[Not really OT] Crowdstrike Analysis: It was a NULL pointer from the memory unsafe C++ language.

Nick Treleaven nick at geany.org
Mon Jul 29 13:07:46 UTC 2024


On Saturday, 27 July 2024 at 18:23:28 UTC, Walter Bright wrote:
> It's true that many algorithms depend on a null pointer being a 
> "sentinel", and people sometimes forget to check for it.

Or they aren't supposed to have a sentinel but they accidentally 
got passed a null value because the type system allows it.

> That means:
>
> 1. if they forgot to check for the null special case, then the 
> seg fault tells them where the error is
>
> 2. if null was supposed not ever happen, then the seg fault 
> tells where the error is

You don't get a segfault if your tests weren't run or don't (*or 
can't*) cover every case in development. Then *your users* get 
the segfault.

Do you accept that the developer detecting those bugs at 
compile-time is advantageous to the user having their program 
abort? The user might not even know how to file a bug, and it 
could cost them money, time or worse.


More information about the Digitalmars-d mailing list