https://bugs.kde.org/show_bug.cgi?id=455826

Philippe Waroquiers <philippe.waroqui...@skynet.be> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |philippe.waroquiers@skynet.
                   |                            |be

--- Comment #2 from Philippe Waroquiers <philippe.waroqui...@skynet.be> ---
Note that the leak search algorithm is scanning the memory starting from "root"
memory zone (stacks, global variables, registers, ...).
During this scanning, any aligned piece of memory which happens to point at a
block will be considered as a pointer.
So, for example, if an integer variable happens to have the same bit
representation as the address of an allocated (but lost) block,
the leak search will not detect the lost block as a leak, because it has found
a "pointer" to this block.

So, possibly, depending on what the process does before exit, it might create
some bit patterns that look like a pointer.

The leak search algorithm might thus have false negative: some real leaks might
not be detected.
I do not see how the leak search algorithm could create a false positive  lost
block (ignoring the possibility that the algorithm
is buggy of course).

Note also that monitor leak_check is just launching the same leak search
algorithms as used by client requests and used at exit.

As Paul said, more info (e.g. what does the leak stack trace look like ? Is
such a leak report plausible when it is detected) might clarify.

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to