1 ========================
2 Hardware vulnerabilities
3 ========================
5 This section describes CPU vulnerabilities and provides an overview of the
6 possible mitigations along with guidance for selecting mitigations if they
7 are configurable at compile, boot or run time.
17 special-register-buffer-data-sampling
20 processor_mmio_stale_data
24 reg-file-data-sampling