MP 1,1-5,1 What you need to do to make Catalina work with MacPro5,1

Status
The first post in this thread is a WikiPost, and can be edited by anyone with the appropriate permissions.

iamdavid

macrumors newbie
Nov 11, 2003
12
2
0
Visit site
OK, so I ran version 1.0.4 of dosdude's patcher, downloaded 15.0.21 and it went through all the hoops and told me I had a successfully produced Catalina installer, on my USB stick. However what I had was not bootable, but a single folder called Contents per the attached jpg. So now I am totally confused as using The pAtcher version 1.0.2 and 15.0.18 it all worked like a charm...

What could I be doing wrong?
 

Attachments

bookemdano

macrumors 65816
Jul 29, 2011
1,211
700
0
OK, so I ran version 1.0.4 of dosdude's patcher, downloaded 15.0.21 and it went through all the hoops and told me I had a successfully produced Catalina installer, on my USB stick. However what I had was not bootable, but a single folder called Contents per the attached jpg. So now I am totally confused as using The pAtcher version 1.0.2 and 15.0.18 it all worked like a charm...

What could I be doing wrong?
Try it again maybe? And try a different USB stick. Not all are bootable on the cMP.
 

startergo

macrumors 65816
Sep 20, 2018
1,125
413
0
OK, so I ran version 1.0.4 of dosdude's patcher, downloaded 15.0.21 and it went through all the hoops and told me I had a successfully produced Catalina installer, on my USB stick. However what I had was not bootable, but a single folder called Contents per the attached jpg. So now I am totally confused as using The pAtcher version 1.0.2 and 15.0.18 it all worked like a charm...

What could I be doing wrong?
Did you actually try booting from it? Most probably there is hidden content. Also, make sure the USB is GPT formatted.
 
  • Like
Reactions: JedNZ

Speedstar

macrumors regular
Oct 10, 2008
104
29
0
20190702 10.15 DP3 19A501i MP5,1 still blocked
20190624 10.15 PB1 19A487m Same as DP2
20190617 10.15 DP2 19A487l 19A487m Still works with MP5,1, still no AirPortBrcm4331.kext. Better/less buggier native NVIDIA Kepler support. In place update won't work. Same Sidecar block as DP1
20190603 10.15 DP1 19A471t Works with MP5,1, no AirPort Extreme kext. Very buggy NVIDIA Kepler native support. Sidecar is blocked on a MP5,1

so any news for 5.1 users on current beta?
 

iamdavid

macrumors newbie
Nov 11, 2003
12
2
0
Visit site
Did you actually try booting from it? Most probably there is hidden content. Also, make sure the USB is GPT formatted.
Yes I tried, but it didn't appear in the list of startup disks in Startup disk preferences, nor does it appear when option is held down during startup.
[doublepost=1565124211][/doublepost]OK Sorted it out, though this might be of interest to others.

I re-formatted the USB stick to HFS+ before I ran the patcher and it all worked fine. Before it was formatted to APFS.
 

r.c.

macrumors newbie
Nov 5, 2013
7
0
0
Hi all, have been keeping a keen eye on this thread, thanks all for contributing and helping everyone out.

I have a cMP 4,1 flashed to 5,1 and upgraded to dual X5690 cpus which I believe are Westmere. Does anyone know if this architecture gets decent protection from the MDS and other vulnerabilities? Looking to upgrade to Catalina on release, presumably with the dosdude patch if its pretty safe & reliable to do so. Running an RX 570 8gb gpu.

Thanks,
Richard.
 

roobarb!

macrumors member
Jul 30, 2009
72
59
0
I have a cMP 4,1 flashed to 5,1 and upgraded to dual X5690 cpus which I believe are Westmere. Does anyone know if this architecture gets decent protection from the MDS and other vulnerabilities? Looking to upgrade to Catalina on release, presumably with the dosdude patch if its pretty safe & reliable to do so. Running an RX 570 8gb gpu.
Nope, there are no microcode updates for Westmere processors from Intel. Perhaps one of the reasons support for the MacPro5,1 line was dropped from Catalina, as Apple can no longer guarantee the security of the systems through OS patches alone. I'm in the same boat and have disabled multithreading in order to protect against the vulnerabilities.

The thread you're looking for is "Mac Pro 5,1 MDS vulnerability information thread". The first post has most of the information you need, including Apple's support articles for affected systems.
 
  • Like
Reactions: TheStork

thomasthegps

macrumors regular
Sep 23, 2015
218
143
0
France
Hi all, have been keeping a keen eye on this thread, thanks all for contributing and helping everyone out.

I have a cMP 4,1 flashed to 5,1 and upgraded to dual X5690 cpus which I believe are Westmere. Does anyone know if this architecture gets decent protection from the MDS and other vulnerabilities? Looking to upgrade to Catalina on release, presumably with the dosdude patch if its pretty safe & reliable to do so. Running an RX 570 8gb gpu.

Thanks,
Richard.

OMG! people please stop worrying about these “security flaws”. Every single cpu has security flaws just like all software! If you buy this propaganda crap you’ll never be happy no matter what cpu you buy!

Your computer will never be exposed to 99% of these flaws anyways. Setup a decent firewall.

Here is whats going to happen.

“Someone has discovered a security issue in my cpu, I guess I should replace my current cpu with their brand new hardware mitigated cpu.”

“Wow i’m super happy this new cpu is great and has no security flaws”

“Someone has discovered a security flaw in my new cpu! damn it!”

This goes on and on forever.


NSA has backdoors on all cpus so don’t worry your data can be safely retrieved by the NSA at any moment. Hackers can probably use those same backdoors. The bottom line is unless your name is james bond and you’re hiding important information about a north korean military base developing a nuclear ICBM you probably don’t have anything to worry about.
It’s unlikely you’ll be targeted by an attack.

It's like thinking someone is going to break into your house, plugin a firewire device into your Mac Pro and dump it’s unencrypted ram contents. Can it happen? Yes. Is it likely to happen ? NO


I’ve been running a linux computer with all mitigations turned off and I appreciate the good performance.
 
Last edited:

smirk

macrumors 6502a
Jul 18, 2002
650
45
0
Orange County, CA
It's like thinking someone is going to break into your house, plugin a firewire device into your Mac Pro and dump it’s unencrypted ram contents. Can it happen? Yes. Is it likely to happen ? NO
I haven't totally been following this issue, but can you explain why it isn't likely to happen? Can this exploit be used to get passwords or account information? Could it be used to dump the memory used by, for example, my LastPass password manager to gain all my account passwords?

I'm not asking this in a snarky way, I really don't know the answers and am hoping the issue isn't as dire as people have made it out to be. I have an MP5,1 that I was in the process of setting up, and when the security issue made the news I sort of stopped using that computer -- largely because I didn't understand things well enough to know how much risk existed.
 

startergo

macrumors 65816
Sep 20, 2018
1,125
413
0
I haven't totally been following this issue, but can you explain why it isn't likely to happen? Can this exploit be used to get passwords or account information? Could it be used to dump the memory used by, for example, my LastPass password manager to gain all my account passwords?

I'm not asking this in a snarky way, I really don't know the answers and am hoping the issue isn't as dire as people have made it out to be. I have an MP5,1 that I was in the process of setting up, and when the security issue made the news I sort of stopped using that computer -- largely because I didn't understand things well enough to know how much risk existed.
I think we are going waaaaaay off topic here. I noticed for example newer applications like the newest Virtualbox does not start if any process tries to injects unsigned drivers in the memory, even though that process is from a legitimate software (powerbroker). My point is the software vendors already take proactive measures to prevent some of the newly discovered Intel flaws. Anyway let's stay on topic.
 

ZombiePhysicist

macrumors 6502a
May 22, 2014
693
456
0
OK, so I ran version 1.0.4 of dosdude's patcher, downloaded 15.0.21 and it went through all the hoops and told me I had a successfully produced Catalina installer, on my USB stick. However what I had was not bootable, but a single folder called Contents per the attached jpg. So now I am totally confused as using The pAtcher version 1.0.2 and 15.0.18 it all worked like a charm...

What could I be doing wrong?
Curious, can you just install Catalina on a supported machine, take that drive and boot the 5,1? I cannot/will not ever use a 3rd party patch (unless their is source code) because potentially they could plant any kind of crazy stuff on your install and cannot risk that for work machines. Or do you need the patch beyond the installer in that the OS won't boot without it? (Sorry if this is obvious or already answered).
 

bsbeamer

macrumors 68020
Sep 19, 2012
2,346
1,089
0
Curious, can you just install Catalina on a supported machine, take that drive and boot the 5,1? I cannot/will not ever use a 3rd party patch (unless their is source code) because potentially they could plant any kind of crazy stuff on your install and cannot risk that for work machines. Or do you need the patch beyond the installer in that the OS won't boot without it? (Sorry if this is obvious or already answered).
First post in this thread:
https://forums.macrumors.com/threads/what-you-need-to-do-to-make-catalina-work-with-macpro5-1.2183978/

"If you install Catalina with a supported Mac then move the drive to your MP5,1 (with a METAL supported GPU) or use Target Disk Mode, or use VMWare Fusion to install to a disk you just need -no_compat_check added to the Mac Pro NVRAM boot-args, after that 10.15 "works" with a MP5,1."
 
  • Like
Reactions: h9826790

Executor

macrumors member
Mar 1, 2008
91
29
0
NYC
If I install Catalina in a supported Mac and then move the drive to an unsupported Mac Pro 5,1 with a metal capable card. How will updates work? Would I be able to update from that point forward using the Mac Pro or would I be forced to erase and re-install every single update using a supported Mac?
Any information is appreciated. Thanks
 

tsialex

macrumors 603
Jun 13, 2016
5,143
5,849
0
Brazil
If I install Catalina in a supported Mac and then move the drive to an unsupported Mac Pro 5,1 with a metal capable card. How will updates work? Would I be able to update from that point forward using the Mac Pro or would I be forced to erase and re-install every single update using a supported Mac?
Any information is appreciated. Thanks
There are two types of updates, macOS point releases and Security updates have the same blocks as full installs while Apple app updates like Safari or iTunes (it's a example, iTunes is dead with Catalina), usually don't have the same checks as macOS updates.

You can use a VMM emulation patch like the one made by @Czo, use VMWare Fusion raw disk, or install your Catalina disk back in a supported Mac and do the updates if you don't want to use any patches or don't have Fusion.

Btw, added this to the first post since will be a frequent question in the future.
 
Last edited:

Executor

macrumors member
Mar 1, 2008
91
29
0
NYC
There are two types of updates, macOS point releases and Security updates have the same blocks as full installs while Apple app updates like Safari or iTunes (it's a example, iTunes is dead with Catalina), usually don't have the same checks as macOS updates.

You can use a VMM emulation patch like the one made by @Czo, use VMWare Fusion raw disk, or install your Catalina disk back in a supported Mac and do the updates if you don't want to use any patches or don't have Fusion.

Btw, added this to the first post since will be a frequent question in the future.
Thank you for clearing that up. It’s going to be interesting to keep up with the updates going forward. But at least there is a way.
 

Status
The first post in this thread is a WikiPost, and can be edited by anyone with the appropriate permissions.