Intel processor kernel bug

A fundamental design flaw in Intel's processor chips dealing with speculative execution ("KASLR") was found and forced an extensive redesign of the kernels of at least Windows, Mac and Linux operating systems. It was also noted that an otherwise simple microcode update is not sufficient.

Interestingly, these patches KPTI patches to move the kernel to a separated address space of the operating system, no matter if Linux or Windows, will incur a performance hit on Intel products of possible 30%. It now reminds me of the time when DMA (Direct Memory Access) came around and did quite a performance boots. The imagine it's taken away from you again.

It is speculated that it might be enough for users of Intel based computers to run in the open arms of AMD. It will sure cost Intel dearly.

In the meantime two flaw were uncovered and nicknamed Meltdown and Spectre.

Comments