Core Scheduling - Taming Hyper-Threads to Be Secure

Core Scheduling - Taming Hyper-Threads to Be Secure

Linux Plumbers Conference via YouTube Direct link

Vruntime comparison corner cases after normalization

12 of 20

12 of 20

Vruntime comparison corner cases after normalization

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Core Scheduling - Taming Hyper-Threads to Be Secure

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 A brief history of side-channel attacks
  3. 3 Core Scheduling: Concepts
  4. 4 Core Scheduling : task match
  5. 5 Core Scheduling: History
  6. 6 Core Scheduling: KVM based approach
  7. 7 Core Scheduling Generic Approach
  8. 8 Core Scheduling Implementation details
  9. 9 Core Scheduling: Iterations
  10. 10 Core Scheduling: Implementation Issues
  11. 11 Core Scheduling: vruntime comparison
  12. 12 Vruntime comparison corner cases after normalization
  13. 13 Forced idle corner case example
  14. 14 Proposed Solutions
  15. 15 Testing methodology
  16. 16 Co-scheduling stats example
  17. 17 Performance validation
  18. 18 Early performance results: CPU
  19. 19 Early performance results: mixed resources
  20. 20 Core Scheduling : Post v3 and beyond

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.