[Info-vax] Future comparison of optimized VSI x86 compilers vs Linux compilers
Camiel Vanderhoeven
iamcamiel at gmail.com
Fri Jul 31 23:55:09 EDT 2020
Op zaterdag 1 augustus 2020 00:05:56 UTC+2 schreef Stephen Hoffman:
> On 2020-07-31 20:53:43 +0000, Camiel Vanderhoeven said:
>
> > Op vrijdag 31 juli 2020 19:37:18 UTC+2 schreef Simon Clubley:
> >>
> >> From a security point of view, RMS code is effectively kernel mode code
> >> anyway at the moment as you can get from executive mode to kernel mode
> >> without any additional privileges required.
> >
> > I'd wish you'd stop spreading this nonsense. Pardon my French. the
> > Exec/Kernel mode line was never intended as a security/privilege
> > related line, its a mechanism that helps stability by protecting kernel
> > mode data/code from bugs in exec mode, it's not meant to protect
> > against malicous code executing in exec mode.
>
> Nonsense? The statement from Simon is correct, and then you (Camiel)
> then directly agreed with Simon's statement.
I believe that an argument can be accurate, but that making it can still be nonsense. Proper electrical grounding can help prevent fires, yet I see very few people constantly harping on the fact that it doesn't prevent arsonists from torching the place. Perhaps nonsense is the wrong word here, I'll happily accept a better alternative.
> As you state, the rings are to isolate accidental corruptions and not
> to rebuff malicious activity.
Yes, if only people could just accept that and move on.
> Do any of the VSI folks here have an opinion about the "the most secure
> operating system on the planet" marketing, while we're on the subject?
I recognize marketing speak when I see it. I don't think any real customers are that easily swayed.
Camiel
More information about the Info-vax
mailing list