lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 16 May 2020 15:21:06 +0300 From: Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com> To: Andi Kleen <ak@...ux.intel.com>, Sasha Levin <sashal@...nel.org> Cc: linux-kernel@...r.kernel.org, tglx@...utronix.de, bp@...en8.de, luto@...nel.org, hpa@...or.com, dave.hansen@...el.com, tony.luck@...el.com, ravi.v.shankar@...el.com, chang.seok.bae@...el.com Subject: Re: [PATCH v12 00/18] Enable FSGSBASE instructions On Fri, 2020-05-15 at 10:55 -0700, Andi Kleen wrote: > > Indeed, we've seen a few hacks that basically just enable FSGSBASE: > > > > - https://github.com/oscarlab/graphene-sgx-driver > > - https://github.com/occlum/enable_rdfsbase > > > > And would very much like to get rid of them... > > These are insecure and open root holes without the patches > used here. > > -Andi Yup, totally. /Jarkko
Powered by blists - more mailing lists