• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Xeon Owners Club

Joined
Mar 21, 2021
Messages
72 (0.05/day)
Can I assume you are competent in bios modifications? I have found people good at moving modules around and swapping them out but could never really find someone that really modified the code. I'd love to pick your brain if your up for it. I have a 1680v3 that I know will clock more if I can up the power current restrictions.
I only know how to unlock Turbo on V3 Xeons. I can not remove the power current restrictions.
 
Joined
Mar 30, 2020
Messages
407 (0.24/day)
Location
Pittsburgh Pa USA
I only know how to unlock Turbo on V3 Xeons. I can not remove the power current restrictions.

Gotcha. Ya that's about all I ran into. I believe that's a micro code delete and replacing an efi module. I'm trying to find someone like the person that wrote that efi module lol.
 
Joined
Mar 16, 2017
Messages
2,128 (0.75/day)
Location
Tanagra
System Name Budget Box
Processor Xeon E5-2667v2
Motherboard ASUS P9X79 Pro
Cooling Some cheap tower cooler, I dunno
Memory 32GB 1866-DDR3 ECC
Video Card(s) XFX RX 5600XT
Storage WD NVME 1GB
Display(s) ASUS Pro Art 27"
Case Antec P7 Neo
Question for any Westmere Xeon users, I have a 5,1 Mac Pro that I dual boot to Windows 10 for gaming only. Do the sceptre and meltdown patches affect gaming performance much, and how much of a chance would I be taking disabling them since I’m not using a browser? I have the x5690, which is high as I can go in the 5,1. Just trying to squeeze as much as I can out of it. I did some searching on it, and I didn’t see much on the pre-SB Xeons.
 
Joined
Jul 5, 2013
Messages
27,906 (6.69/day)
Do the sceptre and meltdown patches affect gaming performance much
Yes, they do.
and how much of a chance would I be taking disabling them since I’m not using a browser?
The actual security threat is almost non-existent. As has been stated elsewhere, the Spectre & Meltdown type vulnerabilities require a locally installed component. If you're only using the game client(Steam, Epic, Galaxy, Etc), there is no entry vector for a malware payload. Even if you were using a browser, the risk is similarly minimal as there would need to be an action by you to download and run a payload. As long as you don't do that, an attack based on these vulnerabilities is impossible.

Disable the patches, game on, enjoy.
 
Joined
Mar 30, 2020
Messages
407 (0.24/day)
Location
Pittsburgh Pa USA
Hey I'm trying to sort something out. There were some custom skus out there for e5-v3s. I know the single sockets were 1681,86,91 pretty sure of that. What I lost track of was what they used for dual socket. I know there was a few but I can't find info on them. I think Intel made them for Amazon or something.
 
Joined
Jul 5, 2013
Messages
27,906 (6.69/day)
Hey I'm trying to sort something out. There were some custom skus out there for e5-v3s. I know the single sockets were 1681,86,91 pretty sure of that. What I lost track of was what they used for dual socket. I know there was a few but I can't find info on them. I think Intel made them for Amazon or something.
One of the staff over at TechARP made a quick reference table for them. He quit working on it a few years ago, but I still use it regularly to look things up.
WorkstationCPU-Intel.png
Should help you find what you're looking for.
 
Joined
Mar 30, 2020
Messages
407 (0.24/day)
Location
Pittsburgh Pa USA
One of the staff over at TechARP made a quick reference table for them. He quit working on it a few years ago, but I still use it regularly to look things up.
Should help you find what you're looking for.

F'n awesome. That's my new favorite thing lol. If it matters I was specifically looking for the e5-2666v3. Guide pointed me right to it and was even referenced to Amazon. Thanks.
 
Joined
Dec 26, 2006
Messages
3,846 (0.59/day)
Location
Northern Ontario Canada
Processor Ryzen 5700x
Motherboard Gigabyte X570S Aero G R1.1 BiosF5g
Cooling Noctua NH-C12P SE14 w/ NF-A15 HS-PWM Fan 1500rpm
Memory Micron DDR4-3200 2x32GB D.S. D.R. (CT2K32G4DFD832A)
Video Card(s) AMD RX 6800 - Asus Tuf
Storage Kingston KC3000 1TB & 2TB & 4TB Corsair MP600 Pro LPX
Display(s) LG 27UL550-W (27" 4k)
Case Be Quiet Pure Base 600 (no window)
Audio Device(s) Realtek ALC1220-VB
Power Supply SuperFlower Leadex V Gold Pro 850W ATX Ver2.52
Mouse Mionix Naos Pro
Keyboard Corsair Strafe with browns
Software W10 22H2 Pro x64
Joined
Nov 16, 2007
Messages
1,205 (0.19/day)
Location
Hampton Roads
Processor Xeon x5650
Motherboard SABERTOOTH X58
Cooling Fans
Memory 24 GB Kingston HyperX 1600
Video Card(s) GTX 1060 3GB
Storage small ssd
Display(s) Dell 2001F, BenQ short throw
Case Lian Li
Audio Device(s) onboard
Power Supply X750
Software Mint 19.3, Win 10
Benchmark Scores not so fast...
Joined
Jul 5, 2013
Messages
27,906 (6.69/day)
Joined
Aug 21, 2015
Messages
1,726 (0.51/day)
Location
North Dakota
System Name Office
Processor Ryzen 5600G
Motherboard ASUS B450M-A II
Cooling be quiet! Shadow Rock LP
Memory 16GB Patriot Viper Steel DDR4-3200
Video Card(s) Gigabyte RX 5600 XT
Storage PNY CS1030 250GB, Crucial MX500 2TB
Display(s) Dell S2719DGF
Case Fractal Define 7 Compact
Power Supply EVGA 550 G3
Mouse Logitech M705 Marthon
Keyboard Logitech G410
Software Windows 10 Pro 22H2
Joined
Dec 26, 2006
Messages
3,846 (0.59/day)
Location
Northern Ontario Canada
Processor Ryzen 5700x
Motherboard Gigabyte X570S Aero G R1.1 BiosF5g
Cooling Noctua NH-C12P SE14 w/ NF-A15 HS-PWM Fan 1500rpm
Memory Micron DDR4-3200 2x32GB D.S. D.R. (CT2K32G4DFD832A)
Video Card(s) AMD RX 6800 - Asus Tuf
Storage Kingston KC3000 1TB & 2TB & 4TB Corsair MP600 Pro LPX
Display(s) LG 27UL550-W (27" 4k)
Case Be Quiet Pure Base 600 (no window)
Audio Device(s) Realtek ALC1220-VB
Power Supply SuperFlower Leadex V Gold Pro 850W ATX Ver2.52
Mouse Mionix Naos Pro
Keyboard Corsair Strafe with browns
Software W10 22H2 Pro x64
Joined
Nov 16, 2007
Messages
1,205 (0.19/day)
Location
Hampton Roads
Processor Xeon x5650
Motherboard SABERTOOTH X58
Cooling Fans
Memory 24 GB Kingston HyperX 1600
Video Card(s) GTX 1060 3GB
Storage small ssd
Display(s) Dell 2001F, BenQ short throw
Case Lian Li
Audio Device(s) onboard
Power Supply X750
Software Mint 19.3, Win 10
Benchmark Scores not so fast...
When he uses the Argon, the matter will be....plasma!

I have some too, and some Helium, and of course, some Xeons
 
Joined
Aug 21, 2015
Messages
1,726 (0.51/day)
Location
North Dakota
System Name Office
Processor Ryzen 5600G
Motherboard ASUS B450M-A II
Cooling be quiet! Shadow Rock LP
Memory 16GB Patriot Viper Steel DDR4-3200
Video Card(s) Gigabyte RX 5600 XT
Storage PNY CS1030 250GB, Crucial MX500 2TB
Display(s) Dell S2719DGF
Case Fractal Define 7 Compact
Power Supply EVGA 550 G3
Mouse Logitech M705 Marthon
Keyboard Logitech G410
Software Windows 10 Pro 22H2
Joined
Jun 2, 2022
Messages
349 (0.38/day)
System Name HP EliteBook 725 G3
Processor AMD PRO A10-8700B (1.8 GHz CMT dual module with 3.2 GHz boost)
Motherboard HP proprietary
Cooling pretty good
Memory 8 GB SK Hynix DDR3 SODIMM
Video Card(s) Radeon R6 (Carrizo/GCNv3)
Storage internal Kioxia XG6 1 TB NVMe SSD (aftermarket)
Display(s) HP P22h G4 21.5" 1080p (& 768p internal LCD)
Case HP proprietary metal case
Audio Device(s) built-in Conexant CX20724 HDA chipset -> Roland RH-200S
Power Supply HP-branded AC adapter
Mouse Steelseries Rival 310
Keyboard Cherry G84-5200
Software Alma Linux 9.1
Benchmark Scores Broadcom BCM94356 11ac M.2 WiFi card (aftermarket)
Yes, they do.

The actual security threat is almost non-existent. As has been stated elsewhere, the Spectre & Meltdown type vulnerabilities require a locally installed component. If you're only using the game client(Steam, Epic, Galaxy, Etc), there is no entry vector for a malware payload. Even if you were using a browser, the risk is similarly minimal as there would need to be an action by you to download and run a payload. As long as you don't do that, an attack based on these vulnerabilities is impossible.

Disable the patches, game on, enjoy.
That is incorrect. JavaScript (and specifically code executed by a JIT interpreter as it is in all popular web browsers, by default) is a vector. There is a reason that browsers were quick to implement their own mitigations after these transient execution vulnerabilities were revealed. That said, as they are not using a web browser on that machine this is irrelevant. It basically boils down to running untrusted code on your machine (and that includes JITing JavaScript in your web browser) being a problem and frankly it has always been since even before this new class of vulnerabilities was discovered there were security issues with JavaScript sandbox being escaped by malware. It has always been an arms race between browser vendors and attackers. And it is not just sketchy websites that you need to worry about either because you have ads, even on well-known reputable sites, serving malware. This is why it is to run uBlock Origin (or NoScript) these days. It is now at the heart of my personal security (and privacy but that is another story) doctrine because, I repeat, running untrusted code on your computer is simply a fundamental problem (and it will always be unless we get a revolution in popular hardware architecture; I have read that certain ancient mainframe architectures were significantly more secure by design than the PC/x86 but I am not an expert on that topic) no matter how many security measures software developers take.
 
Joined
Jul 5, 2013
Messages
27,906 (6.69/day)
JavaScript (and specifically code executed by a JIT interpreter as it is in all popular web browsers, by default) is a vector.
It's really not that simple. I don't really want to be going into it again, because...
There is a reason that browsers were quick to implement their own mitigations after these transient execution vulnerabilities were revealed.
...every modern browser patched that problem and all of it's variants. Browsers are NOT a valid attack vector. Even with a vulnerable browser, direct user interaction was required to install a payload. For anyone who has any knowledge of this, they will not be blindly clicking on crap or visiting "iffy" sites.
And it is not just sketchy websites that you need to worry about either because you have ads, even on well-known reputable sites, serving malware. This is why it is to run uBlock Origin (or NoScript) these days.
That's a fair point, but again, the user has to actively download and install the payload. Browsers are configured to block anything that would otherwise be presented to the user. Adblockers and JS managers provide further protection.

Put simply, those patches are completely redundant at this time and can safely be disabled. And if you knew me better and how much of a security boot-stomper I am, you could better appreciate this statement.
 
Last edited:
Joined
Jun 2, 2022
Messages
349 (0.38/day)
System Name HP EliteBook 725 G3
Processor AMD PRO A10-8700B (1.8 GHz CMT dual module with 3.2 GHz boost)
Motherboard HP proprietary
Cooling pretty good
Memory 8 GB SK Hynix DDR3 SODIMM
Video Card(s) Radeon R6 (Carrizo/GCNv3)
Storage internal Kioxia XG6 1 TB NVMe SSD (aftermarket)
Display(s) HP P22h G4 21.5" 1080p (& 768p internal LCD)
Case HP proprietary metal case
Audio Device(s) built-in Conexant CX20724 HDA chipset -> Roland RH-200S
Power Supply HP-branded AC adapter
Mouse Steelseries Rival 310
Keyboard Cherry G84-5200
Software Alma Linux 9.1
Benchmark Scores Broadcom BCM94356 11ac M.2 WiFi card (aftermarket)
I am thinking about getting a microATX LGA 1150 Supermicro board from eBay complete with E3 v3 Xeon and swapping it into my current PC (see system specs). Anything I need to worry about? I think I am more comfortable with reusing my current ATX PSU than relying on a proprietary PSU in the HP Z420 and I think a more incremental change of my PC may be a better idea (I also do not look forward to the prospect of having to sell off my entire PC).
 
Joined
Nov 2, 2020
Messages
1,350 (0.90/day)
Location
Tel Fyr
System Name Purple Haze | Vacuum Box
Processor AMD Ryzen 7 5800X3D (-30 CO) | Intel® Xeon® E3-1241 v3
Motherboard MSI B450 Tomahawk Max | Gigabyte GA-Z87X-UD5H
Cooling Dark Rock 4 Pro, P14, P12, T30 case fans | 212 Evo & P12 PWM PST x2, Arctic P14 & P12 case fans
Memory 32GB Ballistix (Micron E 19nm) CL16 @3733MHz | 32GB HyperX Beast 2400MHz (XMP)
Video Card(s) AMD 6900XTXH ASRock OC Formula & Phanteks T30x3 | AMD 5700XT Sapphire Nitro+ & Arctic P12x2
Storage ADATA SX8200 Pro 1TB, Toshiba P300 3TB x2 | Kingston A400 120GB, Fanxiang S500 Pro 256GB
Display(s) TCL C805 50" 2160p 144Hz VA miniLED, Mi 27" 1440p 165Hz IPS, AOC 24G2U 1080p 144Hz IPS
Case Modded MS Industrial Titan II Pro RGB | Heavily Modded Cooler Master Q500L
Audio Device(s) Audient iD14 MKII, Adam Audio T8Vs, Bloody M550, HiFiMan HE400se, Tascam TM-80, DS4 v2
Power Supply Rosewill Capstone 1000M | Enermax Revolution X't 730W (both with P14 fans)
Mouse Logitech G305, Bloody A91, Amazon basics, Logitech M187
Keyboard Redragon K530, Bloody B930, Epomaker TH80 SE, BTC 9110
Software W10 LTSC 21H2
Joined
Jun 2, 2022
Messages
349 (0.38/day)
System Name HP EliteBook 725 G3
Processor AMD PRO A10-8700B (1.8 GHz CMT dual module with 3.2 GHz boost)
Motherboard HP proprietary
Cooling pretty good
Memory 8 GB SK Hynix DDR3 SODIMM
Video Card(s) Radeon R6 (Carrizo/GCNv3)
Storage internal Kioxia XG6 1 TB NVMe SSD (aftermarket)
Display(s) HP P22h G4 21.5" 1080p (& 768p internal LCD)
Case HP proprietary metal case
Audio Device(s) built-in Conexant CX20724 HDA chipset -> Roland RH-200S
Power Supply HP-branded AC adapter
Mouse Steelseries Rival 310
Keyboard Cherry G84-5200
Software Alma Linux 9.1
Benchmark Scores Broadcom BCM94356 11ac M.2 WiFi card (aftermarket)
In regards to E3-v3, nothing at all.
I was primarily concerned about the Super Micro board but it is good to know that those Xeons are fine. I will be getting a Haswell Refresh chip just like your 1241, so there shouldn't be any issues with errata. I checked the product page/Quick Reference and the Super Micro board seems to have a standard ATX power connector so that should not be an issue at least.

I am hoping that the sale of my 1600 AF+Biostar X470GTQ (and perhaps WX2100 and DDR4 too) can fund the purchase of a new (well, to me) enterprise HDD to replace my UltraStar 7K3000 as my main HDD and a Noctua case fan to replace the noisy (and probably malfunctioning) case fan that came with my Fractal Design case.

It's really not that simple. I don't really want to be going into it again, because...

...every modern browser patched that problem and all of it's variants. Browsers are NOT a valid attack vector. Even with a vulnerable browser, direct user interaction was required to install a payload. For anyone who has any knowledge of this, they will not be blindly clicking on crap or visiting "iffy" sites.

That's a fair point, but again, the user has to actively download and install the payload. Browsers are configured to block anything that would otherwise be presented to the user. Adblockers and JS managers provide further protection.

Put simply, those patches are completely redundant at this time and can safely be disabled. And if you knew me better and how much of a security boot-stomper I am, you could better appreciate this statement.
I have no idea where you are getting this idea that users need to "actively download and install the payload". Any JavaScript on a web page is run by default when a page is loaded (or it is triggered by something else, which the web page (or ad) 'decides'). We are not talking about some kind of Java or Flash/Adobe AIR applet or something that you need to click to run or that needs to be downloaded and executed by some local runtime manually. "Adblockers and JS managers" do not just provide "further protection". On the contrary, they are necessary to override the dangerous default behavior/configuration of (most/popular) browsers.

Also, they are not "patches" that solve the problem. They are mitigations; they mitigate the risk, they do not eliminate it. You should look at this as browser vendors doing their part (to the degree that in their own eyes is reasonable, when balanced with other concerns such as performance and user experience) to make the best of a bad situation.

I am sure that you take security very seriously and have a great breadth of knowledge when it comes IT/system administration etc but I do not think you have an adequate understanding of this particular niche topic. I will be the first to admit that I am far from an expert when it comes transient execution vulnerabilities, JavaScript or browsers in general but I do have a tiny bit of experience creating web applications with JavaScript and I have learned a lot the last couple of years about how invasive JavaScript has become (in particular when it comes to tracking). Additionally, using OpenBSD as my main desktop OS for half a year and being a part of that community taught me a lot about security and I try to at least keep up on a surface level with the latest about these transient execution vulnerabilities.

As an aside I was reading an overview paper by one of the security researchers involved in discovering these vulnerabilities recently (I will have to look it up again and finish it in the near future) and even though I do not understand at least half of what they are talking about (my rudimentary understanding of how CPUs work from a college computer architecture/assembly language programming course does not really cut it), I still learned a fair amount about the basic concepts behind these vulnerabilities (and there are actually significant differences between different classes of them).
 
Last edited:
Joined
Jul 5, 2013
Messages
27,906 (6.69/day)
I have no idea where you are getting this idea that users need to "actively download and install the payload". Any JavaScript on a web page is run by default when a page is loaded (or it is triggered by something else, which the web page (or ad) 'decides'). We are not talking about some kind of Java or Flash/Adobe AIR applet or something that you need to click to run or that needs to be downloaded and executed by some local runtime manually. "Adblockers and JS managers" do not just provide "further protection". On the contrary, they are necessary to override the dangerous default behavior/configuration of (most/popular) browsers.
Like I said, I'm not getting into this discussion again. It was argued to death a few years ago when people kept saying the same thing and no one has EVER proved it(JS proof of concepts where only theoretical and did NOT actually prove anything). What is known is that exploits for side-channel type attacks NEED local physical access. Remote access(that includes JS) DOES NOT WORK. Full stop, end of story. Let it go.
As an aside I was reading an overview paper by one of the security researchers involved in discovering these vulnerabilities recently (I will have to look it up again and finish it in the near future) and even though I do not understand at least half of what they are talking about (my rudimentary understanding of how CPUs work from a college computer architecture/assembly language programming course does not really cut it), I still learned a fair amount about the basic concepts behind these vulnerabilities (and there are actually significant differences between different classes of them).
Finish that read. It'll help you understand why this series of vulnerabilities is so woefully misunderstood.
 
Joined
Jun 2, 2022
Messages
349 (0.38/day)
System Name HP EliteBook 725 G3
Processor AMD PRO A10-8700B (1.8 GHz CMT dual module with 3.2 GHz boost)
Motherboard HP proprietary
Cooling pretty good
Memory 8 GB SK Hynix DDR3 SODIMM
Video Card(s) Radeon R6 (Carrizo/GCNv3)
Storage internal Kioxia XG6 1 TB NVMe SSD (aftermarket)
Display(s) HP P22h G4 21.5" 1080p (& 768p internal LCD)
Case HP proprietary metal case
Audio Device(s) built-in Conexant CX20724 HDA chipset -> Roland RH-200S
Power Supply HP-branded AC adapter
Mouse Steelseries Rival 310
Keyboard Cherry G84-5200
Software Alma Linux 9.1
Benchmark Scores Broadcom BCM94356 11ac M.2 WiFi card (aftermarket)
Like I said, I'm not getting into this discussion again. It was argued to death a few years ago when people kept saying the same thing and no one has EVER proved it(JS proof of concepts where only theoretical and did NOT actually prove anything).
I think there were actual JS demos that could extract secrets from your RAM given enough time but I could be wrong.
What is known is that exploits for side-channel type attacks NEED local physical access.
That is true for traditional side-channel attacks that have been known since the 80s, yes. But transient execution vulnerabilities are very different; their discovery in 2018 changed everything.
Finish that read. It'll help you understand why this series of vulnerabilities is so woefully misunderstood.
I sure will.

I don't think that these are the type of vulnerabilities that will be exploited by the average cybercriminal but I think that more advanced actors (think powerful state level actors) can and will definitely use these vulnerabilities, especially as they leave no trace. I think that some of these actors may have a better understanding of these vulnerabilities than public/academic and independent researchers currently do.
 
Joined
Jul 5, 2013
Messages
27,906 (6.69/day)
I think there were actual JS demos that could extract secrets from your RAM given enough time but I could be wrong.
I never saw one that actually worked.

I don't think that these are the type of vulnerabilities that will be exploited by the average cybercriminal but I think that more advanced actors (think powerful state level actors) can and will definitely use these vulnerabilities, especially as they leave no trace. I think that some of these actors may have a better understanding of these vulnerabilities than public/academic and independent researchers currently do.
Exactly. It's just not something the average use needs to be worried about.
 
Joined
Mar 4, 2016
Messages
713 (0.22/day)
Location
Zagreb, Croatia
System Name D30 w.2x E5-2680; T5500 w.2x X5675;2x P35 w.X3360; 2x Q33 w.Q9550S/Q9400S & laptops.
Well here is the thing.....first of all also depend with what motherboard you will pair this cpu's because 1620 v2 is unlocked and it can be OC easily beyond 4ghz on some decent mobo...second E5 2620 V3 is 6c/12t so you have more threads even if is it maybe a bit slower on single core performance you will have more power under the "hood" which is also important in gaming + turbo unlock hack works on cheap Chinese motherboards so this CPU probably can work on 3,2Ghz on all cores and then his IPC wil be better....

If you do not planing to do any OC or turbo-bios-hack and you asking just for stock speed between these 2 cpu's then I guess it will really depend of the game you playing because most/older games still prefer "few"faster cores BUT newer games starting to like more cores/threads and sometimes even if they are slower they can give you more FPS in certain situations......
It's a close race between these 2 but In this case I will pick 2620 v3.....saying that even 6c/12t is not enough anymore maybe you can look for some cheap 8c/16t solution?


If you have somewhere 1 more fan put it on it it will work GREAT on CM T20 as twin-turbo and sometimes temps can go down drastically....

View attachment 169646
Well CM Hyper T20 turned out not so great product. Failed in the middle of 24/7 working computer! :confused:
 

Attachments

  • Cooler Master Hyper T20.jpg
    Cooler Master Hyper T20.jpg
    130.8 KB · Views: 79
Joined
Oct 26, 2016
Messages
1,791 (0.61/day)
Location
BGD
System Name Minotaur
Processor Intel I9 7940X
Motherboard Asus Strix Rog Gaming E X299
Cooling BeQuiet/ double-Fan
Memory 192Gb of RAM DDR4 2400Mhz
Video Card(s) 1)RX 6900XT BIOSTAR 16Gb***2)MATROX M9120LP
Storage 2 x ssd-Kingston 240Gb A400 in RAID 0+ HDD 500Gb +Samsung 128gbSSD +SSD Kinston 480Gb
Display(s) BenQ 28"EL2870U(4K-HDR) / Acer 24"(1080P) / Eizo 2336W(1080p) / 2x Eizo 19"(1280x1024)
Case NZXT H5 Flow
Audio Device(s) Realtek/Creative T20 Speakers
Power Supply F S P Hyper S 700W
Mouse Asus TUF-GAMING M3
Keyboard Func FUNC-KB-460/Mechanical Keyboard
VR HMD Oculus Rift DK2
Software Win 11
Benchmark Scores Fire Strike=23905,Cinebench R15=3167,Cinebench R20=7490.Passmark=30689,Geekbench4=32885
Well CM Hyper T20 turned out not so great product. Failed in the middle of 24/7 working computer! :confused:
Srry to hear that...is the fan that failed or what?How long lasted?
 
Top