|
From: Philippe W. <phi...@sk...> - 2015-01-02 14:23:43
|
On Fri, 2015-01-02 at 14:04 +0000, Tom Hughes wrote: > Given that this is a leak report the other likely cause is that the > addresses are in a shared object that has been unloaded, though it's > surprising that none at all are translatable. Yes, that is strange. Effectively, maybe an unloaded shared object. Or maybe some JIT-ted code ? Is that a only a 'compiled executable' ? Or does it contain a JIT, e.g. a Java or Javascript library ? It looks also like the default limit of 12 callers is reached at least for some stack traces. > > Otherwise I would at least expect to see the object name. Yes, you are correct : even for a stripped executable, the object name is given. Philippe |