[PATCH v2 2/2] powerpc/rtas: block error injection when locked down
Paul Moore
paul at paul-moore.com
Tue Sep 27 08:41:21 AEST 2022
On Mon, Sep 26, 2022 at 9:18 AM Nathan Lynch <nathanl at linux.ibm.com> wrote:
>
> The error injection facility on pseries VMs allows corruption of
> arbitrary guest memory, potentially enabling a sufficiently privileged
> user to disable lockdown or perform other modifications of the running
> kernel via the rtas syscall.
>
> Block the PAPR error injection facility from being opened or called
> when locked down.
>
> Signed-off-by: Nathan Lynch <nathanl at linux.ibm.com>
> ---
> arch/powerpc/kernel/rtas.c | 25 ++++++++++++++++++++++++-
> include/linux/security.h | 1 +
> security/security.c | 1 +
> 3 files changed, 26 insertions(+), 1 deletion(-)
The lockdown changes are trivial, but they look fine to me.
Acked-by: Paul Moore <paul at paul-moore.com> (LSM)
--
paul-moore.com
More information about the Linuxppc-dev
mailing list