[PATCH v2 2/2] powerpc/rtas: block error injection when locked down

Paul Moore paul at paul-moore.com
Tue Sep 27 08:41:21 AEST 2022


On Mon, Sep 26, 2022 at 9:18 AM Nathan Lynch <nathanl at linux.ibm.com> wrote:
>
> The error injection facility on pseries VMs allows corruption of
> arbitrary guest memory, potentially enabling a sufficiently privileged
> user to disable lockdown or perform other modifications of the running
> kernel via the rtas syscall.
>
> Block the PAPR error injection facility from being opened or called
> when locked down.
>
> Signed-off-by: Nathan Lynch <nathanl at linux.ibm.com>
> ---
>  arch/powerpc/kernel/rtas.c | 25 ++++++++++++++++++++++++-
>  include/linux/security.h   |  1 +
>  security/security.c        |  1 +
>  3 files changed, 26 insertions(+), 1 deletion(-)

The lockdown changes are trivial, but they look fine to me.

Acked-by: Paul Moore <paul at paul-moore.com> (LSM)

-- 
paul-moore.com


More information about the Linuxppc-dev mailing list