Lines Matching +full:i +full:- +full:leak +full:- +full:current

1 .. SPDX-License-Identifier: GPL-2.0
15 ----------------
16 A cross-HT attack involves the attacker and victim running on different Hyper
18 full mitigation of cross-HT attacks is to disable Hyper Threading (HT). Core
19 scheduling is a scheduler feature that can mitigate some (not all) cross-HT
21 user-designated trusted group can share a core. This increase in core sharing
27 core involves additional overhead - especially when the system is lightly
29 scheduling to perform more poorly compared to SMT-disabled, where N_CPUS is the
33 -----
35 Using this feature, userspace defines groups of tasks that can be co-scheduled
55 - ``PR_SCHED_CORE_GET`` -- get core_sched cookie of ``pid``.
56 - ``PR_SCHED_CORE_CREATE`` -- create a new unique cookie for ``pid``.
57 - ``PR_SCHED_CORE_SHARE_TO`` -- push core_sched cookie to ``pid``.
58 - ``PR_SCHED_CORE_SHARE_FROM`` -- pull core_sched cookie from ``pid``.
65 ``PR_SCHED_CORE_SCOPE_``-prefixed macro constants. For example, if arg4
80 cookie and thus a core is to rely on the fact that the core-sched cookie is
83 same core-sched group.
87 Transferring a cookie between the current and other tasks is possible using
94 ---------------------
115 then the sibling is considered to be in a `forced idle` state. I.e., it may
119 Forced-idling of hyperthreads
130 When the highest priority task is selected to run, a reschedule-IPI is sent to
136 A idle -> user space user space -> idle
137 B idle -> user space guest -> idle
138 C idle -> guest user space -> idle
139 D idle -> guest guest -> idle
144 in the case of guests. At best, this would only leak some scheduler metadata
157 and are considered system-wide trusted. The forced-idling of siblings running
158 cookie-0 tasks is also avoided.
164 Limitations of core-scheduling
165 ------------------------------
179 starts to run and this is a possibility for data leak.
181 Open cross-HT issues that core scheduling does not solve
182 --------------------------------------------------------
218 ---------------
219 The main use case for Core scheduling is mitigating the cross-HT vulnerabilities
222 - Isolating tasks that needs a whole core: Examples include realtime tasks, tasks
224 - Gang scheduling: Requirements for a group of tasks that needs to be scheduled