Gut ich teste jetzt nochmal
Biosversion 2.44 mit dem kompletten Windowspatch auf dem t440(s)
c:\tools>"e:\tools\get biosversion.cmd"
c:\tools>cmd.exe /k "wmic bios get smbiosbiosversion"
SMBIOSBIOSVersion
GJET94WW (2.44 )
c:\tools>e:\tools\SpecuCheck\Get-SpeculationControlSettings.cmd
c:\tools>powershell "Get-SpeculationControlSettings"
Speculation control settings for CVE-2017-5715 [branch target injection]
Hardware support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: True
Speculation control settings for CVE-2017-5754 [rogue data cache load]
Hardware requires kernel VA shadowing: True
Windows OS support for kernel VA shadow is present: True
Windows OS support for kernel VA shadow is enabled: True
Windows OS support for PCID optimization is enabled: True
BTIHardwarePresent : True
BTIWindowsSupportPresent : True
BTIWindowsSupportEnabled : True
BTIDisabledBySystemPolicy : False
BTIDisabledByNoHardwareSupport : False
KVAShadowRequired : True
KVAShadowWindowsSupportPresent : True
KVAShadowWindowsSupportEnabled : True
KVAShadowPcidEnabled : True
-----------------------------------------------------------------------------
c:\tools>cmd.exe /k "wmic bios get smbiosbiosversion"
SMBIOSBIOSVersion
GJET94WW (2.44 )
c:\tools>e:\tools\SpecuCheck\SpecuCheck.exe
SpecuCheck v1.0.5 -- Copyright(c) 2018 Alex Ionescu
https://ionescu007.github.io/SpecuCheck/ -- @aionescu
-------------------------------------------------------
Mitigations for CVE-2017-5754 [rogue data cache load]
-------------------------------------------------------
[-] Kernel VA Shadowing Enabled: yes
├───> with User Pages Marked Global: no
└───> with PCID Flushing Optimization (INVPCID): yes
Mitigations for CVE-2017-5715 [branch target injection]
-------------------------------------------------------
[-] Branch Prediction Mitigations Enabled: yes
├───> Disabled due to System Policy (Registry): no
└───> Disabled due to Lack of Microcode Update: no
[-] CPU Microcode Supports SPEC_CTRL MSR (048h): yes
└───> Windows will use IBRS (01h): yes
└───> Windows will use STIPB (02h): yes
[-] CPU Microcode Supports PRED_CMD MSR (049h): yes
└───> Windows will use IBPB (01h): yes
c:\tools>
----------------------------------------------------------------------------
Sieht ja alles super aus, nur de
r Eventviewer läuft jetzt mit folgendem voll:
A corrected hardware error has occurred.
Reported by component: Processor Core
Error Source: Corrected Machine Check
Error Type: Internal parity error
Processor APIC ID: 2
Hoffe es kommt nicht wieder zu Bluescreens, mal sehen.
Gruß
- - - Beitrag zusammengeführt - - -
https://answers.microsoft.com/en-us...r/897a3ec3-c92f-4b4e-980e-824ade948cf8?auth=1
- - - Beitrag zusammengeführt - - -
An die Profies:
Gibt ess von Intel schon eine neueren Microcode?
Intel Core i5-4210U / Haswell ULT - Microcode Update rev. 21