[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190614153840.GC12191@linux.intel.com>
Date: Fri, 14 Jun 2019 08:38:40 -0700
From: Sean Christopherson <sean.j.christopherson@...el.com>
To: Stephen Smalley <sds@...ho.nsa.gov>
Cc: Cedric Xing <cedric.xing@...el.com>,
linux-security-module@...r.kernel.org, selinux@...r.kernel.org,
linux-kernel@...r.kernel.org, linux-sgx@...r.kernel.org,
jarkko.sakkinen@...ux.intel.com, luto@...nel.org,
jmorris@...ei.org, serge@...lyn.com, paul@...l-moore.com,
eparis@...isplace.org, jethro@...tanix.com, dave.hansen@...el.com,
tglx@...utronix.de, torvalds@...ux-foundation.org,
akpm@...ux-foundation.org, nhorman@...hat.com,
pmccallum@...hat.com, serge.ayoun@...el.com,
shay.katz-zamir@...el.com, haitao.huang@...el.com,
andriy.shevchenko@...ux.intel.com, kai.svahn@...el.com,
bp@...en8.de, josh@...htriplett.org, kai.huang@...el.com,
rientjes@...gle.com, william.c.roberts@...el.com,
philip.b.tricca@...el.com
Subject: Re: [RFC PATCH v1 2/3] LSM/x86/sgx: Implement SGX specific hooks in
SELinux
On Thu, Jun 13, 2019 at 05:46:00PM -0700, Sean Christopherson wrote:
> On Thu, Jun 13, 2019 at 01:02:17PM -0400, Stephen Smalley wrote:
> > On 6/11/19 6:02 PM, Sean Christopherson wrote:
> > >On Tue, Jun 11, 2019 at 09:40:25AM -0400, Stephen Smalley wrote:
> > >>I haven't looked at this code closely, but it feels like a lot of
> > >>SGX-specific logic embedded into SELinux that will have to be repeated or
> > >>reused for every security module. Does SGX not track this state itself?
> > >
> > >SGX does track equivalent state.
> > >
> > >There are three proposals on the table (I think):
> > >
> > > 1. Require userspace to explicitly specificy (maximal) enclave page
> > > permissions at build time. The enclave page permissions are provided
> > > to, and checked by, LSMs at enclave build time.
> > >
> > > Pros: Low-complexity kernel implementation, straightforward auditing
> > > Cons: Sullies the SGX UAPI to some extent, may increase complexity of
> > > SGX2 enclave loaders.
> > >
> > > 2. Pre-check LSM permissions and dynamically track mappings to enclave
> > > pages, e.g. add an SGX mprotect() hook to restrict W->X and WX
> > > based on the pre-checked permissions.
> > >
> > > Pros: Does not impact SGX UAPI, medium kernel complexity
> > > Cons: Auditing is complex/weird, requires taking enclave-specific
> > > lock during mprotect() to query/update tracking.
> > >
> > > 3. Implement LSM hooks in SGX to allow LSMs to track enclave regions
> > > from cradle to grave, but otherwise defer everything to LSMs.
> > >
> > > Pros: Does not impact SGX UAPI, maximum flexibility, precise auditing
> > > Cons: Most complex and "heaviest" kernel implementation of the three,
> > > pushes more SGX details into LSMs.
> > >
> > >My RFC series[1] implements #1. My understanding is that Andy (Lutomirski)
> > >prefers #2. Cedric's RFC series implements #3.
> > >
> > >Perhaps the easiest way to make forward progress is to rule out the
> > >options we absolutely *don't* want by focusing on the potentially blocking
> > >issue with each option:
> > >
> > > #1 - SGX UAPI funkiness
> > >
> > > #2 - Auditing complexity, potential enclave lock contention
> > >
> > > #3 - Pushing SGX details into LSMs and complexity of kernel implementation
> > >
> > >
> > >[1] https://lkml.kernel.org/r/20190606021145.12604-1-sean.j.christopherson@intel.com
> >
> > Given the complexity tradeoff, what is the clear motivating example for why
> > #1 isn't the obvious choice? That the enclave loader has no way of knowing a
> > priori whether the enclave will require W->X or WX? But aren't we better
> > off requiring enclaves to be explicitly marked as needing such so that we
> > can make a more informed decision about whether to load them in the first
> > place?
>
> Andy and/or Cedric, can you please weigh in with a concrete (and practical)
> use case that will break if we go with #1? The auditing issues for #2/#3
> are complex to say the least...
Follow-up question, is #1 any more palatable if SELinux adds SGX specific
permissions and ties them to the process (instead of the vma or sigstruct)?
Something like this for SELinux, where the absolute worst case scenario is
that SGX2 enclave loaders need SGXEXECMEM. Graphene would need SGXEXECUNMR
and probably SGXEXECANON.
static inline int sgx_has_perm(u32 sid, u32 requested)
{
return avc_has_perm(&selinux_state, sid, sid,
SECCLASS_PROCESS2, requested, NULL);
}
static int selinux_enclave_load(struct vm_area_struct *vma, unsigned long prot,
bool measured)
{
const struct cred *cred = current_cred();
u32 sid = cred_sid(cred);
int ret;
/* SGX is supported only in 64-bit kernels. */
WARN_ON_ONCE(!default_noexec);
/* Only executable enclave pages are restricted in any way. */
if (!(prot & PROT_EXEC))
return 0;
/*
* Private mappings to enclave pages are impossible, ergo we don't
* differentiate between W->X and WX, either case requires EXECMEM.
*/
if (prot & PROT_WRITE) {
ret = sgx_has_perm(sid, PROCESS2__SGXEXECMEM);
if (ret)
goto out;
}
if (!measured) {
ret = sgx_has_perm(sid, PROCESS2__SGXEXECUNMR);
if (ret)
goto out;
}
if (!vma->vm_file || !IS_PRIVATE(file_inode(vma->vm_file)) ||
vma->anon_vma) {
/*
* Loading enclave code from an anonymous mapping or from a
* modified private file mapping.
*/
ret = sgx_has_perm(sid, PROCESS2__SGXEXECANON);
if (ret)
goto out;
} else {
/* Loading from a shared or unmodified private file mapping. */
ret = sgx_has_perm(sid, PROCESS2__SGXEXECFILE);
if (ret)
goto out;
/* The source file must be executable in this case. */
ret = file_has_perm(cred, vma->vm_file, FILE__EXECUTE);
if (ret)
goto out;
}
out:
return ret;
}
Given that AppArmor generally only cares about accessing files, its
enclave_load() implementation would be something like:
static int apparmor_enclave_load(struct vm_area_struct *vma, unsigned long prot,
bool measured)
{
if (!(prot & PROT_EXEC))
return 0;
return common_file_perm(OP_ENCL_LOAD, vma->vm_file, AA_EXEC_MMAP);
}
Powered by blists - more mailing lists