Zeitpunkt Nutzer Delta Tröts TNR Titel Version maxTL Sa 20.07.2024 00:01:10 61.957 +1 3.561.604 57,5 Fosstodon 4.2.10 500 Fr 19.07.2024 13:57:34 61.956 -1 3.558.474 57,4 Fosstodon 4.2.10 500 Do 18.07.2024 00:00:27 61.957 +1 3.553.476 57,4 Fosstodon 4.2.10 500 Mi 17.07.2024 00:01:10 61.956 -1 3.550.157 57,3 Fosstodon 4.2.10 500 Di 16.07.2024 00:00:36 61.957 +6 3.547.999 57,3 Fosstodon 4.2.10 500 Mo 15.07.2024 00:00:01 61.951 +1 3.544.794 57,2 Fosstodon 4.2.10 500 So 14.07.2024 00:00:00 61.950 +2 3.542.390 57,2 Fosstodon 4.2.10 500 Sa 13.07.2024 00:00:08 61.948 +1 3.539.632 57,1 Fosstodon 4.2.10 500 Fr 12.07.2024 00:01:45 61.947 +6 3.537.376 57,1 Fosstodon 4.2.10 500 Do 11.07.2024 00:00:37 61.941 0 3.533.951 57,1 Fosstodon 4.2.10 500
(@mort) · 05/2019 · Tröts: 1.588 · Folger: 172
Sa 20.07.2024 21:21
Regarding the #crowdstrike thing: I've seen people say that, because this was a null pointer deref, it wouldn't have happened if it wasn't for the unique unsafety of #C / #cplusplus. And, I mean, using #rust would probably have avoided it, but.. in the typical safe languages, null ptr derefs etc are super common, they just cause a controlled crash rather than invoking UB.
If the kernel driver crashed intentionally thanks to a managed runtime, wouldn't that manifest in the same way? #programming
[Öffentlich] Antw.: 1 Wtrl.: 1 Fav.: 0