1 ========================
2 Hardware vulnerabilities
3 ========================
5 This section describes CPU vulnerabilities and provides an overview of the
6 possible mitigations along with guidance for selecting mitigations if they
7 are configurable at compile, boot or run time.
16 special-register-buffer-data-sampling