Skip to content

Commit f3f6c54

Browse files
committed
Minor improvements
1 parent 772cd8e commit f3f6c54

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

content/showcase/rusty-hermit/index.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,14 +14,14 @@ authors = ["stlankes"]
1414

1515
## Virtualization Designs
1616

17-
Common virtualized environment based on classical **_virtual machines_**. In this case, complete machines are emulated or virtualized and common operating systems are running on both host and guest site:
17+
Common virtualized environments are based on classical **_virtual machines_**. In this case, complete machines are emulated or virtualized and common operating systems are running on both host and guest site:
1818

1919
![Structure of a common virtualitation environment](common_vm.png)
2020

2121
This technique is established (VMware, Hyper-V, etc.) and widely used. However, it introduces additional overhead especially regarding memory consumption and performance.
2222

23-
An alternative approach to common virtual machines is **OS-level
24-
virtualization**, where the kernel allows the existence of multiple
23+
An alternative approach to common virtual machines is **_OS-level
24+
virtualization_**, where the kernel allows the existence of multiple
2525
isolated user space instances. These isolated instances are also known
2626
as container. A typical representative is LXC or Docker and promise less
2727
overhead in comparison to common virtual machines. However, the
@@ -81,10 +81,12 @@ techniques to improve the security behavior like stack guards and
8181
separating the application stack from the libOS stack. However, a
8282
library operating system typically uses a common function call to enter
8383
the kernel. A classical separation of user- and kernel space by
84-
entering a higher privilege level is missing. We presented in a
84+
entering a higher privilege level is missing.
85+
86+
We presented in a
8587
[paper](https://www.ssrg.ece.vt.edu/papers/vee20-mpk.pdf) a modified
8688
version of RustyHermit, which provides an intra-unikernel isolation with
87-
_Intel Memory Protection Keys_ (MPK). MPK is a relatively new hard-ware
89+
_Intel Memory Protection Keys_ (MPK). MPK is a relatively new hardware
8890
primitive that provides per-thread permission control over groups of
8991
pages in a single address space with [negligible switching overhead](https://www.usenix.org/conference/atc19/presentation/park-soyeon),
9092
making it a compelling candidate for use in unikernels.
@@ -144,7 +146,7 @@ hermit-sys = "0.1.*"
144146
features = ["smoltcp"]
145147
```
146148

147-
The feature `smoltcp` is required, if your application tries
149+
The feature `smoltcp` is required if your application tries
148150
to establish a TCP connection. In this case, the library operating systems
149151
includes the TCP/stack [smoltcp](https://github.com/smoltcp-rs/smoltcp).
150152
In addition _hermit-sys_ depends on the tool [cargo-download](https://crates.io/crates/cargo-download) to download required components and must be installed with the command `cargo install cargo-download`.

0 commit comments

Comments
 (0)