projects
/
kconfig-hardened-check.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Drop the comment about mitigations of CPU vulnerabilities
[kconfig-hardened-check.git]
/
kconfig_hardened_check
/
__init__.py
diff --git
a/kconfig_hardened_check/__init__.py
b/kconfig_hardened_check/__init__.py
index 8130dd4027a89fb27bddd463ac374f329a3bfb3d..fbbc3aa8e4bffa69adbfeb15c85cf14f5e2c5c25 100644
(file)
--- a/
kconfig_hardened_check/__init__.py
+++ b/
kconfig_hardened_check/__init__.py
@@
-10,14
+10,9
@@
# Please don't cry if my Python code looks like C.
#
#
# Please don't cry if my Python code looks like C.
#
#
-# N.B
H
ardening command line parameters:
+# N.B
Missing h
ardening command line parameters:
# iommu=force (does it help against DMA attacks?)
#
# iommu=force (does it help against DMA attacks?)
#
-# Mitigations of CPU vulnerabilities:
-# Аrch-independent:
-# X86:
-# l1d_flush=on (a part of the l1tf option)
-#
# Hardware tag-based KASAN with arm64 Memory Tagging Extension (MTE):
# kasan=on
# kasan.stacktrace=off
# Hardware tag-based KASAN with arm64 Memory Tagging Extension (MTE):
# kasan=on
# kasan.stacktrace=off