Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:arch\x86\kernel\cpu\bugs.c Create Date:2022-07-28 07:56:21
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:__ssb_select_mitigation

Proto:static enum ssb_mitigation __init __ssb_select_mitigation(void)

Type:enum ssb_mitigation

Parameter:Nothing

1021  mode = SPEC_STORE_BYPASS_NONE
1024  If Not boot_cpu_has(Speculative Store Bypass Disable ) Then Return mode
1027  cmd = ssb_parse_cmdline()
1028  If Not boot_cpu_has_bug(CPU is affected by speculative store bypass attack ) && ( cmd == SPEC_STORE_BYPASS_CMD_NONE || cmd == SPEC_STORE_BYPASS_CMD_AUTO ) Then Return mode
1034  Case cmd == SPEC_STORE_BYPASS_CMD_AUTO
1035  Case cmd == SPEC_STORE_BYPASS_CMD_SECCOMP
1040  If IS_ENABLED(CONFIG_FOO) evaluates to 1 if CONFIG_FOO is set to 'y' or 'm',* 0 otherwise.(CONFIG_SECCOMP) Then mode = SPEC_STORE_BYPASS_SECCOMP
1042  Else mode = SPEC_STORE_BYPASS_PRCTL
1044  Break
1045  Case cmd == SPEC_STORE_BYPASS_CMD_ON
1046  mode = SPEC_STORE_BYPASS_DISABLE
1047  Break
1048  Case cmd == SPEC_STORE_BYPASS_CMD_PRCTL
1049  mode = SPEC_STORE_BYPASS_PRCTL
1050  Break
1051  Case cmd == SPEC_STORE_BYPASS_CMD_NONE
1052  Break
1060  If static_cpu_has("" Speculative Store Bypass Disable ) || static_cpu_has("" Speculative Store Bypass Disable ) Then
1062  The vendor and possibly platform specific bits which can be modified in* x86_spec_ctrl_base. |= Speculative Store Bypass Disable
1071  If mode == SPEC_STORE_BYPASS_DISABLE Then
1072  setup_force_cpu_cap("" Disable Speculative Store Bypass. )
1080  Else
1086  Return mode
Caller
NameDescribe
ssb_select_mitigation