*A remote hijacking flaw that lurked in Intel chips for seven years was more severe than many people imagined, because it allowed hackers to remotely gain administrative control over huge fleets of computers without entering a password. This is according to technical analyses published Friday.*
For *se7en* years. INTEL, please, keep up the good job!
Zoran
On Wed, May 10, 2017 at 1:14 AM, ron minnich rminnich@gmail.com wrote:
On Tue, May 9, 2017 at 3:25 PM Taiidan@gmx.com Taiidan@gmx.com wrote:
How come risv-v has no DMA security features? ala IOMMU? if you want to do virtualization that is also a must have due to the performance differential - you couldn't push 1gbps on a emulated NIC without serious processing power.
well, because they are in their very first years, and survival is job 1, followed some time later by achieving high end performance.
And, further, if you look at lowrisc, it's not even clear you want a dma engine. maybe a core running one and only one kernel thread that moves data is what you want.
But we'll see. One thing at a time. Survival ahead of everything else.
-- coreboot mailing list: coreboot@coreboot.org https://mail.coreboot.org/mailman/listinfo/coreboot