Received: by 2002:a17:90a:37a3:0:0:0:0 with SMTP id v32csp4122663pjb; Mon, 10 Jun 2019 10:48:40 -0700 (PDT) X-Google-Smtp-Source: APXvYqw/yzPZqHyX/8i/vZi/8YDsiwxJJqobpRAQ4lHSiVXqoKy1ZCn8GEBRzVRZBzORAbzLMmTg X-Received: by 2002:a17:90b:d8b:: with SMTP id bg11mr22415605pjb.30.1560188920347; Mon, 10 Jun 2019 10:48:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560188920; cv=none; d=google.com; s=arc-20160816; b=jhMhD4lGLntI59KoqHPNnAa3fSg8UHjiTKsqHms0jEWrn422Zva47y8woZ8H1MYAyj y+oUxwoGpaVP/XqUp55V2h6fKyZJb/Oji8fI2lGnoCbTt/+Dd1DvX6pjLpYLf6T5JAJr nk+Tg+xJEQSY/CJGdl2cp/0jdEWBL+r+jscpX2MMJ8tdBoZac3coIYpEuJmq85Ccva6B 3wR1r1Fd9XtNi/GaLxA1SNmDA/UpxxsVCTWL0F+tS0r6LquQbtrZRhR4LvwgaYVFrP0p cyQel0TgLfCv3Agcpek80OpSFmJcbyLryh5tj6EEFky/tEVspBgo9ENtJnwT8/GMRN9S bGwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :dlp-reaction:dlp-version:dlp-product:content-language :accept-language:in-reply-to:references:message-id:date:thread-index :thread-topic:subject:cc:to:from; bh=lxqTtm5Brvf9A980XRD2+nfq9JGVpuRM+7x2RDUBwQc=; b=BN7LyfzCeZTTLuJd52boxxT0FWabqoCl7P+QrpDp4P7pzZaY46qkctHAUo7nyYMPZ/ nXauI2An1WkGwzmVtsyhdmjAcnMS1984dsVgK4ydJUPmgrN8Sm0pZqWHP2VyDd5AoBLr RwZkgse9a084MVdsB+w+4R2DFgM8CpUFLTml3PRiHwooGW9JbhzbV+ESREUrBVEUyd9v cTyYAqQUMVlWRl046oKtF2k8wS++CexrBmKHKbvnLFzh1jAhdBlN9og7YAzV4Wh1qqOa CtGPziCJM7EpW2EbYo+BRdjcMa6V2Sb3UfRXxfeOs1BKJw/GCDupe3pjOKzGhRLODXL/ Zrbw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e123si4074750pfa.252.2019.06.10.10.48.25; Mon, 10 Jun 2019 10:48:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388610AbfFJRrz convert rfc822-to-8bit (ORCPT + 99 others); Mon, 10 Jun 2019 13:47:55 -0400 Received: from mga11.intel.com ([192.55.52.93]:49726 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387643AbfFJRrz (ORCPT ); Mon, 10 Jun 2019 13:47:55 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 10 Jun 2019 10:47:54 -0700 X-ExtLoop1: 1 Received: from orsmsx107.amr.corp.intel.com ([10.22.240.5]) by orsmga005.jf.intel.com with ESMTP; 10 Jun 2019 10:47:53 -0700 Received: from orsmsx160.amr.corp.intel.com (10.22.226.43) by ORSMSX107.amr.corp.intel.com (10.22.240.5) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 10 Jun 2019 10:47:53 -0700 Received: from orsmsx116.amr.corp.intel.com ([169.254.7.166]) by ORSMSX160.amr.corp.intel.com ([169.254.13.69]) with mapi id 14.03.0415.000; Mon, 10 Jun 2019 10:47:53 -0700 From: "Xing, Cedric" To: "Christopherson, Sean J" , "Jarkko Sakkinen" CC: Andy Lutomirski , Stephen Smalley , James Morris , "Serge E . Hallyn" , LSM List , Paul Moore , Eric Paris , "selinux@vger.kernel.org" , Jethro Beekman , "Hansen, Dave" , "Thomas Gleixner" , Linus Torvalds , LKML , X86 ML , "linux-sgx@vger.kernel.org" , Andrew Morton , "nhorman@redhat.com" , "npmccallum@redhat.com" , "Ayoun, Serge" , "Katz-zamir, Shay" , "Huang, Haitao" , "Andy Shevchenko" , "Svahn, Kai" , Borislav Petkov , Josh Triplett , "Huang, Kai" , David Rientjes , "Roberts, William C" , "Tricca, Philip B" Subject: RE: [RFC PATCH v2 1/5] mm: Introduce vm_ops->may_mprotect() Thread-Topic: [RFC PATCH v2 1/5] mm: Introduce vm_ops->may_mprotect() Thread-Index: AQHVHA01/2g2StwB+UmAXBpwpA92D6aVeUUAgAAN64D//6b7AA== Date: Mon, 10 Jun 2019 17:47:52 +0000 Message-ID: <960B34DE67B9E140824F1DCDEC400C0F654FFD59@ORSMSX116.amr.corp.intel.com> References: <20190606021145.12604-1-sean.j.christopherson@intel.com> <20190606021145.12604-2-sean.j.christopherson@intel.com> <20190610150600.GA3752@linux.intel.com> <20190610155549.GB15995@linux.intel.com> In-Reply-To: <20190610155549.GB15995@linux.intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiYzM0YTFiOWItZTQxNy00N2YxLTg4NjEtNzdmZjc4ODE1N2EwIiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX05UIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE3LjEwLjE4MDQuNDkiLCJUcnVzdGVkTGFiZWxIYXNoIjoicWhaTjFJMVVqenc2R1JyZHdBTkplRTlsOFZQZWV6YkM5eGl0YXh4TmZcL1VnaVFVQlRcL005U1Jpa2ZaVEh6XC9PTyJ9 x-ctpclassification: CTP_NT dlp-product: dlpe-windows dlp-version: 11.2.0.6 dlp-reaction: no-action x-originating-ip: [10.22.254.138] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > From: Christopherson, Sean J > Sent: Monday, June 10, 2019 8:56 AM > > > > As a result, LSM policies cannot be meaningfully applied, e.g. an > > > LSM can deny access to the EPC as a whole, but can't deny PROT_EXEC > > > on page that originated in a non-EXECUTE file (which is long gone by > > > the time > > > mprotect() is called). > > > > I have hard time following what is paragraph is trying to say. > > > > > By hooking mprotect(), SGX can make explicit LSM upcalls while an > > > enclave is being built, i.e. when the kernel has a handle to origin > > > of each enclave page, and enforce the result of the LSM policy > > > whenever userspace maps the enclave page in the future. > > > > "LSM policy whenever calls mprotect()"? I'm no sure why you mean by > > mapping here and if there is any need to talk about future. Isn't this > > needed now? > > Future is referring to the timeline of a running kernel, not the future > of the kernel code. > > Rather than trying to explain all of the above with words, I'll provide > code examples to show how ->may_protect() will be used by SGX and why it > is the preferred solution. The LSM concept is to separate security policy enforcement from the rest of the kernel. For modules, the "official" way is to use VM_MAY* flags to limit allowable permissions, while LSM uses security_file_mprotect(). I guess that's why we didn't have .may_mprotect() in the first place. What you are doing is enforcing some security policy outside of LSM, which is dirty from architecture perspective.