I'm a little bit excited about is getting a quad-core non-SMT 7W CPU that has SHA512 as part of its supported crypto-primitives, and the higher bandwidth on the platforms. That lets me dream about a passively cooled router/file-server/HTPC which has ZFS with sha512t256 checksumming both on-disk and in-memory.
|
|
# ¿ Aug 4, 2019 21:54 |
|
|
# ¿ Apr 23, 2024 19:29 |
BangersInMyKnickers posted:Why the hell are you trying to use sha512 for checksumming?? SHA512 was always likely to be one of the checksums which would get accelerated by hardware whereas fletcher2 and fletcher4 are unlikely to be accelerated and crc32c isn't supported by ZFS (despite being improved by SSE4). Skein, the only other option, is unlikely to ever be accelerated in hardware. SHA512 is already supported by both QuickAssist and the Chelsio crypto accelerators supported by FreeBSDs ccr(4) driver supports it too - on top of that irrespective of x86 there's ARM, POWER9/10, and RISC-V which are getting or planning on adding it.
|
|
# ¿ Aug 5, 2019 18:58 |
BangersInMyKnickers posted:I mean, yeah, if you've got QA cards to offload to then by all means go nuts but there just aren't enough permutations on a 128kb block to make a hash collision probable over sha256 compared to some other corruption event. craig588 posted:I CRCed my console dumps and tested a few of them with MD5 after someone said CRC isn't valid anymore. If they passed CRCing they passed MD5 checks. I think if you're not worried about an actual adversary you can verify with pretty much anything. If combined with integrity checking and optionally encryption (like GEOM/GELI in FreeBSD can do), it's perfectly reasonable to implement it - which is what the FFS/UFS creator is currently working on for FreeBSD.
|
|
# ¿ Aug 5, 2019 21:22 |
Asus might be the only company who still make motherboards which aren't garishly LED'ed, so there must be a lot of people who're buying the ones that could make a rainbow feel envious.
|
|
# ¿ Aug 20, 2019 12:25 |
Big Mackson posted:I am planning to go from 4770k to 9600k and i hope it will be moar performance. + going from DDR3 to DDR4. So far as I know, this is still true for the purposes of vidya gayms and most programs since most of them still perform most of their workload on a single high-clocked core - and since the i5-9600k boosts to 4.6 for a period of time, it sounds like an excellent upgrade. The big difference with respect to memory isn't that it's DDR4 over DDR3, it's the memory bandwidth you end up going which - which at the top-end is almost doubled. Plus, the two extra cores can always improve multitasking with all the bullshit and third party programs that seem to run in the background on modern Windows.
|
|
# ¿ Aug 29, 2019 17:22 |
Lambert posted:FLAC is great, it's for people that want to experience music at its highest quality. The earliest part of my digital music collection that I've been working on for almost 25 years have been converted from one format to another enough times that any lossy codec is statistically likely to start exhibiting loss of audio quality. What makes FLAC great is what makes any well-compressed lossless format great: When a new format comes a long, you just have to spend some electricity re-compressing, which gets faster as long as CPUs keep getting faster/more SMP/SMT. Riflen posted:I put FLACs on sdcards. Check mate.
|
|
# ¿ Aug 30, 2019 18:28 |
SwissArmyDruid posted:2011-ish is the year I switched off spinning rust and onto an SSD and never looked back. I was one of the lucky motherfuckers that got an OCZ Vertex 3s that did NOT exhibit any of the controller problems that others were having.
|
|
# ¿ Aug 30, 2019 18:34 |
How all ya'all feel about not using RAID0 is how I feel about using anything other than ZFS.
|
|
# ¿ Aug 31, 2019 21:13 |
DrDork posted:On Windows, at least, you can use Storage Spaces to do more or less exactly that: JBOD but addressable as a single drive letter. Paul MaudDib posted:I've been wondering what the merits of RAID0 vs a spanned volume are. Obviously in both cases if you lose a drive you lose the entire array, but I guess in principle RAID reads are aligned and every read hits every disk, while spanned could allow it to service multiple requests on different drives depending on how the data scatters out across the filesystem? And spanned can be easily grown by adding disks while RAID stripes can't really be rewritten. Also, gconcat(8) aka. GEOM CONCAT in FreeBSD can be booted from just fine, as long as you place the firmware-compatible boot-block on the firmwares first disk (ie. what the BIOS calls C: and what UEFI calls disk0) - so it's a question of whether Windows 10 still uses NTLDR62 or has been updated to support Storage Spaces/ReFS. BlankSystemDaemon fucked around with this message at 12:07 on Sep 1, 2019 |
|
# ¿ Sep 1, 2019 12:02 |
Paul MaudDib posted:Right, you only lose what was on that disk... but files can be scattered across multiple disks at a block level, and likely will be for performance reasons, so you will lose half of every file on average.
|
|
# ¿ Sep 1, 2019 17:14 |
Anand are pretty good about including POST and boot times on the various motherboards they review, so if that's something anyone cares about, they may wanna pay attention to those articles as there can be huge variances even for boards from the same manefacturer (though the variances aren't always explained, which I feel like Real Anand Of Old articles would've done). I don't turn my computer off, because it's configured to go into a pretty energy-preserving state when it's idle - the whole CPU package uses 4W, the monitor turns off, and a power meter on the mains shows only 11W when idle.
|
|
# ¿ Sep 3, 2019 18:09 |
Happy_Misanthrope posted:I have no idea that DDR4's auto settings for memory timing caused such a delay on boot. It's not a huge issue for me but just bugged me that bios POST was the slowest factor in my system boot - is there a utility like Ryzen Dram Calculator for figuring out timings for just standard Intel? Or is one even needed? I have standard 2666 DDR4 for an i5 9400 system, where would I go to get the specific timing settings? Cpu-Z only seems to cover a fraction of the fields my bios has. Also, it's probably UEFI, not BIOS, which makes it significantly worse as UEFI boot process is horrendously long and complicated. Isn't AMDs equivalent to XMP called AMP, or something along those lines? I'm pretty sure they have an equivalent system, so you might wanna see if that's an option. EDIT: Apparently it can be called X-AMP, DOCP, EOCP, or some other acronym depending on whether you have MSI, Asus, Gigabyte or some other manefacturer? BlankSystemDaemon fucked around with this message at 10:06 on Sep 4, 2019 |
|
# ¿ Sep 4, 2019 09:59 |
eames posted:What’s the spectre situation with these old platforms and noname boards? I assume there’s no performance impact because you never get a BIOS update anyway. Also, FreeBSD and Linux at least have software mitigations for some of these speculative execution attacks. Once the vBSDCon presentations are done (vBSDCon started today, and will continue tomorrow) and the videos have been processed, there will be a video by Colin Percival (FreeBSD security officer emeritus and haver of tarsnap) that goes into the history of these speculative attacks, including how he found some back in 2005.
|
|
# ¿ Sep 6, 2019 23:14 |
DrDork posted:AMD does not use a DDIO-like structure, so no. That said, even the researchers note that this is not a particularly probable attack to see in the wild anytime soon, so a lot of users are probably ok with leaving things as-is for now. But yeah, add it to the list of poo poo Intel needs to fix in future chips--which is gonna be hard without taking a solid performance hit on some workloads. It almost annoys me more that the people who did awesome work discovering it went ahead and overloaded an existing term, making it more difficult to casually talk about it since now we have to go out of our way to make it clear from context that "So how about that netcat thing" is about ⍺ instead of x.
|
|
# ¿ Sep 11, 2019 18:24 |
K8.0 posted:Don't even talk to me if your CPU is only running at 3.6 Roentgen.
|
|
# ¿ Sep 18, 2019 22:18 |
omeg posted:I think that dose would be very fatal. Alternatively it's because all of that radiation has been spread over more than 3 years so far. IMRT was 2 gray radiation in a very small and well-defined area (located both by a titanium clip as well as MR and CT scans) every weekday during a 6 week period where I also received chemo-therapy. After that is when the regular scans started, of which all but the first of the abdominal and chest CT-scans have been 15-minute scans with contrast, to minimize exposure. Consider that Igor Fedorovich Kostin, the reporter who was in the helicopter that filmed down into the Chernobyl reactor through an open door by flying over it died at 78, a few years ago (of a car crash, as I recall). So while there's a definite correlation, it's more complex than radiation == dead. BlankSystemDaemon fucked around with this message at 19:27 on Sep 22, 2019 |
|
# ¿ Sep 22, 2019 19:21 |
omeg posted:I might have mixed greys with sieverts... Radiation units are weird. But you are right, 60 Gray absorbed dose in the entire body, of any kind of radiation, would leave you dead within the hour.
|
|
# ¿ Sep 22, 2019 20:24 |
They're HEDT chips, so because of market segmentation of course ECC won't be available.
|
|
# ¿ Oct 2, 2019 12:13 |
SamDabbers posted:I'm running a pair of 16GB ECC UDIMMs (Samsung M391A2K43BB1-CRC) in an ASRock X370 Taichi with an R7 1700. ECC is both detected and enabled. I have not seen a single bit error reported yet though. 1) ECC is supported in that the system lets you POST with it 2) ECC is supported and single bit errors get corrected silently (which can be bad because what happens if a memory DIMM starts failing and producing a lot of errors?) 3) ECC is supported and single-bit errors get corrected and reported to the OS via an unmaskable interrupt (this is the most preferred option, as the OS can then decide if it shoud panic or not) 4) ECC is supported and the CPU is reset to prevent corruption (this generally happens in systems which are built with multiple levels of redundancy) Add a couple more options for when using lock-stepped memory that can correct for two bit errors, and RAIM/memory mirroring/memory sparing which are irrelevant here. So which is it? Unless you know beforehand, or know an engineer at Asrock, it can be an absolute pain in the arse to find out.
|
|
# ¿ Oct 2, 2019 22:03 |
That's good. Now all we can make a list of motherboards which we know work how they should when it comes to ECC, and we can start by adding ASRock X370 Taichi. Not that I can afford one for a new system, but for my own gratification I'd like to know if the 8 SATA ports are connected to the south bridge, as is the ASmedia controller that adds two more SATA ports?
|
|
# ¿ Oct 3, 2019 11:15 |
Malcolm XML posted:Too bad they discontinued the x299/itx
|
|
# ¿ Oct 11, 2019 11:31 |
Isn't a nichel market like HEDT also more likely to go with a E-ATX motherboard to get four pci-ex for SLI or something equally silly?
|
|
# ¿ Oct 13, 2019 11:46 |
eames posted:Ha this guy says Moore's Law is Not Dead
|
|
# ¿ Oct 24, 2019 14:32 |
gradenko_2000 posted:so HFT is just but coin mining but real?
|
|
# ¿ Oct 29, 2019 11:34 |
necrobobsledder posted:Absolutely nonsense unfortunately because randomization of latency is what will screw over HFT traders, not consistent latency. There was an exchange started a while ago that was designed expressly for quants that didn't work work HFT approaches because they added long loops and some dropped trades everywhere and you were not able to buy better QoS. Just add captchas randomly and a solid trading strategy works just fine in many respects for long and even option centric positions. Naked shorts are illegal and all but shorting and triggered trading setups like stop loss positions exacerbate sell-off cycles but are legal and are oftentimes done by retail traders and industrial scale alike. EDIT: That work they did in the datacenter eventually became a whitepaper by the SEC and there's been some talk of making it mandated, which is what I was wrongly remembering as already having been mandated. EDIT2: Oh, I just realized, the paper is linked in the article too. orz BlankSystemDaemon fucked around with this message at 16:33 on Oct 29, 2019 |
|
# ¿ Oct 29, 2019 16:08 |
Shipon posted:Like I said, it was drummed up scaremongering from an infosec consultancy industry that tries to boost its public profile. Anyone who needed to mitigate these problems had ways to get around it and the performance penalty was absolutely not worth it for everyone who wasn't in that segment. There are still plenty of systems who have not received microcode updates in their firmware because the vendor hasn't bothered updating the firmware even if it's still officially supported, and who runs software that hasn't been updated to either automatically enable the mitigations or had them manually enabled.
|
|
# ¿ Oct 31, 2019 10:40 |
Doh004 posted:I'm speccing out a custom build for my own dedicated Plex server and am curious about Quick Sync. Do I need the integrated graphics in order to have Quick Sync enabled (Plex uses this primarily for video encoding). I'm looking at the i3-9100 here: https://www.newegg.com/intel-core-i3-9th-gen-core-i3-9100/p/N82E16819118022 but can shave off $100 to go without the graphics. These fixed-function decoding and encoding chips are only good for a subset of the codec they support, which means you're at the mercy of Intel to have chosen a codec at the particular bitrate and settings that are fixed in the hardware. Unfortunately for all of us, Intel have decided that the baseline profile, which is primarily used for video conferencing and mobile video, is good enough - so it looks absolute shite if you're transcoding onto your TV, for example. BlankSystemDaemon fucked around with this message at 14:34 on Nov 3, 2019 |
|
# ¿ Nov 3, 2019 14:30 |
SwissArmyDruid posted:https://blogs.intel.com/technology/2019/11/ipas-november-2019-intel-platform-update-ipu/ There's also http://tpm.fail/ which we've known about for almost a month.
|
|
# ¿ Nov 13, 2019 11:21 |
eames posted:In *theory* your CPU could leak the content of your unlocked password manager window while you visit a site with a malicious javascript ad.
|
|
# ¿ Nov 13, 2019 18:29 |
ratbert90 posted:Ok. It can be one of these:
|
|
# ¿ Nov 15, 2019 09:00 |
Paul MaudDib posted:I personally would not rely on ECC for any board that is not a server-oriented board. Eletriarnation posted:Sure, so hypothetically AMD could push out an AGESA update that breaks ECC across the whole Ryzen line and tell everyone to gently caress off. In that case ASRock would just have to stop advertising support, and anyone with a working ECC system would have to stop updating or lose that feature.
|
|
# ¿ Nov 15, 2019 21:42 |
BangersInMyKnickers posted:ECC without NMI is unacceptable for server applications, but I do not agree that is matters that much for home/gaming use. Even perfectly healthy dimms can bitflip occasionally and this will stop that from impacting you, as well as generally increasing overall reliability. Yeah, if you are losing a dimm then troubleshooting it will be a pain in the rear end but a memtest will generally turn it up eventually while reducing the likelihood of system problems being caused by ram. EDIT: Microsoft published a study in 2007 that showed that based on the information they'd gathered, even consumer PCs would benefit from having ECC in terms of reducing lost work/productivity, iirc. Google also published a paper showing that bitflips are much more common, and there's been other studies on the frequency of cosmic rays and how often they lead to system crashes. BlankSystemDaemon fucked around with this message at 23:49 on Nov 15, 2019 |
|
# ¿ Nov 15, 2019 23:41 |
We still haven't seen any non-Goldmont CPUs with SHA Extensions, have we? EDIT: The news of a Comet Lake NUC just popped into my RSS feeds, so there's that. BlankSystemDaemon fucked around with this message at 19:26 on Nov 17, 2019 |
|
# ¿ Nov 17, 2019 13:03 |
Asimov posted:I agree and in a consumer-friendly world there would be a little "opt out of speculation execution exploits" button for consumers. Intel's explanation would probably be that their REAL customers are server farms, and that you should upgrade your hardware anyway. In addition, consider the bad press coverage that would occur if a data breach happened that could be blamed on un-patched operating systems and CPU architecture. mix that up into a stew and you get mandatory performance-limiting software patches.
|
|
# ¿ Dec 3, 2019 11:06 |
For what it's worth, the biggest issue with the side-channel attacks was that it allowed javascript running in browsers to be used to leak kernel information in memory including passwords stored in password vaults - and that has been mitigated on both Chrom(e|ium) and Firefox which covers like 98% of the browser market, by making the timings in browsers not as tight. So if you're like me and have an old laptop where the performance impact is rather high (even with the big speed increases in Firefox), you might forego them and rely on the browser mitigation instead.
|
|
# ¿ Dec 3, 2019 13:55 |
It's at times like these I wish we had a shared CPU thread, pun fully intended. A Success on Arm for HPC: AnandTech Found a Fujitsu A64fx Wafer and Arm Server CPUs: You Can Now Buy Ampere’s eMAG in a Workstation according to AnandTech.
|
|
# ¿ Dec 7, 2019 17:42 |
The modern implementation of SMT that Intel has was introduced in 2008 (with Nehalem) and bears very little relationship with the one found in the 2002 version which appeared in the Pentium 4 Northwood-C, which I had in a machine that has long since given up the blue smoke. Nehalem introduced a shitload of changes, including but not limited to the big change associated with transitioning EM64T/IA-32e to Intel 64 (which, if I recall correctly, had less of a difference - but not perfect compatibility, with AMD64), turbo-boost functionality, a new MMU (which AMD had years before Intel), as well as the branch predictor we know and love today, a second-level TLB, plus the hardware-accelerated virtualization and SLAT. They also did quite a lot of work on compare and swap for atomic operations. And they also got rid of the Northbridge, added DRAM DMA paths to the CPU itself, started requiring QPI links for cross-socket connection, and hung the Southbridge off the CPU primary CPU making NUMA significantly worse to deal with. EDIT: Most of that is from memory or scanning FreeBSD man-pages, so I might not have all the details correct. BlankSystemDaemon fucked around with this message at 00:44 on Dec 11, 2019 |
|
# ¿ Dec 11, 2019 00:27 |
EdEddnEddy posted:And overall, has any of these flaws led to an actual attack that we know of? Patch it all you want, there has to be countless unpatched hardware systems in the wild still. Nothing has leaked about anyone getting hit from it, and there was that whole debacle about Intel only informing certain of their customers until a Linux developer blew the whole thing wide open. Paul MaudDib posted:the 5-year solution is Lakefield, you will have slower in-order (side benefit more efficient!) processors for handling tasks that are designated as "secure" and fast insecure cores for gaming and other poo poo that just needs to go fast, with caching systems that don't overlap. EDIT: Also, wasn't Lakefield originally scheduled for 2019? BlankSystemDaemon fucked around with this message at 00:42 on Dec 11, 2019 |
|
# ¿ Dec 11, 2019 00:39 |
Endymion FRS MK1 posted:I have a dumb question. How do these things get patched? I have an 8086K, do I just rely on motherboard bios updates or is there something else I actively have to do? These can either be applied at runtime that follows a spec Intel has laid out whereby special CPU registers can have the binary data written to which will transparently load the microcode once it's been verified. The other way to load it is to have the firmware do the injection, but that requires your particular motherboard vendor to supply you with a firmware update. EDIT: I forgot to mention that if you keep your OS up-to-date, these should all be either available or enabled by default. BlankSystemDaemon fucked around with this message at 11:16 on Dec 11, 2019 |
|
# ¿ Dec 11, 2019 11:11 |
|
|
# ¿ Apr 23, 2024 19:29 |
That's great and all, but considering this quote:"Anandtech posted:It’s worth also pointing out, based on the title of this slide, that Intel still believes in Moore’s Law. Just don’t ask how much it’ll cost.
|
|
# ¿ Dec 11, 2019 17:58 |