Code Smell 260 – Crowdstrike NULL

Using null pointers in critical code can crash your system. Avoid nulls, use address sanitizers, apply defensive programming, and improve QA testing to prevent memory access violations, system instability, and security risks in privilege mode drivers.


This content originally appeared on HackerNoon and was authored by Maximiliano Contieri

How to Avoid the Null Trap in Privilege Mode Drivers

TL;DR: Using null pointers in critical code can crash your system

\

Problems

  • Memory access violation
  • Unpredictable behavior
  • Null Pointer Dereference
  • Unexpected program termination
  • System instability
  • No healing/recovery strategy
  • Security Risk

Solutions

  1. Avoid using NULLs
  2. Use address sanitizers
  3. Make controlled releases to mission-critical software
  4. Create better rollback strategies instead of BSOD
  5. Use Smart Pointers: Manage memory automatically and avoid null pointers with smart pointers
  6. Create self-healing software.
  7. Apply defensive programming
  8. Improve your QA tests before deploying to production.

\

Context

When you use nulls in a privileged driver, you risk causing serious issues.

\ Privilege mode drivers run with high permissions, and if you use a null pointer, the system might try to access an invalid memory address.

For example, trying to read from address 0x9c (156) or using 0x0 as a special value can lead to critical errors.

\ You can't just abort the program in privileged mode, so you must handle these cases carefully.

\ In privileged drivers, null pointer usage poses significant risks. You can mitigate these risks using modern C++ features like std::optional.

This problem caused one of the worst software blackouts in 2024.

Sample Code

Wrong

// This case is not exactly what happened with Crowdstrike
// It is here for illustration purposes
void* get_data() {
  if (data_available) {
    return data_ptr;  // This could be null!
  } else {
    // Uh oh, what if data_ptr is null here?
    return NULL;  
    // Using Null to indicate no data
    // knowing Null is schizophrenic
  }
}

int process_data(void* data) {
  if (data != NULL) { 
    // Maybe a null check, but not guaranteed!
    // Accessing data... (crash if data is Null)
    return *data;
  }
  // No check? Silent failure or unexpected behavior.
  return -1;
}
// You should ideally replace the null with a polymorphic call
// You can see the technique in related articles

std::unique_ptr<int> get_data() { 
  if (data_available) {
    return std::make_unique<int>(data_value);
  } else {
    return nullptr;  // Explicitly return nullptr
  }
}

int process_data(const std::unique_ptr<int>& data) {
  if (data) { // Check for valid pointer
    return *data;
  } else {
    // Handle no data case (e.g., return default value)
    return 0;
  }
}

\

Important Notes About this Code Smell

Detection

  • [x] Semi-Automatic

You can detect this smell by checking for null pointer usage in critical parts of your code. Look for functions that process pointers and see if they handle null pointers safely.

Human code reviews are good for checking this kind of problem.

Tags

  • Null

Level

  • [x] Advanced

/AI Generation

AI generators can sometimes produce this smell, especially if they generate code without context about the environment where the code will run.

AI generators are fed with code with NULL usage even though his creator told us to avoid it altogether.

AI Detection

AI tools can detect this smell with specific instructions.

AI can be trained to identify code patterns.

Teaching it the nuances of privileged driver development and null safety best practices might require more advanced techniques.

Use static analysis tools to flag null pointer dereferences.

Conclusion

Voyager 1's software has been running for more than 50 years.

It was designed to be robust, reliable, and redundant which is sadly uncommon in some immature systems in 2024.

Avoid using null pointers in privileged mode drivers.

I have written a book on clean code and a whole chapter #15 on how to avoid NULL and all the consequences it carries.

Hopefully, Crowdstrike engineers will read it!

Related Code Smells

Code Smell 12 - Null

Code Smell 126 - Fake Null Object

Code Smell 208 - Null Island

\

Further Reading

https://hackernoon.com/null-the-billion-dollar-mistake-8t5z32d6?embedable=true

https://github.com/google/sanitizers/wiki/AddressSanitizer?embedable=true

https://x.com/perpetualmaniac/status/1814376668095754753?embedable=true

:::warning Disclaimer: Code Smells are my opinion.

:::


I couldn't resist the temptation to put in a null reference, simply because it was so easy to implement. This has led to innumerable errors, vulnerabilities, and system crashes, which have probably caused a billion dollars of pain and damage in the last forty years.

Tony Hoare

https://hackernoon.com/400-thought-provoking-software-engineering-quotes?embedable=true


This article is part of the CodeSmell Series on HackerNoon.

https://hackernoon.com/how-to-find-the-stinky-parts-of-your-code-part-i-xqz3evd?embedable=true

\


This content originally appeared on HackerNoon and was authored by Maximiliano Contieri


Print Share Comment Cite Upload Translate Updates
APA

Maximiliano Contieri | Sciencx (2024-07-22T12:49:33+00:00) Code Smell 260 – Crowdstrike NULL. Retrieved from https://www.scien.cx/2024/07/22/code-smell-260-crowdstrike-null-2/

MLA
" » Code Smell 260 – Crowdstrike NULL." Maximiliano Contieri | Sciencx - Monday July 22, 2024, https://www.scien.cx/2024/07/22/code-smell-260-crowdstrike-null-2/
HARVARD
Maximiliano Contieri | Sciencx Monday July 22, 2024 » Code Smell 260 – Crowdstrike NULL., viewed ,<https://www.scien.cx/2024/07/22/code-smell-260-crowdstrike-null-2/>
VANCOUVER
Maximiliano Contieri | Sciencx - » Code Smell 260 – Crowdstrike NULL. [Internet]. [Accessed ]. Available from: https://www.scien.cx/2024/07/22/code-smell-260-crowdstrike-null-2/
CHICAGO
" » Code Smell 260 – Crowdstrike NULL." Maximiliano Contieri | Sciencx - Accessed . https://www.scien.cx/2024/07/22/code-smell-260-crowdstrike-null-2/
IEEE
" » Code Smell 260 – Crowdstrike NULL." Maximiliano Contieri | Sciencx [Online]. Available: https://www.scien.cx/2024/07/22/code-smell-260-crowdstrike-null-2/. [Accessed: ]
rf:citation
» Code Smell 260 – Crowdstrike NULL | Maximiliano Contieri | Sciencx | https://www.scien.cx/2024/07/22/code-smell-260-crowdstrike-null-2/ |

Please log in to upload a file.




There are no updates yet.
Click the Upload button above to add an update.

You must be logged in to translate posts. Please log in or register.