Skip to content

Commit 4882767

Browse files
committed
Detailing SELinux,cgroups pros and cons vs Hypervisor.
Add details about SELinux cgroups vs hypervisor Signed-off-by: igor stoppa <[email protected]>
1 parent 47650a7 commit 4882767

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

docs/Interference_Scenarios_for_an_ARM64_Linux_System.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -472,6 +472,16 @@ This is perfectly fine from the perspective of containing user-space, however, s
472472
frequency execution of a large amount of code which can cause either direct or indirect interference.
473473
And such interference is not always detectable, depending on which component it might affect.
474474

475+
These means are usualy enabled in a mixed criticality scenario, when attempting to contain interference.
476+
The choice of enabling them, despite the associated risk, might be driven by overall considerations about choosingthe lesser evil.
477+
Of course one could attemtp to qualify them, but then it is necessary to consider the fact that in reality it is necessary to qualify them together with the user-space-provided policies they will enact.
478+
Without being configured by user-space, neither SELinux nor cgroups are of any particular use.
479+
480+
An alternative - possibly more costly - path could be to instead isolate more safety relevant loads from non safety relevant ones, introducing a second virtual machine, with an hypervisor underneath.
481+
The caveat is that now the hypervisor can be a source of interference. And it is also necessary to have HW capable to support an EL2.
482+
It can be an interesting alternative, though, if using a Type1 hypervisor (like Xen), because it is relatively simpler than trying to qualify the Linux code.
483+
484+
475485
## Sources of Interference
476486
It is useful to model the most probable causes for spatial interference, even if not exhaustively.
477487

0 commit comments

Comments
 (0)