the major problem is the use of mutliple heaps in windows. winleak doesnt handle it properly yet. im working on adding that ability, and the ability to run a process from start to finish under the leak detection. Ive already added in detection of when a non standard heap was used and sorting the output by worst offending stack

David

Daniel Atallah wrote:
On Fri, Sep 12, 2008 at 4:02 PM,  <[EMAIL PROTECTED]> wrote:
attached are various runs with winleak. Using

G_DEBUG=gc-friendly
and
G_SLICE=always-malloc

On windows I set them in the my computer properties ->advanced tab ->
environment variables -> user variables.

printing them our in my pidgin run script produced this so i think the
variables are set correctly.

-------------------------------------------------
Pidgin Debug Log For Wed 09/10/2008 16:04:23.20
Value of G_DEBUG = gc-friendly
Value of G_SLICE = always-malloc
-------------------------------------------------

produces with this batch script code.

--------------------------------------------------------------------
REM write a nice header
ECHO ------------------------------------------------- > %logfile%
ECHO Pidgin Debug Log For %odt% >> %logfile%
ECHO Value of G_DEBUG = %G_DEBUG% >> %logfile%
ECHO Value of G_SLICE = %G_SLICE% >> %logfile%

ECHO ------------------------------------------------- >> %logfile%
---------------------------------------------------------------------------

The only issue is these aren't beginning to end leaks. they are unfreed
memory as of the point I stopped collecting data. To make this as accurate
as possible. I closed all windows, and minimized the buddy list before
writing out the leak details.

I did things such as: sending/receiving ims, checking status messages,
clicking buttons, +/- buddylist expanders, aim direct connect, aim file
transfer, checking aim profiles, and using the log reader to brows logs and
search them for keywords

I was mostly testing with my brother. searching for the screen names "ace3g"
or "dave1g" ( there can be quite a few matches) will probably be the more
likely true leaks of strings. If any truly exist at all.

I took a look at the first few files and wasn't able to find anything
that looked like a legitimate leak.

The fact that these are snapshots and not real de-facto leaks means
that there are just too many falks positives to be able to get useful
results.

I look forward to some better results based on working with the
winleak developers to improve accuracy.

-D

_______________________________________________
Support mailing list
[email protected]
http://pidgin.im/cgi-bin/mailman/listinfo/support

Reply via email to