Laurent Dufour <lduf...@linux.ibm.com> writes: > This is helpful to read the security flavor from inside the LPAR.
We already have /sys/kernel/debug/powerpc/security_features. Is that not sufficient? > Export it like this in /proc/powerpc/lparcfg: > > $ grep security_flavor /proc/powerpc/lparcfg > security_flavor=1 > > Value means: > 0 Speculative execution fully enabled > 1 Speculative execution controls to mitigate user-to-kernel attacks > 2 Speculative execution controls to mitigate user-to-kernel and > user-to-user side-channel attacks Those strings come from the FSP help, but we have no guarantee it won't mean something different in future. cheers