This small patch, to the Linux Kernel, is the most epic burn on @Intel by @AMD.
Paraphrased in English:
"If the CPU isn't AMD, assume it's not secure." pic.twitter.com/n5v1ikKPNi— Bryan Lunduke (@BryanLunduke) January 3, 2018
What #KPTI really stands for is actually “Kill Performance when Trapping on Intel”
— Alex Ionescu (@aionescu) January 3, 2018
Some papers (in thread) which people should read & understand.
Weeping optional. 20-20 hindsight forbidden. https://t.co/KDGY3kYdvM
— Arrigo Triulzi (@cynicalsecurity) January 3, 2018
Bingo! #kpti #intelbug pic.twitter.com/Dml9g8oywk
— brainsmoke (@brainsmoke) January 3, 2018
https://lkml.org/lkml/2017/12/27/2
It’s worth pointing out that not only does Windows have KPTI/KVA shadowing enabled for AMD processors as well, it even has specialized shadow system call entry stubs for AMD vs Intel. This either suggests they know how to embargo properly or that Tom’s PR is not entirely accurate
— Alex Ionescu (@aionescu) January 3, 2018
https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/