• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Microsoft Halts Meltdown-Spectre Patches to AMD PCs as Some Turn Unbootable

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
46,277 (7.69/day)
Location
Hyderabad, India
System Name RBMK-1000
Processor AMD Ryzen 7 5700G
Motherboard ASUS ROG Strix B450-E Gaming
Cooling DeepCool Gammax L240 V2
Memory 2x 8GB G.Skill Sniper X
Video Card(s) Palit GeForce RTX 2080 SUPER GameRock
Storage Western Digital Black NVMe 512GB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) ASUS SupremeFX S1220A
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Gamdias Hermes E2
Software Windows 11 Pro
Microsoft late-Monday halted Meltdown and Spectre security patches to machines running AMD processors, as complaints of machines turning unbootable piled up. Apparently the latest KB4056892 (2018-01) Cumulative Update causes machines with AMD processors (well, chipsets) to refuse to boot. Microsoft has halted distributing patches to PCs running AMD processors, and issued a statement on the matter. In this statement, Microsoft blames AMD for not supplying its engineers with the right documentation to develop their patches (while absolving itself of any blame for not testing its patches on actual AMD-powered machines before releasing them).

"Microsoft has reports of customers with some AMD devices getting into an unbootable state after installing recent Windows operating system security updates," said Microsoft in its statement. "After investigating, Microsoft has determined that some AMD chipsets do not conform to the documentation previously provided to Microsoft to develop the Windows operating system mitigations to protect against the chipset vulnerabilities known as Spectre and Meltdown," it added. Microsoft is working with AMD to re-develop, test, and release security updates, on the double.



Update (09/01): AMD responded to this story, its statement posted verbatim is as follows.

AMD is aware of an issue with some older generation processors following installation of a Microsoft security update that was published over the weekend. AMD and Microsoft have been working on an update to resolve the issue and expect it to begin rolling out again for these impacted shortly.

View at TechPowerUp Main Site
 
Joined
Aug 20, 2007
Messages
20,709 (3.41/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage 2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches
Software Windows 11 Enterprise (legit), Gentoo Linux x64
I installed 4056892 with no issues. Wonder what I invited to happen...
 
Joined
Aug 13, 2010
Messages
5,380 (1.08/day)
What a huge collateral mess this whole thing is. If only Microsoft could intrude us a bit less with the horrendous combination of UEFI and their lack of proper QA
 
Joined
Feb 3, 2017
Messages
3,475 (1.33/day)
Processor R5 5600X
Motherboard ASUS ROG STRIX B550-I GAMING
Cooling Alpenföhn Black Ridge
Memory 2*16GB DDR4-2666 VLP @3800
Video Card(s) EVGA Geforce RTX 3080 XC3
Storage 1TB Samsung 970 Pro, 2TB Intel 660p
Display(s) ASUS PG279Q, Eizo EV2736W
Case Dan Cases A4-SFX
Power Supply Corsair SF600
Mouse Corsair Ironclaw Wireless RGB
Keyboard Corsair K60
VR HMD HTC Vive
Joined
Jan 31, 2005
Messages
2,050 (0.29/day)
Location
Denmark
System Name Commercial towing vehicle "Nostromo"
Processor 5800X3D
Motherboard X570 Unify
Cooling EK-AIO 360
Memory 32 GB Fury 3666 MHz
Video Card(s) 4070 Ti Eagle
Storage SN850 NVMe 1TB + Renegade NVMe 2TB + 870 EVO 4TB
Display(s) 25" Legion Y25g-30
Case Lian Li LanCool 216 v2
Audio Device(s) B & W PX7 S2e
Power Supply HX1500i
Mouse Harpe Ace Aim Lab Edition
Keyboard Scope II 96 Wireless
Software Windows 11 23H2
Do not know who to blame most....Intel or Intel :slap:
 
Joined
Feb 3, 2017
Messages
3,475 (1.33/day)
Processor R5 5600X
Motherboard ASUS ROG STRIX B550-I GAMING
Cooling Alpenföhn Black Ridge
Memory 2*16GB DDR4-2666 VLP @3800
Video Card(s) EVGA Geforce RTX 3080 XC3
Storage 1TB Samsung 970 Pro, 2TB Intel 660p
Display(s) ASUS PG279Q, Eizo EV2736W
Case Dan Cases A4-SFX
Power Supply Corsair SF600
Mouse Corsair Ironclaw Wireless RGB
Keyboard Corsair K60
VR HMD HTC Vive
Joined
Apr 16, 2010
Messages
3,455 (0.68/day)
Location
Portugal
System Name LenovoⓇ ThinkPad™ T430
Processor IntelⓇ Core™ i5-3210M processor (2 cores, 2.50GHz, 3MB cache), Intel Turbo Boost™ 2.0 (3.10GHz), HT™
Motherboard Lenovo 2344 (Mobile Intel QM77 Express Chipset)
Cooling Single-pipe heatsink + Delta fan
Memory 2x 8GB KingstonⓇ HyperX™ Impact 2133MHz DDR3L SO-DIMM
Video Card(s) Intel HD Graphics™ 4000 (GPU clk: 1100MHz, vRAM clk: 1066MHz)
Storage SamsungⓇ 860 EVO mSATA (250GB) + 850 EVO (500GB) SATA
Display(s) 14.0" (355mm) HD (1366x768) color, anti-glare, LED backlight, 200 nits, 16:9 aspect ratio, 300:1 co
Case ThinkPad Roll Cage (one-piece magnesium frame)
Audio Device(s) HD Audio, RealtekⓇ ALC3202 codec, DolbyⓇ Advanced Audio™ v2 / stereo speakers, 1W x 2
Power Supply ThinkPad 65W AC Adapter + ThinkPad Battery 70++ (9-cell)
Mouse TrackPointⓇ pointing device + UltraNav™, wide touchpad below keyboard + ThinkLight™
Keyboard 6-row, 84-key, ThinkVantage button, spill-resistant, multimedia Fn keys, LED backlight (PT Layout)
Software MicrosoftⓇ WindowsⓇ 10 x86-64 (22H2)
Found this by digging the links:
Based on other reports, this is effecting Windows 10, Windows 7, Windows Server 2008 R2, 32-bit and 64-bit installs for all older AMD CPUs. It is not related to the anti-virus registry key. Many reports are running standard Microsoft Security Essentials. AMD CPUs effected include Athlon, Sempron, Opteron and Turion:
  • AMD Athlon X2 6000+
  • AMD Athlon X2 5600+
  • AMD Athlon X2 5200+
  • AMD Athlon X2 5050e
  • AMD Athlon X2 4800+
  • AMD Athlon X2 4600+
  • AMD Athlon X2 4200+
  • AMD Athlon X2 3800+
  • AMD Athlon X2 BE-2400
  • AMD Opteron 285
  • AMD Opteron 2220
  • AMD Turion X2
Found Here.
@btarunr please update the image to reflect that the issue happens on older chipsets and/or add more information, Ryzen seems not to be affected so far. As it stands, it is vague and creates FUD around which AMD products this is being affected, with reports so far pointing to K8-era hardware. It is enough that this is already happening with Intel CPUs.

Minor edit for completeness.
 
Last edited:
Joined
Sep 6, 2013
Messages
2,973 (0.77/day)
Location
Athens, Greece
System Name 3 desktop systems: Gaming / Internet / HTPC
Processor Ryzen 5 5500 / Ryzen 5 4600G / FX 6300 (12 years latter got to see how bad Bulldozer is)
Motherboard MSI X470 Gaming Plus Max (1) / MSI X470 Gaming Plus Max (2) / Gigabyte GA-990XA-UD3
Cooling Νoctua U12S / Segotep T4 / Snowman M-T6
Memory 16GB G.Skill RIPJAWS 3600 / 16GB G.Skill Aegis 3200 / 16GB Kingston 2400MHz (DDR3)
Video Card(s) ASRock RX 6600 + GT 710 (PhysX)/ Vega 7 integrated / Radeon RX 580
Storage NVMes, NVMes everywhere / NVMes, more NVMes / Various storage, SATA SSD mostly
Display(s) Philips 43PUS8857/12 UHD TV (120Hz, HDR, FreeSync Premium) ---- 19'' HP monitor + BlitzWolf BW-V5
Case Sharkoon Rebel 12 / Sharkoon Rebel 9 / Xigmatek Midguard
Audio Device(s) onboard
Power Supply Chieftec 850W / Silver Power 400W / Sharkoon 650W
Mouse CoolerMaster Devastator III Plus / Coolermaster Devastator / Logitech
Keyboard CoolerMaster Devastator III Plus / Coolermaster Devastator / Logitech
Software Windows 10 / Windows 10 / Windows 7
If this patch is only for Spectre I will not say if this is AMD's or Microsoft's fault.
If this patch is also for Meltdown, then I would advice this F*(&**&( company to stop trying to make AMD processors look as bad, in this case, as Intel CPUs. Meltdown is an Intel ONLY issue.

In any case I will also advice this lovely company to buy a few AMD systems for proper testing and not assume that whatever works on Intel will also work on AMD. It's the same case as with game developers 5-10 years ago, before the GCN consoles, where they where testing their games only on Nvidia systems, making AMD's drivers look bad.
 
Joined
Dec 15, 2016
Messages
630 (0.24/day)
1- This is not affecting Ryzen CPUs at all-

2- This whole meltdown thing just shown me how much people around the world are biased towards Intel. Everyone, including media, are basically trying to hide what is the biggest security flaw ever in the history of technology and making it seem like is just a "patchable" thing that dissapears once you patch it.

We are talking about a flaw that can compromise ANY PC, be it consumer or enterprise. And everyone trying to convince people that they just need to patch it and that is WRONG. This meltdown thin is NO JOKE, a patch can always be reversed by a hacker, when the flaw is physically on the CPU. The correct posture from the media was to tell everyone to switch platform ASAP! And no I´m not over reacting. This is not happening because everyone knows Intle has like 95% of the market and it would be a disaster with everyone needing to change computer. But this just shown me how we are "controlled", we are shills, that´s all. Anyone is at risk right now using Intel CPUs with this meltdown thing. Your bank account details, your credit card infos, your passwords, everything is at risk. Yes the patch made it a bit more difficult, but what do you expect? Do you really think hackers will stop trying to do their thing because of a patch? A patch that they will eventually find ways to exploit and steal all your info from your kernel? Sure, good luck on that fellas.

The way media is handling this situation is shocking to me. Meanwhile Intel is announcing new products on CES (NUC with kaby lake + Vega, new coffee lake motherboards), the other brands are announcing new laptops and system with Intel CPUs like NOTHING HAS HAPPENED, and THIS IS WRONG. You are making everyone fool. NO ONE SHOULD USE CPUs WITH MELTDOWN ISSUE, PERIOD. DO NOT SUPPORT THESE COMPANIES TRYING TO FOOL YOU.

Sorry for the rant, but this whole situation made me mad because I´m into this kind of stuff and I know how harmful meltdown is.
 
Joined
Feb 3, 2017
Messages
3,475 (1.33/day)
Processor R5 5600X
Motherboard ASUS ROG STRIX B550-I GAMING
Cooling Alpenföhn Black Ridge
Memory 2*16GB DDR4-2666 VLP @3800
Video Card(s) EVGA Geforce RTX 3080 XC3
Storage 1TB Samsung 970 Pro, 2TB Intel 660p
Display(s) ASUS PG279Q, Eizo EV2736W
Case Dan Cases A4-SFX
Power Supply Corsair SF600
Mouse Corsair Ironclaw Wireless RGB
Keyboard Corsair K60
VR HMD HTC Vive
Manu_PT, the situation is more complex than that.

The better way to look at this is that Spectre is a new family of vulnerabilities, affecting most modern processors. Meltdown is a subset of that, a specific vulnerability affecting (almost) all Intel processors. The way things have turned out is a bit strange, especially considering the initial reaction and coverage.

Meltdown mitigation measures in the form of KAISER-type patches (KPMI in Linux and functionally similar patches for Windows and MacOS) are fairly effective. While not resolving the issue, it is an effective mitigation of this particular hardware issue. At this time, Linux has AMD processors excluded and same appears to be true for Windows patches (it's a bit more complex as the same update includes parts for Spectre mitigation). And yes, this causes a measurable performance hit for Intel processors. Initial estimate of maybe 5% in general and worst cases 30% appears to be accurate as well.

Meltdown patch cannot be reversed by hacker, at least not from within the patched operating system.

Spectre is like opening a whole can of worms and it does affect almost all current processors (all, if we look at desktop). There is no straightforward fix Spectre class of vulnerabilities. There are mitigation measures that are being taken. This includes updates to firmware, microcode, operating system kernels and even pieces of software separately.
 
Last edited:
Joined
Dec 30, 2010
Messages
2,082 (0.43/day)
Imagine you'd had a computer which u use for business related stuff. All your administration, financial and documents are on that. Then there comes a pushed update by MS, basicly breaking your computer. You need to dial in an expert to fucking solve the mess others did'nt test enough. Sue the shit out of MS for pushing idiot updates like this without any proper testing.
 
Joined
Mar 15, 2008
Messages
1,110 (0.19/day)
I'm on Intel but I won't update anything for at least a month. The latest version of Firefox is patched against this so I think I'm kinda covered. I will just wait and see if they make a better patch for this mess with less performance penalty. I advise anyone to wait for them to sort this out, this is an artificial panic, there are no viruses who exploit these things right now, so the best option is to wait for a better patch...
 

64K

Joined
Mar 13, 2014
Messages
6,104 (1.66/day)
Processor i7 7700k
Motherboard MSI Z270 SLI Plus
Cooling CM Hyper 212 EVO
Memory 2 x 8 GB Corsair Vengeance
Video Card(s) MSI RTX 2070 Super
Storage Samsung 850 EVO 250 GB and WD Black 4TB
Display(s) Dell 27 inch 1440p 144 Hz
Case Corsair Obsidian 750D Airflow Edition
Audio Device(s) Onboard
Power Supply EVGA SuperNova 850 W Gold
Mouse Logitech G502
Keyboard Logitech G105
Software Windows 10
It would seem to me that MS could afford to buy a few PCs for testing before spewing out updates and spend a little more on QA considering that for 2017 they had......

90 billion dollars in revenue
21 billion dollars in profit

and they are sitting on a massive hoard pile of cash of around 130 billion dollars.

https://www.microsoft.com/investor/reports/ar17/index.html
 
Joined
Oct 4, 2017
Messages
693 (0.29/day)
Location
France
Processor RYZEN 7 5800X3D
Motherboard Aorus B-550I Pro AX
Cooling HEATKILLER IV PRO , EKWB Vector FTW3 3080/3090 , Barrow res + Xylem DDC 4.2, SE 240 + Dabel 20b 240
Memory Viper Steel 4000 PVS416G400C6K
Video Card(s) EVGA 3080Ti FTW3
Storage XPG SX8200 Pro 512 GB NVMe + Samsung 980 1TB
Display(s) Dell S2721DGF
Case NR 200
Power Supply CORSAIR SF750
Mouse Logitech G PRO
Keyboard Meletrix Zoom 75 GT Silver
Software Windows 11 22H2
Agree with most peoples here , if anything else Microsoft should had tested some AMD systems before pushing the fix . Not only it makes sense but it's mandatory practice !
 
Joined
Dec 15, 2016
Messages
630 (0.24/day)
Manu_PT, the situation is more complex than that.

The better way to look at this is that Spectre is a new family of vulnerabilities, affecting most modern processors. Meltdown is a subset of that, a specific vulnerability affecting (almost) all Intel processors. The way things have turned out is a bit strange, especially considering the initial reaction and coverage.

Meltdown mitigation measures in the form of KAISER-type patches (KPMI in Linux and functionally similar patches for Windows and MacOS) are fairly effective. While not resolving the issue, it is an effective mitigation of this particular hardware issue. At this time, Linux has AMD processors excluded and same appears to be true for Windows patches (it's a bit more complex as the same update includes parts for Spectre mitigation). And yes, this causes a measurable performance hit for Intel processors. Initial estimate of maybe 5% in general and worst cases 30% appears to be accurate as well.

Meltdown patch cannot be reversed by hacker, at least not from within the patched operating system.

Spectre is like opening a whole can of worms and it does affect almost all current processors (all, if we look at desktop). There is no straightforward fix Spectre class of vulnerabilities. There are mitigation measures that are being taken. This includes updates to firmware, microcode, operating system kernels and even pieces of software separately.


Spectre is not as dangerous as Meltdown! Not even close! Also AMD chips are only affected by 1 variant, wich means it can only be hacked if you access it physically! Meltdown is not solved by a patch, it includes the whole working method of Intel CPUs and it exposes EVERYTHING, while Spectre expose random information that you need to be lucky to have what you want (bank details etc) and while it is harder to fix it is SO MUCH HARDER to exploit. Spectre to me isn´t anything different from any other security flaw around. It seems media is talking about spectre in a way to mask meltdown issue or something like that, wich I find shocking. Meltdown was fixed simply by using a patch (line of code) that tells the CPU not to do the things like it was suppose to, that´s all. That can be hacked in no time and the CPU will start doing its stuff like it was programmed to do and a hacker can steal all the information on the kernel again! Is completly unsafe for anyone in the world right now to use CPUs with this flaw, doesn´t matter how many patches you release.

Media and big corporations manipulate everyone. Is shocking. This meltdown thing is no joke and should be terminated immediatly. Yes I know it would give a big loss to a lot of people but one day things will get worse, trust me they will. The correct thing to do, if we lived in a world not controlled by superior corporations, was telling EVERYONE to change their systems immediatly. Not keep releasing CPUs with meltdown flaws and annoucing new product lines with it. All of this is shocking to me. I was never the conspiracies kind of guy, but this situation called my attention to the current world we live now. Because I´m into this stuff and I know what meltdown flaw is. It is shocking, trust me. No other flaw in the past beat this one, not even the PSN servers thing in 2011 or the XBlaster on Windows XP in 2001.

All my systems were Intel and I´m currently switching everything to AMD. No way I want to run a flawed CPU 24/7, I will not wait for some hacker to reverse the patch line codes and do his thing, now that the flaw is known worldwide and anyone that can read code lines can debunk it. Easy! Too easy!
 
Joined
Feb 3, 2017
Messages
3,475 (1.33/day)
Processor R5 5600X
Motherboard ASUS ROG STRIX B550-I GAMING
Cooling Alpenföhn Black Ridge
Memory 2*16GB DDR4-2666 VLP @3800
Video Card(s) EVGA Geforce RTX 3080 XC3
Storage 1TB Samsung 970 Pro, 2TB Intel 660p
Display(s) ASUS PG279Q, Eizo EV2736W
Case Dan Cases A4-SFX
Power Supply Corsair SF600
Mouse Corsair Ironclaw Wireless RGB
Keyboard Corsair K60
VR HMD HTC Vive
None of Spectre/Meltdown attacks require physical access.
Meltdown is effectively solved by the patches that are being rolled out. The core of what the Meltdown patches do is to clean cache (and TLB) during context switch.

Edit:
Pretty much all of Manu_PT's last post is wrong, except the first sentence.
Spectre is not as dangerous as Meltdown!
And even that is subjective. Meltdown seems to be much easier to mitigate.
 
Last edited:
Joined
Dec 30, 2010
Messages
2,082 (0.43/day)
That people actually believe, that a 'patch' will solve this thing, lol. Patch will be overwritten and your system is back to being vulnerable again. It takes some time for hackers to develop a serious exploit.
None of Spectre/Meltdown attacks require physical access.
Meltdown is effectively solved by the patches that are being rolled out. The core of what the Meltdown patches do is to clean cache (and TLB) during context switch.

Edit:
Pretty much all of Manu_PT's last post is wrong, except the first sentence.
And even that is subjective. Meltdown seems to be much easier to mitigate and for both this reason and others practical attacks are likely to be more dangerous for Spectre.

You sure? If a hacker would succesfully write his own patch to disable that patch, then that CPU goes back to doing normal thing again, making it vulnerable. He is right. The scale of Meltdown is easily underestimated. Every intel CPU is vulnerable. It would be a different story if that patch would bin applied by CPU micro code or BIOS fix, not Software / OS fix.
 

D3m

New Member
Joined
Jan 9, 2018
Messages
2 (0.00/day)
System Name Lenovo E575
Processor AMD A6-9500B
Hello.

Should I uninstall KB4056982 which i installed manualy? I have a AMD 7th. Generation APU A6-9500B.

Regards.
 
Joined
Feb 3, 2017
Messages
3,475 (1.33/day)
Processor R5 5600X
Motherboard ASUS ROG STRIX B550-I GAMING
Cooling Alpenföhn Black Ridge
Memory 2*16GB DDR4-2666 VLP @3800
Video Card(s) EVGA Geforce RTX 3080 XC3
Storage 1TB Samsung 970 Pro, 2TB Intel 660p
Display(s) ASUS PG279Q, Eizo EV2736W
Case Dan Cases A4-SFX
Power Supply Corsair SF600
Mouse Corsair Ironclaw Wireless RGB
Keyboard Corsair K60
VR HMD HTC Vive
You sure? If a hacker would succesfully write his own patch to disable that patch, then that CPU goes back to doing normal thing again, making it vulnerable. He is right. The scale of Meltdown is easily underestimated. Every intel CPU is vulnerable. It would be a different story if that patch would bin applied by CPU micro code or BIOS fix, not Software / OS fix.
If hacker can overwrite operating system kernel, he has no need for Meltdown, Spectre or any other vulnerability. The machine is already his.

Should I uninstall KB4056982 which i installed manualy? I have a AMD 7th. Generation APU A6-9500B.
It installed without issues? Have you noticed any problems after that? If not, there should be no reason to do anything.
Using Powershell you can check what the patch actually did apply:
https://betanews.com/2018/01/05/microsoft-powershell-meltdown-spectre-script/
For AMD CPUs, in the Speculation control settings for CVE-2017-5754 [rogue data cache load] section it should show - Hardware requires kernel VA shadowing: False
 
Joined
Dec 15, 2016
Messages
630 (0.24/day)
None of Spectre/Meltdown attacks require physical access.
Meltdown is effectively solved by the patches that are being rolled out. The core of what the Meltdown patches do is to clean cache (and TLB) during context switch.

Edit:
Pretty much all of Manu_PT's last post is wrong, except the first sentence.
And even that is subjective. Meltdown seems to be much easier to mitigate.

Sure, and a patch is... lines of code. Ever heard of reverse engineer? Simple as that and your CPU is back to what it was programmed for, put stuff on the kernel. Hackers can leak what they want nowadays, they can hack complex systems with important information, and open doors on really protected datasystems. And you think it is hard to reverse engineer a simple OS patch? Sure. Good luck dude!
 
Joined
Feb 3, 2017
Messages
3,475 (1.33/day)
Processor R5 5600X
Motherboard ASUS ROG STRIX B550-I GAMING
Cooling Alpenföhn Black Ridge
Memory 2*16GB DDR4-2666 VLP @3800
Video Card(s) EVGA Geforce RTX 3080 XC3
Storage 1TB Samsung 970 Pro, 2TB Intel 660p
Display(s) ASUS PG279Q, Eizo EV2736W
Case Dan Cases A4-SFX
Power Supply Corsair SF600
Mouse Corsair Ironclaw Wireless RGB
Keyboard Corsair K60
VR HMD HTC Vive
Sure, and a patch is... lines of code. Ever heard of reverse engineer? Simple as that and your CPU is back to what it was programmed for, put stuff on the kernel. Hackers can leak what they want nowadays, they can hack complex systems with important information, and open doors on really protected datasystems. And you think it is hard to reverse engineer a simple OS patch? Sure. Good luck dude!
Why reverse engineer? What these patches do is pretty much public knowledge.
 
Joined
Mar 20, 2008
Messages
885 (0.15/day)
System Name Raptor
Processor Core i7 13700K
Motherboard MSI Z690 Tomahawk WiFi
Cooling ArcticFreezer 420
Memory Corsair VENGEANCE® 32GB (2x16GB) DDR5 5600MHz C36
Video Card(s) Palit GameRock 3080Ti OC
Storage M.2 Addlink S70 Lite , Samsung SSD 980 PRO 2TB, SanDisk Ultra II 480GB, 1TB seagate
Display(s) ASUS TUF VG27AQL1A
Case LANCOOL III
Audio Device(s) Realtek® ALC4080 Codec + Philips SHP9500
Power Supply Seasonic GX-1000
Mouse G502 Proteus Spectrum
Keyboard ASUS CERBERUS
Software Windows 10
I got weird "irql_gt_zero_at_system_service" BSOD after the update on 2500K PC !!
 
Joined
Dec 15, 2016
Messages
630 (0.24/day)
Why? Because what that patch is doing is basically screaming at the CPU "no you won´t be doing this, you are blocked, find another route". Because if the CPU does what it was programmed to, it will put valuable information on a place where a hacker can access. Wich is what meltdown is, in easy non complex words. This is not your common insecure software code that can be 100% patched. This is on the core of the CPUs!

Is like having a powerful and very dangerous virus on your PC that you just can´t delete. You just wrote lines to control it and make it quiet. Very different things. Is still dangerous when you have a bomb that can be detonated at any time. Even a website can mess your meltdown patch and you are open again. This will be a never ending fight between hackers and continous OS patches. Yes because there are more to come, don´t worry. As soon as this one is debunked and easily exploitable.

If you have no problems by using a CPU at that constant risk, that´s up to you. I refuse to.
 
Top