Message-Id: Comments: Authenticated sender is From: "Salvador Eduardo Tropea (SET)" Organization: INTI To: djgpp AT delorie DOT com Date: Wed, 20 May 1998 09:41:17 +0000 MIME-Version: 1.0 Content-type: text/plain; charset=US-ASCII Content-transfer-encoding: 7BIT Subject: Re: Execution finished before started! In-reply-to: <199805191341.PAA15048@basement.replay.com> Precedence: bulk nobody AT REPLAY DOT COM (Anonymous) <---- I think I know this guy ;-) wrote: > I think I am having a problem with memory leaks, so I am using memory > checkers to keep track of wild pointers. > > At first I attempted a port of a library called MEMDEBUG and linked it with > my code. It worked, but I didn't like it. Then I went to DMALLOC, which > was difficult to port because it wants to be a malloc replacement rather > than wrap around it. I noticed that the successfully linked code abruptly > exited from rhide (with a SIGABRT) and a display of the assembly debug > window; it never got into main(). > > Then I went to something called DBMALLOC that shows promise, another library > set up for Unix but something that is not too hard to port. Damn it all > if it didn't do the same thing. There are TWO working packages for djgpp, why did you tried to port another? Here are the links from my links page:

* MSS v1.00b by Juanje and Peter Palotas is a tool to detect memory leaks, use of uninitialized memory, zero-length allocations, out of range block accesses, bogus or repeated deallocations and unsuccessful allocations. Sources (C++). Free.

* Fortify< /a> is another memory leak detection lib.

SET ------------------------------------ 0 -------------------------------- Visit my home page: http://set-soft.home.ml.org/ or http://www.geocities.com/SiliconValley/Vista/6552/ Salvador Eduardo Tropea (SET). (Electronics Engineer) Alternative e-mail: set-soft AT usa DOT net set AT computer DOT org ICQ: 2951574 Address: Curapaligue 2124, Caseros, 3 de Febrero Buenos Aires, (1678), ARGENTINA TE: +(541) 759 0013