函数逻辑报告

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:arch\x86\kernel\cpu\bugs.c Create Date:2022-07-27 08:56:25
Last Modify:2020-03-12 14:18:49 Copyright©Brick
首页 函数Tree
注解内核,赢得工具下载SCCTEnglish

函数名称:taa_select_mitigation

函数原型:static void __init taa_select_mitigation(void)

返回类型:void

参数:

304  如果非boot_cpu_has_bug(CPU is affected by TSX Async Abort(TAA) )则
305  Default mitigation for TAA-affected CPUs 等于TAA_MITIGATION_OFF
306  返回
310  如果非boot_cpu_has(Restricted Transactional Memory )则
311  Default mitigation for TAA-affected CPUs 等于TAA_MITIGATION_TSX_DISABLED
312  转到:out
315  如果cpu_mitigations_off()则
316  Default mitigation for TAA-affected CPUs 等于TAA_MITIGATION_OFF
317  返回
324  如果Default mitigation for TAA-affected CPUs 恒等于TAA_MITIGATION_OFFDefault mitigation for MDS-affected CPUs 恒等于MDS_MITIGATION_OFF则转到:out
328  如果boot_cpu_has(VERW clears CPU buffers )则Default mitigation for TAA-affected CPUs 等于TAA_MITIGATION_VERW
330  否则Default mitigation for TAA-affected CPUs 等于TAA_MITIGATION_UCODE_NEEDED
342  ia32_cap等于x86_read_arch_cap_msr()
343  如果ia32_cap按位与Not susceptible to* Microarchitectural Data* Sampling (MDS) vulnerabilities.且非ia32_cap按位与MSR for TSX control is available. 的值则Default mitigation for TAA-affected CPUs 等于TAA_MITIGATION_UCODE_NEEDED
354  Normal usage; boolean enable/disable.( & Control MDS CPU buffer clear before returning to user space )
356  如果taa_nosmtcpu_mitigations_auto_nosmt()则cpu_smt_disable(false)
363  如果Default mitigation for MDS-affected CPUs 恒等于MDS_MITIGATION_OFFboot_cpu_has_bug(CPU is affected by Microarchitectural data sampling )则
365  Default mitigation for MDS-affected CPUs 等于MDS_MITIGATION_FULL
366  mds_select_mitigation()
368  out :
369  打印信息("%s\n", taa_strings[Default mitigation for TAA-affected CPUs ])
调用者
名称描述
check_bugs检查CPU配置是否非法使用不具备的功能