1*65fd4cb6SThomas Gleixner======================== 2*65fd4cb6SThomas GleixnerHardware vulnerabilities 3*65fd4cb6SThomas Gleixner======================== 4*65fd4cb6SThomas Gleixner 5*65fd4cb6SThomas GleixnerThis section describes CPU vulnerabilities and provides an overview of the 6*65fd4cb6SThomas Gleixnerpossible mitigations along with guidance for selecting mitigations if they 7*65fd4cb6SThomas Gleixnerare configurable at compile, boot or run time. 8*65fd4cb6SThomas Gleixner 9*65fd4cb6SThomas Gleixner.. toctree:: 10*65fd4cb6SThomas Gleixner :maxdepth: 1 11*65fd4cb6SThomas Gleixner 12*65fd4cb6SThomas Gleixner l1tf 13