Strange stack trace from memory profile
Summary A developer observed a mysterious stack trace while profiling a large C++ service with AddressSanitizer (ASan). The trace showed massive memory consumption (259 MB) attributed solely to malloc called from operator new, with no visible user code in the call stack. This indicates that standard stack trace introspection is insufficient for allocations triggered by … Read more