Date: Fri, 19 Jan 2018 16:27:29 -0500 From: Mike Tancsa <mike@sentex.net> To: Pete French <petefrench@ingresso.co.uk>, freebsd-stable@freebsd.org Subject: Re: Ryzen issues on FreeBSD ? Message-ID: <a06cca15-c7b0-8f67-0812-19b6487e39b4@sentex.net> In-Reply-To: <00875e4d-740f-63f1-496c-6cda82b1a403@ingresso.co.uk> References: <8e842dec-ade7-37d1-6bd8-856ea1a827ca@sentex.net> <8dcf6cc8fad788ac8168a4a9f392b02e@foolishgames.com> <23c1d162-dcd8-c422-3114-d70b65b6c271@sentex.net> <e2d004c63e414022ce48b5b50959c302@foolishgames.com> <00875e4d-740f-63f1-496c-6cda82b1a403@ingresso.co.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
On 1/19/2018 4:14 PM, Pete French wrote: > To be honest this thread has put me off building my machine, the pile of > boxes with motherboard, case, cpu and ram is still sitting next to me > desk at work! It is quite discouraging, isnt it :( From my POV however, I really want a "plan b" to Spectre / Meltdown that at least slows down attackers. On a few servers, I do have ways to detect after that fact intrusions (tripwire etc), but I want to mitigate this attack from happening in the first place as much as possible. Supposedly Spectre exploits on AMD are MUCH harder (or so says AMD at least) so I am hoping I can at least have this as an option. We even ordered a Tyan Epyc based board to see what its like too. ---Mike -- ------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet services since 1994 www.sentex.net Cambridge, Ontario Canada http://www.tancsa.com/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?a06cca15-c7b0-8f67-0812-19b6487e39b4>