上一页 1 ··· 23 24 25 26 27 28 29 30 31 ··· 34 下一页

2010年7月14日

摘要: UMDH UMDH是基于trace或者dump想法的工具。在使用UMDH之前首先要使用GFlags enable stack trace。然后在leak之前和leak之后分别对stack trace做dump,然后对前后的trace做比较。下面是比较后结果的一个示例: 对各个数字的含义使用红字标出 + 25be880 [两次的数值差,表明在两次dump之间同样的call stack 又分配了多少内存]( 25ce890[第二次stace中分配的总byte数] – 10010[第一次strac中分配的总byte数]) 1c allocs BackTraceB30BBE0+ 1b [两个dump之 阅读全文
posted @ 2010-07-14 19:49 做个不善的人 阅读(805) 评论(0) 推荐(0)
 
摘要: If you think that you are experiencing a memory leak, be aware that memory leaks may not be what they appear to be. You may discover that a memory leak is not a true memory leak, but is a performance enhancement. For example, the Microsoft Jet database engine can consume large amounts of memory (up 阅读全文
posted @ 2010-07-14 16:59 做个不善的人 阅读(708) 评论(0) 推荐(0)
 

2010年7月13日

摘要: What Do Memory-Mapped Files Have to Offer?One advantage to using MMF I/O is that the system performs all data transfers for it in 4K pages of data. Internally all pages of memory are managed by the virtual-memory manager (VMM). It decides when a page should be paged to disk, which pages are to be fr 阅读全文
posted @ 2010-07-13 15:58 做个不善的人 阅读(374) 评论(0) 推荐(0)
 

2010年7月7日

摘要: Two of the most common and intractable problems that programmers encounter are overwriting the end of an allocated buffer and leaking memory (failing to free allocations after they are no longer needed). The debug heap provides powerful tools to solve memory allocation problems of this kind. The de. 阅读全文
posted @ 2010-07-07 20:38 做个不善的人 阅读(580) 评论(0) 推荐(0)
 

2010年7月6日

摘要: The working set of a program is a collection of those pages in its virtual address space that have been recently referenced. It includes both shared and private data. The shared data includes pages that contain all instructions your application executes, including those in your DLLs and the system D 阅读全文
posted @ 2010-07-06 22:30 做个不善的人 阅读(3361) 评论(1) 推荐(0)
 

2010年6月30日

摘要: Heap fragmentation is a state in which available memory is broken into small, noncontiguous blocks. When a heap is fragmented, memory allocation can fail even when the total available memory in the heap is enough to satisfy a request, because no single block of memory is large enough. The low-fragme 阅读全文
posted @ 2010-06-30 14:16 做个不善的人 阅读(1519) 评论(0) 推荐(0)
 
摘要: Heap Verifier Stops Attempt To Destroy Process Heap It is incorrect to try to destroy the default process heap (the one returned by GetProcessHeap() interface). Corrupted End Stamp of Block Header This stop occurs when the end stamp of the header of the block is corrupted. This happens during buffe. 阅读全文
posted @ 2010-06-30 11:03 做个不善的人 阅读(1496) 评论(0) 推荐(0)
 
摘要: An optional entry point into a dynamic-link library (DLL). When the system starts or terminates a process or thread, it calls the entry-point function for each loaded DLL using the first thread of the process. The system also calls the entry-point function for a DLL when it is loaded or unloaded usi 阅读全文
posted @ 2010-06-30 11:02 做个不善的人 阅读(213) 评论(0) 推荐(0)
 

2010年6月26日

摘要: CLR 没有与任何操作系统集成,也就是说,当用户运行一个托管代码程序或者一个Native代码的程序时,OS对其是毫不知情的,所以也就没法根据其是什么类型的代码来决定是否要调用CLR来运行特定的程序。因此进程创建时必须由自己完成CLR的加载操作。 加载CLR涉及到运行库宿主(Runtime Host) 。Runtime host需要加载CLR,因此他本身至少包含是Native代码的。 Most runtime hosts consist of both unmanaged and managed code. The unmanaged hosting code loads the runtime 阅读全文
posted @ 2010-06-26 11:29 做个不善的人 阅读(787) 评论(0) 推荐(0)
 

2010年6月25日

摘要: 端开发设计,打交道最多的就是图片啦~今天就来个图片格式讲解,也许一些围绕你的问题可以在这篇文章中找到答案 Gif格式图片的特点 透明性 Gif是一种布尔透明类型,既它可以是全透明,也可以是全不透明,但是它并没有半透明(alpha 透明)。 动画 Gif这种格式支持动画。 无损耗性 Gif是一种无损耗的图像格式,这也意味着你可以对gif图片做任何操作也不会使 得图像质量产生损耗。 水平扫描 Gif是使用了一种叫作LZW的算法进行压缩的,当压缩gif的过程中,像素是由上到下水平压缩的,这也意味着同等条件下,横向的gif图片比竖向的gif图片更加小。例如500*10的图片比10*5... 阅读全文
posted @ 2010-06-25 13:13 做个不善的人 阅读(957) 评论(0) 推荐(0)
 
上一页 1 ··· 23 24 25 26 27 28 29 30 31 ··· 34 下一页