From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Google-Smtp-Source: ACJfBovbidD7ik7irnxpkjkXID99JJZuNQ9FNVEln3XpoHJF6i3qHivW78eyutclgxADzINUPlYe ARC-Seal: i=1; a=rsa-sha256; t=1515058047; cv=none; d=google.com; s=arc-20160816; b=QiB7pkDVxM+Gk1a0iwM4S84pxlCG/DP1N2oyuzQe93nIFC3oEprUvJ96BdoeBgyrdt qBxVo1sqein3CshieQ24DBMK2EBoBnVV4wyEUvM+eYI5RZAwDa/+zKHa9S10JSDu7gqi H1droVSEr2Ll0bBh3qm+bPZTOttdrXHX3uLEiiHVwg7GP9iwrk5bAga0i6w+yBCk0yQ1 4Y7TaqRjwJfs0xIRsnD4zA2u+HCew/4XWrvCi+btN0onoEFXswl6SOwQ28N1YHD8eNyp F8POtA8QNXHeW0V8tMpZNsEN+Ddx2iglpNfycsi1gleArw3/5w9KBFYDx1TnuLipKf1y icnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:references:subject:cc:to :mime-version:user-agent:from:date:message-id :arc-authentication-results; bh=NEX1vX8Xz+royY4Qn+jetiZ1IwjcPwxE7DHrNf2VzxA=; b=efgmp/TZ8bO+ERoGd66fdi/J4hXzEedlhNgsB2BxlywUozjOSQBq6WA6Ac8GOdA9Qc ujviyB2PTqcBaDU7drfobX+1Bo9svx18errsE0n9uHyu8Y91hBgYxngEvRT1SCE6ZNP9 mBH/EQUSsv0TR8nTwMK6lqokEQJwe89xWksnexBHMAhqgxcOPTbRlbLSGWBj9g3Pj8x2 8Icgt8rsci+X8av5kmQOyekNIhAA4LM3AVd9bCiehm0gz5vGcbAuvqmRM7hJnl6GesKb i7nsYm6VJHztZgqtJmsdldS+CpEsQuLlEPXlos2b6BGSjwosF1mJpnctkIGtUfmqKQ15 A6CQ== ARC-Authentication-Results: i=1; mx.google.com; spf=neutral (google.com: 212.227.126.187 is neither permitted nor denied by best guess record for domain of stroetmann@ontolab.com) smtp.mailfrom=stroetmann@ontolab.com Authentication-Results: mx.google.com; spf=neutral (google.com: 212.227.126.187 is neither permitted nor denied by best guess record for domain of stroetmann@ontolab.com) smtp.mailfrom=stroetmann@ontolab.com Message-ID: <5A4DF1C2.80106@ontolab.com> Date: Thu, 04 Jan 2018 10:20:02 +0100 From: Christian Stroetmann User-Agent: Mozilla/5.0 (Windows NT 5.0; rv:12.0) Gecko/20120428 Thunderbird/12.0.1 MIME-Version: 1.0 To: greg@enjellic.com CC: "Dr. Greg Wettstein" , Pavel Machek , Jarkko Sakkinen , platform-driver-x86@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, Borislav Petkov , "David S. Miller" , Greg Kroah-Hartman , Grzegorz Andrejczuk , Haim Cohen , Ingo Molnar , Janakarajan Natarajan , Jim Mattson , Kan Liang , "Kirill A. Shutemov" , Kyle Huey , Len Brown , open list:DOCUMENTATION , "open list:FILESYSTEMS (VFS and infrastructure)" , Mauro Carvalho Chehab , Paolo Bonzini , Piotr Luc , Radim Kr??m???? , Randy Dunlap , Sean Christopherson , Thomas Gleixner , Tom Lendacky , Vikas Shivappa Subject: Re: [PATCH v6 00/11] Intel SGX Driver References: <201801040802.w04828Uj024983@wind.enjellic.com> In-Reply-To: <201801040802.w04828Uj024983@wind.enjellic.com> Content-Type: text/plain; charset=ISO-8859-15; format=flowed Content-Transfer-Encoding: 7bit X-Provags-ID: V03:K0:trNB6d4wMTgCq4/sxIkPp96VWjI+0+K3PW5HwhwCsH1L9JrC00C F5jqqJc5pY5v62je9j7naOHucuetE+XlCh8tMQW6JXgQbkUeOyXYdLCeE0nW+D2Leded9Gd PIS9gBAgrS+/xCW/d5438ECVP/KC8QurPISvGHSpaU4rJ9BoLBQA5wqhUTHQN9mLaC/FHkA Nf66wtNbmx35DPVLj1Sqw== X-UI-Out-Filterresults: notjunk:1;V01:K0:RtI9lL/WpnY=:EOYUMJ5dIpHafDiiHFCXer d/BYwLNNMHzZ0T+O4hxgUbN1AFyBrjeiwSmXA3qwETRvTvsI/79DqHEPi9o3fCHxCoBIU5e3s jjNt3XNNUfM18/usGSTAf6vaMGs8zrSwOBWixDd1fgimQ6qEUqNtVaGB8dDeKDRTFOq3dvV6S nJJeSxqryI302t60c+DxTmZuOMfR5LOiEojDV+IncmbVuGeaNuKaDZvfq77S1ik9x1ymF9BiB idqHHM94yEfawUBVU2i/kiIiz/kOKX3Wz5BLSGEirq4XKgjPRrkzeaTPZFIJlE0rbzHL7pQXP lhBwEdrfggRo4Wj48joGR+hCu6bUCJa06GDyc58YAyJyfpcHKHD+RdBSQOmZR3K6ti966Ahma +EUlbfODPNTjfYa1d1ZC6yr3dX1SHxAJhR4onCvvd5sUWY7LEoLrtqACUttD/JOXIzWOyvack AnVdrAZBl7OfABZCfDKNmQB58fekFjb41Ep2Nj5oD+JeHMdzGiqak2Sn1K9NOPDaA5Z8E8MP0 OiIsXrD7K9lWqWlGmqnTfRr7eFrwAHgl/Jt+sjgRH50nYnS7BnFMZTvwkztXxP2947h8LRTDd 6JgBDMMg40PEUVG3wgy11Cydl6elBJkgrEoTJi8z+t0G7npzxTfJVOrKJGaKhlm4b5I4MplLO +yRaEJYhtwWiEQvn1SgkxMXiq3RseHbLnNFMFXYitcEBnEgWe+hzq5YcloVvlQ8r6ybPPCZDe vKZ3liIEKPtoJIJf3HhojdO5jhALYJIGei4cP/PPjBT04qLhHlB75webnHnaWD2EJalWo7yZw ixv3MzR6fbHV5w+0NkYFEbSzTTMy2dpdMBEL59HQ0lBb2boVtbUEuEq+4CPbjKtmfZuA+y/ X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: =?utf-8?q?1587696854965003493?= X-GMAIL-MSGID: =?utf-8?q?1588653507031862361?= X-Mailing-List: linux-kernel@vger.kernel.org List-ID: On the 04.Jan.2018 09:02, Dr. Greg Wettstein wrote: Aloha First of all, I would like to appologize that there was an unusual issue with my email client, so that my email did not reach the mailing list linux-fsdevel. Hopefully, this does not happen once again with this email. Thank you for answering but let me ask some more (simple) questions below. > On Jan 3, 3:00am, Christian Stroetmann wrote: > } Subject: Re: [PATCH v6 00/11] Intel SGX Driver > > Good morning, I hope the day is going well for you. > >>> Philosophically we take the approach that for high security >>> assurance environments that it is virtually impossible to allow >>> any untrusted code to run on a platform. Which is why we focus on >>> autonomous introspection for these environments. >> Interesting. I would like to hear more about this autonomous >> introspection concept, specifically what it monitors and how it >> reacts on an issue. > AI as we call it.. :-), at a high level, is the notion that an > operating system platform can be modeled for its intended behavior, > just as is done for buildings, bridges and airplanes. The model is > based on a precise mathematical description of the set of desired > information exchange events that the operating system will be allowed > to mediate. So you have artificial intelligence in the operating system respectively kernel? What is with machine learning? Also, you need to ensure that your precise mathematical model is correct and that your code implements the model in a correct way. > > Autonomous introspection is the notion of the platform using this > model to monitor and self-regulate its behavior. This sounds like somekind of a reflective functionality. > >> Maybe you have a summary or short introduction of the concept or/and >> a link to a document. > The initial concept and implementation were described by the following > Linux Security Summit paper: > > http://kernsec.org/files/lss2015/idfusion-iso-identity-paper.pdf > > The work has matured a great deal since then. > > Most notably the modeling and control engine have been lifted out of > the kernel into an SGX enclave. In this architecture the kernel > cannot act without permission from the enclave based engine, which > requires the integrity of the enclave to be violated in order to > compromise the kernel. This would be ideal with a microkernel based operating system. > > A virtuous circle. > >> Regards >> Christian Stroetmann > We can engage further in private e-mail as this may or may not be of > general interest. > > Thanks for the interest. I think that the others are also interested in this subject matter. Regards Christian Stroetmann > > Have a good day. > > Greg > > }-- End of excerpt from Christian Stroetmann [snip]