Date: Fri, 05 Jan 2018 10:24:10 -0800 From: "Chris H" <bsd-lists@BSDforge.com> To: "Eric McCorkle" <eric@metricspace.net> Cc: "=?UTF-8?B?RnJlZWJzZCBTZWN1cml0eSIgPGZyZWVic2Qtc2VjdXJpdHlAZnJlZWJzZC5vcmc+LCAiRnJlZUJTRCBIYWNrZXJzIiA8ZnJlZWJzZC1oYWNrZXJzQGZyZWVic2Qub3JnPiwgIiBmcmVlYnNkLWFyY2hAZnJlZWJzZC5vcmc+IiA8ZnJlZWJzZC1hcmNoQGZyZWVic2Qub3JnPiwgIkMgQmVyZ3N0csO2bSIgPGNiZXJnc3Ryb21AcGF0aHNjYWxlLmNvbT4=?= Subject: Re: Intel hardware bug Message-ID: <edca72233df2ccceab15e3e64b5a2b7c@udns.ultimatedns.net> In-Reply-To: <755a65eb-b02e-05c5-e1a2-701cfd8bc837@metricspace.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 5 Jan 2018 10:35:13 -0500 "Eric McCorkle" <eric@metricspace.net> said > On 01/05/2018 09:55, C Bergström wrote: > > > Don't bet on it. There's reports of AMD vulnerabilities, also for ARM. > > I doubt any major architecture is going to make it out unscathed. (But > > if one does, my money's on Power) > > > > > > Nope, the only arch that I'm aware of that gets past this is SPARC(hah!) > > due to the seperate userland and kernel memory virtualization. > > Alas, poor Sparc. I knew them, Horatio... Ahh, good ol' SPARC! > > It looks like Red Hat is indeed reporting Power9 to be vulnerable: > > https://access.redhat.com/security/vulnerabilities/speculativeexecution > > Unfortunate. I hope they get fixed silicon out in time for the Talos II > workstation. What *I* want to know; is whether they're going to drastically reduce the price on all the affected processors? As it stands, they should be practically giving them away. How is it that the burden lies on the OS vendors, and not the manufacturers?! --Chris
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?edca72233df2ccceab15e3e64b5a2b7c>
