Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 26 Jul 2023 22:49:49 +0000
From:      0x1eef <0x1eef@protonmail.com>
To:        Konstantin Belousov <kostikbel@gmail.com>
Cc:        "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>
Subject:   Re: Zenbleed
Message-ID:  <T8Bs8CnoOIqdFKKAFDUbWvhKwpUcplEgD6IL7VJt8DDajZbHLO7Hz3GVwyfO1o5wZVkt0GFntqjTEbRcsDbx11i5uqdZ_cWFJI-nrGzKFTs=@protonmail.com>
In-Reply-To: <ZMGcKUIrqJ9TZZDo@kib.kiev.ua>
References:  <G8KdlREJ53JvhucNV2MkjySsZ4qqs6ZdHFXJaFqDIvXj5usSBEr3pOe29JoQVHgjtctmrIOR7O1PHwchvf_cGLr53jbwNGPy_F7_9OstBCE=@protonmail.com> <ZMGcKUIrqJ9TZZDo@kib.kiev.ua>

next in thread | previous in thread | raw e-mail | index | archive | help
> The chicken bit workaround is
> # for x in /dev/cpuctl*; do cpucontrol -m '0xc0011029|=3D0x200' $x; done
> there is nothing to wait for. It is silly to push this into kernel when
> recommended solution is ucode update.

Great ! Thanks.

0x1eef




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?T8Bs8CnoOIqdFKKAFDUbWvhKwpUcplEgD6IL7VJt8DDajZbHLO7Hz3GVwyfO1o5wZVkt0GFntqjTEbRcsDbx11i5uqdZ_cWFJI-nrGzKFTs=>