Some serious security bug in INTEL CPUs?? Since Westmere possibly

Collapse
X
 
  • Time
  • Show
Clear All
new posts

  • RJARRRPCGP
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Originally posted by ratdude747
    Possibly off-topic: Some recent windows 7 update keeps making my wife's twin Opteron X2 BSOD. For now she's on my Dual Xeon Westmere rig until I get back from a long company trip. Possibly related to the Intel patch reboot issue?
    It's probably the known bug that was reported recently!

    Leave a comment:


  • Topcat
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    ^
    yay for running unpatched for ages...

    Leave a comment:


  • ratdude747
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Possibly off-topic: Some recent windows 7 update keeps making my wife's twin Opteron X2 BSOD. For now she's on my Dual Xeon Westmere rig until I get back from a long company trip. Possibly related to the Intel patch reboot issue?

    Leave a comment:


  • RJARRRPCGP
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Originally posted by Per Hansson
    It has a fucking BSOD issue
    For 99 percent of the time, QFT!

    Leave a comment:


  • Per Hansson
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Originally posted by ChaosLegionnaire
    now intel says the meltdown and spectre patches can cause reboot problems in older chips!

    Source: Reuters
    Originally posted by stj
    says it all, my AMD systems dont reboot - ever.

    so for the sake of completeness, can intel tell us how often their cpu's reboot normally?
    Originally posted by hannah
    I understand that there isn't a clear cut answer, but Intel is really getting on my nerves with the information manipulation. Feels like everything Intel says is a lie now.
    I agree hannah, the above quote is a nice example.
    No where does Intel mention BSOD (Blue Screen) in their public communication.
    But that is exactly what it is:
    Just because the default in Windows is to restart _after_ a BSOD does not mean the CPU has a restart issue.
    It has a fucking BSOD issue Intel!

    Leave a comment:


  • hannah
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Originally posted by Topcat
    That's the age-old argument in the PC world...much like Ford vs Chevy in the car world....or coke vs pepsi....republican vs democrat...its an endless argument that no winner will ever emerge from.
    I understand that there isn't a clear cut answer, but Intel is really getting on my nerves with the information manipulation. Feels like everything Intel says is a lie now.

    Leave a comment:


  • Curious.George
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Originally posted by llonen
    Stupid question perhaps, but I have for some time been planning to deploy linux, will it help with this problem or make no difference since this is a hardware issue.
    The first question you have to ask is how "exposed" the machine in question is to the introduction of "foreign" code (directly or indirectly). An attacker has to get code to execute ON your machine in order to take advantage of any of these exploits.

    So, does your OS (or any applications) allow for the entry (deliberate or clandestine) of "instructions" (which may or may not be direct machine code) from an external/remote, untrusted source?

    A machine that doesn't have a network connection is immediately less vulnerable. Likewise, the absence of a (privileged) "console" or other mechanisms for introducing new media to the system (autoplay, executables invoked from shells, etc.)

    Likewise, an OS that requires signed executables (presumably, the CA vouches for the binaries that it signs) is largely immune as there's an intermediary required to get the code to execute.

    Your first order of business is thus to nail down any paths into the system that can be leveraged to inject the sort of code that can tickle these particular exploits.

    Leave a comment:


  • Topcat
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    I didn't see 5400-series Xeons (harpertown) in the master list from Intel....which would also cover yorkfield and those similar (C2Q)....either they're not susceptible or they didn't go back that far....but LGA771 was the predecessor to LGA1366 (nehalem & westmere, 5500 and 5600 series), which is on the naughty list... I figured they would go back that far, there still a lot of these in operation.

    Leave a comment:


  • retiredcaps
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Originally posted by llonen
    Stupid question perhaps, but I have for some time been planning to deploy linux, will it help with this problem or make no difference since this is a hardware issue.
    Most linux distros have deployed mitigation against Meltdown using KPTI. The big name distros like Ubuntu, Redhat, Suse, etc all have it patched. Some of the smaller, less frequently updated distros may not have KPTI.

    Spectre is a much longer process to fix.

    Leave a comment:


  • llonen
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Stupid question perhaps, but I have for some time been planning to deploy linux, will it help with this problem or make no difference since this is a hardware issue.
    Last edited by llonen; 01-13-2018, 06:29 PM.

    Leave a comment:


  • RJARRRPCGP
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Originally posted by stj
    ??
    the original xbox chip was a 700MHz pentium
    P III 733 Mhz. (Probably a Coppermine)

    Leave a comment:


  • Curious.George
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Originally posted by Stefan Payne
    No, its not a fundamental x86 Problem, its a Problem with all CPUs.
    No, it isn't. And, it isn't a natural consequence of speculative execution -- you can design a processor to do speculative execution and still preserve the protections that are being subverted. But, it costs more silicon.

    Security exploits are ALWAYS a matter of economics -- someone, somewhere, doesn't want to "pay" the price of maintaining the security that has been designed into the system (whether it is a piece of hardware, software or human policies).

    People want to be able to get into their homes if they've misplaced their keys so leave a spare "under the mat" -- so they aren't inconvenienced (in that RARE event) or to avoid the cost of calling a locksmith.

    Folks want easy to remember passwords so even if you require a 14 character password (to defy rainbow table cracking), they'll pick from a much smaller subset of the 14 character passwords that are potentially available -- cuz "pDiUoETDK9fwJl" is a lot harder to remember than "my name is bob" (both passwords being 14 characters).

    Software assumes input from the user will fit in the space set aside by the software developer and saves the cost of limiting the data to that space in the name of saving a few instructions per iteration.

    Projecting the access control bits forward through the memory accesses proposed by speculative execution costs more than simply ignoring them and hoping the actual bus cycle that is run is not contrary to their protections. Or, inhibiting the caching of their results (and thus taking the performance hit, there). (some of the fancier ARMs carry this information forward as they speculate)

    It doesn't because speculative excecution is inevetable if you want performance.
    The question that should be asked is why do you need this performance? Why is the software so sluggish and bloated that it needs so many trillions of clock cycles to do "whatever". Even when I'm rendering a 3D CAD model, I don't need that performance -- cuz I can always find something else to do while waiting for the render to finish (and, I can do it on the same computer!)

    Its interesting to drag out old software and run it on newer hardware and see how blazingly fast it is! Then, ask yourself what you've "gained" by running the newer (slower) software on that hardware.

    Leave a comment:


  • diif
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Originally posted by stj
    ??
    the original xbox chip was a 700MHz pentium
    Yeah, the 360 is the one I meant. Forgotten, because I was busy PC gaming.
    https://hackaday.com/2018/01/08/spec...-for-xbox-360/

    Leave a comment:


  • stj
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    ??
    the original xbox chip was a 700MHz pentium

    Leave a comment:


  • diif
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    The original Xbox chip, made by IBM used speculative execution.

    Leave a comment:


  • Behemot
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    What the heck are you talking about? Their site is not screwed by some ovelaying menu craps like intels for them mobile craps which I always have to delete away in dragonfly…

    Leave a comment:


  • RJARRRPCGP
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Originally posted by Topcat
    For all the Intel bashers (me included), I just want to remind them all that AMD isn't immune to this either, and isn't the holy grail savior in this mess. Just sayin'. Several of the articles have mentioned that AMD has been less than forthcoming with information for patches, etc. The hypocrisy runs deep.
    I don't like the AMD driver web site and server(s)! (At least for their Windows software!) Makes Intel look like a total angel! LOL!

    First off the AMD driver web site design, reminds me of a web site that's ran by radical Euro (or Australia) (or NZ) fascists...
    Last edited by RJARRRPCGP; 01-13-2018, 09:28 AM.

    Leave a comment:


  • Topcat
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    For all the Intel bashers (me included), I just want to remind them all that AMD isn't immune to this either, and isn't the holy grail savior in this mess. Just sayin'. Several of the articles have mentioned that AMD has been less than forthcoming with information for patches, etc. The hypocrisy runs deep.

    Leave a comment:


  • Stefan Payne
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Originally posted by eccerr0r
    Sure but the problem is that now we're finding it's a fundamental problem with x86 (well, superscalar execution), and switching from superscalar to VLIW was a solution.
    No, its not a fundamental x86 Problem, its a Problem with all CPUs.
    And that nobody thought about attacking it until now, so no security features to prevent that were implemented - well at Intel at Least, at AMD it seems people thought a bit more but sacrificed performance for that...

    Originally posted by eccerr0r
    Define nonsense if it solves the problem at hand.
    It doesn't because speculative excecution is inevetable if you want performance.

    And AFAIR either the last Itanics had something like that or it was planned. So no, id didn't really solve the problem.


    As for VLIW: AMD had something like that from the 2000 up to the 6k Series - wasn't that great even in GPUs...
    Last edited by Stefan Payne; 01-13-2018, 06:45 AM.

    Leave a comment:


  • hikaruichijo
    replied
    Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly

    Intel lied about the maximum TDP of their cpus multiple times since the Pentium 4 and again with the first gen core i7, I've tested and i7 920 that said 130W TDP and it reached more than 200W with prime95, the heat sink that came with it couldn't hold the heat for five minutes. But here people always said that AMD cpus were hotter because of the famous silly Tom's hardware video that removed the heat sink while computer was running, who is so stupid to do that? well Tom's hardware reviewers were. Sure Intel paid god money to do that video.

    Leave a comment:

Related Topics

Collapse

  • Nebukadnerzar_V
    Dell Optiplex 760 USFF BIOS Mod Request for QuadCore CPUs
    by Nebukadnerzar_V
    Hi guys!
    I have a Dell Optiplex 760 USFF (Ultra-Small Form-Factor).
    It currently only supports Dual-Core CPUs and will halt with an error message, when a QuadCore is installed.

    I have seen people running QuadCores in these machines, but the BIOS needs to be modded.
    Since I have not found the modded BIOS to download anywhere, I am asking you guys for help:

    Could you please add support for QuadCore CPUs (in my case the Core2Quad Q9550) to the BIOS?

    I have attached the Dump of my machine.

    S/N: SRW2K4J
    Reg Model: DCTR...
    09-27-2024, 02:43 AM
  • ducky29
    Working with Bga chips especially CPUS
    by ducky29
    Hello. I mostly do small electronics and tv repairs. I am confident with small bga chips but I never was successful with removing large chips especially cpus. Is it possible to remove them just using a preheater and hot air gun or I need something more advanced like a bga machine with temperature profiles, cooling fans, etc etc.


    Any suggestion on aliexpress/ebay are welcomed. I am on a tight budget, max I can do is about 200$. Please anyone with more experience can give me some suggestions?

    Thanks in advance.
    09-23-2024, 03:56 PM
  • ugamazing
    Procedural question about BGA rework and removal of CPUs
    by ugamazing
    I have been working to develop a consistent and reliable method/workflow for removing, re-balling, and replacing CPUs on various MacBook Pro models (2015-2020).

    I have done OK so far, but there's one detail I need to sort out. I'm hoping someone much more experienced than myself may be able to shed some light:

    I am noticing the pulled CPUs (to be re-balled) come off fine, and they "look" fine as well, immediately when I pull them. However, within a few minutes, after cooling, the CPU chips develop a very, very slight curve/bend. It's SO SLIGHT, maybe a 1-2%...
    07-12-2022, 03:11 PM
  • bigbeark
    Asus M2N-E uses AM3 CPUs?
    by bigbeark
    Accordng to the ASUS website, if you apply BIOS 5001 you can use Socket AM3 CPUs on the M2N-E motherboard.

    I have two of these boards that are working. The CPU support info on the ASUS site says you can use ATHLON II X2 CPUs, Athlons II X3, and even Athlon II X4 CPUs.
    These CPUs seem to be readily available at reasonable prices. There are some that consume as little as 45 watts.

    The notes say "Due to Bios ROM size limitation remove LAN PXE ROM and change Crashfree3 to Crashfree".

    I assume these are options in the BIOS setup you can...
    02-04-2020, 03:19 PM
  • Alfieh
    NAD C320BEE repair possibly bad capacitors
    by Alfieh
    hey Im very new to repairing electronics with capacitors as well as using a multimeter so I need so help/guidance fixing this issue

    recently I was handed a family members old NAD C320BEE that they had in their loft for storage for a few years but when powered on it went into power safety mode due to a problem on the protection circuit somewhere before it went into storage I was told it worked fine I found lots of people online talking about how the capasitors are known to be pretty bad in this model and can cause this issue the only problem being I don't have much experience sorting...
    11-19-2024, 04:55 PM
  • Loading...
  • No more items.
Working...