As to linux man page: http://linux.die.net/man/3/backtrace_symbols, The address of the array of string pointers is returned as the function result of backtrace_symbols(). This array is malloced by backtrace_symbols(), and must be freed by the caller. The strings pointed to by the array of pointers need not and should not be freed.
Signed-off-by: chixiaobo <xiaobo.chi at nokia.com> --- lib/librte_eal/bsdapp/eal/eal_debug.c | 3 +++ lib/librte_eal/linuxapp/eal/eal_debug.c | 3 +++ 2 files changed, 6 insertions(+) diff --git a/lib/librte_eal/bsdapp/eal/eal_debug.c b/lib/librte_eal/bsdapp/eal/eal_debug.c index 44fc4f3..ceca2e8 100644 --- a/lib/librte_eal/bsdapp/eal/eal_debug.c +++ b/lib/librte_eal/bsdapp/eal/eal_debug.c @@ -58,6 +58,9 @@ void rte_dump_stack(void) "%d: [%s]\n", size, symb[size - 1]); size --; } + /* This array is malloced by backtrace_symbols(), and must be freed by the caller */ + if( symb ) + free( (void *)symb ); } /* not implemented in this environment */ diff --git a/lib/librte_eal/linuxapp/eal/eal_debug.c b/lib/librte_eal/linuxapp/eal/eal_debug.c index 44fc4f3..ceca2e8 100644 --- a/lib/librte_eal/linuxapp/eal/eal_debug.c +++ b/lib/librte_eal/linuxapp/eal/eal_debug.c @@ -58,6 +58,9 @@ void rte_dump_stack(void) "%d: [%s]\n", size, symb[size - 1]); size --; } + /* This array is malloced by backtrace_symbols(), and must be freed by the caller */ + if( symb ) + free( (void *)symb ); } /* not implemented in this environment */ -- 1.9.4.msysgit.2