# tsx=off
# ARM64:
# kpti=on
-# ssbd=force-on
#
-# Should NOT be set:
-# sysrq_always_enabled
-# arm64.nobti
-# arm64.nopauth
# arm64.nomte
#
# Hardware tag-based KASAN with arm64 Memory Tagging Extension (MTE):
l += [CmdlineCheck('self_protection', 'defconfig', 'nospectre_v1', 'is not set')]
l += [CmdlineCheck('self_protection', 'defconfig', 'nospectre_v2', 'is not set')]
l += [CmdlineCheck('self_protection', 'defconfig', 'nospec_store_bypass_disable', 'is not set')]
+ l += [CmdlineCheck('self_protection', 'defconfig', 'arm64.nobti', 'is not set')]
+ l += [CmdlineCheck('self_protection', 'defconfig', 'arm64.nopauth', 'is not set')]
l += [OR(CmdlineCheck('self_protection', 'defconfig', 'mitigations', 'is not off'),
CmdlineCheck('self_protection', 'defconfig', 'mitigations', 'is not set'))]
l += [OR(CmdlineCheck('self_protection', 'defconfig', 'spectre_v2', 'is not off'),
l += [OR(CmdlineCheck('self_protection', 'defconfig', 'retbleed', 'is not off'),
CmdlineCheck('self_protection', 'defconfig', 'retbleed', 'is not set'))]
if arch == 'ARM64':
+ l += [OR(CmdlineCheck('self_protection', 'defconfig', 'ssbd', 'kernel'),
+ CmdlineCheck('self_protection', 'my', 'ssbd', 'force-on'),
+ CmdlineCheck('self_protection', 'defconfig', 'ssbd', 'is not set'))]
l += [OR(CmdlineCheck('self_protection', 'defconfig', 'rodata', 'full'),
AND(KconfigCheck('self_protection', 'defconfig', 'RODATA_FULL_DEFAULT_ENABLED', 'y'),
CmdlineCheck('self_protection', 'defconfig', 'rodata', 'is not set')))]
l += [OR(CmdlineCheck('cut_attack_surface', 'grsec', 'debugfs', 'off'),
KconfigCheck('cut_attack_surface', 'grsec', 'DEBUG_FS', 'is not set'))] # ... the end
+ # 'cut_attack_surface', 'my'
+ l += [CmdlineCheck('cut_attack_surface', 'my', 'sysrq_always_enabled', 'is not set')]
def print_unknown_options(checklist, parsed_options):
known_options = []