Revision as of 14:17, 2 October 2009 editBeno1000 (talk | contribs)Pending changes reviewers3,659 editsmNo edit summary← Previous edit | Revision as of 13:45, 24 October 2009 edit undo81.129.35.1 (talk) →Examples of software detecting storage violationsNext edit → | ||
Line 17: | Line 17: | ||
Some program ] software will also detect violations during testing. | Some program ] software will also detect violations during testing. | ||
===Examples of software detecting storage violations=== | ===Examples of software detecting storage violations=== | ||
* ] from APT UK, later ] which |
* ] from APT UK, later ] which used an ] | ||
* ] originally from Online Software International , later ] | * ] originally from Online Software International , later ] | ||
Revision as of 13:45, 24 October 2009
A storage violation occurs when a task modifies, or attempts to modify, computer storage that it does not own.
Types of storage violation
Storage violation can, for instance, consist of writing to or freeing storage not owned by the task.
A common type of storage violation is known as a stack buffer overflow where a program attempts to alter a memory location beyond its allocated memory.
Avoidance of storage violations
Storage violations can occur in transaction systems such as CICS in circumstances where it is possible to write to storage not owned by the transaction; such violations can be reduced by enabling features such as storage protection and transaction isolation.
Detection of storage violations
In systems such as CICS, storage violations are sometimes detected (by the CICS kernel) by the use of "signatures", which can be tested to see if they have been overlaid.
Some programming languages use software bounds checking to prevent these occurrences.
Some program debugging software will also detect violations during testing.
Examples of software detecting storage violations
- IBM OLIVER (CICS interactive test/debug) from APT UK, later Compuware which used an Instruction set simulator
- Intertest originally from Online Software International , later Computer Associates
References
IBM. "CICS Transaction Server for z/OS, Version 3 Release 2 Information Center". IBM. Retrieved 2008-10-20.
This computer science article is a stub. You can help Misplaced Pages by expanding it. |