Re: [PATCH] powerpc/pseries: export LPAR security flavor in lparcfg

2021-03-05 Thread Laurent Dufour
Le 05/03/2021 à 12:43, Michael Ellerman a écrit : Laurent Dufour writes: Le 05/03/2021 à 07:23, Michael Ellerman a écrit : Laurent Dufour writes: This is helpful to read the security flavor from inside the LPAR. We already have /sys/kernel/debug/powerpc/security_features. Is that not

Re: [PATCH] powerpc/pseries: export LPAR security flavor in lparcfg

2021-03-05 Thread Michael Ellerman
Laurent Dufour writes: > Le 05/03/2021 à 07:23, Michael Ellerman a écrit : >> Laurent Dufour writes: >>> This is helpful to read the security flavor from inside the LPAR. >> >> We already have /sys/kernel/debug/powerpc/security_features. >> >> Is that not sufficient? > > Not really, it only

Re: [PATCH] powerpc/pseries: export LPAR security flavor in lparcfg

2021-03-05 Thread Laurent Dufour
Le 05/03/2021 à 07:23, Michael Ellerman a écrit : Laurent Dufour writes: This is helpful to read the security flavor from inside the LPAR. We already have /sys/kernel/debug/powerpc/security_features. Is that not sufficient? Not really, it only reports that security mitigation are on or

Re: [PATCH] powerpc/pseries: export LPAR security flavor in lparcfg

2021-03-04 Thread Michael Ellerman
Laurent Dufour writes: > This is helpful to read the security flavor from inside the LPAR. We already have /sys/kernel/debug/powerpc/security_features. Is that not sufficient? > Export it like this in /proc/powerpc/lparcfg: > > $ grep security_flavor /proc/powerpc/lparcfg > security_flavor=1 >

[PATCH] powerpc/pseries: export LPAR security flavor in lparcfg

2021-03-04 Thread Laurent Dufour
This is helpful to read the security flavor from inside the LPAR. Export it like this in /proc/powerpc/lparcfg: $ grep security_flavor /proc/powerpc/lparcfg security_flavor=1 Value means: 0 Speculative execution fully enabled 1 Speculative execution controls to mitigate user-to-kernel attacks 2