New Microcode for Bloomfield and Gulftown - Overclock.net - An Overclocking Community

Forum Jump: 

New Microcode for Bloomfield and Gulftown

 
Thread Tools
post #1 of 8 (permalink) Old 04-14-2018, 11:21 AM - Thread Starter
New to Overclock.net
 
Regeneration's Avatar
 
Join Date: Jan 2011
Posts: 60
Rep: 22 (Unique: 22)
New Microcode for Bloomfield and Gulftown

Good news for X58 users.

HP released a BIOS update for their Z400 Workstation (X58) with a new microcode addressing Meltdown and Spectre (HP Security Bulletin: https://support.hp.com/sg-en/document/c05869091).

Attached below is the new microcode (extracted from HP BIOS) for CPUIDs 106A5 and 206C2 (i7-965, i7-940, i7-920, i7-970, i7-980, i7-990 and Xeons E/L/X/W).

You'll need to inject it somehow, like BIOS modding (use .bin file) or VMware Microcode Driver (use .dat file, but take in mind its less secured since the driver is loaded after Windows).

I tried it on Xeon W3680 and ASUS P6T (modified BIOS with MMTool), works fine, InSpectre reports the system is fully patched.
Attached Thumbnails
Click image for larger version

Name:	Microcode.jpg
Views:	186
Size:	534.1 KB
ID:	149753  

Click image for larger version

Name:	Microcode2.jpg
Views:	132
Size:	316.7 KB
ID:	149761  

Attached Files
File Type: zip Microcode.zip (51.3 KB, 72 views)

Last edited by Regeneration; 04-15-2018 at 11:58 AM.
Regeneration is offline  
Sponsored Links
Advertisement
 
post #2 of 8 (permalink) Old 04-14-2018, 01:03 PM
Avid Memer
 
chessmyantidrug's Avatar
 
Join Date: Jun 2008
Location: Wichita Falls, TX
Posts: 5,453
Rep: 229 (Unique: 171)
This is probably useful and all, but I am completely unconcerned with Meltdown or Spectre. Nice to know there's a DIY fix if I ever care.

El Diablo
(19 items)
CPU
Intel Xeon X5670
Motherboard
Asus Sabertooth x58
GPU
EVGA GTX 1070
RAM
Mushkin 6x2GB XP3-12800
Hard Drive
Samsung 850 PRO
Hard Drive
Samsung Spinpoint F1
Hard Drive
Samsung 850 EVO
Hard Drive
Toshiba P300
Optical Drive
Samsung SH-S203B
Power Supply
Corsair AX750
Cooling
Thermalright Ultra 120 Extreme
Case
Fractal Design Define R4
Operating System
Windows 10 Home 64-bit
Monitor
BenQ RL2455HM
Monitor
BenQ XL2420Z
Keyboard
Deck Legend - Fire
Mouse
Razer Lachesis
Mousepad
SteelSeries QcK Gaming Mouse Pad
Audio
Astro A50
▲ hide details ▲
chessmyantidrug is offline  
post #3 of 8 (permalink) Old 04-14-2018, 01:11 PM
New to Overclock.net
 
unclewebb's Avatar
 
Join Date: Mar 2008
Posts: 957
Rep: 202 (Unique: 167)
Edit - Fake news removed. VMWare microcode update does not work for Spectre mitigation.

Quote: Originally Posted by JohnLai View Post
Dude...don't post fake news about VMware Microcode Driver. It doesn't work for Spectre mitigation. You gonna mislead others.

Last edited by unclewebb; 04-17-2018 at 11:11 AM.
unclewebb is offline  
Sponsored Links
Advertisement
 
post #4 of 8 (permalink) Old 04-14-2018, 03:53 PM - Thread Starter
New to Overclock.net
 
Regeneration's Avatar
 
Join Date: Jan 2011
Posts: 60
Rep: 22 (Unique: 22)
Quote: Originally Posted by unclewebb View Post
Thanks for the update.

You should also be able to get the latest microcode directly from Intel.

https://downloadcenter.intel.com/dow...-Data-File?v=t
Not for those CPUs.
Regeneration is offline  
post #5 of 8 (permalink) Old 04-15-2018, 12:30 AM
New to Overclock.net
 
JohnLai's Avatar
 
Join Date: Jan 2015
Posts: 81
Rep: 6 (Unique: 5)
Dude...don't post fake news about VMware Microcode Driver. It doesn't work for Spectre mitigation. You gonna mislead others.

The only method that works is BIOS modding or windows itself loading the microcode before the kernel start.

VMware Microcode Driver loads the microcode too late. Inspectre will reports the system is protected, but it is not.

EDIT:
Please change your post at techpowerup forum about vmware microcode driver too. ~.~
JohnLai is offline  
post #6 of 8 (permalink) Old 04-15-2018, 05:32 AM - Thread Starter
New to Overclock.net
 
Regeneration's Avatar
 
Join Date: Jan 2011
Posts: 60
Rep: 22 (Unique: 22)
Quote: Originally Posted by JohnLai View Post
Dude...don't post fake news about VMware Microcode Driver. It doesn't work for Spectre mitigation. You gonna mislead others.

The only method that works is BIOS modding or windows itself loading the microcode before the kernel start.

VMware Microcode Driver loads the microcode too late. Inspectre will reports the system is protected, but it is not.

EDIT:
Please change your post at techpowerup forum about vmware microcode driver too. ~.~
Not all BIOSes can be modded. Drivers can be configured to be loaded during boot.

Everyone here miss the point... this is the first fixed microcode for 1st generation i7s and Xeons.

Wasn't available until now... also unavailable on Intel site.
Regeneration is offline  
post #7 of 8 (permalink) Old 04-15-2018, 07:27 AM
New to Overclock.net
 
JohnLai's Avatar
 
Join Date: Jan 2015
Posts: 81
Rep: 6 (Unique: 5)
Quote: Originally Posted by Regeneration View Post
Not all BIOSes can be modded. Drivers can be configured to be loaded during boot.

I agree with not all bios can be modded, but I disagree with your second statement.
You cannot configure vmware microcode driver to load BEFORE windows kernel. There is no option for it (This ain't linux ). Only Microsoft can do that.



Those who use vmware microcode loader + inspectre for verification, please don't trust the inspectre result.
Instead, check using Get-SpeculationControlSettings PowerShell script by microsoft.


You will get this result if you use vmware microcode loader.
Quote:
Hardware support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: False
Windows OS support for branch target injection mitigation is disabled by system policy: False
Windows OS support for branch target injection mitigation is disabled by absence of hardware support: False

Notice the red statement above? This indicates windows kernel doesn't make use of IBRS, IBPB and STIBP.
The windows kernel isn't able to detect the existence of these MSRs and doesn't activate the kernel mitigation because vmware microcode driver is loaded too late in the booting cycle.


Somebody should really write an email to Gibson Research Corporation......


A properly applied microcode update would display:
Quote:
Hardware support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: True
JohnLai is offline  
post #8 of 8 (permalink) Old 04-15-2018, 11:59 AM - Thread Starter
New to Overclock.net
 
Regeneration's Avatar
 
Join Date: Jan 2011
Posts: 60
Rep: 22 (Unique: 22)
I updated the first post, and included the microcode in .dat file format.
Regeneration is offline  
Reply

Quick Reply
Message:
Options

Register Now

In order to be able to post messages on the Overclock.net - An Overclocking Community forums, you must first register.
Please enter your desired user name, your email address and other required details in the form below.
User Name:
If you do not want to register, fill this field only and the name will be used as user name for your post.
Password
Please enter a password for your user account. Note that passwords are case-sensitive.
Password:
Confirm Password:
Email Address
Please enter a valid email address for yourself.
Email Address:

Log-in



Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Show Printable Version Show Printable Version
Email this Page Email this Page


Forum Jump: 

Posting Rules  
You may post new threads
You may post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off