如何找出无效的地址是什么
Valgrind报告:
==4538== Invalid read of size 4
==4538== at 0x822D3C6: _zval_ptr_dtor (zend.h:385)
==4538== by 0x823C1FF: _zval_ptr_dtor_wrapper (zend_variables.c:189)
==4538== by 0x824E1A1: zend_hash_destroy (zend_hash.c:529)
==4538== by 0x826655A: zend_object_std_dtor (zend_objects.c:45)
==4538== by 0x8266A28: zend_objects_free_object_storage (zend_objects.c:126)
==4538== by 0x826C43D: zend_objects_store_del_ref_by_handle_ex (zend_objects_API.c:220)
==4538== by 0x826C0AC: zend_objects_store_del_ref (zend_objects_API.c:172)
==4538== by 0x823BD77: _zval_dtor_func (zend_variables.c:52)
==4538== by 0x822B99B: _zval_dtor (zend_variables.h:35)
==4538== by 0x822D463: _zval_ptr_dtor (zend_execute_API.c:443)
==4538== by 0x823C1FF: _zval_ptr_dtor_wrapper (zend_variables.c:189)
==4538== by 0x824E518: zend_hash_apply_deleter (zend_hash.c:614)
==4538== Address 0x44c1718 is 8 bytes inside a block of size 20 free'd
==4538== at 0x4026E9C: free (in /usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==4538== by 0x8216374: _efree (zend_alloc.c:2358)
==4538== by 0x822D48E: _zval_ptr_dtor (zend_execute_API.c:444)
==4538== by 0x469B2C5: zim_ASTTree___destruct (parser.c:336)
==4538== by 0x822F8CE: zend_call_function (zend_execute_API.c:986)
==4538== by 0x825A8E2: zend_call_method (zend_interfaces.c:97)
==4538== by 0x8266978: zend_objects_destroy_object (zend_objects.c:112)
==4538== by 0x826C2AD: zend_objects_store_del_ref_by_handle_ex (zend_objects_API.c:206)
==4538== by 0x826C0AC: zend_objects_store_del_ref (zend_objects_API.c:172)
==4538== by 0x823BD77: _zval_dtor_func (zend_variables.c:52)
==4538== by 0x822B99B: _zval_dtor (zend_variables.h:35)
==4538== by 0x822D463: _zval_ptr_dtor (zend_execute_API.c:443)
如何找到无效读取的地址?
Valgrind reports:
==4538== Invalid read of size 4
==4538== at 0x822D3C6: _zval_ptr_dtor (zend.h:385)
==4538== by 0x823C1FF: _zval_ptr_dtor_wrapper (zend_variables.c:189)
==4538== by 0x824E1A1: zend_hash_destroy (zend_hash.c:529)
==4538== by 0x826655A: zend_object_std_dtor (zend_objects.c:45)
==4538== by 0x8266A28: zend_objects_free_object_storage (zend_objects.c:126)
==4538== by 0x826C43D: zend_objects_store_del_ref_by_handle_ex (zend_objects_API.c:220)
==4538== by 0x826C0AC: zend_objects_store_del_ref (zend_objects_API.c:172)
==4538== by 0x823BD77: _zval_dtor_func (zend_variables.c:52)
==4538== by 0x822B99B: _zval_dtor (zend_variables.h:35)
==4538== by 0x822D463: _zval_ptr_dtor (zend_execute_API.c:443)
==4538== by 0x823C1FF: _zval_ptr_dtor_wrapper (zend_variables.c:189)
==4538== by 0x824E518: zend_hash_apply_deleter (zend_hash.c:614)
==4538== Address 0x44c1718 is 8 bytes inside a block of size 20 free'd
==4538== at 0x4026E9C: free (in /usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==4538== by 0x8216374: _efree (zend_alloc.c:2358)
==4538== by 0x822D48E: _zval_ptr_dtor (zend_execute_API.c:444)
==4538== by 0x469B2C5: zim_ASTTree___destruct (parser.c:336)
==4538== by 0x822F8CE: zend_call_function (zend_execute_API.c:986)
==4538== by 0x825A8E2: zend_call_method (zend_interfaces.c:97)
==4538== by 0x8266978: zend_objects_destroy_object (zend_objects.c:112)
==4538== by 0x826C2AD: zend_objects_store_del_ref_by_handle_ex (zend_objects_API.c:206)
==4538== by 0x826C0AC: zend_objects_store_del_ref (zend_objects_API.c:172)
==4538== by 0x823BD77: _zval_dtor_func (zend_variables.c:52)
==4538== by 0x822B99B: _zval_dtor (zend_variables.h:35)
==4538== by 0x822D463: _zval_ptr_dtor (zend_execute_API.c:443)
How can I find the address of the invalid read?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
无效读取发生在名为 zend_hash_destroy() 的函数内。
但是内存已经被 zend_objects_destroy_object() 函数早些时候释放了。
事实上,这一切都发生在“zend”内部,这似乎表明“zend”存在问题。如果您正在尝试调试 PHP,我不确定您是否会在这里使用 valgrind 取得很大进展(尽管我很喜欢这个工具)...
The invalid read is taking place inside a function called zend_hash_destroy().
But the memory was already deallocated by the zend_objects_destroy_object() function earlier.
The fact that this is all happening inside "zend" appears to point to a problem with "zend". If you're trying to debug PHP I'm not sure you're going to get very far using valgrind here (as much as I love this tool)...