From 2fce66039ed85c4e90fecd9dbed356b81f1d7da0 Mon Sep 17 00:00:00 2001 From: Ian Gudger Date: Tue, 2 Apr 2019 10:58:44 -0700 Subject: Tweaks to VM comparison section * Added a comma to improve readability and flow. * Fixed a typo. --- content/docs/architecture_guide/security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/docs/architecture_guide/security.md b/content/docs/architecture_guide/security.md index 79da7c56e..ecc853d2f 100644 --- a/content/docs/architecture_guide/security.md +++ b/content/docs/architecture_guide/security.md @@ -185,7 +185,7 @@ The security of a VM depends to a large extent on what is exposed from the host kernel and user space support code. For example, device emulation code in the host kernel (e.g. APIC) or optimizations (e.g. vhost) can be more complex than a simple system call, and exploits carry the same risks. Similarly, the user space -support code is frequently unsandboxed and exploits, while rare, may allowed +support code is frequently unsandboxed, and exploits, while rare, may allow unfettered access to the system. Some platforms leverage the same virtualization hardware as VMs in order to -- cgit v1.2.3