|
|
@@ -237,7 +237,7 @@ enum spectre_v2_mitigation_cmd {
|
|
|
SPECTRE_V2_CMD_RETPOLINE_AMD,
|
|
|
};
|
|
|
|
|
|
-static const char *spectre_v2_strings[] = {
|
|
|
+static const char * const spectre_v2_strings[] = {
|
|
|
[SPECTRE_V2_NONE] = "Vulnerable",
|
|
|
[SPECTRE_V2_RETPOLINE_GENERIC] = "Mitigation: Full generic retpoline",
|
|
|
[SPECTRE_V2_RETPOLINE_AMD] = "Mitigation: Full AMD retpoline",
|
|
|
@@ -474,7 +474,7 @@ enum ssb_mitigation_cmd {
|
|
|
SPEC_STORE_BYPASS_CMD_SECCOMP,
|
|
|
};
|
|
|
|
|
|
-static const char *ssb_strings[] = {
|
|
|
+static const char * const ssb_strings[] = {
|
|
|
[SPEC_STORE_BYPASS_NONE] = "Vulnerable",
|
|
|
[SPEC_STORE_BYPASS_DISABLE] = "Mitigation: Speculative Store Bypass disabled",
|
|
|
[SPEC_STORE_BYPASS_PRCTL] = "Mitigation: Speculative Store Bypass disabled via prctl",
|
|
|
@@ -814,7 +814,7 @@ early_param("l1tf", l1tf_cmdline);
|
|
|
#define L1TF_DEFAULT_MSG "Mitigation: PTE Inversion"
|
|
|
|
|
|
#if IS_ENABLED(CONFIG_KVM_INTEL)
|
|
|
-static const char *l1tf_vmx_states[] = {
|
|
|
+static const char * const l1tf_vmx_states[] = {
|
|
|
[VMENTER_L1D_FLUSH_AUTO] = "auto",
|
|
|
[VMENTER_L1D_FLUSH_NEVER] = "vulnerable",
|
|
|
[VMENTER_L1D_FLUSH_COND] = "conditional cache flushes",
|