| From: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
|---|---|
| To: | Ed Loehr <pgpatches(at)bluepolka(dot)net> |
| Cc: | Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>, pgsql-patches(at)postgresql(dot)org |
| Subject: | Re: 7.2 fe-exec.c patch to PQescapeString() |
| Date: | 2002-04-06 06:41:47 |
| Message-ID: | 23604.1018075307@sss.pgh.pa.us |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-patches |
Ed Loehr <pgpatches(at)bluepolka(dot)net> writes:
> They get occasional unexpected results? Your point is well-taken
> regarding masking programming errors, but guarding against a null
> ptr crash is not 'masking the error'
I agree with Bruce on this one. I think the right analogy is not
one of "let's be friendly if he passes a null pointer" but "should
we try to detect a bogus input pointer". If we are passed a random
bit-pattern for the 'from' pointer, we will almost certainly core
dump on trying to dereference it. We have no reasonable or portable
way to defend against that. I tend to think that being passed a null
pointer is a member of this class of events, not something that we
should have a special-case defense against. It is a caller bug and
the caller should fix it, just the same as if the caller passed us
a bogus non-null pointer.
regards, tom lane
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Ed Loehr | 2002-04-06 07:04:18 | Re: 7.2 fe-exec.c patch to PQescapeString() |
| Previous Message | Ed Loehr | 2002-04-06 06:15:05 | Re: 7.2 fe-exec.c patch to PQescapeString() |