New
#630
Hi,
Yep. And one that covers more than just a few of Intel's latest CPUs too.Here is hoping that I will have a microcode update from RS4 when it is finally released.
Currently RS4 does not even support the KB that held the MC updates for 1709. Go figure....
Cheers,
Hi,
No need to move to Linux. If you want to you can use the MCU's with AMI's tool to load the MCU in Windows at every boot.
Works fine for me even though GRC does not seem to recognize it, the MCU is effectively active as HWInfo will show so it does provide protection against Spectre attacks.
This can cover any machine Intel has updated the MC for and works on all W10 versions I've tested it on from 1040 to SCU 1803.
Cheers,
How to check which microcode revision Windows is loading (if newer than BIOS microcode)?
Run Notepad.exe and turn on Format/Word Wrap from pull down menu.
Use File/Open and navigate to C:\Windows\System32\mcupdate_GenuineIntel.dll, its a bit slow to open
Scroll to the late screen full
You will see a list of CPUID's, Platform ID's and MCU revisions (microcode)
Using build 17643 RS5, some match up with the latest releases from Intel but others are still on old revisions, e.g. 20655.
Hope this helps somehow?
That file doesn't exist on my skylake system, but I did install a MC update from Gigabyte and Inspectre shows my system as being protected. I'll have to check the tablet when I get a chance, its unprotected.
********** Correction - It does exist my ERROR (first one this year) ************
Last edited by storageman; 16 Apr 2018 at 12:56.
Here is a copy of where my Windows PowerShell indicated my system is at with regard to Windows Client Guidance against speculative execution vulnerabilities.
I'm not sure if there is anything further I need to do at the moment?
I know my Toshiba Satellite P50-C (Part Number: PSPT2A-00E001) BIOS is up-to-date with version 1.50 and I'm also aware a firmware update from Toshiba for my Model Number for Intel, AMD & Microsoft Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method Security Vulnerabilities is yet to be released and determined.
Intel, AMD & Microsoft Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method Security Vulnerabilities
Attachment 185043
Hp seems overwhelmed? in-Specter's on vacations there:
Code:~$ cat /proc/sys/kernel/osrelease 4.17.0-041700rc1-generic ~$ cat /sys/devices/system/cpu/vulnerabilities/* Not affected Mitigation: __user pointer sanitization Mitigation: Full AMD retpoline sudo dpkg-query -l | grep amd64-microcode ii amd64-microcode 3.20171205.1 dpkg -l mesa-vdpau-drivers ii mesa-vdpau-dri 1:18.0.0-0~x amd64 Mesa VDPAU video acceleration dri ~$ glxinfo | grep "OpenGL version" OpenGL version string: 3.0 Mesa 18.0.0Code:AMD CARRIZO (DRM 3.25.0 / 4.17.0-041700rc1-generic, LLVM 6.0.0)
Last edited by MikeMecanic; 16 Apr 2018 at 23:32.
ASUS support has released a list of systems and when new BIOS will become available for them. Link here -> https://www.asus.com/News/YQ3Cr4OYKdZTwnQK