1======================== 2Hardware vulnerabilities 3======================== 4 5This section describes CPU vulnerabilities and provides an overview of the 6possible mitigations along with guidance for selecting mitigations if they 7are configurable at compile, boot or run time. 8 9.. toctree:: 10 :maxdepth: 1 11 12 spectre 13 l1tf 14 mds 15 tsx_async_abort 16 multihit 17 special-register-buffer-data-sampling 18 core-scheduling 19 l1d_flush 20 processor_mmio_stale_data 21 cross-thread-rsb 22 srso 23 gather_data_sampling 24 reg-file-data-sampling 25