Index  | Recent Threads  | Unanswered Threads  | Who's Active  | Guidelines  | Search
 

Quick Go »
No member browsing this thread
Thread Status: Active
Total posts in this thread: 53
Posts: 53   Pages: 6   [ Previous Page | 1 2 3 4 5 6 ]
[ Jump to Last Post ]
Post new Thread
Author
Previous Thread This topic has been viewed 12303 times and has 52 replies Next Thread
KerSamson
Master Cruncher
Switzerland
Joined: Jan 29, 2007
Post Count: 1684
Status: Offline
Project Badges:
Reply to this Post  Reply with Quote 
Re: [INTEL] Upcoming Permanant Processor Slowdown?!

Hi joneill003,
at first, it was a kernel update about 4 weeks after the announcement of Meltdown and Spectre. Since I did not experience any troubles on the other machines I updated, I decided to update this machine as well. I waited a couple of weeks, because this machine is a critical machine.
After the kernel update, Linux saw only one core !!!
I searched on Internet without being able to find something recent about a similar problem.
I decided to perform a firmware update (AMI bios from November 2017). The result was still that only one core was reported, even if the CPU type was correctly announced: i7-7700HQ.
After some discussions with a colleague, he mentioned a possible problem with acpi=off.
I modified the boot option in grub to acpi=on.
Afterwards the machine was not able to boot anymore. After several recovery tries the machine was able to boot and Linux reported 4 cores, still with the correct CPU type but no HT.
Booting from older kernels did not help.
On critical machines with at least two disks, I usually maintain two / and boot partitions (one on each disk). I will try to perform a fresh install on the second / partition.
If possible, I will try to suppress UEFI for only relying on the legacy mode (bios).
This problem costed me a complete day last week-end (about 10 hours).
Cheers,
Yves
----------------------------------------
[Feb 3, 2018 2:08:20 PM]   Link   Report threatening or abusive post: please login first  Go to top 
Former Member
Cruncher
Joined: May 22, 2018
Post Count: 0
Status: Offline
Reply to this Post  Reply with Quote 
Re: [INTEL] Upcoming Permanant Processor Slowdown?!

Sorry to hear of your troubles. I hate chasing gremlins.

Perhaps try a different OS. You mentioned you were currently running Ubuntu. Try downloading an older copy with an older kernel, or even maybe an older version of Mint. If a fresh install of an OS doesn't cure your troubles, then at least it will be narrowed down to hardware/firmware bugs. You probably wouldn't even have to do a full install. You could boot off a live linux DVD or flash media if no optical is present. That should still give you full access to view the hardware.

I have seen hardware throttled in the past due to failing components to protect from overheat, but never seen where some of the cores just grow legs and walk away.

If the OS install(s) dont fix the problem, then I would contact the manufacturer of the computer. Even if it is out of warranty, if they posted an update for it and that update perhaps had a part in the issue, they should at least offer some assistance in the form of an updated firmware.
[Feb 4, 2018 12:48:49 PM]   Link   Report threatening or abusive post: please login first  Go to top 
QuantumEthos
Senior Cruncher
Joined: Jul 2, 2011
Post Count: 336
Status: Offline
Project Badges:
Reply to this Post  Reply with Quote 
rose Re: [INTEL] Upcoming Permanant Processor Slowdown?!

new firmware for Intel inbound, starting with skylake!

VM and Microprocessor bug fixes incoming..
Hopefully microcode quickly also.

servers and VM software needs updates (most probably) - VM and Microprocessor bug fixes incoming.. (important to VM)

Creating a better virtualization header that is:
More efficient at isolating the contained OS with attributes in the OS's to contain secured data?
We find answers to improve efficiency and protect against VM>VM data transfer or to use this for a creative purpose!

We need answers! and science. : Microcode update

"Thank you for googles firm responses to the bug, faith in google is high.."

"The micro code be updated to flush & or contain the the speculative data in a data-cycle secure storage,
Within the framework of cache and ram/virtual-ram?
Cycle efficiency would be at most two cycles and a flush Xor bit data overlay,

Bit Masking before and after pre-fetch presents & also uses data - this method would be fast! (c)Rupert S"

"Obviously in light of buffer exploitation we would suggest that buffers after password entry are cleared, This is not the whole solution because the spy program could be resident..

Buffer exploitation is a common practice in viruses and this type of attack is nothing new..
There is no doubt that buffers are a victim of flooding and exploitation; Over and over!
After all buffer exploitation is a logical consequence of their use on a computer or hardware.

Randomizing buffer allocation, Location and encryption algorithm is the most logical choice on hardware, However! how much effort must be made to protect buffers when an attack on them is predicable and logical? A lot we say.

(c)Rupert S"



Google systems have been updated for Meltdown bug https://security.googleblog.com/2018/01/today...bility-what-you-need.html
Attack mitigation - https://support.google.com/faqs/answer/7622138#android

"Microsoft issued an emergency update today,
Amazon said it protected AWS customers running Amazon's tailored Linux version and will roll out the MSFT patch,
for other customers to day"

We need answers! and science. : Microcode : update

(c)RS

http://esa-space.blogspot.rs
http://bit.ly/VMBug

about the Specter & Meltdown bugs :

https://www.theguardian.com/technology/2018/j...-processors-security-flaw

http://www.tomshardware.com/news/meltdown-spe...amd-arm-nvidia,36219.html

https://www.helpnetsecurity.com/2018/01/04/meltdown-spectre/

Gaming performance:
https://www.techspot.com/article/1554-meltdown-flaw-cpu-performance-windows/

Amd's concern for security lead them to make cache work differently right from the start; Where as Intel chose to pre-fetch kernel & secure data on the presumption that this could rarely be used.(this was published in the past we read about it.) RS

https://semiaccurate.com/2017/06/22/amds-epyc-major-advance-security/

https://www.anandtech.com/show/11591/amd-laun...r-warranty-better-quality
as we can see amd has a security focus & did also in 2005 when pre-fetch method came up for debate.

**
A detailed and interesting article with many details; Well written. (12 jan 2018)
https://www.scientificamerican.com/article/me...e-of-superfast-computers/
***
"Details of a problem have been gradually emerging, People with AMD Athlon-powered computers say that following the installation of the patch, it is impossible to boot into Windows leaving a full re-installation as the only option -- although some users report that even this does not fix the problem. "

(possibly related to the antivirus program incompatibility)(some AV's possibly! we need a list preferably now.)

https://betanews.com/2018/01/08/microsoft-mel...tre-patch-bricks-amd-pcs/

Athlon PC patch is being re engineered so that it works on windows 10 - not related to newer AMD chips:

https://www.theverge.com/2018/1/9/16867068/mi...ty-updates-amd-pcs-issues

***
On the front of the kernel patch 4.4.0-108 (Ubuntu) bricking some older Athlon models apparently ...
4.4.0-109 is the fixed version; Further information would be useful but is currently too hush hush for full disclosure. - google 4.4.0-109 for more information.

https://usn.ubuntu.com/usn/usn-3522-4/
https://www.bleepingcomputer.com/news/softwar...r-ubuntu-16-04-computers/

***
Intel information with sub-tabs (of interest)

https://www.intel.com/content/www/us/en/archi...s-and-intel-products.html

***
On the GPU front we can see that since cache pre-fetch is the issue that all classes of GPU/CPU & other processor class with cache may well face issues.

https://insidehpc.com/2018/01/nvidia-races-patch-gpu-drivers-spectre-meltdown/

https://nvidia.custhelp.com/app/answers/detail/a_id/4611

Crypto Keys need replacing due to meltdown bug - after patching!
due to system compromise. (c)RS

Meltdown and specter security Firmwareupdate is more important to bitcoin, Crypto coin / Crypto coin wallets & blockchain than the price! read it now and Update

Firmware Updates and Initial Performance Data for Data Center Systems - information on intel,AMD & other components

https://newsroom.intel.com/news/firmware-upda...-for-data-center-systems/

https://newsroom.intel.com/wp-content/uploads...ecution-Side-Channels.pdf

https://support.google.com/faqs/answer/7625886 - Spectra immunity solution care of google

HPC View of Meltdown and a few patch updates - https://www.marketwatch.com/story/these-compa...s-2018-01-19?link=sfmw_tw
AMD affirmative patch inbound to secure lesser risk in conscientious market. - good update

As of 23/01/2018 Intel patch to CPU has as yet failed to be fully effective against system instability caused by unexpected side effects : https://www.cnet.com/news/intel-stops-some-ch...-reboot-meltdown-spectre/

Further improvements sought, One suggests a better cohesive response between Low Level OS companies like Redhat Linux, Microsoft, apple and android with Hardware developers - interactive people, RS

Power 7/8/9 update : https://www.securityweek.com/ibm-releases-spe...own-patches-power-systems

01/02/2018 - additional AMD patch - Windows 10 Build 16299.214 : http://www.tomshardware.com/news/microsoft-sp...windows-update,36440.html
15/02/2018 - fixed patch http://support.microsoft.com/?kbid=4074588

Rupert S
----------------------------------------
[Edit 1 times, last edit by QuantumEthos at Feb 15, 2018 2:43:06 PM]
[Feb 11, 2018 4:25:26 PM]   Link   Report threatening or abusive post: please login first  Go to top 
Posts: 53   Pages: 6   [ Previous Page | 1 2 3 4 5 6 ]
[ Jump to Last Post ]
Post new Thread