[Not really OT] Crowdstrike Analysis: It was a NULL pointer from the memory unsafe C++ language.
    Nick Treleaven 
    nick at geany.org
       
    Mon Jul 29 13:07:46 UTC 2024
    
    
  
On Saturday, 27 July 2024 at 18:23:28 UTC, Walter Bright wrote:
> It's true that many algorithms depend on a null pointer being a 
> "sentinel", and people sometimes forget to check for it.
Or they aren't supposed to have a sentinel but they accidentally 
got passed a null value because the type system allows it.
> That means:
>
> 1. if they forgot to check for the null special case, then the 
> seg fault tells them where the error is
>
> 2. if null was supposed not ever happen, then the seg fault 
> tells where the error is
You don't get a segfault if your tests weren't run or don't (*or 
can't*) cover every case in development. Then *your users* get 
the segfault.
Do you accept that the developer detecting those bugs at 
compile-time is advantageous to the user having their program 
abort? The user might not even know how to file a bug, and it 
could cost them money, time or worse.
    
    
More information about the Digitalmars-d
mailing list