我有一个 python(单线程)密集型进程,执行大量需要在几天内运行的上下文切换。
nopti noibrs noibp nospec_store_bypass_disable spectre_store_bypass_disable=off pti=off nospectre_v2 spectre_v2=off spectre_v2_user=off spectre_v1=off no_stf_barrier mds=off tsx=on l1tf=off kvm-intel.vmentry_l1d_flush=never tsx_async_abort=off kvm.nx_huge_pages=off
尽管在内核命令行上使用,/sys/devices/system/cpu/vulnerabilities/spectre_v1
仍然显示__user pointer sanitization
已启用。
如何禁用它?