Dear valgrind users: I want to ask a question about the memory access
interception, we all know that valgrind can intercept the dynamic memory access
error
We just need to modify a little bit code of memcheck, then we can
intercept each dynamic memory access, however, how about static memory access
and local variable?
which part of valgrind can help me to catch the static memory access
and local variable? does anybody know the exact way? Please help me!
Thanks for reading!
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure
contains a definitive record of customers, application performance,
security threats, fraudulent activity, and more. Splunk takes this
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Valgrind-users mailing list
Valgrind-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/valgrind-users