At first I thought that somewhere I was mistaken, I did not understand something, I forgot something. I checked everything up to the last bit in my code, I did not find any mistakes and began to sin not on myself, but on my colleagues because of the hillock.
First of all replaced the processors, but it did not help. On motherboards at that time, the virtualization hardware was only in the BIOS, where it was initialized when the server was turned on, so I started comparing the BIOSes on motherboards (the same type of motherboard with samples) - everything was the same as the byte and the BIOS number itself. I fell into a stupor and, no longer knowing what to do, applied the last resort - the "method of poking." What I did not do, no longer thinking, but simply combining, and in the end stupidly downloaded the bios from the official site of Intel and rewrote them again in the motherboard, after which it all worked …
To my surprise there was no limit: the BIOS number was the same, the images of the BIOS coincided byte by byte, but for some reason the serial motherboards earned only when I filled them with the same bios taken by the Intel site. So, the reason is still in the motherboards? But the only difference was in the marking: samples were written Assembled Canada, and on serial cards - Assembled China. It became clear that the fees from China contain additional software modules, stitched in the BIOS, and the standard analysis programs did not see these modules. They, apparently, also worked with virtualization equipment and, accordingly, had the opportunity to hide the true contents of the BIOS. I became aware of the reason for my hyperdrive hangs on these Chinese boards: two software systems simultaneously worked with the same virtualization equipment, which did not allow me to share my resources. I wanted to deal with this malicious bios, and without any backward thought about "bookmarks", "backdoors", "undocumented opportunities," was just academic interest, and nothing more.
…….
The totality of the facts alarmed and led to paranoid thoughts in the style of spy detectives. These facts unequivocally spoke about the following:
In the new Intel-based serial server boards based on the chipset 5000, there are programs stitched in the flash memory of the IUD unit and executed on the central processor, and these programs work with virtualization hardware from the central processor.
Images of flash memory from the official site of Intel do not contain such software modules, therefore, the software modules interfering with me were illegally stitched into motherboards at the production stage.
The flash memory of the IUD block contains encrypted program modules that can not be collected and poured into flash memory without knowledge of the encryption keys, therefore, the one who inserted these illegal program modules knew the encryption keys, that is, it had virtually access to classified information.