Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2128077yba; Fri, 17 May 2019 10:56:21 -0700 (PDT) X-Google-Smtp-Source: APXvYqzl6xfeVYQNMru+1QD1KwchjosGbVarK5f44tpXN0UDW+/tRXCR8+Rn7+Lm3grD/SSgEoF0 X-Received: by 2002:aa7:9104:: with SMTP id 4mr32157921pfh.66.1558115781765; Fri, 17 May 2019 10:56:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558115781; cv=none; d=google.com; s=arc-20160816; b=l6gLNujcf19a1ltOaRk+oL+jObKTeWIbn2P3T0L0TUfcbfBgrX0xiqbysrlpyWMGVx LLFSMSSx4RWQCoPLwaRpwe1nYL7fFDrp+QrMEEG1TUpjd57Y6DKm5WzM9XsH4xvo20ME ZfI1yefRIp62gvaIQK3OPT31bTU6XN4fbli+xKmEcamIANJDp69696ik5RtIUfB7zOvY c3/U/FQYNwW4QkZEW9uAckjKKa1RlDDrx4sndDreI2VcFPcocgx7ZwCfcv4arxVZhlBv xtSR4sMxg12fwsuEAwDP+p8J/VY9pW6l2pQUSRZutU4v7BkueyHyNAMqmBYtTt/xzov2 O53Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=h+gKEYfZbwVRqSdatSpoLhCPPqNnDZ+quAjh0GvDENk=; b=MheXqLiKaetK+eMRZ5duOZClFhO1+2fiPdnVLGYCGVzK/g7JlNrDDf3LFWIM7nNJww hOYgo9jj0cMZwcMJfoieYoiKn5UkzLcXqOtufJGiV84KWUJFENSdUkaw6eaj+p441lCa n2WPBi/vCu4OjakE2lV8pQlZWf5PNL840zQJbaJGJ9T0cljkYnv24LAmXsuCnqO3+eBR dISgD/0tfx4O3wz8R6oUOOma6CMQ3Bku1bg1u2++lQ7Wgcq0jZEclPVawHzG3k0LD36x I4tgeT0XpLxzdFJLM39Pj9hyjaBEMa4IjJithteJKOwLFlFdRaN6+wE6Esp0jexL/1bB QYyQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 128si8888436pgf.369.2019.05.17.10.56.06; Fri, 17 May 2019 10:56:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728798AbfEQRzC (ORCPT + 99 others); Fri, 17 May 2019 13:55:02 -0400 Received: from mga04.intel.com ([192.55.52.120]:5677 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725932AbfEQRzB (ORCPT ); Fri, 17 May 2019 13:55:01 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 May 2019 10:55:00 -0700 X-ExtLoop1: 1 Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.36]) by orsmga004.jf.intel.com with ESMTP; 17 May 2019 10:55:00 -0700 Date: Fri, 17 May 2019 10:55:00 -0700 From: Sean Christopherson To: Andy Lutomirski Cc: Stephen Smalley , "Xing, Cedric" , Andy Lutomirski , James Morris , "Serge E. Hallyn" , LSM List , Paul Moore , Eric Paris , "selinux@vger.kernel.org" , Jarkko Sakkinen , Jethro Beekman , "Hansen, Dave" , Thomas Gleixner , "Dr. Greg" , Linus Torvalds , LKML , X86 ML , "linux-sgx@vger.kernel.org" , Andrew Morton , "nhorman@redhat.com" , "npmccallum@redhat.com" , "Ayoun, Serge" , "Katz-zamir, Shay" , "Huang, Haitao" , Andy Shevchenko , "Svahn, Kai" , Borislav Petkov , Josh Triplett , "Huang, Kai" , David Rientjes Subject: Re: SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support) Message-ID: <20190517175500.GE15006@linux.intel.com> References: <960B34DE67B9E140824F1DCDEC400C0F654E38CD@ORSMSX116.amr.corp.intel.com> <960B34DE67B9E140824F1DCDEC400C0F654E3FB9@ORSMSX116.amr.corp.intel.com> <6a97c099-2f42-672e-a258-95bc09152363@tycho.nsa.gov> <20190517150948.GA15632@linux.intel.com> <80013cca-f1c2-f4d5-7558-8f4e752ada76@tycho.nsa.gov> <20190517172953.GC15006@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 17, 2019 at 10:43:01AM -0700, Andy Lutomirski wrote: > > > On May 17, 2019, at 10:29 AM, Sean Christopherson wrote: > > > > AIUI, having FILE__WRITE and FILE__EXECUTE on /dev/sgx/enclave would allow > > *any* enclave/process to map EPC as RWX. Moving to anon inodes and thus > > PROCESS__EXECMEM achieves per-process granularity. > > How does anon_inode make any difference? Anon_inode is not the same thing as > anon_vma. In this snippet, IS_PRIVATE() is true for anon inodes, false for /dev/sgx/enclave. Because EPC memory is always shared, SELinux will never check PROCESS__EXECMEM for mprotect() on/dev/sgx/enclave. static int file_map_prot_check(struct file *file, unsigned long prot, int shared) { const struct cred *cred = current_cred(); u32 sid = cred_sid(cred); int rc = 0; if (default_noexec && (prot & PROT_EXEC) && (!file || IS_PRIVATE(file_inode(file)) || (!shared && (prot & PROT_WRITE)))) { /* * We are making executable an anonymous mapping or a * private file mapping that will also be writable. * This has an additional check. */ rc = avc_has_perm(&selinux_state, sid, sid, SECCLASS_PROCESS, PROCESS__EXECMEM, NULL); if (rc) goto error; } ... }