1 .. SPDX-License-Identifier: GPL-2.0 1 .. SPDX-License-Identifier: GPL-2.0 2 2 3 Speculative Return Stack Overflow (SRSO) 3 Speculative Return Stack Overflow (SRSO) 4 ======================================== 4 ======================================== 5 5 6 This is a mitigation for the speculative retur 6 This is a mitigation for the speculative return stack overflow (SRSO) 7 vulnerability found on AMD processors. The mec 7 vulnerability found on AMD processors. The mechanism is by now the well 8 known scenario of poisoning CPU functional uni 8 known scenario of poisoning CPU functional units - the Branch Target 9 Buffer (BTB) and Return Address Predictor (RAP 9 Buffer (BTB) and Return Address Predictor (RAP) in this case - and then 10 tricking the elevated privilege domain (the ke 10 tricking the elevated privilege domain (the kernel) into leaking 11 sensitive data. 11 sensitive data. 12 12 13 AMD CPUs predict RET instructions using a Retu 13 AMD CPUs predict RET instructions using a Return Address Predictor (aka 14 Return Address Stack/Return Stack Buffer). In 14 Return Address Stack/Return Stack Buffer). In some cases, a non-architectural 15 CALL instruction (i.e., an instruction predict 15 CALL instruction (i.e., an instruction predicted to be a CALL but is 16 not actually a CALL) can create an entry in th 16 not actually a CALL) can create an entry in the RAP which may be used 17 to predict the target of a subsequent RET inst 17 to predict the target of a subsequent RET instruction. 18 18 19 The specific circumstances that lead to this v 19 The specific circumstances that lead to this varies by microarchitecture 20 but the concern is that an attacker can mis-tr 20 but the concern is that an attacker can mis-train the CPU BTB to predict 21 non-architectural CALL instructions in kernel 21 non-architectural CALL instructions in kernel space and use this to 22 control the speculative target of a subsequent 22 control the speculative target of a subsequent kernel RET, potentially 23 leading to information disclosure via a specul 23 leading to information disclosure via a speculative side-channel. 24 24 25 The issue is tracked under CVE-2023-20569. 25 The issue is tracked under CVE-2023-20569. 26 26 27 Affected processors 27 Affected processors 28 ------------------- 28 ------------------- 29 29 30 AMD Zen, generations 1-4. That is, all familie 30 AMD Zen, generations 1-4. That is, all families 0x17 and 0x19. Older 31 processors have not been investigated. 31 processors have not been investigated. 32 32 33 System information and options 33 System information and options 34 ------------------------------ 34 ------------------------------ 35 35 36 First of all, it is required that the latest m 36 First of all, it is required that the latest microcode be loaded for 37 mitigations to be effective. 37 mitigations to be effective. 38 38 39 The sysfs file showing SRSO mitigation status 39 The sysfs file showing SRSO mitigation status is: 40 40 41 /sys/devices/system/cpu/vulnerabilities/spec 41 /sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow 42 42 43 The possible values in this file are: 43 The possible values in this file are: 44 44 45 * 'Not affected': !! 45 - 'Not affected' The processor is not vulnerable 46 << 47 The processor is not vulnerable << 48 << 49 * 'Vulnerable': << 50 << 51 The processor is vulnerable and no mitigati << 52 << 53 * 'Vulnerable: No microcode': << 54 << 55 The processor is vulnerable, no microcode e << 56 functionality to address the vulnerability << 57 << 58 * 'Vulnerable: Safe RET, no microcode': << 59 << 60 The "Safe RET" mitigation (see below) has b << 61 kernel, but the IBPB-extending microcode ha << 62 space tasks may still be vulnerable. << 63 << 64 * 'Vulnerable: Microcode, no safe RET': << 65 << 66 Extended IBPB functionality microcode patch << 67 not address User->Kernel and Guest->Host tr << 68 does address User->User and VM->VM attack v << 69 << 70 Note that User->User mitigation is controll << 71 the Spectre v2 mitigation is selected: << 72 << 73 * conditional IBPB: << 74 << 75 where each process can select whether it << 76 around it PR_SPEC_DISABLE/_ENABLE etc, s << 77 << 78 * strict: << 79 << 80 i.e., always on - by supplying spectre_v << 81 command line << 82 << 83 (spec_rstack_overflow=microcode) << 84 << 85 * 'Mitigation: Safe RET': << 86 << 87 Combined microcode/software mitigation. It << 88 extended IBPB microcode patch functionality << 89 User->Kernel and Guest->Host transitions pr << 90 << 91 Selected by default or by spec_rstack_overf << 92 << 93 * 'Mitigation: IBPB': << 94 << 95 Similar protection as "safe RET" above but << 96 privilege domain crossings (User->Kernel, G << 97 << 98 (spec_rstack_overflow=ibpb) << 99 << 100 * 'Mitigation: IBPB on VMEXIT': << 101 << 102 Mitigation addressing the cloud provider sc << 103 transitions only. << 104 << 105 (spec_rstack_overflow=ibpb-vmexit) << 106 46 >> 47 - 'Vulnerable: no microcode' The processor is vulnerable, no >> 48 microcode extending IBPB functionality >> 49 to address the vulnerability has been >> 50 applied. >> 51 >> 52 - 'Mitigation: microcode' Extended IBPB functionality microcode >> 53 patch has been applied. It does not >> 54 address User->Kernel and Guest->Host >> 55 transitions protection but it does >> 56 address User->User and VM->VM attack >> 57 vectors. >> 58 >> 59 (spec_rstack_overflow=microcode) >> 60 >> 61 - 'Mitigation: safe RET' Software-only mitigation. It complements >> 62 the extended IBPB microcode patch >> 63 functionality by addressing User->Kernel >> 64 and Guest->Host transitions protection. >> 65 >> 66 Selected by default or by >> 67 spec_rstack_overflow=safe-ret >> 68 >> 69 - 'Mitigation: IBPB' Similar protection as "safe RET" above >> 70 but employs an IBPB barrier on privilege >> 71 domain crossings (User->Kernel, >> 72 Guest->Host). >> 73 >> 74 (spec_rstack_overflow=ibpb) >> 75 >> 76 - 'Mitigation: IBPB on VMEXIT' Mitigation addressing the cloud provider >> 77 scenario - the Guest->Host transitions >> 78 only. 107 79 >> 80 (spec_rstack_overflow=ibpb-vmexit) 108 81 109 In order to exploit vulnerability, an attacker 82 In order to exploit vulnerability, an attacker needs to: 110 83 111 - gain local access on the machine 84 - gain local access on the machine 112 85 113 - break kASLR 86 - break kASLR 114 87 115 - find gadgets in the running kernel in order 88 - find gadgets in the running kernel in order to use them in the exploit 116 89 117 - potentially create and pin an additional wo 90 - potentially create and pin an additional workload on the sibling 118 thread, depending on the microarchitecture 91 thread, depending on the microarchitecture (not necessary on fam 0x19) 119 92 120 - run the exploit 93 - run the exploit 121 94 122 Considering the performance implications of ea 95 Considering the performance implications of each mitigation type, the 123 default one is 'Mitigation: safe RET' which sh 96 default one is 'Mitigation: safe RET' which should take care of most 124 attack vectors, including the local User->Kern 97 attack vectors, including the local User->Kernel one. 125 98 126 As always, the user is advised to keep her/his 99 As always, the user is advised to keep her/his system up-to-date by 127 applying software updates regularly. 100 applying software updates regularly. 128 101 129 The default setting will be reevaluated when n 102 The default setting will be reevaluated when needed and especially when 130 new attack vectors appear. 103 new attack vectors appear. 131 104 132 As one can surmise, 'Mitigation: safe RET' doe 105 As one can surmise, 'Mitigation: safe RET' does come at the cost of some 133 performance depending on the workload. If one 106 performance depending on the workload. If one trusts her/his userspace 134 and does not want to suffer the performance im 107 and does not want to suffer the performance impact, one can always 135 disable the mitigation with spec_rstack_overfl 108 disable the mitigation with spec_rstack_overflow=off. 136 109 137 Similarly, 'Mitigation: IBPB' is another full 110 Similarly, 'Mitigation: IBPB' is another full mitigation type employing 138 an indirect branch prediction barrier after ha !! 111 an indrect branch prediction barrier after having applied the required 139 microcode patch for one's system. This mitigat 112 microcode patch for one's system. This mitigation comes also at 140 a performance cost. 113 a performance cost. 141 114 142 Mitigation: Safe RET !! 115 Mitigation: safe RET 143 -------------------- 116 -------------------- 144 117 145 The mitigation works by ensuring all RET instr 118 The mitigation works by ensuring all RET instructions speculate to 146 a controlled location, similar to how speculat 119 a controlled location, similar to how speculation is controlled in the 147 retpoline sequence. To accomplish this, the _ 120 retpoline sequence. To accomplish this, the __x86_return_thunk forces 148 the CPU to mispredict every function return us 121 the CPU to mispredict every function return using a 'safe return' 149 sequence. 122 sequence. 150 123 151 To ensure the safety of this mitigation, the k 124 To ensure the safety of this mitigation, the kernel must ensure that the 152 safe return sequence is itself free from attac 125 safe return sequence is itself free from attacker interference. In Zen3 153 and Zen4, this is accomplished by creating a B 126 and Zen4, this is accomplished by creating a BTB alias between the 154 untraining function srso_alias_untrain_ret() a 127 untraining function srso_alias_untrain_ret() and the safe return 155 function srso_alias_safe_ret() which results i 128 function srso_alias_safe_ret() which results in evicting a potentially 156 poisoned BTB entry and using that safe one for 129 poisoned BTB entry and using that safe one for all function returns. 157 130 158 In older Zen1 and Zen2, this is accomplished u 131 In older Zen1 and Zen2, this is accomplished using a reinterpretation 159 technique similar to Retbleed one: srso_untrai 132 technique similar to Retbleed one: srso_untrain_ret() and 160 srso_safe_ret(). 133 srso_safe_ret().
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.