El 23/11/2012 12:46, Antonio Fortuny escribió:


Le 23/11/2012 12:37, José Mejuto a écrit :
El 22/11/2012 14:48, Antonio Fortuny escribió:

Hello,

Call trace for block $001EA898 size 28
   $0060787C  IDSTACK_init,  line 937 of
D:/Programmes/LazPk/Indy10_5_8/Lib/System/IdStack.pas

This is clear ;)
Obviously and it is known memory leak

   $0040DBB4
   $004120D1

This two may come from Windows OS libraries, or maybe the fpc RTL
functions (more probably).
Annoying but can cope with it

Just to be sure you can load your project and run procexp (process explorer) which could show you the base address for the loaded DLLs, quite sure one would be loaded in the "00400000" address, which is the path to arrive the offending function (maybe sockets related).

   $BAADF00D

This comes from an already freed object (BAD FOOD), so the first step
could be to change all object.free by FreeAndNil(object).
Ouaou ! This means a lot of search !

Not that much, but the problem is that many code runs fine due that bug, using a freed object (not intentionally). Maybe some regexp replaces will help you.

You can review only code that deals with Indy activities.


--


--
_______________________________________________
Lazarus mailing list
[email protected]
http://lists.lazarus.freepascal.org/mailman/listinfo/lazarus

Reply via email to