[Info-vax] Future comparison of optimized VSI x86 compilers vs Linux compilers

Camiel Vanderhoeven iamcamiel at gmail.com
Fri Jul 31 23:55:09 EDT 2020


Op zaterdag 1 augustus 2020 00:05:56 UTC+2 schreef Stephen Hoffman:
> On 2020-07-31 20:53:43 +0000, Camiel Vanderhoeven said:
> 
> > Op vrijdag 31 juli 2020 19:37:18 UTC+2 schreef Simon Clubley:
> >> 
> >> From a security point of view, RMS code is effectively kernel mode code 
> >> anyway at the moment as you can get from executive mode to kernel mode 
> >> without any additional privileges required.
> > 
> > I'd wish you'd stop spreading this nonsense. Pardon my French. the 
> > Exec/Kernel mode line was never intended as a security/privilege 
> > related line, its a mechanism that helps stability by protecting kernel 
> > mode data/code from bugs in exec mode, it's not meant to protect 
> > against malicous code executing in exec mode.
> 
> Nonsense?  The statement from Simon is correct, and then you (Camiel) 
> then directly agreed with Simon's statement.

I believe that an argument can be accurate, but that making it can still be nonsense. Proper electrical grounding can help prevent fires, yet I see very few people constantly harping on the fact that it doesn't prevent arsonists from torching the place. Perhaps nonsense is the wrong word here, I'll happily accept a better alternative.

> As you state, the rings are to isolate accidental corruptions and not 
> to rebuff malicious activity.

Yes, if only people could just accept that and move on.

> Do any of the VSI folks here have an opinion about the "the most secure 
> operating system on the planet" marketing, while we're on the subject?

I recognize marketing speak when I see it. I don't think any real customers are that easily swayed.

Camiel



More information about the Info-vax mailing list