Re: [PATCH v14 19/19] x86/sgx: Driver documentation

From: Jarkko Sakkinen
Date: Fri Oct 19 2018 - 20:00:08 EST


On Thu, 18 Oct 2018, Pavel Machek wrote:
Definitely should be refined.

Meltdowns approach AFAIK does not work because reads outside the enclave
will always have a predefined value (-1) but only if the page is present,
which was later exploited in the Foreshadow attack.

What about L1tf and https://github.com/lsds/spectre-attack-sgx ?

L1TF is the vuln and Foreshadow is the attack taking advantage of the
vuln. I didn't mean to patch the documention in my response or give
extensive list of the vulns if you expected that.

For kernel documentation it does make sense to give a threat model
but not enumerate every possible vuln.

/Jarkko