Magic number (programming)
In computer programming, the term magic number has multiple meanings. It could refer to:
- a constant used to identify a file format or protocol;
- an unnamed and/or ill-documented numerical constant; or
- distinctive debug values or GUIDs, etc.
Format indicator
Magic number origin
The type of magic number was initially found in early Seventh Edition source code of the Unix operating system and, although it has lost its original meaning, the term magic number has become part of computer industry lexicon.
When Unix was ported to one of the first DEC PDP-11/20s it did not have memory protection and, therefore, early versions of Unix used the relocatable memory reference model.[1] Thus, pre-Sixth Edition Unix versions read an executable file into memory and jumped to the first low memory address of the program, relative address zero. With the development of paged versions of Unix, a header was created to describe the executable image components. Also, a branch instruction was inserted as the first word of the header to skip the header and start the program. In this way a program could be run in the older relocatable memory reference (regular) mode or in paged mode. As more executable formats were developed, new constants were added by incrementing the branch offset.[2]
In the Sixth Edition source code of the Unix program loader, the exec() function read the executable (binary) image from the file system. The first 8 bytes of the file was a header containing the sizes of the program (text) and initialized (global) data areas. Also, the first 16-bit word of the header was compared to two constants to determine if the executable image contained relocatable memory references (normal), the newly implemented paged read-only executable image, or the separated instruction and data paged image.[3] There was no mention of the dual role of the header constant, but the high order byte of the constant was, in fact, the operation code for the PDP-11 branch instruction (000407 or 0x0107). Adding seven to the program counter showed that if this constant was executed, it would branch the Unix exec() service over the executable image eight byte header and start the program.
Since the Sixth and Seventh Editions of Unix employed paging code, the dual role of the header constant was hidden. That is, the exec() service read the executable file header (meta) data into a kernel space buffer, but read the executable image into user space, thereby not using the constant's branching feature. Magic number creation was implemented in the Unix linker and loader and magic number branching was probably still used in the suite of stand-alone diagnostic programs that came with the Sixth and Seventh Editions. Thus, the header constant did provide an illusion and met the criteria for magic.
In Version Seven Unix, the header constant was not tested directly, but assigned to a variable labeled ux_mag[4] and subsequently referred to as the magic number. Given that there were approximately 10,000 lines of code and many constants employed in these early Unix versions, this indeed was a curious name for a constant, almost as curious as the [1] comment used in the context switching section of the Version Six program manager. Probably because of its uniqueness, the term magic number came to mean executable format type, then expanded to mean file system type, and expanded again to mean any strongly typed file.
Magic numbers in files
Magic numbers are common in programs across many operating systems. Magic numbers implement strongly typed data and are a form of in-band signaling to the controlling program that reads the data type(s) at program run-time. Many files have such constants that identify the contained data. Detecting such constants in files is a simple and effective way of distinguishing between many file formats and can yield further run-time information.
Some examples:
- Compiled Java class files (bytecode) start with
0xCAFEBABE
. When compressed with Pack200 the bytes are changed to0xCAFED00D
. - GIF image files have the ASCII code for 'GIF89a' (
0x474946383961
) or 'GIF87a' (0x474946383761
) - JPEG image files begin with
0xFFD8
and end with0xFFD9
. JPEG/JFIF files contain the ASCII code for 'JFIF' (0x4A464946
) as a null terminated string. JPEG/Exif files contain the ASCII code for 'Exif' (0x45786966
) also as a null terminated string, followed by more metadata about the file. - PNG image files begin with an 8-byte signature which identifies the file as a PNG file and allows immediate detection of common file transfer problems (the signature contains various newline characters for detection of unwarranted automated newline conversion, for example, if the file is transferred over FTP with the "ASCII" transfer mode instead of the "binary" mode):
\211 P N G \r \n \032 \n
(0x89504e470d0a1a0a
) - Standard MIDI music files have the ASCII code for 'MThd' (
0x4D546864
) followed by more metadata. - Unix script files usually start with a shebang, '#!' (
0x2321
) followed by the path to an interpreter. - PostScript files and programs start with '%!' (
0x2521
). - PDF files start with '%PDF'.
- Old MS-DOS .exe files and the newer Microsoft Windows PE (Portable Executable) .exe files start with the ASCII string 'MZ' (
0x4D5A
), the initials of the designer of the file format, Mark Zbikowski. The definition allows 'ZM' as well but it is quite uncommon. - The Berkeley Fast File System superblock format is identified as either
0x19540119
or0x011954
depending on version; both represent the birthday of the author, Marshall Kirk McKusick. - The Master Boot Record of bootable storage devices on almost all IA-32 IBM PC Compatibles has a code of
0xAA55
as its last two bytes. - Executables for the Game Boy and Game Boy Advance handheld video game systems have a 48-byte or 156-byte magic number, respectively, at a fixed spot in the header. This magic number encodes a bitmap of the Nintendo logo.
- Zip files begin with 'PK', the initials of Phil Katz, author of DOS compression utility PKZIP.
- Old Fat binaries (containing code for both 68K processors and PowerPC processors) on Classic Mac OS contained the ASCII code for 'Joy!' (
0x4A6F7921
) as a prefix. - TIFF files begin with either "II" or "MM" depending on the byte order (II for Intel, or little endian, MM for Motorola, or big endian), followed by
0x2A00
or0x002A
(decimal 42 as a 2-byte integer in Intel or Motorola byte ordering). - Unicode text files encoded in UTF-16 often start with the Byte Order Mark to detect endianness (0xFEFF for big endian and 0xFFFE for little endian). UTF-8 text files often start with the UTF-8 encoding of the same character, 0xEFBBBF.
The Unix utility program file
can read and interpret magic numbers from files, and indeed, the file which is used to parse the information is called magic. The Windows utility TrID has a similar purpose.
Magic numbers in protocols
This section needs expansion. You can help by adding to it. (January 2007) |
- The OSCAR protocol, used in AIM/ICQ, prefixes requests with
0x2A
. - In the RFB protocol used by VNC, a client starts its conversation with a server by sending "RFB" (
0x524642
, for "Remote Frame Buffer") followed by the client's protocol version number. - In the SMB protocol used by Microsoft Windows, each SMB request or server reply begins with
0xff534d42
, or "\xffSMB" at the start of the SMB request. - In the MSRPC protocol used by Microsoft Windows, each TCP-based request begins with
0x05
at the start of the request (representing Microsoft DCE/RPC Version 5), followed immediately by a0x00
or0x01
for the minor version. In UDP-based MSRPC requests the first byte is always0x04
. - In COM and DCOM marshalled interfaces, called OBJREFs, always start with the byte sequence "MEOW". Debugging extensions (used for DCOM channel hooking) are prefaced with the byte sequence "MARB".
- Unencrypted BitTorrent tracker requests begin with a single byte,
0x13
representing the header length, followed immediately by the phrase "BitTorrent protocol" at byte position 1. - eDonkey/eMule traffic begins with a single byte representing the client version. Currently
0xe3
represents an eDonkey client,0xc5
represents eMule, and0xd4
represents compressed eMule. - SSL transactions always begin with a "client hello" message. The record encapsulation scheme used to prefix all SSL packets consists of two- and three- byte header forms. Typically an SSL version 2 client hello message is prefixed with a
0x80
and SSLv3 server response to a client hello begins with0x16
(though this may vary). - DHCP packets use a "magic cookie" value of
0x63825363
at the start of the options section of the packet. This value is included in all DHCP packet types.
Unnamed numerical constant
The term magic number also refers to the bad programming practice of using numbers directly in source code without explanation. In most cases this makes programs harder to read, understand, and maintain. Although most guides make an exception for the numbers zero and one, it is a good idea to define all other numbers in code as named constants.
For example, to shuffle the values in an array randomly, this pseudocode will do the job:
for i from 1 to 52 j := i + randomInt(53 - i) - 1 a.swapEntries(i, j)
where a
is an array object, the function randomInt(x)
chooses a random integer between 1 to x, inclusive, and swapEntries(i, j)
swaps the ith and jth entries in the array. In this example, 52
is a magic number. It is considered better programming style to write:
constant int deckSize := 52 for i from 1 to deckSize j := i + randomInt(deckSize + 1 - i) - 1 a.swapEntries(i, j)
This is preferable for several reasons:
- It is easier to read and understand. A programmer reading the first example might wonder, What does the number
52
mean here? Why52
? The programmer might infer the meaning after reading the code carefully, but it's not obvious. Magic numbers become particularly confusing when the same number is used for different purposes in one section of code.
- It is easier to alter the value of the number, as it is not redundantly duplicated. Changing the value of a magic number is error-prone, because the same value is often used several times in different places within a program. Also, if two semantically distinct variables or numbers have the same value they may be accidentally both edited together. To modify the first example to shuffle a Tarot deck, which has 78 cards, a programmer might naively replace every instance of
52
in the program with78
. This would cause two problems. First, it would miss the value53
on the second line of the example, which would cause the algorithm to fail in a subtle way. Second, it would likely replace the characters52
everywhere, regardless of whether they refer to the deck size or to something else entirely, which could introduce bugs. By contrast, changing the value of thedeckSize
variable in the second example would be a simple, one-line change.
- The declarations of "magic number" variables are placed together, usually at the top of a function or file, facilitating their review and change.
- It facilitates parameterization. For example, to generalize the above example into a procedure that shuffles a deck of any number of cards, it would be sufficient to turn
deckSize
into a parameter of that procedure. The first example would require several changes, perhaps:
function shuffle (int deckSize) for i from 1 to deckSize j := i + randomInt(deckSize + 1 - i) - 1 a.swapEntries(i, j)
- It helps detect typos. Using a variable (instead of a literal) takes advantage of a compiler's checking (if any). Accidentally typing "62" instead of "52" would go undetected, whereas typing "dekSize" instead of "deckSize" would result in the compiler's warning that dekSize is undeclared.
- It can reduce typing in some IDEs. If an IDE supports code completion, it will fill in most of the variable's name from the first few letters.
Disadvantages are:
- It may be slower for the CPU to process the expression "deckSize + 1" than the expression "53". However, most modern compilers and interpreters are capable of using the fact that the variable "deckSize" has been declared as a constant and pre-calculate the value 53 in the code that is eventually executed. There is therefore usually no speed advantage to using magic numbers in code.
- It can increase the line length of the source code, forcing lines to be broken up if many constants are used on the same line.
- It can make debugging more difficult, especially on systems where the debugger doesn't display the values of constants.
Accepted use of magic numbers
In some contexts the use of unnamed numerical constants is generally accepted. While such acceptance is subjective, and often depends on individual coding habits, the following are common examples:
- the use of 1 as an incrementing value in a for loop
- the use of 0 and 1 while indexing through an array
- the use of 10 as a multiplier or divisor when dealing with decimal (base-10) numbers. For example: when performing modulo operations to access the lowest-order digit
- the use of 2 as a multiplier or divisor to double or halve a value. It should be noted that while multiplying or dividing by 2 is acceptable, multiplying or dividing by other values (such as 3, 4, 5, ...) is not, and such values should be defined as named constants.
- the use of 2 as a divisor to check if a number is even or odd (any even number modulo 2 gives 0, and any odd number modulo 2 gives 1)
- the use of hexadecimal values 0x80 and 0x01 as masks to access the highest- and lowest-order bits in a byte (using mask constants is however preferred).
The constants 1 and 0 are sometimes used to represent the boolean values True and False in programming languages without a boolean type such as older versions of C. Most modern programming languages provide boolean
or bool
primitive type and so the use of 0 and 1 is ill-advised.
In C and C++, 0 is sometimes used to represent the null pointer or reference. As with boolean values, the C standard library includes a macro definition NULL
whose use is encouraged. Other languages provide a specific null
or nil
value and when this is the case no alternative should be used.
Problems with magic numbers
Because magic numbers are of an arbitrary value, they do not often carry a meaning by themselves; in most cases it is up to the documentation of one's code to specify exactly what the magic number represents. Also, magic numbers are not typesafe, that is, one could erroneously add one to another and arrive at a nonsensical result. Lastly, although highly coincidental, situations arise when numbers may accidentally match magic numbers during comparison operations. It is for these reasons that the use of Enumerated types, or enums, is quickly overtaking the use of magic numbers. Although enums are represented in most languages as an integer (a notable exception is Java)[5], the name of the enum is used rather than the number itself.
Magic GUIDs
Although highly discouraged, it is possible manually to create or to alter GUIDs or UUIDs so that they include some human-understandable or memorable meaning. This is discouraged since it might compromise the uniqueness of the ID[6][7]. The specification for generating GUIDs and UUIDs is quite complex and specific, which is what leads to their globally unique nature. They should only be generated by a reputable software tool; they are not just random string-values.
- Java uses several GUIDs starting with "CAFEEFAC".
Magic debug values
Magic debug values are specific values written to memory during allocation or deallocation, so that it will later be possible to tell whether or not they have become corrupted, and to make it obvious when values taken from uninitialized memory are being used.
Since it is unlikely that any given 32-bit integer would take this specific value, the appearance of such a number in a debugger or memory dump can indicate common errors such as buffer overflows, or uninitialized variables.
Memory is usually viewed in hexadecimal, so common values used are often repeated digits or hexspeak.
Famous and common examples include:
0x..FACADE
: Used by a number of RTOSes0xA5A5A5A5
: Used in embedded development because the alternating bit pattern (10100101) creates an easily recognized pattern on oscilloscopes and logic analyzers.0xABABABAB
: Used by Microsoft's HeapAlloc() to mark "no man's land" guard bytes after allocated heap memory0xABADBABE
: Used by Apple as the "Boot Zero Block" magic number0xABADCAFE
: A startup to this value to initialize all free memory to catch errant pointers0xBAADF00D
: Used by Microsoft's LocalAlloc(LMEM_FIXED) to mark uninitialised allocated heap memory0xBADBADBADBAD
: Burroughs large systems "uninitialized" memory (48-bit words)0xBADCAB1E
: Error Code returned to the Microsoft eVC debugger when connection is severed to the debugger0xBADC0FFEE0DDF00D
: Used on IBM RS/6000 64-bit systems to indicate uninitialized CPU registers0xBADDCAFE
: On Sun Microsystems' Solaris, marks uninitialised kernel memory (KMEM_UNINITIALIZED_PATTERN)0xBEEFCACE
: Used by Microsoft .NET as a magic number in resource files0xC0DEDBAD
: A memory leak tracking tool which it will change the MMU tables so that all references to address zero0xCAFEBABE
: Used by both Mach-O ("Fat binary" in both 68k and PowerPC) to identify object files and the Java programming language to identify .class files0xCAFEFEED
: Used by Sun Microsystems' Solaris debugging kernel to mark kmemfree() memory0xCEFAEDFE
: Seen in Intel Mach-O binaries on Apple Computer's Mac OS X platform (see0xFEEDFACE
below)0xCCCCCCCC
: Used by Microsoft's C++ debugging runtime library to mark uninitialised stack memory0xCDCDCDCD
: Used by Microsoft's C++ debugging runtime library to mark uninitialised heap memory0xDDDDDDDD
: Used by MicroQuill's SmartHeap and Microsoft's C++ debugging heap to mark freed heap memory0xDEADBABE
: Used at the start of Silicon Graphics' IRIX arena files0xDEADBEEF
: Famously used on IBM systems such as the RS/6000, also used in the original Mac OS operating systems, OPENSTEP Enterprise, and the Commodore Amiga. On Sun Microsystems' Solaris, marks freed kernel memory (KMEM_FREE_PATTERN)0xDEADDEAD
: A Microsoft Windows STOP Error code used when the user manually initiates the crash.0xDEADF00D
: All the newly allocated memory which is not explicitly cleared when it is munged0xEBEBEBEB
: From MicroQuill's SmartHeap0xFADEDEAD
: Comes at the end to identify every OSA script0xFDFDFDFD
: Used by Microsoft's C++ debugging heap to mark "no man's land" guard bytes before and after allocated heap memory0xFEEDFACE
: Seen in PowerPC Mach-O binaries on Apple Computer's Mac OS X platform. On Sun Microsystems' Solaris, marks the red zone (KMEM_REDZONE_PATTERN)0xFEEEFEEE
: Used by Microsoft's HeapFree() to mark freed heap memory0xFEE1DEAD
: Used by Linux reboot() syscall
Note that most of these are each 32 bits long — the dword size of most modern computers.
The prevalence of these values in Microsoft technology is no coincidence; they are discussed in detail in Steve Maguire's book Writing Solid Code from Microsoft Press. He gives a variety of criteria for these values, such as:
- They should not be useful; that is, most algorithms that operate on them should be expected to do something unusual. Numbers like zero don't fit this criterion.
- They should be easily recognized by the programmer as invalid values in the debugger.
- On machines that don't have byte alignment, they should be odd numbers, so that dereferencing them as addresses causes an exception.
- They should cause an exception, or perhaps even a debugger break, if executed as code.
Since they were often used to mark areas of memory that were essentially empty, some of these terms came to be used in phrases meaning "gone, aborted, flushed from memory"; e.g. "Your program is DEADBEEF".
Pietr Brandehörst's ZUG programming language initialized memory to either 0x0000
, 0xDEAD
or 0xFFFF
in development environment and to 0x0000
in the live environment, on the basis that uninitialised variables should be encouraged to misbehave under development to trap them, but encouraged to behave in a live environment to reduce errors[citation needed].
See also
- File format, Magic number section
- NaN (Not a Number), for another set of magic values
- http://magicdb.org/
- Enumerated type
- GNUWin file(1) page with link to /etc/magic file
Notes
- ^ a b Odd Comments and Strange Doings in Unix[1]
- ^ Personal communication with Dennis M. Ritchie
- ^ Version six system1 source file[2]
- ^ Version seven system1 source file[3]
- ^ Java 5.0 Programming Guide, "Enums" http://java.sun.com/j2se/1.5.0/docs/guide/language/enums.html
- ^
'flounder'. "Guaranteeing uniqueness". Message Management. Developer Fusion. Retrieved 2007-11-16.
{{cite web}}
: Cite has empty unknown parameter:|1=
(help) - ^
Larry Osterman (Thursday, July 21, 2005). "UUIDs are only unique if you generate them..." Larry Osterman's WebLog - Confessions of an Old Fogey. MSDN. Retrieved 2007-11-16.
{{cite web}}
: Check date values in:|date=
(help)