home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.sys.mac.programmer
- Path: sparky!uunet!pageworks.com!world!eff!sol.ctr.columbia.edu!news.unomaha.edu!cwis.unomaha.edu!salmon
- From: salmon@cwis.unomaha.edu (David Salmon)
- Subject: Re: What does 0xB6DB6DB6 mean to you?
- Message-ID: <1993Jan28.100231.570@news.unomaha.edu>
- Sender: news@news.unomaha.edu (UNO Network News Server)
- Organization: University of Nebraska at Omaha
- References: <1993Jan28.072816.20649@hobbes.kzoo.edu>
- Date: Thu, 28 Jan 1993 10:02:31 GMT
- Lines: 25
-
- k044477@hobbes.kzoo.edu writes:
- > I have an extremely puzzling heap-corruption bug that I've been actively
- > tracking down for days. I don't have many clues.
- >
- > One clue that I do have is, the hex bytes B6 DB 6D seem to get written
- > over blocks of mine occasionally. They rarely (never?) get written
- > outside blocks, so the heap is (often) not corrupted. Anyone know what
- > might be doing this?
- >
- > I would guess it's some kind of debugging tool; the binary
- > representation is ...110110110110110110... but I can't figure out who
- > might be reponsible...
-
- I believe that the code B6DBB6DB... occurrs in unused ROM space. The
- chances are high that you have an uninitialize pointer and are copying
- this into your own data. Otherwise, check for improper arguments to
- Toolbox trap. The only time I ever get B6DB6DB6... is when I do something
- wrong with the Toolbox. One possibility is that you are calling InvalRect
- or InvalRgn without setting the port. This always seems to cause some
- memory problems.
-
- Hope this helps.
- --
- David C. Salmon
- salmon@unomaha.edu
-