[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: wj7crwsbe3kf1_png.png (942 KB, 1080x1153)
942 KB
942 KB PNG
post operating system design faults
>>
>>106424793
idgi
>>
signals
fork not returning file descriptor
pthead timed functions using REALTIME clock despite using delay not timestamp so they can block indefinitely due to NTP time changes
>>
>>106425434
tsmt shartysister o algo or something
>>
>>106424793
The only design fault is with your kiked brain sharty troon.
https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
>>
>>106425400
But anon, if you want to use a Realtime thread you should be using delays?
>>
File: whatcausesthis.png (119 KB, 1345x653)
119 KB
119 KB PNG
>zoophiles calling random users zoophiles
>>
>>106426660
>daaaah I'm not smrt e-nuff 2 design an unpickable lock, therefore nobody is
cnile incompetence ladies and gentleman
>>
If this is the kind of attack the US military had in the 60s then I'm 100% certain that all microcode is compromised.
>>
>>106424793
Is this the power of FOSS image editors?
>>
>>106426880
>60s
I'd imagine the concern was more that traitors would attempt to eavesdrop on what other users were doing on timeshared machines
>>
>>106426844
How does any other language solve this problem if they have a compromised compiler(Assuming that language's compiler is written in the same language)?
>>
>>106426762
what sort of mental illnesses push people to create and participate in sites like that?
>>
>>106426880
It was a hypothetical at a time where computer science and security as a field were still developing. They didn't "have" an attack back then, it was just an epiphany when considering from a security perspective, what would happen is any particular part was arbitrarily compromised.
>>
>>106424793
I don't understand your stupid ass zoomer/basedteen memes.
>>
>>106429148
The same attack can be implemented in ucode there is no defense against this attack you have to find a way to analyze the cpu at runtime
>>
>>106429159
Do you have the paper? I'm sure someone would have tried implemented it during multics dev cycle after receiving the critique.
>>
>>106429167
It's basically a code that goes like "hey pedos come to our site we have a bunch of edgy teenagers that want to be groomed"
>>
>>106429171
Microcode is by design invisible to execution, the cpu doesn't support breaking into it. There is no analyzing it without a level of technical sophistication, that if reached, would most likely allow you to make your own backdoor free cpus anyway.

But it's meaningless to have when you have just a regular hardware backdoor running separately and sifting through the data of the execution core anyway. They're both equally invisible, equally potent, and one is significantly easier to integrate, produce and modify.

>>106429176
I don't but that's what the discussion around it seems to signify.

But probably, it's not out of the question.
>>
>>106429167
Killing a joke but,

I think it's supposed to show that you'd shoot that one pillar to bring down the whole thing in Angry Birds. Mixes that
>one package being thanklessly maintained by a guy in Nebraska since 2003
meme with this and then adds some philosophy over what parts of that structure stand for to the piggies and the birds.

If it weren't s0ijak retardation, it's a pretty good joke. Got a chuckle out of me.
>>
>>106425400
>fork not returning file descriptor
why the fuck would you want a file descriptor
>>
>>106429424
to poll() on completion instead of that fucking wait() monstrosity
>>
>>106429632
>that fucking wait() monstrosity
elaborate
it works fine here
>>
>>106429721
It has plenty little issues that just disappear with file descriptors.
One is the whole zombie state. Since fork() wait() use global PID numbers and those are reused, there would be a potential race condition where child process would exit and someone created new process that would reuse the PID. If you use file descriptors you get level of indirection that can handle died state without keeping zombie and can be garbage collected like resources that use file descriptor.
Second is just the ownership. It's obvious who is owning process - anyone with file descriptor to it.
You can dup() it, pass it over socket, whatever just like any other resource.
And foremost the event loops and mixing process management with I/O polling. With wait() it's two competing mechanisms and it's not nice. You need signals (already an ugly hack) just to interrupt poll() and you also get the whole self-pipe/ppoll race condition bullcrap.
>>
>>106430809
btw Linux has pidfd interface since v5.6. I recall there were some additions to make it full-featured, not sure if that was in this or later version. I don't really have to draw the full picture here since it already exists, check manpages if interested.
I just wish this was portable and in unix/posix since early versions, since it's the better way to manage processes.
>>
>>106426760
you are confusing real-time scheduling with REALTIME clock_id (the UTC calendar datetime clock).
To illustrate what I mean: take C++ std::condition_variable::wait_for(). It could look like it is suppposed to block for up to the passed time limit. But no, it takes current time and adds delay to it and waits until absolute timestamp using REALTIME clock_id. So if NTP modifies the time, the wait can block indefinitely. This is not mentioned in documentation, sadly.
pthread has a setclock attribute for condition variables so you can set MONOTONIC like a sane person would want, but curiously other pthread objects that you can wait on (namely mutex and rwlock) don't have this attribute and can only wait on REALTIME.
>>
>>106430809
>child process would exit and someone created new process that would reuse the PID
that'd be a bug in your OS
PIDs of unreaped child processes shouldn't be reused
>>
>>106430962
that why zombie state exists, so solve this potential race condition - just like I wrote.
>>
>>106430988
you didn't write shit



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.