LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 01-23-2018, 03:05 PM   #16
Darth Vader
Senior Member
 
Registered: May 2008
Location: Romania
Distribution: DARKSTAR Linux 2008.1
Posts: 2,727

Rep: Reputation: 1247Reputation: 1247Reputation: 1247Reputation: 1247Reputation: 1247Reputation: 1247Reputation: 1247Reputation: 1247Reputation: 1247

When you buy an ARM processor, you expect to buy an ARM processor and you buy an ARM processor for real.
When you buy a MIPS processor, you expect to buy a MIPS processor and you buy a MIPS processor for real.
When you buy a modern x86 processor, you expect to buy an x86 processor, BUT you buy a RISC processor for real, with a shiny hardware emulation of the x86 platform.

This weekend I participated to a conference, and one of the speakers presented his opinion that any modern x86 CPU is terrible wrong by design and "they" sell us sh*t since 20 years ago.

You know what should be "a modern x86 CPU" for real, as the hardware engineers agree in private?

Imagine the flagship being something containing 4096 cores of a 64-bit enabled i586, running somewhere at 2GHz.

Last edited by Darth Vader; 01-23-2018 at 03:15 PM.
 
Old 01-23-2018, 03:18 PM   #17
slac-in-the-box
Member
 
Registered: Mar 2010
Location: oregon
Distribution: slackware64-15.0 / slarm64-current
Posts: 780
Blog Entries: 1

Rep: Reputation: 432Reputation: 432Reputation: 432Reputation: 432Reputation: 432
Is Spectre a Physical or Network Exploit?

Do Spectre or Meltdown require physical access to a device in order to exploit it? In this case, I wouldn't worry much, as I have a vicious guard wife. Or, are there ways of using these exploits over a network--definitely more cause for alarm.

It seems that network exploits are conceivable:
Quote:
While network-based attacks are conceivable, situations
where an attacker can run code on the same CPU as
the victim pose the primary risk.
--on page 12 of https://spectreattack.com/spectre.pdf

Guess its time to go back to locked filing cabinet with attack wife...
 
Old 01-23-2018, 03:30 PM   #18
Darth Vader
Senior Member
 
Registered: May 2008
Location: Romania
Distribution: DARKSTAR Linux 2008.1
Posts: 2,727

Rep: Reputation: 1247Reputation: 1247Reputation: 1247Reputation: 1247Reputation: 1247Reputation: 1247Reputation: 1247Reputation: 1247Reputation: 1247
Let's put straight: it is about anything which can be loaded/downloaded from a remote, then executed in your own computer.

Not limited to, but mainly that could be some javascript from a malicious website, some "innocent" browser extension, or even the usual suspect: a vicious Flash.

BTW, Meltdown is also named with affection: root-o-matic via browser.

Last edited by Darth Vader; 01-23-2018 at 03:35 PM.
 
1 members found this post helpful.
Old 01-23-2018, 03:35 PM   #19
bassmadrigal
LQ Guru
 
Registered: Nov 2003
Location: West Jordan, UT, USA
Distribution: Slackware
Posts: 8,792

Rep: Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656
Quote:
Originally Posted by orbea View Post
Yes, you're right about that, but I've also been told that amd is only vulnerable to spectre because they followed intel's spec out of compatibility? I did not try to verify if this was true.
That is true, but AMD was still notified of the Spectre vulnerability back in June, so they've been selling affected products since then without notifying the public. Intel has done the same, but they're affected by both Spectre and Meltdown.
 
1 members found this post helpful.
Old 01-23-2018, 04:57 PM   #20
OldHolborn
Member
 
Registered: Jul 2012
Posts: 229

Rep: Reputation: 190Reputation: 190
From my interpretation of it Linus is quite right to be annoyed.

*car analogy*

Intel want to continue shipping cars with known safety problems, there are fixes, traction control, electronic stability control, anti-lock brakes etc etc.

But switching all those on would mean their cars would no longer be the fastest in the land and fuel economy would suffer too.

Their solution is to ship the cars with all that switched off and ask you instead, if you care about your safety, remember to press that green button when you start your car.

*/car analogy*

What court in any land would hold that that is a responsible approach?

Safety defaulting to on is simple common sense

Intel appear to be trying to shift the responsibility for the performance impact onto the OS.

Slow computer? Blame Linux/Microsoft/Apple
 
5 members found this post helpful.
Old 01-23-2018, 06:19 PM   #21
orbea
Senior Member
 
Registered: Feb 2015
Distribution: Slackware64-current
Posts: 1,950

Rep: Reputation: Disabled
Quote:
Originally Posted by bassmadrigal View Post
That is true, but AMD was still notified of the Spectre vulnerability back in June, so they've been selling affected products since then without notifying the public. Intel has done the same, but they're affected by both Spectre and Meltdown.
Agreed, there is lot to be disappointed with how this was handled by hardware companies. Again, I think the specs should be made public domain to help mitigate this from happening again. The more people that can view them the more likely issues can be found and solved, I do not trust the hardware companies to inform the public of their shortcomings.
 
Old 01-23-2018, 06:23 PM   #22
keefaz
LQ Guru
 
Registered: Mar 2004
Distribution: Slackware
Posts: 6,552

Rep: Reputation: 872Reputation: 872Reputation: 872Reputation: 872Reputation: 872Reputation: 872Reputation: 872
Quote:
Originally Posted by OldHolborn View Post

What court in any land would hold that that is a responsible approach?
Responsible? Intel CEO sold all stocks he could as soon as the bugs were acknowledged, I mean what's this company?
 
Old 01-23-2018, 06:58 PM   #23
ChuangTzu
Senior Member
 
Registered: May 2015
Location: Where ever needed
Distribution: Slackware/Salix while testing others
Posts: 1,718

Rep: Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857
not to be too tin foil hat about this, but I oddly remember something about 4 years ago or so about chip makers putting backdoors in compliments of three letter US agencies....perhaps just perhaps this was done for that reason or perhaps they have so many intentional holes that this is just one of many....

PS: I also appreciate Linus' candour and honesty.

Ref:
https://techgage.com/news/amd-and-in...ps-nsa-inside/
https://forums.evga.com/NSA-could-ha...-m1989153.aspx
 
1 members found this post helpful.
Old 01-23-2018, 07:04 PM   #24
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,982

Rep: Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625
I'll have to point this out.
I think that anyone with such high level skill in kernel should have seen this problem long ago. Willing to bet he in fact wrote code on this issue as part of a feature.
 
2 members found this post helpful.
Old 01-24-2018, 01:57 PM   #25
ChuangTzu
Senior Member
 
Registered: May 2015
Location: Where ever needed
Distribution: Slackware/Salix while testing others
Posts: 1,718

Rep: Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857Reputation: 1857
Quote:
Originally Posted by jefro View Post
I'll have to point this out.
I think that anyone with such high level skill in kernel should have seen this problem long ago. Willing to bet he in fact wrote code on this issue as part of a feature.
you really think its a case of CYOA (for non military "cover your own a*s")?
 
Old 01-24-2018, 11:50 PM   #26
RadicalDreamer
Senior Member
 
Registered: Jul 2016
Location: USA
Distribution: Slackware64-Current
Posts: 1,816

Rep: Reputation: 981Reputation: 981Reputation: 981Reputation: 981Reputation: 981Reputation: 981Reputation: 981Reputation: 981
I think computers are inherently insecure, software has imperfections, and so these things should not be given features and put into places where they aren't necessarily needed: https://www.forbes.com/sites/andygre.../#136a3496228c

As for the places that are needed, I think its time for open source hardware!
 
Old 01-25-2018, 01:28 AM   #27
chrisretusn
Senior Member
 
Registered: Dec 2005
Location: Philippines
Distribution: Slackware64-current
Posts: 2,969

Rep: Reputation: 1548Reputation: 1548Reputation: 1548Reputation: 1548Reputation: 1548Reputation: 1548Reputation: 1548Reputation: 1548Reputation: 1548Reputation: 1548Reputation: 1548
Definitely not an expert. I tend to side with Linus Torvalds, he is an expert. His non PC "the patches are COMPLETE AND UTTER GARBAGE" resinates with me. To the point, I like that. I think this Spectre/Meltdown mess is a lot of gloom and doom posturing.

There have been many gloom and doom events over the past few years, not a single one of them has affected me. So I'm not about to hit the panic button. In fact I am quite amused over the hub-a-bub over this. I will upgrade my kernel as I always do, but I am in no rush to buy new gear. Heck, I still have a P4 machine running Widows XP I am not loosing sleep over this and I simply trust Patrick Volkerding and Linux Torvaids to do the right things. If the right things require new gear, well I guess I just live with that fact. I seriously doubt I will be affected by this latest threat anyway.


Last edited by chrisretusn; 01-26-2018 at 04:37 AM. Reason: Can't spell, double words
 
1 members found this post helpful.
Old 01-25-2018, 03:12 AM   #28
hua
Member
 
Registered: Oct 2006
Location: Slovak Republic
Distribution: Slackware 14.2, current
Posts: 461

Rep: Reputation: 78
Quote:
Originally Posted by keefaz View Post
Responsible? Intel CEO sold all stocks he could as soon as the bugs were acknowledged, I mean what's this company?
Actually, this should be illegal. Should be classified as "insider trading" ...

Last edited by hua; 01-25-2018 at 03:14 AM.
 
2 members found this post helpful.
Old 01-25-2018, 04:10 AM   #29
FlinchX
Member
 
Registered: Nov 2017
Distribution: Slackware Linux
Posts: 666

Rep: Reputation: Disabled
Quote:
Originally Posted by keefaz View Post
Intel CEO sold all stocks he could as soon as the bugs were acknowledged?
I was happy to see that documented on Wikipedia.
 
Old 01-25-2018, 10:13 AM   #30
cwizardone
LQ Veteran
 
Registered: Feb 2007
Distribution: Slackware64-current with "True Multilib" and KDE4Town.
Posts: 9,097

Rep: Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275
Quote:
Originally Posted by hua View Post
Actually, this should be illegal. Should be classified as "insider trading" ...
It is illegal. No doubt about it. If he isn't prosecuted it is because the system has become completely corrupted. Look at what happened to the bankers responsible for the 2007/8 financial disaster, nothing.
 
2 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Spectre and Meltdown: Explanation, Info, What's being done, What can be done Zyblin Linux - Security 7 02-17-2018 09:48 PM
LXer: Spectre and Meltdown: Linux creator Linus Torvalds criticises Intel's 'garbage' patches LXer Syndicated Linux News 0 01-23-2018 05:42 AM
Vulnerabilities such as Meltdown and Spectre caseyl Linux - Security 7 01-22-2018 09:14 PM
Meltdown and Spectre ots3go Solaris / OpenSolaris 1 01-10-2018 04:15 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 10:03 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration