ASUS Republic of Gamers [ROG] | The Choice of Champions – Overclocking, PC Gaming, PC Modding, Support, Guides, Advice - Powered by vBulletin

Update microcode for Spectre?

Printable View

Show 40 post(s) from this thread on one page
Page 3 of 5 FirstFirst Previous 1 2 3 4 5 Próximo LastLast
  • 03-07-2018, 11:05 AM
    jjxakergm
    After lengthy tests, I do not recommend upgrading to the microcode to 0x84.
    Serious problems with stability are observed, for example, when the instructions are used AES-NI.
    With the load for two days, the system can turn itself off (does not respond to the power button), to start it will be necessary to de-energize the system completely, and then turn it on in normal mode.
    There are still situations when the system itself turns off and immediately turns on.
    The bug in the microcode resembles the operation of the option "forcereset" for the ME FW, just a similar behavior of the system...
    Bug is observed on all KBL processors with microcode 0x84, to solve the problem helps rollback to 0x80 and younger.
    The bug is very easy to identify, you can, for example, run a mining on an algorithm Cryptonight up to a day or two.
    In general, Intel again spoiled everything!

    udp. By the way, on the MSI motherboards z270 with a microcode 0x84 there is an error in the logs of the operating system "Power management functions of processor 1 in the performance state in group 0 are disabled due to a problem with the embedded software", on the Asus there is no such entry in the log. Well, it's just for information...

    Far from all are faced with problems of arbitrary system shutdown on new microcodes, since the scripts of their appearances are specific. But not the fact that this scenario is the only one. Intel once again failed its partners...

    ps. wrote as I could, sorry for my english :rolleyes:

    Systems on which tests were conducted (bios on default):
    MB: ASUS Maximus IX Apex@BIOS ver. 1203 + Mc 0x84
    CPU: Intel Core i5-7600k
    RAM: G.Skill F4-3600C16D-16GTZR
    SSD: Samsung 960 EVO 250GB
    PSU: Seasonic PRIME 750W Titanium
    OS: Win 10 RS3 x64 Build 16299.251 Specter/Meltdown is Disabled in the registry
    -------------------------------------------------
    MB: MSI Z270-A PRO@BIOS ver. 1.4 + Mc 0x84
    CPU: Celeron G3930
    RAM: GeIL GN44GB2133C15S
    SSD: Samsung 850 EVO 120GB M.2
    PSU: Corsair HX750i
    OS: Win 10 RS3 x64 Build 16299.251 Specter/Meltdown is Enabled in the registry
  • 03-07-2018, 11:15 AM
    Terepin
    And how does that affect gaming?
  • 03-07-2018, 11:37 AM
    jjxakergm
    In game scenarios, the problem does not manifest itself. but I did not test much...
    This problem affects servers most of all, and miners. that is, where the processor is in constant load 24/7.
  • 03-07-2018, 11:41 AM
    Terepin
    Miners can go to hell.
  • 03-07-2018, 12:15 PM
    jjxakergm
    Maybe you're right :D
    Simply this is the easiest scenario to identify a bug.
    In general, I rolled back to 0x70. I do not need such problems, it's better to have full productivity and stability than these crutches from Intel.
    Intel's courage is not enough to admit, that the problem with the Specter can not be remedied programmatically.
  • 03-07-2018, 03:46 PM
    pokuly
    I have a coffee lake 8700 running nwith µC 84 and no issues but i need higher voltages to hold my overclock. https://rog.asus.com/forum/showthrea...607#post707720
    Would be nice if anyone else reported experiences but no one did so far.
  • 03-07-2018, 05:43 PM
    jjxakergm
    In normal operating conditions, you will not see any problems.
    New microcodes 0x84 (for KBL/CFL) do not even affect the loss of system performance, as it was with versions 0x7C and 0x80.
  • 03-08-2018, 09:07 AM
    RidingTheFlow
    Quote:

    Originally Posted by jjxakergm View Post
    New microcodes 0x84 (for KBL/CFL) do not even affect the loss of system performance, as it was with versions 0x7C and 0x80.

    That's why I wonder are 0x84 actually doing anything ;)

    Do we have any kind of "spectre attack test" to verify that side-channel is actually prevented? Instead of relying on Intel word that it "should"?
  • 03-08-2018, 11:22 AM
    jjxakergm
    I believe that there is no danger, Intel releases protection from non-existent threats.
    The verification method does not exist either, the software that tells you that protection is granted, it's just an answer to the microcode poll.
  • 03-08-2018, 12:42 PM
    RidingTheFlow
    Apparently there is a browser test - http://xlab.tencent.com/special/spec...tre_check.html

    But I think most of mainstream browsers already done own protection (which does not need microcode).

    I guess proper test would be to find un-patched browser and see it microcode actually protects it.
Show 40 post(s) from this thread on one page
Page 3 of 5 FirstFirst Previous 1 2 3 4 5 Próximo LastLast
All times are GMT. The time now is 04:42 AM.
Powered by vBulletin® Version 4.2.2
Copyright © 2021 vBulletin Solutions, Inc. All rights reserved.
©ASUSTeK Computer Inc. All rights reserved.