Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 05 Jan 2018 10:24:10 -0800
From:      "Chris H" <bsd-lists@BSDforge.com>
To:        "Eric McCorkle" <eric@metricspace.net>
Cc:        "=?UTF-8?B?RnJlZWJzZCBTZWN1cml0eSIgPGZyZWVic2Qtc2VjdXJpdHlAZnJlZWJzZC5vcmc+LCAiRnJlZUJTRCBIYWNrZXJzIiA8ZnJlZWJzZC1oYWNrZXJzQGZyZWVic2Qub3JnPiwgIiBmcmVlYnNkLWFyY2hAZnJlZWJzZC5vcmc+IiA8ZnJlZWJzZC1hcmNoQGZyZWVic2Qub3JnPiwgIkMgQmVyZ3N0csO2bSIgPGNiZXJnc3Ryb21AcGF0aHNjYWxlLmNvbT4=?=
Subject:   Re: Intel hardware bug
Message-ID:  <edca72233df2ccceab15e3e64b5a2b7c@udns.ultimatedns.net>
In-Reply-To: <755a65eb-b02e-05c5-e1a2-701cfd8bc837@metricspace.net>

next in thread | previous in thread | raw e-mail | index | archive | help

On Fri, 5 Jan 2018 10:35:13 -0500 "Eric McCorkle" <eric@metricspace.net> said

> On 01/05/2018 09:55, C Bergström wrote:
> 
> >     Don't bet on it.  There's reports of AMD vulnerabilities, also for ARM.
> >     I doubt any major architecture is going to make it out unscathed.  (But
> >     if one does, my money's on Power)
> > 
> > 
> > Nope, the only arch that I'm aware of that gets past this is SPARC(hah!)
> > due to the seperate userland and kernel memory virtualization.
> 
> Alas, poor Sparc.  I knew them, Horatio...
Ahh, good ol' SPARC!

> 
> It looks like Red Hat is indeed reporting Power9 to be vulnerable:
> 
> https://access.redhat.com/security/vulnerabilities/speculativeexecution
> 
> Unfortunate.  I hope they get fixed silicon out in time for the Talos II
> workstation.
What *I* want to know; is whether they're going to drastically reduce the
price on all the affected processors? As it stands, they should be
practically giving them away. How is it that the burden lies on the OS
vendors, and not the manufacturers?!

--Chris





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?edca72233df2ccceab15e3e64b5a2b7c>