Commit 145f48a0 by Alexander Popov

Save the list of disabled mitigations of CPU vulnerabilities (for history)

parent 732eac6e
......@@ -13,10 +13,27 @@
# N.B Hardening command line parameters:
# iommu=force (does it help against DMA attacks?)
#
# Mitigations of CPU vulnerabilities:
# Аrch-independent:
# X86:
# l1d_flush=on (a part of the l1tf option)
# The list of disabled mitigations of CPU vulnerabilities:
# mitigations=off
# pti=off
# spectre_v2=off
# spectre_v2_user=off
# spec_store_bypass_disable=off
# l1tf=off
# mds=off
# tsx_async_abort=off
# srbds=off
# mmio_stale_data=off
# retbleed=off
# nopti
# nokaslr
# nospectre_v1
# nospectre_v2
# nospectre_bhb
# nospec_store_bypass_disable
# kpti=0
# ssbd=force-off
# nosmt (enabled)
#
# Hardware tag-based KASAN with arm64 Memory Tagging Extension (MTE):
# kasan=on
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment