One of the criticisms of the current model is that:
a. FR=1 for two procesess in seL4 with a correct caps setup
b. FR=2 for two processes in linux-KVM guests.
But folks would consider (a) to be more secure than (b). We need to somehow in the first case kernel is trusted, and in second case VMM is trusted. And since the kernel is formally verified, the FR path via kernel cannot read to bug exploits.
But what about resource exhaustion in the kernel? Is that a bug?
One of the criticisms of the current model is that:
a. FR=1 for two procesess in seL4 with a correct caps setup b. FR=2 for two processes in linux-KVM guests.
But folks would consider (a) to be more secure than (b). We need to somehow in the first case kernel is trusted, and in second case VMM is trusted. And since the kernel is formally verified, the FR path via kernel cannot read to bug exploits.
But what about resource exhaustion in the kernel? Is that a bug?