> On Apr 19, 2019, at 2:19 PM, Jethro Beekman <[email protected]> wrote: > >> . >> >> If we start enforcing equivalent rules on SGX, then the current API will >> simply not allow enclaves to be loaded — no matter how you slice it, loading >> an enclave with the current API is indistinguishable from making arbitrary >> data executable. > > Yes this is exactly what I intended here: a very simple change that > stops SGX from confusing LSM. Just by enforcing that everything that > looks like a memory write (EADD, EAUG, EDBGWR, etc.) actually requires > write permissions, reality and LSM should be on the same page. > > If you want to go further and actually allow this behavior when your LSM > would otherwise prohibit it, presumably the same workarounds that exist > for JITs can be used for SGX. > > I do think we need to follow LSM rules. But my bigger point is that there are policies that don’t allow JIT at all. I think we should arrange the SGX API so it’s still usable when such a policy is in effect.
- Re: [PATCH v20 00/28] Intel SGX1 support Dave Hansen
- Re: [PATCH v20 00/28] Intel SGX1 support Dr. Greg
- Re: [PATCH v20 00/28] Intel SGX1 support Andy Lutomirski
- Re: [PATCH v20 00/28] Intel SGX1 support Jethro Beekman
- Re: [PATCH v20 00/28] Intel SGX1 supp... Thomas Gleixner
- Re: [PATCH v20 00/28] Intel SGX1... Jethro Beekman
- Re: [PATCH v20 00/28] Intel ... Thomas Gleixner
- Re: [PATCH v20 00/28] Intel ... Jethro Beekman
- Re: [PATCH v20 00/28] Intel ... Andy Lutomirski
- Re: [PATCH v20 00/28] Intel ... Jethro Beekman
- Re: [PATCH v20 00/28] Intel ... Andy Lutomirski
- Re: [PATCH v20 00/28] Intel ... Jethro Beekman
- Re: [PATCH v20 00/28] Intel ... Thomas Gleixner
- Re: [PATCH v20 00/28] Intel ... Jethro Beekman
- Re: [PATCH v20 00/28] Intel ... Thomas Gleixner
- Re: [PATCH v20 00/28] Intel ... Dr. Greg
- Re: [PATCH v20 00/28] Intel ... Sean Christopherson
- Re: [PATCH v20 00/28] Intel ... Dr. Greg
- Re: [PATCH v20 00/28] Intel ... Sean Christopherson
- Re: [PATCH v20 00/28] Intel ... Linus Torvalds
- Re: [PATCH v20 00/28] Intel ... Sean Christopherson

