mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git
synced 2026-04-18 03:23:53 -04:00
VMSCAPE is a vulnerability that may allow a guest to influence the branch prediction in host userspace, particularly affecting hypervisors like QEMU. Add the documentation. Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com> Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com> Reviewed-by: Borislav Petkov (AMD) <bp@alien8.de> Reviewed-by: Dave Hansen <dave.hansen@linux.intel.com>
30 lines
631 B
ReStructuredText
30 lines
631 B
ReStructuredText
========================
|
|
Hardware vulnerabilities
|
|
========================
|
|
|
|
This section describes CPU vulnerabilities and provides an overview of the
|
|
possible mitigations along with guidance for selecting mitigations if they
|
|
are configurable at compile, boot or run time.
|
|
|
|
.. toctree::
|
|
:maxdepth: 1
|
|
|
|
attack_vector_controls
|
|
spectre
|
|
l1tf
|
|
mds
|
|
tsx_async_abort
|
|
multihit
|
|
special-register-buffer-data-sampling
|
|
core-scheduling
|
|
l1d_flush
|
|
processor_mmio_stale_data
|
|
cross-thread-rsb
|
|
srso
|
|
gather_data_sampling
|
|
reg-file-data-sampling
|
|
rsb
|
|
old_microcode
|
|
indirect-target-selection
|
|
vmscape
|