You're welcome.
Maybe we should try to get NI to put math exception support into their runtime engine, and provide a mechanism for applications to get a callback when one occurs in release mode code.
Your only real protection against divide by zero is to exert the discipline when coding to not allow it to happen. I suspect there are a lot of apps out there that are vulnerable. One device is to constrain numeric controls to not allow 0 as an input, or to check for it.
In general, you can really shoot your foot off in C, the paradigm is "trust the programmer". If you can't be trusted to not do stupid things, then you should be using a different language. I fight this battle all the time here at work with well-intentioned, intelligent people (systems guys typically) who aren't good C programmers and can't be trusted to do the right thing. So we spend a lot of time un-hosing improper pointer usage, callbacks 4000 lines in length, functions with 40 parameters, not using a distribution kit, etc. etc. It's no mystery that modern languages generally disallow pointers (Ada, Java, C#). In C++ you can blow off your whole leg. Trying to mandate proper C coding practices usually fails - it becomes a game to try and bypass the constraints - and ignorant program managers reward shoot from the hip developers who appear to be coming up with quick results but in reality are hacking out code that is unstructured, error prone, fragile, and costs much more in the long term to supprt.
JPL is doing a thing where they require the developers to use maximum strength compiler error checking, and then a warning free analysis by a static code checker. See "The Power of Ten" in a recent Computer magazine - ten rules to follow to get reliable code, some of which many veteran developers would object to. But then, JPL's been burned big time by coding mistakes on deep space missions so they're sensitized to the issue
😉Menchar