On 2012-10-12 12:40:35 +0000, Jacob Carlborg <[email protected]> said:

On 2012-10-11 20:19, Michel Fortin wrote:

Most likely, the object objc_msgSend is called on has been deallocated,
which would mean that windowSendEvent is called with a deallocated
NSWindow object as its first argument.

I have done some investigation and I can call other methods on the NSWindow object, but regular methods and super methods. This would indicate that it's something wrong with the NSEvent object, but I can call methods on that as well.

That's not a very good proof. You might just be calling a method on the object before it gets released. Often, Objective-C objects are autoreleased, which means that deallocation is postponed until the end of the current event loop iteration (unless someone increase the reference counter again), so you might be having a valid pointer to it right now, but it might already be in the queue for deallocation.

If you want to test for the deallocated object theory, just call retain via objc_msgSend on any object you suspect might be deallocated too early, one by one, until you find the one that is causing the trouble. Once you find the problematic object, print its address on the console and use Instrument…


Since you're on OS X, I'd suggest you try using Instruments to track the
reference counters of all Objective-C objects within your program until
it crashes, then search back the history for all
retain/release/autorelease calls made to the address the EXEC_BAD_ACCESS
happens on.

I don't know how to use Instruments for this.

It's the Allocations profile you need. It'll record logs of every allocation, deallocation, and optionally every change to reference counters (click the (i) icon next to Allocations and check "Record reference counts"). Each log entry has a stack trace.

To see the raw log, you should open the Object List pane at the bottom (click the Statistics button, it's a menu). There'll be a lot of unrelated allocations, which is why you should output the pointer address to the object to the console (available under the same menu), and then search it in the log (or filter on it). Then look at the call stack for each entry, and hopefully you'll understand what's happening.

I hope this helps.


--
Michel Fortin
[email protected]
http://michelf.ca/

Reply via email to