Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
ufarn
May 30, 2009
Have any mobo manufacturers gone the extra mile in patching in support for older models? I was going to upgrade to ASUS next time, but if ASRock have done a better job of this, I may just go with them in the future.

Adbot
ADBOT LOVES YOU

Craptacular!
Jul 9, 2001

Fuck the DH

ufarn posted:

Have any mobo manufacturers gone the extra mile in patching in support for older models? I was going to upgrade to ASUS next time, but if ASRock have done a better job of this, I may just go with them in the future.

ASUS will patch back to Skylake or Broadwell, I forgot. ASRock has no comment. MSI made a vague statement that said "Older chipsets may need more time to wait, as it's up to Intel to release required resources. No ETA given." No one wants to make promises because they need Intel to make code and code is only available as far back as Haswell for now.

It should be noted it's not really clear if you self-built your computer whether or not your motherboard manufacturer actually needs to do anything, or if Intel will simply be releasing tools themselves. They're not eager to begin committing to putting out fires until Intel tells them whether or not they have to, but Intel is going to want pre-built partners like HP, Dell, etc to distribute the patch through their points of customer contact because a generic Intel alert won't get grandma's attention quite like "Hello CYNTHIA, we here at Dell ask if you could point your INSPIRON 6120 to our site at..."

As a pretty big laptop manufacturer, it may simply be that Asus is jumping to the call sooner than everyone else because, whether Intel handles it for self-built or not, they're going to be asked to do something.

Captain Hair
Dec 31, 2007

Of course, that can backfire... some men like their bitches crazy.
So I'm asking more out of curiosity than fear, but I have a bunch of friends/family that are running Xeon chips on ye olde core2duo boards (asus p5q and the like).

I thought I'd head someone mention Xeon earlier, just wondering if they're more at risk or anything? Also I realise it's very unlikely that any of these old boards will get a bios or microcode update however since getting these old Xeon to run in there boards requires editing the microcode of the bios to include the Xeon chips, I'm assuming *if* these old boards were to get a patch it would make all these old Xeon units unusable till I edited the new bios, correct?

EoRaptor
Sep 13, 2003

by Fluffdaddy

Craptacular! posted:

ASUS will patch back to Skylake. ASRock has no comment. MSI made a vague statement that said "Older chipsets may need more time to wait, as it's up to Intel to release required resources. No ETA given."

It should be noted it's not really clear if you self-built your computer whether or not your motherboard manufacturer actually needs to do anything, or if Intel will simply be releasing tools themselves. They're not eager to begin committing to putting out fires until Intel tells them whether or not they have to, but Intel is going to want pre-built partners like HP, Dell, etc to distribute the patch through their points of customer contact because a generic Intel alert won't get grandma's attention quite like "Hello CYNTHIA, we here at Dell ask if you could point your INSPIRON 6120 to our site at..."

As a pretty big laptop manufacturer, it may simply be that Asus is jumping to the call sooner than everyone else because, whether Intel handles it for self-built or not, they're going to be asked to do something.

Dell isn't going very far back at all. You can check out what they will patch (and what they won't) here: http://www.dell.com/support/meltdown-spectre

Captain Hair posted:

So I'm asking more out of curiosity than fear, but I have a bunch of friends/family that are running Xeon chips on ye olde core2duo boards (asus p5q and the like).

I thought I'd head someone mention Xeon earlier, just wondering if they're more at risk or anything? Also I realise it's very unlikely that any of these old boards will get a bios or microcode update however since getting these old Xeon to run in there boards requires editing the microcode of the bios to include the Xeon chips, I'm assuming *if* these old boards were to get a patch it would make all these old Xeon units unusable till I edited the new bios, correct?

If you edited the BIOS to include actual microcode, and not just the basic CPU ID support, you could edit the BIOS again with the updated microcode and flash it yourself. This depends on Intel producing a microcode update for a CPU that old and it being available publicly in a format you can incorporate into whatever BIOS you have available.

EoRaptor fucked around with this message at 13:36 on Jan 10, 2018

Fame Douglas
Nov 20, 2013

by Fluffdaddy
Intel's CEO has promised patches for all processors introduced in the past five years to be released till the end of January. This means anything pre-Haswell is out.

Fame Douglas fucked around with this message at 13:34 on Jan 10, 2018

Captain Hair
Dec 31, 2007

Of course, that can backfire... some men like their bitches crazy.

EoRaptor posted:


If you edited the BIOS to include actual microcode, and not just the basic CPU ID support, you could edit the BIOS again with the updated microcode and flash it yourself. This depends on Intel producing a microcode update for a CPU that old and it being available publicly in a format you can incorporate into whatever BIOS you have available.

Ah cool, thanks for the informative answer :) I'm pretty sure it only required editing the CPU ID table, so it probably wouldn't change anything anyway even if there was a patch for it. Was just curious really.

WattsvilleBlues
Jan 25, 2005

Every demon wants his pound of flesh
How long will it take for hardware-level fixes to come to market in the desktop CPUs themselves? Is Ice Lake likely to be the first architecture not to be vulnerable to Meltdown and Spectre?

GRINDCORE MEGGIDO
Feb 28, 1985


How can they make a spectre proof hardware design?

Rastor
Jun 2, 2001

GRINDCORE MEGGIDO posted:

How can they make a spectre proof hardware design?

It might require coordinated software support but I think you could do it with extra hardware checks, similar to how AMD chips aren't affected by Meltdown.

karoshi
Nov 4, 2008

"Can somebody mspaint eyes on the steaming packages? TIA" yeah well fuck you too buddy, this is the best you're gonna get. Is this even "work-safe"? Let's find out!

GRINDCORE MEGGIDO posted:

How can they make a spectre proof hardware design?

Hash the BTB. On protection level modification, change the hash algorithm randomly. Maybe.

e: was thinking about a different thingy. (The BTB attacks on trustzone from C3)

karoshi fucked around with this message at 21:14 on Jan 10, 2018

GABA ghoul
Oct 29, 2011

How dangerous is Spectre? I have hardware that will almost certainly never receive microcode updates. How much should I worry about running JavaScript with it?

Also, aren't ARM processors affected by Spectre too? Or did I imagine that? Any word on the Android situation?

cinci zoo sniper
Mar 15, 2013




Raspberry Jam It In Me posted:

How dangerous is Spectre? I have hardware that will almost certainly never receive microcode updates. How much should I worry about running JavaScript with it?

Also, aren't ARM processors affected by Spectre too? Or did I imagine that? Any word on the Android situation?

Android is insecure by design.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Raspberry Jam It In Me posted:

How dangerous is Spectre? I have hardware that will almost certainly never receive microcode updates. How much should I worry about running JavaScript with it?

Also, aren't ARM processors affected by Spectre too? Or did I imagine that? Any word on the Android situation?

Spectre allows reading of private data in a process that something like javascript shouldn't be able to touch. Browser developers are mitigating it by doing per-process isolation for each tab to isolate which increases memory overhead but works. Spectre is considerably lower-risk for normal day to day usage compared to Meltdown but you're playing wack-a-mole trying to keep each individual program from being vulnerable to it.

EoRaptor
Sep 13, 2003

by Fluffdaddy

GRINDCORE MEGGIDO posted:

How can they make a spectre proof hardware design?

Physically split the TLB cache in two, with one that can be used as current, and the other that is a shadow of the current that can only be used by the CPU when it is speculating. The shadow cannot be read or written by any normal process, and only gets pushed up to the main cache if speculation succeeds. Take advantage of transactional memory support keep overhead low.

crazypenguin
Mar 9, 2005
nothing witty here, move along

EoRaptor posted:

The shadow cannot be read or written by any normal process, and only gets pushed up to the main cache if speculation succeeds.

This is an especially expensive approach, silicon-wise, but a ton of approaches exist striking different trade-offs. This is certainly a solvable problem. All they have to do is make sure that cache cannot be used as a side-channel from a speculative execution.

GABA ghoul
Oct 29, 2011

BangersInMyKnickers posted:

Spectre allows reading of private data in a process that something like javascript shouldn't be able to touch. Browser developers are mitigating it by doing per-process isolation for each tab to isolate which increases memory overhead but works. Spectre is considerably lower-risk for normal day to day usage compared to Meltdown but you're playing wack-a-mole trying to keep each individual program from being vulnerable to it.

So, you are saying that there is zero risk from browsing alone, as long as I use an up to date browser?

LRADIKAL
Jun 10, 2001

Fun Shoe
There's always risk. Your system is always vulnerable to hacks and exploits. This is just one more. If you are this worried, you shouldn't have any personal information on your computer ever, patched or not.

Rastor
Jun 2, 2001

Yeah nobody can promise you zero risk.

What we can say is that the patches which have been released mitigate the known exploits, so you should patch and move on with your life just like with most every announced exploit.

Lockback
Sep 3, 2006

All days are nights to see till I see thee; and nights bright days when dreams do show me thee.
No one is trying to steal your muffin recipe, nana

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

They are trying to steal her social security checks though

GABA ghoul
Oct 29, 2011

Lockback posted:

No one is trying to steal your muffin recipe, nana

I keep my serial murder plans and trophies on that computer, this is serious business. In many parts of the world you can go to prison for a single murder alone.

But seriously, thanks for the answers. Glad I can forget about this poo poo for now.

Rexxed
May 1, 2010

Dis is amazing!
I gotta try dis!

Raspberry Pis aren't vulnerable. Checkmate, Intailures.

Kerbtree
Sep 8, 2008

BAD FALCON!
LAZY!
Release dates are out for HP BIOS updates.
Mid-february :emo:

Craptacular!
Jul 9, 2001

Fuck the DH

Kerbtree posted:

Release dates are out for HP BIOS updates.
Mid-february :emo:

The listing of ENVY h8-XXXX desktops is possibly good news for self-built Ivy owners, since that would presumably include the ENVY h8-1455 which shipped with a 3770K. Until this it seems that Intel was content to give us the "EOL, get bent" reaction.

canyoneer
Sep 13, 2005


I only have canyoneyes for you

Rexxed posted:

Raspberry Pis aren't vulnerable. Checkmate, Intailures.

OK but what about the regular SNES Classics?

Rexxed
May 1, 2010

Dis is amazing!
I gotta try dis!

canyoneer posted:

OK but what about the regular SNES Classics?

https://www.youtube.com/watch?v=xmTn5bVaOH4

Mr Shiny Pants
Nov 12, 2012

Henrik Zetterberg posted:

BIOS/microcode patch

I thought it was a microcode update and the mobo vendor would not be needed for it to update. Kinda like how Intel makes drivers for their onboard nics.

LRADIKAL
Jun 10, 2001

Fun Shoe

canyoneer posted:

OK but what about the regular SNES Classics?

https://www.youtube.com/watch?v=OPcV9uIY5i4

You can execute arbitrary code in Super Mario World.

Fame Douglas
Nov 20, 2013

by Fluffdaddy

Mr Shiny Pants posted:

I thought it was a microcode update and the mobo vendor would not be needed for it to update. Kinda like how Intel makes drivers for their onboard nics.

The Microcode is saved on the BIOS chip and loaded into the CPU at startup.

Mr Shiny Pants
Nov 12, 2012

Fame Douglas posted:

The Microcode is saved on the BIOS chip and loaded into the CPU at startup.

Ah, I see. That makes sense. I thought it was like flashing your CPU.

mystes
May 31, 2006

The os can also update the microcode each time it boots, though.

Combat Pretzel
Jun 23, 2004

No, seriously... what kurds?!

mystes posted:

The os can also update the microcode each time it boots, though.
Yea, we should keep repeating this one, so that it gets ignored some more.

30 TO 50 FERAL HOG
Mar 2, 2005



mystes posted:

The os can also update the microcode each time it boots, though.

yeah thats what i want from windows, the os that cant even patch itself without loving something up half the time

Combat Pretzel
Jun 23, 2004

No, seriously... what kurds?!
Because updating a system with tons of files live and sending a signed closed microcode package to the CPU via specific means, both that Intel supplied, is so much of the same.

Fame Douglas
Nov 20, 2013

by Fluffdaddy

Combat Pretzel posted:

Yea, we should keep repeating this one, so that it gets ignored some more.

Why would we repeat this as long as we don't know whether Microsoft will even release a microcode update? So far, the only fix is a Bios update. That's what we should repeat, not the hope for a better future that may or may not come.

Combat Pretzel posted:

Because updating a system with tons of files live and sending a signed closed microcode package to the CPU via specific means, both that Intel supplied, is so much of the same.

lol if you think there aren't tons of weird edge-cases and incompatibilities with patching the microcode through the OS. https://wiki.debian.org/Microcode#Updating_CPU_microcode_within_Debian_.28Intel_or_AMD.29

Fame Douglas fucked around with this message at 16:54 on Jan 11, 2018

DrDork
Dec 29, 2003
commanding officer of the Army of Dorkness

Fame Douglas posted:

Why would we repeat this as long as we don't know whether Microsoft will even release a microcode update?

Because the vast majority of motherboards will never get a BIOS update at all, and both Intel and Microsoft have stated that this is going to be the way forward for most systems with "older" (more than 2 years) motherboards as a result.

Xae
Jan 19, 2005

Fame Douglas posted:

Why would we repeat this as long as we don't know whether Microsoft will even release a microcode update? So far, the only fix is a Bios update. That's what we should repeat, not the hope for a better future that may or may not come.

99% of consumers will never update their BIOS.

Police Automaton
Mar 17, 2009
"You are standing in a thread. Someone has made an insightful post."
LOOK AT insightful post
"It's a pretty good post."
HATE post
"I don't understand"
SHIT ON post
"You shit on the post. Why."
I'm actually kinda surprised how everyone kinda drags their feet on the updates, especially considering how long this has apparently been known.

It is true though, every OS can do microcode updates and these updates are only valid until your computer is rebooted, where they will have to be loaded into the CPU again. The BIOS/Firmware can do that, or the OS. Haswell/early Broadwell for example got microcode updates before to deal with CPU (in)stability (google TXS extensions which had to be disabled via microcode) my AMD APU I'm typing this on had a pretty serious security flaw which also got patched via microcode a year or so ago. This stuff happens all the time. Modern CPUs are complicated beasts. A BIOS update isn't necessary if the OS provides the microcode update. There is absolutely no downside to have the OS providing it.

Fame Douglas
Nov 20, 2013

by Fluffdaddy
DigitalFoundry has a video on gaming performance after these patches: Seems pretty noticeable at times, especially with games like The Witcher 3. https://www.youtube.com/watch?v=LC1WuKdPVCQ

Intel has some PR benchmarks up as well that show a decrease in performance of around 5-10% for office workloads: https://newsroom.intel.com/editorials/intel-security-issue-update-initial-performance-data-results-client-systems/

Fame Douglas fucked around with this message at 17:40 on Jan 11, 2018

Adbot
ADBOT LOVES YOU

feedmegin
Jul 30, 2008

Fame Douglas posted:

lol if you think there aren't tons of weird edge-cases and incompatibilities with patching the microcode through the OS. https://wiki.debian.org/Microcode#Updating_CPU_microcode_within_Debian_.28Intel_or_AMD.29

I'm not sure why you think that link proves that. BIOS or OS, each will be doing exactly the same thing to update the microcode. There's nothing magic the BIOS does and the OS doesn't to make that happen, it just does it earlier.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply