Re: [RFC PATCH v3 4/4] x86/sgx: Implement SGX specific hooks in SELinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 7/10/2019 9:08 AM, Jethro Beekman wrote:
On 2019-07-10 08:49, Sean Christopherson wrote:
On Sun, Jul 07, 2019 at 04:41:34PM -0700, Cedric Xing wrote:
selinux_enclave_init() determines if an enclave is allowed to launch, using the criteria described earlier. This implementation does NOT accept SIGSTRUCT in
anonymous memory. The backing file is also cached in struct
file_security_struct and will serve as the base for decisions for anonymous
pages.

Did we ever reach a consensus on whether sigstruct must reside in a file?

This would be inconvenient for me, but I guess I can create a memfd?

No, sigstruct doesn't have to reside in a file.

But the current direction is, in SELinux, what the enclave can do depends on permissions given to the file containing sigstruct. That said, if SELinux is in effect, sigstruct has to reside in a real file with FILE__EXECUTE permission for the enclave to launch. memfd wouldn't work. To some extent, that serves the purpose of whitelisting.

--
Jethro Beekman | Fortanix




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux