View Single Post
Old 31 July 2015, 15:26   #112
meynaf
son of 68k
meynaf's Avatar
 
Join Date: Nov 2007
Location: Lyon / France
Age: 44
Posts: 2,459
Quote:
Originally Posted by Mrs Beanbag View Post
i do know what you mean... i have seen some shockingly over-egged code, and fixed it, but again this is besides the point.

This kind of bad code isn't what gets you bad pointers. It is usually silly mistakes that get you bad pointers.
Ok, but the more code you have, the more silly mistakes can creep in.


Quote:
Originally Posted by Mrs Beanbag View Post
Oh i have seen unit tests fail on Windows but not Linux (or was it the other way around?) because of a line like the following:

Code:
char* myString = 0
Then someone passes myString as an argument to something... well i think you can guess the rest. Maybe you can also guess that this code was written by someone whose first language was Java.

It seems like spotting this sort of thing is a rare talent, somehow. This particular case only happened in the unit test and the program itself seemed fine, so this went unfixed for months until someone gave it me to look at.
It's reasons like that which make me like asm.


Quote:
Originally Posted by Mrs Beanbag View Post
You are in full on attack mode now, aren't you?
No, why ?


Quote:
Originally Posted by Mrs Beanbag View Post
It is a very simple website. Its simplicity did not protect it. Yeah that example can be made to prove all sorts of things that are beside the point.
Then let's just return to the point.
And mine is that memory protection is optional.
meynaf is offline  
 
Page generated in 0.09893 seconds with 9 queries