From 9c20ea371b59a19072b124af86dc3817753872a2 Mon Sep 17 00:00:00 2001 From: Michael Polenchuk Date: Wed, 31 Jan 2018 14:38:16 +0400 Subject: Turn off Retpoline and KPTI protection Based on Canonical research (https://goo.gl/QJykMa) there is low-risk of attack for private clouds environments, therefore turn off the related kernel patches & regain performance back. Change-Id: I661fa127241e327b07d21a29d58d584997607123 Signed-off-by: Michael Polenchuk --- mcp/config/states/baremetal_init | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'mcp/config') diff --git a/mcp/config/states/baremetal_init b/mcp/config/states/baremetal_init index cd254ddd3..c14772837 100755 --- a/mcp/config/states/baremetal_init +++ b/mcp/config/states/baremetal_init @@ -23,7 +23,7 @@ salt -C 'kvm* or cmp*' file.replace $debian_ip_source \ repl="\n if not __salt__['pkg.version']('vlan'):\n __salt__['pkg.install']('vlan')" salt -C 'kvm*' pkg.install bridge-utils -salt -C 'kvm*' state.apply linux.network +salt -C 'kvm*' state.apply linux.network,linux.system.kernel salt -C 'kvm* or cmp*' state.apply salt.minion salt -C 'cmp*' state.apply linux.system salt -C 'cmp*' state.apply linux.network || true -- cgit 1.2.3-korg