LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 01-23-2018, 09:01 AM   #1
badbetty
Member
 
Registered: Jan 2014
Posts: 159

Rep: Reputation: Disabled
Linus tells it like it is... for my confession, I am totally 'lost' on the Spectre/Meltdown shambles


https://techcrunch.com/2018/01/22/li...utter-garbage/


Apologies for an off-site link, but it was the first i came across when trying to figure out just what this Spectre/Meltdown means to my old machines running Slackware (its all I really use - other than an android phone) and what it affects and what I can do.

I'm taking the line of c'est la vie at the moment until the 'community' gathers itself with something I can easily follow :-) (tired mind and all).

There is a lot opinion out there that's for sure.
 
Old 01-23-2018, 09:11 AM   #2
montagdude
Senior Member
 
Registered: Apr 2016
Distribution: Slackware
Posts: 2,011

Rep: Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619
Honestly, Linus is such a drama queen that it's hard for me to take his over-the-top criticisms seriously. I'm sure there is some level of truth to them, but I don't know what that level is.
 
Old 01-23-2018, 09:56 AM   #3
coldbeer
Member
 
Registered: May 2006
Location: Orion–Cygnus Arm, MWG
Distribution: Slackware, Ubuntu
Posts: 249

Rep: Reputation: 130Reputation: 130
Quote:
Originally Posted by montagdude View Post
Honestly, Linus is such a drama queen...
Sometimes it is just necessary to blast companies especially when they dropped the ball in such an incompetent way.


Lt. Col. Charles R. Codman: "You know General, sometimes the men don't know when you're acting."

General Patton: "It's not important for them to know. It's only important for me to know."


Cheers

P.S. For us in the peanut gallery...

http://lkml.iu.edu/hypermail/linux/k...1.2/05282.html

Last edited by coldbeer; 01-23-2018 at 10:19 AM.
 
2 members found this post helpful.
Old 01-23-2018, 10:28 AM   #4
orbea
Senior Member
 
Registered: Feb 2015
Distribution: Slackware64-current
Posts: 1,950

Rep: Reputation: Disabled
Quote:
Originally Posted by montagdude View Post
Honestly, Linus is such a drama queen that it's hard for me to take his over-the-top criticisms seriously. I'm sure there is some level of truth to them, but I don't know what that level is.
I rather appreciate that he doesn't hold back and says what he means. That level of honesty is far too rare.
 
18 members found this post helpful.
Old 01-23-2018, 11:03 AM   #5
Ilgar
Senior Member
 
Registered: Jan 2005
Location: Istanbul, Turkey
Distribution: Slackware64 15.0, Slackwarearm 14.2
Posts: 1,157

Rep: Reputation: 237Reputation: 237Reputation: 237
I went over a few messages in that thread. There was a small misunderstanding on Linus's part in the beginning, contributing to his anger, but there now seems to be an agreement that the patches proposed by Linux developers would be vastly superior to those of Intel's, and that Intel does not seem to handle this issue as responsibly as it should.

Then of course from far away one can also hear the rant by grsecurity, claiming that the Linux patches are flawed as well (... and that basically they are the only ones to have developed (long ago) the correct code to mitigate these attacks...).
 
3 members found this post helpful.
Old 01-23-2018, 11:20 AM   #6
orbea
Senior Member
 
Registered: Feb 2015
Distribution: Slackware64-current
Posts: 1,950

Rep: Reputation: Disabled
The biggest warning against intel is that they sold their latest cpu generation which is affected while fully knowing this. Really the only good solution is that intel releases all their hardware specs from the last 20 years into the public domain so that they can be properly audited.

The grsecurity rant is also self sabotaged by the fact that they don't publicly share their code. If they want people to take them seriously they should show us what they have...
 
6 members found this post helpful.
Old 01-23-2018, 11:56 AM   #7
bassmadrigal
LQ Guru
 
Registered: Nov 2003
Location: West Jordan, UT, USA
Distribution: Slackware
Posts: 8,792

Rep: Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656
Quote:
Originally Posted by orbea View Post
I rather appreciate that he doesn't hold back and says what he means. That level of honesty is far too rare.
I totally agree. And it's not like he is blasting newbs who don't know better. He is blasting seasoned developers who have done substantial work with the kernel and really should know better... especially when it is coming from the company who designed everything (and not some reverse engineered code).

Quote:
Originally Posted by orbea View Post
The biggest warning against intel is that they sold their latest cpu generation which is affected while fully knowing this.
From my (albiet limited) understanding of this, it isn't something simple to fix. It will take a redesign of their CPUs. So it is likely that the next few generations, which are already being developed and might be too far along to easily fix, will continue to be affected by this. Intel might've created a far worse PR incident had they delayed selling Coffee Lake processors until they were ready to announce the vulnerabilities.

For example, AMD started working on the "Zen" architecture back in something like August of 2012 and didn't have a release until January 2017, taking 4.5 years for development. It could still be 3-4 years until we CPUs that are no longer affected by these vulnerabilities.
 
2 members found this post helpful.
Old 01-23-2018, 11:56 AM   #8
montagdude
Senior Member
 
Registered: Apr 2016
Distribution: Slackware
Posts: 2,011

Rep: Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619Reputation: 1619
Quote:
Originally Posted by orbea View Post
I rather appreciate that he doesn't hold back and says what he means. That level of honesty is far too rare.
Don't get me wrong, I like that as well. I'm just not sure how much of what he says is objectively true vs exaggeration. I would prefer a more cool-headed explanation of the issue, but of course, I am not the intended audience.

Last edited by montagdude; 01-23-2018 at 11:58 AM.
 
Old 01-23-2018, 11:58 AM   #9
Ilgar
Senior Member
 
Registered: Jan 2005
Location: Istanbul, Turkey
Distribution: Slackware64 15.0, Slackwarearm 14.2
Posts: 1,157

Rep: Reputation: 237Reputation: 237Reputation: 237
Quote:
Originally Posted by orbea View Post
The grsecurity rant is also self sabotaged by the fact that they don't publicly share their code. If they want people to take them seriously they should show us what they have...
I don't know if they share the code with their customers (even if they don't, their kernels can be tested against the attacks to see if they are resistant). There could be some self-advertising there, but they certainly have some reputation in those circles, perhaps some attitude problems as well (like Linus himself ).
 
Old 01-23-2018, 12:10 PM   #10
BratPit
Member
 
Registered: Jan 2011
Posts: 250

Rep: Reputation: 100Reputation: 100
Quote:
Originally Posted by Ilgar View Post
Then of course from far away one can also hear the rant by grsecurity, claiming that the Linux patches are flawed as well (... and that basically they are the only ones to have developed (long ago) the correct code to mitigate these attacks...).
Only meltdown not spectre.
Proof
https://www.linuxquestions.org/quest...ml#post5808674


Quote:
Originally Posted by orbea View Post

The grsecurity rant is also self sabotaged by the fact that they don't publicly share their code.
MAybe but the fact is they do it publicly for 20 years /Sadly this is the end./and they were exposed to the criticism of the Linus who is not an expert about security at all.
Ironically.
This did not prevent the kernel maintainers to copy and paste /instead of creating a better than criticized one, the only reason was that it was effective/ part of the code and giving "kosher certificate" by Linus .

Last edited by BratPit; 01-23-2018 at 12:19 PM.
 
Old 01-23-2018, 12:20 PM   #11
Ilgar
Senior Member
 
Registered: Jan 2005
Location: Istanbul, Turkey
Distribution: Slackware64 15.0, Slackwarearm 14.2
Posts: 1,157

Rep: Reputation: 237Reputation: 237Reputation: 237
Quote:
Originally Posted by BratPit View Post
The link you provide has information that the grsec kernel is resistant to Meltdown. But I couldn't see where it is *proven* that their kernel is vulnerable to Spectre. The claims I referred to were from their Twitter posts (iirc). But I can't claim that I read every bit of their statements very carefully.
 
Old 01-23-2018, 12:56 PM   #12
BratPit
Member
 
Registered: Jan 2011
Posts: 250

Rep: Reputation: 100Reputation: 100
Quote:
Originally Posted by Ilgar View Post
But I couldn't see where it is *proven* that their kernel is vulnerable to Spectre. The claims I referred to were from their Twitter posts (iirc). But I can't claim that I read every bit of their statements very carefully.
I said not spectre.

This PoC works on 4.9.25-grsec.

https://github.com/crozone/SpectrePoC

Maybe new closed source prevent from it but I do not know.
I am not beneficient of their paid patch.
 
Old 01-23-2018, 02:18 PM   #13
orbea
Senior Member
 
Registered: Feb 2015
Distribution: Slackware64-current
Posts: 1,950

Rep: Reputation: Disabled
Quote:
Originally Posted by bassmadrigal View Post
From my (albiet limited) understanding of this, it isn't something simple to fix. It will take a redesign of their CPUs. So it is likely that the next few generations, which are already being developed and might be too far along to easily fix, will continue to be affected by this. Intel might've created a far worse PR incident had they delayed selling Coffee Lake processors until they were ready to announce the vulnerabilities.
I get that it may not be necessarily easy, but the bottom line is that they knew about the vulnerabilities and continued selling faulty products to uninformed customers. Personally that really does not sit well with me and if they're willing to abuse trust so easily I wonder what else they haven't told us yet?
 
1 members found this post helpful.
Old 01-23-2018, 02:45 PM   #14
bassmadrigal
LQ Guru
 
Registered: Nov 2003
Location: West Jordan, UT, USA
Distribution: Slackware
Posts: 8,792

Rep: Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656
Quote:
Originally Posted by orbea View Post
I get that it may not be necessarily easy, but the bottom line is that they knew about the vulnerabilities and continued selling faulty products to uninformed customers. Personally that really does not sit well with me and if they're willing to abuse trust so easily I wonder what else they haven't told us yet?
I mean, in that aspect, all CPU manufacturers that have vulnerable products are in the same boat since they were notified of these vulnerabilities back in June and continued selling their products without notifying the public...
 
Old 01-23-2018, 02:50 PM   #15
orbea
Senior Member
 
Registered: Feb 2015
Distribution: Slackware64-current
Posts: 1,950

Rep: Reputation: Disabled
Yes, you're right about that, but I've also been told that amd is only vulnerable to spectre because they followed intel's spec out of compatibility? I did not try to verify if this was true.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Spectre and Meltdown: Explanation, Info, What's being done, What can be done Zyblin Linux - Security 7 02-17-2018 09:48 PM
LXer: Spectre and Meltdown: Linux creator Linus Torvalds criticises Intel's 'garbage' patches LXer Syndicated Linux News 0 01-23-2018 05:42 AM
Vulnerabilities such as Meltdown and Spectre caseyl Linux - Security 7 01-22-2018 09:14 PM
Meltdown and Spectre ots3go Solaris / OpenSolaris 1 01-10-2018 04:15 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 03:23 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration