Google Details Spectre and Meltdown Fixes for Its Cloud Services
The computer industry is currently reeling from the disclosure of multiple CPU vulnerabilities that strike at the very heart of multiple system architectures. Vendors are rolling out fixes for Meltdown and Spectre, but the process has not been entirely smooth with Microsoft accidentally bricking some AMD-based systems. By contrast, things at Google went so well you probably didn’t even notice it already patched many of its popular cloud services like Gmail. Now, Google has released some details on those stealthy patches.
Industry leaders were made aware of the CPU vulnerabilities several months ago. The goal was to get patches in place before disclosing, but these are complicated bugs that work at the lowest level in the silicon. That could mean noticeable performance hits when blocking the hacks. Google managed to devise patches for its cloud services that addressed Meltdown and the first variant of Spectre. These fixed didn’t cause any user complaints when they rolled out in September. The second Spectre variant was vastly more tricky to patch.
The second Spectre variant is what’s known as a branch target injection, which could allow an attacker to execute arbitrary code on a system. Google’s initial investigations suggested the only way to mitigate Spectre Variant 2 was to disable the CPU performance-optimizing features it targeted. However, in testing, Google found that made its services slow and inconsistent. The company pulled together hundreds of engineers in search of a better solution — a “Moonshot” as Google likes to say.
The moonshot came from Google engineer Paul Turner, and it’s known as “Retpoline.” This binary modification that ensures programs cannot be influenced by branch target injection. This allowed Google to protect its cloud services at compile time with no source code modifications and without disabling CPU performance features (read about it in detail here). Google says the final version of its Retpoline patch came with almost no performance hit. When it was rolled out recently, again, no one using services like Gmail noticed any performance degradation.
Google says that all its cloud platforms had patches for all three vulnerabilities by December. In addition, it has open sourced the compiler it used so other companies can use it to protect their users as well. As other vendors are still working on patching systems, Google notes Meltdown and Spectre are the most difficult fixes its engineers have encountered in a decade. It might take a while for everyone to get on the same page.
Continue reading
AMD’s Reliance on TSMC Isn’t Harming the Company’s Growth Prospects
It has been difficult to buy high-end PC components for nearly six months. There are a number of reasons for this, including pandemic-related impacts, the related surge in demand for all computing hardware, and supply shortages. A lot of eyeballs have been trained on foundries like TSMC, to the point that national governments have put…
AMD Discloses a Spectre-Like Vulnerability in Zen 3 CPUs
AMD has disclosed a potential security vulnerability on its Zen 3 CPUs with similarities to the Spectre attack from several years ago, but the company believes the risk is minimal.
Intel, Researchers Debate Whether New Spectre-Type Vulnerabilities Exist
Researchers are claiming to have found a new type of Spectre attack that bypasses all existing protections, but that framing isn't well supported.
LG Announces Monitor with Crazy 16:18 Aspect Ratio
LG's new panel eschews the ultrawide Zeitgeist for a monitor that's basically a really big square.