-
Posts
222 -
Joined
-
Last visited
-
Days Won
6
Content Type
Profiles
Forums
Events
Posts posted by Skepsis IT
-
-
Not the direct solution for your problem, but in my opinion it is better to use SVG or webfonts for icons. Best look at all screens. And color and size are easy to set with CSS.
I use this webfont: https://google.github.io/material-design-icons/#icon-font-for-the-web
Oliver can you give us an example how you use it with unigui?
-
Happy 2016!!!
Health to all of you and the people you love!!!- 2
-
Merry Christmas to all!!!
Καλά Χριστούγεννα σε όλους!!!
- 3
-
4Gb
It's fair enough.
Did you enables memory leaks?
ReportMemoryLeaksOnShutdown := True;
For finding out if something goes wrong?
- 1
-
You must download a more recent version that includes it. StressTest added about 3 or 4 latest builds.
Furthermore how much ram has your vm?
- 1
-
There is a light on the tunnel,
on the uniloginform I call a function from a registration class that I have build, a TStrings is not freed up.
Thanks for the help
-
Hi Farshad,
my version is the latest (1195).
The problem is that I cannot detect exactly the form or frame causes the problem. I'll explain the sequence of testing, I run the exe and the uniloginform loads, then I shut down the application and here are the message for memory leaking. I take a look at uniloginformunit and ServerModule and I freed up what I have created. Then only thing that I have at ServerModule is an FDManager on BeforeLoadConnectionDefFile event where I load the ini for connection to db.
No errors at log file.Thanks
-
Hi everybody,
I have memory leaks problem, so I installed FastMM for reporting. However the report is too "generic" and mentioned out some TStringList and other stuff that I don't use on my project. The log is below, I will appreciate if someone take a look and understands more than me.
--------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 40 This block was allocated by thread 0x18E0, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 424F1F [Unknown function at __dbk_fcall_wrapper] 408DED 413EA0 413F9F DA87E7 [Unknown function at TMethodImplementationIntercept] DA8F48 [Unknown function at TMethodImplementationIntercept] DACB83 [Unknown function at TMethodImplementationIntercept] 955175 [Unknown function at TMethodImplementationIntercept] 9513C7 [Unknown function at TMethodImplementationIntercept] 95F466 [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: UnicodeString The allocation number is: 678103 Current memory dump of 256 bytes starting at pointer address 7FFFD6BDCD0: CC 65 E9 00 B0 04 02 00 01 00 00 00 06 00 00 00 33 00 37 00 43 00 34 00 42 00 34 00 00 00 C8 30 45 0B F4 85 F3 FF 80 80 80 80 80 80 80 80 80 80 00 00 00 00 00 00 00 00 70 A7 6B FD FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 4B 42 00 00 00 00 00 00 00 00 00 CB 58 0A 00 B8 4B 42 00 00 00 00 00 1F 4F 42 00 00 00 00 00 ED 8D 40 00 00 00 00 00 A0 3E 41 00 00 00 00 00 9F 3F 41 00 00 00 00 00 E7 87 DA 00 00 00 00 00 48 8F DA 00 00 00 00 00 83 CB DA 00 00 00 00 00 75 51 95 00 00 00 00 00 C7 13 95 00 00 00 00 00 66 F4 95 00 00 00 00 00 E0 18 00 00 84 14 00 00 EF 4D 42 00 00 00 00 00 B5 8D 40 00 00 00 00 00 EA 1C 41 00 00 00 00 00 3E C1 98 00 00 00 00 00 A2 75 6D 00 00 00 00 00 B8 73 6D 00 00 00 00 00 36 BD 54 00 00 00 00 00 D1 9B BD 76 00 00 00 00 Μ e ι . ° . . . . . . . . . . . 3 . 7 . C . 4 . B . 4 . . . Θ 0 E . τ … σ € € € € € € € € € € . . . . . . . . p § k ύ . . . . . . . . . . . . . . . . . . . 0 K B . . . . . . . . . Λ X . . Έ K B . . . . . . O B . . . . . ν @ . . . . . > A . . . . . ? A . . . . . η ‡ Ϊ . . . . . H Ϊ . . . . . ƒ Λ Ϊ . . . . . u Q • . . . . . Η . • . . . . . f τ • . . . . . ΰ . . . „ . . . ο M B . . . . . µ @ . . . . . κ . A . . . . . > Α . . . . . Ά u m . . . . . Έ s m . . . . . 6 ½ T . . . . . Ρ › ½ v . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 40 This block was allocated by thread 0x18E0, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 424F1F [Unknown function at __dbk_fcall_wrapper] 408DED 413EA0 413F9F DA87E7 [Unknown function at TMethodImplementationIntercept] DA8F48 [Unknown function at TMethodImplementationIntercept] DACB83 [Unknown function at TMethodImplementationIntercept] 955175 [Unknown function at TMethodImplementationIntercept] 9513C7 [Unknown function at TMethodImplementationIntercept] 95F466 [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: UnicodeString The allocation number is: 678091 Current memory dump of 256 bytes starting at pointer address 7FFFD6BDE00: CC 65 E9 00 B0 04 02 00 01 00 00 00 0A 00 00 00 52 00 65 00 67 00 69 00 73 00 74 00 65 00 72 00 65 00 64 00 00 00 53 30 D5 0A 00 86 F3 FF 80 80 00 00 00 00 00 00 00 00 41 F1 6B FD FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 57 0A 00 B8 4B 42 00 00 00 00 00 85 8D 40 00 00 00 00 00 9D 1B 41 00 00 00 00 00 04 37 41 00 00 00 00 00 5B 41 41 00 00 00 00 00 44 6B 8A 00 00 00 00 00 CE 70 8A 00 00 00 00 00 E3 6F 8A 00 00 00 00 00 94 E1 8B 00 00 00 00 00 DD 78 8A 00 00 00 00 00 77 F3 9B 00 00 00 00 00 E0 18 00 00 84 14 00 00 EF 4D 42 00 00 00 00 00 B5 8D 40 00 00 00 00 00 EA 1C 41 00 00 00 00 00 A7 1D 41 00 00 00 00 00 4F 4C 41 00 00 00 00 00 55 4B 41 00 00 00 00 00 13 EB 40 00 00 00 00 00 00 E8 40 00 00 00 00 00 Μ e ι . ° . . . . . . . . . . . R . e . g . i . s . t . e . r . e . d . . . S 0 Υ . . † σ € € . . . . . . . . A ρ k ύ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 W . . Έ K B . . . . . … @ . . . . . . A . . . . . . 7 A . . . . . [ A A . . . . . D k . . . . . Ξ p . . . . . γ o . . . . . ” α ‹ . . . . . έ x . . . . . w σ › . . . . . ΰ . . . „ . . . ο M B . . . . . µ @ . . . . . κ . A . . . . . § . A . . . . . O L A . . . . . U K A . . . . . . λ @ . . . . . . θ @ . . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 40 This block was allocated by thread 0x18E0, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 424F1F [Unknown function at __dbk_fcall_wrapper] 408DED 413EA0 413F9F DA87E7 [Unknown function at TMethodImplementationIntercept] DA8F48 [Unknown function at TMethodImplementationIntercept] DACB83 [Unknown function at TMethodImplementationIntercept] 955175 [Unknown function at TMethodImplementationIntercept] 9513C7 [Unknown function at TMethodImplementationIntercept] 95F466 [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: UnicodeString The allocation number is: 678110 Current memory dump of 256 bytes starting at pointer address 7FFFD6BF950: CC 65 E9 00 B0 04 02 00 01 00 00 00 06 00 00 00 53 00 65 00 72 00 76 00 65 00 72 00 00 00 DB 48 5D F7 91 81 F3 FF 80 80 80 80 80 80 80 80 80 80 00 00 00 00 00 00 00 00 F1 FB 6B FD FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 68 59 0A 00 B8 4B 42 00 00 00 00 00 85 8D 40 00 00 00 00 00 9D 1B 41 00 00 00 00 00 96 1F 41 00 00 00 00 00 74 42 41 00 00 00 00 00 CE A2 A8 00 00 00 00 00 2B 55 A8 00 00 00 00 00 EC 0C AB 00 00 00 00 00 97 10 AB 00 00 00 00 00 BB 10 AB 00 00 00 00 00 58 F8 AA 00 00 00 00 00 E0 18 00 00 E0 18 00 00 EF 4D 42 00 00 00 00 00 B5 8D 40 00 00 00 00 00 EA 1C 41 00 00 00 00 00 A7 1D 41 00 00 00 00 00 40 AC A8 00 00 00 00 00 2B 55 A8 00 00 00 00 00 EC 0C AB 00 00 00 00 00 97 10 AB 00 00 00 00 00 Μ e ι . ° . . . . . . . . . . . S . e . r . v . e . r . . . Ϋ H ] χ ‘ σ € € € € € € € € € € . . . . . . . . ρ ϋ k ύ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . h Y . . Έ K B . . . . . … @ . . . . . . A . . . . . – . A . . . . . t B A . . . . . Ξ Ά ¨ . . . . . + U ¨ . . . . . μ . « . . . . . — . « . . . . . » . « . . . . . X ψ . . . . . ΰ . . . ΰ . . . ο M B . . . . . µ @ . . . . . κ . A . . . . . § . A . . . . . @ ¬ ¨ . . . . . + U ¨ . . . . . μ . « . . . . . — . « . . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 152 This block was allocated by thread 0x18E0, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 408D85 40E7D8 40F3E1 525408 [Unknown function at TMethodImplementationIntercept] DA86A7 [Unknown function at TMethodImplementationIntercept] DA8F48 [Unknown function at TMethodImplementationIntercept] DACB83 [Unknown function at TMethodImplementationIntercept] 955175 [Unknown function at TMethodImplementationIntercept] 9513C7 [Unknown function at TMethodImplementationIntercept] 95F466 [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: TStringList The allocation number is: 678090 Current memory dump of 256 bytes starting at pointer address 7FFFD6DE290: C0 19 4F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 A0 39 F9 FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 60 F9 6D FD FF 07 00 00 06 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 FB 53 62 F8 55 86 F5 FF 00 00 00 00 00 00 00 00 21 E8 6D FD FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1E 55 0A 00 B8 4B 42 00 00 00 00 00 85 8D 40 00 00 00 00 00 D8 E7 40 00 00 00 00 00 E1 F3 40 00 00 00 00 00 58 D6 9C 00 00 00 00 00 7F 1F 9A 00 00 00 00 00 ΐ . O . . . . . . . . . . . . . . . . . . . . . 9 ω . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` ω m ύ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ϋ S b ψ U † υ . . . . . . . . ! θ m ύ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . U . . Έ K B . . . . . … @ . . . . . Ψ η @ . . . . . α σ @ . . . . . X Φ . . . . . . . . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 152 This block was allocated by thread 0x18E0, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 424F1F [Unknown function at __dbk_fcall_wrapper] 408DED 4158A5 415AB1 525281 [Unknown function at TMethodImplementationIntercept] 524EC7 [Unknown function at TMethodImplementationIntercept] 524FE3 [Unknown function at TMethodImplementationIntercept] 524964 [Unknown function at TMethodImplementationIntercept] 5248E7 [Unknown function at TMethodImplementationIntercept] DA864A [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: Unknown The allocation number is: 678102 Current memory dump of 256 bytes starting at pointer address 7FFFD6DF950: CC 65 E9 00 01 00 00 00 08 00 00 00 00 00 00 00 10 DE 6B FD FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 E0 DC 6B FD FF 07 00 00 00 00 00 00 00 00 00 00 60 F9 6B FD FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 FB 6D FD FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 09 42 79 99 81 F3 FF 80 80 80 80 80 80 80 80 00 00 00 00 00 00 00 00 50 A5 6D FD FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 4B 42 00 00 00 00 00 00 00 00 00 E6 58 0A 00 B8 4B 42 00 00 00 00 00 1F 4F 42 00 00 00 00 00 ED 8D 40 00 00 00 00 00 A0 3E 41 00 00 00 00 00 9F 3F 41 00 00 00 00 00 E7 87 DA 00 00 00 00 00 Μ e ι . . . . . . . . . . . . . . ή k ύ . . . . . . . . . . . . . . . . . . . . . . . . . . . ΰ ά k ύ . . . . . . . . . . . ` ω k ύ . . . . . . . . . . . . . . . . . . . . . . . . . . . . ϋ m ύ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a . B y ™ σ € € € € € € € € . . . . . . . . P ¥ m ύ . . . . . . . . . . . . . . . . . . . 0 K B . . . . . . . . . ζ X . . Έ K B . . . . . . O B . . . . . ν @ . . . . . > A . . . . . ? A . . . . . η ‡ Ϊ . . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 152 This block was allocated by thread 0x18E0, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 424F1F [Unknown function at __dbk_fcall_wrapper] 408DED 413EA0 413F9F DA87E7 [Unknown function at TMethodImplementationIntercept] DA8F48 [Unknown function at TMethodImplementationIntercept] DACB83 [Unknown function at TMethodImplementationIntercept] 955175 [Unknown function at TMethodImplementationIntercept] 9513C7 [Unknown function at TMethodImplementationIntercept] 95F466 [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: UnicodeString The allocation number is: 678118 Current memory dump of 256 bytes starting at pointer address 7FFFD6DFAF0: CC 65 E9 00 B0 04 02 00 01 00 00 00 40 00 00 00 30 00 35 00 38 00 31 00 42 00 32 00 45 00 36 00 46 00 35 00 35 00 45 00 38 00 36 00 31 00 39 00 41 00 32 00 42 00 44 00 31 00 35 00 38 00 46 00 33 00 41 00 42 00 39 00 41 00 31 00 30 00 39 00 34 00 43 00 46 00 44 00 38 00 46 00 37 00 34 00 33 00 46 00 43 00 38 00 46 00 30 00 44 00 34 00 39 00 33 00 30 00 36 00 33 00 32 00 39 00 39 00 45 00 36 00 36 00 43 00 42 00 38 00 42 00 42 00 00 00 06 BE B7 FC 19 9F F5 FF 80 80 80 80 80 80 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 07 93 0A 00 B8 4B 42 00 00 00 00 00 85 8D 40 00 00 00 00 00 D8 E7 40 00 00 00 00 00 E1 F3 40 00 00 00 00 00 08 54 52 00 00 00 00 00 12 B3 84 00 00 00 00 00 Μ e ι . ° . . . . . . . @ . . . 0 . 5 . 8 . 1 . B . 2 . E . 6 . F . 5 . 5 . E . 8 . 6 . 1 . 9 . A . 2 . B . D . 1 . 5 . 8 . F . 3 . A . B . 9 . A . 1 . 0 . 9 . 4 . C . F . D . 8 . F . 7 . 4 . 3 . F . C . 8 . F . 0 . D . 4 . 9 . 3 . 0 . 6 . 3 . 2 . 9 . 9 . E . 6 . 6 . C . B . 8 . B . B . . . . Ύ · ό . υ € € € € € € . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . “ . . Έ K B . . . . . … @ . . . . . Ψ η @ . . . . . α σ @ . . . . . . T R . . . . . . ³ „ . . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 88 This block was allocated by thread 0x18E0, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 408D85 40E7D8 40F3E1 521878 [Unknown function at TMethodImplementationIntercept] DA8F18 [Unknown function at TMethodImplementationIntercept] DACB83 [Unknown function at TMethodImplementationIntercept] 955175 [Unknown function at TMethodImplementationIntercept] 9513C7 [Unknown function at TMethodImplementationIntercept] 95F466 [Unknown function at TMethodImplementationIntercept] 95F49C [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: TStrings The allocation number is: 678088 Current memory dump of 256 bytes starting at pointer address 7FFFD71BCE0: D8 01 4F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 A0 39 F9 FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 DF D4 93 F6 A7 81 F3 FF 00 00 00 00 00 00 00 00 F1 B0 71 FD FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 CA 64 0A 00 B8 4B 42 00 00 00 00 00 85 8D 40 00 00 00 00 00 D8 E7 40 00 00 00 00 00 E1 F3 40 00 00 00 00 00 D0 82 90 00 00 00 00 00 AD CA AC 00 00 00 00 00 B4 CF AC 00 00 00 00 00 F3 D0 AC 00 00 00 00 00 86 92 92 00 00 00 00 00 89 80 90 00 00 00 00 00 39 92 90 00 00 00 00 00 E0 18 00 00 84 14 00 00 EF 4D 42 00 00 00 00 00 B5 8D 40 00 00 00 00 00 Ψ . O . . . . . . . . . . . . . . . . . . . . . 9 ω . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ί Τ “ φ § σ . . . . . . . . ρ ° q ύ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Κ d . . Έ K B . . . . . … @ . . . . . Ψ η @ . . . . . α σ @ . . . . . Π ‚ . . . . . Κ ¬ . . . . . ΄ Ο ¬ . . . . . σ Π ¬ . . . . . † ’ ’ . . . . . ‰ € . . . . . 9 ’ . . . . . ΰ . . . „ . . . ο M B . . . . . µ @ . . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 40 This block was allocated by thread 0x2A8, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 424F1F [Unknown function at __dbk_fcall_wrapper] 408DED 413EA0 413F9F DA87E7 [Unknown function at TMethodImplementationIntercept] DA8F48 [Unknown function at TMethodImplementationIntercept] DACB83 [Unknown function at TMethodImplementationIntercept] 955175 [Unknown function at TMethodImplementationIntercept] 9513C7 [Unknown function at TMethodImplementationIntercept] 95F466 [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: UnicodeString The allocation number is: 175505 Current memory dump of 256 bytes starting at pointer address 7FFFF051A90: CC 65 E9 00 B0 04 02 00 01 00 00 00 06 00 00 00 33 00 37 00 43 00 34 00 42 00 34 00 00 00 40 09 AC 09 3A 31 FB FF 80 80 80 80 80 80 80 80 80 80 00 00 00 00 00 00 00 00 F0 FC 04 FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 4B 42 00 00 00 00 00 00 00 00 00 85 AD 02 00 B8 4B 42 00 00 00 00 00 1F 4F 42 00 00 00 00 00 ED 8D 40 00 00 00 00 00 A0 3E 41 00 00 00 00 00 9F 3F 41 00 00 00 00 00 E7 87 DA 00 00 00 00 00 48 8F DA 00 00 00 00 00 83 CB DA 00 00 00 00 00 75 51 95 00 00 00 00 00 C7 13 95 00 00 00 00 00 66 F4 95 00 00 00 00 00 A8 02 00 00 84 14 00 00 EF 4D 42 00 00 00 00 00 B5 8D 40 00 00 00 00 00 EA 1C 41 00 00 00 00 00 3E C1 98 00 00 00 00 00 A2 75 6D 00 00 00 00 00 B8 73 6D 00 00 00 00 00 36 BD 54 00 00 00 00 00 D1 9B BD 76 00 00 00 00 Μ e ι . ° . . . . . . . . . . . 3 . 7 . C . 4 . B . 4 . . . @ . ¬ . : 1 ϋ € € € € € € € € € € . . . . . . . . π ό . . . . . . . . . . . . . . . . . . . . 0 K B . . . . . . . . . … . . Έ K B . . . . . . O B . . . . . ν @ . . . . . > A . . . . . ? A . . . . . η ‡ Ϊ . . . . . H Ϊ . . . . . ƒ Λ Ϊ . . . . . u Q • . . . . . Η . • . . . . . f τ • . . . . . ¨ . . . „ . . . ο M B . . . . . µ @ . . . . . κ . A . . . . . > Α . . . . . Ά u m . . . . . Έ s m . . . . . 6 ½ T . . . . . Ρ › ½ v . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 40 This block was allocated by thread 0x2A8, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 424F1F [Unknown function at __dbk_fcall_wrapper] 408DED 413EA0 413F9F DA87E7 [Unknown function at TMethodImplementationIntercept] DA8F48 [Unknown function at TMethodImplementationIntercept] DACB83 [Unknown function at TMethodImplementationIntercept] 955175 [Unknown function at TMethodImplementationIntercept] 9513C7 [Unknown function at TMethodImplementationIntercept] 95F466 [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: UnicodeString The allocation number is: 175493 Current memory dump of 256 bytes starting at pointer address 7FFFF051BC0: CC 65 E9 00 B0 04 02 00 01 00 00 00 0A 00 00 00 52 00 65 00 67 00 69 00 73 00 74 00 65 00 72 00 65 00 64 00 00 00 CB 08 3C 09 46 31 FB FF 80 80 00 00 00 00 00 00 00 00 F1 21 05 FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 DF 33 09 00 B8 4B 42 00 00 00 00 00 85 8D 40 00 00 00 00 00 9D 1B 41 00 00 00 00 00 96 1F 41 00 00 00 00 00 99 40 45 00 00 00 00 00 B3 49 53 00 00 00 00 00 A3 3A 53 00 00 00 00 00 01 33 53 00 00 00 00 00 33 28 53 00 00 00 00 00 D5 27 53 00 00 00 00 00 92 8A 54 00 00 00 00 00 E0 18 00 00 84 14 00 00 EF 4D 42 00 00 00 00 00 B5 8D 40 00 00 00 00 00 EA 1C 41 00 00 00 00 00 A7 1D 41 00 00 00 00 00 4F 4C 41 00 00 00 00 00 55 4B 41 00 00 00 00 00 13 EB 40 00 00 00 00 00 00 E8 40 00 00 00 00 00 Μ e ι . ° . . . . . . . . . . . R . e . g . i . s . t . e . r . e . d . . . Λ . < . F 1 ϋ € € . . . . . . . . ρ ! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ί 3 . . Έ K B . . . . . … @ . . . . . . A . . . . . – . A . . . . . ™ @ E . . . . . ³ I S . . . . . £ : S . . . . . . 3 S . . . . . 3 ( S . . . . . Υ ' S . . . . . ’ T . . . . . ΰ . . . „ . . . ο M B . . . . . µ @ . . . . . κ . A . . . . . § . A . . . . . O L A . . . . . U K A . . . . . . λ @ . . . . . . θ @ . . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 40 This block was allocated by thread 0x2A8, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 424F1F [Unknown function at __dbk_fcall_wrapper] 408DED 413EA0 413F9F DA87E7 [Unknown function at TMethodImplementationIntercept] DA8F48 [Unknown function at TMethodImplementationIntercept] DACB83 [Unknown function at TMethodImplementationIntercept] 955175 [Unknown function at TMethodImplementationIntercept] 9513C7 [Unknown function at TMethodImplementationIntercept] 95F466 [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: UnicodeString The allocation number is: 175512 Current memory dump of 256 bytes starting at pointer address 7FFFF053710: CC 65 E9 00 B0 04 02 00 01 00 00 00 06 00 00 00 53 00 65 00 72 00 76 00 65 00 72 00 00 00 53 21 C4 F5 0F 43 FB FF 80 80 80 80 80 80 80 80 80 80 00 00 00 00 00 00 00 00 91 58 05 FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 84 1A 03 00 B8 4B 42 00 00 00 00 00 85 8D 40 00 00 00 00 00 9D 1B 41 00 00 00 00 00 2D 23 41 00 00 00 00 00 E8 5B 8A 00 00 00 00 00 07 E0 8B 00 00 00 00 00 A2 E1 8B 00 00 00 00 00 DD 78 8A 00 00 00 00 00 77 F3 9B 00 00 00 00 00 79 F2 9B 00 00 00 00 00 A9 F2 9B 00 00 00 00 00 F8 1C 00 00 D0 0F 00 00 EF 4D 42 00 00 00 00 00 B5 8D 40 00 00 00 00 00 EA 1C 41 00 00 00 00 00 A7 1D 41 00 00 00 00 00 4F 4C 41 00 00 00 00 00 55 4B 41 00 00 00 00 00 13 EB 40 00 00 00 00 00 00 E8 40 00 00 00 00 00 Μ e ι . ° . . . . . . . . . . . S . e . r . v . e . r . . . S ! Δ υ . C ϋ € € € € € € € € € € . . . . . . . . ‘ X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . „ . . . Έ K B . . . . . … @ . . . . . . A . . . . . - # A . . . . . θ [ . . . . . . ΰ ‹ . . . . . Ά α ‹ . . . . . έ x . . . . . w σ › . . . . . y ς › . . . . . © ς › . . . . . ψ . . . Π . . . ο M B . . . . . µ @ . . . . . κ . A . . . . . § . A . . . . . O L A . . . . . U K A . . . . . . λ @ . . . . . . θ @ . . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 88 This block was allocated by thread 0x2A8, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 408D85 40E7D8 40F3E1 521878 [Unknown function at TMethodImplementationIntercept] DA8F18 [Unknown function at TMethodImplementationIntercept] DACB83 [Unknown function at TMethodImplementationIntercept] 955175 [Unknown function at TMethodImplementationIntercept] 9513C7 [Unknown function at TMethodImplementationIntercept] 95F466 [Unknown function at TMethodImplementationIntercept] 95F49C [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: TStrings The allocation number is: 175490 Current memory dump of 256 bytes starting at pointer address 7FFFF0C5970: D8 01 4F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 A0 39 F9 FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 87 4E F9 F4 25 43 FB FF 00 00 00 00 00 00 00 00 E1 2D 0C FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 67 94 08 00 B8 4B 42 00 00 00 00 00 85 8D 40 00 00 00 00 00 D8 E7 40 00 00 00 00 00 E1 F3 40 00 00 00 00 00 00 58 93 00 00 00 00 00 4B A0 90 00 00 00 00 00 D0 7B 92 00 00 00 00 00 D1 61 AC 00 00 00 00 00 B1 A8 B1 00 00 00 00 00 D1 E3 B1 00 00 00 00 00 11 FA B1 00 00 00 00 00 E0 18 00 00 84 14 00 00 EF 4D 42 00 00 00 00 00 B5 8D 40 00 00 00 00 00 Ψ . O . . . . . . . . . . . . . . . . . . . . . 9 ω . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ‡ N ω τ % C ϋ . . . . . . . . α - . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . g ” . . Έ K B . . . . . … @ . . . . . Ψ η @ . . . . . α σ @ . . . . . . X “ . . . . . K . . . . . Π { ’ . . . . . Ρ a ¬ . . . . . ± ¨ ± . . . . . Ρ γ ± . . . . . . ϊ ± . . . . . ΰ . . . „ . . . ο M B . . . . . µ @ . . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 152 This block was allocated by thread 0x2A8, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 408D85 40E7D8 40F3E1 525408 [Unknown function at TMethodImplementationIntercept] DA86A7 [Unknown function at TMethodImplementationIntercept] DA8F48 [Unknown function at TMethodImplementationIntercept] DACB83 [Unknown function at TMethodImplementationIntercept] 955175 [Unknown function at TMethodImplementationIntercept] 9513C7 [Unknown function at TMethodImplementationIntercept] 95F466 [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: TStringList The allocation number is: 175492 Current memory dump of 256 bytes starting at pointer address 7FFFF0CBC00: C0 19 4F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 A0 39 F9 FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 D0 D2 0C FF FF 07 00 00 06 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 C3 90 C3 F6 D3 47 FD FF 00 00 00 00 00 00 00 00 D1 83 0C FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8C C0 08 00 B8 4B 42 00 00 00 00 00 85 8D 40 00 00 00 00 00 D8 E7 40 00 00 00 00 00 E1 F3 40 00 00 00 00 00 08 54 52 00 00 00 00 00 F6 00 B1 00 00 00 00 00 ΐ . O . . . . . . . . . . . . . . . . . . . . . 9 ω . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Π . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Γ Γ φ Σ G ύ . . . . . . . . Ρ ƒ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ΐ . . Έ K B . . . . . … @ . . . . . Ψ η @ . . . . . α σ @ . . . . . . T R . . . . . φ . ± . . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 152 This block was allocated by thread 0x2A8, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 424F1F [Unknown function at __dbk_fcall_wrapper] 408DED 4158A5 415AB1 525281 [Unknown function at TMethodImplementationIntercept] 524EC7 [Unknown function at TMethodImplementationIntercept] 524FE3 [Unknown function at TMethodImplementationIntercept] 524964 [Unknown function at TMethodImplementationIntercept] 5248E7 [Unknown function at TMethodImplementationIntercept] DA864A [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: Unknown The allocation number is: 175504 Current memory dump of 256 bytes starting at pointer address 7FFFF0CD2C0: CC 65 E9 00 01 00 00 00 08 00 00 00 00 00 00 00 D0 1B 05 FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 A0 1A 05 FF FF 07 00 00 00 00 00 00 00 00 00 00 20 37 05 FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 D4 0C FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 29 46 A3 77 17 43 FB FF 80 80 80 80 80 80 80 80 00 00 00 00 00 00 00 00 40 6B 0C FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 4B 42 00 00 00 00 00 00 00 00 00 A0 AD 02 00 B8 4B 42 00 00 00 00 00 1F 4F 42 00 00 00 00 00 ED 8D 40 00 00 00 00 00 A0 3E 41 00 00 00 00 00 9F 3F 41 00 00 00 00 00 E7 87 DA 00 00 00 00 00 Μ e ι . . . . . . . . . . . . . Π . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . p Τ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ) F £ w . C ϋ € € € € € € € € . . . . . . . . @ k . . . . . . . . . . . . . . . . . . . . 0 K B . . . . . . . . . . . Έ K B . . . . . . O B . . . . . ν @ . . . . . > A . . . . . ? A . . . . . η ‡ Ϊ . . . . . --------------------------------2015/9/1 13:06:45-------------------------------- A memory block has been leaked. The size is: 152 This block was allocated by thread 0x2A8, and the stack trace (return addresses) at the time was: 424BB8 [Unknown function at __dbk_fcall_wrapper] 424F1F [Unknown function at __dbk_fcall_wrapper] 408DED 413EA0 413F9F DA87E7 [Unknown function at TMethodImplementationIntercept] DA8F48 [Unknown function at TMethodImplementationIntercept] DACB83 [Unknown function at TMethodImplementationIntercept] 955175 [Unknown function at TMethodImplementationIntercept] 9513C7 [Unknown function at TMethodImplementationIntercept] 95F466 [Unknown function at TMethodImplementationIntercept] The block is currently used for an object of class: UnicodeString The allocation number is: 175520 Current memory dump of 256 bytes starting at pointer address 7FFFF0CD460: CC 65 E9 00 B0 04 02 00 01 00 00 00 40 00 00 00 30 00 35 00 38 00 31 00 42 00 32 00 45 00 36 00 46 00 35 00 35 00 45 00 38 00 36 00 31 00 39 00 41 00 32 00 42 00 44 00 31 00 35 00 38 00 46 00 33 00 41 00 42 00 39 00 41 00 31 00 30 00 39 00 34 00 43 00 46 00 44 00 38 00 46 00 37 00 34 00 33 00 46 00 43 00 38 00 46 00 30 00 44 00 34 00 39 00 33 00 30 00 36 00 33 00 32 00 39 00 39 00 45 00 36 00 36 00 43 00 42 00 38 00 42 00 42 00 00 00 CE FA 18 FB 5F 4A FD FF 80 80 80 80 80 80 00 00 00 00 00 00 00 00 31 A9 0C FF FF 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 DA AA 08 00 B8 4B 42 00 00 00 00 00 85 8D 40 00 00 00 00 00 D8 E7 40 00 00 00 00 00 E1 F3 40 00 00 00 00 00 08 54 52 00 00 00 00 00 F6 00 B1 00 00 00 00 00 Μ e ι . ° . . . . . . . @ . . . 0 . 5 . 8 . 1 . B . 2 . E . 6 . F . 5 . 5 . E . 8 . 6 . 1 . 9 . A . 2 . B . D . 1 . 5 . 8 . F . 3 . A . B . 9 . A . 1 . 0 . 9 . 4 . C . F . D . 8 . F . 7 . 4 . 3 . F . C . 8 . F . 0 . D . 4 . 9 . 3 . 0 . 6 . 3 . 2 . 9 . 9 . E . 6 . 6 . C . B . 8 . B . B . . . Ξ ϊ . ϋ _ J ύ € € € € € € . . . . . . . . 1 © . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ϊ . . Έ K B . . . . . … @ . . . . . Ψ η @ . . . . . α σ @ . . . . . . T R . . . . . φ . ± . . . . . --------------------------------2015/9/1 13:06:45-------------------------------- This application has leaked memory. The small block leaks are (excluding expected leaks registered by pointer): 25 - 40 bytes: UnicodeString x 6 57 - 88 bytes: TStrings x 2 121 - 152 bytes: TStringList x 2, UnicodeString x 2, Unknown x 2 Note: Memory leak detail is logged to a text file in the same folder as this application. To disable this memory leak check, undefine "EnableMemoryLeakReporting".
Regards
-
Hi Davie,
for better understand of multithreading according fastreport. Get a look at this
https://www.fast-report.com/documentation/ProgMan/index.html?multithreading.htm
Regards -
Hi everybody,
because of the conversation for fast report, frxPDFExport1.Background:=True; creates me a problem at 64bit. Having false works ok!Regards
-
Hi,
if I understand well you need an editable dblookupcombobox. You can achieve this behavior by adding at unievents on aftercreate sender.editable = true
function afterCreate(sender) { sender.editable = true; }
-
Correct me if I am wrong,
do you mean two different customers connect at the same server at two different applications? -
Thanks to all,
agmoro7622 I have never notice it, and this was the problem. Now work ok!
Thanks again
-
Hi,
the application works ok if I run it as an exe. When I run it as a service, the number and currency symbol's changed, moreover when I pass characters to a query does not work. I load the same service at Win 7 and works ok.
Of cource I cave checked the Region settings at control panel.Does anyone has an idea?
Thanks for your time
-
Hi,
is there an easy way to transform an ISAPI/Standalone project to Service?Till know I create a new service project and insert all the code of the ISAPI/Standalone project and recompile.
Thanks in advance
-
Hi Bresler,
after all of those changes, when you have a 64bit project can you select BMUniDBGrid from Tool Palette?Thanks
-
Hi,
it matters the way that you want to distribute your software. For example if you want to deploy as an exe to a customer's pc that you don't have access then it is ok. But if you distribute software with a pay as you go model then adragan topic is more relative.Regards
-
Hi Bresler,
correct me If I am wrong but cannot be build for 64bits app.
Thanks for your time
-
Well, after I used it with Unigui and working allright,
the solution that I've used and recommended is http://www.trackmysoftware.com. I think is at a fair price for what it offers, and with good support.
-
Of course I'll explain.
The folder that css files exists is C:\Program Files (x86)\FMSoft\Framework\uniGUI\ext-4.2.2.1144\resourcesthere you should see a list of folders, now according the template that you use, select the correct folder, then you should edit the css file, search for .x-tree-icon and the it is straighforward what you change (width and height to the correct pixel size).
-
Hi,
to anyone that matters,
finally, for solving that problem I used a not so sophisticated solution, I've modified css .x-tree-icon value.
Thanks
- 1
-
-
Thanks for the fast reply Bresler,
Can you predict the time of that?
-
Hi,
can we use this at 64bit project?
Thanks
uniURLFrame.HTML.Loadfromfile vs uniURLFrame.URL:=
in General
Posted
Hi,
perhaps is the encoding that you use on html.
Do you have something like that on your html?