Skip to content

Releases: CarloWood/libmemleak

Release of tar ball version 0.1.2

30 Jul 00:28
Compare
Choose a tag to compare

For a few years now, executables are compiled as PIE (Position Independent Executables). Probably pushed by the fact that Address Space Layout Randomization (ASLR) is now also the default (which requires PIE) for security reasons.

In the case of PIE the Virtual Memory Address (or load address) of the executable must be subtracted from the absolute address before trying to look it up with libbfd. I had not done this until now.

Hence, this release fixes the fact that addresses in the backtrace of the main executable were no longer showing a function name, file name and line number.

Fixed the SAME day that someone (finally!) reported it.

Release of tar ball version 0.1.1

05 Jan 01:37
Compare
Choose a tag to compare

Fixed a crash that occurred at start up when malloc is first called from printf() in a C program.
This reveals a more general problem though: if the first call to malloc() is too large, libmemleak
will crash. To work around this, please add at the start of main() a call to some small malloc(),
ie void* p = malloc(1); if you run into this.

Release of tar ball version 0.1

16 Dec 02:08
Compare
Choose a tag to compare

Please use libmemleak-0.1.0.tar.gz instead of github's Source Code (.tar.gz) because the latter would still require you to be in maintainer-mode and have cwautomacros installed etc).