Microsoft Customers Reporting 'Unbootable' AMD PCs After Installing Windows Security

Microsoft Customers Reporting 'Unbootable' AMD PCs After Installing Windows Security

Microsoft Customers Reporting 'Unbootable' AMD PCs After Installing Windows Security

If you own an AMD system and Windows 10 is telling you to update, perhaps hold off on that for another week or so, otherwise your system may enter an unbootable state.

To avoid having their computers rendered unusable, users are advised to pause Automatic Updates until Microsoft is able to fix the issue.

Numerous users wrote of being unable to get past the Windows 10 splash screen on start-up.

"Based on our most recent PC benchmarking, we continue to expect that the performance impact should not be significant for average computer users", Intel said in a statement.

It's worth noting that neither Microsoft nor Intel is intentionally slowing down the older versions of Windows with previous-generation processors. He also warned Windows Server administrators of "a more significant performance impact when you enable the mitigations to isolate untrusted code within a Windows Server instance". "This is why you want to be careful to evaluate the risk of untrusted code for each Windows Server instance, and balance the security versus performance tradeoff for your environment", says Myerson.

Shares of Intel slipped on the news. Hence until the security update gets fixed for Windows PCs with affected AMD chips, they can not be updated to receive the latest protections.

Meltdown and Spectre fiasco is affecting nearly all Windows PCs and Phones and with processors manufactured by Intel, AMD, and ARM.

Intel said its processors would be affected based on the type of operations the CPU would carry out, saying that syscall-heavy processes would suffer the most.

In a blog post from Windows chief Terry Myerson, Microsoft reveals that Windows 10 machines running Skylake, Kaby Lake, or newer processors have been benchmarked to show "single-digit slowdowns" and that the company doesn't expect "most users to notice a change because these percentages are reflected in milliseconds". Only the second, the "branch target injection" vulnerability, shows any performance impact, Microsoft said.

The Meltdown-Spectre patch will not be installed on PCs running the affected anti-virus products unless the vendor in question has added a registry value in the Windows configuration database, to show it's safe to update the system. RedHat cut down the performance penalties on its systems to a range from 1% to 20%. The company said it did not have a comprehensive picture of how the patches would affect server workloads. EpicGames and BranchMetrics both reported issues after applying the Meltdown and Spectre patches.

The company is working with AMD to overcome the problems, but it might take a while to test the patch.

Related news