1======================== 2Hardware vulnerabilities 3======================== 4 5This section describes CPU vulnerabilities and provides an overview of the 6possible mitigations along with guidance for selecting mitigations if they 7are configurable at compile, boot or run time. 8 9.. toctree:: 10 :maxdepth: 1 11 12 spectre 13 l1tf 14 mds 15 tsx_async_abort 16 multihit.rst 17 special-register-buffer-data-sampling.rst 18