Skip to content

Commit 5f54eda

Browse files
Update docs/Interference_Scenarios_for_an_ARM64_Linux_System.md
Co-authored-by: Paul Albertella <[email protected]> Signed-off-by: Igor Stoppa <[email protected]>
1 parent 4882767 commit 5f54eda

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

docs/Interference_Scenarios_for_an_ARM64_Linux_System.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -472,8 +472,8 @@ This is perfectly fine from the perspective of containing user-space, however, s
472472
frequency execution of a large amount of code which can cause either direct or indirect interference.
473473
And such interference is not always detectable, depending on which component it might affect.
474474

475-
These means are usualy enabled in a mixed criticality scenario, when attempting to contain interference.
476-
The choice of enabling them, despite the associated risk, might be driven by overall considerations about choosingthe lesser evil.
475+
These features are usually enabled in a mixed criticality scenario, when attempting to contain interference.
476+
The choice of enabling them, despite the associated risk, might be driven by overall considerations about choosing the lesser evil.
477477
Of course one could attemtp to qualify them, but then it is necessary to consider the fact that in reality it is necessary to qualify them together with the user-space-provided policies they will enact.
478478
Without being configured by user-space, neither SELinux nor cgroups are of any particular use.
479479

0 commit comments

Comments
 (0)