I just read a tweetstorm from @Karl_F1_Fan to @Crysta that has my head swimming. Here’s what he says: Hi Crysta, Your quotes to Microsoft articles are
[See the full post at: Mind boggled: The Meltdown/Spectre microcode patches]
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Mind boggled: The Meltdown/Spectre microcode patches
Home » Forums » Newsletter and Homepage topics » Mind boggled: The Meltdown/Spectre microcode patches
- This topic has 26 replies, 14 voices, and was last updated 6 years, 9 months ago.
AuthorTopicViewing 13 reply threadsAuthorReplies-
GreatAndPowerfulTech
AskWoody LoungerAugust 30, 2018 at 7:21 am #214048The inconsistency of Microsoft’s actions is amazing. Concerning OEM’s, at least Dell is proving to provide proper customer support with BIOS updates that address the issues properly. I had been telling our customers that all the big OEM computers were made in the same factories without much quality difference between them other than engineering style. The real difference now appears not to be in how they’re made, but in how their taken care of after the fact. In this case Dell stands above all the others.
GreatAndPowerfulTech
3 users thanked author for this post.
-
alpha128
AskWoody PlusAugust 30, 2018 at 10:27 am #214081The inconsistency of Microsoft’s actions is amazing. Concerning OEM’s, at least Dell is proving to provide proper customer support with BIOS updates that address the issues properly. I had been telling our customers that all the big OEM computers were made in the same factories without much quality difference between them other than engineering style. The real difference now appears not to be in how they’re made, but in how their taken care of after the fact. In this case Dell stands above all the others.
Yes, this situation makes me glad that my (business class) home system is a Dell. In fact, I just applied the second BIOS update to my system. I wait a couple of months for any bugs to get worked out. So I applied the February update in April, and the June 21st update yesterday. The updates are easy to apply and I have noticed no problems afterwards.
-
anonymous
Guest -
EP
AskWoody_MVP -
anonymous
GuestAugust 31, 2018 at 11:59 am #214374This is the full list of Dell systems which have received previous or will receive future BIOS updates related to Spectre/Meltdown:
So, if the Inspiron system you have is not listed as “In Process”, then it has reached EOL and will never receive an update.
-
-
-
-
krzemien
AskWoody Lounger -
WildBill
AskWoody PlusAugust 30, 2018 at 10:39 am #214087Here’s the most recent Intel Microcode Revision Guidance PDF (Apr. 2). https://newsroom.intel.com/wp-content/uploads/sites/11/2018/04/microcode-update-guidance.pdf
There are NO mentions of “Amber”, “Cascade” or “Whiskey” Lakes on the PDF. Has Anandtech taken their DeLorean time machine 5 months into the future & these are Meltdown/Spectre fixes for Win10 1809?! Anandtech claims “Amber” & “Whiskey” are based on Kaby Lake, so do the Kaby Lake fixes cover them, or are these NEW CPUID’s? “Cascade” might be based on Coffee Lake. If anyone knows if there’s a more recent PDF from Intel than Apr. 2, please add it to this thread.
UPDATE: I followed @Karl_F1_Fan’s tweetstorm to @PhantomofMobile (AKA PhotM on the Lounge) & found a more current PDF dated Aug. 8!
https://www.intel.com/content/dam/www/public/us/en/documents/sa00115-microcode-update-guidance.pdf
My Ivy Bridge processor on my ASUS X55A laptop has a “New Production MCU Rev” of 0x20 & my 0x1F is now “Pre-Mitigation Production MCU”. Still not sure how to obtain the microcode.
Also, the current PDF STILL doesn’t list the mystery Lakes… “Amber”, “Cascade” & “Whiskey”. Maybe Anandtech’s been drinking too much whiskey lately? Or is the DeLorean now powered by Mike’s Harder Lemonade?!
Bought a refurbished Windows 10 64-bit, currently updated to 22H2. Have broke the AC adapter cord going to the 8.1 machine, but before that, coaxed it into charging. Need to buy new adapter if wish to continue using it.
Wild Bill Rides Again...1 user thanked author for this post.
-
OscarCP
MemberAugust 30, 2018 at 1:52 pm #214124Wild Bill #214087 ,
Thanks! According to the table in the PDF, my “Sandy Bridge” CPU has an UEFI update, finally. (I’ve checked and found that “sandy Bridge” chips, from earliest 2010 ones (like mine), were the first Intel ones with UEFI instead of BIOS.)
Not that I am about to mess around with my UEFI but… nice to know, anyhow.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
anonymous
Guest -
anonymous
Guest
-
-
Ascaris
AskWoody MVPAugust 30, 2018 at 11:03 am #214091Cited in the original post:
Without Win10 we would have no protection at all…
Only in Microsoft-land is that true, and that’s because Microsoft has elected not to provide these microcode updates for two-thirds of the Windows versions for which they are responsible for providing security updates.
Personally, I don’t want this update in firmware. Anything that slows down my system (even a little) to fix a problem that thus far does not exist in the wild isn’t one that I want made permanent. It’s perfectly fine to get it as an OS update– if your OS provider is willing to provide one.
Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11) -
Cybertooth
AskWoody PlusAugust 30, 2018 at 11:27 am #214095Apropos of this, see the following report: http://www.eweek.com/security/linux-kernel-developer-criticizes-intel-for-meltdown-spectre-response
-
WildBill
AskWoody PlusAugust 30, 2018 at 12:03 pm #214106Thanks. As Ascaris recently said, & as Woody has been saying from the beginning:
Anything that slows down my system (even a little) to fix a problem that thus far does not exist in the wild isn’t one that I want made permanent.
Bought a refurbished Windows 10 64-bit, currently updated to 22H2. Have broke the AC adapter cord going to the 8.1 machine, but before that, coaxed it into charging. Need to buy new adapter if wish to continue using it.
Wild Bill Rides Again...3 users thanked author for this post.
-
-
GoneToPlaid
AskWoody LoungerAugust 30, 2018 at 12:18 pm #214110Hi all,
In another post, I mentioned that I have been testing Intel’s latest Ghost microcodes on my production Win7 x64 machine. I was doing so for the past five days by using the VMware utility which allowed me to use Intel’s latest August uCode for my I5 Haswell CPU. The VMware Fling allowed me to do this, instead of having to create and flash a custom modded BIOS flash file for my out of warranty MSI motherboard’s BIOS in order to implement Intel’s latest August Ghost microcode.
I both coin and in the future will refer to all Intel Meltdown and Spectre mitigating CPU microcode as “Ghost” microcode, since if you read about all of these vulnerabilities which are related to the flawed CPU speculative execution and about how POC code works, you will realize that my Ghost acronym is quite appropriate. Moreover, “Ghost” also indicates all Intel CPU microcode which Intel released after December 2017 in order to mitigate Meltdown and Spectre, and all related CPU flaws.
After five days of stable testing, I finally got fed up with the extremely poor performance of the August Intel Ghostbusting microcode when running older non-multithreading capable programs on my Win7 test computer. You all have no idea how bad the slowdown becomes when running such older programs. It is bad — really bad on older CPUs. Serialized I/O, such as when running backups, is quite good when using the Ghost microcode. Yet random I/O, depending on file sizes, can take a very strong hit in terms of performance on older CPUs. And of course, I already mentioned the issue of older programs.
Nobody should go down the road of creating a custom modded BIOS file for flashing which includes Intel’s latest Ghostbusting microcode. Just don’t do it at the present time, regardless of whatever online programs which you have found to do this. Why? There are many reasons which I will not delve into at the present time. Yet the most important reasons are twofold. First, Microsoft is on track to do the same thing, at OS boot, in Win7 and in Win8x. Second, if I can can get any AV vendor to listen to me (so far, unsuccessful), I have a way to detect any Meltdown/Spectre and related exploit attempts. Any of you all work for an AV company?
I warn against (at least at the present time) installing any BIOS updates from motherboard OEMs or computer OEMs. Why? First is that you might not be able to revert to a pre-Ghost BIOS. Second is that Microsoft is working on doing the same thing by loading Intel’s Ghostbusting CPU microcode during OS boot-up. Presently Microsoft is only doing this in Windows 10, yet Microsoft will soon do so for both Win7 and Win8x. Third is that the same thing can be accomplished for Win7 and Win8x users via the VMware Fling, using the microcode.dat files which I have created and which do not include any microcodes with caveats which presently are causing severe issues for Win10 users with certain CPUs. The upshot is that everyone should “hold tight” at the present time.
Okay, so how about those who DO want to mitigate the Ghosts without having to flash their motherboard’s BIOS?
The VMware Fling works great for testing and/or implementation purposes on Win7 and Win8x for Meltdown and Spectre mitigation. Do NOT use the VMware Fling on Win10. Please do not try the VMware Fling in Win7 or Win8x. Instead, soon I will post a Dropbox for the VMware Fling which includes instructions and microcode.dat files for both December 2017 and August 2018, and which do not include any “caveat” CPU microcode which is presently causing severe issues. The December 2017 microcode.dat file will allow everyone to perform performance tests of their systems, especially if they have held off on updating at December 2017. The August 2018 microcode.dat file will then allow everyone to then perform performance tests while running Intel’s latest August Ghostbusting microcode on their CPU. Hopefully you all get the idea. The upshot is to allow you all Win7 and Win8x users to not only implement either Intel’s Ghostbusting CPU microcode or Intel’s December 2017 non-Ghostbusting CPU microcode, but also to allow you to perform comparison tests in terms of overall performance of your computer when using either of these microcodes, and to also avoid having to actually flash your motherboard’s BIOS with Intel’s latest Ghostbusting CPU microcode. Note that once you flash your BIOS with a newer BIOS version, it may be either extremely difficult or impossible to flash back to a previous BIOS version. Yet note that there usually are ways to accomplish the latter (flashing an older BIOS file, using methods which I can not disclose online.
I should have a Dropbox of the VMware Fling along with instructions and other info, available via Dropbox sometime this weekend for all of you Win7 and Win8x users to try. Note that if you encounter any issues on bootup, all that you have to do is to use either your install DVD or a recovery DVD to boot to DOS, and then to delete “microcode.dat” in your Windows\System32 folder.
Best regards,
–GTP
3 users thanked author for this post.
-
anonymous
Guest
-
-
javacat
AskWoody LoungerAugust 30, 2018 at 12:43 pm #214116FWIW, ASRock has offered BIOS updates this year with updated microcode. My 2014 H97 chipset MoBo had a bios update in March’18 for Haswell CPU’s, updating m/c from 0x19 to 0x24. As of Aug’18 Intel’s latest Haswell Desktop m/c is 0x25.
So, Dell isn’t the only one serving their user base…
-
anonymous
GuestAugust 30, 2018 at 2:24 pm #214098I can only be happy that [at least] Dell was able to provide due updates and all..
But in my experience (with AGESA instead of microcode, but still) on the Bobcat architecture, of all the OEM bioses I looked into, only Asus got to release an updated one.
…On the other hand, I can sure testify how my newer Skylake laptop of theirs still hasn’t got a new firmware since 2015.
Considering nowadays there aren’t particular reasons to prefer a brand over another, is there any list/tracker/something for this important kind of information?
-
anonymous
GuestAugust 30, 2018 at 2:24 pm #214113For a good measure, they are also suggesting FeatureSettingsOverride 0 in the L1TF advisory (https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018) – which disables any mitigations whatsoever.
Top quality documentation, well done @Redmond. #facepalm
-
anonymous
Guest -
anonymous
Guest
-
-
-
anonymous
GuestAugust 30, 2018 at 4:00 pm #214156Instead of running in circles, one should simply run the latest SpeculationControl PowerShell script from Microsoft and check the state of the mitigations. On a machine (latest BIOS/Windows 1803 updates installed) that does not even have any of the registry settings mentioned, the following results are returned:
For more information about the output below, please refer to https://support.microsoft.com/en-in/help/4074629
Speculation control settings for CVE-2017-5715 [branch target injection]
Hardware support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: TrueSpeculation control settings for CVE-2017-5754 [rogue data cache load]
Hardware requires kernel VA shadowing: True
Windows OS support for kernel VA shadow is present: True
Windows OS support for kernel VA shadow is enabled: True
Windows OS support for PCID performance optimization is enabled: True [not required for security]Speculation control settings for CVE-2018-3639 [speculative store bypass]
Hardware is vulnerable to speculative store bypass: True
Hardware support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is enabled system-wide: FalseSpeculation control settings for CVE-2018-3620 [L1 terminal fault]
Hardware is vulnerable to L1 terminal fault: True
Windows OS support for L1 terminal fault mitigation is present: True
Windows OS support for L1 terminal fault mitigation is enabled: TrueBTIHardwarePresent : True
BTIWindowsSupportPresent : True
BTIWindowsSupportEnabled : True
BTIDisabledBySystemPolicy : False
BTIDisabledByNoHardwareSupport : False
KVAShadowRequired : True
KVAShadowWindowsSupportPresent : True
KVAShadowWindowsSupportEnabled : True
KVAShadowPcidEnabled : True
SSBDWindowsSupportPresent : True
SSBDHardwareVulnerable : True
SSBDHardwarePresent : True
SSBDWindowsSupportEnabledSystemWide : False
L1TFHardwareVulnerable : True
L1TFWindowsSupportPresent : True
L1TFWindowsSupportEnabled : True
L1TFInvalidPteBit : 45
L1DFlushSupported : TrueApparently, if the latest BIOS/Windows 10 updates are installed, no registry setting is required to have all mitigations enabled.
3 users thanked author for this post.
-
anonymous
GuestAugust 30, 2018 at 4:08 pm #214160The latest SpeculationControl script is available at https://aka.ms/SpeculationControlPS (link taken from https://support.microsoft.com/en-us/help/4073119/).
-
Mele20
AskWoody LoungerAugust 31, 2018 at 7:16 am #214324Personally, I don’t want this update in firmware. Anything that slows down my system (even a little) to fix a problem that thus far does not exist in the wild isn’t one that I want made permanent. It’s perfectly fine to get it as an OS update– if your OS provider is willing to provide one.
I agree completely. I can’t understand the praise for Dell in this thread. I have a Dell Windows 10 Pro (Business) computer that is less than one year old. I don’t want the firmware updates for this issue. What no one is mentioning is that every one of these updates has cause bricking of systems! Not all systems…but I don’t want the risk nor do I want the slow down. I spent a lot of money on this computer and I bought to be fast.
I probably can’t ignore these firmware updates indefinitely though as I also bought 4 years of Enterprise hardware and software extended warranty support. If I have to call Dell about anything…a dead data drive (which is almost inevitable) for instance, I won’t get hardware extended warranty support or any support unless I am fully up to date and that includes bios updates.
-
anonymous
Guest -
Kirsty
ManagerSeptember 1, 2018 at 5:33 pm #214657As I understand it, it isn’t simple, and what the registry values should be depends on the hardware setting it is being used in. There doesn’t appear to be just one correct setting that suits all (but I could be wrong!).
the recent switch is 8 / 3 for anything and any CPU since 0 / 3 is outdated and Intel specific. That’s what I am talking about MS is giving wrong advice for L1TF on their pages. you cannot set 0 / 3 and 8 / 3 the same time as it is the same reg key.
-
-
GoneToPlaid
AskWoody LoungerSeptember 4, 2018 at 3:05 pm #215134Hi everyone,
I have been testing the VMware Fling which can load the latest August 2018 CPU Meltdown and Spectre microcode into your CPU when booting Windows 7 or Windows 8x. I tested using lower load orders during OS bootup.
The Fling’s default start type is StartType=0x2 ; SERVICE_AUTO_START. I tested StartType=0x1 ; SERVICE_SYSTEM_START which works fine in Windows 7. Note that StartType=0x0 ; SERVICE_BOOT_START does NOT work since a full file system driver is not available when loading SERVICE_BOOT_START drivers, resulting in a “file not found” error.
The point is that using StartType=0x1 ; SERVICE_SYSTEM_START should have worked, such that Microsoft’s SpeculationControl.psd1 PowerShell script should have “seen” that your CPU was running Intel’s latest August 2018 Meltdown and Spectre mitigating microcode, and that Windows 7 or Windows 8x should have then implemented additional software based OS mitigations on boot. Yet this does NOT work for either GRC’s InSpectre utility or for Microsoft’s PowerShell script since both don’t check to see what microcode is actually running in your CPU cores, and instead only check what microcode is present in your computer’s BIOS. And this does not work for Windows itself, since the August updates do not check what microcode revision is actually running in the CPU cores. Instead, and even with the August updates installed, Windows presently ignores whatever CPU microcode is actually loaded and running in your CPU cores, and instead applies settings based upon whatever older CPU microcode which Windows finds in your BIOS. Ain’t that a peach of a situation?
The upshot is that Microsoft has some things to fix in Windows 7 and Windows 8x, especially since Microsoft’s own microcode patching in Windows 7 (dated 2009) loads as StartType=0x2 ; SERVICE_AUTO_START.
In summary . . .
I will post the VMware Fling which includes the latest and correct Intel August 2018 microcode files, along with Intel’s latest December 2017 microcode files which do not include any Meltdown and Spectre mitigations. The point of doing so is to allow Win7 and Win8x users to test the performance impacts of Intel’s August 2018 uCode versus Intel’s December 2017 uCode.
Best regards,
–GTP
1 user thanked author for this post.
Viewing 13 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
.NET 8.0 Desktop Runtime (v8.0.16) – Windows x86 Installer
by
WSmeyerbos
8 hours, 45 minutes ago -
Neowin poll : What do you plan to do on Windows 10 EOS
by
Alex5723
4 hours, 29 minutes ago -
May 31, 2025—KB5062170 (OS Builds 22621.5415 and 22631.5415 Out-of-band
by
Alex5723
7 hours, 19 minutes ago -
Discover the Best AI Tools for Everything
by
Alex5723
7 hours, 28 minutes ago -
Edge Seems To Be Gaining Weight
by
bbearren
8 hours, 11 minutes ago -
Rufus is available from the MSFT Store
by
PL1
5 hours, 40 minutes ago -
Microsoft : Ending USB-C® Port Confusion
by
Alex5723
1 day, 8 hours ago -
KB5061768 update for Intel vPro processor
by
drmark
14 hours, 56 minutes ago -
Outlook 365 classic has exhausted all shared resources
by
drmark
11 hours, 7 minutes ago -
My Simple Word 2010 Macro Is Not Working
by
mbennett555
1 day, 4 hours ago -
Office gets current release
by
Susan Bradley
1 day, 6 hours ago -
FBI: Still Using One of These Old Routers? It’s Vulnerable to Hackers
by
Alex5723
2 days, 20 hours ago -
Windows AI Local Only no NPU required!
by
RetiredGeek
2 days, 5 hours ago -
Stop the OneDrive defaults
by
CWBillow
2 days, 21 hours ago -
Windows 11 Insider Preview build 27868 released to Canary
by
joep517
3 days, 7 hours ago -
X Suspends Encrypted DMs
by
Alex5723
3 days, 9 hours ago -
WSJ : My Robot and Me AI generated movie
by
Alex5723
3 days, 10 hours ago -
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
by
Alex5723
3 days, 10 hours ago -
OpenAI model sabotages shutdown code
by
Cybertooth
3 days, 11 hours ago -
Backup and access old e-mails after company e-mail address is terminated
by
M W Leijendekker
2 days, 23 hours ago -
Enabling Secureboot
by
ITguy
3 days, 6 hours ago -
Windows hosting exposes additional bugs
by
Susan Bradley
3 days, 19 hours ago -
No more rounded corners??
by
CWBillow
3 days, 15 hours ago -
Android 15 and IPV6
by
Win7and10
3 days, 4 hours ago -
KB5058405 might fail to install with recovery error 0xc0000098 in ACPI.sys
by
Susan Bradley
4 days, 7 hours ago -
T-Mobile’s T-Life App has a “Screen Recording Tool” Turned on
by
Alex5723
4 days, 10 hours ago -
Windows 11 Insider Preview Build 26100.4202 (24H2) released to Release Preview
by
joep517
4 days, 4 hours ago -
Windows Update orchestration platform to update all software
by
Alex5723
4 days, 17 hours ago -
May preview updates
by
Susan Bradley
4 days, 5 hours ago -
Microsoft releases KB5061977 Windows 11 24H2, Server 2025 emergency out of band
by
Alex5723
3 days, 20 hours ago
Recent blog posts
Key Links
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 |
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.