{"id":9765,"date":"2019-05-17T00:16:00","date_gmt":"2019-05-16T22:16:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=9765"},"modified":"2023-07-19T16:23:59","modified_gmt":"2023-07-19T14:23:59","slug":"windows-10-v1809-retpoline-is-automatically-active-now","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/05\/17\/windows-10-v1809-retpoline-is-automatically-active-now\/","title":{"rendered":"Windows 10 V1809: Retpoline is automatically active now"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/win102.jpg\" width=\"58\" height=\"58\">[<a href=\"https:\/\/www.borncity.com\/blog\/2019\/05\/16\/windows-10-v1809-retpoline-automatisch-aktiviert\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Microsoft has automatically activated mitigation against Spectre V2 through Retpoline compiler technology in the kernel for Windows 10 Version 1809 and Windows Server 2019 as of May 14, 2019..<\/p>\n<p><!--more--><\/p>\n<h2>Background information about Retpoline<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg06.met.vgwort.de\/na\/3fb0aead121f4b1182ca9a7a56e82ed5\" width=\"1\" height=\"1\">At the beginning of the year, the attack methods Spectre and Meltdown, which work at the CPU level, became publicly known. As a result, Intel and Microsoft released a number of Meltdown and Spectre Microcode patches. An unwelcome side effect: Some patches caused massive performance losses in the systems.  <\/p>\n<p>On the other hand, Google software developers had the idea to mitigate speculative side channel attacks for Spectre (and Meltdown) using special code constructs. The technique is called Retpoline and was described in <a href=\"https:\/\/security.googleblog.com\/2018\/01\/more-details-about-mitigations-for-cpu_4.html\" target=\"_blank\" rel=\"noopener noreferrer\">this Google document<\/a>. Google used the Retpoline technique to patch its own servers for the cloud.  <\/p>\n<p>This technology has long been adopted in the Linux kernel. In March 2019, Microsoft's customer Microsoft announced that Retpoline would also be adopted in Windows 10. The statement at that time: From Windows 10 19H1 Retpoline is used in the Windows kernel as protection against Spectre V2 attacks. In autumn 2018 I had reported about it in the article <a href=\"https:\/\/borncity.com\/win\/2018\/10\/20\/windows-10-19h1-with-retpoline-spectre-v2-mitigation\/\">Windows 10 19H1 with Retpoline Spectre V2 Mitigation<\/a>.  <\/p>\n<p>Within the blog post <a href=\"https:\/\/borncity.com\/win\/2019\/03\/08\/windows-10-v1809-enable-retpoline-spectre-v2-protection\/\">Windows 10 V1809: Enable Retpoline Spectre V2 protection<\/a> I also mentioned Microsoft's plans to do a Retpoline backport for older Windows 10 versions. In the blog post <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Kernel-Internals\/Mitigating-Spectre-variant-2-with-Retpoline-on-Windows\/ba-p\/295618\">Mitigating Spectre variant 2 with Retpoline on Windows<\/a> Microsoft had already published some information about Retpoline and Windows 10 at the beginning of December 2018.  <\/p>\n<p>With the update KB44828887 for Windows 10 Version 1809 published on March 1, 2019, Retpoline was introduced for this Windows version.  <\/p>\n<blockquote>\n<p>Enables \"Retpoline\" for Windows on certain devices, which may improve performance of Spectre variant 2 mitigations (CVE-2017-5715).<\/p>\n<\/blockquote>\n<p>Retpoline protection wasn't activated, though. You may have had to set registry entries to enable this protection in the kernel (see <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Kernel-Internals\/Mitigating-Spectre-variant-2-with-Retpoline-on-Windows\/ba-p\/295618\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>).  <\/p>\n<h2>Update KB4494441 activates Retpoline<\/h2>\n<p>As of May 14, 2019, Microsoft has updated its techcommunity article <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Kernel-Internals\/Mitigating-Spectre-variant-2-with-Retpoline-on-Windows\/ba-p\/295618\" target=\"_blank\" rel=\"noopener noreferrer\">Mitigating Spectre variant 2 with Retpoline on Windows<\/a>. <\/p>\n<blockquote>\n<p>We're happy to announce that today we've updated Retpoline cloud configuration to enable it for all supported devices!* In addition, with the May 14 Patch Tuesday update, we've removed the dependence on cloud configuration such that even those customers who may not be receiving cloud configuration updates can experience Retpoline performance gains.<\/p>\n<\/blockquote>\n<p><em><\/em>Retpoline is enabled by default on devices running Windows 10, version 1809 and Windows Server 2019 or newer <i>and <\/i>which meet the following conditions:&nbsp;&nbsp; <\/p>\n<blockquote>\n<ul>\n<li>Spectre, Variant 2 (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/adv180002\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2017-5715<\/a>) mitigation is enabled.\n<ul>\n<li>For Client SKUs, Spectre Variant 2 mitigation is <u>enabled<\/u> by default\n<li>For Server SKUs, Spectre Variant 2 mitigation is <u>disabled<\/u> by default. To realize the benefits of Retpoline, IT Admins can enable it on servers <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\/windows-server-speculative-execution-side-channel-vulnerabilities-prot\" target=\"_blank\" rel=\"noopener noreferrer\">following this guidance<\/a>.<\/li>\n<\/ul>\n<li>Supported microcode\/firmware updates are applied to the machine.<\/li>\n<\/ul>\n<\/blockquote>\n<p>But this conditions may cause issues, as you can read within <a href=\"https:\/\/twitter.com\/PhantomofMobile\/status\/1128585156049031169?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener noreferrer\">this tweet<\/a>. <\/p>\n<p><strong>Similar articles<\/strong><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/10\/20\/windows-10-19h1-with-retpoline-spectre-v2-mitigation\/\">Windows 10 19H1 with Retpoline Spectre V2 Mitigation<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2019\/03\/08\/windows-10-v1809-enable-retpoline-spectre-v2-protection\/\">Windows 10 V1809: Enable Retpoline Spectre V2 protection<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/12\/08\/new-splitspectre-attack-windows-retpoline-spectre-mitigation\/\">New SplitSpectre-Attack; Windows Retpoline Spectre Mitigation<\/a><br \/>Patchday Windows 10 Updates (May 14, 2019)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Microsoft has automatically activated mitigation against Spectre V2 through Retpoline compiler technology in the kernel for Windows 10 Version 1809 and Windows Server 2019 as of May 14, 2019..<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[69,1604],"class_list":["post-9765","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-security","tag-windows-10-v1809"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/9765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=9765"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/9765\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=9765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=9765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=9765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}