From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on ip-172-31-74-118.ec2.internal X-Spam-Level: * X-Spam-Status: No, score=1.0 required=3.0 tests=BAYES_40,FORGED_GMAIL_RCVD, FREEMAIL_FROM autolearn=no autolearn_force=no version=3.4.6 X-Received: by 2002:ad4:574c:: with SMTP id q12mr29627947qvx.47.1634039488854; Tue, 12 Oct 2021 04:51:28 -0700 (PDT) X-Received: by 2002:a5b:502:: with SMTP id o2mr26333085ybp.452.1634039488708; Tue, 12 Oct 2021 04:51:28 -0700 (PDT) Path: eternal-september.org!reader02.eternal-september.org!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Tue, 12 Oct 2021 04:51:28 -0700 (PDT) In-Reply-To: Injection-Info: google-groups.googlegroups.com; posting-host=203.78.117.221; posting-account=oy9pPgoAAACICsEVtbydIrxpi9tsYOGl NNTP-Posting-Host: 203.78.117.221 References: <07f8mgdot9tmh8mqen2ogd5dds2gojoleh@4ax.com> User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <5671d9c0-2535-43f2-82e5-258eddb7c879n@googlegroups.com> Subject: Re: The Ravenscar profile and capabilities paradigm From: Richard Iswara Injection-Date: Tue, 12 Oct 2021 11:51:28 +0000 Content-Type: text/plain; charset="UTF-8" Xref: reader02.eternal-september.org comp.lang.ada:62971 List-Id: On Tuesday, October 12, 2021 at 1:42:27 PM UTC+7, Doctor Who wrote: > On Tue, 12 Oct 2021 12:17:00 +0700, Richard Iswara > wrote: > > >On 12/10/2021 02.50, Doctor Who wrote: > >> On Mon, 11 Oct 2021 20:36:46 +0100, "Luke A. Guest" > >> wrote: > >> > >>> On 11/10/2021 20:25, Doctor Who wrote: > >>>> On Mon, 11 Oct 2021 15:48:37 +0100, "Luke A. Guest" > >>>> wrote: > >>>> > >>>>> On 11/10/2021 14:33, Doctor Who wrote: > >>>>>> Hello, > >>>>>> someone knows how to introduce the capabilities paradigm in Ada, > >>>>>> specifically for programs written using the Ravenscar profile ? > >>>>>> > >>>>>> > >>>>> > >>>>> Capabilities are just a set of operations that an object / user can > >>>>> perform, or not. So, it's merely a bitset. A bitset which can form > >>>>> derived bitsets. > >>>>> > >>>> > >>>> no it is another thing, > >>>> https://en.wikipedia.org/wiki/Capability-based_security > >>>> > >>> > >>> I know what it is. It is still a set of bits, or, permissions, or > >>> capabilities. The capabilities are usually provided by the OS services. > >>> > >>> But as you didn't specify whether you wanted to map onto an existing OS' > >>> capabilities or if you wanted to implement your own, I went with the latter. > >> > >> there isn't any existing OS that provides capability-security from the > >> ground up, I intend to implement my own. > >> > >seL4? The whitepaper includes the proofs also. > eh yes, I forgot seL4, however it isn't much used I think Has Qualcomm and Apple iOS abandoned it when it changed from OKL4 to seL4? I thought they use it for isolating their modem firmware from general OS.