speculation.h 1.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
  1. /*
  2. * Copyright (c) 2019 Intel Corporation.
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #ifndef ZEPHYR_MISC_SPECULATION_H
  7. #define ZEPHYR_MISC_SPECULATION_H
  8. #include <zephyr/types.h>
  9. /**
  10. * Sanitize an array index against bounds check bypass attacks aka the
  11. * Spectre V1 vulnerability.
  12. *
  13. * CPUs with speculative execution may speculate past any size checks and
  14. * leak confidential data due to analysis of micro-architectural properties.
  15. * This will unconditionally truncate any out-of-bounds indexes to
  16. * zero in the speculative execution path using bit twiddling instead of
  17. * any branch instructions.
  18. *
  19. * Example usage:
  20. *
  21. * if (index < size) {
  22. * index = k_array_index_sanitize(index, size);
  23. * data = array[index];
  24. * }
  25. *
  26. * @param index Untrusted array index which has been validated, but not used
  27. * @param array_size Size of the array
  28. * @return The original index value if < size, or 0
  29. */
  30. static inline uint32_t k_array_index_sanitize(uint32_t index, uint32_t array_size)
  31. {
  32. #ifdef CONFIG_BOUNDS_CHECK_BYPASS_MITIGATION
  33. int32_t signed_index = index, signed_array_size = array_size;
  34. /* Take the difference between index and max.
  35. * A proper value will result in a negative result. We also AND in
  36. * the complement of index, so that we automatically reject any large
  37. * indexes which would wrap around the difference calculation.
  38. *
  39. * Sign-extend just the sign bit to produce a mask of all 1s (accept)
  40. * or all 0s (truncate).
  41. */
  42. uint32_t mask = ((signed_index - signed_array_size) & ~signed_index) >> 31;
  43. return index & mask;
  44. #else
  45. ARG_UNUSED(array_size);
  46. return index;
  47. #endif /* CONFIG_BOUNDS_CHECK_BYPASS_MITIGATION */
  48. }
  49. #endif /* ZEPHYR_MISC_SPECULATION_H */