From owner-freebsd-stable@freebsd.org Sun Feb 18 22:02:20 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6B271F09096 for ; Sun, 18 Feb 2018 22:02:20 +0000 (UTC) (envelope-from tundra@tundraware.com) Received: from oceanview.tundraware.com (oceanview.tundraware.com [45.55.60.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mailman.tundraware.com", Issuer "mailman.tundraware.com" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 156FE6E76E for ; Sun, 18 Feb 2018 22:02:20 +0000 (UTC) (envelope-from tundra@tundraware.com) Received: from [192.168.0.2] (ozzie.tundraware.com [75.145.138.73]) (authenticated bits=0) by oceanview.tundraware.com (8.15.2/8.15.2) with ESMTPSA id w1IM2DK8009174 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Sun, 18 Feb 2018 16:02:14 -0600 (CST) (envelope-from tundra@tundraware.com) Subject: Re: stable/11 r329462 - Meltdown/Spectre MFC questions To: "Eric A. Borisch" Cc: David Marec , freebsd-stable@freebsd.org References: <20180217194726.GA79666@icarus.home.lan> <58099107-bc04-8ad9-3909-16bf5297dd2b@davenulle.org> <20180218165001.whbmonks7fq27mgq@mutt-hbsd> From: Tim Daneliuk Message-ID: <9b010393-e60f-5cbf-0a55-6082798fd237@tundraware.com> Date: Sun, 18 Feb 2018 22:02:08 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.6.2 (oceanview.tundraware.com [45.55.60.57]); Sun, 18 Feb 2018 16:02:14 -0600 (CST) X-TundraWare-MailScanner-Information: Please contact the ISP for more information X-TundraWare-MailScanner-ID: w1IM2DK8009174 X-TundraWare-MailScanner: Found to be clean X-TundraWare-MailScanner-SpamCheck: not spam (whitelisted), SpamAssassin (not cached, score=-0.894, required 1, autolearn=not spam, ALL_TRUSTED -1.00, AWL 0.12, T_RP_MATCHES_RCVD -0.01) X-TundraWare-MailScanner-From: tundra@tundraware.com X-Spam-Status: No X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 18 Feb 2018 22:02:20 -0000 On 02/18/2018 09:50 PM, Eric A. Borisch wrote: > > On Sun, Feb 18, 2018 at 3:17 PM Tim Daneliuk > wrote: > > On 02/18/2018 05:47 PM, David Marec wrote: > > #cpucontrol -u -v /dev/cpuctl0 > > cpucontrol: skipping /usr/local/share/cpucontrol/m32306c3_00000022.fw of rev 0x22: up to date > > > While we're on the subject ... where does one find these microcode updates > anyway.  On a 10.4-STABLE system, the command above blows out because > there is no director /usr/local/share/cpucontrol ... so I am missing > the magic to get it populated. > > -- > ---------------------------------------------------------------------------- > Tim Daneliuk     tundra@tundraware.com > PGP Key:         http://www.tundraware.com/PGP/ > > > It’s provided by the sysutils/devcpu-data port. > >  - Eric > > Yes thanks, I finally tripped across that myself :) Do we have any insight on whether this addresses the latest vulnerabilities? -- ---------------------------------------------------------------------------- Tim Daneliuk tundra@tundraware.com PGP Key: http://www.tundraware.com/PGP/