Intel admits reboot issues in Spectre patch affects newer Skylake and Kaby Lake processors...

Posted:
in Current Mac Hardware
Following Intel's release of patches to combat the Meltdown and Spectre vulnerabilities in its chips, the processor producer has confirmed that reports of PCs rebooting are not limited to just older chip generations, with newer releases also confirmed to be susceptible to rebooting when using the updated firmware.




In a blog post, Intel Vice President Navin Shenoy advises the firm has already issued firmware updates for 90 percent of its processors introduced over the last five years. While this has led to an issue for some customers using Broadwell and Haswell-based processors where the use of the patch causes desktops and servers to reboot on a frequent basis, Shenoy now confirms the same issues can occur for users of older and newer chip generations.

"We have determined that similar behavior occurs on other products in some configurations, including Ivy Bridge-, Sandy Bridge-, Skylake-, and Kaby Lake-based platforms," notes Shenoy in the post. "We have reproduced these issues internally and are making progress towards identifying the root cause."

Beta microcode for another patch will apparently be provided to vendors by next week, for validation purposes before distribution. Shenoy also advises customers wanting additional guidance on the issue to check out the Intel Security Center site, where regular updates on the status of the problem will be issued by the company.

The blog post also goes into detail about Intel's data center performance benchmarks, monitoring the impact the patches are making on server workloads. Noting that the performance impact will generally depend on specific workloads and configurations, data center tasks that incorporate a large number of user or kernel privilege changes and spend more time in a privileged mode will be more adversely impacted.

An impact of two percent and under has been measured in measures of integer and floating point throughput, Linpack, and other server-side benchmarks, effectively representing common workloads. A four percent impact was seen on the performance of an online transaction processing benchmark modeling a brokerage firm's customer-broker-stock exchange interactions.

Storage benchmarks wildly differed in terms of impact, with FlexibleIO benchmarks showing an 18 percent decrease in throughput performance during attempts to stress the processor, dropping to a two-percent decrease when using a 70/30 read/write model, and no throughput impact at all when CPU utilization was low.

Since the revelation of the Meltdown and Spectre vulnerabilities, Intel has been hit with multiple class-action lawsuits, both from law firms representing customers and Intel's shareholders. CEO Brian Krzanich has outlined Intel's response to the vulnerabilities, committing to follow the rules of responsible disclosure, to work closely with the rest of the tech industry to share innovations to avoid future vulnerabilities such as these, and to issue patches for every CPU released in the last five years by the end of January.

Apple has previously confirmed all of its Mac and iOS CPUs are affected by the vulnerabilities, and has already taken steps to counter the chip flaws with software updates.

Comments

  • Reply 1 of 6
    kpomkpom Posts: 617member
    Interesting that Apple isn’t listed as having joined the Security First pledge. 
  • Reply 2 of 6
    rob53rob53 Posts: 2,051member
    kpom said:
    Interesting that Apple isn’t listed as having joined the Security First pledge. 
    Why join when security first is in their DNA. 

    Before you flame me, think about all the times Apple has pledged the best security among computer users, lack of tracking for sale, and the most secure OTS phone for government and enterprise use. No other company comes close. 
    mwhiteracerhomie3repressthismagman1979watto_cobra
  • Reply 3 of 6
    coolfactorcoolfactor Posts: 1,486member
    Apple has previously confirmed all of its Mac and iOS CPUs are affected by the vulnerabilities, and has already taken steps to counter the chip flaws with software updates. 

    ... except Apple Watch. Unless there's new information?


  • Reply 4 of 6
    lkrupplkrupp Posts: 7,162member
    Apple has previously confirmed all of its Mac and iOS CPUs are affected by the vulnerabilities, and has already taken steps to counter the chip flaws with software updates. 

    ... except Apple Watch. Unless there's new information?


    No new information needed. From the beginning Apple has stated that the Watch is not affected by the Meltdown or Spectre flaws because the Watch processors do not use speculative execution techniques that are the cause the problem. The Watch is immune unless you think Apple is lying, incompetent or both. Which is it?
    edited January 2018 watto_cobra
  • Reply 5 of 6
    lkrupp said:
    Apple has previously confirmed all of its Mac and iOS CPUs are affected by the vulnerabilities, and has already taken steps to counter the chip flaws with software updates. 

    ... except Apple Watch. Unless there's new information?


    No new information needed. From the beginning Apple has stated that the Watch is not affected by the Meltdown or Spectre flaws because the Watch processors do not use speculative execution techniques that are the cause the problem. The Watch is immune unless you think Apple is lying, incompetent or both. Which is it?
    I think he was commenting on the "all … iOS" part. coolfactor forgot to explicitly exclude the Watch.
  • Reply 6 of 6
    thewbthewb Posts: 74member
    Since Apple Watch does not run iOS, the original statement which limited itself to only MacOS and iOS holds true.
    watto_cobra
Sign In or Register to comment.