lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Thu, 12 Nov 2020 20:24:32 +0100
From:   Pavel Machek <pavel@....cz>
To:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        jarkko.sakkinen@...ux.intel.com
Cc:     linux-kernel@...r.kernel.org, akpm@...ux-foundation.org,
        torvalds@...ux-foundation.org, stable@...r.kernel.org, lwn@....net,
        jslaby@...e.cz
Subject: Re: Linux 4.19.157 -- fixing SGX problem?

Hi!

> I'm announcing the release of the 4.19.157 kernel.
> 
> Please see the 5.9.8 announcement if you are curious if you should
> upgrade or not:
> 	https://lore.kernel.org/lkml/1605041246232108@kroah.com/

Quoting:

# Hint, if you are using SGX, then upgrade.  And then possibly
# reconsider
# the decisions you have recently made that caused you to write special
# code to use that crazy thing.  Personally, it still feels like a
# solution in search of a problem.

I agree with you that SGX is "crazy", but this makes no sense.

SGX is expected to protect enclave even from root. How does making
interface root-only solve that?

Plus, SGX is not in 4.19. I don't believe it is in mainline, either,
as the patches are still reposted. We are at v40 now...

Date: Wed,  4 Nov 2020 16:54:06 +0200
From: Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>
Subject: [PATCH v40 00/24] Intel SGX foundations

ls arch/x86/kernel/cpu/sgx shows nothing in mainline. It shows nothing
in -next, either.

Confused,
								Pavel
-- 
http://www.livejournal.com/~pavelmachek

Download attachment "signature.asc" of type "application/pgp-signature" (182 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ