Magic number (programming)

Last updated

In computer programming, a magic number is any of the following:

Contents

Unnamed numerical constants

The term magic number or magic constant refers to the anti-pattern of using numbers directly in source code. This has been referred to as breaking one of the oldest rules of programming, dating back to the COBOL, FORTRAN and PL/1 manuals of the 1960s. [1] The use of unnamed magic numbers in code obscures the developers' intent in choosing that number, [2] increases opportunities for subtle errors (e.g. is every digit correct in 3.14159265358979323846 and is this equal to 3.14159? [3] ) and makes it more difficult for the program to be adapted and extended in the future. [4] Replacing all significant magic numbers with named constants (also called explanatory variables) makes programs easier to read, understand and maintain. [5]

Names chosen to be meaningful in the context of the program can result in code that is more easily understood by a maintainer who is not the original author (or even by the original author after a period of time). [6] An example of an uninformatively named constant is int SIXTEEN = 16, while int NUMBER_OF_BITS = 16 is more descriptive.

The problems associated with magic 'numbers' described above are not limited to numerical types and the term is also applied to other data types where declaring a named constant would be more flexible and communicative. [1] Thus, declaring const string testUserName = "John" is better than several occurrences of the 'magic value' "John" in a test suite.

For example, if it is required to randomly shuffle the values in an array representing a standard pack of playing cards, this pseudocode does the job using the Fisher–Yates shuffle algorithm:

for i from 1 to 52     j := i + randomInt(53 - i) - 1     a.swapEntries(i, j)

where a is an array object, the function randomInt(x) chooses a random integer between 1 and x, inclusive, and swapEntries(i, j) swaps the ith and jth entries in the array. In the preceding example, 52 is a magic number. It is considered better programming style to write the following:

int deckSize:= 52 for i from 1 to deckSize     j := i + randomInt(deckSize + 1 - i) - 1     a.swapEntries(i, j)

This is preferable for several reasons:

function shuffle (int deckSize)    for i from 1 to deckSize        j := i + randomInt(deckSize + 1 - i) - 1        a.swapEntries(i, j)

Disadvantages are:

Accepted uses

In some contexts, the use of unnamed numerical constants is generally accepted (and arguably "not magic"). While such acceptance is subjective, and often depends on individual coding habits, the following are common examples:

The constants 1 and 0 are sometimes used to represent the boolean values True and False in programming languages without a boolean type, such as older versions of C. Most modern programming languages provide a boolean or bool primitive type and so the use of 0 and 1 is ill-advised. This can be more confusing since 0 sometimes means programmatic success (when -1 means failure) and failure in other cases (when 1 means success).

In C and C++, 0 represents the null pointer. As with boolean values, the C standard library includes a macro definition NULL whose use is encouraged. Other languages provide a specific null or nil value and when this is the case no alternative should be used. The typed pointer constant nullptr has been introduced with C++11.

Format indicators

Origin

Format indicators were first used in early Version 7 Unix source code.[ citation needed ]

Unix was ported to one of the first DEC PDP-11/20s, which did not have memory protection. So early versions of Unix used the relocatable memory reference model. [7] Pre-Sixth Edition Unix versions read an executable file into memory and jumped to the first low memory address of the program, relative address zero. With the development of paged versions of Unix, a header was created to describe the executable image components. Also, a branch instruction was inserted as the first word of the header to skip the header and start the program. In this way a program could be run in the older relocatable memory reference (regular) mode or in paged mode. As more executable formats were developed, new constants were added by incrementing the branch offset. [8]

In the Sixth Edition source code of the Unix program loader, the exec() function read the executable (binary) image from the file system. The first 8 bytes of the file was a header containing the sizes of the program (text) and initialized (global) data areas. Also, the first 16-bit word of the header was compared to two constants to determine if the executable image contained relocatable memory references (normal), the newly implemented paged read-only executable image, or the separated instruction and data paged image. [9] There was no mention of the dual role of the header constant, but the high order byte of the constant was, in fact, the operation code for the PDP-11 branch instruction (octal 000407 or hex 0107). Adding seven to the program counter showed that if this constant was executed, it would branch the Unix exec() service over the executable image eight byte header and start the program.

Since the Sixth and Seventh Editions of Unix employed paging code, the dual role of the header constant was hidden. That is, the exec() service read the executable file header (meta) data into a kernel space buffer, but read the executable image into user space, thereby not using the constant's branching feature. Magic number creation was implemented in the Unix linker and loader and magic number branching was probably still used in the suite of stand-alone diagnostic programs that came with the Sixth and Seventh Editions. Thus, the header constant did provide an illusion and met the criteria for magic.

In Version Seven Unix, the header constant was not tested directly, but assigned to a variable labeled ux_mag [10] and subsequently referred to as the magic number. Probably because of its uniqueness, the term magic number came to mean executable format type, then expanded to mean file system type, and expanded again to mean any type of file.

In files

Magic numbers are common in programs across many operating systems. Magic numbers implement strongly typed data and are a form of in-band signaling to the controlling program that reads the data type(s) at program run-time. Many files have such constants that identify the contained data. Detecting such constants in files is a simple and effective way of distinguishing between many file formats and can yield further run-time information.

Examples
Detection

The Unix utility program file can read and interpret magic numbers from files, and the file which is used to parse the information is called magic. The Windows utility TrID has a similar purpose.

In protocols

Examples

In interfaces

Magic numbers are common in API functions and interfaces across many operating systems, including DOS, Windows and NetWare:

Examples

Other uses

Examples

Data type limits

This is a list of limits of data storage types: [16]

DecimalHexDescription
18,446,744,073,709,551,615 FFFFFFFFFFFFFFFFThe maximum unsigned 64 bit value (264 − 1)
9,223,372,036,854,775,807 7FFFFFFFFFFFFFFFThe maximum signed 64 bit value (263 − 1)
9,007,199,254,740,992 0020000000000000The largest consecutive integer in IEEE 754 double precision (253)
4,294,967,295 FFFFFFFFThe maximum unsigned 32 bit value (232 − 1)
2,147,483,647 7FFFFFFFThe maximum signed 32 bit value (231 − 1)
16,777,216 01000000The largest consecutive integer in IEEE 754 single precision (224)
65,535 FFFFThe maximum unsigned 16 bit value (216 − 1)
32,7677FFFThe maximum signed 16 bit value (215 − 1)
255 FFThe maximum unsigned 8 bit value (28 − 1)
1277FThe maximum signed 8 bit value (27 − 1)
−12880Minimum signed 8 bit value
−32,7688000Minimum signed 16 bit value
−2,147,483,64880000000Minimum signed 32 bit value
−9,223,372,036,854,775,8088000000000000000Minimum signed 64 bit value

GUIDs

It is possible to create or alter globally unique identifiers (GUIDs) so that they are memorable, but this is highly discouraged as it compromises their strength as near-unique identifiers. [17] [18] The specifications for generating GUIDs and UUIDs are quite complex, which is what leads to them being virtually unique, if properly implemented. .[ citation needed ]

Microsoft Windows product ID numbers for Microsoft Office products sometimes end with 0000-0000-0000000FF1CE ("OFFICE"), such as {90160000-008C-0000-0000-0000000FF1CE}, the product ID for the "Office 16 Click-to-Run Extensibility Component".

Java uses several GUIDs starting with CAFEEFAC. [19]

In the GUID Partition Table of the GPT partitioning scheme, BIOS Boot partitions use the special GUID {21686148-6449-6E6F-744E-656564454649} [20] which does not follow the GUID definition; instead, it is formed by using the ASCII codes for the string "Hah!IdontNeedEFI" partially in little endian order. [21]

Debug values

Magic debug values are specific values written to memory during allocation or deallocation, so that it will later be possible to tell whether or not they have become corrupted, and to make it obvious when values taken from uninitialized memory are being used. Memory is usually viewed in hexadecimal, so memorable repeating or hexspeak values are common. Numerically odd values may be preferred so that processors without byte addressing will fault when attempting to use them as pointers (which must fall at even addresses). Values should be chosen that are away from likely addresses (the program code, static data, heap data, or the stack). Similarly, they may be chosen so that they are not valid codes in the instruction set for the given architecture.

Since it is very unlikely, although possible, that a 32-bit integer would take this specific value, the appearance of such a number in a debugger or memory dump most likely indicates an error such as a buffer overflow or an uninitialized variable.

Famous and common examples include:

CodeDescription
00008123Used in MS Visual C++. Deleted pointers are set to this value, so they throw an exception, when they are used after; it is a more recognizable alias for the zero address. It is activated with the Security Development Lifecycle (/sdl) option. [22]
..FACADE"Facade", Used by a number of RTOSes
1BADB002"1 bad boot", Multiboot header magic number [23]
8BADF00D"Ate bad food", Indicates that an Apple iOS application has been terminated because a watchdog timeout occurred. [24]
A5A5A5A5Used in embedded development because the alternating bit pattern (1010 0101) creates an easily recognized pattern on oscilloscopes and logic analyzers.
A5Used in FreeBSD's PHK malloc(3) for debugging when /etc/malloc.conf is symlinked to "-J" to initialize all newly allocated memory as this value is not a NULL pointer or ASCII NUL character.
ABABABABUsed by Microsoft's debug HeapAlloc() to mark "no man's land" guard bytes after allocated heap memory. [25]
ABADBABE"A bad babe", Used by Apple as the "Boot Zero Block" magic number
ABBABABE"ABBA babe", used by Driver Parallel Lines memory heap.
ABADCAFE"A bad cafe", Used to initialize all unallocated memory (Mungwall, AmigaOS)
B16B00B5"Big Boobs", Formerly required by Microsoft's Hyper-V hypervisor to be used by Linux guests as the upper half of their "guest id" [26]
BAADF00D"Bad food", Used by Microsoft's debug HeapAlloc() to mark uninitialized allocated heap memory [25]
BAAAAAAD"Baaaaaad", Indicates that the Apple iOS log is a stackshot of the entire system, not a crash report [24]
BAD22222"Bad too repeatedly", Indicates that an Apple iOS VoIP application has been terminated because it resumed too frequently [24]
BADBADBADBAD"Bad bad bad bad", Burroughs large systems "uninitialized" memory (48-bit words)
BADC0FFEE0DDF00D"Bad coffee odd food", Used on IBM RS/6000 64-bit systems to indicate uninitialized CPU registers
BADDCAFE"Bad cafe", On Sun Microsystems' Solaris, marks uninitialized kernel memory (KMEM_UNINITIALIZED_PATTERN)
BBADBEEF"Bad beef", Used in WebKit, for particularly unrecoverable errors [27]
BEBEBEBEUsed by AddressSanitizer to fill allocated but not initialized memory [28]
BEEFCACE"Beef cake", Used by Microsoft .NET as a magic number in resource files
C00010FF"Cool off", Indicates Apple iOS app was killed by the operating system in response to a thermal event [24]
CAFEBABE"Cafe babe", Used by Java for class files
CAFED00D"Cafe dude", Used by Java for their pack200 compression
CAFEFEED"Cafe feed", Used by Sun Microsystems' Solaris debugging kernel to mark kmemfree() memory
CCCCCCCCUsed by Microsoft's C++ debugging runtime library and many DOS environments to mark uninitialized stack memory. CC resembles the opcode of the INT 3 debug breakpoint interrupt on x86 processors. [29]
CDCDCDCDUsed by Microsoft's C/C++ debug malloc() function to mark uninitialized heap memory, usually returned from HeapAlloc() [25]
0D15EA5E"Zero Disease", Used as a flag to indicate regular boot on the GameCube and Wii consoles
DDDDDDDDUsed by MicroQuill's SmartHeap and Microsoft's C/C++ debug free() function to mark freed heap memory [25]
DEAD10CC"Dead lock", Indicates that an Apple iOS application has been terminated because it held on to a system resource while running in the background [24]
DEADBABE"Dead babe", Used at the start of Silicon Graphics' IRIX arena files
DEADBEEF"Dead beef", Famously used on IBM systems such as the RS/6000, also used in the classic Mac OS operating systems, OPENSTEP Enterprise, and the Commodore Amiga. On Sun Microsystems' Solaris, marks freed kernel memory (KMEM_FREE_PATTERN)
DEADCAFE"Dead cafe", Used by Microsoft .NET as an error number in DLLs
DEADC0DE"Dead code", Used as a marker in OpenWRT firmware to signify the beginning of the to-be created jffs2 file system at the end of the static firmware
DEADFA11"Dead fail", Indicates that an Apple iOS application has been force quit by the user [24]
DEADF00D"Dead food", Used by Mungwall on the Commodore Amiga to mark allocated but uninitialized memory [30]
DEFEC8ED"Defecated", Used for OpenSolaris core dumps
DEADDEAD"Dead Dead" indicates that the user deliberately initiated a crash dump from either the kernel debugger or the keyboard under Microsoft Windows. [31]
D00D2BAD"Dude, Too Bad", Used by Safari crashes on macOS Big Sur. [32]
EBEBEBEBFrom MicroQuill's SmartHeap
FADEDEAD"Fade dead", Comes at the end to identify every AppleScript script
FDFDFDFDUsed by Microsoft's C/C++ debug malloc() function to mark "no man's land" guard bytes before and after allocated heap memory, [25] and some debug Secure C-Runtime functions implemented by Microsoft (e.g. strncat_s) [33]
FEE1DEAD"Feel dead", Used by Linux reboot() syscall
FEEDFACE"Feed face", Seen in PowerPC Mach-O binaries on Apple Inc.'s Mac OSX platform. On Sun Microsystems' Solaris, marks the red zone (KMEM_REDZONE_PATTERN)

Used by VLC player and some IP cameras in RTP/RTCP protocol, VLC player sends four bytes in the order of the endianness of the system. Some IP cameras expect the player to send this magic number and do not start the stream if it is not received.

FEEEFEEE"Fee fee", Used by Microsoft's debug HeapFree() to mark freed heap memory. Some nearby internal bookkeeping values may have the high word set to FEEE as well. [25]

Most of these are each 32 bits long the word size of most 32-bit architecture computers.

The prevalence of these values in Microsoft technology is no coincidence; they are discussed in detail in Steve Maguire's book Writing Solid Code from Microsoft Press. He gives a variety of criteria for these values, such as:

Since they were often used to mark areas of memory that were essentially empty, some of these terms came to be used in phrases meaning "gone, aborted, flushed from memory"; e.g. "Your program is DEADBEEF".[ citation needed ]

See also

Related Research Articles

<span class="mw-page-title-main">Endianness</span> Order of bytes in a computer word

In computing, endianness is the order in which bytes within a word of digital data are transmitted over a data communication medium or addressed in computer memory, counting only byte significance compared to earliness. Endianness is primarily expressed as big-endian (BE) or little-endian (LE), terms introduced by Danny Cohen into computer science for data ordering in an Internet Experiment Note published in 1980. The adjective endian has its origin in the writings of 18th century Anglo-Irish writer Jonathan Swift. In the 1726 novel Gulliver's Travels, he portrays the conflict between sects of Lilliputians divided into those breaking the shell of a boiled egg from the big end or from the little end. By analogy, a CPU may read a digital word big end first, or little end first.

The Portable Executable (PE) format is a file format for executables, object code, DLLs and others used in 32-bit and 64-bit versions of Windows operating systems, and in UEFI environments. The PE format is a data structure that encapsulates the information necessary for the Windows OS loader to manage the wrapped executable code. This includes dynamic library references for linking, API export and import tables, resource management data and thread-local storage (TLS) data. On NT operating systems, the PE format is used for EXE, DLL, SYS, MUI and other file types. The Unified Extensible Firmware Interface (UEFI) specification states that PE is the standard executable format in EFI environments.

Resource Interchange File Format (RIFF) is a generic file container format for storing data in tagged chunks. It is primarily used for audio and video, though it can be used for arbitrary data.

The Common Object File Format (COFF) is a format for executable, object code, and shared library computer files used on Unix systems. It was introduced in Unix System V, replaced the previously used a.out format, and formed the basis for extended specifications such as XCOFF and ECOFF, before being largely replaced by ELF, introduced with SVR4. COFF and its variants continue to be used on some Unix-like systems, on Microsoft Windows, in UEFI environments and in some embedded development systems.

An object file is a file that contains machine code or bytecode, as well as other data and metadata, generated by a compiler or assembler from source code during the compilation or assembly process. The machine code that is generated is known as object code.

Hexspeak is a novelty form of variant English spelling using the hexadecimal digits. Created by programmers as memorable magic numbers, hexspeak words can serve as a clear and unique identifier with which to mark memory or data.

In computer systems a loader is the part of an operating system that is responsible for loading programs and libraries. It is one of the essential stages in the process of starting a program, as it places programs into memory and prepares them for execution. Loading a program involves either memory-mapping or copying the contents of the executable file containing the program instructions into memory, and then carrying out other required preparatory tasks to prepare the executable for running. Once loading is complete, the operating system starts the program by passing control to the loaded program code.

<span class="mw-page-title-main">COM file</span> Type of simple executable file

A COM file is a type of simple executable file. On the Digital Equipment Corporation (DEC) VAX operating systems of the 1970s, .COM was used as a filename extension for text files containing commands to be issued to the operating system. With the introduction of Digital Research's CP/M, the type of files commonly associated with COM extension changed to that of executable files. This convention was later carried over to DOS. Even when complemented by the more general EXE file format for executables, the compact COM files remained viable and frequently used under DOS.

Mach-O, short for Mach object file format, is a file format for executables, object code, shared libraries, dynamically loaded code, and core dumps. It was developed to replace the a.out format.

A Java class file is a file containing Java bytecode that can be executed on the Java Virtual Machine (JVM). A Java class file is usually produced by a Java compiler from Java programming language source files containing Java classes. If a source file has more than one class, each class is compiled into a separate class file.

<span class="mw-page-title-main">Binary file</span> Non-human-readable computer file encoded in binary form

A binary file is a computer file that is not a text file. The term "binary file" is often used as a term meaning "non-text file". Many binary file formats contain parts that can be interpreted as text; for example, some computer document files containing formatted text, such as older Microsoft Word document files, contain the text of the document but also contain formatting information in binary form.

A FourCC is a sequence of four bytes used to uniquely identify data formats. It originated from the OSType or ResType metadata system used in classic Mac OS and was adopted for the Amiga/Electronic Arts Interchange File Format and derivatives. The idea was later reused to identify compressed data types in QuickTime and DirectShow.

<span class="mw-page-title-main">Commodore DOS</span>

Commodore DOS, also known as CBM DOS, is the disk operating system used with Commodore's 8-bit computers. Unlike most other DOSes, which are loaded from disk into the computer's own RAM and executed there, CBM DOS is executed internally in the drive: the DOS resides in ROM chips inside the drive, and is run there by one or more dedicated MOS 6502 family CPUs. Thus, data transfer between Commodore 8-bit computers and their disk drives more closely resembles a local area network connection than typical disk/host transfers.

Netpbm is an open-source package of graphics programs and a programming library. It is used mainly in the Unix world, where one can find it included in all major open-source operating system distributions, but also works on Microsoft Windows, macOS, and other operating systems.

<span class="mw-page-title-main">GUID Partition Table</span> Computer disk partitioning standard

The GUID Partition Table (GPT) is a standard for the layout of partition tables of a physical computer storage device, such as a hard disk drive or solid-state drive, using universally unique identifiers (UUIDs), which are also known as globally unique identifiers (GUIDs). Forming a part of the Unified Extensible Firmware Interface (UEFI) standard, it is nevertheless also used for some BIOSs, because of the limitations of master boot record (MBR) partition tables, which use 32 bits for logical block addressing (LBA) of traditional 512-byte disk sectors.

The DOS MZ executable format is the executable file format used for .EXE files in DOS.

Program database (PDB) is a file format for storing debugging information about a program. PDB files commonly have a .pdb extension. A PDB file is typically created from source files during compilation. It stores a list of all symbols in a module with their addresses and possibly the name of the file and the line on which the symbol was declared. This symbol information is not stored in the module itself, because it takes up a lot of space.

A file format is a standard way that information is encoded for storage in a computer file. It specifies how bits are used to encode information in a digital storage medium. File formats may be either proprietary or free.

LEB128 or Little Endian Base 128 is a variable-length code compression used to store arbitrarily large integers in a small number of bytes. LEB128 is used in the DWARF debug file format and the WebAssembly binary encoding for all integer literals.

A master boot record (MBR) is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond. The concept of MBRs was publicly introduced in 1983 with PC DOS 2.0.

References

  1. 1 2 3 Martin, Robert C. (2009). "Chapter 17: Smells and Heuristics - G25 Replace Magic Numbers with Named Constants". Clean Code - A handbook of agile software craftsmanship . Boston: Prentice Hall. p.  300. ISBN   978-0-13-235088-4.
  2. Martin, Robert C. (2009). "Chapter 17: Smells and Heuristics - G16 Obscured Intent". Clean Code - A handbook of agile software craftsmanship . Boston: Prentice Hall. p.  295. ISBN   978-0-13-235088-4.
  3. Contieri, Maxi (2020-10-20). "Code Smell 02 - Constants and Magic Numbers". Maximiliano Contieri - Software Design. Retrieved 2024-03-21.
  4. Maguire, James (2008-12-09). "Bjarne Stroustrup on Educating Software Developers". Datamation.com. Archived from the original on 2018-06-23.
  5. Vogel, Jeff (2007-05-29). "Six ways to write more comprehensible code". IBM Developer. Archived from the original on 2018-09-26.
  6. 1 2 3 4 5 6 Paul, Matthias R. (2002-04-09). "[fd-dev] CuteMouse 2.0 alpha 1". freedos-dev. Archived from the original on 2022-04-07. Retrieved 2022-08-04.
  7. "Odd Comments and Strange Doings in Unix". Bell Labs . 2002-06-22. Archived from the original on 2006-11-04.
  8. Personal communication with Dennis M. Ritchie.
  9. "The Unix Tree V6/usr/sys/ken/sys1.c". The Unix Heritage Society . Archived from the original on 2023-03-26.
  10. "The Unix Tree V7/usr/sys/sys/sys1.c". The Unix Heritage Society . Archived from the original on 2023-03-26.
  11. "PNG (Portable Network Graphics) Specification Version 1.0: 12.11. PNG file signature". MIT. 1996-10-01. Archived from the original on 2023-03-26.
  12. Chen, Raymond (2008-03-24). "What's the difference between the COM and EXE extensions?". The Old New Thing. Archived from the original on 2019-02-18.
  13. 1 2 3 Paul, Matthias R. (2002-04-03). "[fd-dev] Ctrl+Alt+Del". freedos-dev. Archived from the original on 2017-09-09. Retrieved 2017-09-09. (NB. Mentions a number of magic values used by IBM PC-compatible BIOSes (0000h, 1234h), DOS memory managers like EMM386 (1234h) and disk caches like SMARTDRV (EBABh, BABEh) and NWCACHE (0EDCh, EBABh, 6756h).)
  14. "The BIOS/MBR Boot Process". NeoSmart Knowledgebase. 2015-01-25. Archived from the original on 2023-03-26. Retrieved 2019-02-03.
  15. "TI E2E Community: Does anyone know if the following configurations can be done with MCP CLI Tool?". Texas Instruments. 2011-08-27. Archived from the original on 2022-10-07.
  16. Poley, Josh (2009-09-30). "Magic Numbers: Integers". Learn. Microsoft. Archived from the original on 2023-03-28.
  17. Newcomer, Joseph M. (2001-10-13). "Message Management: Guaranteeing uniqueness". Developer Fusion. Archived from the original on 2005-04-21. Retrieved 2007-11-16.
  18. Osterman, Larry (2005-07-21). "UUIDs are only unique if you generate them..." Larry Osterman's WebLog - Confessions of an Old Fogey. MSDN. Archived from the original on 2023-03-28. Retrieved 2007-11-16.
  19. "Deploying Java Applets With Family JRE Versions in Java Plug-in for Internet Explorer". Oracle. Archived from the original on 2022-11-30. Retrieved 2023-03-28.
  20. "GNU GRUB Installation, Section 3.4: BIOS installation". Gnu.org. Archived from the original on 2023-03-15. Retrieved 2014-06-26.
  21. Heddings, Lowell (2014-11-03). "Magic Numbers: The Secret Codes that Programmers Hide in Your PC". How-To Geek. Archived from the original on 2023-03-26. Retrieved 2017-10-03.
  22. Cavit, Doug (2012-04-24). "Guarding against re-use of stale object references". Microsoft Secure. Archived from the original on 2018-07-26. Retrieved 2018-07-26.
  23. Boleyn, Erich Stefan (1995-04-04). "Comments on the 'MultiBoot Standard' proposal". Uruk.org. Archived from the original on 2023-03-26.
  24. 1 2 3 4 5 6 "Technical Note TN2151: Understanding and Analyzing Application Crash Reports". Apple Developer Documentation. 2009-01-29. Archived from the original on 2018-12-13.
  25. 1 2 3 4 5 6 Birkett, Andrew. "Win32 Debug CRT Heap Internals". Nobugs.org.
  26. McNamara, Paul (2012-07-19). "Microsoft code contains the phrase 'big boobs' ... Yes, really". Network World.
  27. WebKit, The WebKit Open Source Project, 2023-01-06, retrieved 2023-01-06
  28. "AddressSanitizer - FAQ". GitHub . Retrieved 2022-05-18.
  29. "INTEL 80386 PROGRAMMER'S REFERENCE MANUAL". MIT.
  30. Scheppner, Carolyn. "Amiga Mail Vol.2 Guide". Cataclysm.cx. Archived from the original on 2011-07-18. Retrieved 2010-08-20.
  31. "Bug Check 0xDEADDEAD MANUALLY_INITIATED_CRASH1". Microsoft Documentation. 2023-06-19.
  32. "Safari Version 14.0.1 Unexpectedly Quits".
  33. "strncat_s, _strncat_s_l, wcsncat_s, _wcsncat_s_l, _mbsncat_s, _mbsncat_s_l". Microsoft Documentation. Retrieved 2019-01-16.