[Not really OT] Crowdstrike Analysis: It was a NULL pointer from the memory unsafe C++ language.
Timon Gehr
timon.gehr at gmx.ch
Mon Jul 29 14:33:32 UTC 2024
On 7/28/24 20:28, Walter Bright wrote:
> On 7/28/2024 6:49 AM, Timon Gehr wrote:
>> Why does this have to blow up in our face first? It is you who
>> proclaimed "memory safety will kill C!"
>
> I want D to be 100% memory safe as much or more than you do!
> ...
This is why I am pushing back on this. You are doing something that
seems to undermine one of your own priorities.
> I am very concerned that making it difficult for programmers to
> transition their code from unsafe to safe will mean - it doesn't happen.
>
> Case in point - my struggles with getting the D front end @safe
> definitely influence my thinking about this.
I am with you until this point, I just think the way to do it is to
actually make interfaces memory safe. If you need more support from the
compiler during the transition, put such features in there.
The dogfooding experience is an opportunity to improve the design of the
toolbox. It's useful in general, e.g. maybe someone would like to enable
certain safety checks in a `@trusted` function and only surgically
disable the ones that are actually intended. This is what gave rise to
the `@trusted` lambda antipattern, and there it would similarly be good
to provide an alternative.
More information about the Digitalmars-d
mailing list