Same Issue with Asus X99 Series , it is suggested that X99 is EOL or beyond Warranty as the reason for this on TechpowerUp , however my X99 is not even two years old yet.....
Ah, so that beta label doesn't actually mean that it's an unfinished BIOS update but more as a warning if something bad happens it's not covered in the warranty by the manufacturer because the product is EOL? That makes sense… Sort of. Seeing that there are even more Spectre Variants just discovered I'm still going to wait before updating.
Was wondering about that too. Seems like every new version of W10 is like a new OS all on its own....
After all, this is only a MC emulation, right ?
Cheers,
I don't know. I'm still unable to find a source that states that Windows doesn't copy the microcode update to volatile memory on the CPU and instead runs some sort of emulation.
Last edited by Ground Sloth; 06 May 2018 at 21:26.
I don't know. I'm still unable to find a source that states that Windows doesn't copy the microcode update to volatile memory on the CPU and instead runs some sort of emulation.
This paper makes it clear that the update mechanism and the end result is the same whether delivered by the bios, Windows drivers or Linux. The microcode is written to the cpu.
...Although this microcode was initially implemented on read-only memory, processor manufacturers soon introduced writable patch memory to provide an update mechanism...
...
4.2 Update Mechanism
The microcode update mechanism is very similar across all x86 processor manufacturers, primarily by using processor model-specific register (MSR) registers to read the current microcode revision and write the new microcode update...
...
4.3.2 Windows
Although less well documented, microcode updates are performed by bundled device drivers on Windows XP and later. Unlike the Linux update module, these Windows drivers have binary microcode updates integrated within the segments, and cannot load microcode from manufacturer-supplied update packages...
Computer Type: Laptop System Manufacturer/Model Number: Toshiba Satellite L750 OS: 10 Home x64 (22H2) (10 Pro on 2nd pc) CPU: Intel Pentium B950 @2.10GHz Memory: 8GB Internet Speed: 50Mbps down, 10Mbps up Browser: IE/Edge/Firefox Antivirus: Defender Other Info: ...other laptops include:
Dell Latitude E7270, 6th gen i7, 16GB RAM, Windows 10 Pro.
Dell Latitude 5410, 10th gen i7, 32GB RAM, Windows 11 Pro.
main use is to run Hyper-V VMs including XP, W7, W8.1, W10 & W11
Computer Type: Laptop System Manufacturer/Model Number: Samsung R519 OS: 10 Pro x86 (22H2, 21H1, 20H2, 2004, 1909, 1903, 1809, 1803, 1709, 1703, 1607, 1511, 1507), 7 Pro x86 CPU: Intel Pentium T4300 2.10GHz Memory: 4GB Other Info: Test/support machine - uses multiple Macrium images to switch OS.
This paper makes it clear that the update mechanism and the end result is the same whether delivered by the bios, Windows drivers or Linux. The microcode is written to the cpu.
That's what I've been saying for a couple months now. More specifically, the microcode update is written to volatile memory on the CPU and is thus not persistent across reboots.
More specifically, the microcode update is written to volatile memory on the CPU and is thus not persistent across reboots.
I fail to see a problem with that. Once loaded its a permanent part of the cpu until you power down. Then it loads again from (preferably) the bios at next power up.
That's the mechanism all the CPU manufacturers have chosen to use. You'd prefer it to be read-only, as it initially was in the '70s? Or EEPROM/flash (like legacy bios chips) with a limited number of erase/write cycles?
Computer Type: Laptop System Manufacturer/Model Number: Toshiba Satellite L750 OS: 10 Home x64 (22H2) (10 Pro on 2nd pc) CPU: Intel Pentium B950 @2.10GHz Memory: 8GB Internet Speed: 50Mbps down, 10Mbps up Browser: IE/Edge/Firefox Antivirus: Defender Other Info: ...other laptops include:
Dell Latitude E7270, 6th gen i7, 16GB RAM, Windows 10 Pro.
Dell Latitude 5410, 10th gen i7, 32GB RAM, Windows 11 Pro.
main use is to run Hyper-V VMs including XP, W7, W8.1, W10 & W11
Computer Type: Laptop System Manufacturer/Model Number: Samsung R519 OS: 10 Pro x86 (22H2, 21H1, 20H2, 2004, 1909, 1903, 1809, 1803, 1709, 1703, 1607, 1511, 1507), 7 Pro x86 CPU: Intel Pentium T4300 2.10GHz Memory: 4GB Other Info: Test/support machine - uses multiple Macrium images to switch OS.
I fail to see a problem with that. Once loaded its a permanent part of the cpu until you power down. Then it loads again from (preferably) the bios at next power up.
That's the mechanism all the CPU manufacturers have chosen to use. You'd prefer it to be read-only, as it initially was in the '70s? Or EEPROM/flash (like legacy bios chips) with a limited number of erase/write cycles?
I never said it was problematic.
I've been saying for a couple months that regardless if the BIOS or Windows updates the CPU microcode, the microcode update is written to volatile memory on the CPU. But some other forum members have told me that I'm wrong.
Last edited by Ground Sloth; 19 May 2018 at 00:03.
Computer Type: PC/Desktop System Manufacturer/Model Number: Custom Built OS: Windows 10 Pro 64bit 20H2 19042.844 CPU: Intel I7 10700 Comet Lake S 8 Core 2.90ghz/4.80 Boost Motherboard: Gigabyte B460M DS3H Memory: 16GB DDR4 2400 Graphics Card: Nvidia Geforce GTX 1660 Super 6gb Sound Card: Realtek HD Audio Controller Monitor(s) Displays: Asus VG245H Gaming monitor Screen Resolution: 1920x1080 Keyboard: Logitech G213 Mouse: Logitech G502 PSU: Evga G3 650Watt Modular Case: Thermaltake V200 RGB Cooling: 3 Front Intake Fans, 1 120 exhaust Hard Drives: 1 Samsung 970 Evo Plus 500gb M.2 Nvme
1 Samsung 860 Evo 1tb SSD SATA3 Boot Drive
2 Storage Drive--Western Digital Black 4TB SATA 3 Internet Speed: 1gig download/35 upload Browser: Microsoft Edge Antivirus: Windows Defender Malwarebytes 4 (Free)
Computer Type: Laptop System Manufacturer/Model Number: HP Omen 15-ce019dx OS: Windows 10 Home 1909 x64 20H2 19042.844 CPU: Intel I7 7700HQ Kaby Lake Motherboard: OEM HP Omen Memory: 8gb of ram DDR4 Graphics Card: Intel HD 630 and Nvidia Gefore 1050TI Sound Card: Onboard Realtek HD Monitor(s) Displays: 15.3 Inch screen Screen Resolution: Full HD 1920x1080 Keyboard: HP Laptop Keyboard Mouse: Touchpad PSU: OEM HP Case: OEM HP Laptop Case Cooling: Air cooling Hard Drives: 128mb SSD M.2
and 1tb Hitachi Hard drive Internet Speed: 1gig/35 Browser: MS Edge Antivirus: Windows Defender, malwarebytes 4 free
I've been saying for a couple months that regardless if the BIOS or Windows updates the CPU microcode, the microcode update is written to volatile memory on the CPU. But some other forum members have told me that I'm wrong.
No argument with you there @Ground Sloth, we are in total agreement. BIOS or Windows, the same microcode gets written to the CPU either way.
Some seem to have got the idea that the update isn't a 'proper' solution, that it is some sort of software 'simulation' or 'emulation' running in conventional memory - they are mistaken.
Computer Type: Laptop System Manufacturer/Model Number: Toshiba Satellite L750 OS: 10 Home x64 (22H2) (10 Pro on 2nd pc) CPU: Intel Pentium B950 @2.10GHz Memory: 8GB Internet Speed: 50Mbps down, 10Mbps up Browser: IE/Edge/Firefox Antivirus: Defender Other Info: ...other laptops include:
Dell Latitude E7270, 6th gen i7, 16GB RAM, Windows 10 Pro.
Dell Latitude 5410, 10th gen i7, 32GB RAM, Windows 11 Pro.
main use is to run Hyper-V VMs including XP, W7, W8.1, W10 & W11
Computer Type: Laptop System Manufacturer/Model Number: Samsung R519 OS: 10 Pro x86 (22H2, 21H1, 20H2, 2004, 1909, 1903, 1809, 1803, 1709, 1703, 1607, 1511, 1507), 7 Pro x86 CPU: Intel Pentium T4300 2.10GHz Memory: 4GB Other Info: Test/support machine - uses multiple Macrium images to switch OS.
I've been saying for a couple months that regardless if the BIOS or Windows updates the CPU microcode, the microcode update is written to volatile memory on the CPU. But some other forum members have told me that I'm wrong.
Bios/UEFI flash update is persistent and is not written to volatile memory on the cpu.
As far as mitigation against Spectre type attacks is concerned it really makes no difference whether the OS tells itself it is reading the MC it is told to read resides inside the CPU or it fools itself reading it from what? L3 CPU cache ?
I somewhat doubt it would cache it to L3 CPU volatile cache as any volatile memory would do but it really does not matter.
Point is, both methods are safe and yes BIOS/UEFI flash is persistent whereas OS MCU is not but the end result is the same securitywise.
To me emulation is like "make believe". All OS's do it and so on. Anyway, just semantics really.
Computer Type: PC/Desktop System Manufacturer/Model Number: Fujitsu B3417B2 OS: Windows 10 Pro X64 CPU: Intel I7 7700K Motherboard: D-3417B2 Memory: 32Gb Graphics Card: Intel HD 530 + Palit GeForce GTX1050 Ti KALMX 2Gb Sound Card: Realtek Chip Monitor(s) Displays: Samsung UJ59-U32 32 inch monitor. Screen Resolution: 3840x2160@60Hz. Keyboard: Microsoft 600 Mouse: Microsoft 3 button wired optical mouse. PSU: 650W. Case: Fractal Design R4 Cooling: Alpenfoehn Atlas 3 Ventilators on cooler. Hard Drives: Intel P900 U2 280Gib. Internet Speed: 35/10 Browser: IE11 Antivirus: MS Defender
Computer Type: PC/Desktop System Manufacturer/Model Number: Home made OS: Windows 10 Pro X64 CPU: Intel I9 9900KS Motherboard: Asus WS Z390 Pro. Memory: 64 Gb DDR4-2666 Graphics Card: Intel HD 630 Sound Card: Realtel ACL Monitor(s) Displays: Fujitsu L27T-1 LED DVI +Samsung 32" Screen Resolution: 1920 x 1080 and 3840x2160@60Hz Keyboard: MS 600 Mouse: Microsoft 3 button optical mouse. PSU: 850W Be Quiet. Case: Fractal Design R6 USB-C Black. Cooling: Alpenfoehn Olymp + 3 fans on cooler. Hard Drives: 2 x Samsung 970Pro M2 500Gib in Raid 0 mode
2 x Intel P900 280Gib in Raid 0 mode
2x Toschiba SATA 500Gib in Raid 0 mode Internet Speed: 65/10 Browser: IE + Edge Chrome Antivirus: MS Defender Other Info: Next build will be a 2066 socket one. Speed is addictive, right ?
Read more:
Windows client guidance for IT Pros to protect against speculative execution side-channel vulnerabilities
Protect your Windows devices against speculative execution side-channel attacks
ADV190013 | Microsoft Guidance to mitigate...
Source: Mitigating speculative execution side channel hardware vulnerabilities Defense
See also: Microsoft Announcing Speculative Execution Bounty Program Launch - Windows 10 Forums