1 ======================== 1 ======================== 2 Hardware vulnerabilities 2 Hardware vulnerabilities 3 ======================== 3 ======================== 4 4 5 This section describes CPU vulnerabilities and 5 This section describes CPU vulnerabilities and provides an overview of the 6 possible mitigations along with guidance for s 6 possible mitigations along with guidance for selecting mitigations if they 7 are configurable at compile, boot or run time. 7 are configurable at compile, boot or run time. 8 8 9 .. toctree:: 9 .. toctree:: 10 :maxdepth: 1 10 :maxdepth: 1 11 11 12 spectre 12 spectre 13 l1tf 13 l1tf 14 mds 14 mds 15 tsx_async_abort 15 tsx_async_abort 16 multihit !! 16 multihit.rst 17 special-register-buffer-data-sampling << 18 core-scheduling << 19 l1d_flush << 20 processor_mmio_stale_data << 21 cross-thread-rsb << 22 srso << 23 gather_data_sampling << 24 reg-file-data-sampling <<
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.