Commit | Line | Data |
---|---|---|
b617cfc8 TG |
1 | =================== |
2 | Speculation Control | |
3 | =================== | |
4 | ||
dd079269 BP |
5 | Quite some CPUs have speculation-related misfeatures which are in |
6 | fact vulnerabilities causing data leaks in various forms even across | |
7 | privilege domains. | |
b617cfc8 TG |
8 | |
9 | The kernel provides mitigation for such vulnerabilities in various | |
dd079269 BP |
10 | forms. Some of these mitigations are compile-time configurable and some |
11 | can be supplied on the kernel command line. | |
b617cfc8 TG |
12 | |
13 | There is also a class of mitigations which are very expensive, but they can | |
14 | be restricted to a certain set of processes or tasks in controlled | |
15 | environments. The mechanism to control these mitigations is via | |
16 | :manpage:`prctl(2)`. | |
17 | ||
18 | There are two prctl options which are related to this: | |
19 | ||
20 | * PR_GET_SPECULATION_CTRL | |
21 | ||
22 | * PR_SET_SPECULATION_CTRL | |
23 | ||
24 | PR_GET_SPECULATION_CTRL | |
25 | ----------------------- | |
26 | ||
27 | PR_GET_SPECULATION_CTRL returns the state of the speculation misfeature | |
356e4bff | 28 | which is selected with arg2 of prctl(2). The return value uses bits 0-3 with |
b617cfc8 TG |
29 | the following meaning: |
30 | ||
71368af9 WL |
31 | ==== ====================== ================================================== |
32 | Bit Define Description | |
33 | ==== ====================== ================================================== | |
34 | 0 PR_SPEC_PRCTL Mitigation can be controlled per task by | |
35 | PR_SET_SPECULATION_CTRL. | |
36 | 1 PR_SPEC_ENABLE The speculation feature is enabled, mitigation is | |
37 | disabled. | |
38 | 2 PR_SPEC_DISABLE The speculation feature is disabled, mitigation is | |
39 | enabled. | |
40 | 3 PR_SPEC_FORCE_DISABLE Same as PR_SPEC_DISABLE, but cannot be undone. A | |
41 | subsequent prctl(..., PR_SPEC_ENABLE) will fail. | |
42 | 4 PR_SPEC_DISABLE_NOEXEC Same as PR_SPEC_DISABLE, but the state will be | |
43 | cleared on :manpage:`execve(2)`. | |
44 | ==== ====================== ================================================== | |
b617cfc8 TG |
45 | |
46 | If all bits are 0 the CPU is not affected by the speculation misfeature. | |
47 | ||
dd079269 | 48 | If PR_SPEC_PRCTL is set, then the per-task control of the mitigation is |
b617cfc8 TG |
49 | available. If not set, prctl(PR_SET_SPECULATION_CTRL) for the speculation |
50 | misfeature will fail. | |
51 | ||
52 | PR_SET_SPECULATION_CTRL | |
53 | ----------------------- | |
356e4bff | 54 | |
b617cfc8 TG |
55 | PR_SET_SPECULATION_CTRL allows to control the speculation misfeature, which |
56 | is selected by arg2 of :manpage:`prctl(2)` per task. arg3 is used to hand | |
356e4bff TG |
57 | in the control value, i.e. either PR_SPEC_ENABLE or PR_SPEC_DISABLE or |
58 | PR_SPEC_FORCE_DISABLE. | |
b617cfc8 TG |
59 | |
60 | Common error codes | |
61 | ------------------ | |
62 | ======= ================================================================= | |
63 | Value Meaning | |
64 | ======= ================================================================= | |
65 | EINVAL The prctl is not implemented by the architecture or unused | |
dd079269 | 66 | prctl(2) arguments are not 0. |
b617cfc8 | 67 | |
dd079269 | 68 | ENODEV arg2 is selecting a not supported speculation misfeature. |
b617cfc8 TG |
69 | ======= ================================================================= |
70 | ||
71 | PR_SET_SPECULATION_CTRL error codes | |
72 | ----------------------------------- | |
73 | ======= ================================================================= | |
74 | Value Meaning | |
75 | ======= ================================================================= | |
76 | 0 Success | |
77 | ||
78 | ERANGE arg3 is incorrect, i.e. it's neither PR_SPEC_ENABLE nor | |
dd079269 | 79 | PR_SPEC_DISABLE nor PR_SPEC_FORCE_DISABLE. |
b617cfc8 TG |
80 | |
81 | ENXIO Control of the selected speculation misfeature is not possible. | |
82 | See PR_GET_SPECULATION_CTRL. | |
356e4bff TG |
83 | |
84 | EPERM Speculation was disabled with PR_SPEC_FORCE_DISABLE and caller | |
85 | tried to enable it again. | |
b617cfc8 TG |
86 | ======= ================================================================= |
87 | ||
88 | Speculation misfeature controls | |
89 | ------------------------------- | |
90 | - PR_SPEC_STORE_BYPASS: Speculative Store Bypass | |
91 | ||
92 | Invocations: | |
93 | * prctl(PR_GET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, 0, 0, 0); | |
94 | * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, PR_SPEC_ENABLE, 0, 0); | |
95 | * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, PR_SPEC_DISABLE, 0, 0); | |
356e4bff | 96 | * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, PR_SPEC_FORCE_DISABLE, 0, 0); |
71368af9 | 97 | * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, PR_SPEC_DISABLE_NOEXEC, 0, 0); |
9137bb27 TG |
98 | |
99 | - PR_SPEC_INDIR_BRANCH: Indirect Branch Speculation in User Processes | |
100 | (Mitigate Spectre V2 style attacks against user processes) | |
101 | ||
102 | Invocations: | |
103 | * prctl(PR_GET_SPECULATION_CTRL, PR_SPEC_INDIRECT_BRANCH, 0, 0, 0); | |
104 | * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_INDIRECT_BRANCH, PR_SPEC_ENABLE, 0, 0); | |
105 | * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_INDIRECT_BRANCH, PR_SPEC_DISABLE, 0, 0); | |
106 | * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_INDIRECT_BRANCH, PR_SPEC_FORCE_DISABLE, 0, 0); |