01-02-2018 11:05 PM - last edited on 03-06-2024 09:57 PM by ROGBot
01-09-2018 01:13 PM
01-05-2018 07:35 PM
Axle Grease wrote:
Ah, so the MS patch is only installed, but until mobo manufactures release updated BIOSes containing the new intel microcode, there is no hardware support to enable the patch. Do I have that right? It does explain why there's stuff all difference in pre and post patch CPU benchmarks so far.
01-05-2018 09:14 PM
segfaulted wrote:
Depends what benchmarks you're referring to and more importantly which mediation was used. The original proposed solution at least in Linux, from Intel, has or had quite a bite more overhead then the one Google claims to have gone with. There's also the issue of what was really being tested since not all games for example would be affected as they are more GPU constrained.
Part of the fud being thrown around still involves what the exploits actually are.
Your computer is like a school bus. In the morning it picks up kids for school but during the day and afternoon it's chartered. What's supposed to happen is the bus gets cleaned between uses. Meltdown exploits the garbage people leave behind. SPECTRE is less exploit and more observation since it's like looking at the gas gage to judge how far the bus went between users. It doesn't know who they are but can eventually piece together enough data to guess.
All Intel's done at this point is replace the cleaning staff. They're slower, cost more and demanded concessions.
Both are well understood design problems. Meltdown should never have happened if Intel actually followed ring isolation.
What they are now calling SPECTRE for this, has been around for a long, long time and can affect anything with a cache since it's a timing attack. In HTTP it would be like a CDN sitting between you and a server. Probe the CDN enough and you can tell what is in cache. Find a way to uniquely identify a user - with say a session id in the url or sites without any kind of random seed - and you can passively determine where they have gone based on what is in the CDN. If it's there the response will be faster. That is what bugs like SPECTRE, are.
It's quite different from Meltdown and a smokescreen attempt by Intel.
* I've deliberately left out the mitigation methods in HTTP to better illustrate the point.
01-06-2018 02:27 PM
Axle Grease wrote:
There's a new BIOS out for the Maximus X Formula dated Jan 2. Guru3D does some benchmarks. http://www.guru3d.com/articles-pages/windows-vulnerability-cpu-meltdown-patch-benchmarked,1.html Substantial 4K I/O performance degradation is noticeable in CrystalDiskMark, but it's so workload specific that I am finding it hard to elicit an emotion over it. Well, so long the new cleaning staff do their job...
Axle Grease wrote:
Cleaning the bus between uses would also make it more difficult for any lowlife to exploit spectre as new rubbish replaces old more frequently, right? ...or wrong?
01-06-2018 12:22 AM
01-06-2018 08:11 AM
01-06-2018 08:48 AM
Caudwell wrote:
Hi all
I have ( Asus x99 Rampage V Extreme )
Bios i am useing is ( 3504 )
CPU i have is ( Intel Core i7-5930K )
I update my windows 10 to Version 1709 ( OS Build 16299.192 )
I Done Test this what Testing come back dose not look good hoping it be fix.
01-06-2018 08:23 AM
01-06-2018 08:31 AM
A.Catalin wrote:
https://www.asus.com/News/V5urzYAT6myCC1o2
01-06-2018 11:33 AM
Caudwell wrote:
Thanks for post but what why is my Motherboard not on the list ( Asus Rog x99 Rampage V Extreme ) ?