If you see this post from Microslop read between the lines.
The CVE-2017-5754 which is Meltdown a.k.a Rouge Data Cache Load is exclusive to Intel and ARM Cortex -A75, while the former and latter both don't have any microcode patch - BUT it has severe performance hit atleast on Intel platform, KPTI through only OS update. While the Spectre variants CVE-2017-5753 a.k.a Bounds Check Bypass also doesn't have any microcode patch. Now interesting thing is the CVE-2017-5715 a.k.a Branch Target Injection affects multiple CPUs from AMD, ARM, Intel right ? So in the M$ blog they state this needs the BIOS Microcode update and yeah coming to the Haswell, a.k.a 2014-2015 era HW (Which have proper Windows 7 / BIOS with CSM support) the performance hit is high and throws severe errors and undermines the clockspeed / OC performance as well, Also stated in the blog above
now read this again
So from the microsoft statement & the OCN thread (Haswell v23 Microcode update perf impact & analysis, thanks to the OP of this thread) are saying the same that the Variant 2 which is Spectre (5715) has maximum impact, Plus blog also states that but the below old articles say otherwise and lack the information.
Why only Intel is highlighted here and the Windows 10 Information is only pressed ? What about the AMD processors state on that, which is Ryzen which runs on Windows 7 properly and Windows 10 too. While the Skylake has issues with booting to the Windows 7 unless the OEM allows them, plus the eHCI EOLing.
Which only makes me think about only one solid truth of the industry's (Microshaft and Intel's collusion) massive plan to EOL BIOS by 2020. By making the Pre-Skylake machines go EOL faster and efficient by stating the performance hits wr.to the architectural differences and the giveaway is the Intel's marketshare in both Enterprise and Consumer by hitting that and the OS Windows 7 which favors the CSM/BIOS over the full UEFI they will be successful.
While the Win10 is perpetual alpha of 6Mo cycle with 18Mo EOL on each release unless they run the LTSC which heavily depends on the silicon release and changes, One is purported to be released in 2019. I guess for all the smart people who are running the 2016 LTSB wait for that 2019 version, Post that expect not to boot on the CSM/BIOS HW (or options enabled) properly or has issues.
Now read this article from Ars, Stance on all Companies PR - Recommended, very insightful.
INTEL
AMD
ARM
Apple
Microshaft
In case you missed the Apple's statement and thought it as somewhat super neat. Nope.
And look at this article from Verge
Now Look at this Intel PR a few days back, Embargo lift on Jan 9th and they came to know about this from multiple points, Google Project Zero and TUGraz , others who I missed, still lots of missing information on the vulnerability which came last year..
Welp !
This situation is a big loss to us consumers who favor liberty, due to whatever shenanigans the corporate want to pull regarding the backdoors, utter lack of transparency etc. It's the greatest fallacy from most of the companies ever tbh in broad daylight varying from SEC warrant, Class Actions, failed M$ updates on AMD platform to the Register articles, Significant chunk of Information missing like the Spectre variant 2 patch impact on platforms other than Intel... Makes me cringe, ughhh..
I didn't update my system whatsoever in rush on patching it and get a stupid and botched performance patch. I know my limits and how to navigate in the sea of snakes. I'll wait instead and see how things progress then patch.
P.S - Excuse me for lack of chronological ordering of my post, timeline of the articles & small mistakes that might have crept in but hope you understand and construct them effectively.
-
@hmscott @Vasudev and any other linux users:
Here is the Intel links to the Linux microcode released 1/08/2018. I didn't post it earlier, I don't think, because I either figured you guys had found it or that it was incorporated with Linux OS updates. To be certain, here you are:
https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File -
Maybe its time to read Intel CPU's developer edition of pdf file to get some ideas.Raiderman likes this. -
hmscott likes this.
-
http://ftp.debian.org/debian/indices/files/hmscott likes this. -
https://www.pcsuggest.com/update-cpu-microcode-in-linux/
Published 12/30/2017
@hmscottPapusan, Ashtrix, hmscott and 1 other person like this. -
any guesses on likelihood of a recall-type scenario happening? on the one hand it seems silly to expect, but on the other hand i wonder if this is a possible outcome, especially if and when government regulatory agencies really start getting involved.
it's really a huge turnoff to consider how unstable and constantly-changing the 2018 landscape will be in terms of updates/patches, with all the various entities involved likely to continue tweaking and handling this crap in response to freshly-discovered issues, technews feedback, and consumer complaint. with great support communities like here, and the collective industry working hard to manage it, i know i could at least rely on help to figure out the best way to apply (or avoid on per-case basis) updates and patches as time goes on, but it sucks thinking that i could spend the next months continually adjusting a new computer, it's almost more hassle than it's worth, just thinking about it gives me a headache. cuz even tho i don't really care about being "protected!" and would easily ignore patches, i'm certain that as time passes there will be more and more ways that intel/windows/whoever(maybe even govt eventually) will essentially be forcing consumer to update, with little choice (and i simply don't have the patience or knowledge/expertise to commit to "arms race" and sneak around it, as some people here have).
or maybe i'm just thinking too much into it and should just stop being a baby and deal with it? -
Last edited: Jan 10, 2018
-
Last edited: Jan 10, 2018
-
Spartan@HIDevolution Company Representative
I also use this tweak:
Code:Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management] "DisablePagingExecutive"=dword:00000001 "LargeSystemCache"=dword:00000001
-
If you use your PC as File server then Large System Cache really helps.hmscott likes this. -
Starlight5 Yes, I'm a cat. What else is there to say, really?
I run without pagefile regardless, for many years. -
This is with the 1709 patch. Only hit seen so far is the 2-5% CDM R/W and that I can live with.
Papusan, Vasudev, hmscott and 1 other person like this. -
If one encounters instability (BSOD) you need it enabled to save DMP files for analysis, but you can always temporarily enable page file if you need to for that.alexhawker, Papusan, Vasudev and 3 others like this. -
I've come to a realization: I'm, sometime in the coming months, going to setup a linux/android build system, meaning a linux based system on which I will build my own customized builds of linux and android distros, based off of the github or respective linux sites. I've wanted to break away from Windows for awhile and have decided to relegate M$ to a dual boot for benchmarks, and VM for anything I cannot run on Linux....
This way I can just pull from the servers the necessary files to update builds when I care to and take a bit more control.
Edit: UBUNTU 4.15-RC7 Kernel update: http://sourcedigit.com/23105-linux-kernel-4-15-rc7-on-ubuntu/
Don't forget to clean up after you install the header info.Last edited: Jan 10, 2018 -
@hmscott @Vasudev - here is the .deb distribution of the still listed as unstable 20180108 microcode: https://packages.debian.org/sid/intel-microcode
-
Starlight5 Yes, I'm a cat. What else is there to say, really?
-
-
I dont want to update my bios on my laptop, as it is an unlocked bios from the guy on the MSI forums. I guess it doesnt matter, as there is not a bios update available for my system any way.
hmscott likes this. -
-
I can never remember his name..lol Thanks, I will check the forums and see.
-
I can see, that I am going to have to sit down and create a new Windows 7 installation ISO. I want to create one with all the new hardware drivers, and simplix latest, all in one. I think I will create one with a total customization of how I have things set up on most my PC's, including icons, dll's, and Mui's. So I can basically install, and go.
steberg, Vasudev, KY_BULLET and 1 other person like this. -
The vulnerability checker crashes for me every time I ask it to check, anybody else noticing this problem? What's a good way to measure performance loss post patch?
-
I'm trying to wrap my head around everything and boil it down to a basic checklist of necessary actions one must eventually take to protect against the vulnerabilities (not immediately due to buggy patches, BSODs, etc.):
1. Make sure your anti-virus sets the compatibility registry key for the January 2018 security patch (can set manually if you don't use AV).
2. Update Windows with said January 2018 patches (risky right now, especially for older and/or AMD CPUs).
3. Update BIOS/firmware/microcode* (must get from laptop/desktop OEM for pre-built systems or from motherboard manufacturer site for custom-built systems).
4. Update AMD/Nvidia drivers since GPUs may also be vulnerable to Meltdown/Spectre.
Is that it in a nutshell?
There's also the matter of using the latest version of your browser of choice with an ad-blocker like uBlock Origin to block possibly harmful ads/scripts. If someone wants to go further they can use an add-on like NoScript to block scripts more aggressively.
*The microcode update is where I trip up. It seems like Intel already released this, and users can either install it manually or wait for their system/motherboard OEM to release a BIOS update?Last edited: Jan 10, 2018 -
inm8#2 likes this.
-
hmscott likes this.
-
Fyi:
I used VMware tool to install driver with updated microcode.
For my system (laptop MSI GT72 2QE, i7 4710MQ, Haswell), only partly, windows is not activating mitigation measure since he detects that the hardware is not using proper microcode...
As per: https://www.win-raid.com/t3351f47-Microcodes-for-branch-target-injection.html#msg46070
"It depends on the CPU. My IB-E has no HW support for mitigation against BTI, but new microcode brings that HW support, and it happens that Windows kernel is loaded before VMware driver and it sees that there is no HW support and disables the mitigation. Only after I patched the BIOS file and flashed it Windows enabled the mitigation. So if your CPU has HW support for BTI mitigation (with current microcode) then you can use VMware driver."
My assumption: Vmware driver is loaded at boot after kernel and thus, is not a proper mitigation as is a real microcode update via Bios update, but it's better than nothing cause exploit needs to happen before this driver is loaded (at least that's my understanding but I'm probably wrong).hmscott likes this. -
I haven't had a chance to do any extensive benchmarking after the patch to both Spectre and Metltdown but I did do a little investigating on CPUZ benching tool.
Looks like single core stays about the same. Multi-core dropped about 60. Over clocked to 5.05ghz I was getting 4460 on Multi-core. Now it's right around 4400.
I'm sure Mr fox will go more in depth on pre/post patch/bios fix.Last edited: Jan 11, 2018 -
Just updated BIOS on my Dell M6800 (ver. A21) which also updated the Intel Microcode, but Checking with Ashampoo SpectreMeltdownCheck still shows my cpu vulnerable.
I also tried manual microcode update, but nothing changed (seems bios already updated to the same microcode version).
CPU i7-4900MQ -
It's a bit technical, but if you download the script from the MS site and follow instructions from a couple of example sites, it should be doable, give that a try and see what you see:
Speculation Control Validation PowerShell Script
This is described in the blog topic: "Windows Server guidance to protect against the speculative execution side-channel vulnerabilities."
https://gallery.technet.microsoft.com/scriptcenter/Speculation-Control-e36f0050#content
How to Check and Update Windows Systems for the Meltdown and Spectre CPU Flaws
How can you check the status of the patches?
https://www.bleepingcomputer.com/ne...stems-for-the-meltdown-and-spectre-cpu-flaws/
Mitigation: 3 Practical Things to Do Now
Step 1: Verify if new Windows protections are enabled
https://blog.barkly.com/meltdown-and-spectre-mitigation
Please give it a try and let us know what you findPapusan, ajc9988, Vasudev and 1 other person like this. -
-
KY_BULLET likes this.
-
KY_BULLET likes this.
-
-
Sent from my SM-G920F using Tapatalk -
One of the odd glitches is having to wait a minute or so idle on the desktop before doing anything CPU intensive. For example, if I run wPrime 32M as soon as my system tray icons are done loading it takes like 6 seconds. If I let the system idle for 60 to 90 seconds longer it completes in 2.8 seconds. Another example, if I am in the BIOS from a cold boot I get random freezes accessing the Boot menu UEFI options. If that happens and I power off and go back in, it generally does not happen the second time. So far, I have not been able to match or beat any of my best benchmark runs. They are within a margin of error and just as good as most of the same benchmark runs when I was trying to achieve my best scores (hope that makes sense). I will continue testing a few more days before I decide whether to stay patched or not.Last edited: Jan 11, 2018 -
http://cdimage.ubuntu.com/ubuntu-server/daily-live/current/
http://cdimage.ubuntu.com/ubuntu-server/daily/current/
http://cdimage.ubuntu.com/
BTW, here is the daily builds of 18.04 if anyone is interested (or you can pull 17.10 daily builds if you like).hmscott likes this. -
Sent from my SM-G935T using Tapatalk -
-
Another problem I've seen is that my Turbo boost doesn't boost up to 4.7ghz anymore running default clocks since the initial Windows cumulative patch that was released. Using HWiNFO64, I'm only getting to 4.6ghz on one maybe 2 cores.
I see that someone else had posted the Turbo Boost problem on MSI's forum as well. I figured I would wait until after receiving the Bios update to see if that would remedy it but it's still the same.
I haven't experienced any functioning problems in my bios yet. Everything looks the same except a very small visual difference. -
Support.2@XOTIC PC Company Representative
Starlight5, Raiderman, ajc9988 and 1 other person like this. -
Intel 8th Gen Core CPUs Show 10% Slowdown In JavaScript-Heavy Tasks After Spectre, Meltdown Patches-Hothardware.com
Yesterday, Intel followed up with the following statement:
"Based on our most recent PC benchmarking, we continue to expect that the performance impact should not be significant for average computer users. This means the typical home and business PC user should not see significant slowdowns in common tasks such as reading email, writing a document or accessing digital photos." Is this meant as a Joke?<email, writing a document>
Meltdown And Spectre Chip Flaws Have Cloud Companies Looking For Intel Alternatives-hothardware.com
"There is a lot of buzz surrounding Meltdown and Spectre, two recently disclosed chip vulnerabilities that have hardware and software makers scrambling to release patches to deal with the situation. What is not fully known yet is what performance impact these patches will have. Regardless of how all it shakes out, some of Intel's data center customers that run cloud networks are looking to jump ship."
"The chip flaws, if you want to call them that (and many do, though Intel claims its processors are working as intended) collectively affect all modern CPUs to some extent. However, Intel's silicon seems to be the most affected, as the way they are designed leaves them susceptible to both types of exploits, whereas AMD contends that its processors are immune to Meltdown. So, companies that currently use Intel chips have started looking at alternatives."
-
Last edited: Jan 11, 2018Raiderman likes this.
-
In all seriousness, what is the risk to myself if I don't install these patches? If I browse only known trusted sites that secure their end on the server, how is an attacker going to get into my computer? I'm not about browsing into shady sites, and I always clear all cookies and sensitive data after every web session.
-
I bit the bullet and did this very thing just about 2 weeks ago on the Mighty Muscular Mini. See my second note - http://forum.notebookreview.com/threads/mighty-muscular-mini-itx-build.812322/#post-10655852Last edited: Jan 11, 2018 -
ASUS AI SUITE 3 - "THE SERVER THREW AN EXCEPTION ERROR"
https://drive.google.com/open?id=1aIyCmU_FCE4ucTtxVwCx2ewGvJYR7pf7
I am not particularly concerned about it at a personal level and I think (hope) that I should be able to easily undo it if I don't like the outcome.Last edited: Jan 11, 2018Ashtrix, Raiderman, Robbo99999 and 3 others like this. -
Mr. Fox likes this.
-
Ashtrix, inm8#2, KY_BULLET and 1 other person like this.
CPU Vulnerabilities, Meltdown and Spectre, Kernel Page Table Isolation Patches, and more
Discussion in 'Hardware Components and Aftermarket Upgrades' started by hmscott, Jan 2, 2018.