• <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>

            S.l.e!ep.¢%

            像打了激速一樣,以四倍的速度運(yùn)轉(zhuǎn),開心的工作
            簡單、開放、平等的公司文化;尊重個性、自由與個人價值;
            posts - 1098, comments - 335, trackbacks - 0, articles - 1
              C++博客 :: 首頁 :: 新隨筆 :: 聯(lián)系 :: 聚合  :: 管理

            內(nèi)存崩潰的BUG (3)

            Posted on 2009-04-01 13:35 S.l.e!ep.¢% 閱讀(1726) 評論(3)  編輯 收藏 引用 所屬分類: WinDbg

            內(nèi)存崩潰的BUG
            內(nèi)存崩潰的BUG (2)

            在昨天的調(diào)試中,感謝JayZ
            -----------------------------------------------------------------------------------------------------
            地址段034bd000 - 00007000沒法訪問。

            看調(diào)用棧0012e50c 0042ffc3 00000400 034c0fec 00000001 ws2_32!WSASend+0x61

            WSASend的第二個參數(shù)為034c0fec很不幸的落在這個區(qū)間內(nèi)。看WSASend的原型
            int WSASend(
            __in SOCKET s,
            __in LPWSABUF lpBuffers,
            __in DWORD dwBufferCount,
            __out LPDWORD lpNumberOfBytesSent,
            __in DWORD dwFlags,
            __in LPWSAOVERLAPPED lpOverlapped,
            __in LPWSAOVERLAPPED_COMPLETION_ROUTINE lpCompletionRoutine
            );
            顯然第二個參數(shù)lpBuffers的地址非法。

            call stack frame往上就是你的代碼了:
            0012f580 0040e577 0012f5bc 00000014 0012f58c xxx.exe+xxx-function

            你需要在這里確認(rèn)一下為什么傳出的lpBuffers指向一個錯誤的地址
            -------------------------------------------------------------------------------------------------------

            傳入 WSASend 的第二個參數(shù) lpBuffers 確實(shí)指向了一個錯誤的地址,
            用 knL + .frame + x
            查看了?? xxx.exe+xxx-function???? 的局部變量,發(fā)現(xiàn)

            -------------------------------------------------------------------------------------------------------
            PER_IO_CONTEXT* overlappedEx=new PER_IO_CONTEXT;????? 發(fā)現(xiàn)??overlappedEx ?這個指針已經(jīng)指向的內(nèi)存是不對的
            overlappedEx->IOOperation= WRITE;
            overlappedEx->wsabuf.buf= (char *)malloc( nLen );
            if( NULL == overlappedEx->wsabuf.buf )
            {
            delete overlappedEx;
            return -1;
            }

            if(WSASend(m_socket,&(overlappedEx->wsabuf), 0x01,
            &(overlappedEx->dwBytes), overlappedEx->dwFlags,
            &(overlappedEx->Overlapped), NULL ) == SOCKET_ERROR)
            {

            在IOCP通知后,會 delete overlappedEx
            -------------------------------------------------------------------------------------------------------

            懷疑是不是 overlappedEx 這個指針的值被其它地方修改了?
            于是在局?jǐn)?shù)變量中定義了多一個變量,在 WSASend 調(diào)用前,加多這個語句,

            PER_IO_CONTEXT* p? = overlappedEx;

            等了幾個小時,再次重現(xiàn)問題,

            用 knL + .frame + x
            查看了?? xxx.exe+xxx-function???? 的局部變量,發(fā)現(xiàn)

            p 的值跟 overlappedEx 還是相等的, 但它們指向的內(nèi)存卻是

            0366fe8c p = 0x03443fd8
            0:010> !address 0x03443fd8
            ??? 03442000 : 03442000 - 00007000
            ??????????????????? Type???? 00000000
            ??????????????????? Protect? 00000001 PAGE_NOACCESS
            ??????????????????? State??? 00010000 MEM_FREE????????????????
            ??????????????????? Usage??? RegionUsageFree
            0:010> dd 0x03443fd8
            03443fd8? ???????? ???????? ???????? ????????
            03443fe8? ???????? ???????? ???????? ????????
            03443ff8? ???????? ???????? ???????? ????????
            03444008? ???????? ???????? ???????? ????????
            03444018? ???????? ???????? ???????? ????????
            03444028? ???????? ???????? ???????? ????????
            03444038? ???????? ???????? ???????? ????????
            03444048? ???????? ???????? ???????? ????????

            0:010> KB
            ChildEBP RetAddr? Args to Child?????????????
            0366edac 71a26294 00000668 03443fec 00000001 mswsock!WSPSend+0x243
            0366ede8 00430027 00000668 03443fec 00000001 ws2_32!WSASend+0x77

            初步結(jié)論是: 在執(zhí)行到? mswsock!WSPSend+0x243 ,在 WSASend 上一層 new 出來的? PER_IO_CONTEXT 已經(jīng)被 delete 了

            Feedback

            # re: 內(nèi)存崩潰的BUG (3)   回復(fù)  更多評論   

            2009-04-02 00:15 by JayZ
            看如下輸出:
            03442000 : 03442000 - 00007000
            Type 00000000
            Protect 00000001 PAGE_NOACCESS
            State 00010000 MEM_FREE
            Usage RegionUsageFree
            這個內(nèi)存段甚至已經(jīng)不屬于Heap了(RegionUsageFree)。

            建議放個條件斷點(diǎn)在VirtualFree里面,來看一下這個內(nèi)存段什么時候被free掉的。從call stack上面應(yīng)該很容易就能發(fā)現(xiàn)問題。

            # re: 內(nèi)存崩潰的BUG (3)   回復(fù)  更多評論   

            2009-04-02 08:36 by guest
            下內(nèi)存斷點(diǎn)來監(jiān)視,看看到底是被誰給改了。

            # re: 內(nèi)存崩潰的BUG (3)   回復(fù)  更多評論   

            2009-04-02 12:17 by S.l.e!ep.¢%
            -------------------------------------------------------------------------------------------------------
            PER_IO_CONTEXT* overlappedEx=new PER_IO_CONTEXT; 發(fā)現(xiàn) overlappedEx 這個指針已經(jīng)指向的內(nèi)存是不對的
            overlappedEx->IOOperation= WRITE;
            overlappedEx->wsabuf.buf= (char *)malloc( nLen );
            if( NULL == overlappedEx->wsabuf.buf )
            {
            delete overlappedEx;
            return -1;
            }

            if(WSASend(m_socket,&(overlappedEx->wsabuf), 0x01,
            &dwBytes, 0,
            &(overlappedEx->Overlapped), NULL ) == SOCKET_ERROR)
            {

            在IOCP通知后,會 delete overlappedEx
            -------------------------------------------------------------------------------------------------------

            今天直接用 Windbg 啟動程序,在 在IOCP通知后,會 delete overlappedEx 用 OutPutDebugString 打日志,
            發(fā)現(xiàn) 在 delete overlappedEx 后,
            WSASend 還會訪問到 overlappedEx
            成人午夜精品久久久久久久小说| 伊人久久大香线蕉无码麻豆| 国产麻豆精品久久一二三| 99久久精品毛片免费播放| 精品无码久久久久久久动漫| 色欲综合久久躁天天躁| 久久水蜜桃亚洲av无码精品麻豆| 亚洲国产成人久久综合一| 亚洲午夜无码AV毛片久久| 精品国产乱码久久久久久1区2区 | 久久播电影网| 久久精品无码一区二区无码 | 久久久精品人妻一区二区三区四| 情人伊人久久综合亚洲| 亚洲精品美女久久777777| 国产福利电影一区二区三区久久久久成人精品综合 | 欧美与黑人午夜性猛交久久久| 亚洲AV无码1区2区久久| 久久久WWW免费人成精品| 久久婷婷国产麻豆91天堂| 97精品依人久久久大香线蕉97| 久久久久久国产精品美女| 精品综合久久久久久97超人| 午夜精品久久久久久毛片| 一97日本道伊人久久综合影院 | 久久国产色av免费看| 久久性生大片免费观看性| 国产成人精品久久综合| 精品久久久久久综合日本| 久久亚洲精品无码AV红樱桃| 一本久久a久久精品vr综合| 2019久久久高清456| 国内精品伊人久久久影院| 日本精品久久久久影院日本| 久久久久综合国产欧美一区二区| 伊人久久大香线蕉影院95| 国产午夜精品久久久久九九电影 | 欧美va久久久噜噜噜久久| 少妇久久久久久久久久| 久久国产免费观看精品3| 91精品国产高清91久久久久久|