Date: Wed, 26 Jul 2023 22:49:49 +0000 From: 0x1eef <0x1eef@protonmail.com> To: Konstantin Belousov <kostikbel@gmail.com> Cc: "freebsd-security@freebsd.org" <freebsd-security@freebsd.org> Subject: Re: Zenbleed Message-ID: <T8Bs8CnoOIqdFKKAFDUbWvhKwpUcplEgD6IL7VJt8DDajZbHLO7Hz3GVwyfO1o5wZVkt0GFntqjTEbRcsDbx11i5uqdZ_cWFJI-nrGzKFTs=@protonmail.com> In-Reply-To: <ZMGcKUIrqJ9TZZDo@kib.kiev.ua> References: <G8KdlREJ53JvhucNV2MkjySsZ4qqs6ZdHFXJaFqDIvXj5usSBEr3pOe29JoQVHgjtctmrIOR7O1PHwchvf_cGLr53jbwNGPy_F7_9OstBCE=@protonmail.com> <ZMGcKUIrqJ9TZZDo@kib.kiev.ua>
next in thread | previous in thread | raw e-mail | index | archive | help
> The chicken bit workaround is > # for x in /dev/cpuctl*; do cpucontrol -m '0xc0011029|=3D0x200' $x; done > there is nothing to wait for. It is silly to push this into kernel when > recommended solution is ucode update. Great ! Thanks. 0x1eef
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?T8Bs8CnoOIqdFKKAFDUbWvhKwpUcplEgD6IL7VJt8DDajZbHLO7Hz3GVwyfO1o5wZVkt0GFntqjTEbRcsDbx11i5uqdZ_cWFJI-nrGzKFTs=>