Thanks for your reply, Mason. Sorry about the footers. I will use a personal email-id in future posts. Regards Abhijit ---------- Forwarded message --------- From: Abhijit Gokaraju <Abhijit.Gokaraju@xxxxxxxxxxx> Date: Sun, Oct 8, 2017 at 12:03 PM Subject: FW: Query regarding initializing memory to specific byte patterns. To: averma0875@xxxxxxxxx <averma0875@xxxxxxxxx> -----Original Message----- From: Mason [mailto:slash.tmp@xxxxxxx] Sent: Wednesday, October 04, 2017 2:44 PM To: Abhijit Gokaraju <Abhijit.Gokaraju@xxxxxxxxxxx> Cc: GCC help <gcc-help@xxxxxxxxxxx>; Manohar Doppalapudi < Manohar.Doppalapudi@xxxxxxxxxxx>; Alexander Ferdman < Alexander.Ferdman@xxxxxxxxxxx> Subject: Re: Query regarding initializing memory to specific byte patterns. On 02/10/2017 02:59, Abhijit Gokaraju wrote: > We have inherited a piece of software which checks for illegal memory > writes due to memory overrun/underrun and writing to released memory. You seem to be interested in debugging dynamically-allocated memory (malloc'ed heap memory). These operations are not handled in gcc, but left up to the libc implementation. For example, if you're using glibc, take a look at man mallopt (especially the env variables) and related functions. http://man7.org/linux/man-pages/man3/mallopt.3.html Tools such as valgrind may prove useful. Regards. > ______________________________________________________________________ > _____ > > This e-mail message is intended for the recipient only and contains > information which is CONFIDENTIAL and which may be proprietary to ECI > Telecom. If you have received this transmission in error, please > inform us by e-mail, phone or fax, and then delete the original and all copies thereof. > ______________________________________________________________________ > _____ P.S. These footers are silly, especially when writing to a public (and archived) mailing list. ___________________________________________________________________________ This e-mail message is intended for the recipient only and contains information which is CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this transmission in error, please inform us by e-mail, phone or fax, and then delete the original and all copies thereof. ___________________________________________________________________________