1======================== 2Hardware vulnerabilities 3======================== 4 5This section describes CPU vulnerabilities and provides an overview of the 6possible mitigations along with guidance for selecting mitigations if they 7are configurable at compile, boot or run time. 8 9.. toctree:: 10 :maxdepth: 1 11 12 attack_vector_controls 13 spectre 14 l1tf 15 mds 16 tsx_async_abort 17 multihit 18 special-register-buffer-data-sampling 19 core-scheduling 20 l1d_flush 21 processor_mmio_stale_data 22 cross-thread-rsb 23 srso 24 gather_data_sampling 25 reg-file-data-sampling 26 rsb 27 old_microcode 28 indirect-target-selection 29