• <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>

            S.l.e!ep.¢%

            像打了激速一樣,以四倍的速度運(yùn)轉(zhuǎn),開(kāi)心的工作
            簡(jiǎn)單、開(kāi)放、平等的公司文化;尊重個(gè)性、自由與個(gè)人價(jià)值;
            posts - 1098, comments - 335, trackbacks - 0, articles - 1
              C++博客 :: 首頁(yè) :: 新隨筆 :: 聯(lián)系 :: 聚合  :: 管理

            內(nèi)存崩潰的BUG (3)

            Posted on 2009-04-01 13:35 S.l.e!ep.¢% 閱讀(1731) 評(píng)論(3)  編輯 收藏 引用 所屬分類(lèi): WinDbg

            內(nèi)存崩潰的BUG
            內(nèi)存崩潰的BUG (2)

            在昨天的調(diào)試中,感謝JayZ
            -----------------------------------------------------------------------------------------------------
            地址段034bd000 - 00007000沒(méi)法訪(fǎng)問(wèn)。

            看調(diào)用棧0012e50c 0042ffc3 00000400 034c0fec 00000001 ws2_32!WSASend+0x61

            WSASend的第二個(gè)參數(shù)為034c0fec很不幸的落在這個(gè)區(qū)間內(nèi)。看WSASend的原型
            int WSASend(
            __in SOCKET s,
            __in LPWSABUF lpBuffers,
            __in DWORD dwBufferCount,
            __out LPDWORD lpNumberOfBytesSent,
            __in DWORD dwFlags,
            __in LPWSAOVERLAPPED lpOverlapped,
            __in LPWSAOVERLAPPED_COMPLETION_ROUTINE lpCompletionRoutine
            );
            顯然第二個(gè)參數(shù)lpBuffers的地址非法。

            call stack frame往上就是你的代碼了:
            0012f580 0040e577 0012f5bc 00000014 0012f58c xxx.exe+xxx-function

            你需要在這里確認(rèn)一下為什么傳出的lpBuffers指向一個(gè)錯(cuò)誤的地址
            -------------------------------------------------------------------------------------------------------

            傳入 WSASend 的第二個(gè)參數(shù) lpBuffers 確實(shí)指向了一個(gè)錯(cuò)誤的地址,
            用 knL + .frame + x
            查看了?? xxx.exe+xxx-function???? 的局部變量,發(fā)現(xiàn)

            -------------------------------------------------------------------------------------------------------
            PER_IO_CONTEXT* overlappedEx=new PER_IO_CONTEXT;????? 發(fā)現(xiàn)??overlappedEx ?這個(gè)指針已經(jīng)指向的內(nèi)存是不對(duì)的
            overlappedEx->IOOperation= WRITE;
            overlappedEx->wsabuf.buf= (char *)malloc( nLen );
            if( NULL == overlappedEx->wsabuf.buf )
            {
            delete overlappedEx;
            return -1;
            }

            if(WSASend(m_socket,&(overlappedEx->wsabuf), 0x01,
            &(overlappedEx->dwBytes), overlappedEx->dwFlags,
            &(overlappedEx->Overlapped), NULL ) == SOCKET_ERROR)
            {

            在IOCP通知后,會(huì) delete overlappedEx
            -------------------------------------------------------------------------------------------------------

            懷疑是不是 overlappedEx 這個(gè)指針的值被其它地方修改了?
            于是在局?jǐn)?shù)變量中定義了多一個(gè)變量,在 WSASend 調(diào)用前,加多這個(gè)語(yǔ)句,

            PER_IO_CONTEXT* p? = overlappedEx;

            等了幾個(gè)小時(shí),再次重現(xiàn)問(wèn)題,

            用 knL + .frame + x
            查看了?? xxx.exe+xxx-function???? 的局部變量,發(fā)現(xiàn)

            p 的值跟 overlappedEx 還是相等的, 但它們指向的內(nèi)存卻是

            0366fe8c p = 0x03443fd8
            0:010> !address 0x03443fd8
            ??? 03442000 : 03442000 - 00007000
            ??????????????????? Type???? 00000000
            ??????????????????? Protect? 00000001 PAGE_NOACCESS
            ??????????????????? State??? 00010000 MEM_FREE????????????????
            ??????????????????? Usage??? RegionUsageFree
            0:010> dd 0x03443fd8
            03443fd8? ???????? ???????? ???????? ????????
            03443fe8? ???????? ???????? ???????? ????????
            03443ff8? ???????? ???????? ???????? ????????
            03444008? ???????? ???????? ???????? ????????
            03444018? ???????? ???????? ???????? ????????
            03444028? ???????? ???????? ???????? ????????
            03444038? ???????? ???????? ???????? ????????
            03444048? ???????? ???????? ???????? ????????

            0:010> KB
            ChildEBP RetAddr? Args to Child?????????????
            0366edac 71a26294 00000668 03443fec 00000001 mswsock!WSPSend+0x243
            0366ede8 00430027 00000668 03443fec 00000001 ws2_32!WSASend+0x77

            初步結(jié)論是: 在執(zhí)行到? mswsock!WSPSend+0x243 ,在 WSASend 上一層 new 出來(lái)的? PER_IO_CONTEXT 已經(jīng)被 delete 了

            Feedback

            # re: 內(nèi)存崩潰的BUG (3)   回復(fù)  更多評(píng)論   

            2009-04-02 00:15 by JayZ
            看如下輸出:
            03442000 : 03442000 - 00007000
            Type 00000000
            Protect 00000001 PAGE_NOACCESS
            State 00010000 MEM_FREE
            Usage RegionUsageFree
            這個(gè)內(nèi)存段甚至已經(jīng)不屬于Heap了(RegionUsageFree)。

            建議放個(gè)條件斷點(diǎn)在VirtualFree里面,來(lái)看一下這個(gè)內(nèi)存段什么時(shí)候被free掉的。從call stack上面應(yīng)該很容易就能發(fā)現(xiàn)問(wèn)題。

            # re: 內(nèi)存崩潰的BUG (3)   回復(fù)  更多評(píng)論   

            2009-04-02 08:36 by guest
            下內(nèi)存斷點(diǎn)來(lái)監(jiān)視,看看到底是被誰(shuí)給改了。

            # re: 內(nèi)存崩潰的BUG (3)   回復(fù)  更多評(píng)論   

            2009-04-02 12:17 by S.l.e!ep.¢%
            -------------------------------------------------------------------------------------------------------
            PER_IO_CONTEXT* overlappedEx=new PER_IO_CONTEXT; 發(fā)現(xiàn) overlappedEx 這個(gè)指針已經(jīng)指向的內(nèi)存是不對(duì)的
            overlappedEx->IOOperation= WRITE;
            overlappedEx->wsabuf.buf= (char *)malloc( nLen );
            if( NULL == overlappedEx->wsabuf.buf )
            {
            delete overlappedEx;
            return -1;
            }

            if(WSASend(m_socket,&(overlappedEx->wsabuf), 0x01,
            &dwBytes, 0,
            &(overlappedEx->Overlapped), NULL ) == SOCKET_ERROR)
            {

            在IOCP通知后,會(huì) delete overlappedEx
            -------------------------------------------------------------------------------------------------------

            今天直接用 Windbg 啟動(dòng)程序,在 在IOCP通知后,會(huì) delete overlappedEx 用 OutPutDebugString 打日志,
            發(fā)現(xiàn) 在 delete overlappedEx 后,
            WSASend 還會(huì)訪(fǎng)問(wèn)到 overlappedEx
            久久综合精品国产二区无码| 国产成人久久精品二区三区| 日韩av无码久久精品免费| 久久国产高潮流白浆免费观看| 国产精品久久毛片完整版| 久久精品国产69国产精品亚洲| 久久精品这里只有精99品| 亚洲午夜久久久影院伊人| yellow中文字幕久久网 | 色综合久久久久综合体桃花网| 久久精品麻豆日日躁夜夜躁| 日韩电影久久久被窝网| 久久青青草原综合伊人| 久久久一本精品99久久精品66 | 美女写真久久影院| 亚洲AV无码久久精品蜜桃| 久久一区二区三区99| 久久精品国产精品青草app| 狠狠综合久久AV一区二区三区| 久久国产热这里只有精品| 91精品国产高清久久久久久国产嫩草 | 亚洲午夜久久久精品影院| 人妻丰满?V无码久久不卡| 97久久精品人人澡人人爽| 区亚洲欧美一级久久精品亚洲精品成人网久久久久| 亚洲国产精品无码久久久不卡 | 亚洲精品国产第一综合99久久| 精品久久综合1区2区3区激情| 大伊人青草狠狠久久| 91精品国产色综合久久| AAA级久久久精品无码片| 1000部精品久久久久久久久| 精品久久无码中文字幕| 久久久久久国产精品无码超碰| 久久精品国产2020| 久久亚洲欧美国产精品| 日韩AV无码久久一区二区| 国产精品久久久久久影院| 久久综合欧美成人| 亚洲&#228;v永久无码精品天堂久久| 久久久久一本毛久久久|