Microsoft Kernel Patch CPU Before and After Benchmarks Thread


Recommended Posts

  On 07/01/2018 at 18:33, LimeMaster said:

Might end up being an unlucky combo. I guess we'll just have to wait and see. :/

Expand  

That would be unfortunate.

RE: Microcode updates. For older motherboard users who likely are never going to get official EFI updates, VMWare has a tool that can update a CPU's microcode

 

https://labs.vmware.com/flings/vmware-cpu-microcode-update-driver

 

Good luck finding the relevant 'microcode.dat' file needed for Intel CPUs though. I haven't yet located where Sandybridge's latest one is.

The only one I was able to find was for Linux distributions, I guess specific to virtualization of Linux distributions, nothing pertinent to Windows.

Edited by DeusProto
  • Like 2
  On 07/01/2018 at 03:37, LimeMaster said:

I understand why Linus is angry then.

Expand  

cos hes an attention seeking bellend? What bout his beloved ARM he proclaims, they are affected also......yup confirmed intel hating bellend! 

 

 

  • Like 3
  On 08/01/2018 at 08:34, DeusProto said:

RE: Microcode updates. For older motherboard users who likely are never going to get official EFI updates, VMWare has a tool that can update a CPU's microcode

 

https://labs.vmware.com/flings/vmware-cpu-microcode-update-driver

 

Good luck finding the relevant 'microcode.dat' file needed for Intel CPUs though. I haven't yet located where Sandybridge's latest one is.

The only one I was able to find was for Linux distributions, I guess specific to virtualization of Linux distributions, nothing pertinent to Windows.

Expand  

I am in the same situation as You are. Nothing from either ASUS or Intel for Sandy Bridge. In fact, I am almost certain Intel will not release anything for Sandy Bridge and older since, theoretically, these chips would be more affected by the slowdown than Broadwell and later. I still can't find anything on Haswell V1 either.

It's exhausting when you all think you are testing old CPU's when it's been said the problem goes back to CPU's from 1995.

Seriously all the sarcastic and flippant little remarks about it being overblown is silly nonsense.

I seen 1 guy bench an newer i7 then right away a guy made a crack about the problem being no big deal.

I wouldn't have a problem with that had people actually done testing first.. but they haven't.

Clearly most of you did not hear what was said in the first place.

No one anywhere on the internet said *ALL* CPU's would get a 20/30% CPU penalty. (The same amount of speed loss)

You are making that up in your head.

What was ACTUALLY said  is could vary by CPU and WHAT YOU ARE DOING.

Get it yet ?

It's tiring when people fail miserably to comprehend what is posted int he stories.

Then.. get extremely rude snotty arrogant and offensive about it.

 

My "old" Haswell 4770k i7 i used to have was more powerful than 20 of the PC's i am using right now.

So think about it.. is your old dual core from 2005 going to be more affected than a CPU from last year (that you call "old") ?

 

I don't like the It's not a problem at all guys or.. the hysteria people saying it;s the end of the world.

Can we get a fair HONEST and accurate balance that is based of of REAL testing ?

And don't forget people already made their opinions / judgments for all CPU's based on the first few "old" CPU;'s people benched.

 

I've been bench'ing for a decade or two and already have a pile of software installed.

I will do some testing but i was waiting for WU to offer the patch to me via Windows update.

I am not inclined to seek out and manually install updates.. on Windows 7.

I have seen 1 or 2 problems with WU over the last 20 years. LOL

Remember when it was a website only ? ;)

 

So.. system calls you say ?

Well i wonder what to use then.. my all time fav was LinX for Intel and an AMD patched version.

I've found it to be a real CPU crusher when hunting for instability with your OC. (better than others like Prime95)

I've used all the old popular ones of course.

 

Anyway once i know what to test with (That utilizes system calls) what ever that means.. and i am offered the update i will test and post.

I know what a system call is generally speaking.

For example i have coded .dll emulator stubs before that patched the export table and emulated internal built in functions on programs.

I have coed a lot of programs and cracked / reverse engineered a lot of "targets" ranging from Windows apps to Linux to Android to Java etc.

People are repeating this "systems call" comment all over vaguely.

it matters then to choose a benchmark that will ACTUALLY test the issue.

Vs people testing with a test program that will never show a difference.

 

Lastly don't mistake my comments for anything other than the truth.

I like AMD and Intel etc.. i have no desire to cheerlead or jump chips or minimize or hype up the problem.

I simply desire the honest facts.. nothing more.

I started reading this to see "old" benchmarks and i didn't really see any after a few pages.. but a whole lot of sarcastic comments.

I have logged bench stats from many app's going back to 2010 and earlier.

I test everything and log everything and have it all stored. (655 files in 60 folders) and maybe more "Becnhmark stats/pics" elsewhere i forgot about.

  • Like 2
  • Thanks 1

i'm really curious as to what's gonna happen with the old motherboards, i mean really old, something that was manufactured in the late 90's or early 2000. I'm pretty sure  these boards with core2duo/quad or AMD X2/X4/Phenom machines won't get any bios updates anymore. Does this mean they'll always be vulnerable to these exploits?

  On 08/01/2018 at 13:12, Mando said:

Nice post godflesh :) 

 

@warwagonmight be worth asking to mods to clean up the thread to leave just benchmark outputs. Im guilty as the rest going off on a tangent.

Expand  

Don't request that. Neowin needs to feel more lively to get encourage members to participate.

  On 08/01/2018 at 16:24, Jampe said:

My tests with performancetest 64bit by passmark shows significant changes. Results dropped from 1600 points to 1200. Expecially 2D graphics suffered big way, over 30 % performance loss

Expand  

Why would 2d or 3D graphics suffer when gpu code isn’t x86 as far as I know? The fix is only for x86. 

  On 08/01/2018 at 15:31, muratoner said:

i'm really curious as to what's gonna happen with the old motherboards, i mean really old, something that was manufactured in the late 90's or early 2000. I'm pretty sure  these boards with core2duo/quad or AMD X2/X4/Phenom machines won't get any bios updates anymore. Does this mean they'll always be vulnerable to these exploits?

Expand  

Well how about the motherboard the average user is using? Do you really think they will ever download a bios update?

  On 08/01/2018 at 11:47, Godflesh said:

It's exhausting when you all think you are testing old CPU's when it's been said the problem goes back to CPU's from 1995.

Seriously all the sarcastic and flippant little remarks about it being overblown is silly nonsense.

I seen 1 guy bench an newer i7 then right away a guy made a crack about the problem being no big deal.

I wouldn't have a problem with that had people actually done testing first.. but they haven't.

Clearly most of you did not hear what was said in the first place.

No one anywhere on the internet said *ALL* CPU's would get a 20/30% CPU penalty. (The same amount of speed loss)

You are making that up in your head.

What was ACTUALLY said  is could vary by CPU and WHAT YOU ARE DOING.

Get it yet ?

It's tiring when people fail miserably to comprehend what is posted int he stories.

Then.. get extremely rude snotty arrogant and offensive about it.

 

My "old" Haswell 4770k i7 i used to have was more powerful than 20 of the PC's i am using right now.

So think about it.. is your old dual core from 2005 going to be more affected than a CPU from last year (that you call "old") ?

 

I don't like the It's not a problem at all guys or.. the hysteria people saying it;s the end of the world.

Can we get a fair HONEST and accurate balance that is based of of REAL testing ?

And don't forget people already made their opinions / judgments for all CPU's based on the first few "old" CPU;'s people benched.

 

I've been bench'ing for a decade or two and already have a pile of software installed.

I will do some testing but i was waiting for WU to offer the patch to me via Windows update.

I am not inclined to seek out and manually install updates.. on Windows 7.

I have seen 1 or 2 problems with WU over the last 20 years. LOL

Remember when it was a website only ? ;)

 

So.. system calls you say ?

Well i wonder what to use then.. my all time fav was LinX for Intel and an AMD patched version.

I've found it to be a real CPU crusher when hunting for instability with your OC. (better than others like Prime95)

I've used all the old popular ones of course.

 

Anyway once i know what to test with (That utilizes system calls) what ever that means.. and i am offered the update i will test and post.

I know what a system call is generally speaking.

For example i have coded .dll emulator stubs before that patched the export table and emulated internal built in functions on programs.

I have coed a lot of programs and cracked / reverse engineered a lot of "targets" ranging from Windows apps to Linux to Android to Java etc.

People are repeating this "systems call" comment all over vaguely.

it matters then to choose a benchmark that will ACTUALLY test the issue.

Vs people testing with a test program that will never show a difference.

 

Lastly don't mistake my comments for anything other than the truth.

I like AMD and Intel etc.. i have no desire to cheerlead or jump chips or minimize or hype up the problem.

I simply desire the honest facts.. nothing more.

I started reading this to see "old" benchmarks and i didn't really see any after a few pages.. but a whole lot of sarcastic comments.

I have logged bench stats from many app's going back to 2010 and earlier.

I test everything and log everything and have it all stored. (655 files in 60 folders) and maybe more "Becnhmark stats/pics" elsewhere i forgot about.

Expand  

If you were referring to me as he person who “brushed” off the newer i7, that isn’t true. I said more testing needed to be done. Too many false positives, unrelated changes, and fake results out there to be trusting single reports. 

  On 08/01/2018 at 16:30, LimeMaster said:

Don't request that. Neowin needs to feel more lively to get encourage members to participate.

Expand  

 

  On 08/01/2018 at 13:12, Mando said:

Nice post godflesh :) 

 

@warwagonmight be worth asking to mods to clean up the thread to leave just benchmark outputs. Im guilty as the rest going off on a tangent.

Expand  

All I care about is comments and thread views. As long as my thread gets bumped to the top, stays active and gets lots of comments and thread views i'm happy.

 

Right now I have a thread that is on page 5, 113 replies and 3,553 Views, i'm thrilled!

  • Like 2
  • Thanks 1
  On 08/01/2018 at 17:18, warwagon said:

Well how about the motherboard the average user is using? Do you really think they will ever download a bios update?

Expand  

Good point. i'm afraid we might hear about web sites stealing passwords/credit card info's in masses.

right its now been reported some NVidia cards/tablets are  susceptible.

 

Alice in wonderland effect :p 

 

https://www.nvidia.com/en-us/product-security/

 

Latest drivers 390.65 

 

NVIDIA is providing an initial security update to mitigate aspects of Google Project Zero’s January 3, 2018 publication of novel information disclosure attacks that combine CPU speculative execution with known side channels.

The vulnerability has three known variants:

Variant 1 (CVE-2017-5753): Mitigations are provided with the security update included in this bulletin. NVIDIA expects to work together with its ecosystem partners on future updates to further strengthen mitigations.

Variant 2 (CVE-2017-5715): NVIDIA’s initial analysis indicates that the NVIDIA GPU Display Driver is potentially affected by this variant. NVIDIA expects to work together with its ecosystem partners on future updates for this variant.

Variant 3 (CVE-2017-5754): At this time, NVIDIA has no reason to believe that the NVIDIA GPU Display Driver is vulnerable to this variant.

 

there we have it guys. 

 

Affected Products

 

  • GeForce, Quadro, NVSWindows, Linux, FreeBSD, Solaris
  • Tesla Windows, Linux

 

Get updating peoples! 

  On 08/01/2018 at 17:18, warwagon said:

Well how about the motherboard the average user is using? Do you really think they will ever download a bios update?

Expand  

no but they should be using a half decent AV which should now protect against the issue. If your chosen vendor doesnt yet, bin them and use one that does :) 

  On 08/01/2018 at 18:22, Mando said:

right its now been reported some NVidia cards/tablets are  susceptible.

 

Alice in wonderland effect :p 

 

https://www.nvidia.com/en-us/product-security/

 

Latest drivers 390.65 

 

NVIDIA is providing an initial security update to mitigate aspects of Google Project Zero’s January 3, 2018 publication of novel information disclosure attacks that combine CPU speculative execution with known side channels.

The vulnerability has three known variants:

Variant 1 (CVE-2017-5753): Mitigations are provided with the security update included in this bulletin. NVIDIA expects to work together with its ecosystem partners on future updates to further strengthen mitigations.

Variant 2 (CVE-2017-5715): NVIDIA’s initial analysis indicates that the NVIDIA GPU Display Driver is potentially affected by this variant. NVIDIA expects to work together with its ecosystem partners on future updates for this variant.

Variant 3 (CVE-2017-5754): At this time, NVIDIA has no reason to believe that the NVIDIA GPU Display Driver is vulnerable to this variant.

 

there we have it guys. 

 

Affected Products

 

  • GeForce, Quadro, NVSWindows, Linux, FreeBSD, Solaris
  • Tesla Windows, Linux

 

Get updating peoples! 

Expand  

Now that Nvidia finally admitted it, a benchmark would be nice on a fully slowed system... secured that is :)

Now that the NVidia fix is out in 390.65 benchies below against post Win patch. Lower scores for NVidia patch in Bold.

 

Cinebench 4D BEFORE Win patch

CPU Benchmark = 966CB

OpenGL Bench = 140 FPS

AFTER

CPU Benchmark = 975CB ???

OpenGl Bench = 149.95 FPS ???

NVidia Driver update

CPU Benchmark = 962CB

OpenGL Bench =147.64FPS
 

3D Mark timespy extreme BEFORE

3998

AFTER

3997 ????

NVidia Driver Update

3971

 

Novabench 

2713

After

2703

NVidia Driver update

2677
 

RealBench BEFORE

Image Editing 212,486/ Time 25.0745

Encoding 93,501/time 56.9829

OpenCL 113,529/ Ksamples per sec 20877

Heavy Multitasking 110,647

Time 68.9761

System Score 132,540

RealBench AFTER

Image Editing 208.830/Time 25.5135

Encoding 92,841/time 57.3881

OpenCL 113,529/ Ksamples/sec 20922

Heavy Multitasking 103,867/Time 73.4779

System Score 129,766

 

Post NVidia 

Image Editing 108,788/ Time 48.9757

Encoding 84,939/time 62.7273

OpenCL 113,529/ Ksamples per sec 20948

Heavy Multitasking 99,848

Time 76.4357

System Score 101,776 

 

A drop of 28k overall in Realbench is a large amount.

 

So a bigger hit overall post NVidia patch, not good IMO :( hopefully post Microcode/Biosd update it recoups some of the lost perf. Once Microcode/Bios is out ill benchmark a 3rd time.

 

Must be noted, this is not extensive testing, did a single run where possible.

 

  On 08/01/2018 at 19:40, Yogurth said:

Now that Nvidia finally admitted it, a benchmark would be nice on a fully slowed system... secured that is :)

Expand  

 

  On 08/01/2018 at 19:41, Mando said:

Now that the NVidia fix is out in 390.65 benchies below against post Win patch. Lower scores for NVidia patch in Bold.

 

Cinebench 4D BEFORE Win patch

CPU Benchmark = 966CB

OpenGL Bench = 140 FPS

AFTER

CPU Benchmark = 975CB ???

OpenGl Bench = 149.95 FPS ???

NVidia Driver update

CPU Benchmark = 962CB

OpenGL Bench =147.64FPS
 

3D Mark timespy extreme BEFORE

3998

AFTER

3997 ????

NVidia Driver Update

3971

 

Novabench 

2713

After

2703

NVidia Driver update

2677
 

RealBench BEFORE

Image Editing 212,486/ Time 25.0745

Encoding 93,501/time 56.9829

OpenCL 113,529/ Ksamples per sec 20877

Heavy Multitasking 110,647

Time 68.9761

System Score 132,540

RealBench AFTER

Image Editing 208.830/Time 25.5135

Encoding 92,841/time 57.3881

OpenCL 113,529/ Ksamples/sec 20922

Heavy Multitasking 103,867/Time 73.4779

System Score 129,766

 

Post NVidia 

Image Editing 108,788/ Time 48.9757

Encoding 84,939/time 62.7273

OpenCL 113,529/ Ksamples per sec 20948

Heavy Multitasking 99,848

Time 76.4357

System Score 101,776 

 

A drop of 28k overall in Realbench is a large amount.

 

So a bigger hit overall post NVidia patch, not good IMO :( hopefully post Microcode/Biosd update it recoups some of the lost perf. Once Microcode/Bios is out ill benchmark a 3rd time.

 

Must be noted, this is not extensive testing, did a single run where possible.

 

 

Expand  

Seems like we are going to end up with Phoronix results on Linux :( If further testing confirms Your small test industry is going back to Haswell performance. 

 

 

 

I hear AMD is having a party at CES, entire Vegas is invited :)

  On 08/01/2018 at 20:20, Yogurth said:

Seems like we are going to end up with Phoronix results on Linux :( If further testing confirms Your small test industry is going back to Haswell performance. 

 

 

 

I hear AMD is having a party at CES, entire Vegas is invited :)

Expand  

tbh that party may be shortlived, once we know more about Spectre exploits. 

 

Who knows tbh, until its all public its speculation.

  On 08/01/2018 at 20:25, Mando said:

tbh that party may be shortlived, once we know more about Spectre exploits. 

 

Who knows tbh, until its all public its speculation.

Expand  

You are punny. 

  On 08/01/2018 at 17:15, adrynalyne said:

Why would 2d or 3D graphics suffer when gpu code isn’t x86 as far as I know? The fix is only for x86. 

Expand  

as far as I understand this problem affects everything that goes between user mode app and OS itself.OS is isolated of the user data app by cpu feature.

 If you measure cpu speed only it will not give a good idea how much have changed. You have to measure overhead between your application and OS (drivers included). That means pretty much everything is slower and depending on the task at hand, some more some less. Tasks that require a lot of data passed from user mode to OS will be slower. Am I right?

  On 09/01/2018 at 05:33, Jampe said:

as far as I understand this problem affects everything that goes between user mode app and OS itself.OS is isolated of the user data app by cpu feature.

 If you measure cpu speed only it will not give a good idea how much have changed. You have to measure overhead between your application and OS (drivers included). That means pretty much everything is slower and depending on the task at hand, some more some less. Tasks that require a lot of data passed from user mode to OS will be slower. Am I right?

Expand  

Maybe? This isn't my forte. As it was explained to me, it matters if it is x86 code instructions being called with sys calls. The GPU isn't x86 as far as I know.

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • What is happening in the WNBA!    
    • RapidRAW 1.3.5 is out.
    • Microsoft Edge 139.0.3405.86 by Razvan Serea Microsoft Edge is a super fast and secure web browser from Microsoft. It works on almost any device, including PCs, iPhones and Androids. It keeps you safe online, protects your privacy, and lets you browse the web quickly. You can even use it on all your devices and keep your browsing history and favorites synced up. Built on the same technology as Chrome, Microsoft Edge has additional built-in features like Startup boost and Sleeping tabs, which boost your browsing experience with world class performance and speed that are optimized to work best with Windows. Microsoft Edge security and privacy features such as Microsoft Defender SmartScreen, Password Monitor, InPrivate search, and Kids Mode help keep you and your loved ones protected and secure online. Microsoft Edge has features to keep both you and your family protected. Enable content filters and access activity reports with your Microsoft Family Safety account and experience a kid-friendly web with Kids Mode. The new Microsoft Edge is now compatible with your favorite extensions, so it’s easy to personalize your browsing experience. Microsoft Edge 139.0.3405.86 changelog: Fixes Fixed an issue where MIP-protected PDF files from different sovereign cloud environments (including GCCH) failed to open and instead displayed the error message: “Need permissions. Contact the owner of the file to give you permissions.” Fixed an issue, which affected IE mode, including errors when displaying PDF files, running Java applets, and showing the Information Bar in IE mode. Improved reliability Fixed a browser crash that occurred on first launch when the BrowserSignin policy was enabled and configured to "Force (2) = Force users to sign-in to use the browser (all profiles)." Feature updates Open external links in another profile when recommended by external applications. When Microsoft Edge is set as the default browser to open external links from applications, Microsoft Edge must determine which profile to open the links. Users can control which profile to use through the “Default profile for external links” setting. Applications such as Microsoft Teams or Outlook can also recommend a profile for the links. Currently, the user setting is prioritized over application recommendations. With this feature, the application recommended profile is given priority, instead of the profile selected in the setting. Admins can control the availability of the feature using the EdgeOpenExternalLinksWithAppSpecifiedProfile policy. Note: This is a controlled feature rollout. If you don't see this feature, check back as we continue our rollout. Changes to Wallet in Microsoft Edge. Wallet is being phased out to support a streamlined experience within Microsoft Edge. This affects the Wallet feature in Settings and the Mini Wallet found by clicking the profile icon in the top banner. Users are directed to the new Passwords, Payment, and Personal Information management experience in Settings. Also, a new Password management experience is available in Settings. For more information, see Changes to Wallet in Microsoft Edge. Note: This is a controlled feature rollout. If you don't see this feature, check back as we continue our rollout. Introducing a new policy that can enable/disable Microsoft 365 Copilot Chat in Edge for Business from showing in the toolbar. Edge for Business now has a dedicated policy, Microsoft365CopilotChatIconEnabled, to enable and disable Copilot in Edge from showing in the Edge toolbar. When both this policy and HubsSidebarEnabled are configured, this policy takes precedence in determining whether Copilot appears in the toolbar. If this policy isn't configured and HubsSidebarEnabled is disabled, Copilot will remain hidden. In a future release, this policy is the sole control for managing Copilot's visibility in the toolbar. Real-time notifications for compromised passwords. Microsoft Edge is integrating an in-context password breach notification system. This feature proactively informs users if their saved login credentials have been compromised in known data breaches, enabling them to take immediate action to secure their accounts. Admins can control availability to this feature using the PasswordMonitorAllowed policy. Note: This is a controlled feature rollout. If you don't see this feature, check back as we continue our rollout. Edge Settings Improvements. Edge Settings is migrating to WebUI2 to boost page responsiveness and introducing a series of minor visual and content upgrades to improve overall usability and utility. This includes optimizing for concise wording of individual settings, simplifying the number of pages and reorganizing content, and creating a cohesive user interface. New Autofill Personal Information Settings Configuration. A web form field collection consent toggle will be available in Autofill settings (edge://settings/autofill/personalInfo). This allows users to consent to Microsoft Edge collecting web form field labels (e.g., "First Name," "Email") to improve Autofill suggestion accuracy. Only field labels are collected and not user-entered data. The web field labels are stored securely per Microsoft's privacy standards. This new setting is manageable via existing policies in Autofill (e.g., AutofillAddressEnabled), EdgeAutofillMlEnabled. AutofillAddressEnabledis the parent setting forEdgeAutofillMlEnabled. The EdgeAutofillMlEnabled policy is the parent of this new setting, thus turning off the EdgeAutofillMlEnabled policy turns off this setting. Web AI APIs for prompt and writing assistance. Microsoft Edge now implements the Writing Assistance APIs and the Prompt API (for Edge extensions) with a local language model, Phi-4-mini, that is built into the browser. These easy-to-use JavaScript APIs are made available via Edge flags (set to Enabled, by default only for the Summarizer and Prompt API for extensions) so that sites and extensions can apply AI capabilities on the web. The small language model is downloaded as the first time any of these APIs is used and later shared across all domains, serving local AI use-cases with reduced cost, network independence, and increased privacy (since data input to the model doesn't leave the user’s device). Admins can control the availability of these APIs via the GenAILocalFoundationalModelSettings policy. These APIs are currently not implemented in China. Read the announcement here, and feel free to provide feedback. Enhancements to Performance and Secure network. Browser essentials is now separated into two distinct experiences (Performance and Secure Network) - both available from the Settings and more menu (“…” on the menu bar). Reset Microsoft Edge enterprise sync. For users having problems syncing browsing data across other signed-in devices, they can reset sync data from the Microsoft servers via Edge Settings edge://settings/profiles/sync/reset. This option should only be used if the sync data is available on one of the user's devices or if they want to delete all sync data from the servers. Note: In Microsoft Edge 139, reset sync is enabled for users encountering a "No permissions" MIP error and in Microsoft Edge 140, reset sync is enabled for users encountering a "Service disabled" MIP error. Update to Microsoft AutoUpdate policy. The MAUEnabled policy allowed admins to continue using Microsoft AutoUpdate on macOS. Since Microsoft Edge now uses EdgeUpdate, the MAUEnabled policy is planned to be obsoleted in Microsoft Edge version 140. Policy updates / New policies EdgeOpenExternalLinksWithAppSpecifiedProfile - Prioritize App specified profile to open external links EnableUnsafeSwiftShader - Allow software WebGL fallback using SwiftShader MandatoryExtensionsForInPrivateNavigation - Specify extensions users must allow in order to navigate using InPrivate mode Microsoft365CopilotChatIconEnabled - Control whether Microsoft 365 Copilot Chat shows in the Microsoft Edge for Business toolbar OnSecurityEventEnterpriseConnector - Configuration policy for Microsoft Edge for Business Reporting Connectors Obsoleted policies KeyboardFocusableScrollersEnabled - Enable keyboard focusable scrollers (obsolete) SelectParserRelaxationEnabled - Controls whether the new HTML parser behavior for the SELECT element is enabled (obsolete) Download: Microsoft Edge (64-bit) | 180.0 MB (Freeware) Download: Microsoft Edge (32-bit) | 163.0 MB View: Microsoft Edge Website | Release History Get alerted to all of our Software updates on Twitter at @NeowinSoftware
  • Recent Achievements

    • Week One Done
      harveycoleman123 earned a badge
      Week One Done
    • First Post
      EzraNougat earned a badge
      First Post
    • One Month Later
      westDvina earned a badge
      One Month Later
    • Community Regular
      Bern@rd went up a rank
      Community Regular
    • Week One Done
      Joey Solo earned a badge
      Week One Done
  • Popular Contributors

    1. 1
      +primortal
      663
    2. 2
      +FloatingFatMan
      193
    3. 3
      ATLien_0
      154
    4. 4
      Xenon
      132
    5. 5
      wakjak
      98
  • Tell a friend

    Love Neowin? Tell a friend!