Sigma_Orionis wrote:Which two groups? if you mean the Freedows folks and related?, from what I hear they never got to the point of actually writing code, they had so much political infighting they never got down to do actual stuff, let alone even write a prototype.
Sigma wrote:These Stanford dudes claim to have done an implementation on an OS called V++ I'm looking for dirt on it.
Ah, here are some numbers on the V++ OS
relies on higher-level application kernels to provide policies
FZR1KG wrote:relies on higher-level application kernels to provide policies
That still tingles my spidey sense.
Traditionally kernel designers have sought to make individual hardware resources invisible to application programs by requiring the programs to interact with the hardware via some abstraction model. These models include file systems for disk storage, virtual address spaces for memory, schedulers for task management, and sockets for network communication. These abstractions of the hardware make it easier to write programs in general, but limit performance and stifle experimentation in new abstractions. A security-oriented application might need a file system that does not leave old data on the disk, while a reliability-oriented application might need a file system that keeps such data for failure recovery.
One option is to remove the kernel completely and program directly to the hardware, but then the entire machine would be dedicated to the application being written (and, conversely, the entire application codebase would be dedicated to that machine). The exokernel concept is a compromise: let the kernel allocate the basic physical resources of the machine (e.g. disk blocks, memory pages, and processor time) to multiple application programs, and let each program decide what to do with these resources. The program can then link to a support library that implements the abstractions it needs (or it can implement its own).
FZR1KG wrote:What scheme was that?
Gullible Jones wrote:Guys, NTVDM (Windows NT support for 16-bit DOS applications) is virtualized (plus some emulation):
http://en.wikipedia.org/wiki/Virtual_DOS_machine
From what I'm reading it does not allow direct hardware access of any sort, and is mostly (or perhaps entirely) implemented in user space. There was a case where it allowed privilege escalation to SYSTEM but that was a bug.
Re the completely new OS, that's what the deal with Windows 8 and the new API (WinRT) is supposed to be. They're maintaining backwards compatibility with Win32, but gradually phasing it out. Not exactly FZ's idea of relegating all the 32-bit stuff to a virtual machine, but getting somewhere... Too bad they messed up so badly with the Metro GUI, the stuff underneath is supposed to be pretty interesting (e.g. applications run in AppArmor-style filesystem sandboxes by default).
But of course I haven't actually looked at the API docs, so I could be overoptimistic here.
Gullible Jones wrote:Guys, NTVDM (Windows NT support for 16-bit DOS applications) is virtualized (plus some emulation):
http://en.wikipedia.org/wiki/Virtual_DOS_machine
From what I'm reading it does not allow direct hardware access of any sort, and is mostly (or perhaps entirely) implemented in user space. There was a case where it allowed privilege escalation to SYSTEM but that was a bug.
Re the completely new OS, that's what the deal with Windows 8 and the new API (WinRT) is supposed to be. They're maintaining backwards compatibility with Win32, but gradually phasing it out. Not exactly FZ's idea of relegating all the 32-bit stuff to a virtual machine, but getting somewhere... Too bad they messed up so badly with the Metro GUI, the stuff underneath is supposed to be pretty interesting (e.g. applications run in AppArmor-style filesystem sandboxes by default).
But of course I haven't actually looked at the API docs, so I could be overoptimistic here.
Gullible Jones wrote:Sadly DOSbox can't run 16-bit Windows binaries, unless you run Windows 3.x on top of it. And yes, I still have some games that are 16-bit Windows applications. (Haven't played them in years though.)
Edit: Also I recall DOSBox being a bit less user-friendly than Win9x. Still, good point there.
Portability, preventing system chaos
– standard soln: interfaces, good programming
Sharing state with buggy/malicious peers
– General soln: layer protection on exokernel
– How: “privileged”/unprivileged libOS code
» protection code ~ 10% of code base
Reconciling greed and global performance
– greed = faster apps = more resources
Rootkits have been created as Type II Hypervisors in academia as proofs of concept. By exploiting hardware virtualization features such as Intel VT or AMD-V, this type of rootkit runs in Ring -1 and hosts the target operating system as a virtual machine, thereby enabling the rootkit to intercept hardware calls made by the original operating system.[5] Unlike normal hypervisors, they do not have to load before the operating system, but can load into an operating system before promoting it into a virtual machine.
Users browsing this forum: No registered users and 2 guests