Re: [RFC PATCH 4/9] mm: Introduce vm_ops->mprotect()

2019-06-04 Thread Andy Lutomirski
On Fri, May 31, 2019 at 4:32 PM Sean Christopherson wrote: > > SGX will use the mprotect() hook to prevent userspace from circumventing > various security checks, i.e. Linux Security Modules. > > Enclaves are built by copying data from normal memory into the Enclave > Page Cache (EPC). Due to

Re: [RFC PATCH 4/9] mm: Introduce vm_ops->mprotect()

2019-06-04 Thread Jarkko Sakkinen
On Fri, May 31, 2019 at 04:31:54PM -0700, Sean Christopherson wrote: > SGX will use the mprotect() hook to prevent userspace from circumventing > various security checks, i.e. Linux Security Modules. > > Enclaves are built by copying data from normal memory into the Enclave > Page Cache (EPC).

RE: [RFC PATCH 4/9] mm: Introduce vm_ops->mprotect()

2019-06-03 Thread Xing, Cedric
> From: Christopherson, Sean J > Sent: Friday, May 31, 2019 4:32 PM > > diff --git a/include/linux/mm.h b/include/linux/mm.h index > 0e8834ac32b7..50a42364a885 > 100644 > --- a/include/linux/mm.h > +++ b/include/linux/mm.h > @@ -458,6 +458,8 @@ struct vm_operations_struct { > void

[RFC PATCH 4/9] mm: Introduce vm_ops->mprotect()

2019-05-31 Thread Sean Christopherson
SGX will use the mprotect() hook to prevent userspace from circumventing various security checks, i.e. Linux Security Modules. Enclaves are built by copying data from normal memory into the Enclave Page Cache (EPC). Due to the nature of SGX, the EPC is represented by a single file that must be