Advertisement

Beware: Meltdown/Spectre CPU Microcode Update Causes Reboots on All Intel Processors

Recently, Intel released CPU microcode updates to mitigate the Meltdown and Spectre flaws. Later, it was discovered that the update was causing unexpected reboots on Broadwell and Haswell systems. Newer research from Intel shows that Ivy Bridge, Sandy Bridge, Skylake and Kaby Lake-based platforms are all affected by the bugged update and spontaneously reboot.

Meltdown Spectre Kernel Vulnerability

A new post on Intel's blog confirms the presence of these issues as they investigate the cause. According to executive vice president and general manager of Intel's Data Center Group, Navin Shenoy, an updated CPU microcode will be released next week to resolve the situation. Microcode updates can be applied at boot time by expert users, or alternatively you can apply a UEFI/BIOS/firmware update from your hardware vendor.

Advertisеment

While UEFI firmware updates from computer manufacturers or CPU microcode updates from Intel are both effective at mitigating the Meltdown and Spectre flaws, the updated computers are suffering from unexpected reboots. This is an alarming situation on already vulnerable platforms.

Besides the reboot issue, Intel has shared some benchmark information which reveals the performance impact of the vulnerability fix. It is as follows:

  • For FlexibleIO, a benchmark simulating different types of I/O loads, results depend on many factors, including read/write mix, block size, drives and CPU utilization. When we conducted testing to stress the CPU (100% write case), we saw an 18% decrease in throughput performance because there was not CPU utilization headroom. When we used a 70/30 read/write model, we saw a 2% decrease in throughput performance. When CPU utilization was low (100% read case), as is the case with common storage provisioning, we saw an increase in CPU utilization, but no throughput performance impact.
  • Storage Performance Development Kit (SPDK) tests, which provide a set of tools and libraries for writing high performance, scalable, user-mode storage applications, were measured in multiple test configurations. Using SPDK iSCSI, we saw as much as a 25% impact while using only a single core. Using SPDK vHost, we saw no impact.

Meltdown and Spectre flaws have caused some real trouble for IT admins and general users. While they are a security hole, there is no need to panic but the fixes released by both software and hardware vendors are giving extra problems to end users. Linux and Windows systems are suffering from performance hits, and AMD users running Windows 7 and Windows 8.1 systems might get into an unbootable state.

Intel plans to deliver fixed beta microcode again to hardware vendors for validation by next week.

Support us

Winaero greatly relies on your support. You can help the site keep bringing you interesting and useful content and software by using these options:

If you like this article, please share it using the buttons below. It won't take a lot from you, but it will help us grow. Thanks for your support!

Advertisеment

Author: Sergey Tkachenko

Sergey Tkachenko is a software developer who started Winaero back in 2011. On this blog, Sergey is writing about everything connected to Microsoft, Windows and popular software. Follow him on Telegram, Twitter, and YouTube.

One thought on “Beware: Meltdown/Spectre CPU Microcode Update Causes Reboots on All Intel Processors”

Leave a Reply

Your email address will not be published.

css.php
Using Telegram? Subscribe to the blog channel!
Hello. Add your message here.