Fig. 8From: Memory access integrity: detecting fine-grained memory access errors in binary codeThe source code and assembly code of initializing the linked list nodeBack to article page