228
submitted 2 months ago by neme@lemm.ee to c/linux@programming.dev
you are viewing a single comment's thread
view the rest of the comments
[-] P4ulin_Kbana@lemmy.eco.br 13 points 2 months ago

Could someone please explain to a non-tech expert?

[-] teawrecks@sopuli.xyz 95 points 2 months ago

In the last 10 years there has been a seemingly noteworthy uptick in hardware bugs in both intel and amd CPUs. Security researchers find and figure out potential attack vectors that rely on these bugs (ex. Specter/Meltdown). Then operating systems have to put workarounds in their kernel code to ensure that these hypothetical attack vectors are accounted for, at the cost of performance and more complicated code.

Linus is saying how annoyed he is with all this extra work they have to do, resulting in worse performance, all to plug vulnerabilities that we've never actually seen any real attackers use. He's saying instead we should just write the code how it should be, and if the hardware is insecure, let it be the hardware company's problem when customers don't use the hardware.

The problem is, customers will continue to use the hardware and companies who need a secure OS (all of them) will opt to not use Linux if it doesn't plug these holes.

[-] ikidd@lemmy.world 3 points 2 months ago

Plus a lot of these bugs don't get fixed, because they exist to allow the processors to "look ahead" for improved performance, at least on unmitigated benchmark tests.

[-] Kissaki@programming.dev 2 points 2 months ago

we should just write the code how it should be

Notably, that's not what he says. He didn't say in general. He said "for once, [after this already long discussion], let's push back here". (Literally "this time we push back")

who need a secure OS (all of them) will opt to not use Linux if it doesn’t plug these holes

I'm not so sure about that. He's making a fair assessment. These are very intricate attack vectors. Security assessment is risk assessment either way. Whether you're weighing a significant performance loss against low risk potentially high impact attack vectors or assess the risk directly doesn't make that much of a difference.

These are so intricate and unlikely to occur, with other firmware patches in line, or alternative hardware, that there's alternative options and acceptable risk.

[-] FizzyOrange@programming.dev 7 points 2 months ago

This is about Spectre, not about buggy hardware implementations.

Spectre is a fundamental flaw in speculative execution that means it can leak information, so it's a security vulnerability. Apparently Intel has been imposing draconian requirements on software to work around the issue rather than fixing it in hardware, which is obviously what they should do, but is not at all trivial.

[-] rain_worl@lemmy.world -4 points 2 months ago

hardware is like your computer, stuff like the cpu and ram. software is like the programs on that computer. linus torvalds makes a program that has to deal with the details of the computer (the linux kernel). as such, they have to work around problems in the hardware.

[-] wulrus@lemmy.world 8 points 2 months ago

Thanks for the unappreciated ELI2

[-] rain_worl@lemmy.world 4 points 2 months ago
[-] elbarto777@lemmy.world 4 points 2 months ago

I'm a graybeard software engineer with 30+ years of experience.

I appreciated your explanation.

[-] wulrus@lemmy.world 3 points 2 months ago

Me too; it's BECAUSE I'm so old that I appreciate a general rooting what this is all about.

this post was submitted on 22 Oct 2024
228 points (100.0% liked)

Linux

5511 readers
200 users here now

A community for everything relating to the linux operating system

Also check out !linux_memes@programming.dev

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS