Pointers Essential
Learn about null pointers, invalid pointers, variables as pointers, and pointer initialization.
NULL pointers
Addresses 0x0000000000000000
to 0x000000000000FFFF
are deliberately made inaccessible on Linux. The following code will force an application crash or kernel panic if executed inside a driver:
mov $0xF, %raxmovb $1, (%rax) # Access violation
Invalid pointers
Various kinds of invalid pointers will cause an access violation when we try to dereference them:
- NULL pointers
- Pointers that refer to inaccessible memory
- Pointers that refer to read-only memory when writing
Other pointers may or may not cause an access violation:
- Pointers that refer to so-called random memory
- Uninitialized pointers that have a random value inherited from past code execution
- Dangling pointers
Uninitialized and dangling pointers similar to pointers that refer to random memory locations, in other words, locations assigned by the operating system from anywhere in RAM. Uninitialized and dangling pointers arise when we forget to set pointer variables to zero (NULL) after disposing of the memory they point to. By nullifying pointers, we indicate that they no longer point to memory.
Variables as pointers
Suppose ...