Drop the comment about mitigations of CPU vulnerabilities
[kconfig-hardened-check.git] / kconfig_hardened_check / __init__.py
index 8130dd4027a89fb27bddd463ac374f329a3bfb3d..fbbc3aa8e4bffa69adbfeb15c85cf14f5e2c5c25 100644 (file)
 # Please don't cry if my Python code looks like C.
 #
 #
-# N.B Hardening command line parameters:
+# N.B Missing hardening command line parameters:
 #    iommu=force (does it help against DMA attacks?)
 #
-#    Mitigations of CPU vulnerabilities:
-#       Аrch-independent:
-#       X86:
-#           l1d_flush=on (a part of the l1tf option)
-#
 #    Hardware tag-based KASAN with arm64 Memory Tagging Extension (MTE):
 #           kasan=on
 #           kasan.stacktrace=off