obliterate
Simen Kjærås
simen.kjaras at gmail.com
Wed Nov 13 00:06:52 PST 2013
On 13.11.2013 08:16, KlausO wrote:
> Am 13.11.2013 02:21, schrieb Andrei Alexandrescu:
>> On 11/12/13 5:10 PM, Vladimir Panteleev wrote:
>>>> * Pointers and class references: size_t.max - 65_535, i.e. 64K below
>>>> the upper memory limit. On all systems I know it can be safely assumed
>>>> that that area will cause GPF when accessed.
>>>
>>> Make that value odd. That will also guarantee a GPF on systems where
>>> unaligned pointer access is forbidden.
>>
>> Ha, I missed that. Nice!
>>
>> Andrei
>>
>
> The classics:
>
> 0xFFFFDEAD dead
> 0xFFFFD1ED died
>
> Not so obvious:
>
> 0xFFFFFA1D failed
> 0xFFFFACED (the result makes you dumb) faced
> 0xFFFFFEED don't feed me with this
> 0xFFFFDF0F don't follow (this pointer) or (you are) f*****
I thought I recalled some system initializing its data to 0xF001, but
apparently it was Algol 68-R using the character string
"FOOLFOOLFOOL..."[0].
Still, I guess a case could be made for 0xFFFFF001.
[0]: http://www.catb.org/jargon/html/F/fool.html
--
Simen
More information about the Digitalmars-d
mailing list