
NT 4.0 allows memory access violations!!!
The following piece of code runs without error on Windows 4.0 (service
pack 2) and is terminated with a dialog message under 3.51 (service pack
4).
The program calls CopyRect with an uninitilized pointer, which attempts
to read from memory location 0. I realize that NT 4.0 moved code to
ring zero to enhance performance. How much did they move? Will NT 4.0
allow writes to location 0 as well? Is NT no longer a memory access
protected Operating System?
#include <afxwin.h>
int main ()
{
RECT dstRect;
LPRECT srcRect;
srcRect = 0;
CopyRect (&dstRect, srcRect);
return 1;
Quote:
}
----------------------------------------------------------------------
Frank C. Garber Voice: 860.627.1629 - current assignment
Software Devel. Consultant Fax: 860.627.1666
Burlington, CT 06013-2220 WWW: http://www.*-*-*.com/ ~garberfc
>>Only by attempting the absurd do we achieve the impossible<<
----------------------------------------------------------------------