Skip to content

Commit 2df93ae

Browse files
Update docs/Interference_Scenarios_for_an_ARM64_Linux_System.md
Co-authored-by: Paul Albertella <[email protected]> Signed-off-by: Igor Stoppa <[email protected]>
1 parent 5f54eda commit 2df93ae

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/Interference_Scenarios_for_an_ARM64_Linux_System.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -477,7 +477,7 @@ The choice of enabling them, despite the associated risk, might be driven by ove
477477
Of course one could attemtp to qualify them, but then it is necessary to consider the fact that in reality it is necessary to qualify them together with the user-space-provided policies they will enact.
478478
Without being configured by user-space, neither SELinux nor cgroups are of any particular use.
479479

480-
An alternative - possibly more costly - path could be to instead isolate more safety relevant loads from non safety relevant ones, introducing a second virtual machine, with an hypervisor underneath.
480+
An alternative - possibly more costly - path could be to instead isolate more safety-relevant loads from non-safety-relevant ones, introducing a second virtual machine, with a hypervisor underneath.
481481
The caveat is that now the hypervisor can be a source of interference. And it is also necessary to have HW capable to support an EL2.
482482
It can be an interesting alternative, though, if using a Type1 hypervisor (like Xen), because it is relatively simpler than trying to qualify the Linux code.
483483

0 commit comments

Comments
 (0)