Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

[flagged]


I have such links. I just can't tell if you're being serious or sarcastic.


It depends; if gp has actual things to back-up what they're saying, then I'd actually like to read them. I'm interested in monokernels because of Haiku, but I'm definitely not an expert.

OTOH, somebody releases a whole OS and the response is "Snore! It isn't a microkernel." - Ok, so...why?


Start with this paper which lays the reliability benefit out pretty well with specific examples:

http://cs.furman.edu/~chealy/cs75/important%20papers/secure%...

Start at "The Paper" here to skip past Linus vs Tannenbaum politics stuff. He describes the common counterpoints and shows with evidence, including existing systems, that they're not as big a deal as people say.

http://www.cs.vu.nl//~ast/reliable-os/

Example from high-assurance world that has many features & assurance activities a FOSS attempt at secure microkernels should consider copying:

http://www.ghs.com/products/safety_critical/integrity-do-178...

Animats and I think QNX is probably best of commercial ones in balancing all kinds of tradeoffs. It's been used for decades as a self-healing RTOS with good performance. First link is their description of it with second a demo of a product with QNX inside showing how fast it can be on non-desktop hardware.

http://www.qnx.com/content/qnx/en/products/neutrino-rtos/neu...

https://youtu.be/vPo6gl8N0wM?t=1m20s

Open-source one aimed at reliability & legacy compatibility you can play with. Took UNIX decades to get reliable despite all the labor but Minix 3's foundation did it with a handful of people over a few years. That's saying something.

http://wiki.minix3.org/doku.php?id=www:documentation:feature...

Another FOSS one that aims at high-security integrating many best-of-breed components from CompSci like Nitpicker GUI and seL4 microkernel. First link is descriptive slides with second the actual site. This one is still new so will have bugs.

https://archive.fosdem.org/2015/schedule/event/genode_os_sec...

https://genode.org/about/

Finally, it's worthwhile to throw in an exemplary one from capability-security that further isolates things with self-healing properties. Based on commercially successful KeyKOS system on mainframes. No longer maintained but docs and GPL code still available for study or revival. Paper also describes other capability kernels.

https://www.cs.ucsb.edu/~chris/teaching/cs290/doc/eros-sosp9...

So, there's you a few days worth of reading and a few years worth of thinking to do. Hope it helps shed light on why almost every safety- or security-critical system that ever did well in reliability or security was a microkernel-based system. These days, high-assurance is looking at eliminating even it with CPU's with built-in security, compiler techniques for automated safety/security, and DSL's for easy formal verification of OS or system components. Until that's finalized & while using traditional hardware, it's best to build on methods that already worked for decades.


Neat, a bunch of these had escaped my radar, even.

I'm glad to see you around; A bit of hope to contrast with all the zero-research-done yet anti-microkernel naysayers.


Appreciate it. I try to stay evidence-driven. :) For extra data, Google Gernot Heiser with "L4," microkernel, or OKL4 terms + "evaluation" or "performance." He published lots of comparisons as they put it on lots of phones.


You're right to mention these. Spent several evenings reading Heiser's blog and NICTA SSRG papers a few month ago.

I'm more positive about microkernels these days; Activity is increasing and milestones are being reached.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: