<div dir="ltr">Suppose<div><br></div><div> 1) You are using -dll_prepend <lib> to load a dynamic library</div><div><br></div><div> 2) Your library is in the stack for a memory leak</div><div><br></div><div> 3) You use -malloc_test</div><div><br></div><div>Then you get an SEGV because the static pointer to the __FILE__ and __FUNCT__</div><div>in the stack structure are no longer in scope when the malloc log is printed.</div><div><br></div><div>You can fix the SEGV by moving the library unloading to after the malloc dump. However,</div><div>it then records that the memory from loading the library is still unfreed.</div><div><br></div><div>We could tell -malloc_test and friends to ignore that memory. Is this what we should do?</div><div><br></div><div> Matt<br clear="all"><div><br></div>-- <br><div class="gmail_signature">What most experimenters take for granted before they begin their experiments is infinitely more interesting than any results to which their experiments lead.<br>-- Norbert Wiener</div>
</div></div>