lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <166488995179.779920.16022330580724234832.b4-ty@ellerman.id.au>
Date:   Wed, 05 Oct 2022 00:25:51 +1100
From:   Michael Ellerman <patch-notifications@...erman.id.au>
To:     Nathan Lynch <nathanl@...ux.ibm.com>, linux-kernel@...r.kernel.org,
        linux-security-module@...r.kernel.org,
        linuxppc-dev@...ts.ozlabs.org
Cc:     nayna@...ux.ibm.com, jmorris@...ei.org, paul@...l-moore.com,
        ajd@...ux.ibm.com, serge@...lyn.com, gcwilson@...ux.ibm.com,
        mpe@...erman.id.au
Subject: Re: [PATCH v2 0/2] powerpc/pseries: restrict error injection and DT changes when locked down

On Mon, 26 Sep 2022 08:16:41 -0500, Nathan Lynch wrote:
> Add two new lockdown reasons for use in powerpc's pseries platform
> code.
> 
> The pseries platform allows hardware-level error injection via certain
> calls to the RTAS (Run Time Abstraction Services) firmware. ACPI-based
> error injection is already restricted in lockdown; this facility
> should be restricted for the same reasons.
> 
> [...]

Applied to powerpc/next.

[1/2] powerpc/pseries: block untrusted device tree changes when locked down
      https://git.kernel.org/powerpc/c/99df7a2810b6d24651d4887ab61a142e042fb235
[2/2] powerpc/rtas: block error injection when locked down
      https://git.kernel.org/powerpc/c/b8f3e48834fe8c86b4f21739c6effd160e2c2c19

cheers

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ