Function report |
Source Code:arch\x86\kernel\cpu\bugs.c |
Create Date:2022-07-28 07:56:28 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:l1tf_select_mitigation
Proto:static void __init l1tf_select_mitigation(void)
Type:void
Parameter:Nothing
| 1339 | If Not boot_cpu_has_bug(CPU is affected by L1 Terminal Fault ) Then Return |
| 1344 | Else if cpu_mitigations_auto_nosmt() Then Default mitigation for L1TF-affected CPUs = L1TF_MITIGATION_FLUSH_NOSMT |
| 1353 | Break |
| 1356 | cpu_smt_disable(false) |
| 1357 | Break |
| 1359 | cpu_smt_disable(true) |
| 1360 | Break |
| 1368 | half_pa = l1tf_pfn_limit() << PAGE_SHIFT determines the page size |
| 1369 | If Default mitigation for L1TF-affected CPUs != L1TF_MITIGATION_OFF && e820__mapped_any(half_pa, ULLONG_MAX - half_pa, E820_TYPE_RAM) Then |
| 1371 | pr_warn("System has more than MAX_PA/2 memory. L1TF mitigation not effective.\n") |
| 1374 | pr_info("However, doing so will make a part of your RAM unusable.\n") |
| 1375 | pr_info("Reading https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html might help you decide.\n") |
| 1376 | Return |
| Name | Describe |
|---|---|
| check_bugs |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |