Looking at the SGX-LSM discussions I haven't seen even a single email that would have any conclusions that the new hooks are the only possible route to limit the privileges to use SGX. An obvious alternative to consider might be to have a small-scale LSM that you could stack. AFAIK Casey's LSM stacking patch set has not yet landed but I also remember that with some constraints you can still do it. Casey explained these constraints to me few years ago but I can't recall them anymore :-) One example of this is Yama, which limits the use of ptrace(). You can enable it together with any of the "big" LSMs in the kernel. A major benefit in this approach would that it is non-intrusive when it comes to other architectures than x86. New hooks are not only maintenance burden for those who care about SGX but also for those who have to deal with LSMs. /Jarkko