Beware: Meltdown/Spectre CPU Microcode Update Causes Reboots on All Intel Processors

Recently, Intel released CPU microcode updates to mitigate the Meltdown and Spectre flaws. Later, it was discovered that the update was causing unexpected reboots on Broadwell and Haswell systems. Newer research from Intel shows that Ivy Bridge, Sandy Bridge, Skylake and Kaby Lake-based platforms are all affected by the bugged update and spontaneously reboot.

Meltdown Spectre Kernel Vulnerability

A new post on Intel's blog confirms the presence of these issues as they investigate the cause. According to executive vice president and general manager of Intel's Data Center Group, Navin Shenoy, an updated CPU microcode will be released next week to resolve the situation. Microcode updates can be applied at boot time by expert users, or alternatively you can apply a UEFI/BIOS/firmware update from your hardware vendor.

While UEFI firmware updates from computer manufacturers or CPU microcode updates from Intel are both effective at mitigating the Meltdown and Spectre flaws, the updated computers are suffering from unexpected reboots. This is an alarming situation on already vulnerable platforms.

Besides the reboot issue, Intel has shared some benchmark information which reveals the performance impact of the vulnerability fix. It is as follows:

  • For FlexibleIO, a benchmark simulating different types of I/O loads, results depend on many factors, including read/write mix, block size, drives and CPU utilization. When we conducted testing to stress the CPU (100% write case), we saw an 18% decrease in throughput performance because there was not CPU utilization headroom. When we used a 70/30 read/write model, we saw a 2% decrease in throughput performance. When CPU utilization was low (100% read case), as is the case with common storage provisioning, we saw an increase in CPU utilization, but no throughput performance impact.
  • Storage Performance Development Kit (SPDK) tests, which provide a set of tools and libraries for writing high performance, scalable, user-mode storage applications, were measured in multiple test configurations. Using SPDK iSCSI, we saw as much as a 25% impact while using only a single core. Using SPDK vHost, we saw no impact.

Meltdown and Spectre flaws have caused some real trouble for IT admins and general users. While they are a security hole, there is no need to panic but the fixes released by both software and hardware vendors are giving extra problems to end users. Linux and Windows systems are suffering from performance hits, and AMD users running Windows 7 and Windows 8.1 systems might get into an unbootable state.

Intel plans to deliver fixed beta microcode again to hardware vendors for validation by next week.

1 thought on “Beware: Meltdown/Spectre CPU Microcode Update Causes Reboots on All Intel Processors

  1. Shyam Reddy

    Thanks Sergey!

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *