165fd4cb6SThomas Gleixner======================== 265fd4cb6SThomas GleixnerHardware vulnerabilities 365fd4cb6SThomas Gleixner======================== 465fd4cb6SThomas Gleixner 565fd4cb6SThomas GleixnerThis section describes CPU vulnerabilities and provides an overview of the 665fd4cb6SThomas Gleixnerpossible mitigations along with guidance for selecting mitigations if they 765fd4cb6SThomas Gleixnerare configurable at compile, boot or run time. 865fd4cb6SThomas Gleixner 965fd4cb6SThomas Gleixner.. toctree:: 1065fd4cb6SThomas Gleixner :maxdepth: 1 1165fd4cb6SThomas Gleixner 126e885594STim Chen spectre 1365fd4cb6SThomas Gleixner l1tf 145999bbe7SThomas Gleixner mds 15*a7a248c5SPawan Gupta tsx_async_abort 16