[Info-vax] Intel x86-64 Processor Design Security Vulnerability?
JKB
jkb at koenigsberg.invalid
Sat Jan 6 17:29:29 EST 2018
Le Wed, 3 Jan 2018 13:54:38 -0500,
Bill Gunshannon <bill.gunshannon at gmail.com> écrivait :
> On 01/03/2018 11:11 AM, Stephen Hoffman wrote:
>> On 2018-01-03 03:01:07 +0000, DaveFroble said:
>>
>>> Simon Clubley wrote:
>>>>
>>>> If this is what it sounds like, I wonder if a microkernel based
>>>> operating system would be more protected against this than a
>>>> monolithic operating system would be ?
>>>
>>> What does that matter in c.o.v?
>>
>> More than you might realize...
>>
>> http://www.sture.ch/vms/Usenix_VMS-on-Mach.pdf
>>
>>> VSI is porting the OS, not re-writing it.
>>
>> A platform port necessarily rewrites the architecture-specific parts of
>> the operating system. How much beyond that minimum gets reworked,
>> rewritten and redesigned, varies. Probably less than what should be,
>> and more than what folks with existing kernel code would prefer.
>>
>> But I don't see VSI moving to Mach.
>>
>>
>
> Wasn't that what the FreeVMS guys were trying to do?
> Guess we saw how well that went...
Nope. Over L4-X2 microkernel. But I don't have time enough to
produce reliable code without some other volunteers.
Regards,
JKB
--
Si votre demande me parvient sur carte perforée, je titiouaillerai très
volontiers une réponse...
=> http://grincheux.de-charybde-en-scylla.fr
=> http://loubardes.de-charybde-en-scylla.fr
More information about the Info-vax
mailing list