(no title)
theWatcher37 | 8 years ago
If “do no harm” is a principle, then the kernel should ensure that no harm is taking place.
If flaws within the kernel allow harm to occur while otherwise normal transactions are occurring then it is absolutely preferable to panic and shut down over allowing that potential harm to occur.
To suggest otherwise, that detected errors that allow harm should be allowed, is pure insanity.
Linus is unquestionably wrong in the regaurd.
anameaname|8 years ago
A panic would result in the airplane falling to certain doom. But if it were to keep running, it may be a security vulnerability. Being absolutist in either direction of the discussion will lead to absurd scenarios where you would make the wrong decision.
Nokinside|8 years ago
Both offensive and defensive programming is important in safety critical programs and I get your point, but those things you mention don't' happen in safety critical systems.
There is no dynamic memory allocation. RTOS used will support "brick wall partitioning" for memory, processing and other resources. Different systems can run in the same OS but they cant' compete for processing time, locks or memory access. Everyone has been dealt the resources they can have from the start. It's not possible to run out file descriptors, memory if you allocate them statically from the start.
Assertion errors or monitoring errors in safety critical systems usually cause reset or change into backup system. If the program state is large and reset is not safe, retreating to some earlier state (constant backups) is likely.
Slavius|8 years ago
Aviation has strict regulations and that's why most critical systems have redundant parts. Putting a sigle critical component into plane is stupid in and of itself. Think of simple freezing in high altitude or overheating otherwise. On the other hand I would rather fly in a plane whos altitude meter shuts down and switches to redundant circuit other than letting it report incorrect values...
rhinoceraptor|8 years ago
kyberias|8 years ago
Harm is relative. You security people think that every single security issue is so important that it doesn't matter what harm mitigating that may cause, it can be done. Well, that is not what Linus thinks.
Kernel may terminate a process because it did something of suspect but doing that may actually cause way _more_ harm.
The philosophy here is that security bugs are just bugs.
iforgotpassword|8 years ago
Santosh83|8 years ago
monocasa|8 years ago
Slavius|8 years ago
dawnbreez|8 years ago