>>> Gábor Melis <[email protected]> schrieb am 14.08.2020 um 00:40 in Nachricht
<cadjfn4xp1xesjgc01_bpjy8huvkbcovdaufozmjxgmo_2zn...@mail.gmail.com>:

...
> 2. mdb_txns are calloc()ed and free()d. In the case where a thread
>    performs some operation (e.g. put, get, del) involving an already
>    freed mdb_txn pointer, what kind of nastiness can happen? Can the
>    database be corrupted?
...

I can't answer specifically, but in general double-freeing memory or using
memory that had been freed already is a bad idea. Many years ago when I had
written a C program for an MS-DOS PC, suddenly the screen was flickering
showing random characters, then the PC froze. It was just a double-free. So
_anything_ can happen if you continue to use memory alredy freed.
It is possible that some newer libraries protect against double-freeing memry
(at least as long as the memory wasn'r reallocated again), but still...

Regards,
Ulrich

Reply via email to