• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.
  • The forums have been upgraded with support for dark mode. By default it will follow the setting on your system/browser. You may override it by scrolling to the end of the page and clicking the gears icon.

Microsoft Pushes New Software-Based Spectre, Meltdown Mitigation Patches

Raevenlord

News Editor
Joined
Aug 12, 2016
Messages
3,755 (1.17/day)
Location
Portugal
System Name The Ryzening
Processor AMD Ryzen 9 5900X
Motherboard MSI X570 MAG TOMAHAWK
Cooling Lian Li Galahad 360mm AIO
Memory 32 GB G.Skill Trident Z F4-3733 (4x 8 GB)
Video Card(s) Gigabyte RTX 3070 Ti
Storage Boot: Transcend MTE220S 2TB, Kintson A2000 1TB, Seagate Firewolf Pro 14 TB
Display(s) Acer Nitro VG270UP (1440p 144 Hz IPS)
Case Lian Li O11DX Dynamic White
Audio Device(s) iFi Audio Zen DAC
Power Supply Seasonic Focus+ 750 W
Mouse Cooler Master Masterkeys Lite L
Keyboard Cooler Master Masterkeys Lite L
Software Windows 10 x64
The Spectre/Meltdown road is long and pocked with lawsuits and security holes as it is, and Microsoft is one of the players that's trying to put the asphalt back to tip-top, Autobahn-worth shape. The company has already improved users' security to the Meltdown and Spectre exploits on its OS side; however, hardware patches, and specifically BIOS-editing ones are much harder to deploy and distribute by the PC chain. That may be one of the reasons why Microsoft is now again stepping up with software-based mitigations for Intel-based systems, specifically.

The new updates introduce a software-based CPU microcode revision update, and work at the OS-level to plug some security holes on your Intel processors that might otherwise remain unpatched. The reasons for them remaining unpatched can be many: either Intel taking even more time to deploy patches to the still vulnerable systems; your OEMs not deploying the Intel CPU microcode revisions via a BIOS update; or the good old "I forgot I could do it" user story. Of course, being software based means these Microsoft patches will have to be reapplied should users format their Windows system. The update can for now only be manually downloaded and installed, and can only be applied to version 1709 (Fall Creators Update) and Windows Server version 1709 (Server Core), but that's definitely better than the alternative of forcing less knowledgeable users to try and find their way through BIOS updates. Of course, that is assuming OEMs will ever push BIOS updates to their products.



View at TechPowerUp Main Site
 
I still could care less about this.
 
im wondering if the performance is better here than the bios one.

It would be cool if they let you choose the apps that it applied to... that way my sql box wouldnt take a hit running sql server, but chrome would.
 
im wondering if the performance is better here than the bios one.

It would be cool if they let you choose the apps that it applied to... that way my sql box wouldnt take a hit running sql server, but chrome would.

In linux for spectre retropline (software fix) is the preferred solution, microcode solution takes a small performance hit, retropline does not.
 
In linux for spectre retropline (software fix) is the preferred solution, microcode solution takes a small performance hit, retropline does not.

AFAIK both are needed for complete security.

And since this is literally the same microcode fix in a software package, performance will be identical.
 
AFAIK both are needed for complete security.

And since this is literally the same microcode fix in a software package, performance will be identical.

Sigh... thought I specified amd... guess not.

Retpoline is a software workaround that mitigates against SV2 on platforms preceding Intel Skylake. This workaround does not require microcode in order to be active; however, it requires that code be recompiled with a compiler enabled with this feature. Recompiling the kernel with this feature is simple, but updating all of userspace is a significant effort, without which protection from speculative userspace attacks needs to rely on the slower hardware-based mitigations.
So yes Intel requires both microcode and retpoline for spectre, microcode for Spectre type 1, and retpoline for type 2, though because retpoline requires a recompile of all software a microcode update to cover part 2 is generally installed... and is slower than the retpoline solution.

https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown/TechFAQ#Retpoline
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown

https://www.amd.com/en/corporate/speculative-execution
AMD is not vulnerable to meltdown, has fixes out for type 1 spectre, isn't proven to be vulnerable to type 2, so retpoline covers it completely and they have optional microcodes for the paranoid.

Charts for linux patches are further confused because AMD64 is just 64bit kernel not AMD chips... yay.
 
isn't proven to be vulnerable to type 2,

Yes, it has been. Even the article you link admits that.

They also have yet to produce the optional microcode they promised. I've been looking hard for a very long time.
 
Yes, it has been. Even the article you link admits that.

They also have yet to produce the optional microcode they promised. I've been looking hard for a very long time.
They changed the statement from near zero to I guess it could be but... It'd be hard.
The problem with a branch injection is the prediction engine is a nn ... it's learning and not exactly repeatable...which is needed for making exploits.

I have yet to see them specifically say that they found it vulnerable, just that they see its theoretically possible, but super hard.
I also have not seen anyone posting demonstration of it being vulnerable like I saw for type 1.

Optional microcode would be delivered to vendors, not individuals, also for type 2, type 1 microcode was delivered Jan 4th.
Why would vendors push microcode for type 2 if retpoline completely covers it... and it hasn't been demonstrated to be vulnerable.

But please... if you have a source showing that is truly vulnerable to type 2 please post it.
I am trying to keep updated on this cluster F but there is tons of miss information and contradictory information floating around.

https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html Heck even the research team only got type 1 working on amd hardware... but feel free to contradict them without proof.
 
Last edited:
It's an industry issue. Don't like? Don't click.
It doesnt have to be rammed down our throats.

MS will release software patches that everyone will get. Yay i guess.

Intel will release patches to motherboard vendors to provide a bios update that anyone that has extensive knowledge will already know to do. Regular joe schmoe wont care let alone really even know and therefore wont update the BIOS.
 
.....sad day when you gotta decide which dose you the most harm......the ailment or the cure........
 
I care only for 1 thing. WHAT IS THE PERFORMANCE IMPACT???
 
I care only for 1 thing. WHAT IS THE PERFORMANCE IMPACT???

It makes their CPUs completely worthless in server if buying, but they're busy throwing shade and trying to convince everyone of the opposite.

Almost nothing for general consumers. Some prosumers may be hit.
 
Yes, it has been. Even the article you link admits that.

They also have yet to produce the optional microcode they promised. I've been looking hard for a very long time.

I have not seen anyone able to exploit variant 2 on AMD hardware. You should provide links if you are going to contradict AMD engineers who weren't even able to exploit it.
 
It doesnt have to be rammed down our throats.

MS will release software patches that everyone will get. Yay i guess.

Intel will release patches to motherboard vendors to provide a bios update that anyone that has extensive knowledge will already know to do. Regular joe schmoe wont care let alone really even know and therefore wont update the BIOS.

Those bios patches are already being pushed by venders through windows update.
 
I have not seen anyone able to exploit variant 2 on AMD hardware. You should provide links if you are going to contradict AMD engineers who weren't even able to exploit it.

I'm not contradicting them. They admit it is vulnerable, diffilculty is irrelevant to my point. This isn't a fanboy discussion so don't make it one.

Optional microcode would be delivered to vendors, not individuals, also for type 2, type 1 microcode was delivered Jan 4th.
Why would vendors push microcode for type 2 if retpoline completely covers it... and it hasn't been demonstrated to be vulnerable.

Link or it didn't happen. I'm a bios modder and have been unable to trace any bios updates containing modified microcode fixes of any type. Yes, AMD said they were going to push some. I have yet to see that in any form.

I can see that going horribly wrong.

No, not really. Microcode patches via Windows Update are simple and have been done in the past.
 
I'm not contradicting them. They admit it is vulnerable, diffilculty is irrelevant to my point. This isn't a fanboy discussion so don't make it one.

Link or it didn't happen. I'm a bios modder and have been unable to trace any bios updates containing modified microcode fixes of any type. Yes, AMD said they were going to push some. I have yet to see that in any form.

No, not really. Microcode patches via Windows Update are simple and have been done in the past.

https://support.hpe.com/hpsc/swd/pu...c43761fa7c9f4ba1ac7a262002&swEnvOid=4184#tab4
Where I got the date from...I work on servers, so I am a tad server centric in my knowledge.

Epyc patches are at least out... but yeah not seeing consumer board updates.
I will ping Patrick @ STH and see if he can ask AMD directly.
 
Last edited:
I can see that going horribly wrong.

Windows 10 has been pushing firmware updates since it came out. Rarely have I ever seen an issue from it.
 
Back
Top