flags -ansi -pedantic
I'm not sure what you are saying here, but the handling of dynamic
memory in C is something that needs to be well thought-out in
advance. Bugs is this area can be very difficult and time-consuming
to track-down.
> oh and by the way:
>
> > char *
> > function(void)
> > {
> > char buffer[100];
> >
> > return buffer;
> > }
>
> that is an easier approach because you get warned on passing an
> address to a local variable
This was an example of how to generate a failure, it's not an approach.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080922023157.6668b46f>
