程序堆内存的初始大小

时间:2015-07-06 12:52:39

标签: c linux unix

程序:

#include<stdio.h>
#include<sys/types.h>
#include<malloc.h>
main()
{
    int *i1, *i2;
    char *s;
    printf("sbrk(0) before malloc(4): %x\n", sbrk(0));
    i1 = (int *) malloc(sizeof(int));
    printf("sbrk(0) after `i1 = (int *) malloc(4)': %x\n", sbrk(0));
    i2 = (int *) malloc(sizeof(int));
    printf("sbrk(0) after `i2 = (int *) malloc(4)': %x\n", sbrk(0));
}

输出:

sbrk(0) before malloc(4): a027000
sbrk(0) after `i1 = (int *) malloc(4)': a048000
sbrk(0) after `i2 = (int *) malloc(4)': a048000

上述程序的堆内存的初始大小是多少。我认为,在该计划的初始阶段,该计划的起始和结束地址 堆是一样的。有一次,我们调用malloc,它使用sbrk分配内存。

上述程序显示,首先sbrk(0)返回a027000作为程序中断。执行malloc语句后,程序中断将更改 到a048000。它表明,在调用malloc之前,堆没有 足够的记忆力因此,调用malloc后只更改程序中断。在 初始状态,如果堆有足够的内存,则无需更改 程序休息。所以首先,堆的大小为零。是不是?

2 个答案:

答案 0 :(得分:1)

取决于您在调用main()之前的操作是什么。

在Mac OS X上,在调用main()函数之前会发生大量的内存分配。我目前有一个包含大约18个被抑制的“内存滥用”的列表,这些内容全部来自系统提供的启动代码调用main()之前发生的事情。

运行一个简单的程序,每行打印一个参数,但不给它任何参数,因此没有输出,从valgrind生成一个使用报告,如下所示:

==59405== Memcheck, a memory error detector
==59405== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==59405== Using Valgrind-3.11.0.SVN and LibVEX; rerun with -h for copyright info
==59405== Command: /Users/jleffler/bin/al
==59405== 
--59405-- /Users/jleffler/bin/al:
--59405-- dSYM directory is missing; consider using --dsymutil=yes
--59405-- UNKNOWN mach_msg unhandled MACH_SEND_TRAILER option
--59405-- UNKNOWN mach_msg unhandled MACH_SEND_TRAILER option (repeated 2 times)
--59405-- UNKNOWN mach_msg unhandled MACH_SEND_TRAILER option (repeated 4 times)
==59405== 
==59405== HEAP SUMMARY:
==59405==     in use at exit: 34,808 bytes in 417 blocks
==59405==   total heap usage: 517 allocs, 100 frees, 41,784 bytes allocated
==59405== 
==59405== LEAK SUMMARY:
==59405==    definitely lost: 16 bytes in 1 blocks
==59405==    indirectly lost: 0 bytes in 0 blocks
==59405==      possibly lost: 13,002 bytes in 109 blocks
==59405==    still reachable: 21,790 bytes in 307 blocks
==59405==         suppressed: 0 bytes in 0 blocks
==59405== Rerun with --leak-check=full to see details of leaked memory
==59405== 
==59405== For counts of detected and suppressed errors, rerun with: -v
==59405== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)

该计划的代码?

#include <stdio.h>
#include <stdlib.h>

int main(int argc, char **argv)  
{ 
    if (argc > 1)
    {
        while (*++argv) 
            puts(*argv);
    }
    return(EXIT_SUCCESS); 
}

很多内存活动,但在我写的代码中都没有。泄漏是我在抑制文件中记录的数字之一。

答案 1 :(得分:0)

安装glibc debuginfo时(例如在Fedora 22上:dnf debuginfo-install glibc-2.21-5.fc22.x86_64),可以打印出main_arenamp_

使用空int main(void)调试程序:

mp_.sbrk_base是堆的基础。在我的Linux上调用main时,堆不存在。致电malloc(1000) mp_.sbrk_base后,0x602000main_arena.top0x6023f0是堆顶部的空闲内存块。它是(gdb) b main Breakpoint 1 at 0x4004fa: file test.c, line 3. (gdb) r Starting program: /home/m/a.out Breakpoint 1, main () at test.c:3 3 return 0; (gdb) p mp_ $1 = {trim_threshold = 131072, top_pad = 131072, mmap_threshold = 131072, arena_test = 8, arena_max = 0, n_mmaps = 0, n_mmaps_max = 65536, max_n_mmaps = 0, no_dyn_threshold = 0, mmapped_mem = 0, max_mmapped_mem = 0, max_total_mem = 0, sbrk_base = 0x0} (gdb) p main_arena $2 = {mutex = 0, flags = 0, fastbinsY = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, top = 0x0, last_remainder = 0x0, bins = {0x0 <repeats 254 times>}, binmap = {0, 0, 0, 0}, next = 0x7ffff7dd6b20 <main_arena>, next_free = 0x0, system_mem = 0, max_system_mem = 0} (gdb) call malloc(1000) $3 = (void *) 0x602010 (gdb) p mp_ $4 = {trim_threshold = 131072, top_pad = 131072, mmap_threshold = 131072, arena_test = 8, arena_max = 0, n_mmaps = 0, n_mmaps_max = 65536, max_n_mmaps = 0, no_dyn_threshold = 0, mmapped_mem = 0, max_mmapped_mem = 0, max_total_mem = 0, sbrk_base = 0x602000 ""} (gdb) p main_arena $5 = {mutex = 0, flags = 1, fastbinsY = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, top = 0x6023f0, last_remainder = 0x0, bins = {0x7ffff7dd6b78 <main_arena+88>, 0x7ffff7dd6b78 <main_arena+88>, [...] 0x7ffff7dd7198 <main_arena+1656>, 0x7ffff7dd71a8 <main_arena+1672>, 0x7ffff7dd71a8 <main_arena+1672>...}, binmap = {0, 0, 0, 0}, next = 0x7ffff7dd6b20 <main_arena>, next_free = 0x0, system_mem = 135168, max_system_mem = 135168} (gdb) call sbrk(0) $6 = 6434816 (gdb) p (void*)$6 $7 = (void *) 0x623000 (gdb)

<?php
//db data
$verbindung = new mysqli($host_name, $user_name , $password, $database);

if ($mysqli->error) {
    die('Verbindung schlug fehl:');
}
$sql= "SELECT Name FROM Zutaten;";
$result = mysqli_query($verbindung, $sql);
$zutatName = array();

while($row = $result->fetch_array(MYSQLI_ASSOC)){
    $zutatName[] = $row['Name'];
}    
print_r(array_values($zutatName));

?>
<script>
var zutatenArray = <?php echo json_encode($zutatName); ?>;
</script>