Function report |
Source Code:arch\x86\kernel\cpu\bugs.c |
Create Date:2022-07-28 07:56:02 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:x86_amd_ssb_disable
Proto:static void x86_amd_ssb_disable(void)
Type:void
Parameter:Nothing
217 | msrval = AMD specific MSR info for Speculative Store Bypass control.* x86_amd_ls_cfg_ssbd_mask is initialized in identify_boot_cpu(). | x86_amd_ls_cfg_ssbd_mask |
219 | If boot_cpu_has(Virtualized Speculative Store Bypass Disable ) Then wrmsrl(MSR_AMD64_VIRT_SPEC_CTRL, Speculative Store Bypass Disable ) |
221 | Else if boot_cpu_has("" AMD SSBD implementation via LS_CFG MSR ) Then wrmsrl(MSR_AMD64_LS_CFG, msrval) |
Name | Describe |
---|---|
__ssb_select_mitigation | |
x86_spec_ctrl_setup_ap |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |