or do it live https://access.redhat.com/articles/3311301

    # echo 0 > /sys/kernel/debug/x86/pti_enabled
    # echo 0 > /sys/kernel/debug/x86/ibpb_enabled
    # echo 0 > /sys/kernel/debug/x86/ibrs_enabled

stijn

On 01/05/2018 12:54 PM, David wrote:
> Hi!
> 
> nopti or pti=off in kernel options should disable some of the kpti.
> I haven't tried it yet though, so give it a whirl.
> 
> https://en.wikipedia.org/wiki/Kernel_page-table_isolation 
> <https://en.wikipedia.org/wiki/Kernel_page-table_isolation>
> 
> Kind Regards,
> 
> David Majchrzak
> 
> 
>> 5 jan. 2018 kl. 11:03 skrev Xavier Trilla <xavier.tri...@silicontower.net>:
>>
>> Hi Nick,
>>
>> I'm actually wondering about exactly the same. Regarding OSDs, I agree, 
>> there is no reason to apply the security patch to the machines running the 
>> OSDs -if they are properly isolated in your setup-.
>>
>> But I'm worried about the hypervisors, as I don't know how meltdown or 
>> Spectre patches -AFAIK, only Spectre patch needs to be applied to the host 
>> hypervisor, Meltdown patch only needs to be applied to guest- will affect 
>> librbd performance in the hypervisors. 
>>
>> Does anybody have some information about how Meltdown or Spectre affect ceph 
>> OSDs and clients? 
>>
>> Also, regarding Meltdown patch, seems to be a compilation option, meaning 
>> you could build a kernel without it easily.
>>
>> Thanks,
>> Xavier. 
>>
>> -----Mensaje original-----
>> De: ceph-users [mailto:ceph-users-boun...@lists.ceph.com] En nombre de Nick 
>> Fisk
>> Enviado el: jueves, 4 de enero de 2018 17:30
>> Para: 'ceph-users' <ceph-users@lists.ceph.com>
>> Asunto: [ceph-users] Linux Meltdown (KPTI) fix and how it affects 
>> performance?
>>
>> Hi All,
>>
>> As the KPTI fix largely only affects the performance where there are a large 
>> number of syscalls made, which Ceph does a lot of, I was wondering if 
>> anybody has had a chance to perform any initial tests. I suspect small write 
>> latencies will the worse affected?
>>
>> Although I'm thinking the backend Ceph OSD's shouldn't really be at risk 
>> from these vulnerabilities, due to them not being direct user facing and 
>> could have this work around disabled?
>>
>> Nick
>>
>> _______________________________________________
>> ceph-users mailing list
>> ceph-users@lists.ceph.com
>> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
>> _______________________________________________
>> ceph-users mailing list
>> ceph-users@lists.ceph.com
>> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
> 
> 
> 
> 
> _______________________________________________
> ceph-users mailing list
> ceph-users@lists.ceph.com
> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
> 
_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com

Reply via email to