1 ======================== 1 ======================== 2 Hardware vulnerabilities 2 Hardware vulnerabilities 3 ======================== 3 ======================== 4 4 5 This section describes CPU vulnerabilities and 5 This section describes CPU vulnerabilities and provides an overview of the 6 possible mitigations along with guidance for s 6 possible mitigations along with guidance for selecting mitigations if they 7 are configurable at compile, boot or run time. 7 are configurable at compile, boot or run time. 8 8 9 .. toctree:: 9 .. toctree:: 10 :maxdepth: 1 10 :maxdepth: 1 11 11 12 spectre 12 spectre 13 l1tf 13 l1tf 14 mds 14 mds 15 tsx_async_abort 15 tsx_async_abort 16 multihit !! 16 multihit.rst 17 special-register-buffer-data-sampling !! 17 special-register-buffer-data-sampling.rst 18 core-scheduling !! 18 core-scheduling.rst 19 l1d_flush !! 19 l1d_flush.rst 20 processor_mmio_stale_data !! 20 processor_mmio_stale_data.rst 21 cross-thread-rsb !! 21 cross-thread-rsb.rst >> 22 gather_data_sampling.rst 22 srso 23 srso 23 gather_data_sampling << 24 reg-file-data-sampling 24 reg-file-data-sampling
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.