Cumulative Update KB4482887 Windows 10 v1809 Build 17763.348 - March 1 Win Update

Page 32 of 34 FirstFirst ... 223031323334 LastLast
  1.    #310

    pietcorus2 said: View Post
    " I was hoping the reptoline would bring the I/O back up a bit but I am not seeing that at least with Crystaldiskmark. "........same on my rig ; Z97-K Asus .
    Wish Asus will update BIOS , still on 2017-version.........
    Have set both values on 400 , safe but certainly not faster then disabled....!
    Always the question which to go for ; maximum protection ( costs performance) or go for speed ( maximum performance , no optimal protection )...............
    Ok, so I tested which is doing the hit on I/O and it happens to be Spectre, What I did was start over with 3/3 values Inspectre says good performance and all disabled.
    This gives best I/O performance, I then enable each and retest best or same as disabled is with meltdown enabled, so that is a FeatureSettingsOverride 1/FeatureSettingsOverrideMask 3 settings.
    I then tried to add retpoline with these values FeatureSettingsOverride 401/FeatureSettingsOverrideMask 403, this gave me same as before with disabled, good I/O but then I run PS script to check what is enabled and retpoline is disabled, so retpoline must need both meltdown and spectre enabled to work (400/400 values).
    below is PS output of the 401/403 values.
    Speculation control settings for CVE-2017-5715 [branch target injection]

    Hardware support for branch target injection mitigation is present: True
    Windows OS support for branch target injection mitigation is present: True
    Windows OS support for branch target injection mitigation is enabled: False
    Windows OS support for branch target injection mitigation is disabled by system policy: True
    Windows OS support for branch target injection mitigation is disabled by absence of hardware support: False

    Speculation control settings for CVE-2017-5754 [rogue data cache load]

    Hardware requires kernel VA shadowing: True
    Windows OS support for kernel VA shadow is present: True
    Windows OS support for kernel VA shadow is enabled: True
    Windows OS support for PCID performance optimization is enabled: False [not required for security]

    Speculation control settings for CVE-2018-3639 [speculative store bypass]

    Hardware is vulnerable to speculative store bypass: True
    Hardware support for speculative store bypass disable is present: True
    Windows OS support for speculative store bypass disable is present: True
    Windows OS support for speculative store bypass disable is enabled system-wide: False

    Speculation control settings for CVE-2018-3620 [L1 terminal fault]

    Hardware is vulnerable to L1 terminal fault: True
    Windows OS support for L1 terminal fault mitigation is present: True
    Windows OS support for L1 terminal fault mitigation is enabled: True

    Suggested actions

    * Follow the guidance for enabling Windows Client support for speculation control mitigations described in https://support.microsoft.com/help/4073119


    BTIHardwarePresent : True
    BTIWindowsSupportPresent : True
    BTIWindowsSupportEnabled : False
    BTIDisabledBySystemPolicy : True
    BTIDisabledByNoHardwareSupport : False
    BTIKernelRetpolineEnabled : False
    BTIKernelImportOptimizationEnabled : False
    KVAShadowRequired : True
    KVAShadowWindowsSupportPresent : True
    KVAShadowWindowsSupportEnabled : True
    KVAShadowPcidEnabled : False
    SSBDWindowsSupportPresent : True
    SSBDHardwareVulnerable : True
    SSBDHardwarePresent : True
    SSBDWindowsSupportEnabledSystemWide : False
    L1TFHardwareVulnerable : True
    L1TFWindowsSupportPresent : True
    L1TFWindowsSupportEnabled : True
    L1TFInvalidPteBit : 45
    L1DFlushSupported : True
      My ComputerSystem Spec

  2.    #311

    So , your final settings are "400" for both values..............??
      My ComputerSystem Spec

  3.    #312

    sgage said: View Post
    Just for the record, and to avoid confusion, it's 'retpoline', not 'reptoline'.
    Thanks I will edit.
      My ComputerSystem Spec

  4.    #313

    pietcorus2 said: View Post
    So , your final settings are "400" for both values..............??
    If you want retpoline enabled but not SSBD (speculative store bypass), yes 400/400 will cover it.

    You can read more info on each in link ddelo posted Enable Retpoline to mitigate Spectre variant 2 (CVE-2017-5715) Solved - Windows 10 Forums
      My ComputerSystem Spec

  5. Wynona's Avatar
    Posts : 22,849
    Windows 10 Skip Ahead Preview Build 18312
       #314

    CountMike said: View Post
    Yeah, otherwise it would be a crocodile
    Or an alligator!
      My ComputerSystem Spec

  6.    #315

    Keep in mind for windows to use retpoline need the driver to be recompliled with retpoline.

    So if u want back the performance from sata drives for example you need to be on the STORAHCI driver instead of Intel's RST.


    Windows automatically will use retpoline with recompiled drivers and the old mitigation for anything else.
      My ComputerSystem Spec

  7.    #316

    boombastik said: View Post
    Keep in mind for windows to use retpoline need the driver to be recompliled with retpoline.

    So if u want back the performance from sata drives for example you need to be on the STORAHCI driver instead of Intel's RST.


    Windows automatically will use retpoline with recompiled drivers and the old mitigation for anything else.
    That is interesting, I did read that things need to be compiled with retpoline.
    I check my SATA driver and its 12.9.0.1001 Intel driver iaStorA.sys

    So you're saying once retpoline is set enabled, going into device manager and doing a search for newer/better drivers will give WU drivers compiled for retpoline?
      My ComputerSystem Spec

  8.    #317

    Now i believe only ms default drivers are compatible with retpoline.
      My ComputerSystem Spec

  9.    #318

    ddelo said: View Post
    If you're asking me as a Microsoft representative, I'm sorry to say that I'm not....(They approached me a few years ago, but I was happy with my job then and turned them down)
    If it's a rhetorical question, the answer is very simple: It's Microsoft's way to sharpen your mind by adding more and more knowledge!

    Glad you got it working!

    BTW, do me a favor and run this script, just to verify why you didn't have the two Registry options in the first place!
    As requested:
    CPU-Info Version 2.1 2019 Dimitri Delopoulos




    Computer Model : Inspiron 7537
    Computer Name : LAPTOP
    Processor Type : Central Processor
    Manufacturer : GenuineIntel
    CPU Family : Intel(R) Core(TM) i7 processor
    CPU Architecture : x64
    Name : Intel(R) Core(TM) i7-4500U CPU @ 1.80GHz
    Description : Intel64 Family 6 Model 69 Stepping 1
    Number of Cores : 2
    Number of Logical Processors : 4
    Current Clock Speed : 1800
    Socket Designation : CPU Socket - U3E1
    Upgrade Method : rPGA988B
    CPUID : 00040651
    Display Family : 06H
    Display Model : 45H


    Running microcode revision : 0x24 (loaded by UEFI)
    UEFI CPU microcode revision : 0x24


    Boot Mode : UEFI
    UEFI Version : A16
    UEFI Manufacturer : Dell Inc.
    UEFI Serial Number :
    UEFI Release Date : 24/05/2018 (292 days ago)
      My ComputersSystem Spec

  10.    #319

    boombastik said: View Post
    Keep in mind for windows to use retpoline need the driver to be recompliled with retpoline.

    So if u want back the performance from sata drives for example you need to be on the STORAHCI driver instead of Intel's RST.


    Windows automatically will use retpoline with recompiled drivers and the old mitigation for anything else.
    This is getting complicated. I've edited the Registry to enable to retpoline option but still have the Intel iaStorA.stys driver. Should I revert to the Standard SATA AHCI driver as shown below?
    Click image for larger version. 

Name:	image.png 
Views:	1 
Size:	99.1 KB 
ID:	227045
      My ComputersSystem Spec


 
Page 32 of 34 FirstFirst ... 223031323334 LastLast

Related Threads
UPDATE 1/8: Cumulative Update KB4480116 Windows 10 v1809 Build 17763.253 - Jan. 8 Windows Update - Windows 10 Forums Source: https://support.microsoft.com/en-us/help/4483235 Direct download links for KB4483235 MSU file from Microsoft...
UPDATE 3/1: Cumulative Update KB4482887 Windows 10 v1809 Build 17763.316 - March 1 Windows Update - Windows 10 Forums Source: https://support.microsoft.com/en-us/help/4487044/windows-10-update-kb4487044 Direct download links for...
New Cumulative Update KB4482887 released via Windows Update to Windows 10 version 1809 build 17763.346 for Windows Insiders in the Release Preview ring. Direct download links for KB4482887 CAB file from Microsoft Update Catalog: :tip: How to...
UDPATE 1/22: Cumulative Update KB4476976 Windows 10 v1809 Build 17763.292 - Jan. 22 Windows Update - Windows 10 Forums Source: https://support.microsoft.com/en-us/help/4480116/windows-10-update-kb4480116 :tip: Windows 10 build 17763.253...
UPDATE 12/11: Cumulative Update KB4471332 Windows 10 v1809 Build 17763.194 - Dec. 11 Windows Update - Windows 10 Forums Source: https://support.microsoft.com/en-us/help/4469342 Direct download links for KB4469342 MSU file from...
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd
All times are GMT -5. The time now is 12:08.
Find Us