From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-qv1-xf30.google.com (mail-qv1-xf30.google.com [IPv6:2607:f8b0:4864:20::f30]) by sourceware.org (Postfix) with ESMTPS id D0B6A3851C07 for ; Tue, 12 May 2020 03:24:58 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org D0B6A3851C07 Received: by mail-qv1-xf30.google.com with SMTP id x13so3787794qvr.2 for ; Mon, 11 May 2020 20:24:58 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=AxPYkbD2pNwXbUgpVrj2PjI/r78kojGpCZMqje/CIxA=; b=qhg0boEML2zskMvwVn/NhcdLdYOQEJGbN/RfCWKbk1IuWGBBjVjknuFKe946VPNbo8 K+/r3sSvvCDXUfUmCmIRy5pRKOC++tsHc53c7+9PjOfbN1/hOf9ICQ9U81aYLFidxSIr 2sg5i+AT5noqDGxxB/i3NM1A0luMk1qlf5iVXeSPVvzhW6pmG9ZjLSIme3WbxY685sBA NEv2FXcRx4BMSPU7IxjrZX4JU5wN/jaAsybzikbrJADcWaYqv7+09XhtaCohmvsRZ/pW HXFB5SoDI3eey6RlFDhwie7kOGxuH2k1IMgyueeNWZy7Iiw5e5QhFqOYGOLBr0ZsGedZ fRQA== X-Gm-Message-State: AOAM530C3HUaR2QzBjumcxSOJroCGjKV6Qm9CdgZonwIm0GxGy6e+Ka/ +nj3KL8ItEKRGQriVDISTSN3ahvqtWhHJbdoI1r/3ZUl X-Google-Smtp-Source: ABdhPJz6QnjsxPB3uWSrfzoEB9WlFp3SfoAeehn5XqexCfonuQV0vtELcpLvoTTYeqU6gZU0ZqZJCBKd5ueXEOj72WE= X-Received: by 2002:a05:6214:506:: with SMTP id v6mr5584893qvw.70.1589253898249; Mon, 11 May 2020 20:24:58 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a05:6214:323:0:0:0:0 with HTTP; Mon, 11 May 2020 20:24:57 -0700 (PDT) Received: by 2002:a05:6214:323:0:0:0:0 with HTTP; Mon, 11 May 2020 20:24:57 -0700 (PDT) In-Reply-To: References: From: Kunal Chauhan Date: Tue, 12 May 2020 08:54:57 +0530 Message-ID: Subject: Help: debug binary To: gdb@sourceware.org X-Spam-Status: No, score=-2.5 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FREEMAIL_FROM, HTML_MESSAGE, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: gdb@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gdb mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 12 May 2020 03:25:00 -0000 Hi Team I am new to the stuff of debugging and do not know any memory tools. 1. I have logs of binary and have only development machine. I searched my logs and prints shows something like. Void f1() { F1() } 1.F1: returns the int val and after that binary crash . 2. In f1 some memory allocation and deallocation done for char* How can i check that particular function and file for memory crash . As i have develoment system where i can only compile my binary.? Please suggest some useful steps Thanks Kunal