config/sysinv/cgts-client
Jim Somerville a6ec8d3f7e Security: Allow disabling of spectre v1 swapgs mitigation
Most of the v1 mitigation is baked into the kernel and not
optional.  The swapgs barriers are, however, optional.
They have a negative performance impact so we disable them
by using the nospectre_v1 kernel bootarg.

Closes-Bug: 1860193
Signed-off-by: Jim Somerville <Jim.Somerville@windriver.com>
(cherry picked from commit de23dcfd05)
(cherry picked from commit 950670ac1f0bfaa43e29eeb3ffda71a94de66520
 in upstream stx-puppet repo)

Conflicts:
	sysinv/cgts-client/centos/build_srpm.data
	sysinv/sysinv/centos/build_srpm.data
	tsconfig/centos/build_srpm.data
	tsconfig/tsconfig/tsconfig/tests/test_basics.py
	puppet-manifests/centos/build_srpm.data

Change-Id: Ic77ffbdeb8dd65464a777673c5d7e49b894feedc
2020-02-04 14:35:37 -05:00
..
centos Security: Allow disabling of spectre v1 swapgs mitigation 2020-02-04 14:35:37 -05:00
cgts-client Security: Allow disabling of spectre v1 swapgs mitigation 2020-02-04 14:35:37 -05:00
debian Add files for cgts-client deb packaging 2019-06-12 11:38:02 -05:00
.gitignore StarlingX open source release updates 2018-05-31 07:35:52 -07:00
PKG-INFO StarlingX open source release updates 2018-05-31 07:35:52 -07:00