[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <166488995179.779920.16022330580724234832.b4-ty@ellerman.id.au>
Date: Wed, 05 Oct 2022 00:25:51 +1100
From: Michael Ellerman <patch-notifications@...erman.id.au>
To: Nathan Lynch <nathanl@...ux.ibm.com>, linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org,
linuxppc-dev@...ts.ozlabs.org
Cc: nayna@...ux.ibm.com, jmorris@...ei.org, paul@...l-moore.com,
ajd@...ux.ibm.com, serge@...lyn.com, gcwilson@...ux.ibm.com,
mpe@...erman.id.au
Subject: Re: [PATCH v2 0/2] powerpc/pseries: restrict error injection and DT changes when locked down
On Mon, 26 Sep 2022 08:16:41 -0500, Nathan Lynch wrote:
> Add two new lockdown reasons for use in powerpc's pseries platform
> code.
>
> The pseries platform allows hardware-level error injection via certain
> calls to the RTAS (Run Time Abstraction Services) firmware. ACPI-based
> error injection is already restricted in lockdown; this facility
> should be restricted for the same reasons.
>
> [...]
Applied to powerpc/next.
[1/2] powerpc/pseries: block untrusted device tree changes when locked down
https://git.kernel.org/powerpc/c/99df7a2810b6d24651d4887ab61a142e042fb235
[2/2] powerpc/rtas: block error injection when locked down
https://git.kernel.org/powerpc/c/b8f3e48834fe8c86b4f21739c6effd160e2c2c19
cheers
Powered by blists - more mailing lists