1 ========================
2 Hardware vulnerabilities
3 ========================
5 This section describes CPU vulnerabilities and provides an overview of the
6 possible mitigations along with guidance for selecting mitigations if they
7 are configurable at compile, boot or run time.
17 special-register-buffer-data-sampling.rst
18 processor_mmio_stale_data.rst
19 gather_data_sampling.rst
21 reg-file-data-sampling