165fd4cb6SThomas Gleixner======================== 265fd4cb6SThomas GleixnerHardware vulnerabilities 365fd4cb6SThomas Gleixner======================== 465fd4cb6SThomas Gleixner 565fd4cb6SThomas GleixnerThis section describes CPU vulnerabilities and provides an overview of the 665fd4cb6SThomas Gleixnerpossible mitigations along with guidance for selecting mitigations if they 765fd4cb6SThomas Gleixnerare configurable at compile, boot or run time. 865fd4cb6SThomas Gleixner 965fd4cb6SThomas Gleixner.. toctree:: 1065fd4cb6SThomas Gleixner :maxdepth: 1 1165fd4cb6SThomas Gleixner 126e885594STim Chen spectre 1365fd4cb6SThomas Gleixner l1tf 145999bbe7SThomas Gleixner mds 15a7a248c5SPawan Gupta tsx_async_abort 16182ac870SBorislav Petkov (AMD) multihit 17182ac870SBorislav Petkov (AMD) special-register-buffer-data-sampling 18182ac870SBorislav Petkov (AMD) core-scheduling 19182ac870SBorislav Petkov (AMD) l1d_flush 20182ac870SBorislav Petkov (AMD) processor_mmio_stale_data 21182ac870SBorislav Petkov (AMD) cross-thread-rsb 22fb3bd914SBorislav Petkov (AMD) srso 23182ac870SBorislav Petkov (AMD) gather_data_sampling 24*4e42765dSPawan Gupta reg-file-data-sampling 25