The computer industry is currently reeling from the disclosure of multiple CPU vulnerabilities that strike at the very heart of multiple system architectures. Vendors are rolling out fixes for Meltdown and Spectre, but the process has not been entirely smooth with Microsoft accidentally bricking some AMD-based systems. By contrast, things at Google went so well you probably didn’t even notice it already patched many of its popular cloud services like Gmail. Now, Google has released some details on those stealthy patches.
Industry leaders were made aware of the CPU vulnerabilities several months ago. The goal was to get patches in place before disclosing, but these are complicated bugs that work at the lowest level in the silicon. That could mean noticeable performance hits when blocking the hacks. Google managed to devise patches for its cloud services that addressed Meltdown and the first variant of Spectre. These fixed didn’t cause any user complaints when they rolled out in September. The second Spectre variant was vastly more tricky to patch.
The second Spectre variant is what’s known as a branch target injection, which could allow an attacker to execute arbitrary code on a system. Google’s initial investigations suggested the only way to mitigate Spectre Variant 2 was to disable the CPU performance-optimizing features it targeted. However, in testing, Google found that made its services slow and inconsistent. The company pulled together hundreds of engineers in search of a better solution — a “Moonshot” as Google likes to say.
The moonshot came from Google engineer Paul Turner, and it’s known as “Retpoline.” This binary modification that ensures programs cannot be influenced by branch target injection. This allowed Google to protect its cloud services at compile time with no source code modifications and without disabling CPU performance features (read about it in detail here). Google says the final version of its Retpoline patch came with almost no performance hit. When it was rolled out recently, again, no one using services like Gmail noticed any performance degradation.
Google says that all its cloud platforms had patches for all three vulnerabilities by December. In addition, it has open sourced the compiler it used so other companies can use it to protect their users as well. As other vendors are still working on patching systems, Google notes Meltdown and Spectre are the most difficult fixes its engineers have encountered in a decade. It might take a while for everyone to get on the same page.
Should Spectre, Meltdown Be the Death Knell for the x86 Standard?
Spectre and Meltdown are serious CPU flaws, but do they warrant throwing out the entire closed-source CPU model?
Microsoft Pulls Spectre, Meltdown Patches for Older AMD Systems
Microsoft has halted the distribution of patches for Spectre, Meltdown on some AMD systems due to problems with BSODs and bricked systems.
AMD Releases Updated Risk Guidance on Meltdown, Spectre
AMD has clarified its own weaknesses against Spectre and Meltdown. One week later, things aren't quite as rosy as AMD hoped they'd be.
Intel Issuing Updates for Meltdown, Spectre Reboot Problem on Older Platforms
Intel's initial Meltdown and Spectre patches for older systems caused frequent reboots and other issues. The company thinks it has nailed those problems down.