1 ========================
2 Hardware vulnerabilities
3 ========================
5 This section describes CPU vulnerabilities and provides an overview of the
6 possible mitigations along with guidance for selecting mitigations if they
7 are configurable at compile, boot or run time.