Function report | 
Source Code:arch\x86\kernel\cpu\bugs.c | 
Create Date:2022-07-28 07:56:28 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:l1tf_select_mitigation
Proto:static void __init l1tf_select_mitigation(void)
Type:void
Parameter:Nothing
| 1339 | If Not boot_cpu_has_bug(CPU is affected by L1 Terminal Fault ) Then Return | 
| 1344 | Else if cpu_mitigations_auto_nosmt() Then Default mitigation for L1TF-affected CPUs = L1TF_MITIGATION_FLUSH_NOSMT | 
| 1353 | Break | 
| 1356 | cpu_smt_disable(false) | 
| 1357 | Break | 
| 1359 | cpu_smt_disable(true) | 
| 1360 | Break | 
| 1368 | half_pa = l1tf_pfn_limit() << PAGE_SHIFT determines the page size | 
| 1369 | If Default mitigation for L1TF-affected CPUs != L1TF_MITIGATION_OFF && e820__mapped_any(half_pa, ULLONG_MAX - half_pa, E820_TYPE_RAM) Then | 
| 1371 | pr_warn("System has more than MAX_PA/2 memory. L1TF mitigation not effective.\n") | 
| 1374 | pr_info("However, doing so will make a part of your RAM unusable.\n") | 
| 1375 | pr_info("Reading https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html might help you decide.\n") | 
| 1376 | Return | 
| Name | Describe | 
|---|---|
| check_bugs | 
| Source code conversion tool public plug-in interface  | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion  |