无效的写入/读取valgrind错误,在其他问题中找不到解决方案

Jam*_*man 4 c valgrind

我正在编写一个家庭作业的C代码,它通过动态的内存段数组复制主内存.

这些内存段来自不同的接口,它本身只是uint32_ts的静态数组.

我的主内存接口叫做heapmem(就像在堆内存中一样),自从交换机以来我一直在获得奇怪的valgrind读/写错误.在咀嚼我之前,我已经进行了研究,并且作为最后的手段来到SO.

这是错误

==30352== Invalid write of size 8
==30352==    at 0x401661: HeapMem_map (heapmem.c:84)
==30352==    by 0x400E74: map (um.c:109)
==30352==    by 0x4010FD: runOpcode (um.c:182)
==30352==    by 0x4011A1: UM_run (um.c:209)
==30352==    by 0x400A71: main (main.c:10)
==30352==  Address 0x4c53b00 is 0 bytes after a block of size 16 alloc'd
==30352==    at 0x4A0610C: malloc (vg_replace_malloc.c:195)
==30352==    by 0x401425: HeapMem_new (heapmem.c:32)
==30352==    by 0x400ABE: UM_new (um.c:31)
==30352==    by 0x400A64: main (main.c:8)
==30352== 
==30352== Invalid read of size 8
==30352==    at 0x401787: HeapMem_put (heapmem.c:114)
==30352==    by 0x400D38: sstore (um.c:90)
==30352==    by 0x401090: runOpcode (um.c:167)
==30352==    by 0x4011A1: UM_run (um.c:209)
==30352==    by 0x400A71: main (main.c:10)
==30352==  Address 0x4c53b00 is 0 bytes after a block of size 16 alloc'd
==30352==    at 0x4A0610C: malloc (vg_replace_malloc.c:195)
==30352==    by 0x401425: HeapMem_new (heapmem.c:32)
==30352==    by 0x400ABE: UM_new (um.c:31)
==30352==    by 0x400A64: main (main.c:8)
==30352== 
==30352== Invalid read of size 8
==30352==    at 0x401956: car_double (heapmem.c:151)
==30352==    by 0x401640: HeapMem_map (heapmem.c:82)
==30352==    by 0x400E74: map (um.c:109)
==30352==    by 0x4010FD: runOpcode (um.c:182)
==30352==    by 0x4011A1: UM_run (um.c:209)
==30352==    by 0x400A71: main (main.c:10)
==30352==  Address 0x4c53b00 is 0 bytes after a block of size 16 alloc'd
==30352==    at 0x4A0610C: malloc (vg_replace_malloc.c:195)
==30352==    by 0x401425: HeapMem_new (heapmem.c:32)
==30352==    by 0x400ABE: UM_new (um.c:31)
==30352==    by 0x400A64: main (main.c:8)
==30352== 
==30352== Invalid read of size 8
==30352==    at 0x40174A: HeapMem_get (heapmem.c:108)
==30352==    by 0x400CD9: sload (um.c:86)
==30352==    by 0x401079: runOpcode (um.c:164)
==30352==    by 0x4011A1: UM_run (um.c:209)
==30352==    by 0x400A71: main (main.c:10)
==30352==  Address 0x4c7e0f0 is 0 bytes after a block of size 4,096 alloc'd
==30352==    at 0x4A0610C: malloc (vg_replace_malloc.c:195)
==30352==    by 0x401923: car_double (heapmem.c:148)
==30352==    by 0x401640: HeapMem_map (heapmem.c:82)
==30352==    by 0x400E74: map (um.c:109)
==30352==    by 0x4010FD: runOpcode (um.c:182)
==30352==    by 0x4011A1: UM_run (um.c:209)
==30352==    by 0x400A71: main (main.c:10)
Run Code Online (Sandbox Code Playgroud)

以下代码中的函数给出了错误:

//  Heap Memory Structure
struct T {
   Stack_T SegID_stack;
   MemSeg_T* HeapMem_car;
   int length, highest;
};

//  Create a new heap memory structure
T HeapMem_new (MemSeg_T program) {
    assert (program);
    T retHeap = malloc(sizeof(*retHeap));
    Stack_T structStack = Stack_new ();
    retHeap->length = INIT_SIZE;
    retHeap->highest = 0;
    MemSeg_T* structCar = malloc(INIT_SIZE * sizeof(*structCar));
    //  Fill the array with NULL ptrs
    for (int i = 0; i < INIT_SIZE; i++) {
        structCar[i] = NULL;
    }
    retHeap->HeapMem_car = structCar;
    retHeap->SegID_stack = structStack;
    //  We'll be using the map function to initialize
    //  the heap with a program at the 0th segment.
    HeapMem_map (retHeap, MemSeg_length (program));
    retHeap->HeapMem_car[PROGRAM_LOC] = program;
    return retHeap;
}

//  Line 84
heapmem->HeapMem_car[toMap] = segment;
//  Line 114
MemSeg_T segToPut = heapmem->HeapMem_car[toPut];
//  Line 151
newCar[i] = heapmem->HeapMem_car[i];
//  Line 108
MemSeg_T wordSeg = heapmem->HeapMem_car[toGet];
Run Code Online (Sandbox Code Playgroud)

其余代码可在此处获得.

Who*_*aig 10

首先对您的一个错误进行小的剖析:

==30352== Invalid write of size 8
==30352==    at 0x401661: HeapMem_map (heapmem.c:84)
==30352==    by 0x400E74: map (um.c:109)
==30352==    by 0x4010FD: runOpcode (um.c:182)
==30352==    by 0x4011A1: UM_run (um.c:209)
==30352==    by 0x400A71: main (main.c:10)
==30352==  Address 0x4c53b00 is 0 bytes after a block of size 16 alloc'd
==30352==    at 0x4A0610C: malloc (vg_replace_malloc.c:195)
==30352==    by 0x401425: HeapMem_new (heapmem.c:32)
==30352==    by 0x400ABE: UM_new (um.c:31)
==30352==    by 0x400A64: main (main.c:8)
Run Code Online (Sandbox Code Playgroud)

请注意,此列表的底部是告诉您分配发生的位置.顶部告诉你它是如何被误用的.在这种情况下,您正在超过所请求分配的末尾8个字节.

您将注意到此中的所有超出,并且剩余的违规超出了它们的范围,完全相同的偏移量(8个字节).进一步检查引用的代码表明它似乎总是相同的数组.这实际上是一件好事,因为它很可能是一个简单错误地计算数据项如何存在并且超出允许空间的一个或两个的问题.

在这种情况下,被破坏的项目似乎是动态分​​配的指针列表(heapmem->HeapMem_car[]).在具有64位指针的机器上运行将使每个8字节宽,因此您可能只是在这个分配的最后一个元素可访问的一个接一个,并且在C中,通常总是意味着在某些指出你分配的N项目,然后访问array[N]忘记限制是N-1.所有上述访问冲突似乎都集中在信念上,即索引到该数组中的数据不是越界,但valgrind报告它们是.我建议你将一些断言()s放入这些接入点并打破违规行为,看看你是如何到达那里的.哦等等.. valgrind已经为你提供了这个信息.看看那个可爱的电话堆栈.Hmmmm ...

那么为什么即使有这些漏洞似乎也可以工作呢?有很多可能性.如果你没有走出分配的内存远 - 这里的所有地址都是0字节后 - (这些都是指针,所以祈祷它们是NULL)你很可能不会覆盖重要的数据和程序似乎工作.直到分配突然降落在其他地方,然后你跨过页面边界.超越那个和kerboom.

感谢Daniel Fischer对本答案第二部分的贡献(为什么它似乎有效).