Function report |
Source Code:arch\x86\kernel\cpu\bugs.c |
Create Date:2022-07-28 07:56:21 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:__ssb_select_mitigation
Proto:static enum ssb_mitigation __init __ssb_select_mitigation(void)
Type:enum ssb_mitigation
Parameter:Nothing
| 1021 | mode = SPEC_STORE_BYPASS_NONE |
| 1024 | If Not boot_cpu_has(Speculative Store Bypass Disable ) Then Return mode |
| 1027 | cmd = ssb_parse_cmdline() |
| 1028 | If Not boot_cpu_has_bug(CPU is affected by speculative store bypass attack ) && ( cmd == SPEC_STORE_BYPASS_CMD_NONE || cmd == SPEC_STORE_BYPASS_CMD_AUTO ) Then Return mode |
| 1034 | Case cmd == SPEC_STORE_BYPASS_CMD_AUTO |
| 1035 | Case cmd == SPEC_STORE_BYPASS_CMD_SECCOMP |
| 1040 | If IS_ENABLED(CONFIG_FOO) evaluates to 1 if CONFIG_FOO is set to 'y' or 'm',* 0 otherwise.(CONFIG_SECCOMP) Then mode = SPEC_STORE_BYPASS_SECCOMP |
| 1042 | Else mode = SPEC_STORE_BYPASS_PRCTL |
| 1044 | Break |
| 1045 | Case cmd == SPEC_STORE_BYPASS_CMD_ON |
| 1046 | mode = SPEC_STORE_BYPASS_DISABLE |
| 1047 | Break |
| 1048 | Case cmd == SPEC_STORE_BYPASS_CMD_PRCTL |
| 1049 | mode = SPEC_STORE_BYPASS_PRCTL |
| 1050 | Break |
| 1051 | Case cmd == SPEC_STORE_BYPASS_CMD_NONE |
| 1052 | Break |
| 1071 | If mode == SPEC_STORE_BYPASS_DISABLE Then |
| 1077 | If Not static_cpu_has("" Speculative Store Bypass Disable ) && Not static_cpu_has("" Speculative Store Bypass Disable ) Then |
| 1079 | x86_amd_ssb_disable() |
| 1080 | Else |
| 1086 | Return mode |
| Name | Describe |
|---|---|
| ssb_select_mitigation |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |