https://bugs.kde.org/show_bug.cgi?id=460142

            Bug ID: 460142
           Summary: Auxiliary stack traces
    Classification: Developer tools
           Product: valgrind
           Version: unspecified
          Platform: Other
                OS: Linux
            Status: REPORTED
          Severity: wishlist
          Priority: NOR
         Component: memcheck
          Assignee: jsew...@acm.org
          Reporter: simon.rich...@hogyros.de
  Target Milestone: ---

SUMMARY

I'm trying to narrow down a use-after-free bug with interned strings in Python.
It is fairly obvious what is happening, someone gave a dynamically allocated
string to the Python interpreter with a promise that its lifetime would exceed
that of the interpreter (so the string data could be shared), and later
deallocated the string.

The three stack traces I get (allocation, deallocation and use) show what is
happening, but it is difficult for me to find the point where the string is
given to Python -- the function to intern the string is called quite often, so
I can't just easily break there.

What would be nice would be a user request to attach an auxiliary stack trace
to a block of memory so more lifetime events can be traced -- in my case I
could for example save the stack trace for the call that adds the string to the
list of interned strings, so I can see which context made the lifetime promise
that later on wasn't kept.

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to