[SystemSafety] Critical systems Linux

Chuck_Petras at selinc.com Chuck_Petras at selinc.com
Tue Nov 20 22:26:15 CET 2018


> I must have missed something. Are we talking here about certifying a 
piece of software with no reference to its operational context and safety 
requirements? 

Pretty much.




From:   Matthew Squair <mattsquair at gmail.com>
To:     Chuck_Petras at selinc.com
Cc:     systemsafety at techfak.uni-bielefeld.de
Date:   11/20/2018 01:15 PM
Subject:        Re: [SystemSafety] Critical systems Linux



I must have missed something. Are we talking here about certifying a piece 
of software with no reference to its operational context and safety 
requirements? 

Matthew Squair

MIEAust, CPEng
Mob: +61 488770655
Email; Mattsquair at gmail.com
Web: https://urldefense.proofpoint.com/v2/url?u=http-3A__criticaluncertainties.com&d=DwIBAg&c=-_uRSsrpJskZgEkGwdW-sXvhn_FXVaEGsm0EI46qilk&r=rbPGBTBfGPLzkUTSzOHB-Rjj23FmdetRDLPJOqC3KU3bIo1A1-_9e8WQ6fRbAK0e&m=mP7ltx1d3xQI0RNT62o_ijOwGMBHkTzh-FZX2hEGblg&s=pPUf5o9RVmLPRDeq35_8DRhMg__ygUES5Zwocf0DTl8&e= [criticaluncertainties.com]

On 21 Nov 2018, at 5:29 am, Chuck_Petras at selinc.com wrote:

There is 

Open Source Automation Development Lab 
Safety Critical Linux 
https://urldefense.proofpoint.com/v2/url?u=http-3A__www.osadl.org_Safety-2DCritical-2DLinux.safety-2Dcritical-2Dlinux.0.html&d=DwIBAg&c=-_uRSsrpJskZgEkGwdW-sXvhn_FXVaEGsm0EI46qilk&r=rbPGBTBfGPLzkUTSzOHB-Rjj23FmdetRDLPJOqC3KU3bIo1A1-_9e8WQ6fRbAK0e&m=mP7ltx1d3xQI0RNT62o_ijOwGMBHkTzh-FZX2hEGblg&s=pbrO6xSOLU2DWnQuhNNSyieSLs6zaZ6t5orC7jyfHSA&e= 
[osadl.org] 
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.osadl.org_SIL2LinuxMP.sil2-2Dlinux-2Dproject.0.html&d=DwIBAg&c=-_uRSsrpJskZgEkGwdW-sXvhn_FXVaEGsm0EI46qilk&r=rbPGBTBfGPLzkUTSzOHB-Rjj23FmdetRDLPJOqC3KU3bIo1A1-_9e8WQ6fRbAK0e&m=mP7ltx1d3xQI0RNT62o_ijOwGMBHkTzh-FZX2hEGblg&s=nShCm8vQC4SzQHQHOeIPAtD6TrLoBeCOXaFiJdbgcsU&e= [osadl.org] 
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.osadl.org_Presentations-2Dand-2DDocuments.safety-2Dcritical-2Ddocuments.0.html&d=DwIBAg&c=-_uRSsrpJskZgEkGwdW-sXvhn_FXVaEGsm0EI46qilk&r=rbPGBTBfGPLzkUTSzOHB-Rjj23FmdetRDLPJOqC3KU3bIo1A1-_9e8WQ6fRbAK0e&m=mP7ltx1d3xQI0RNT62o_ijOwGMBHkTzh-FZX2hEGblg&s=J3wbVsiFEKAMrfy1CkUVvC3mwaogw09-IxEAD7arNrE&e= 
[osadl.org]

Chuck Petras, PE**
Schweitzer Engineering Laboratories, Inc
Pullman, WA  99163  USA
http://www.selinc.com

SEL Synchrophasors - A New View of the Power System <
http://synchrophasor.selinc.com>

Making Electric Power Safer, More Reliable, and More Economical (R)

** Registered in Oregon.


"systemsafety" <systemsafety-bounces at lists.techfak.uni-bielefeld.de> wrote 
on 11/20/2018 09:40:26 AM:

> From: "Chris Hills" <safetyyork at phaedsys.com> 
> To: <systemsafety at techfak.uni-bielefeld.de> 
> Date: 11/20/2018 09:40 AM 
> Subject: [SystemSafety] Critical systems Linux 
> Sent by: "systemsafety" <
systemsafety-bounces at lists.techfak.uni-bielefeld.de> 
> 
> Hi All
> 
> A subversion of the thread to answer one of the points raised by Paul 
and
> almost every Linux aficionado
> 
> > -----Original Message-----
> > bielefeld.de [bielefeld.de]] On Behalf Of Paul Sherwood
> > Sent: Sunday, November 4, 2018 8:54 PM
> 
> > One anti-pattern I've grown a bit tired of is people choosing a
> micro-kernel instead of Linux, because of the notional 'safety cert',
> > and then having to implement tons of custom software in attempting to
> match off-the-shelf Linux functionality or performance. When application
> > of the standards leads to "develop new, from scratch" instead of using
> existing code which is widely used and known to be reliable, something
> > is clearly weird imo.
> 
> The question is:- 
> 
> As Linux is monolithic, already written  (with minimal 
requirements/design
> docs) and not to any coding standard
> How would the world go about making a Certifiable Linux? 
> 
> Is it possible?
> 
> 
> And the question I asked: why do it at all when there are plenty of 
other
> POSIX Compliant RTOS and OS out there that have full Safety 
Certification to
> 61508 SIL3 and  Do178  etc.?
> 
> 
> 
> _______________________________________________
> The System Safety Mailing List
> systemsafety at TechFak.Uni-Bielefeld.DE
_______________________________________________
The System Safety Mailing List
systemsafety at TechFak.Uni-Bielefeld.DE
Manage your subscription: 
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.techfak.uni-2Dbielefeld.de_mailman_listinfo_systemsafety&d=DwIBAg&c=-_uRSsrpJskZgEkGwdW-sXvhn_FXVaEGsm0EI46qilk&r=rbPGBTBfGPLzkUTSzOHB-Rjj23FmdetRDLPJOqC3KU3bIo1A1-_9e8WQ6fRbAK0e&m=mP7ltx1d3xQI0RNT62o_ijOwGMBHkTzh-FZX2hEGblg&s=Woer5U5PmNhZzQpCtr9e3C_Pus-SP1eCeJXvMLNZ4eo&e= 
[lists.techfak.uni-bielefeld.de]

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.techfak.uni-bielefeld.de/mailman/private/systemsafety/attachments/20181120/f18ed812/attachment-0001.html>


More information about the systemsafety mailing list