c++ - Track Data Execution Prevention (DEP) -


when running 1 of our software, tester faced data execution prevention dialog of windows.

we try reproduce situation on developer computer debugging purposes : no success.

does know how find may cause dep protection kill application? there existing tools available this?

the dep dialog typically show when try execute code region you're not marking executable. might caused 'thunks' in library you're using, e.g. atl windowing. problem fixed in atl 8.0.

a stack-trashing bug - example, buffer overrun - can cause problem, setting return address location isn't executable. might not cause access violation instead weird behaviour, if dep turned off process or not available on hardware.

it might happen if throw c++ exception or raise seh exception, , structured exception handlers have been trashed buffer overrun.


Comments

Popular posts from this blog

c++ - How do I get a multi line tooltip in MFC -

asp.net - In javascript how to find the height and width -

c# - DataTable to EnumerableRowCollection -