Hello! We are running our annual fundraising. Please consider making a donation if you value this freely available service or want to support people around the world working towards liberatory social change - https://riseup.net/donate
-`tsx_async_abort=full` - Enable TAA mitigation on vulnerable CPUs if TSX is enabled.
-`tsx_async_abort=full` - Enable TAA mitigation on vulnerable CPUs if TSX is enabled.
-`l1tf=flush` - Leaves SMT enabled and enables the default hypervisor mitigation, i.e. conditional L1D flushing.
-`l1tf=flush` - Leaves SMT enabled and enables the default hypervisor mitigation, i.e. conditional L1D flushing.
-`mds=full` - Enables Micro-architectural Data Sampling (MDS) mitigation on vulnerable CPUs
-`mds=full` - Enables Micro-architectural Data Sampling (MDS) mitigation on vulnerable CPUs
-`nosmt=force` - Disable symmetric multithreading (SMT). Do note that this parameter can lead to performance issues.
-`mitigations=auto,nosmt` - Disable symmetric multithreading (SMT). Do note that this parameter can lead to performance issues, but it will only disable SMT when the CPU is known to be vulnerable. Unimpacted CPU's will still run with the full amount of system cores.
- Note: At this time, nosmt boot parameter has been removed due to halving of computer cores. Performance tradeoff has been determined undesirable.