Arguing with Linus Torvalds - Steven Rostedt

แชร์
ฝัง
  • เผยแพร่เมื่อ 10 ก.ย. 2024

ความคิดเห็น • 49

  • @peppigue
    @peppigue 3 ปีที่แล้ว +12

    Hardest stuff I've watched. Looking forward to coming back to it and understand more in six months or so.

    • @Adam01Time
      @Adam01Time ปีที่แล้ว

      Thumbs down do to the title of the video. Will block this user. This is a terrible title and clickbait good info on security, but the title is clickbait the video should be removed or re named

    • @user-te4eb2nw4w
      @user-te4eb2nw4w 11 หลายเดือนก่อน

      ​@@Adam01Time things of real value is our world is user value added NOT system value added.

  • @udaikumar1782
    @udaikumar1782 4 ปีที่แล้ว +12

    Very informative. Great insights into the hardware bugs' issues.

    • @Adam01Time
      @Adam01Time ปีที่แล้ว

      Thumbs down do to the title of the video. Will block this user.This is a terrible title and clickbait good info on security, but the title is clickbait the video should be removed or re named

  • @diodora2381
    @diodora2381 ปีที่แล้ว +7

    "You don't need to know that much, only a little bit about programming"; proceeds to talk about complex hardware security architecture and it's flaws that can lead to complex side channel attacks on the cache and shows x86 assembly (assembly being the hardests programming language to read in a short amount of time). Lol. I learned this shit in my graduate computer science systems classes. I know we see it as simple, but other people see it for the black magic it is.

  • @Stopinvadingmyhardware
    @Stopinvadingmyhardware 2 ปีที่แล้ว +1

    I solved it through a hardware platform revision. An addition to the ATX standard.

  • @carlosgarcialalicata
    @carlosgarcialalicata 3 ปีที่แล้ว +1

    How do they test this?

    • @Stopinvadingmyhardware
      @Stopinvadingmyhardware 2 ปีที่แล้ว

      Using labs, with attack machines and targets. Basically a server that attacks itself.

  • @Joe-nv6ge
    @Joe-nv6ge 2 ปีที่แล้ว +1

    Yeah let's play with new toys, and let the user go to hell.

  • @Joe3D
    @Joe3D 4 ปีที่แล้ว +7

    So Intel CPUs made Linux kernel less efficient. No wonder now Apple is going ARM.

    • @Drewitall54
      @Drewitall54 4 ปีที่แล้ว +4

      Good thing I go with AMD

    • @autohmae
      @autohmae 4 ปีที่แล้ว +5

      Spectre and Meltdown are both a whole series of different related vulnerabilities.
      They effected at least: Intel, AMD, ARM, MIPS, PowerPC.
      But not: RISC-V and not Intel Itanium. At least RISC-V does things in a similar way but not all the things needed to hit into the problem. But in theory new designs of chips could have been affected too. Obviously they know about these things now, so it will probably not happen.
      Different processors series/types/models of each architecture were affected in different ways.

    • @Drewitall54
      @Drewitall54 4 ปีที่แล้ว +1

      autohmae AMD wasn’t effected by meltdown, and was only effected by one Spector flaw

    • @autohmae
      @autohmae 4 ปีที่แล้ว +1

      @@Drewitall54 You were right, AMD wasn't effected by Meltdown, even though it did effect some other architectures as well.
      On AMD Spectre it was 2 variants, but 1 of them was supposedly "near zero risk of exploitation" and did get fixes just in case. So if it causes a slow down, you are effected anyway.

    • @broken1965
      @broken1965 4 ปีที่แล้ว

      Its x86 thats the proprietary blocks

  • @magicandmagik
    @magicandmagik 3 ปีที่แล้ว +3

    Poor Linus :(

  • @jean-baptistelasselle4562
    @jean-baptistelasselle4562 3 ปีที่แล้ว

    Just one question here: Are we talking of a hardware bug, which was fixed at the OS level ? The most interesting question to me is : Did it HAVE to be fixed at the OS level, and why ? Is the only reason is because hardware bugs cannot be patched (And should they not ? ).
    I mean If I find a bug in a software, I don't build another software on top of it to fix the bug. I just fix the bug in the original software.
    Yeah, only question I really am interested in here. The why. If anyone ahs any reference on any study which develops on the question, I am very much interested into those.

    • @TheRavenstrider
      @TheRavenstrider 3 ปีที่แล้ว +2

      The hardware bugs can be patched, as in: the way the hw works can be changed in subsequent products, but the fact is that you'll have all the machines built before the fix still be vulnerable to the exploit.
      In order to avoid (almost?) every x86 processor in the world becoming a security issue, you have to make a software workaround which fixes it.
      Sure, the hardware might perform a bit worse overall after the sw fix, but you don't have to bin (in some cases) millions of dollars of hardware to maintain data security/service uptime.
      This is my understanding of it... I might be wrong, though.
      Not the sharpest tool in the shed, me. XD

    • @samuelallanviolin752
      @samuelallanviolin752 3 ปีที่แล้ว +1

      The reason is actually very simple. While new devices can have the bug mitigated any existing devices will bear it and there is no way to "patch" hardware without providing new hardware

    • @axlslak
      @axlslak 2 ปีที่แล้ว +1

      Well, you can't fix physical things remotely.
      Meltdown/specter ARE bugs relating to hyperthreading. The actual cpu is bugged. Sometimes, when you run certain things, some programs can read data from other programs. By way of defective design of the cpu. The actual error is not in the software, but in the hardware of the machine. You run something that uses branch prediction and takes advantage of the way Intel designed hyperthreading and ooops... one unauthorized process can read data from a privileged/elevated process. Which shouldn't happen, but nobody designed for this.
      The way they suggested mitigating it is to disable hyperthreading. In other words, its unfixable. Other fixes include modifications at the OS level to NOT trust the cpu, which obviously increases the workload by about a quarter. I mean, its not like they can print you a new cpu. The worst part about it is that most modern intel cpus have been designed like this (meaning ALL), and will continue to suffer from this issue for prolly years to come. given that cpus are designed years in advance, and then you prepare the factory to make that cpu, and then you have to market it and sell it. So intel now has (or at least last year when i last checked) all but bugged cpus. Its a freaking disaster. To have to let the world know, the entire world is vulnerable. Its amazing Intel still exists...

    • @echoptic775
      @echoptic775 2 ปีที่แล้ว

      Tell me how will u patch millions of devices, plus i think that processors arent even ablw to be patched since theyre so delicate

    • @RobBCactive
      @RobBCactive 2 ปีที่แล้ว

      Sometimes CPU flaws actually can be patched by microcode updates, other times the OS kernel tries to mitigate it.
      Early Pentium's had the F00F fp bug found shortly after launch and Intel replaced them under a warranty recall program.
      Software is often used to cover flaws in hardware, I had some frustration when an IDE patch which fixed a regression by reverting to set a hardware register like the older driver had done was NAKed by the new maintainer as it conflicted with the device documentation (which must have been incorrect, the original maintainer complained regularly about such issues, all I could do was record my disatisfaction with the regression not being fixed).
      Intel would presumably have to replace the old CPUs to fix their bug properly, which probably could not be manufactured anymore due to changes to the manufacturing process and new CPUs wouldn't function in the old motherboards, with some soldered not even socketed.

  • @suhaylett
    @suhaylett ปีที่แล้ว

    Although clearly an experienced and talented core kernel developer, this talk is mostly self-congratulatory about being "right" about something, aimed to boost his own ego for that reason. The technical parts are rushed, convoluted and difficult to understand even for programmers, and not explained well. He is not giving the talk in the spirit of furthering learning, he is giving the talk to further his own ego while attacking Linus Torvalds for being "wrong" once. There is no right and wrong, only shades of grey. You would not see Linus first taking a selfie in front of a room of people while congratulating himself about his work being all over the Kernel. I would not enjoy working with him despite his skills. His is quite childish.

    • @goodmis2
      @goodmis2 ปีที่แล้ว +4

      I don't mind your critique, I just flew in from Lyon and had only 2 hours of sleep before giving this talk. I wasn't focused and gave a much better version of it at an Open Source Summit, but that wasn't recorded. I had a hard time focusing during the talk and was quite disappointed in my performance by the end of it, and was really just trying to get through it. My cracks at Linus was more for humor. If you took it as ego, I'm fine with that 😉

    • @goodmis2
      @goodmis2 ปีที่แล้ว +2

      This is a much better talk, where I was actually awake.
      th-cam.com/video/JRyrhsx-L5Y/w-d-xo.html

  • @sandsack123
    @sandsack123 2 ปีที่แล้ว +3

    Not exactly a well prepared talk. Too chaotic and actually too much speculation on the motivation of Linus ESPECIALLY since he is "targeted" in the title. 5th talk my a$$ why should anyone care. Bad is bad.

    • @goodmis2
      @goodmis2 3 วันที่ผ่านมา

      You're absolutely correct. I'm the speaker of this talk, and had just flew into Bulgaria that day and w🎉as extremely jet lagged. I had actually given this talk a few months earlier and it went really well. But the audience was different here and I tried to accommodate them on the fly. That didn't go very well and I consider this one of my worse performances. I'm rather embarrassed that this version of the talk is the one that was recorded.

  • @tw7522
    @tw7522 2 ปีที่แล้ว +4

    What a terrible talk. Chaotic, disorganised full of tangents and simply disengaging.

  • @Achrononmaster
    @Achrononmaster 2 ปีที่แล้ว

    Such a good talk with a build-up tension and resolution, but he never really said outright whether any one of the kernel devs just confronted Linus and said, "Hey, you are hanging onto solution 3/4 just because it deletes your 1991 code? Isn' that a bit egotistical?" Steven left me the impression no one offered this argument, they only suspected it and then only offered technical arguments.
    I rather suspect not, because my CPU speculates telling Torvalds he is being egotistical could be met with a blank stare and crickets! Like telling Mike Tyson he punches a bit too hard.

    • @jonaskoelker
      @jonaskoelker 2 ปีที่แล้ว

      I was thinking the same thing. If I was in the audience I would've asked something like "how much did you directly discuss Linus' motivations for preferring solution X over Y?"

  • @ChristopherGray00
    @ChristopherGray00 4 ปีที่แล้ว

    it's LINE-US not LEEN-IS

    • @alexdewar4018
      @alexdewar4018 4 ปีที่แล้ว +1

      Wikipedia would disagree: en.wikipedia.org/wiki/Linus_Torvalds

    • @ChristopherGray00
      @ChristopherGray00 4 ปีที่แล้ว

      @@alexdewar4018 There is incorrect information on wikipedia all the time bud.
      th-cam.com/video/5IfHm6R5le0/w-d-xo.html

    • @alexdewar4018
      @alexdewar4018 4 ปีที่แล้ว +10

      @@ChristopherGray00 I mean, you can listen to him pronouncing his own name here if you like: en.wikipedia.org/wiki/File:Linus-linux.ogg

    • @Ryan-xq3kl
      @Ryan-xq3kl 3 ปีที่แล้ว +6

      @@alexdewar4018 Christopher represents the average non-free distro fanboy, getting information wrong being proud of it then blaming it on wikipedia

    • @alkaupadhyay7650
      @alkaupadhyay7650 3 ปีที่แล้ว +1

      @@Ryan-xq3kl Welp, we cant blame him. Linus tech tips also pronounces his name like Læ-nus. So we can just help them whatsoever

  • @Adam01Time
    @Adam01Time ปีที่แล้ว

    Thumbs down do to the title of the video. Will block this user.This is a terrible title and clickbait good info on security, but the title is clickbait the video should be removed or re named

    • @seggsfault
      @seggsfault ปีที่แล้ว +2

      Dude it is the title of the talk. geez man did you expect linus to fight with him or something.

  • @ThunderAppeal
    @ThunderAppeal ปีที่แล้ว

    I want to have great respect for this guy.
    But rather than actually writing his own real time OS with a team of his own people.
    He is instead patching shyt linux.