Function report |
Source Code:arch\x86\kernel\cpu\bugs.c |
Create Date:2022-07-28 07:56:07 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Does SMAP provide full mitigation against speculative kernel access to* userspace?
Proto:static bool smap_works_speculatively(void)
Type:bool
Parameter:Nothing
415 | If Not boot_cpu_has(Supervisor Mode Access Prevention ) Then Return false |
424 | If boot_cpu_has(CPU is affected by meltdown attack and needs kernel page table isolation ) Then Return false |
427 | Return true |
Name | Describe |
---|---|
spectre_v1_select_mitigation |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |