Using Valgrind tool how can I detect which object trying to access 0x0 address ?

Posted by Davit Siradeghyan on Stack Overflow See other posts from Stack Overflow or by Davit Siradeghyan
Published on 2010-04-08T16:58:24Z Indexed on 2010/04/08 17:03 UTC
Read the original article Hit count: 492

Filed under:
|
|
|
|

I have this output when trying to debug

Program received signal SIGSEGV, Segmentation fault

0x43989029 in std::string::compare (this=0x88fd430, __str=@0xbfff9060) at /home/devsw/tmp/objdir/i686-pc-linux-gnu/libstdc++-v3/include/bits/char_traits.h:253

253 { return memcmp(__s1, __s2, __n); } Current language: auto; currently c++


Using valgrind I getting this output

==12485== Process terminating with default action of signal 11 (SIGSEGV)

==12485== Bad permissions for mapped region at address 0x0

==12485== at 0x1: (within path_to_my_executable_file/executable_file)

© Stack Overflow or respective owner

Related posts about valgrind

Related posts about g++