• <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
            posts - 9,  comments - 9,  trackbacks - 0

            Normally, the break instruction exception can be triggered in following conditions:

            1.       Hardcode interrupt request, like: __asm int 3 (ASM), System.Diagnostics.Debugger.Break (C#), DebugBreak() (WinAPI).

            2.       OS enable memory runtime check, like Application Verifier can trigger after heap corruption, memory overrun.

            3.       Compiler can have some configuration to decide what should be filled to the uninitialized memory block and end of function(blank area, after retun..).  For example, Microsoft VC complier can fill 0xCC if enable /GZ.  0xCC is actually a opcode of __asm int 3.  So if some error cause the application run into such block, will trigger a break point.

            A quick summary of what Microsoft's compilers use for various bits of unowned/uninitialized memory when compiled for debug mode (support may vary by compiler version):

            Value     Name           Description 

            ------   --------        -------------------------

            0xCD     Clean Memory    Allocated memory via malloc or new but never 

                                     written by the application. 


            0xDD     Dead Memory     Memory that has been released with delete or free. 

                                     Used to detect writing through dangling pointers. 


            0xFD     Fence Memory    Also known as "no mans land." This is used to wrap 

                                     the allocated memory (surrounding it with a fence) 

                                     and is used to detect indexing arrays out of 

                                     bounds or other accesses (especially writes) past

                                     the end (or start) of an allocated block.


            0xCC                     When the code is compiled with the /GZ option,

                                     uninitialized variables are automatically assigned 

                                     to this value (at byte level). 



            // the following magic values are done by the OS, not the C runtime:


            0xAB  (Allocated Block?) Memory allocated by LocalAlloc(). 


            0xBAADF00D Bad Food      Memory allocated by LocalAlloc() with LMEM_FIXED,but 

                                     not yet written to. 


            0xFEEEFEEE               OS fill heap memory, which was marked for usage, 

                                     but wasn't allocated by HeapAlloc() or LocalAlloc(). 

                                     Or that memory just has been freed by HeapFree().

            Disclaimer: the table is from some notes I have lying around - they may not be 100% correct (or coherent).


            As others have noted, one of the key properties of these values is that is a pointer variable with one of these values is dereferenced, it will result in an access violation, since on a standard 32-bit Windows configuration, user mode addresses will not go higher than 0x7fffffff.


            For the related issue, we can use Application Verifier to enable heap page, which can break after memory overrun, heap corruption.


             

             

            posted on 2010-07-23 16:22 MicroYang 閱讀(2029) 評論(0)  編輯 收藏 引用
            <2025年7月>
            293012345
            6789101112
            13141516171819
            20212223242526
            272829303112
            3456789

            常用鏈接

            留言簿(1)

            隨筆檔案

            Friend

            • Catherine
            • 深海羚羊
            • 似雨打芭蕉,似風吹梧桐葉,帶著一絲冰冷,也帶著一絲清新------冰柔語絲

            搜索

            •  

            最新評論

            閱讀排行榜

            評論排行榜

            久久成人国产精品免费软件| 亚洲国产精品成人AV无码久久综合影院| 一本久久精品一区二区| 亚洲?V乱码久久精品蜜桃| 九九久久自然熟的香蕉图片| 色综合合久久天天综合绕视看| 久久综合九色综合久99| 2021少妇久久久久久久久久| 一本大道久久东京热无码AV| 精品久久8x国产免费观看| 久久99精品久久久久久不卡| 亚洲乱码中文字幕久久孕妇黑人| 亚洲国产成人久久精品动漫| 精品久久久久久亚洲精品| 久久精品国产精品亚洲人人 | 久久久久久久综合日本| 久久综合香蕉国产蜜臀AV| 亚洲精品国精品久久99热| 久久香蕉国产线看观看99| 亚洲va国产va天堂va久久| 久久这里只有精品视频99| 精品国产福利久久久| 久久国产精品久久| 久久男人Av资源网站无码软件| 国产A三级久久精品| 久久天天躁狠狠躁夜夜网站| 综合久久久久久中文字幕亚洲国产国产综合一区首| 久久久久高潮毛片免费全部播放| 亚洲国产天堂久久久久久| 久久国产午夜精品一区二区三区| 日本免费久久久久久久网站| 99精品久久久久中文字幕| 国产美女久久久| 精品视频久久久久| 久久精品国产第一区二区| 欧美亚洲另类久久综合婷婷| 噜噜噜色噜噜噜久久| 久久午夜无码鲁丝片| 久久w5ww成w人免费| 狠狠色丁香婷婷久久综合不卡| 久久久久国产一级毛片高清版|