docs
uhost
Linux Service Configuration Guide
CentOS KPTI Disabling Method

CentOS KPTI Disabling Method

To address the security risks posed by the recently exposed Meltdown vulnerability, SurferCloud's official CentOS 6.x and 7.x images have been updated. The new version of the images has enabled KPTI (Kernel Page Table Isolation) by default to fix this vulnerability. Please see Meltdown Vulnerability Details (opens in a new tab)

However, according to tests, enabling KPTI may have a 5%-30% impact on the virtual machine Computational tasks are less affected, while IO/memory-intensive tasks are more significantly impacted.

You can determine whether to disable KPTI based on actual circumstances, in order to restore performance under the premise of assuming security risks.

Centos 6.x

1)Disable KPTI

vim /boot/grub/grub.conf 

Add to the kernel line

nopti 

Reboot the virtual machine for the change to take effect.

2)Verify if it has been disabled

Enter the command:

dmesg | grep isolation 

If the following information is displayed, it means that KPTI is still enabled.

x86/pti: Kernel page table isolation enabled

If successful, the above line of information will not be displayed.

CentOS 7.x

1)Disable KPTI

Enter the command:

vim /boot/grub2/grub.cfg

Add to the /boot/vmlinuz-* line

nopti

Reboot the virtual machine for the change to take effect

2)Verify if it has been disabled

Enter the command:

dmesg | grep isolation 

If the following information is displayed, it means that KPTI is still enabled.

x86/pti: Unmapping kernel while in userspace

If successfully disabled, the above line of information will not be displayed.

  • Company
  • ContactUs
  • Blog
Copyright © 2024 SurferCloud All Rights Reserved