[Info-vax] Intel junk...Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign

Pabst Blue Ribbon pabst at blue.ribbon
Fri Jan 5 18:01:39 EST 2018


Alan Browne <bitbucket at blackhole.com> wrote:
> On 2018-01-05 09:15, DaveFroble wrote:
>> Jan-Erik Soderholm wrote:
> 
>>> Becuse the designers, for performance reasons, has mapped kernel memory
>>> into the user process address space and relies on the OS to check
>>> protection before any kernel memory (or code) is accessed.
>>> 
>>> The issue with the current issues is that the hardware (the CPU) does
>>> these accesses in hardware "under the hood" without control by the OS.
>>> 
>>> If you map your kernel memory in another way that uses the hardware
>>> protection facilities, you are (as I understand) safe, at the cost
>>> of worse performance to switch between user and kernel mode.
>>> 
>>> 
>> 
>> As I wrote, someone dropped the ball on this one.
>> 
>> Speculative execution is part of the HW, not software.  It appears the 
>> HW doesn't follow it's own rules.  Or, perhaps I don't actually 
>> understand the problem?
> 
> At least as well as I do.  These are very complex mechanisms and 
> complexity is usually where you're most likely to get problems.
> 
> In this case the h/w implementation didn't reflect the design goal.
> 
> This means intel had very poor design review and abysmal testing of 
> security features.

I doubt it. Yes, it's assumption but I think Intel was aware and gave OK to
flawed design because of performance/cost.




More information about the Info-vax mailing list