Re: [PATCH v22 00/24] Intel SGX foundations

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 9/3/19 7:26 AM, Jarkko Sakkinen wrote:
> Not having LSM hooks does not cause any risk to other parts of the
> kernel as the device can still be controlled by using DAC permissions.
> The hooks just provide more granularity than DAC in access decisions.

Could we translate the security-speak to english, please? :)

Is this it:

	LSMs can (try to) enforce things like "all executable code must
	be verified".  The implementation in these patches has the
	potential to subvert policies like that since it has its own
	unique mechanisms for loading and mapping executable code.  This
	will be fixed by future LSM enhancements on top of this set.
	For now, permissions on the SGX device file should be used to
	prevent untrusted users from using SGX to subvert LSM policies.

?



[Index of Archives]     [AMD Graphics]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux