Pointers Essential

Learn about null pointers, invalid pointers, variables as pointers, and pointer initialization.

NULL pointers

Addresses 0x0000000000000000 to 0x000000000000FFFF are deliberately made inaccessible on Linux. The following code will force an application crash or kernel panic if executed inside a driver:

Press + to interact
mov $0xF, %rax
movb $1, (%rax) # Access violation

Invalid pointers

Various kinds of invalid pointers will cause an access violation when we try to dereference them:

  • NULL pointers
  • Pointers that refer to inaccessible memory
  • Pointers that refer to read-only memory when writing

Other pointers may or may not cause an access violation:

  • Pointers that refer to so-called random memory
  • Uninitialized pointers that have a random value inherited from past code execution
  • Dangling pointers

Uninitialized and dangling pointers similar to pointers that refer to random memory locations, in other words, locations assigned by the operating system from anywhere in RAM. Uninitialized and dangling pointers arise when we forget to set pointer variables to zero (NULL) after disposing of the memory they point to. By nullifying pointers, we indicate that they no longer point to memory.

Variables as pointers

Suppose ...