Code error types detected by purify

Source: Internet
Author: User

I. red exclamation mark

1. ABR: Array bounds read

Array out-of-bounds read (only the array allocated by dynamic memory is detected, and the global, local, and static arrays cannot be detected ).

2. ABW: Array Bounds Write

Array out-of-bounds write (only the array allocated by dynamic memory is detected, and the global, local, and static arrays cannot be checked

3. abwl: Late detect Array Bounds Write (an abwl message
Indicates that the program wrote a value before the beginning or after
The end of an allocated block of memory)
4. BSR: Beyond stack read

The function may have read a pointer outside the current stack. For example, if the program encounters an exception when writing the variable value, a BSR error occurs when reading the variable. (Not applicable to local arrays in the stack)

5. bsw: Beyond stack write

The function may write a pointer out of the current stack. (Not applicable to local arrays in the stack)

6. Exu: unhandled exception

Unprocessed exceptions

7. FFM: freeing freed memory

Releasing released memory.
8. FIM: freeing Invalid Memory

Try to release unallocated and invalid memory.

9. FMM: freeing mismatched memory

Release mismatched memory and use incorrect API functions to release some memory types.

10. FMR: free memory read

Read the released or unallocated memory.

11. fmw: free memory write

Write the released or unallocated memory.

12. FMWL: Late detect free memory write

13. IPR: Invalid Pointer read

The program is reading an invalid memory region and cannot set the address.

14. IPW: Invalid Pointer write

The program is writing an Invalid Address in the memory area.

Red Zone

For Error Detection runs, the bytes that are placed at the beginning
And end of each allocated block of memory in a program at run time.
Red Zone is used to detect Array bounds read (ABR), Array Bounds Write
(ABW), and late detect Array Bounds Write (abwl) errors.

15. NPR: NULL pointer read

Null Pointer read.

16. npw: NULL pointer write

Null Pointer write.

2. Yellow Warning Information

1. com: com api/interface failure

Com operation failed. In every com
After an API or COM interface is called, purify checks the hresult. If the value is not s_ OK indicating that the operation is successful, this error is displayed.

2. HAN: Invalid handle

Invalid handle. A non-handle value or an error type handle appears in the expected handle.

3. ilk: COM interface leak

COM interface vulnerability. This prompt is displayed when the total number of references to a COM interface is greater than 1.

4. MLK: Memory Leak

Heap Memory leakage. The memory block does not contain any content or is not referenced by any pointer. The error message is displayed in either of the following cases.

A. The local memory is allocated to the function, but it is not free when you exit the function.

B. the pointer of the memory block is cleared or changed or not in its scope.

If the section of the program where the memory is allocated and
Leaked is executed repeatedly, you might eventually run out of swap
Space, causing slow downs and crashes. This is a serous problem
Long-running, interactive programs.

5. Par: Bad Parameter

The program passes an incorrect parameter when calling a common function during WIN32API or C running.

6. UMC: uninitialized memory copy

Copy an uninitialized value from one memory area to another.

7. UMR: uninitialized memory read

Read the value of the uninitialized memory block.

3. Blue prompt information

1. Box: MessageBox

If the MessageBox () or messageboxex () functions are used in the program, the message is displayed after the purify operation is completed.

2. exc: Continued exception

3. exh: handled exception

4. Exi: ignored exception

5. Hiu: handle in use

After the handle is assigned, it is not released.

6. MAF: Memory Allocation failure

Memory Allocation failed.

7. Miu: Memory in use

The heap memory to be allocated already has a pointer.

8. mpk: Potential Memory Leak

Heap memory may be leaked. There is no pointer at the beginning of the memory block, but the pointer inside the block seems to point.

9. ODS: outputdebugstring

The program calls the outputdebugstring function.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.