Logo of The Linux Kernel

The Linux Kernel

6.17.0-rc7

快速搜尋

Contents

  • Development process
  • 提交補釘
  • 行為守則
  • 維護者手冊
  • All development-process docs
  • 核心 API
  • Driver APIs
  • 子系統
  • Locking
  • Licensing rules
  • 撰寫文件
  • 開發工具
  • 測試指南
  • Hacking guide
  • Tracing
  • Fault injection
  • Livepatching
  • Rust
  • Administration
    • General guides to kernel administration
      • Linux kernel release 6.x <http://kernel.org/>
      • Linux allocated devices (4.x+ version)
      • Feature status on all architectures
      • Rules on how to access information in sysfs
      • Documentation for /proc/sys
      • How CPU topology info is exported via sysfs
      • Linux ABI description
      • Hardware vulnerabilities
      • Linux Security Module Usage
      • Perf events and tool security
    • Booting the kernel
    • Tracking down and identifying problems
    • Core-kernel subsystems
    • Block-layer and filesystem administration
    • Device-specific guides
    • Workload analysis
    • Everything else
  • 建置系統
  • 回報議題
  • 使用者空間工具
  • 使用者空間 API
  • 韌體
  • 韌體與裝置樹
  • CPU 架構
  • 未排序的文件

本頁

  • 顯示原始碼

Hardware vulnerabilities¶

This section describes CPU vulnerabilities and provides an overview of the possible mitigations along with guidance for selecting mitigations if they are configurable at compile, boot or run time.

  • Attack Vector Controls
  • Spectre Side Channels
  • L1TF - L1 Terminal Fault
  • MDS - Microarchitectural Data Sampling
  • TAA - TSX Asynchronous Abort
  • iTLB multihit
  • SRBDS - Special Register Buffer Data Sampling
  • Core Scheduling
  • L1D Flushing
  • Processor MMIO Stale Data Vulnerabilities
  • Cross-Thread Return Address Predictions
  • Speculative Return Stack Overflow (SRSO)
  • GDS - Gather Data Sampling
  • Register File Data Sampling (RFDS)
  • RSB-related mitigations
  • Old Microcode
  • Indirect Target Selection (ITS)
  • VMSCAPE
©The kernel development community. | Powered by Sphinx 8.2.3 & Alabaster 1.0.0 | Page source