Colin McCormack said: > Subject: Code Generation > > Return-Path: colin@cygnus.com > Return-Path: > Mailing-List: contact egcs-help@egcs.cygnus.com; run by ezmlm > Precedence: bulk > Sender: owner-egcs@egcs.cygnus.com > Delivered-To: mailing list egcs@egcs.cygnus.com > Sender: colin@cygnus.com > X-Mailer: Mozilla 4.06 [en] (X11; I; Linux 2.1.132 i686) > MIME-Version: 1.0 > Content-Type: text/plain; charset=us-ascii > Content-Transfer-Encoding: 7bit > X-UIDL: b323c49f2ccab87bc9857b89e8fd1709 > > There's a program called Checker ( http://sunsite.unc.edu > /pub/Linux/devel/c) which acts like Purify, to police references to > external storage. It relies, I believe, upon intercepting each such > reference, and each modification, to ensure that only legal targets may > be referenced. lcc < http://www.cs.princeton.edu/software/lcc > keeps a counter for each block, and increments it each time it is excecuted. This is cummulative for runs of the program. A companion program takes the source and the output of the above and creates an annotated listing. Quite nice. -- Horst von Brand vonbrand@sleipnir.valparaiso.cl Casilla 9G, Viña del Mar, Chile +56 32 672616