<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
<title></title>
</head>
<body bgcolor="#ffffff" text="#000000">
On 07/06/2012 09:20, Antonio Fortuny wrote:
<blockquote cite="mid:jqpknc$9bq$1@dough.gmane.org" type="cite">
<meta http-equiv="content-type" content="text/html;
charset=ISO-8859-1">
1 unfreed memory blocks : 16 <<===========================
sounds OK<br>
True heap size : 786432 (160 used in System startup)<br>
True free heap : 813088<br>
Should be : 786128<br>
Call trace for block $0000000000086ED0 size 16
<<========================== this is OK<br>
$000000000040FE8E<br>
$0000000000540A19<br>
$0000000000531EF9<br>
$000000000050E44A<br>
$0000000000586FA9<br>
$000000000052DC99<br>
$000000000053B4C7<br>
$00000000005B5237<br>
</blockquote>
<br>
Maybe the very first address is somewhere without debug info?<br>
The problem is that the stackdump permamently stops resolving, once
this happens.<br>
<br>
Since you are on 1.1<br>
please install the package LeakView - then go to tools menu and open
the leak view window<br>
load the data.<br>
<br>
there is a button "resolve". select the exe that leaked. it is a new
feature. it SHOULD resolve any address for which symbols exist<br>
</body>
</html>