nasty evil pointers

Patrick Bennett null at bsu-cs.UUCP
Thu Mar 10 14:06:23 AEST 1988


In article <1159 at silver.bacs.indiana.edu>, backstro at silver.bacs.indiana.edu (Dave White) writes:
> In article <13100003 at bucc2> brian at bucc2.UUCP writes:
> >
> >It would be nice if we could check every pointer as
> >it was used...
> >
> >
> >If pointer
> >pointed, say, into the operating system or the text space, the function
> >would print a message and exit(). Otherwise it would return.
> >

OS/2 provides this...  Different memory areas can have varying levels of
protection.  When this protection is broken, whether by attempting to modify,
read, whatever (depends on the protection) the program is promptly aborted but
with appropriate error info...

Although I personally don't have or use OS/2 I obtained this information from
the OS/2 Programmer's Guide by Ed Iacobucci (The leader of the IBM OS/2
Design Team)

Sounds great to me...

-- 
----
Patrick Bennett     UUCP:  <backbones>!{iuvax,pur-ee,uunet}!bsu-cs!null



More information about the Comp.lang.c mailing list