1========================
2Hardware vulnerabilities
3========================
4
5This section describes CPU vulnerabilities and provides an overview of the
6possible mitigations along with guidance for selecting mitigations if they
7are configurable at compile, boot or run time.
8
9.. toctree::
10   :maxdepth: 1
11
12   attack_vector_controls
13   spectre
14   l1tf
15   mds
16   tsx_async_abort
17   multihit
18   special-register-buffer-data-sampling
19   core-scheduling
20   l1d_flush
21   processor_mmio_stale_data
22   cross-thread-rsb
23   srso
24   gather_data_sampling
25   reg-file-data-sampling
26   rsb
27   old_microcode
28   indirect-target-selection
29