Hacker Newsnew | past | comments | ask | show | jobs | submit | f001's commentslogin

My tv has never nor will ever touch the internet so problem solved re: updates.

I believe it. After playing the game crackdown for a week or so, I started to constantly map out how to get up the outside of apartment buildings near me. Mirrors edge had a similar effect on me too.


Additionally, it’s usually more effort to refute something than to state something, especially as it seems there is little requirement for proof when making the statement.


Very much depends on the style of motorcycle. Sitting on my dual-sport BMW F650GS[1] I can see well over sedans on the road and this is with a slightly lowered version of it.

[1]https://en.wikipedia.org/wiki/BMW_G650GS


Steering position has been taught as 9 and 3 for a long time now… but still fair point. You can add a bit of alcantara to the seat to help you stay in place though. My RDX has it for the sporty-ish trim and it helps.


It’s never 9 and 3 in a turn though is it. It’s more like 8 and 1. Or just 1.


It's actually more like 8 and 4 or even 7 and 5 to keep your hands and arms out of the way of the airbag


And then your problem is oversteering which puts you into oncoming traffic.


Or live somewhere with no weather and moderate temperatures so no need for any of them minus the turn signals. It’s my pet theory of why tesla’s auto wiper setting is so bad: they’re located somewhere without rain/snow or without varying amounts of rain/snow.


How many more excuses for an incomplete vehicle can we make for this company?

Lucid, Rivian, Honda, Toyota, Nissan, Mazda, Hyundai/Kia, Mercedes Benz, Volkswagen, and BMW all have design studios in California. They don’t all have this problem.

Do we really think that Tesla engineers and product managers have never seen rain or snow before? And if so what kind of lame excuse is that?

Aren’t some of Tesla’s biggest markets in cold weather climates? Places like Canada, New England, Scandinavia, Germany, and China (Beijing).


If I were to guess it would be the latter. We seem to be heading for it rather quickly at least.


For the PHEVs yes they are battery constrained. They have great products and a ton of demand and difficulty keeping up manufacturing due to limited batteries.

For their EV, they have yet to make something that is competitive. Their EV is slow to charge, slow to accelerate, somewhat short in range, and quite expensive before they started adding—-in some cases five figure—-incentives to move them. It even had a recall for the wheels coming off.


I can tell you they’re quite unhappy about it. Have a friend working there who frustratedly says it wasn’t their fault every-time it comes up. Which is quite often and at every social occasion since.


I noticed this at work and in some other contexts last week. We weren't affected by this, but most of the people that brought this up, even technical people (other fields, not security or OS or anything like that), think that this was a Microsoft and Windows issue. they all seem surprised to hear that Microsoft wasn't the root cause of this, and they all seem surprised, because no one knows or understands what Crowdstrike is or does.


but it's kind of their fault? they designed the api that way, they decided what can be done in userland and what must be done via kernel. they at least _allowed_ it to happen every time.


> they designed the api that way, they decided what can be done in userland and what must be done via kernel

They didn’t have much of a choice - it is very hard to get adequate performance with real-time filesystem filtering without doing it in kernel mode. Not aware of any other mainstream OS which succeeds at that.

And they kind of had to provide this feature, since they’ve supported it since forever (antivirus vendors were already doing it back in the days of MS-DOS and Windows 3.x/9x/Me), and there is a lot of market demand for it. It is easy for Linux to say “no” when it never has had support for it (in official kernels)

But, as the blog post points out, it sounds like CrowdStrike is doing a lot of stuff in kernel mode that could be done in user mode instead - whether due to laziness or lack of investment or lack of sophistication of their product architects

> they at least _allowed_ it to happen every time

Microsoft, in allowing third party code to be loaded into their kernel, is no different from other major OS kernels, such as Linux or Apple XNU.

Apple is (increasingly) the most restrictive about this, and a lot of people criticise them for it.

Even Linux imposes some restrictions-which kernel symbols to export (at all or as GPL-only)—although of course being open source, you can circumvent all restrictions by changing the code and recompiling


Mac and Linux run EDRs in userspace without an issue. No one here has an excuse or no choice.


Can you re-read the list (source Wikipedia) in one of the comments in the tree? It had Debian And RedHat issues listed on different dates.


Linux these days tends to use eBPF which isn't really in userspace per-se.


eBPF is like the Twilight Zone. I'm in kernel space but, I'm not.


Well they crowdstrike crashed a kernel with it


Apparently that wasn't (entirely) CrowdStrike's fault: https://news.ycombinator.com/item?id=41030352

Whereas this Windows outage rather obviously was.

eBPF being able to crash the kernel is usually sign of a kernel bug. And it sounds like in this case it was even a bug specific to Red Hat kernels, introduced by a Red Hat patch.

That said, even if they are triggering a Red Hat kernel bug, CrowdStrike should be testing their software adequately enough to pick up that issue before customers do – and it sounds like they haven't been


That was more of a kernel bug than a crowdstrike bug. However, it's clear that they are pushing what you can do in kernel space to the limits, which is not a great sign.


Isn't being able to crash anything with eBPF is a bug in either kernel or eBPF? As I understand it's supposed to prevent exactly that.


eBPF is Linux denying the fact that it's turning into a microkernel and that Linus was wrong.


If you're right for 30 years in tech you're right, even if things eventually change.


The famous Tannenbaum-Torvalds debate happened all the way back in 1992. At the time, the most common microkernel was Mach, which had significant performance problems. NeXT/Apple solved them by transforming Mach into a monolithic kernel, making Mach (as XNU) one of the most popular kernels in the world today (powering iPhones, iPads, Macs, etc). But that doesn’t help Tannenbaum‘s side of the argument. And I don’t believe his own Minix did much better than Mach did.

Whereas, from what I hear, L4 and its derivatives have solved this problem in a way that Mach/Minix/etc could not. Yet still, it makes me wonder, if L4 has really solved it, why aren’t we all running L4? L4 has had some success in embedded applications (such as mobile basebands, Apple Secure Enclave); but as a general purpose operating system has never really taken off.


from what I understand a huge number of computers run Minix, but only in the Intel Management Engine


An application in which something like slow file IO wouldn’t be a problem - does it even have a filesystem? And we don’t know whether Intel has done things to make it an “impure” microkernel, like what NeXT/Apple did to XNU, or Microsoft did with win32k.sys


When a parking valet takes a car on a joy ride and crashes into a tree, we could blame the tree. We could blame the car owner for handing over the key. We could blame the auto manufacturer that didn't provide a "valet mode". We could blame the police for not detecting the joy ride before the crash.

All of these parties could do better (stupid tree!). But the real problem is the valet.

We can say that it is obvious that the electronics-heavy cars of today should anticipate rogue valets and build in protections. But we shouldn't let rogue valets off the hook for damages.

As a consumer, you could choose to only purchase cars that have "valet mode". So should we blame consumers who don't? If so, we should blame the airlines, hospitals, etc.--not Microsoft.

How about we prosecute valets unless they refuse to park cars that don't have "valet mode"?


> All of these parties could do better (stupid tree!). But the real problem is the valet.

No, the operating system is supposed to provide secure access to hardware and isolate independent subsystems so they can't interfere with each other. That's its whole purpose for existing. The fact that people feel they need to deploy CS is a Microsoft failure. Windows is just not a secure OS.


> The fact that people feel they need to deploy CS is a Microsoft failure

They don't need to deploy shit. Only reason it's deployed because it's a whole racket.


You’re shifting practically the entirety of the blame to a company that at best was an accomplice to the issue.

I get that you hate Microsoft, but not everything is their fault and it’s disingenuous to pretend otherwise.

> ing. The fact that people feel they need to deploy CS is a Microsoft failure.

CS is also available and widely deployed on Mac and Linux. Is that a failure of Apple and all the distros? It literally took down Debian and Red Hat systems earlier this year, is that also not CS’s fault?


> I get that you hate Microsoft,

I don't.

> CS is also available and widely deployed on Mac and Linux. Is that a failure of Apple and all the distros

Yes. All widely deployed commodity operating systems have terrible security designs. None of them have access control systems that enable the principle least privilege, let alone encourage or prioritize it, and none of them are written in robust languages that make verification of safety or security properties possible. Microsoft has made some headway on partial verification, but it's a far cry from what's needed.


> Yes. All widely deployed commodity operating systems have terrible security designs. None of them have access control systems that enable the principle least privilege, let alone encourage or prioritize it, and none of them are written in robust languages that make verification of safety or security properties possible. Microsoft has made some headway on partial verification, but it's a far cry from what's needed.

What, exactly, is your solution then? To never use a computer again? Because that's certainly what it sounds like.


Secure, robust operating system designs have been known since the 1970s. KeyKOS, EROS, CapROS. All commodity systems instead use classic access control lists, subject to fundamentally unsolvable access control vulnerabilities. seL4 finally implemented those lessons but it's far from a commodity operating system.


Can you point to an OS that can actually be used as a general-purpose OS? Or are you going to tell us that trying to run a web browser is actually what is fundamentally wrong with technology these days?


Qubes OS is the best thing available now for people who want more security. Not ideal still, but much better than the status quo.


You could also choose to park the car yourself or plan for a secondary mode of transportation if something happened to your car.

Not the best analogy. The organization who deploys said software is responsible for the uptime of their systems. They didn't have to use CrowdStrike and if they do they should have a plan in the event of failure.


You could also prosecute the establishment that keeps a valet with an abominable record on staff.

Microsoft took no steps to force-eject them from their ecosystem, despite their long history of issues.


Just to be clear within the analogy: are you expecting the auto manufacturers to "force-eject" any hotel on Park Ave that has a record of valet mishaps? Or did you mean individual cars should force-eject the valet?

If a Caesars Entertainment property in Macao has enough incidents, should GM update the firmware on their automobiles to force-eject valets at Caesars Entertainment properties in Las Vegas?

Now imagine that GM actually operates valet services in Macao and Las Vegas. Should they be allowed to force-eject valets from competing services?

I am not a Microsoft apologist. I think they should do better. I think Linux and FreeBSD should do better. I personally avoid Microsoft products. But I place more blame on people who use MS products than I do on MS. After all, I never intend to hand my beat up old Corolla over to a valet so why should I have to pay for a "valet mode" feature that Toyota is forced to build into all their cars? Isn't it reasonable that motorcycles, 18-passenger vans, and scooters don't need "valet mode"?

In my book, the auto manufacturer is lower on the list of culprits than the valet, "the establishment that keeps a valet with an abominable record on staff", and the vehicle owner. But some place like Car and Driver could definitely prioritize encouraging GM or Toyota to develop valet modes over berating owners; so I don't mind a place like HN shooting a few arrows at MS. Unless the general public follows their lead and lets bad guys off the hook by shifting too much focus to somebody lower on the list.


> Just to be clear within the analogy: are you expecting the auto manufacturers to "force-eject" any hotel on Park Ave that has a record of valet mishaps? Or did you mean individual cars should force-eject the valet?

Not OP, but I think the analogy here is the hotel "fore-ejecting" (firing) the valet with a history of doing joy rides. That seems very reasonable.


In the analogy, it seems Microsoft is a car manufacturer. The hotel is the company that bought software from CrowdStrike. The problem is that Microsoft should not control who has access to which APIs, that is a huge can of worms, and actually called anticompetitive by the EU from what I understand. At MS level, either they publish APIs or not. If published, anyone should be able to write software for them. This is especially bad if MS themselves also sell security software that uses the same APIs. It would literally mean MS deciding who is allowed to compete with their security software.


I think it works better (please allow me to change it) if Microsoft is the hotel. Crowdstrike is the restaurant inside the hotel. The restaurant is serving poisoned food to the guests, who assume it is a decent restaurant because it is in their hotel.

Also the restaurant has their own entrance without security and questionable people are entering regularly, and they are sneaking into the hotel rooms and stealing some items, breaking the elevator.

At the same time, the hotel is in a litigation process with the restaurants association, because in the past they did not allow any restaurant on their premises. The guests, naturally, do not care about this, since their valuables have been stolen, and they have food poisoning. The reputation of the hotel is tarnished.


> if Microsoft is the hotel

I don't think this works since Microsoft isn't the hotel. The hotel in your example chooses which restaurants are inside, but Microsoft doesn't. In this example, Microsoft is the builder who built the hotel building for a 3rd party. That 3rd party decides which restaurants it wants to partner with, as well as any other rules about what goes on in the building.

If the builder came around and made changes to ban the 3rd party's restaurant partner, that would cause a ton of issues and maybe get the builder sued.

Microsoft can't decide what can and can't run on their platform - the most they can do is offer certification which can't catch everything, as we just saw with Crowdstrike since they decided to take a shortcut with how they ship updates. Microsoft also had to allow for equal API access so they don't get sued by the EU.


Operating system (hotel) decides which programs run in kernel mode (Crowdstrike) but ok. Let me address the other point.

Again the reasoning of allowing equal API access to avoid getting sued is a false dichotomy: Microsoft could choose to make an OS that would not need such mechanisms to be simply usable.

They could also remove their own crowdstrike-alike offering, so that it would not be considered anti-competitive. They could also choose not to operate in EU. Of course, that would lower their profits, which is the real motive here.

Once you sum it up the reasoning goes: hospitals/flights can stop working because a company cannot lower its profits, and said company is not to blame at all. It is clearly false, the rest is sophism, and back-bending arguments IMO.


> Operating system (hotel) decides which programs run in kernel mode (Crowdstrike) but ok

So the hotel can have an infinite number of restaurants which can move and move out as they please with not input from the hotel itself?


I am conceding that point (the "but ok" part). Maybe I could have expressed it better.

Please note, that in my analogy the hotel has input in which restaurant is allowed (opposite of your scenario). There are also not infinite Crowdstrike-like offerings, only a few. Same thing applies to the hotel, yes, only limited by the surface of the building and cultural norms.

I any case, the analogy cannot please everyone, and I can see how there are some errors with it in some aspects. In others, I consider it accurate. Using an analogy is an invitation to nitpick on it, so it is my fault really, but I could not resist.

There are other points in the analogy that I feel reflect very well how ridiculous it is to claim Microsoft has no responsibility whatsoever. IMO they do have at least partial responsibility. One cannot simply excuse them "because EU".


Aren't analogies supposed to help clarify things? You've totally lost me.


My analogy is spreading into a trilogy with backstories for individual characters, so I will spare you and me both :)


But this implies that even the guests who never went to that restaurant and have no links whatsoever to it might somehow still be directly suffering because of its presence.

In reality this doesn’t seem to be the case at all.


This is the correct interpretation. I am surprised that people took it in different directions.


I'm expecting restaurant owners to fire bad valets.

Or in Microsoft's case, via regulatory, social, or software, prevent Crowdstrike from causing harm to their customers.

I'm aware it's a sticky regulatory situation, but CS has a history of these failings and the potential damage could be severe. Despite this, no effort (that I am aware of) was made by Microsoft to inform customers that Crowdstrike introduced potential risks, nor to inform regulators, nor to remove the APIs CS depends on.

I don't believe Microsoft is solely responsible, but I do believe that throwing all of the blame for the very real harm that was caused onto CS alone is missing a piece of the puzzle.

Last aside, every large corp has team(s) focused on risk. There's approximately zero chance they didn't discuss CS at some point. The only way this would not have happened is negligence.


Back in 2006 Microsoft tried to keep 3rd party vendors out of their ecosystem. <https://arstechnica.com/information-technology/2006/10/7998/> As a result of a complaint to the EU Microsoft was required to let them have kernel access. <https://www.theregister.com/2024/07/22/windows_crowdstrike_k...>


Microsoft was required to let them have the same access their own software used. Which seems fair to me. Microsoft can remove those APIs entirely, they just can't restrict them.


Can Microsoft legally ban a competitor for percieved incompetence? I doubt it . partiuclarly seeing how much competence is shown with windows and MS teams software


Microsoft assigns driver levels to these guys etc. and allows them to load kernel mode components as protected etc.. If they do not allow that - CS cannot cause such damages. ofcourse, as you pointed out, this will then turn into some lawsuit blaming MS for killing competitors, even if they do it to try and protect their customers.

wonderful world.


> Microsoft took no steps to force-eject them from their ecosystem, despite their long history of issues.

I’m pretty sure anti trust law doesn’t allow Microsoft to go anywhere near that kind of action, even if they wanted to be more Apple like.


Problem is that the establishment here is well the establishment. That is the state itself. Or at least one of them. As somehow MS is in position where for any slight anti-trust thing they will be prosecuted. Our system is setup to allow these actors in...


You can't just let people do anything from userland, the performance would tank. As for restricting kernelland, EU competition regulators would not be happy if MS was the only one able to write anti virus software that runs in kernelland.


> You can't just let people do anything from userland, the performance would tank

Isn't the point of userland that you can (try to) do anything from there?

It seems like MacOS and Linux provide substantially safer alternatives that are still performant?

> As for restricting kernelland, EU competition regulators would not be happy

I keep seeing people say this. Is there a basis for that assertion, or is that mere speculation? Again, hasn't MacOS already deprecated kexts?


There is basis for that assertion.

Via Google: https://www.techtarget.com/searchsecurity/news/450420491/Mic...

(Also via myself, as I was at MS when we wanted to make this change and the EU said no.)


Well Microsoft did not publicly commit to using the same APIs, and no privileged access, for its own antivirus products. That's why the EU said no way; not because kernel access was revoked.


Yes, but then of course Microsoft is being obligated to open part of kernelspace to competitors, which is arguably "OK" from a competitive regulation perspective, but that then places a special burden on competitors to maintain code hygiene given the potential for crashes. It makes CrowdStrike's negligence all the more unacceptable.


I believe what philistine is suggesting is that Microsoft could have implemented their own security offering using a safer alternative like eBPF, and then opened that interface to competitors as well.

I think that would have been a proactive approach. That said, I'm not entirely convinced that the EU was right to place the restriction in the first place.


The article you shared says that Kaspersky filed a complaint, but I didn't see a clear statement there about what the outcome was. I do now see other reputable sources reporting that an agreement was reached in 2009 where Microsoft promised to allow vendors the same access to the kernel its security software had [0].

I think a proactive approach might have been for Microsoft to provide safer interfaces with the kernel, and then use those in its own security offerings.

That said, it does sound like EU competition regulation was a contributing factor here, and I think the EU is wrong on this one and that an OS vendor should not be required to provide unrestricted kernel access to allow security software vendors to compete.

Mostly unrelated, it seems somewhat interesting that this was Kaspersky insisting on kernel access... The US government seems convinced they are compromised.

[0]: https://www.ft.com/content/60dde560-194a-40d1-8c98-1d96d6d01...


What are the Linux alternatives you are talking about?


MacOS still keeps the kexts support around, even if the long term roadmap is to move everything into userspace.


[flagged]


Please don't post in the flamewar style to HN, such as you did here and downthread (https://news.ycombinator.com/item?id=41096774). It's not what this site is for, and destroys what it is for.

If you'd please review https://news.ycombinator.com/newsguidelines.html and stick to the rules when posting here, we'd appreciate it.


There are ways around this that I've discussed elsewhere so I won't repeat them here.

However, think of it this way: Windows restarts, tries to load with new patch and crashes.

Question: why can't Windows be designed so that on crash it automatically restarts and loads the previous state sans patch?

Answer: Windows could be designed that way but it would require Microsoft to do many things it doesn't want to do. Some of which would require Microsoft to go back to the beginning and reengineer quarter-century or more old code from scratch, that means redesigning APIs and the underlying architecture from first principles.

Why doesn't Microsoft want to do this? It's obvious so I won't bother to spell it out.

Nevertheless, when the dust fully settles and someone outlines these alternative design strategies in great detail then it'll be obvious to everyone what a fragile stack of cards Windows has been constructed on.


Maybe you should actually check the facts, instead of just making a witty remark? The EC has regulated Microsoft into product decisions to make third-parties as unrestricted as Microsoft itself. See here:

> (11) Microsoft shall make available to interested undertakings Interoperability Information that enables non-Microsoft server Software Products to interoperate with the Windows Client PC Operating System on an equal footing with Microsoft Server Software Products. Microsoft shall provide a warranty with respect to this Interoperability Information (including any updates), as specified in the general provisions in Section B.I of this Undertaking, effective 1 January 2010 for Windows Vista and Windows 7, and effective 15 March 2010 for Windows XP.

https://news.microsoft.com/2009/12/16/microsoft-statement-on...

Microsoft Interoperability Undertaking (Dec. 16, 2009, .doc file)


Please don't respond to a bad comment by breaking the site guidelines yourself. That only makes things worse.

(Your comment would be fine without that first bit.)

https://news.ycombinator.com/newsguidelines.html


[flagged]


Here's an actual compliant at MS to the EU from an anti-malware vendor: https://www.techtarget.com/searchsecurity/news/450420491/Mic...

This is and has been a thing for quite some time. Windows is a highly regulated OS.


Seems like a complaint that MS was using underhanded tactics, so Kaspersky complained to an organisation that might do something about it.

It doesn't really seem like an example of MS coming up with a better solution then discussing it with industry, unless I'm misunderstanding it?

Instead it seems a lot like MS figuring out a solution that advantages themselves then just rolling it out, at the expense of others. (?)


As someone that worked at MS, on a team that worked directly on this issue (among other things) some years ago, MS did figure out better solutions and did discuss it with industry.

MS has an entire forum for discussing these things with industry (https://learn.microsoft.com/en-us/defender-xdr/virus-initiat...) and has had variants of said forum for some time (I think the first effort was in 2010).

Kaspersky was running an SSL/TLS Proxy in the kernel IIRC and didn't want to have to move it elsewhere due to the fact it would require them to rework their product quite a bit.

The solutions MS (we) proposed were agnostic and overall better, the anti-malware industry simply doesn't want to make the changes as these things do impose technical work on existing products.


No worries. That wasn't at all evident from the above complaint.

Was the drive for this industry forum coming from dealing with the EU, or was it more from MS trying to make things better without needing the prodding?


Industry forum was external, MS did not start that.

I do not know enough to properly answer on the concrete reasons why, only that it was external. Sorry.


As opposed to Apple, who's gone and just done that for their operating system?


Apple isn't (yet) a convicted monopolist, though it seems like there's a strong case to be made about just that. ;)


There is literally a ton of existing software out there that is keeping MS from doing exactly that. When it comes to avoiding breaking legacy applications MS scores far higher than any other operating systems out there.


And that has absolutely nothing to do with them coming up with better approaches then discussing them with industry for potential roll out, adoption, etc.

But instead, now they're in trouble they're trying to blame the EU for stopping their monopoly.

Do you honestly believe MS being unhindered by competition restraints would lead to better results?

Are you forgetting MS has already demonstrated how that goes, and been literally convicted for it?

https://en.wikipedia.org/wiki/Microsoft_Corp._v._Commission

(there are plenty of other examples)


Let me try to make it extremely simple so that maybe you might understand something.

Say I am running a shop, the EU tells me that under no circumstance can I not allow a product to be sold in my shop, even if that product is a ticking time bomb that can blow up the shop. And so hearing this, I create a document “Good approaches to sell time bombs”, and I mention helpful stuff like ensure the timer in your bomb is switched off when it is in shop. I also create an industry wide forum with all time bomb manufacturers and discuss best practices and time bomb methods with them to best sell it in the shop etc.

In spite of all this, there exists an idiot timebomb manufacturer who ignores all best practices, does not consider industry and builds a shitty time bomb that blows up the shop.

Now please educate me, apart from doing the only surefire thing and banning shitty time bomb manufacturers from selling in their shop, what should MS do?


> the EU tells me that under no circumstance can I not allow a product to be sold in my shop

That doesn't seem to be a good faith representation of what the EU was requiring.

> ... so that maybe you might understand something.

It looks like there's literally no getting through to you nor other MS apologists. :( :( :(

sigh


Your car _allows_ you to drive off a cliff. If you do so, it is your fault, not the fault of the car manufacturer.

Kind of weird that anyone is blaming Microsoft for any part of this, imo


Mmm… meaningless analogies are kind of meaningless?

More like:

If you install a security product that then prevents your car from starting; are they entirely blameless for letting you install it?

If you pull the hood up, tear off the “voids warranty” seal, ignore the “don’t open this” labels, crack the seals open and shove something into the engine… sure.

…but if you just slap a widget with the “vendor approved” sticker on your dash and it bricks your car; that’s a bit sucky right?

I do feel Microsoft is not entirely blameless in this.

It should be easier to recover from this kind of thing.

They should have been paying attention and made a fuss that one of the biggest security vendors has been doing this literally since they started.

I would bet money that until two weeks ago Microsoft was high-5ing them for best security practices.

It’s not “their fault” but they can’t just go “wasn’t us!”.

It was them.

It wasn’t macOS. It wasn’t *nix.

Suck it up. They should’ve done better.


Except Crowdstrike had 3 separate Linux incidents, including kernel panics, directly before this happened.


And at least one of them was actually a Redhat kernel bug, where eBPF caused a kernal panic when it shouldn't be able to?


That is the problem: you feel.

Before Microsoft comes into the picture the issues is crowdstrike pushing updates without proper testing, selling a product on which customers cannot control the update schedule, and customers for being so naives and not checking what the product they install on critical stuff do.


The big difference is that CS is not the user. In you analogy it's like your car allows you to drive off a cliff, and an (almost) essential part of your car (for example, the pedal) drives the car off a cliff.


> CS is not the user

It got there because a user or administrator approved and installed it. It didn't just appear there, Microsoft didn't install it there. The user ran it.


Right, so a slightly better analogy would be if you wanted to install a remote starter, but then you find out that they can only be installed into Fords, because other auto manufacturers (Apple, Linux in this case) believe that tampering with the critical path (the engine, kernel) is unsafe. It isn't Ford who's at fault for allowing you to run some random engine modification, it's that mod that is at fault.


If it's a custom after market part, how can you blame the car manufacturer and not the part maker?


An OS flexible enough where you can do something stupid enough to completely break it.

Basically IOS which is so locked you can't even run apps not expressively approved by Apple.

Pick one. If I build a bike and you remove the breaks to save weight don't get mad at me when you crash.


Microsoft tried to lock down kernel access in the Windows Vista era. Antivirus vendors went crying to the EU and they forced Microsoft to allow access to the kernel to third parties.


i would have thought that in 2024 a bad driver update is something that windows would automatically roll back.

or at least provided some level of protection against crashes in third party kernel code.


I think if I understand the systems right Windows can roll back a bad driver update but the CS update wasn’t an update to the driver but instead updated a configuration file which CS updated outside of Windows Update. So from the Windows Update perspective the system started failing to boot with no changes to the system. Again though I don’t know if I totally understand what CS did and what capabilities Windows Update has.


Good explanation about this point at 11:15 over at https://youtu.be/wAzEJxOo1ts?si=wGXDJZtUczcIui9F


It was not a driver update.


No you can’t roll back bad driver updates in any OS, if you could then by definition they do not sit in the kernel space. You just want the security code to not run in kernel space, which is a decision MS could maybe make and become like Apple, though most security software would in that case rebel.


> No you can’t roll back bad driver updates in any OS, if you could then by definition they do not sit in the kernel space.

drivers and kernel binaries are typically installed and maintained by user space programs that run with some sort of elevated privileges.

"kernel space" is just a runtime context, what gets loaded into there typically comes ordinary (protected) files on the disk.


That doesn't make any sense.

The OS loads file A into the kernel. It crashes. It reboots. It decides not to load file A this time.

Wow, it's a rollback of kernel-space code.

Unless your argument is that you can't guarantee a rollback of every possible kernel driver, because it might have installed a rootkit while it had full control? Okay, cool, but this isn't a malware removal idea. It's an idea for normal drivers.


it depends on how bad. in Linux you can rmmod to get rid of the bad one if you haven't wedged it and fix your code, compile, and try again. I can't imagine that's actually different on windows if you know what you're doing. how do you think driver development happens?


it's like userland video driver - thousands context switches per second, performance will dive...


Honestly most of the conversations were about getting everyone back online.


That doesn’t seem right. The tdp for the 1700 is 65w… no way an io die is consuming most of that. Here’s a comparison of a system with a ryzen 1700 idling vs intel contemporaries which don’t have a separate i/o die: https://www.bit-tech.net/reviews/tech/amd-ryzen-7-1700-revie...

Note that it’s only 7W greater at stock clocks.


Yes it does.

You're looking at chips from 2017 when Intel had stinkers and under load, but what I said is true, the IO die has high idle power draw compared to modern monolithic designs, which gets hidden away under load.

Just Google if you don't believe me, plenty of older desktop Ryzen owners complain about higher idle power draw compared to Intel.


The ryzen 1700 is also from 2017. Intel’s cpus still dominated at the time for anything single-threaded, they were just bad at multithreaded workloads. I’m not saying i/o die power consumption isn’t higher, it is for sure. And I agree, it doesn’t go down at idle because it can’t turn off or do power gating.

What I’m saying is that a computer with a cpu that is 65W TDP (from a time when amd’s TDP was close to being accurate as ~ max power consumption under load), the i/o die (which is part of that 65w TDP; which is for load) cannot possibly be the main reason his computer is idling at 80W. Especially when I linked an instance of a system also with a ryzen 1700 that was idling for 57W and with a similar configuration as an intel contemporary only being 7W greater at idle.


The 65W tdp you keep bringing up is under load and data is from 2017 when I tell was still on 14nm, but we're talking about idle power draws here and Ryzen looses to Intel in most cases in most modern data in the <10nm era.

Here:

https://news.ycombinator.com/item?id=32809852

https://youtu.be/JHWxAdKK4Xg?si=OFx6puKRSc1TYSX8


For both the 1700 and 5800X, the i/o die uses ~12W at idle, and 20W max at load (assuming he’a doing something that keeps the i/o die at max power consumption when everything else is idle).

This leaves us with 60W-68W unaccounted for at idle. Even in the worst case for i/o power usage that’s 75% unaccounted for.

I keep talking about TDP and load power because even in the case where the cpu isn’t using lower power states correctly for whatever reason, the i/o die cannot possibly be majority of the 80W power usage.

Source for power usage of i/o die:

1700 (same i/o die as 1300x/1500x): https://www.anandtech.com/show/11658/the-amd-ryzen-3-1300x-r...

5800x: https://www.anandtech.com/show/16214/amd-zen-3-ryzen-deep-di...


What i do not get is,why not add condensators and computation only on filled condensator and memory fetch completed?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: