mirror of
https://github.com/linuxkit/linuxkit.git
synced 2025-07-21 01:59:07 +00:00
okernel: Make README more Markdown friendly
Signed-off-by: Anil Madhavapeddy <anil@docker.com>
This commit is contained in:
parent
bb49cab9c2
commit
c3d4049180
@ -1,6 +1,6 @@
|
|||||||
Authors: Chris Dalton <cid@hpi.com>, Nigel Edwards <nigel.edwards@hpe.com>
|
Authors: Chris Dalton <cid@hpi.com>, Nigel Edwards <nigel.edwards@hpe.com>
|
||||||
|
|
||||||
Split Kernel
|
# Split Kernel
|
||||||
|
|
||||||
Similar to the nested-kernel work for BSD by Dautenhan[1], the aim of
|
Similar to the nested-kernel work for BSD by Dautenhan[1], the aim of
|
||||||
the split kernel is to introduce a level of intra-kernel protection
|
the split kernel is to introduce a level of intra-kernel protection
|
||||||
@ -64,8 +64,7 @@ conflict with permissions in the lower-level page tables, a VMEXIT (in
|
|||||||
the current prototype which uses Intel VMX) is triggered. R-mode is
|
the current prototype which uses Intel VMX) is triggered. R-mode is
|
||||||
then entered where will handle the permission violation.
|
then entered where will handle the permission violation.
|
||||||
|
|
||||||
|
# Limitations and Caveats
|
||||||
LIMITATIONS AND CAVEATS
|
|
||||||
|
|
||||||
The current implementation does not have any protection of the kernel
|
The current implementation does not have any protection of the kernel
|
||||||
in place yet. It is a demonstration that you can create processes run
|
in place yet. It is a demonstration that you can create processes run
|
||||||
@ -83,16 +82,14 @@ are:
|
|||||||
- Protection of kernel executable code RX only
|
- Protection of kernel executable code RX only
|
||||||
- Protection of kernel data structures RO
|
- Protection of kernel data structures RO
|
||||||
|
|
||||||
|
# References
|
||||||
|
|
||||||
REFERENCES:
|
- [1] Nested Kernel: An Operating System Architecture for Intra-Kernel
|
||||||
|
|
||||||
[1] Nested Kernel: An Operating System Architecture for Intra-Kernel
|
|
||||||
Privilege Separation, Nathan Dautenhahn, Theodoros Kasampalis, Will
|
Privilege Separation, Nathan Dautenhahn, Theodoros Kasampalis, Will
|
||||||
Dietz, John Criswell, Vikram Adve, ASPLOS '15, Proceedings of the
|
Dietz, John Criswell, Vikram Adve, ASPLOS '15, Proceedings of the
|
||||||
Twentieth International Conference on Architectural Support for
|
Twentieth International Conference on Architectural Support for
|
||||||
Programming Languages and Operating Systems, March 2015.
|
Programming Languages and Operating Systems, March 2015.
|
||||||
|
- [2] Dune: Safe user-level access to privileged CPU features, Adam
|
||||||
[2] Dune: Safe user-level access to privileged CPU features, Adam
|
|
||||||
Belay, Andrea Bittau, Ali Mashtizadeh, David Terei, David Mazières,
|
Belay, Andrea Bittau, Ali Mashtizadeh, David Terei, David Mazières,
|
||||||
and Christos Kozyrakis, OSDI '12, Proceedings of the 10th USENIX
|
and Christos Kozyrakis, OSDI '12, Proceedings of the 10th USENIX
|
||||||
Symposium on Operating Systems Design and Implementation, October
|
Symposium on Operating Systems Design and Implementation, October
|
||||||
|
Loading…
Reference in New Issue
Block a user