This is the mail archive of the
cygwin
mailing list for the Cygwin project.
tracing malloc/free call
- From: Marco Atzeri <marco dot atzeri at gmail dot com>
- To: "cygwin at cygwin dot com" <cygwin at cygwin dot com>
- Date: Wed, 14 Jan 2015 23:30:55 +0100
- Subject: tracing malloc/free call
- Authentication-results: sourceware.org; auth=none
Debugging a program I am trying to catch where this call is happening
17 1499678 [main] ncview 1484 free: (0x6000D7961), called by 0x180115A0B
unfortunately the 0x180115A0B address is not real caller address
/usr/src/debug/cygwin-1.7.33-1/winsup/cygwin/malloc_wrapper.cc
extern "C" void
free (void *p)
{
malloc_printf ("(%p), called by %p", p, __builtin_return_address (0));
if (!use_internal)
user_data->free (p);
else
{
__malloc_lock ();
dlfree (p);
__malloc_unlock ();
}
}
Any way to improve the tracing ?
$ uname -svr
CYGWIN_NT-6.1 1.7.33-2(0.280/5/3) 2014-11-13 15:47
Regards
Marco
--
Problem reports: http://cygwin.com/problems.html
FAQ: http://cygwin.com/faq/
Documentation: http://cygwin.com/docs.html
Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple