xref: /aosp_15_r20/external/vixl/src/aarch64/pointer-auth-aarch64.cc (revision f5c631da2f1efdd72b5fd1e20510e4042af13d77)
1*f5c631daSSadaf Ebrahimi // Copyright 2018, VIXL authors
2*f5c631daSSadaf Ebrahimi // All rights reserved.
3*f5c631daSSadaf Ebrahimi //
4*f5c631daSSadaf Ebrahimi // Redistribution and use in source and binary forms, with or without
5*f5c631daSSadaf Ebrahimi // modification, are permitted provided that the following conditions are met:
6*f5c631daSSadaf Ebrahimi //
7*f5c631daSSadaf Ebrahimi //   * Redistributions of source code must retain the above copyright notice,
8*f5c631daSSadaf Ebrahimi //     this list of conditions and the following disclaimer.
9*f5c631daSSadaf Ebrahimi //   * Redistributions in binary form must reproduce the above copyright notice,
10*f5c631daSSadaf Ebrahimi //     this list of conditions and the following disclaimer in the documentation
11*f5c631daSSadaf Ebrahimi //     and/or other materials provided with the distribution.
12*f5c631daSSadaf Ebrahimi //   * Neither the name of ARM Limited nor the names of its contributors may be
13*f5c631daSSadaf Ebrahimi //     used to endorse or promote products derived from this software without
14*f5c631daSSadaf Ebrahimi //     specific prior written permission.
15*f5c631daSSadaf Ebrahimi //
16*f5c631daSSadaf Ebrahimi // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS CONTRIBUTORS "AS IS" AND
17*f5c631daSSadaf Ebrahimi // ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18*f5c631daSSadaf Ebrahimi // WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
19*f5c631daSSadaf Ebrahimi // DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE
20*f5c631daSSadaf Ebrahimi // FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21*f5c631daSSadaf Ebrahimi // DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
22*f5c631daSSadaf Ebrahimi // SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
23*f5c631daSSadaf Ebrahimi // CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24*f5c631daSSadaf Ebrahimi // OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
25*f5c631daSSadaf Ebrahimi // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26*f5c631daSSadaf Ebrahimi 
27*f5c631daSSadaf Ebrahimi #ifdef VIXL_INCLUDE_SIMULATOR_AARCH64
28*f5c631daSSadaf Ebrahimi 
29*f5c631daSSadaf Ebrahimi #include "simulator-aarch64.h"
30*f5c631daSSadaf Ebrahimi 
31*f5c631daSSadaf Ebrahimi #include "utils-vixl.h"
32*f5c631daSSadaf Ebrahimi 
33*f5c631daSSadaf Ebrahimi namespace vixl {
34*f5c631daSSadaf Ebrahimi namespace aarch64 {
35*f5c631daSSadaf Ebrahimi 
36*f5c631daSSadaf Ebrahimi // Randomly generated example keys for simulating only.
37*f5c631daSSadaf Ebrahimi const Simulator::PACKey Simulator::kPACKeyIA = {0xc31718727de20f71,
38*f5c631daSSadaf Ebrahimi                                                 0xab9fd4e14b2fec51,
39*f5c631daSSadaf Ebrahimi                                                 0};
40*f5c631daSSadaf Ebrahimi const Simulator::PACKey Simulator::kPACKeyIB = {0xeebb163b474e04c8,
41*f5c631daSSadaf Ebrahimi                                                 0x5267ac6fc280fb7c,
42*f5c631daSSadaf Ebrahimi                                                 1};
43*f5c631daSSadaf Ebrahimi const Simulator::PACKey Simulator::kPACKeyDA = {0x5caef808deb8b1e2,
44*f5c631daSSadaf Ebrahimi                                                 0xd347cbc06b7b0f77,
45*f5c631daSSadaf Ebrahimi                                                 0};
46*f5c631daSSadaf Ebrahimi const Simulator::PACKey Simulator::kPACKeyDB = {0xe06aa1a949ba8cc7,
47*f5c631daSSadaf Ebrahimi                                                 0xcfde69e3db6d0432,
48*f5c631daSSadaf Ebrahimi                                                 1};
49*f5c631daSSadaf Ebrahimi 
50*f5c631daSSadaf Ebrahimi // The general PAC key isn't intended to be used with AuthPAC so we ensure the
51*f5c631daSSadaf Ebrahimi // key number is invalid and asserts if used incorrectly.
52*f5c631daSSadaf Ebrahimi const Simulator::PACKey Simulator::kPACKeyGA = {0xfcd98a44d564b3d5,
53*f5c631daSSadaf Ebrahimi                                                 0x6c56df1904bf0ddc,
54*f5c631daSSadaf Ebrahimi                                                 -1};
55*f5c631daSSadaf Ebrahimi 
GetNibble(uint64_t in_data,int position)56*f5c631daSSadaf Ebrahimi static uint64_t GetNibble(uint64_t in_data, int position) {
57*f5c631daSSadaf Ebrahimi   return (in_data >> position) & 0xf;
58*f5c631daSSadaf Ebrahimi }
59*f5c631daSSadaf Ebrahimi 
ShuffleNibbles(uint64_t in_data)60*f5c631daSSadaf Ebrahimi static uint64_t ShuffleNibbles(uint64_t in_data) {
61*f5c631daSSadaf Ebrahimi   static int in_positions[16] =
62*f5c631daSSadaf Ebrahimi       {4, 36, 52, 40, 44, 0, 24, 12, 56, 60, 8, 32, 16, 28, 20, 48};
63*f5c631daSSadaf Ebrahimi   uint64_t out_data = 0;
64*f5c631daSSadaf Ebrahimi   for (int i = 0; i < 16; i++) {
65*f5c631daSSadaf Ebrahimi     out_data |= GetNibble(in_data, in_positions[i]) << (4 * i);
66*f5c631daSSadaf Ebrahimi   }
67*f5c631daSSadaf Ebrahimi   return out_data;
68*f5c631daSSadaf Ebrahimi }
69*f5c631daSSadaf Ebrahimi 
SubstituteNibbles(uint64_t in_data)70*f5c631daSSadaf Ebrahimi static uint64_t SubstituteNibbles(uint64_t in_data) {
71*f5c631daSSadaf Ebrahimi   // Randomly chosen substitutes.
72*f5c631daSSadaf Ebrahimi   static uint64_t subs[16] =
73*f5c631daSSadaf Ebrahimi       {4, 7, 3, 9, 10, 14, 0, 1, 15, 2, 8, 6, 12, 5, 11, 13};
74*f5c631daSSadaf Ebrahimi   uint64_t out_data = 0;
75*f5c631daSSadaf Ebrahimi   for (int i = 0; i < 16; i++) {
76*f5c631daSSadaf Ebrahimi     int index = (in_data >> (4 * i)) & 0xf;
77*f5c631daSSadaf Ebrahimi     out_data |= subs[index] << (4 * i);
78*f5c631daSSadaf Ebrahimi   }
79*f5c631daSSadaf Ebrahimi   return out_data;
80*f5c631daSSadaf Ebrahimi }
81*f5c631daSSadaf Ebrahimi 
82*f5c631daSSadaf Ebrahimi // Rotate nibble to the left by the amount specified.
RotNibble(uint64_t in_cell,int amount)83*f5c631daSSadaf Ebrahimi static uint64_t RotNibble(uint64_t in_cell, int amount) {
84*f5c631daSSadaf Ebrahimi   VIXL_ASSERT((amount >= 0) && (amount <= 3));
85*f5c631daSSadaf Ebrahimi 
86*f5c631daSSadaf Ebrahimi   in_cell &= 0xf;
87*f5c631daSSadaf Ebrahimi   uint64_t temp = (in_cell << 4) | in_cell;
88*f5c631daSSadaf Ebrahimi   return (temp >> (4 - amount)) & 0xf;
89*f5c631daSSadaf Ebrahimi }
90*f5c631daSSadaf Ebrahimi 
BigShuffle(uint64_t in_data)91*f5c631daSSadaf Ebrahimi static uint64_t BigShuffle(uint64_t in_data) {
92*f5c631daSSadaf Ebrahimi   uint64_t out_data = 0;
93*f5c631daSSadaf Ebrahimi   for (int i = 0; i < 4; i++) {
94*f5c631daSSadaf Ebrahimi     uint64_t n12 = GetNibble(in_data, 4 * (i + 12));
95*f5c631daSSadaf Ebrahimi     uint64_t n8 = GetNibble(in_data, 4 * (i + 8));
96*f5c631daSSadaf Ebrahimi     uint64_t n4 = GetNibble(in_data, 4 * (i + 4));
97*f5c631daSSadaf Ebrahimi     uint64_t n0 = GetNibble(in_data, 4 * (i + 0));
98*f5c631daSSadaf Ebrahimi 
99*f5c631daSSadaf Ebrahimi     uint64_t t0 = RotNibble(n8, 2) ^ RotNibble(n4, 1) ^ RotNibble(n0, 1);
100*f5c631daSSadaf Ebrahimi     uint64_t t1 = RotNibble(n12, 1) ^ RotNibble(n4, 2) ^ RotNibble(n0, 1);
101*f5c631daSSadaf Ebrahimi     uint64_t t2 = RotNibble(n12, 2) ^ RotNibble(n8, 1) ^ RotNibble(n0, 1);
102*f5c631daSSadaf Ebrahimi     uint64_t t3 = RotNibble(n12, 1) ^ RotNibble(n8, 1) ^ RotNibble(n4, 2);
103*f5c631daSSadaf Ebrahimi 
104*f5c631daSSadaf Ebrahimi     out_data |= t3 << (4 * (i + 0));
105*f5c631daSSadaf Ebrahimi     out_data |= t2 << (4 * (i + 4));
106*f5c631daSSadaf Ebrahimi     out_data |= t1 << (4 * (i + 8));
107*f5c631daSSadaf Ebrahimi     out_data |= t0 << (4 * (i + 12));
108*f5c631daSSadaf Ebrahimi   }
109*f5c631daSSadaf Ebrahimi   return out_data;
110*f5c631daSSadaf Ebrahimi }
111*f5c631daSSadaf Ebrahimi 
112*f5c631daSSadaf Ebrahimi // A simple, non-standard hash function invented for simulating. It mixes
113*f5c631daSSadaf Ebrahimi // reasonably well, however it is unlikely to be cryptographically secure and
114*f5c631daSSadaf Ebrahimi // may have a higher collision chance than other hashing algorithms.
ComputePAC(uint64_t data,uint64_t context,PACKey key)115*f5c631daSSadaf Ebrahimi uint64_t Simulator::ComputePAC(uint64_t data, uint64_t context, PACKey key) {
116*f5c631daSSadaf Ebrahimi   uint64_t working_value = data ^ key.high;
117*f5c631daSSadaf Ebrahimi   working_value = BigShuffle(working_value);
118*f5c631daSSadaf Ebrahimi   working_value = ShuffleNibbles(working_value);
119*f5c631daSSadaf Ebrahimi   working_value ^= key.low;
120*f5c631daSSadaf Ebrahimi   working_value = ShuffleNibbles(working_value);
121*f5c631daSSadaf Ebrahimi   working_value = BigShuffle(working_value);
122*f5c631daSSadaf Ebrahimi   working_value ^= context;
123*f5c631daSSadaf Ebrahimi   working_value = SubstituteNibbles(working_value);
124*f5c631daSSadaf Ebrahimi   working_value = BigShuffle(working_value);
125*f5c631daSSadaf Ebrahimi   working_value = SubstituteNibbles(working_value);
126*f5c631daSSadaf Ebrahimi 
127*f5c631daSSadaf Ebrahimi   return working_value;
128*f5c631daSSadaf Ebrahimi }
129*f5c631daSSadaf Ebrahimi 
130*f5c631daSSadaf Ebrahimi // The TTBR is selected by bit 63 or 55 depending on TBI for pointers without
131*f5c631daSSadaf Ebrahimi // codes, but is always 55 once a PAC code is added to a pointer. For this
132*f5c631daSSadaf Ebrahimi // reason, it must be calculated at the call site.
CalculatePACMask(uint64_t ptr,PointerType type,int ttbr)133*f5c631daSSadaf Ebrahimi uint64_t Simulator::CalculatePACMask(uint64_t ptr, PointerType type, int ttbr) {
134*f5c631daSSadaf Ebrahimi   int bottom_pac_bit = GetBottomPACBit(ptr, ttbr);
135*f5c631daSSadaf Ebrahimi   int top_pac_bit = GetTopPACBit(ptr, type);
136*f5c631daSSadaf Ebrahimi   return ExtractUnsignedBitfield64(top_pac_bit,
137*f5c631daSSadaf Ebrahimi                                    bottom_pac_bit,
138*f5c631daSSadaf Ebrahimi                                    0xffffffffffffffff & ~kTTBRMask)
139*f5c631daSSadaf Ebrahimi          << bottom_pac_bit;
140*f5c631daSSadaf Ebrahimi }
141*f5c631daSSadaf Ebrahimi 
AuthPAC(uint64_t ptr,uint64_t context,PACKey key,PointerType type)142*f5c631daSSadaf Ebrahimi uint64_t Simulator::AuthPAC(uint64_t ptr,
143*f5c631daSSadaf Ebrahimi                             uint64_t context,
144*f5c631daSSadaf Ebrahimi                             PACKey key,
145*f5c631daSSadaf Ebrahimi                             PointerType type) {
146*f5c631daSSadaf Ebrahimi   VIXL_ASSERT((key.number == 0) || (key.number == 1));
147*f5c631daSSadaf Ebrahimi 
148*f5c631daSSadaf Ebrahimi   uint64_t pac_mask = CalculatePACMask(ptr, type, (ptr >> 55) & 1);
149*f5c631daSSadaf Ebrahimi   uint64_t original_ptr =
150*f5c631daSSadaf Ebrahimi       ((ptr & kTTBRMask) == 0) ? (ptr & ~pac_mask) : (ptr | pac_mask);
151*f5c631daSSadaf Ebrahimi 
152*f5c631daSSadaf Ebrahimi   uint64_t pac = ComputePAC(original_ptr, context, key);
153*f5c631daSSadaf Ebrahimi 
154*f5c631daSSadaf Ebrahimi   uint64_t error_code = 1 << key.number;
155*f5c631daSSadaf Ebrahimi   if ((pac & pac_mask) == (ptr & pac_mask)) {
156*f5c631daSSadaf Ebrahimi     return original_ptr;
157*f5c631daSSadaf Ebrahimi   } else {
158*f5c631daSSadaf Ebrahimi     int error_lsb = GetTopPACBit(ptr, type) - 2;
159*f5c631daSSadaf Ebrahimi     uint64_t error_mask = UINT64_C(0x3) << error_lsb;
160*f5c631daSSadaf Ebrahimi     return (original_ptr & ~error_mask) | (error_code << error_lsb);
161*f5c631daSSadaf Ebrahimi   }
162*f5c631daSSadaf Ebrahimi }
163*f5c631daSSadaf Ebrahimi 
AddPAC(uint64_t ptr,uint64_t context,PACKey key,PointerType type)164*f5c631daSSadaf Ebrahimi uint64_t Simulator::AddPAC(uint64_t ptr,
165*f5c631daSSadaf Ebrahimi                            uint64_t context,
166*f5c631daSSadaf Ebrahimi                            PACKey key,
167*f5c631daSSadaf Ebrahimi                            PointerType type) {
168*f5c631daSSadaf Ebrahimi   int top_pac_bit = GetTopPACBit(ptr, type);
169*f5c631daSSadaf Ebrahimi 
170*f5c631daSSadaf Ebrahimi   // TODO: Properly handle the case where extension bits are bad and TBI is
171*f5c631daSSadaf Ebrahimi   // turned off, and also test me.
172*f5c631daSSadaf Ebrahimi   VIXL_ASSERT(HasTBI(ptr, type));
173*f5c631daSSadaf Ebrahimi   int ttbr = (ptr >> 55) & 1;
174*f5c631daSSadaf Ebrahimi   uint64_t pac_mask = CalculatePACMask(ptr, type, ttbr);
175*f5c631daSSadaf Ebrahimi   uint64_t ext_ptr = (ttbr == 0) ? (ptr & ~pac_mask) : (ptr | pac_mask);
176*f5c631daSSadaf Ebrahimi 
177*f5c631daSSadaf Ebrahimi   uint64_t pac = ComputePAC(ext_ptr, context, key);
178*f5c631daSSadaf Ebrahimi 
179*f5c631daSSadaf Ebrahimi   // If the pointer isn't all zeroes or all ones in the PAC bitfield, corrupt
180*f5c631daSSadaf Ebrahimi   // the resulting code.
181*f5c631daSSadaf Ebrahimi   if (((ptr & (pac_mask | kTTBRMask)) != 0x0) &&
182*f5c631daSSadaf Ebrahimi       ((~ptr & (pac_mask | kTTBRMask)) != 0x0)) {
183*f5c631daSSadaf Ebrahimi     pac ^= UINT64_C(1) << (top_pac_bit - 1);
184*f5c631daSSadaf Ebrahimi   }
185*f5c631daSSadaf Ebrahimi 
186*f5c631daSSadaf Ebrahimi   uint64_t ttbr_shifted = static_cast<uint64_t>(ttbr) << 55;
187*f5c631daSSadaf Ebrahimi   return (pac & pac_mask) | ttbr_shifted | (ptr & ~pac_mask);
188*f5c631daSSadaf Ebrahimi }
189*f5c631daSSadaf Ebrahimi 
StripPAC(uint64_t ptr,PointerType type)190*f5c631daSSadaf Ebrahimi uint64_t Simulator::StripPAC(uint64_t ptr, PointerType type) {
191*f5c631daSSadaf Ebrahimi   uint64_t pac_mask = CalculatePACMask(ptr, type, (ptr >> 55) & 1);
192*f5c631daSSadaf Ebrahimi   return ((ptr & kTTBRMask) == 0) ? (ptr & ~pac_mask) : (ptr | pac_mask);
193*f5c631daSSadaf Ebrahimi }
194*f5c631daSSadaf Ebrahimi }  // namespace aarch64
195*f5c631daSSadaf Ebrahimi }  // namespace vixl
196*f5c631daSSadaf Ebrahimi 
197*f5c631daSSadaf Ebrahimi #endif  // VIXL_INCLUDE_SIMULATOR_AARCH64
198