LSM module for SGX?
Stephen Smalley
sds at tycho.nsa.gov
Thu Jun 27 13:41:48 UTC 2019
On 6/27/19 8:56 AM, Jarkko Sakkinen wrote:
> Looking at the SGX-LSM discussions I haven't seen even a single email
> that would have any conclusions that the new hooks are the only possible
> route to limit the privileges to use SGX.
>
> An obvious alternative to consider might be to have a small-scale LSM
> that you could stack. AFAIK Casey's LSM stacking patch set has not yet
> landed but I also remember that with some constraints you can still do
> it. Casey explained these constraints to me few years ago but I can't
> recall them anymore :-)
>
> One example of this is Yama, which limits the use of ptrace(). You can
> enable it together with any of the "big" LSMs in the kernel.
>
> A major benefit in this approach would that it is non-intrusive when it
> comes to other architectures than x86. New hooks are not only
> maintenance burden for those who care about SGX but also for those who
> have to deal with LSMs.
Regardless of whether or not you or anyone else creates such a
small-scale LSM, we would still want to be able to control the loading
of enclaves and the creation of executable enclave mappings via SELinux
policy, so the hooks would be necessary anyway.
More information about the Linux-security-module-archive
mailing list