Oma*_*mar 1 c valgrind memory-leaks
我在使用valgrind中产生错误的这一小部分代码时遇到了麻烦.当我评论代码并运行valgrind时,我没有得到任何内存泄漏或错误,所以这个循环应该是原因:
///Print the top users
const char* str;
for (int i = 0; i < count; i++) {
if (FinalArray[i].Score == -1) {
break;
}
int id = UserGetID(user);
char* name = UserGetName(user);
int finalID = UserGetID(FinalArray[i].user);
char* finalName = UserGetName(FinalArray[i].user);
assert(finalName!= NULL && name !=NULL);
str = mtmSuggestFriends(id, name, finalID, finalName);
if (str == NULL) {
return MAIN_ALLOCATION_FAILED;
}
// fprintf(fileOutput, str);
}
Run Code Online (Sandbox Code Playgroud)
在这个循环之后,我只返回一个枚举说明成功.
以下是Valgrind中的错误:
==8779== Use of uninitialised value of size 8
==8779== at 0x4037C2: UserGetName (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== by 0x401FAC: SuggestFriends (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== by 0x402E6D: executeUserCommand (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== by 0x40281B: main (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779==
==8779== Use of uninitialised value of size 8
==8779== at 0x4037A0: UserGetID (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== by 0x401FC8: SuggestFriends (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== by 0x402E6D: executeUserCommand (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== by 0x40281B: main (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779==
==8779== Invalid read of size 1
==8779== at 0x403F1A: mtmSuggestFriends (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== by 0x401FEE: SuggestFriends (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== by 0x402E6D: executeUserCommand (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== by 0x40281B: main (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== Address 0x9848B4458BB44589 is not stack'd, malloc'd or (recently) free'd
==8779==
==8779== Process terminating with default action of signal 11 (SIGSEGV)
==8779== General Protection Fault
==8779== at 0x403F1A: mtmSuggestFriends (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== by 0x401FEE: SuggestFriends (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== by 0x402E6D: executeUserCommand (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779== by 0x40281B: main (in /u1/023/mtm/ex2/RUN/mtm_isocial)
==8779==
==8779== ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 4 from 1)
==8779== malloc/free: in use at exit: 1,250 bytes in 93 blocks.
==8779== malloc/free: 455 allocs, 362 frees, 10,081 bytes allocated.
==8779== For counts of detected errors, rerun with: -v
==8779== searching for pointers to 93 not-freed blocks.
==8779== checked 122,512 bytes.
==8779==
==8779== LEAK SUMMARY:
==8779== definitely lost: 0 bytes in 0 blocks.
==8779== possibly lost: 0 bytes in 0 blocks.
==8779== still reachable: 1,250 bytes in 93 blocks.
==8779== suppressed: 0 bytes in 0 blocks.
==8779== Reachable blocks (those to which a pointer was found) are not shown.
==8779== To see them, rerun with: --show-reachable=yes
Run Code Online (Sandbox Code Playgroud)
函数ToStringUser返回一个const char*的malloc ..所以我不担心将它释放出来吗?
知道为什么会这样吗?
我尝试在for中使用此代码释放str,但我一直得到相同的错误和相同数量的内存泄漏:
free((char*) str); OR free((void*) str);
Run Code Online (Sandbox Code Playgroud)
这是User的结构,getID和getName:
struct User_t {
char *Name;
int ID;
int Birth;
};
int UserGetID(User user) {
return user->ID;
}
char* UserGetName(User user) {
return user->Name;
}
Run Code Online (Sandbox Code Playgroud)
在循环之前,我用这个初始化一个新用户:
User user = FindUserPointer(setUser, id);
Run Code Online (Sandbox Code Playgroud)
使用的功能是这样的:
static User FindUserPointer(Set users, int ID) {
assert(users!=NULL);
User tmpUser = UserCreate("temp", ID, 99);
if (tmpUser == NULL) {
return NULL;
}
SET_FOREACH(User,Itrator1,users) {
if (UserCompare(tmpUser, Itrator1) == 0) {
UserFree(tmpUser);
return Itrator1;
}
}
UserFree(tmpUser);
return NULL;
}
Run Code Online (Sandbox Code Playgroud)
Valgrind并没有抱怨泄漏 - 它抱怨你正在读取未初始化的内存并取消引用无效指针(无效指针deref正在崩溃程序 - 至少在Valgrind下).
我们需要看到UserGetID()并UserGetName()希望确定那些中的错误(但仍然可能还不够).
根据您的评论mtmSuggestFriends是一个您没有源代码的对象文件,我的猜测是UsetGetID()和/或UserGetName()传递无效指针mtmSuggestFriends.