• <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>

            大龍的博客

            常用鏈接

            統計

            最新評論

            valgrind memcheck 錯誤分析收藏 -------- 轉

            1.默認使用工具memcheck

            2.輸出到XML文件:valgrind --leak-check=full --xml=yes --log-file="log.xml" myprog arg1 arg2

            3.錯誤解釋

            3.1Illegal read / Illegal write errors

            例如:

            Invalid read of size 4
            at 0x40F6BBCC: (within /usr/lib/libpng.so.2.1.0.9)
            by 0x40F6B804: (within /usr/lib/libpng.so.2.1.0.9)
            by 0x40B07FF4: read_png_image(QImageIO *) (kernel/qpngio.cpp:326)
            by 0x40AC751B: QImageIO::read() (kernel/qimage.cpp:3621)
            Address 0xBFFFF0E0 is not stack'd, malloc'd or free'd
            這個錯誤的發生是因為對一些memcheck猜想不應該訪問的內存進行了讀寫。
            3.2 Use of uninitialised values

            例如:

            Conditional jump or move depends on uninitialised value(s)
            at 0x402DFA94: _IO_vfprintf (_itoa.h:49)
            by 0x402E8476: _IO_printf (printf.c:36)
            by 0x8048472: main (tests/manuel1.c:8)
            這個錯誤的發生是因為使用了未初始化的數據。一般情況下有兩種情形容易出現這個錯誤:
            程序中的局部變量未初始化;
            C語言malloc的內存未初始化;C++中new的對象其成員未被初始化。
             
            3.3 Illegal frees
            例如:
            Invalid free()
            at 0x4004FFDF: free (vg_clientmalloc.c:577)
            by 0x80484C7: main (tests/doublefree.c:10)
            Address 0x3807F7B4 is 0 bytes inside a block of size 177 free'd
            at 0x4004FFDF: free (vg_clientmalloc.c:577)
            by 0x80484C7: main (tests/doublefree.c:10)
             
            3.4 When a block is freed with an inappropriate deallocation function
            例如:
            Mismatched free() / delete / delete []
            at 0x40043249: free (vg_clientfuncs.c:171)
            by 0x4102BB4E: QGArray::~QGArray(void) (tools/qgarray.cpp:149)
            by 0x4C261C41: PptDoc::~PptDoc(void) (include/qmemarray.h:60)
            by 0x4C261F0E: PptXml::~PptXml(void) (pptxml.cc:44)
            Address 0x4BB292A8 is 0 bytes inside a block of size 64 alloc'd
            at 0x4004318C: operator new[](unsigned int) (vg_clientfuncs.c:152)
            by 0x4C21BC15: KLaola::readSBStream(int) const (klaola.cc:314)
            by 0x4C21C155: KLaola::stream(KLaola::OLENode const *) (klaola.cc:416)
            by 0x4C21788F: OLEFilter::convert(QCString const &) (olefilter.cc:272)
          1. If allocated with malloc, calloc, realloc, valloc or memalign, you must deallocate with free.

          2. If allocated with new[], you must deallocate with delete[].

          3. If allocated with new, you must deallocate with delete.

            linux系統對上述錯誤可能不在意,但是移值到其他平臺時卻會有問題。

            3.5 Passing system call parameters with inadequate read/write permissions

          4. 例如:
            Syscall param write(buf) points to uninitialised byte(s)
            at 0x25A48723: __write_nocancel (in /lib/tls/libc-2.3.3.so)
            by 0x259AFAD3: __libc_start_main (in /lib/tls/libc-2.3.3.so)
            by 0x8048348: (within /auto/homes/njn25/grind/head4/a.out)
            Address 0x25AB8028 is 0 bytes inside a block of size 10 alloc'd
            at 0x259852B0: malloc (vg_replace_malloc.c:130)
            by 0x80483F1: main (a.c:5)
            Syscall param exit(error_code) contains uninitialised byte(s)
            at 0x25A21B44: __GI__exit (in /lib/tls/libc-2.3.3.so)
            by 0x8048426: main (a.c:8)
            Memcheck檢查所有的被系統調用的參數。
          5. It checks all the direct parameters themselves.

          6. Also, if a system call needs to read from a buffer provided by your program, Memcheck checks that the entire buffer is addressable and has valid data, ie, it is readable.

          7. Also, if the system call needs to write to a user-supplied buffer, Memcheck checks that the buffer is addressable.

            例如:

            #include <stdlib.h> #include <unistd.h> int main( void ) { char* arr = malloc(10); int* arr2 = malloc(sizeof(int)); write( 1 /* stdout */, arr, 10 ); exit(arr2[0]); }

            錯誤信息:

            Syscall param write(buf) points to uninitialised byte(s) at 0x25A48723: __write_nocancel (in /lib/tls/libc-2.3.3.so) by 0x259AFAD3: __libc_start_main (in /lib/tls/libc-2.3.3.so) by 0x8048348: (within /auto/homes/njn25/grind/head4/a.out) Address 0x25AB8028 is 0 bytes inside a block of size 10 alloc'd at 0x259852B0: malloc (vg_replace_malloc.c:130) by 0x80483F1: main (a.c:5) Syscall param exit(error_code) contains uninitialised byte(s) at 0x25A21B44: __GI__exit (in /lib/tls/libc-2.3.3.so) by 0x8048426: main (a.c:8)

            傳遞了無效參數到系統函數中。

            3.6 Overlapping source and destination blocks

            C的以下庫函數拷貝數據從一塊內存到另一塊內存時: memcpy(), strcpy(), strncpy(), strcat(), strncat(). 源和目的都不允許溢出。

            例如:

            ==27492== Source and destination overlap in memcpy(0xbffff294, 0xbffff280, 21) ==27492== at 0x40026CDC: memcpy (mc_replace_strmem.c:71) ==27492== by 0x804865A: main (overlap.c:40)

            3.7 Memory leak detection

            錯誤信息:

            Still reachable: A pointer to the start of the block is found. This usually indicates programming sloppiness. Since the block is still pointed at, the programmer could, at least in principle, free it before program exit. Because these are very common and arguably not a problem, Memcheck won't report such blocks unless --show-reachable=yes is specified.

            Possibly lost, or "dubious": A pointer to the interior of the block is found. The pointer might originally have pointed to the start and have been moved along, or it might be entirely unrelated. Memcheck deems such a block as "dubious", because it's unclear whether or not a pointer to it still exists.

            Definitely lost, or "leaked": The worst outcome is that no pointer to the block can be found. The block is classified as "leaked

          8. posted on 2009-02-27 11:38 大龍 閱讀(2391) 評論(0)  編輯 收藏 引用

            色8激情欧美成人久久综合电| 伊人久久综合精品无码AV专区| 国产精品久久毛片完整版| 久久亚洲国产精品一区二区| 久久精品人妻一区二区三区| 奇米综合四色77777久久| 国产精品欧美久久久久无广告| 久久九九久精品国产免费直播| 狠狠综合久久综合88亚洲| 精品国产VA久久久久久久冰| 久久这里有精品视频| 精品无码久久久久久尤物| 一级女性全黄久久生活片免费| 青青青青久久精品国产 | 漂亮人妻被黑人久久精品| 国产精自产拍久久久久久蜜| 久久精品亚洲一区二区三区浴池 | 久久精品国产99久久无毒不卡| 久久99久久无码毛片一区二区| 九九久久自然熟的香蕉图片| 久久久久久久综合日本| 国产精自产拍久久久久久蜜| 精品久久久久久| 精品国产91久久久久久久| 人妻精品久久久久中文字幕69 | 亚洲精品97久久中文字幕无码| 99久久精品免费看国产一区二区三区| 精品久久久久香蕉网| 无码超乳爆乳中文字幕久久| 亚洲精品乱码久久久久久久久久久久| 亚洲七七久久精品中文国产 | 国产99久久久国产精免费| 国产欧美一区二区久久| 狠狠色丁香久久综合婷婷| 久久国产高潮流白浆免费观看| 欧美熟妇另类久久久久久不卡| 久久婷婷五月综合成人D啪| 久久99久国产麻精品66| 日本久久久久亚洲中字幕| 99久久超碰中文字幕伊人| 久久久久免费精品国产|