xref: /linux/Documentation/admin-guide/hw-vuln/index.rst (revision 79790b6818e96c58fe2bffee1b418c16e64e7b80)
165fd4cb6SThomas Gleixner========================
265fd4cb6SThomas GleixnerHardware vulnerabilities
365fd4cb6SThomas Gleixner========================
465fd4cb6SThomas Gleixner
565fd4cb6SThomas GleixnerThis section describes CPU vulnerabilities and provides an overview of the
665fd4cb6SThomas Gleixnerpossible mitigations along with guidance for selecting mitigations if they
765fd4cb6SThomas Gleixnerare configurable at compile, boot or run time.
865fd4cb6SThomas Gleixner
965fd4cb6SThomas Gleixner.. toctree::
1065fd4cb6SThomas Gleixner   :maxdepth: 1
1165fd4cb6SThomas Gleixner
126e885594STim Chen   spectre
1365fd4cb6SThomas Gleixner   l1tf
145999bbe7SThomas Gleixner   mds
15a7a248c5SPawan Gupta   tsx_async_abort
16182ac870SBorislav Petkov (AMD)   multihit
17182ac870SBorislav Petkov (AMD)   special-register-buffer-data-sampling
18182ac870SBorislav Petkov (AMD)   core-scheduling
19182ac870SBorislav Petkov (AMD)   l1d_flush
20182ac870SBorislav Petkov (AMD)   processor_mmio_stale_data
21182ac870SBorislav Petkov (AMD)   cross-thread-rsb
22fb3bd914SBorislav Petkov (AMD)   srso
23182ac870SBorislav Petkov (AMD)   gather_data_sampling
24*4e42765dSPawan Gupta   reg-file-data-sampling
25