This is the mail archive of the cygwin mailing list for the Cygwin project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

tracing malloc/free call


Debugging a program I am trying to catch where this call is happening

17 1499678 [main] ncview 1484 free: (0x6000D7961), called by 0x180115A0B

unfortunately the 0x180115A0B address is not real caller address

/usr/src/debug/cygwin-1.7.33-1/winsup/cygwin/malloc_wrapper.cc

extern "C" void
free (void *p)
{
  malloc_printf ("(%p), called by %p", p, __builtin_return_address (0));
  if (!use_internal)
    user_data->free (p);
  else
    {
      __malloc_lock ();
      dlfree (p);
      __malloc_unlock ();
    }
}


Any way to improve the tracing ?
$ uname -svr
CYGWIN_NT-6.1 1.7.33-2(0.280/5/3) 2014-11-13 15:47

Regards
Marco

--
Problem reports:       http://cygwin.com/problems.html
FAQ:                   http://cygwin.com/faq/
Documentation:         http://cygwin.com/docs.html
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]