Le 05/03/2021 à 12:43, Michael Ellerman a écrit :
Laurent Dufour writes:
Le 05/03/2021 à 07:23, Michael Ellerman a écrit :
Laurent Dufour writes:
This is helpful to read the security flavor from inside the LPAR.
We already have /sys/kernel/debug/powerpc/security_features.
Is that not
Laurent Dufour writes:
> Le 05/03/2021 à 07:23, Michael Ellerman a écrit :
>> Laurent Dufour writes:
>>> This is helpful to read the security flavor from inside the LPAR.
>>
>> We already have /sys/kernel/debug/powerpc/security_features.
>>
>> Is that not sufficient?
>
> Not really, it only
Le 05/03/2021 à 07:23, Michael Ellerman a écrit :
Laurent Dufour writes:
This is helpful to read the security flavor from inside the LPAR.
We already have /sys/kernel/debug/powerpc/security_features.
Is that not sufficient?
Not really, it only reports that security mitigation are on or
Laurent Dufour writes:
> This is helpful to read the security flavor from inside the LPAR.
We already have /sys/kernel/debug/powerpc/security_features.
Is that not sufficient?
> Export it like this in /proc/powerpc/lparcfg:
>
> $ grep security_flavor /proc/powerpc/lparcfg
> security_flavor=1
>
This is helpful to read the security flavor from inside the LPAR.
Export it like this in /proc/powerpc/lparcfg:
$ grep security_flavor /proc/powerpc/lparcfg
security_flavor=1
Value means:
0 Speculative execution fully enabled
1 Speculative execution controls to mitigate user-to-kernel attacks
2
5 matches
Mail list logo