#include<stdio.h>
#include<stdlib.h>
int main()
{
// p[i]与p+i的关系
/*
int i[4]={1,2,3,4};
int *p=i;
printf("%d",*(i+2));
printf("%d",*(p+2));
printf("%d",p[2]);
printf("%d",i[2]);
*/
int i;
int*pn=(int*)malloc(5*sizeof(int));
printf("malloc=%p\n",pn);
printf("The pointer's address:%#x\n",&pn);
for(i=0;i<5;i++)
pn[i]=i;
printf("%d\n",*(pn+2)); //也可以printf("%d",pn[2]);这里相当于将指针的移动进行了封装
pn=(int*)realloc(pn,10*sizeof(int));
printf("realloc=%p\n",pn);
printf("The pointer's address:%#x\n",&pn);
for(i=5;i<10;i++)
pn[i]=i;
for(i=0;i<10;i++)
printf("%d",pn[i]);
free(pn);
return 0;
}
原先理解:检验realloc是否需要扩充,如需要,完全free一个空间,创建符合大小的新空间,返回一个地址,但不知道此地址是否仍未原先地址。
在codeblocks中使用GCC环境 发现打印两处指针指向的内容前后是一致的;
malloc=008315D8
The pointer's address:0x28ff08
2
realloc=008315D8
The pointer's address:0x28ff08
0123456789
Process returned 0 (0x0) execution time : 0.567 s
Press any key to continue.
在VC6.0中,两处并不一致;
malloc=020F5FE0
The pointer's address:0x18ff38
2
realloc=020F0720
The pointer's address:0x18ff38
0123456789
Press any key to continue
// 编译器环境不同的后果:一开始无意在CB下盲目的打开验证,险些没有再去在C环境下验证C语言的规则.切记切记