Function report |
Source Code:arch\x86\kernel\cpu\bugs.c |
Create Date:2022-07-28 07:56:21 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:__ssb_select_mitigation
Proto:static enum ssb_mitigation __init __ssb_select_mitigation(void)
Type:enum ssb_mitigation
Parameter:Nothing
1021 | mode = SPEC_STORE_BYPASS_NONE |
1024 | If Not boot_cpu_has(Speculative Store Bypass Disable ) Then Return mode |
1027 | cmd = ssb_parse_cmdline() |
1028 | If Not boot_cpu_has_bug(CPU is affected by speculative store bypass attack ) && ( cmd == SPEC_STORE_BYPASS_CMD_NONE || cmd == SPEC_STORE_BYPASS_CMD_AUTO ) Then Return mode |
1034 | Case cmd == SPEC_STORE_BYPASS_CMD_AUTO |
1035 | Case cmd == SPEC_STORE_BYPASS_CMD_SECCOMP |
1040 | If IS_ENABLED(CONFIG_FOO) evaluates to 1 if CONFIG_FOO is set to 'y' or 'm',* 0 otherwise.(CONFIG_SECCOMP) Then mode = SPEC_STORE_BYPASS_SECCOMP |
1042 | Else mode = SPEC_STORE_BYPASS_PRCTL |
1044 | Break |
1045 | Case cmd == SPEC_STORE_BYPASS_CMD_ON |
1046 | mode = SPEC_STORE_BYPASS_DISABLE |
1047 | Break |
1048 | Case cmd == SPEC_STORE_BYPASS_CMD_PRCTL |
1049 | mode = SPEC_STORE_BYPASS_PRCTL |
1050 | Break |
1051 | Case cmd == SPEC_STORE_BYPASS_CMD_NONE |
1052 | Break |
1071 | If mode == SPEC_STORE_BYPASS_DISABLE Then |
1077 | If Not static_cpu_has("" Speculative Store Bypass Disable ) && Not static_cpu_has("" Speculative Store Bypass Disable ) Then |
1079 | x86_amd_ssb_disable() |
1080 | Else |
1086 | Return mode |
Name | Describe |
---|---|
ssb_select_mitigation |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |