[Lazarus] Memory leaks
José Mejuto
joshyfun at gmail.com
Fri Nov 23 14:05:34 CET 2012
El 23/11/2012 12:46, Antonio Fortuny escribió:
>
>
> Le 23/11/2012 12:37, José Mejuto a écrit :
>> El 22/11/2012 14:48, Antonio Fortuny escribió:
>>
>> Hello,
>>
>>> Call trace for block $001EA898 size 28
>>> $0060787C IDSTACK_init, line 937 of
>>> D:/Programmes/LazPk/Indy10_5_8/Lib/System/IdStack.pas
>>
>> This is clear ;)
> Obviously and it is known memory leak
>>
>>> $0040DBB4
>>> $004120D1
>>
>> This two may come from Windows OS libraries, or maybe the fpc RTL
>> functions (more probably).
> Annoying but can cope with it
Just to be sure you can load your project and run procexp (process
explorer) which could show you the base address for the loaded DLLs,
quite sure one would be loaded in the "00400000" address, which is the
path to arrive the offending function (maybe sockets related).
>>> $BAADF00D
>>
>> This comes from an already freed object (BAD FOOD), so the first step
>> could be to change all object.free by FreeAndNil(object).
> Ouaou ! This means a lot of search !
Not that much, but the problem is that many code runs fine due that bug,
using a freed object (not intentionally). Maybe some regexp replaces
will help you.
You can review only code that deals with Indy activities.
--
More information about the Lazarus
mailing list