gpt4 book ai didi

c - Invalid write/read valgrind错误,其他问题未找到解决方案

转载 作者:太空狗 更新时间:2023-10-29 15:18:05 27 4
gpt4 key购买 nike

我正在为家庭作业编写 C 代码,该作业通过内存段的动态数组复制主内存。

这些内存段来自不同的接口(interface),它本身只是一个uint32_ts的静态数组。

我的主内存接口(interface)称为 heapmem(如堆内存),自从切换后,我一直收到奇怪的 valgrind 读/写错误。在拒绝我之前,我已经进行了调查和研究,并将 SO 作为最后的手段。

这里是错误

==30352== Invalid write of size 8
==30352== at 0x401661: HeapMem_map (heapmem.c:84)
==30352== by 0x400E74: map (um.c:109)
==30352== by 0x4010FD: runOpcode (um.c:182)
==30352== by 0x4011A1: UM_run (um.c:209)
==30352== by 0x400A71: main (main.c:10)
==30352== Address 0x4c53b00 is 0 bytes after a block of size 16 alloc'd
==30352== at 0x4A0610C: malloc (vg_replace_malloc.c:195)
==30352== by 0x401425: HeapMem_new (heapmem.c:32)
==30352== by 0x400ABE: UM_new (um.c:31)
==30352== by 0x400A64: main (main.c:8)
==30352==
==30352== Invalid read of size 8
==30352== at 0x401787: HeapMem_put (heapmem.c:114)
==30352== by 0x400D38: sstore (um.c:90)
==30352== by 0x401090: runOpcode (um.c:167)
==30352== by 0x4011A1: UM_run (um.c:209)
==30352== by 0x400A71: main (main.c:10)
==30352== Address 0x4c53b00 is 0 bytes after a block of size 16 alloc'd
==30352== at 0x4A0610C: malloc (vg_replace_malloc.c:195)
==30352== by 0x401425: HeapMem_new (heapmem.c:32)
==30352== by 0x400ABE: UM_new (um.c:31)
==30352== by 0x400A64: main (main.c:8)
==30352==
==30352== Invalid read of size 8
==30352== at 0x401956: car_double (heapmem.c:151)
==30352== by 0x401640: HeapMem_map (heapmem.c:82)
==30352== by 0x400E74: map (um.c:109)
==30352== by 0x4010FD: runOpcode (um.c:182)
==30352== by 0x4011A1: UM_run (um.c:209)
==30352== by 0x400A71: main (main.c:10)
==30352== Address 0x4c53b00 is 0 bytes after a block of size 16 alloc'd
==30352== at 0x4A0610C: malloc (vg_replace_malloc.c:195)
==30352== by 0x401425: HeapMem_new (heapmem.c:32)
==30352== by 0x400ABE: UM_new (um.c:31)
==30352== by 0x400A64: main (main.c:8)
==30352==
==30352== Invalid read of size 8
==30352== at 0x40174A: HeapMem_get (heapmem.c:108)
==30352== by 0x400CD9: sload (um.c:86)
==30352== by 0x401079: runOpcode (um.c:164)
==30352== by 0x4011A1: UM_run (um.c:209)
==30352== by 0x400A71: main (main.c:10)
==30352== Address 0x4c7e0f0 is 0 bytes after a block of size 4,096 alloc'd
==30352== at 0x4A0610C: malloc (vg_replace_malloc.c:195)
==30352== by 0x401923: car_double (heapmem.c:148)
==30352== by 0x401640: HeapMem_map (heapmem.c:82)
==30352== by 0x400E74: map (um.c:109)
==30352== by 0x4010FD: runOpcode (um.c:182)
==30352== by 0x4011A1: UM_run (um.c:209)
==30352== by 0x400A71: main (main.c:10)

以下是给我错误的代码中的函数:

//  Heap Memory Structure
struct T {
Stack_T SegID_stack;
MemSeg_T* HeapMem_car;
int length, highest;
};

// Create a new heap memory structure
T HeapMem_new (MemSeg_T program) {
assert (program);
T retHeap = malloc(sizeof(*retHeap));
Stack_T structStack = Stack_new ();
retHeap->length = INIT_SIZE;
retHeap->highest = 0;
MemSeg_T* structCar = malloc(INIT_SIZE * sizeof(*structCar));
// Fill the array with NULL ptrs
for (int i = 0; i < INIT_SIZE; i++) {
structCar[i] = NULL;
}
retHeap->HeapMem_car = structCar;
retHeap->SegID_stack = structStack;
// We'll be using the map function to initialize
// the heap with a program at the 0th segment.
HeapMem_map (retHeap, MemSeg_length (program));
retHeap->HeapMem_car[PROGRAM_LOC] = program;
return retHeap;
}

// Line 84
heapmem->HeapMem_car[toMap] = segment;
// Line 114
MemSeg_T segToPut = heapmem->HeapMem_car[toPut];
// Line 151
newCar[i] = heapmem->HeapMem_car[i];
// Line 108
MemSeg_T wordSeg = heapmem->HeapMem_car[toGet];

可用的其余代码 here .

最佳答案

首先对您的一个错误进行小剖析:

==30352== Invalid write of size 8
==30352== at 0x401661: HeapMem_map (heapmem.c:84)
==30352== by 0x400E74: map (um.c:109)
==30352== by 0x4010FD: runOpcode (um.c:182)
==30352== by 0x4011A1: UM_run (um.c:209)
==30352== by 0x400A71: main (main.c:10)
==30352== Address 0x4c53b00 is 0 bytes after a block of size 16 alloc'd
==30352== at 0x4A0610C: malloc (vg_replace_malloc.c:195)
==30352== by 0x401425: HeapMem_new (heapmem.c:32)
==30352== by 0x400ABE: UM_new (um.c:31)
==30352== by 0x400A64: main (main.c:8)

请注意此列表的底部告诉您分配发生的位置。高层告诉你它是如何被滥用的。在这种情况下,您刚好超过请求分配的末尾 8 个字节。

您会注意到其中的所有超限,其余违规均以完全相同的偏移量(8 字节)超出其能力范围。对引用代码的进一步检查表明它似乎总是相同的数组。这实际上是一件好事,因为这很可能只是错误地计算了数据项的存在可能性,并且超出了您允许的空间范围内的一个或两个

在这种情况下,被破坏的项目似乎是一个动态分配的指针列表 (heapmem->HeapMem_car[])。在具有 64 位指针的机器上运行会使每个指针为 8 字节宽,因此您可能只是在该分配的最后一个可访问元素中相差一个,而在 C 中,这通常总是意味着在某些情况下您分配了 N 项然后访问了 array[N] 忘记了限制是 N-1。上述所有访问违规似乎都围绕着对该数组的索引没有越界的信念,但 valgrind 报告它们是。我建议您将一些 assert() 插入这些访问点并打破违规以查看您是如何到达那里的。哦等等.. valgrind 已经为您提供了该信息。看看那个可爱的调用堆栈。嗯……

那么为什么即使在这些违规情况下它似乎也能奏效? 多种可能性。如果你不走出分配的内存太远 - 并且这里的所有地址之后都是 0 字节 - (毕竟这些是指针,所以祈祷它们为 NULL)你很有可能不会覆盖重要数据和程序似乎工作。直到分配突然落在其他地方并且您跨过页面边界。超过那个和 kerboom。

感谢Daniel Fischer对于此答案第二部分的贡献(为什么它似乎有效)。

关于c - Invalid write/read valgrind错误,其他问题未找到解决方案,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/13480521/

27 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com