Function report | 
Source Code:arch\x86\kernel\cpu\bugs.c | 
Create Date:2022-07-28 07:56:21 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:__ssb_select_mitigation
Proto:static enum ssb_mitigation __init __ssb_select_mitigation(void)
Type:enum ssb_mitigation
Parameter:Nothing
| 1021 | mode = SPEC_STORE_BYPASS_NONE | 
| 1024 | If Not boot_cpu_has(Speculative Store Bypass Disable ) Then Return mode | 
| 1027 | cmd = ssb_parse_cmdline() | 
| 1028 | If Not boot_cpu_has_bug(CPU is affected by speculative store bypass attack ) && ( cmd == SPEC_STORE_BYPASS_CMD_NONE || cmd == SPEC_STORE_BYPASS_CMD_AUTO ) Then Return mode | 
| 1034 | Case cmd == SPEC_STORE_BYPASS_CMD_AUTO | 
| 1035 | Case cmd == SPEC_STORE_BYPASS_CMD_SECCOMP | 
| 1040 | If IS_ENABLED(CONFIG_FOO) evaluates to 1 if CONFIG_FOO is set to 'y' or 'm',* 0 otherwise.(CONFIG_SECCOMP) Then mode = SPEC_STORE_BYPASS_SECCOMP | 
| 1042 | Else mode = SPEC_STORE_BYPASS_PRCTL | 
| 1044 | Break | 
| 1045 | Case cmd == SPEC_STORE_BYPASS_CMD_ON | 
| 1046 | mode = SPEC_STORE_BYPASS_DISABLE | 
| 1047 | Break | 
| 1048 | Case cmd == SPEC_STORE_BYPASS_CMD_PRCTL | 
| 1049 | mode = SPEC_STORE_BYPASS_PRCTL | 
| 1050 | Break | 
| 1051 | Case cmd == SPEC_STORE_BYPASS_CMD_NONE | 
| 1052 | Break | 
| 1071 | If mode == SPEC_STORE_BYPASS_DISABLE Then | 
| 1077 | If Not static_cpu_has("" Speculative Store Bypass Disable ) && Not static_cpu_has("" Speculative Store Bypass Disable ) Then | 
| 1079 | x86_amd_ssb_disable() | 
| 1080 | Else | 
| 1086 | Return mode | 
| Name | Describe | 
|---|---|
| ssb_select_mitigation | 
| Source code conversion tool public plug-in interface  | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion  |