Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
GNU is Not Unix Graphics Open Source Operating Systems Upgrades Linux

Linux 4.3 Released As Stable; Improves On Open-Source Graphics, SMP Performance (lkml.org) 73

An anonymous reader writes: The Linux 4.3 kernel was released as stable today. The Linux 4.3 kernel brings Intel Skylake support, reworked NVIDIA open-source graphics support, and many other changes with the code count hitting 20.6 million lines of code.
This discussion has been archived. No new comments can be posted.

Linux 4.3 Released As Stable; Improves On Open-Source Graphics, SMP Performance

Comments Filter:
  • If I upgrade to this kernel, how many of those lines of code do I actually have to trust not to give away everything on my machine to a black hat? Hopefully less than 100k lines of code are actually critical.

    • by zenlessyank ( 748553 ) on Sunday November 01, 2015 @09:23PM (#50844661)
      You have 11 choices. You can either 'Learn' the code, or you can 'Trust' the code, and lastly you can 'Not Use' the code.
    • by guruevi ( 827432 )

      Most of them are related to drivers for a host of peripherals as well as other architectures and features your computer may not even have. So most code is largely untouched.

      Here is a neat comparison: http://www.informationisbeauti... [informatio...utiful.net]

    • by smittyoneeach ( 243267 ) * on Sunday November 01, 2015 @09:33PM (#50844709) Homepage Journal
      Hey, don't forget the microcode on the chip. Or, rather, do forget it. "They" insist.
    • by Kjella ( 173770 )

      If I upgrade to this kernel, how many of those lines of code do I actually have to trust not to give away everything on my machine to a black hat? Hopefully less than 100k lines of code are actually critical.

      Depends on your threat model. If your "black hat" can plug malicious devices into your machine quite many but then your security is probably badly compromised anyway. If he's within wireless range then a few stacks like Bluetooth, WiFi, WiDi etc. if you have them enabled, but if that's a realistic fear I'd simply use wired accessories. If he's got a local user there might be many vectors for an escalation attack, but then he's already got a foot in the door. For packets coming down the wire from the Interne

    • by Anonymous Coward

      There's no way to quantitatively measure that. But I do know that between the 3 major monolithic kernels, it's in the top two in trust and competently-written code.

    • You have to assume it's compromised.

    • by ledow ( 319597 )

      All of the lines that you use.

      Same as ANY OTHER OPERATING SYSTEM OR APPLICATION.

      Were you expecting a different answer?

      And have you EVER inspected the code to any program fully enough to satisfy your curiosity that it doesn't do anything you don't trust? If so, are you aware of the Obfuscated C contests?

      Sorry, but for even a skilled coder, there is NO WAY you can audit this amount of code single-handedly and you have to take it on trust. Same as everything else.

      Even the TrueCrypt audit didn't catch all the

  • with the code count hitting 20.6 million lines of code

    Linux' technical capabilities are all well and good but we'll know that it's truly surpassed Windows when it can claim just as many (if not more) lines of code...

    I kid, I kid!

Some people manage by the book, even though they don't know who wrote the book or even what book.

Working...