Tuesday, September 29, 2009

 

Using umdh to trace down Windows memory leaks

  1. Install Windbg
  2. set path="C:\Program Files\Debugging Tools for Windows (x64)";%path%
  3. enable sysmtem stack trace - gflags -r +ust
  4. md c:\websymbols
  5. set symbols path - set _NT_SYMBOL_PATH=SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols;X:\Symbols\exe64ex
  6. snap process memory - umdh -p:pid -f:output-1-file
  7. snap process memory again - umdh -p:pid -f:output-2-file
  8. compare two memory snap - umdh output-1-file output-2-file  -f:cmp.txt
  9. cmp.txt should contain leak information.


Comments: Post a Comment

Links to this post:

Create a Link



<< Home

This page is powered by Blogger. Isn't yours?