题目如下
给定一个字符串 s
,请你找出其中不含有重复字符的 最长子串 的长度。
这是我的代码:
int lengthOfLongestSubstring(char * a)
{
int len;
len = strlen(a);
int *b=(int*)malloc(sizeof(int)*(len));
if (!b)
{
free(b);
return -1;
}
int count = 1; //无重复字符子串个数
int i, j,tem=0; //tem为j每次开始的位置
int num=0;//每个子串长度暂时存储位置
for (i = 1;i < len;i++)
{
num = 1;
for (j = tem;j < i;j++)
{
if (a[j] != a[i])
num++;
else {
tem = j+1;
}
}
*(b + count - 1) = num;
count++;
}
int max =*(b+0);
for (i = 0;i < count - 1;i++)
{
if (max < *(b+i))
max =*(b+i);
}
free(b);
return max;
}
这是牛马报错,完全看不懂:
================================================================= ==22==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000f0 at pc 0x556ecb492ff6 bp 0x7ffec436c9b0 sp 0x7ffec436c9a0 READ of size 4 at 0x6020000000f0 thread T0 #2 0x7f0d92c40082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) 0x6020000000f1 is located 0 bytes to the right of 1-byte region [0x6020000000f0,0x6020000000f1) allocated by thread T0 here: #0 0x7f0d93888808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144 #3 0x7f0d92c40082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) Shadow bytes around the buggy address: 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 00 01 fa fa 04 fa fa fa 06 fa fa fa 04 fa =>0x0c047fff8010: fa fa 07 fa fa fa 04 fa fa fa 01 fa fa fa[01]fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==22==ABORTING