Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp307464rwb; Thu, 22 Sep 2022 18:41:56 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5XXt+8pdCsCK6srPR0wBp/snYixmARSqbu0zIdwTAmOyAuJ5c3CcI5nO0SHq4XU+51ddTD X-Received: by 2002:a17:902:ea11:b0:178:1c19:b0f5 with SMTP id s17-20020a170902ea1100b001781c19b0f5mr6144856plg.152.1663897316287; Thu, 22 Sep 2022 18:41:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663897316; cv=none; d=google.com; s=arc-20160816; b=kTyErTjpBfqm7x0B+PK0fsOQ4d3SM02lz6eCIdDTkDLbExPghYnZxBsHkjrjoZse7i 9Lc9dVckhJtib9VSEk+XWQUagTbRiYsp97k6J57DauZJqfkGMAbewiLl/QMrO4OLsUrv GeNttwhA6qZ/REOBoJK74WlpOZhoR7X+VGtWT2emdkZmbpwbR5eA82jMXiZ3Pf6FPvKE goPj2m5nH8topM7Mk+JOzlhvMsHKB+YUpx8naw/I7IP9fdvHLDdBht4OJW4wVIAg7wbM HND7/Qh7LMSROjuZNCHeSZQjS40Eqns0y4W3k8GL1TA5+zD9GFO2k/FkZKy3qjbaTsK7 mcAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=s/6p8wN+VGvSrnwRHCNxYJbAlNC9MCYqHdn8E1KltBc=; b=0yXtgZtdhGeRWP3g7mrzVY4sNPJG5myZilxo0StjpW6LIuUgQ/su1AI6U8km430dGx kN5AT0Yu09SUuWjP1hPP8JLMf9ftqJYnZCrwRlWbcdUZFMCFRgbdRjO9nbxi0KFlCrSr bE5P9OsCv4ZYyU7MkcEUV+Gaen07ffLyZw509Hh4gMvstjaAK3Dymo3lQad7B2aJt5ml dAItZwfmIP7J3VASFj0On6XObJlpYPGBAw5qsJnbEIW6HP2AT34ani1+NoKtkoj5GeJc ui8PeWA4t9j6XnXDBRTXszvHvD5mbEYHBC2zAOua+dnQpICBaR6haVjXvFbV6d3o4oqk 09VA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20210112.gappssmtp.com header.s=20210112 header.b=MiEmXExP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 135-20020a63018d000000b00439020f9e1bsi7132304pgb.753.2022.09.22.18.41.28; Thu, 22 Sep 2022 18:41:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20210112.gappssmtp.com header.s=20210112 header.b=MiEmXExP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231450AbiIWB2Y (ORCPT + 99 others); Thu, 22 Sep 2022 21:28:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55338 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231453AbiIWB2U (ORCPT ); Thu, 22 Sep 2022 21:28:20 -0400 Received: from mail-oi1-x22c.google.com (mail-oi1-x22c.google.com [IPv6:2607:f8b0:4864:20::22c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E37D41176DF for ; Thu, 22 Sep 2022 18:28:18 -0700 (PDT) Received: by mail-oi1-x22c.google.com with SMTP id d64so11648263oia.9 for ; Thu, 22 Sep 2022 18:28:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=s/6p8wN+VGvSrnwRHCNxYJbAlNC9MCYqHdn8E1KltBc=; b=MiEmXExP/Uly7GSmB4QzuSnXDeHlqxx2OYMWx1W1iLm6vljxXfeG/Z1YepMPzxT3Vr pjf3zh1pkkU+//zUrJhF4e4JGkNqdyppztz4T8wJ/uCNDG9n1+wm2AxbOTmrrnSjbib3 iMJkLUI1e210eZUYsproVon8WIbSm9FDnQrMocQmAf+cwSoPvcJxl/EQW1gPOTO1a1v0 uKM3uV4+5qY4zCW/+rO28NdwsOmv63e8AuEiKOD5G1dvIwDKIFKt7sQe31/J+fhjZf9J 3P9O5j8Qmjl6gy2o2ER9gscgaXthVC4wjW5i2vSOkefhL6zf7xf6j0QhCmz9O5sjsKwf W2mA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=s/6p8wN+VGvSrnwRHCNxYJbAlNC9MCYqHdn8E1KltBc=; b=A8M0MND2bMuPAfoi7zzDBJSBUEoYrYCR9y2yS1Hi/AvhGu7NnwQUVPWCjCT6XVxv1K IFljX7X9O4202vbcV3el2pAhYyiE87v5zhG2OG17RzSFoGZqcro824a4pNnsmCg+ZDuY pVYcuehzfnIYHb9+EONTggI8P1Y0vWaKa6e/EpKhyLX9Aw6o9zLwcjSMuMxX8A9+ghGT klP/6COzw2bs3HE7AuuwYmkkIVFvzmd941ni9iLUEX9iyeCYmvCazqwDyH/FPYg10QwT qfxjS7E/men7fmGXY6lJX48bj/3N/1BeStrKO5JyUDkNycs2uQNIUCsfwHoiMEr9hO3k rHPw== X-Gm-Message-State: ACrzQf29ZQehWWJ6j8Ssbx9qH6aEDWQaqiO/z5ZWovnE/QJTb5hD7Vl4 qf9i7LgAx3t7P0VOnuGgx7K6HBGplvqrmKEnRicy X-Received: by 2002:a05:6808:144b:b0:350:a06a:f8cb with SMTP id x11-20020a056808144b00b00350a06af8cbmr7833965oiv.51.1663896497881; Thu, 22 Sep 2022 18:28:17 -0700 (PDT) MIME-Version: 1.0 References: <20220922193817.106041-1-nathanl@linux.ibm.com> <20220922193817.106041-3-nathanl@linux.ibm.com> In-Reply-To: <20220922193817.106041-3-nathanl@linux.ibm.com> From: Paul Moore Date: Thu, 22 Sep 2022 21:28:07 -0400 Message-ID: Subject: Re: [PATCH 2/2] powerpc/rtas: block error injection when locked down To: Nathan Lynch Cc: linuxppc-dev@lists.ozlabs.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, jmorris@namei.org, mpe@ellerman.id.au, serge@hallyn.com, ajd@linux.ibm.com, gcwilson@linux.ibm.com, nayna@linux.ibm.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 22, 2022 at 3:38 PM Nathan Lynch wrote: > > The error injection facility on pseries VMs allows corruption of > arbitrary guest memory, potentially enabling a sufficiently privileged > user to disable lockdown or perform other modifications of the running > kernel via the rtas syscall. > > Block the PAPR error injection facility from being opened or called > when locked down. > > Signed-off-by: Nathan Lynch > --- > arch/powerpc/kernel/rtas.c | 25 ++++++++++++++++++++++++- > include/linux/security.h | 1 + > security/security.c | 1 + > 3 files changed, 26 insertions(+), 1 deletion(-) ... > diff --git a/include/linux/security.h b/include/linux/security.h > index 1ca8dbacd3cc..b5d5138ae66a 100644 > --- a/include/linux/security.h > +++ b/include/linux/security.h > @@ -123,6 +123,7 @@ enum lockdown_reason { > LOCKDOWN_BPF_WRITE_USER, > LOCKDOWN_DBG_WRITE_KERNEL, > LOCKDOWN_DEVICE_TREE, > + LOCKDOWN_RTAS_ERROR_INJECTION, With the understanding that I've never heard of RTAS until now, are there any other RTAS events that would require a lockdown reason? As a follow up, is it important to distinguish between different RTAS lockdown reasons? I'm trying to determine if we can just call it LOCKDOWN_RTAS. > LOCKDOWN_INTEGRITY_MAX, > LOCKDOWN_KCORE, > LOCKDOWN_KPROBES, > diff --git a/security/security.c b/security/security.c > index 2863fc31eec6..6518b239ada2 100644 > --- a/security/security.c > +++ b/security/security.c > @@ -61,6 +61,7 @@ const char *const lockdown_reasons[LOCKDOWN_CONFIDENTIALITY_MAX+1] = { > [LOCKDOWN_BPF_WRITE_USER] = "use of bpf to write user RAM", > [LOCKDOWN_DBG_WRITE_KERNEL] = "use of kgdb/kdb to write kernel RAM", > [LOCKDOWN_DEVICE_TREE] = "modifying device tree contents", > + [LOCKDOWN_RTAS_ERROR_INJECTION] = "RTAS error injection", See above. > [LOCKDOWN_INTEGRITY_MAX] = "integrity", > [LOCKDOWN_KCORE] = "/proc/kcore access", > [LOCKDOWN_KPROBES] = "use of kprobes", > -- > 2.37.3 -- paul-moore.com