Quantcast
Channel: Visual Leak Detector for Visual C++ 2008-2015
Viewing all articles
Browse latest Browse all 704

New Comment on "Using Visual Leak Detector"

$
0
0
I had a project run on debug version and had memory leak issue: So VLD was installed on VS2015 - and run with Remote debugger After add "vld.h" into project, but end up "exception" and could not pin point the memory leak.... Please help..... 'GyroDRAccTest.exe' (Win32): Loaded '\\TRAPEZE_V801\ProjectArea\AppTest\Debug\GyroDRAccTest.exe'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\ntdll.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\kernel32.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\KernelBase.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded '\\TRAPEZE_V801\ProjectArea\AppTest\Debug\GyroDRACC.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\user32.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\gdi32.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\lpk.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\usp10.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\msvcrt.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded '\\TRAPEZE_V801\ProjectArea\AppTest\Debug\vld_x86.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\advapi32.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\sechost.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\rpcrt4.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded '\\TRAPEZE_V801\ProjectArea\AppTest\Debug\dbghelp.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded '\\TRAPEZE_V801\ProjectArea\AppTest\Debug\MSVCP140D.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded '\\TRAPEZE_V801\ProjectArea\AppTest\Debug\VCRUNTIME140D.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded '\\TRAPEZE_V801\ProjectArea\AppTest\Debug\ucrtbased.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\api-ms-win-core-timezone-l1-1-0.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\api-ms-win-core-file-l2-1-0.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\api-ms-win-core-localization-l1-2-0.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\api-ms-win-core-synch-l1-2-0.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\api-ms-win-core-processthreads-l1-1-1.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\api-ms-win-core-file-l1-2-0.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\ws2_32.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\nsi.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded '\\TRAPEZE_V801\ProjectArea\AppTest\Debug\mfc140ud.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\ole32.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\oleaut32.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\shlwapi.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\imm32.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\msctf.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\uxtheme.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\GdiPlus.dll'. Symbols loaded. Visual Leak Detector read settings from: (default settings) Visual Leak Detector Version 2.5.1 installed. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\cryptbase.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\shell32.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Program Files\Common Files\microsoft shared\ink\tiptsf.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\version.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\dwmapi.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded '\\TRAPEZE_V801\ProjectArea\AppTest\Debug\zTrace32.DLL'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\comdlg32.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\clbcatq.dll'. Symbols loaded. 24 c5 00 00 3b 0d 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Windows\System32\oleacc.dll'. Symbols loaded. 'GyroDRAccTest.exe' (Win32): Loaded 'C:\Program Files\UPDD\TBHOOK.DLL'. Module was built without symbols. 24 c1 00 00 3f 0d 24 c1 00 00 3f 0d 24 d9 00 01 01 25 0d 24 d7 00 00 29 0d 24 d5 00 01 01 29 0d 24 d5 00 01 00 2a 0d 24 e5 00 01 00 1a 0d The thread 0x113c has exited with code 0 (0x0). The thread 0x17fc has exited with code 0 (0x0). The thread 0x46c has exited with code 0 (0x0). Detected memory leaks! Dumping objects -> {577} normal block at 0x004E0550, 32 bytes long. Data: < O > 07 CD CD CD 00 00 00 00 00 00 4F 00 CD CD CD CD {571} normal block at 0x004E0280, 32 bytes long. Data: < O > 07 CD CD CD 00 00 00 00 00 00 4F 00 CD CD CD CD {570} normal block at 0x004EB530, 64 bytes long. Data: < N N p N N > D0 02 4E 00 20 03 4E 00 70 03 4E 00 C0 03 4E 00 {564} normal block at 0x004E0500, 32 bytes long. Data: < N > 07 CD CD CD 00 00 00 00 00 00 4E 00 CD CD CD CD {557} normal block at 0x004E95A8, 12 bytes long. Data: < ~c > 10 D0 7E 63 14 01 00 00 14 01 00 00 {554} normal block at 0x004E04B0, 32 bytes long. Data: < L > 07 CD CD CD 00 00 00 00 00 00 4C 00 CD CD CD CD {548} normal block at 0x004E0460, 32 bytes long. Data: < L > 07 CD CD CD 00 00 00 00 00 00 4C 00 CD CD CD CD {539} normal block at 0x004E03C0, 32 bytes long. Data: < L > 07 CD CD CD 00 00 00 00 00 00 4C 00 CD CD CD CD {533} normal block at 0x004E0370, 32 bytes long. Data: < N > 07 CD CD CD 00 00 00 00 00 00 4E 00 CD CD CD CD {527} normal block at 0x004E0320, 32 bytes long. Data: < O > 07 CD CD CD 00 00 00 00 00 00 4F 00 CD CD CD CD {521} normal block at 0x004E02D0, 32 bytes long. Data: < P > 07 CD CD CD 00 00 00 00 00 00 50 00 CD CD CD CD {448} normal block at 0x004EB428, 216 bytes long. Data: <H ~c KN > 48 0B 7E 63 90 4B 4E 00 FF FF FF FF 00 00 00 00 {267} normal block at 0x004EC058, 48 bytes long. Data: <z T r a c e 2 > 7A 00 54 00 72 00 61 00 63 00 65 00 20 00 32 00 {264} normal block at 0x004D6620, 8 bytes long. Data: < > B4 FC F0 01 00 00 00 00 {130} normal block at 0x004D6498, 8 bytes long. Data: < ~c > 88 D0 7E 63 00 00 00 00 {129} normal block at 0x004D6460, 8 bytes long. Data: <t ~c > 74 D0 7E 63 00 00 00 00 {128} normal block at 0x004D6428, 12 bytes long. Data: <(dM (dM > 28 64 4D 00 28 64 4D 00 CD CD CD CD {127} normal block at 0x004D63F0, 8 bytes long. Data: <\ ~c > 5C D0 7E 63 00 00 00 00 Object dump complete. WARNING: Visual Leak Detector detected memory leaks! ---------- Block 144 at 0x004E95A8: 12 bytes ---------- Leak Hash: 0x066C1818, Count: 1, Total 12 bytes Call Stack (TID 4792): Exception thrown at 0x62727EAC (dbghelp.dll) in GyroDRAccTest.exe: 0xC0000005: Access violation reading location 0x03038B28.

Viewing all articles
Browse latest Browse all 704

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>