1 ======================== 1 ======================== 2 Hardware vulnerabilities 2 Hardware vulnerabilities 3 ======================== 3 ======================== 4 4 5 This section describes CPU vulnerabilities and 5 This section describes CPU vulnerabilities and provides an overview of the 6 possible mitigations along with guidance for s 6 possible mitigations along with guidance for selecting mitigations if they 7 are configurable at compile, boot or run time. 7 are configurable at compile, boot or run time. 8 8 9 .. toctree:: 9 .. toctree:: 10 :maxdepth: 1 10 :maxdepth: 1 11 11 12 spectre 12 spectre 13 l1tf 13 l1tf 14 mds 14 mds 15 tsx_async_abort 15 tsx_async_abort 16 multihit 16 multihit 17 special-register-buffer-data-sampling 17 special-register-buffer-data-sampling 18 core-scheduling 18 core-scheduling 19 l1d_flush 19 l1d_flush 20 processor_mmio_stale_data 20 processor_mmio_stale_data 21 cross-thread-rsb 21 cross-thread-rsb 22 srso 22 srso 23 gather_data_sampling 23 gather_data_sampling 24 reg-file-data-sampling 24 reg-file-data-sampling
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.