You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It disables speculative execution mitigations
in the container.
For more information about that, please refer to:
opencontainers/runc#2430
Co-Authored-By: Aleksa Sarai <cyphar@cyphar.com>
Signed-off-by: Kenta Tada <Kenta.Tada@sony.com>
Copy file name to clipboardexpand all lines: config.md
+18
Original file line number
Diff line number
Diff line change
@@ -208,6 +208,23 @@ For Linux-based systems, the `process` object supports the following process-spe
208
208
For more information on how these two settings work together, see [the memory cgroup documentation section 10. OOM Contol][cgroup-v1-memory_2].
209
209
***`selinuxLabel`** (string, OPTIONAL) specifies the SELinux label for the process.
210
210
For more information about SELinux, see [SELinux documentation][selinux].
211
+
***`disableSpeculationMitigations`** (object, OPTIONAL) specifies whether CPU speculative execution mitigations should be disabled for the process. Several mitigations are auto-enabled under Linux, and can cause a noticeable performance impact (depending on your workload). Note that enabling this option may reduce the security properties of containers created with this configuration. See [the kernel documentation][speculative-control] for more information.
212
+
***`defaultRule`***(string, REQUIRED)* sets up the default rule to enable or disable the mitigations.
213
+
* `enable` - The mitigation of speculations without `exceptions` is disabled.
214
+
* `disable` - The mitigation of speculations without `exceptions` is enabled.
215
+
* `force-disable` - Same as disable, but it cannot be undone.
216
+
* `disable-noexec` - Same as disable, but the state will be cleared on execve(2).
217
+
***`exceptions`***(array of objects, OPTIONAL)* - the configuration of specific mitigations.
218
+
Each entry has the following structure:
219
+
***`mitigation`***(string, REQUIRED)* - the name of specific mitigation.
220
+
A valid list of mitigations.
221
+
* `store-bypass` - Speculative Store Bypass
222
+
* `indirect-branch` - Indirect Branch Speculation in User Processes
223
+
***`rule`***(string, REQUIRED)* - enables or disables the specific mitigation.
224
+
*`enable` - The mitigation of this particular speculation is disabled.
225
+
*`disable` - The mitigation of this particular speculation is enabled.
226
+
*`force-disable` - Same as disable, but it cannot be undone.
227
+
*`disable-noexec` - Same as disable, but the state will be cleared on execve(2).
211
228
212
229
### <aname="configUser" />User
213
230
@@ -973,3 +990,4 @@ Here is a full example `config.json` for reference.
0 commit comments