Hi,
The first one I think I was able to fix. But the other ones couldn't
reach any conclusion.
I use Visual Leak Detector for memory leaks in Windows, and Valgrind in
Linux. In fact I just did a re-check this month.
But I didn't knew Dr.Memory. I'll give it a try anyway.
Thanks for reporting.
Best,
Scuri
On Thu, Jan 21, 2016 at 9:39 AM, Ranier VF <[email protected]> wrote:
> Hi,
> I running my application with Dr.Memory (like valgrind for Windows),
> to catch my own memory errors.
>
> In report, I see this errors in Iup library subsystem:
>
> Error #11: UNINITIALIZED READ: reading 0x0012fd94-0x0012fd98 4 byte(s)
> # 0 iup.dll!iupdrvGetSystemName +0x26 (0x10078e86
> <iup.dll+0x78e86>)
> # 1 iup.dll!IupOpen +0xae (0x10045f9f
> <iup.dll+0x45f9f>)
> # 2 main [c:\usr\src\rcpdv\app.c:143]
> Note: @0:00:10.579 in thread 220
> Note: instruction: cmp 0x10(%esp) $0x00000002
>
> Error #87: UNINITIALIZED READ: reading 0x0012fcc8-0x0012fcd4 12 byte(s)
> within 0x0012fcbc-0x0012fcd8
> # 0 system call NtUserThunkedMenuInfo parameter #1
> # 1 USER32.dll!SetSystemMenu +0x3d9
> (0x7e38fdbd <USER32.dll+0x2fdbd>)
> # 2 iup.dll!IupClipboard +0x8f8b
> (0x1006d65c <iup.dll+0x6d65c>)
> # 3 iup.dll!IupMap +0x96
> (0x1000c9a7 <iup.dll+0xc9a7>)
> # 4 iup.dll!IupMap +0xe5
> (0x1000c9f6 <iup.dll+0xc9f6>)
> # 5 iup.dll!IupMap +0xe5
> (0x1000c9f6 <iup.dll+0xc9f6>)
> # 6 iup.dll!IupMap +0xe5
> (0x1000c9f6 <iup.dll+0xc9f6>)
> # 7 iup.dll!IupMap +0xe5
> (0x1000c9f6 <iup.dll+0xc9f6>)
> # 8 iup.dll!IupCopyClassAttributes +0x1d5a
> (0x1001310b <iup.dll+0x1310b>)
> # 9 iup.dll!iupClassObjectSetAttribute +0x23c
> (0x1001010d <iup.dll+0x1010d>)
> #10 iup.dll!IupGetAttributes +0x605
> (0x10001cc6 <iup.dll+0x1cc6>)
> #11 iup.dll!IupMap +0xc6
> (0x1000c9d7 <iup.dll+0xc9d7>)
> #12 iup.dll!IupShow +0x4d
> (0x1000cbbe <iup.dll+0xcbbe>)
> #13 main
> [c:\usr\src\rcpdv\app.c:175]
> Note: @0:00:27.875 in thread 220
>
> Error #119: UNADDRESSABLE ACCESS of freed memory: reading
> 0x03966670-0x03966671 1 byte(s)
> # 0 iup.dll!iupBaseSetPosition +0x82d (0x10008efd <iup.dll+0x8efd>)
> # 1 iup.dll!IupClose +0x26 (0x100460d7
> <iup.dll+0x460d7>)
> # 2 main [c:\usr\src\rcpdv\app.c:194]
> Note: @0:01:19.157 in thread 356
> Note: 0x03966670-0x03966671 overlaps memory 0x03966670-0x039666c8 that was
> freed here:
> Note: # 0 replace_free
> [d:\drmemory_package\common\alloc_replace.c:2667]
> Note: # 1 iup_cash_close_cb
> [c:\usr\src\rcpdv\cash_iup.c:111]
> Note: # 2 iup.dll!iupdrvBaseSetTipVisibleAttrib +0x1ccb (0x1005526c
> <iup.dll+0x5526c>)
> Note: # 3 iup.dll!iupdrvBaseSetTipVisibleAttrib +0x212c (0x100556cd
> <iup.dll+0x556cd>)
> Note: # 4 USER32.dll!GetDC +0x6c (0x7e368734
> <USER32.dll+0x8734>)
> Note: # 5 USER32.dll!GetDC +0x14e (0x7e368816
> <USER32.dll+0x8816>)
> Note: instruction: cmp (%eax) $0x49
>
> Error #80: UNADDRESSABLE ACCESS of freed memory: reading
> 0x03289888-0x03289889 1 byte(s)
> # 0 iup.dll!iupObjectCheck +0x8 (0x10006a78
> <iup.dll+0x6a78>)
> # 1 iup.dll!iupdrvRegisterDragDropAttrib +0x14b6 (0x10061397
> <iup.dll+0x61397>)
> # 2 iup.dll!iupwinBaseMsgProc +0x7db (0x1004f3dc
> <iup.dll+0x4f3dc>)
> # 3 iup.dll!iupdrvImageDestroy +0x2aae (0x1005c38f
> <iup.dll+0x5c38f>)
> # 4 iup.dll!iupwinBaseMsgProc +0x676 (0x1004f277
> <iup.dll+0x4f277>)
> # 5 USER32.dll!GetDC +0x6c (0x7e368734
> <USER32.dll+0x8734>)
> # 6 USER32.dll!GetDC +0x14e (0x7e368816
> <USER32.dll+0x8816>)
> # 7 USER32.dll!GetParent +0x16b (0x7e37927b
> <USER32.dll+0x1927b>)
> # 8 USER32.dll!SendMessageW +0x48 (0x7e3792e3
> <USER32.dll+0x192e3>)
> # 9 USER32.dll!CreateMDIWindowA +0x1bc (0x7e39ff7d
> <USER32.dll+0x3ff7d>)
> #10 USER32.dll!DeregisterShellHookWindow +0x6311 (0x7e3965d2
> <USER32.dll+0x365d2>)
> #11 USER32.dll!IsDlgButtonChecked +0x1099 (0x7e375e94
> <USER32.dll+0x15e94>)
> #12 USER32.dll!IsDlgButtonChecked +0x436 (0x7e375231
> <USER32.dll+0x15231>)
> #13 USER32.dll!GetDC +0x6c (0x7e368734
> <USER32.dll+0x8734>)
> #14 USER32.dll!GetDC +0x14e (0x7e368816
> <USER32.dll+0x8816>)
> #15 USER32.dll!IsWindowUnicode +0xa0 (0x7e37a013
> <USER32.dll+0x1a013>)
> #16 USER32.dll!CallWindowProcW +0x1a (0x7e37a039
> <USER32.dll+0x1a039>)
> #17 iup.dll!iupwinBaseMsgProc +0x6ba (0x1004f2bb
> <iup.dll+0x4f2bb>)
> #18 USER32.dll!GetDC +0x6c (0x7e368734
> <USER32.dll+0x8734>)
> #19 USER32.dll!GetDC +0x14e (0x7e368816
> <USER32.dll+0x8816>)
> Note: @0:00:29.641 in thread 356
> Note: 0x03289888-0x03289889 overlaps memory 0x03289888-0x032898d4 that was
> freed here:
> Note: # 0 replace_free
> [d:\drmemory_package\common\alloc_replace.c:2667]
> Note: # 1 iup.dll!IupDestroy +0x17c (0x10006edd <iup.dll+0x6edd>)
> Note: # 2 iup.dll!IupDestroy +0xf5 (0x10006e56 <iup.dll+0x6e56>)
> Note: # 3 iup.dll!IupDestroy +0xf5 (0x10006e56 <iup.dll+0x6e56>)
> Note: # 4 iup.dll!IupDestroy +0xf5 (0x10006e56 <iup.dll+0x6e56>)
> Note: # 5 iup.dll!IupDestroy +0xf5 (0x10006e56 <iup.dll+0x6e56>)
> Note: instruction: cmp (%eax) $0x49
>
> Maybe, bogus, but...
>
> Best regards,
>
> Ranier Vilela
>
>
>
> ------------------------------------------------------------------------------
> Site24x7 APM Insight: Get Deep Visibility into Application Performance
> APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
> Monitor end-to-end web transactions and take corrective actions now
> Troubleshoot faster and improve end-user experience. Signup Now!
> http://pubads.g.doubleclick.net/gampad/clk?id=267308311&iu=/4140
> _______________________________________________
> Iup-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/iup-users
>
>
------------------------------------------------------------------------------
Site24x7 APM Insight: Get Deep Visibility into Application Performance
APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
Monitor end-to-end web transactions and take corrective actions now
Troubleshoot faster and improve end-user experience. Signup Now!
http://pubads.g.doubleclick.net/gampad/clk?id=267308311&iu=/4140
_______________________________________________
Iup-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/iup-users