Jump to content
IGNORED

the "blue screen of death"


Recommended Posts

Its Y2K bug, just as nosterdamus predicted in the Mexican calendar, the ends is here. Döner Trump, beamus up. to the big blender in the sky we fly. Hulk Hogan I love you. Kisses 

  • Thanks 1
  • Haha 2
Link to comment
Share on other sites

It caused a major incident at work but I wasn't personally impacted. There were/are some very stressed people though.

Good excuse for not travelling into the office today, just in case. All social commitments cancelled, just to be sure. 

News highlight so far:

image.thumb.png.7e91c228a0ba7a48ff3960b436d96136.png


 

  • Thanks 1
  • Haha 2
  • Big Brain 1
Link to comment
Share on other sites

A single software update bug caused by a capitalistic monopoly can singlehandedly paralyse the whole international economy and provoke financial panic, but the main risk for economic stability is... moderate left-leaning parties?

  • Like 5
  • Confused 1
  • Big Brain 2
Link to comment
Share on other sites

12 hours ago, BobDobalina said:

Have you checked your motherboard for TCP/IP interrupts at the kernel level?

Heh. Funny when you consider how many people leave the BAUD rate of their SCSI ports unlocked. 
 

Link to comment
Share on other sites

16 minutes ago, user said:

Heh. Funny when you consider how many people leave the BAUD rate of their SCSI ports unlocked. 
 

These are the same type of jagoffs who play fast and loose with their IRQs, RAID their PnP devices, and disable their pagefile.

Link to comment
Share on other sites

Some rumors I've seen is that CrowdStrike laid off a large part of their QA team earlier this year and the management "didn't believe in test automation" but instead relied only on manual testing. The bug itself seems to be a null pointer issue.

Anyway, the question that how did this big of a fuck up get deployed in so many large scale and critical systems without anyone catching the issue before deployment is mind-boggling.

  • Like 5
Link to comment
Share on other sites

Yes anything that auto-updates, theres a big responsibility on the makers to test properly. Especially if its a low level thing like an OS or security software that sits close to the kernel. They should have a whole battery of tests, different environments and then phased roll outs with a close eye kept looking out for problems. You can bet that Apple, Microsoft and Google/Android test their OS updates exhaustively. Sometimes their updates break things but its usually subtle or obscure.

CrowdStrike were supposed to be very trustworthy which is why lots of highly-regulated industries like airlines and banks and hospitals were using them.

They literally had an update that instantly blue screens any PC it touches, and somehow they sent it out to the whole world without fucking noticing? Complete cowboys. And they are supposed to be enterprise level trusted purveyors of security software.

It'll be interesting to see how CrowdStrike try and justify it (they need to think of the shareholders, after all) but if there's any justice in the world CrowdStrike deserve to go bankrupt the minute they've finishing cleaning up this global bullshit that they've caused.

  • Like 1
Link to comment
Share on other sites

Classic mistake, this is exactly what happens when you update your routing table after freeing memory: dangling pointer references all over your BGP stack leading to kernel panic. They should be using a memory-safe language like Lua or Haskell.

Fortunately it's an easy fix, just run the latest terraform ansible playbook on the docker cluster, wipe the container registry, and push out the images. As long as there's no md5 collisions on the new pods, most self-healing serverless job queues should reinitialize in under a few minutes, and you should see stable herd cohesion in under an hour if you're provisioned correctly. If not, you can bypass the kernel by holding left alt and the f8 key while rebooting.

  • Like 1
Link to comment
Share on other sites

14 minutes ago, chaosmachine said:

Fortunately it's an easy fix, just run the latest terraform ansible playbook on the docker cluster, wipe the container registry, and push out the images. As long as there's no md5 collisions on the new pods, most self-healing serverless job queues should reinitialize in under a few minutes, and you should see stable herd cohesion in under an hour if you're provisioned correctly.

lord-of-the-rings-speak.gif

  • Like 3
  • Thanks 1
Link to comment
Share on other sites

3 hours ago, chaosmachine said:

Classic mistake, this is exactly what happens when you update your routing table after freeing memory: dangling pointer references all over your BGP stack leading to kernel panic. They should be using a memory-safe language like Lua or Haskell.

Fortunately it's an easy fix, just run the latest terraform ansible playbook on the docker cluster, wipe the container registry, and push out the images. As long as there's no md5 collisions on the new pods, most self-healing serverless job queues should reinitialize in under a few minutes, and you should see stable herd cohesion in under an hour if you're provisioned correctly. If not, you can bypass the kernel by holding left alt and the f8 key while rebooting.

 

Edited by EdamAnchorman
  • Like 1
  • Haha 2
Link to comment
Share on other sites

6 hours ago, chaosmachine said:

Classic mistake, this is exactly what happens when you update your routing table after freeing memory: dangling pointer references all over your BGP stack leading to kernel panic. They should be using a memory-safe language like Lua or Haskell.

Fortunately it's an easy fix, just run the latest terraform ansible playbook on the docker cluster, wipe the container registry, and push out the images. As long as there's no md5 collisions on the new pods, most self-healing serverless job queues should reinitialize in under a few minutes, and you should see stable herd cohesion in under an hour if you're provisioned correctly. If not, you can bypass the kernel by holding left alt and the f8 key while rebooting.

image.gif.41e555507dc92ed8c57dfb9e31561056.gif

“You fell victim to one of the classic blunders! The most famous of which is, ‘never get involved in a land war in Asia,’ the second is never update your routing table after freeing memory: dangling pointer references all over your BGP stack leading to kernel panic, but only slightly less well-known is this: ‘Never go in against a Sicilian when death is on the line!’”

Edited by Scaramouche
  • Haha 2
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.