Commit 9178899d by Alexander Popov

Drop the comment about mitigations of CPU vulnerabilities

The corresponding checks have been developed.
parent 145f48a0
......@@ -10,31 +10,9 @@
# Please don't cry if my Python code looks like C.
#
#
# N.B Hardening command line parameters:
# N.B Missing hardening command line parameters:
# iommu=force (does it help against DMA attacks?)
#
# The list of disabled mitigations of CPU vulnerabilities:
# mitigations=off
# pti=off
# spectre_v2=off
# spectre_v2_user=off
# spec_store_bypass_disable=off
# l1tf=off
# mds=off
# tsx_async_abort=off
# srbds=off
# mmio_stale_data=off
# retbleed=off
# nopti
# nokaslr
# nospectre_v1
# nospectre_v2
# nospectre_bhb
# nospec_store_bypass_disable
# kpti=0
# ssbd=force-off
# nosmt (enabled)
#
# Hardware tag-based KASAN with arm64 Memory Tagging Extension (MTE):
# kasan=on
# kasan.stacktrace=off
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment