[Info-vax] Intel junk...Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign
Alan Browne
bitbucket at blackhole.com
Fri Jan 5 09:24:28 EST 2018
On 2018-01-05 09:15, DaveFroble wrote:
> Jan-Erik Soderholm wrote:
>> Becuse the designers, for performance reasons, has mapped kernel memory
>> into the user process address space and relies on the OS to check
>> protection before any kernel memory (or code) is accessed.
>>
>> The issue with the current issues is that the hardware (the CPU) does
>> these accesses in hardware "under the hood" without control by the OS.
>>
>> If you map your kernel memory in another way that uses the hardware
>> protection facilities, you are (as I understand) safe, at the cost
>> of worse performance to switch between user and kernel mode.
>>
>>
>
> As I wrote, someone dropped the ball on this one.
>
> Speculative execution is part of the HW, not software. It appears the
> HW doesn't follow it's own rules. Or, perhaps I don't actually
> understand the problem?
At least as well as I do. These are very complex mechanisms and
complexity is usually where you're most likely to get problems.
In this case the h/w implementation didn't reflect the design goal.
This means intel had very poor design review and abysmal testing of
security features.
--
“When it is all said and done, there are approximately 94 million
full-time workers in private industry paying taxes to support 102
million non-workers and 21 million government workers.
In what world does this represent a strong job market?”
.Jim Quinn
More information about the Info-vax
mailing list