| This document is a specification snapshot built from github.com/riscv/riscv-cheri/commit/c9a1276493c9979b070958f6cf7511138585b440 and is not a versioned release. The latest versioned PDF release can be downloaded from github.com/riscv/riscv-cheri/releases. |
|
This document is in the Stable state
Assume anything could still change, but limited change should be expected. |
Copyright and license information
This specification is licensed under the Creative Commons Attribution 4.0 International License (CC-BY 4.0). The full license text is available at creativecommons.org/licenses/by/4.0/.
Copyright 2026 by RISC-V International.
Contributors
This RISC-V specification has been contributed to directly or indirectly by:
-
Thomas Aird <thomas.aird@codasip.com>
-
Hesham Almatary <hesham.almatary@cl.cam.ac.uk>
-
Andres Amaya Garcia <andres.amaya@codasip.com>
-
John Baldwin <jhb61@cl.cam.ac.uk>
-
Paul Buxton <paul.buxton@codasip.com>
-
David Chisnall <david.chisnall@cl.cam.ac.uk>
-
Jessica Clarke <jessica.clarke@cl.cam.ac.uk>
-
Brooks Davis <brooks.davis@sri.com>
-
Lawrence Esswood <lesswood@google.com>
-
Nathaniel Wesley Filardo <nwf20@cam.ac.uk>
-
Franz A. Fuchs <franz.fuchs@cl.cam.ac.uk>
-
Timothy Hutt <timothy.hutt@codasip.com>
-
Alexandre Joannou <alexandre.joannou@cl.cam.ac.uk>
-
Martin Kaiser <martin.kaiser@codasip.com>
-
Tariq Kurd <tariq.kurd@codasip.com>
-
Ben Laurie <benl@google.com>
-
Marno van der Maas <mvdmaas@lowrisc.org>
-
Maja Malenko <maja.malenko@codasip.com>
-
A. Theodore Markettos <theo.markettos@cl.cam.ac.uk>
-
Alfredo Mazzinghi <alfredo.mazzinghi@cl.cam.ac.uk>
-
Dave McEwan <dave.mcewan@codasip.com>
-
David McKay <david.mckay@codasip.com>
-
Jamie Melling <jamie.melling@codasip.com>
-
Stuart Menefy <stuart.menefy@codasip.com>
-
Simon W. Moore <simon.moore@cl.cam.ac.uk>
-
Prashanth Mundkur <prashanth@riscv.org>
-
Peter G. Neumann <neumann@csl.sri.com>
-
Robert Norton <robert.norton@cl.cam.ac.uk>
-
Alexander Richardson <alexrichardson@google.com>
-
Robert Riglar <robert.riglar@codasip.com>
-
Michael Roe <mr101@cam.ac.uk>
-
Peter Rugg <peter.rugg@cl.cam.ac.uk>
-
Florian Schmaus <florian.schmaus@codasip.com>
-
Peter Sewell <peter.sewell@cl.cam.ac.uk>
-
Carl Shaw <carl.shaw@codasip.com>
-
Ricki Tura <ricki.tura@codasip.com>
-
Robert N. M. Watson <robert.watson@cl.cam.ac.uk>
-
Toby Wenman <toby.wenman@codasip.com>
-
Jay Williams <jay.williams@codasip.com>
-
Adrian Wise <adrian.wise@codasip.com>
-
Jonathan Woodruff <jonathan.woodruff@cl.cam.ac.uk>
-
Jason Zhijingcheng Yu <yu.zhi@comp.nus.edu.sg>
1. Introduction
| This chapter is only included in the standalone CHERI spec and not part of the integrated document. |
1.1. CHERI Concepts and Terminology
Current CPU architectures (including RISC-V) allow memory access solely by specifying and dereferencing a memory address stored as an integer value in a register or in memory. Any accidental or malicious action that modifies such an integer value can result in unrestricted access to the memory that it addresses. Unfortunately, this weak memory protection model has resulted in the majority of software security vulnerabilities present in software today.
CHERI enables software to efficiently implement fine-grained memory protection and scalable software compartmentalization by providing strong, efficient hardware mechanisms to support software execution and enable it to prevent and mitigate vulnerabilities.
Design goals include incremental adoption from current ISAs and software stacks, low performance overhead for memory protection, significant performance improvements for software compartmentalization, formal grounding, and programmer-friendly underpinnings. It has been designed to provide strong, non-probabilistic protection rather than depending on short random numbers or truncated cryptographic hashes that can be leaked and reinjected, or that could be brute-forced.
1.2. CHERI for RISC-V
This specification is based on publicly available documentation including CHERI v9 (Watson et al., 2023) and CHERI Concentrate (Woodruff et al., 2019).
RISC-V CHERI introduces several new bases that are informally collectively called RVY (e.g., RV32Y, RV64Y). Any CHERI RISC-V implementation must support one of these CHERI bases. CHERI will define profiles that provide equivalent functionality to the standard RVA, RVB, and RVM profiles. These RVY-based profiles (RVYA, RVYB, RVYM) will list the compatible extensions.
| Most existing extensions are compatible with RVY with no modifications. Incompatible extensions will be listed in the profile documents. |
| Zicfiss is currently incompatible as the relevant push/pop instructions would need modifying for CHERI. An RVY version has not yet been developed. |
This section lists new extensions available to RVY, and also extensions where the behavior is modified for RVY.
Almost all existing RISC-V extensions can be added to an implementation, but in most cases they will have some behavioral differences and/or new instructions operating on capabilities.
1.2.1. Stable Extensions and Specifications
| Extension or Specification | Description |
|---|---|
CHERI Base ISA and capability format for RV64 |
|
Capability sealing instruction to form a sentry capability |
|
Hybrid extension for RVI compatibility |
|
New 16-bit encodings added to Zca |
|
New 32-bit encodings added to Zba |
|
New 32-bit encodings added to Zalrsc |
|
New 32-bit encodings added to Zaamo |
| Extension or Specification | Description |
|---|---|
RVI instructions modified by RVY |
|
C instructions modified by RVY |
|
V instructions modified by RVY |
|
Zicbom instructions modified by RVY |
|
Zicbop instructions modified by RVY |
|
Zicboz instructions modified by RVY |
|
Zicsr instructions modified by RVY |
| Extension or Specification | Description |
|---|---|
Byte and halfword LR/SC functionality |
CHERI defines new state and behavior for the privileged modes:
| Extension or Specification | Description |
|---|---|
Hybrid extension for RVI compatibility |
|
Virtual Memory |
|
Debug triggers |
|
MMU-based capability data flow control and measurement |
| Extension or Specification | Description |
|---|---|
External debug support |
Chapters for the unprivileged specification
2. RVY Base Capability Instruction Set, Version 1.0
| This chapter will appear in the unpriv spec after the RV32I chapter. |
This chapter introduces a new base ISA called RV64Y that extends the RV64 instruction set with CHERI. In the future, 32-bit bases (RV32Y) will also be defined with near identically behavior but a different in-memory representation, so this chapter uses the term RVY to refer to the behavior common between all bases. The RVY base can be composed with other standard options to bases such as E (16-registers), Zfinx and endianness.
All CHERI implementations must also specify a capability encoding format.
This chapter also specifies RV64LYmw14rc1ps which is the capability encoding format for RV64Y systems.
Future versions of this specification will include capability encoding formats for RV32Y
2.1. CHERI Overview
CHERI enhances the base ISA by adding hardware memory access control. It has an additional memory access mechanism that protects references to code and data (pointers), rather than the location of code and data (integer addresses). This mechanism is implemented by providing a new primitive, called a capability, that software components can use to implement strongly protected pointers within an address space. Capabilities are unforgeable and delegatable tokens of authority that grant software the ability to perform a specific set of operations. In CHERI, integer-based pointers are replaced by capabilities to provide memory access control.
2.2. CHERI protection model
The CHERI model is motivated by the principle of least privilege, which argues that greater security can be obtained by minimizing the privileges accessible to running software. A second guiding principle is the principle of intentional use, which argues that, where many privileges are available to a piece of software, the privilege to use should be explicitly named rather than implicitly selected. While CHERI does not prevent the expression of vulnerable software designs, it provides strong vulnerability mitigation: attackers have a more limited vocabulary for attacks, and should a vulnerability be successfully exploited, they gain fewer rights, and have reduced access to further attack surfaces.
Protection properties for capabilities include the ISA ensuring that capabilities are always derived via valid manipulations of other capabilities (provenance), that corrupted1 in-memory capabilities cannot be dereferenced (integrity), and that rights associated with capabilities shall only ever be equal to or less permissive (monotonicity). Tampering or modifying capabilities in an attempt to elevate their rights will yield an invalid capability. Attempting to dereference via an invalid capability will result in a hardware exception.
1 Not all possible corrupted states are detected, see Section 2.5, “Integrity of Capabilities”.
CHERI capabilities may be held in registers or in memories, and are loaded, stored, and dereferenced using CHERI-aware instructions that expect capability operands rather than integer addresses. On system initialization, initial capabilities are made available to software by the execution environment via general purpose registers. All other capabilities will be derived from these initial valid capabilities through valid capability transformations.
Developers can use CHERI to build fine-grained spatial and temporal memory protection into their system software and applications and significantly improve their security.
2.3. Capability Registers and Format
RVY extends all registers that have to be able to hold addresses to 2*XLEN bits (hereafter referred to as YLEN), adding metadata to protect its integrity, limit how it is manipulated, and control its use.
In addition to widening to YLEN, each register also gains a one-bit capability tag which is defined below.
RVY specifies the minimum required fields that the capability format must support, and their semantics.
All current RVY bases are little endian and therefore the memory representation of capabilities always holds the address in the first XLEN bytes of memory followed by the metadata.
RVY is designed to be highly extensible, and therefore must allow multiple metadata encoding formats to exist. Specific encoding formats may support different ISA extensions, and add new architectural permissions.
2.3.1. Address
The lower XLEN bits of a capability encode the address of where the capability points. This is also referred to as the integer part of the capability. For registers that are extended but currently hold non-capability data, all other fields are typically zero.
2.3.2. Capability Tag
The capability tag is an additional bit added to addressable memory and all YLEN-bit registers. It is stored separately and may be referred to as out of band or hidden, and is hardware managed. It indicates whether a YLEN-bit register or YLEN-aligned memory location contains a valid capability. If the capability tag is set, the capability is valid and can be dereferenced (contingent on checks such as permissions or bounds).
All registers or memory locations able to hold a capability are YLEN bits wide with an additional hidden capability tag bit. These are referred to as being YLEN-bit in this specification.
The capability tag cannot be directly set by software; it is not a conventionally accessible bit of state. If the capability tag is set then it shows that the capability has been derived correctly according to the principles listed above (provenance, integrity, monotonicity). If the rules are followed then the capability tag will propagate through the instructions that modify, load or store the capability.
Therefore, whenever an instruction writes a capability with the capability tag set to a register:
-
At least one capability tag must have been set in the input operands.
-
This is the provenance check.
-
-
The requested operation must have been legal and does not increase bounds or permissions.
-
This is the monotonicity check.
-
-
The instruction may have checked that none of the input capability were corrupted.
-
This is the integrity check. Only some instructions must perform this check, see Section 2.5.
-
Capability load/store require the provenance check:
-
Any store that wrote the capability to memory was correctly authorized.
-
Any load that read the capability from memory was correctly authorized.
When an operation fails a check, either due to software error or malicious intent, then the operation raises an exception or sets the resulting capability tag to zero.
For a capability to be valid, the capability tag must be set, otherwise a capability is invalid.
Using an invalid capability to dereference memory or authorize any operation raises an exception. All capabilities derived from invalid capabilities are themselves invalid, i.e., their capability tags are zero.
| Writing non-capability data into a register or memory location causes the capability tag to be set to 0. When the capability tag associated with the memory location is zero, the location contains non-capability data. |
2.3.3. Capability tags in registers
Every YLEN-bit register has a one-bit capability tag, indicating whether the capability in the register is valid to be dereferenced. This capability tag is set to 0 whenever an invalid capability operation is performed. Examples of such invalid operations include writing only the integer portion (the address field) of the register or attempting to increase bounds or permissions.
2.3.4. Capability tags in memory
Capability tags are tracked through the memory subsystem: every aligned YLEN-bit wide region has a non-addressable one-bit capability tag, which the hardware manages atomically with the data. The capability tag is set to zero if any byte in the YLEN/8 aligned memory region is ever written using an operation other than a store of a capability operand. For example, the SY instruction may set the capability tag to one if all the instruction’s prerequisites are met, but SW will always set the capability tag to zero.
| All system memory and caches that store capabilities must preserve this abstraction, handling the capability tags atomically with the data. |
2.3.5. Capability Bounds
Capabilities encode memory bounds, i.e., the lowest and highest byte in memory that it is permitted to access when dereferenced for data memory access, or for instruction execution.
Checking is on a byte-by-byte basis, so that it is possible for a memory access to be fully in-bounds, partially out-of-bounds or fully out-of-bounds.
It is not permitted to make any partially or fully out-of-bounds memory accesses.
Every capability has two memory address bounds: base representing the lowest accessible byte, and top representing one byte above the highest accessible byte.
-
The base is XLEN bits and is inclusive.
-
The top is (XLEN+1)-bits and is exclusive.
Inclusive top, with XLEN bits, was considered but rejected in favor of the exclusive top (with an additional bit to allow covering the entire address space). Using exclusive top allows representing a zero-length capability starting at address zero, which is not possible with inclusive top unless you introduce a special value for -1. -
The length is (XLEN+1)-bits and is defined to be top - base.
Therefore a memory location A in the range base ≤ A < top is within bounds, and so valid to access.
Checking every byte of every executed instruction and every byte of every data memory access is fundamental to the memory safety which CHERI provides.
In a typical load/store unit, the expansion of the bounds from rs1 and bounds checking is in parallel with the address calculation, the memory translation and/or the PMA/PMP checking.
|
A compressed format is used to encode the bounds with a scheme similar to floating-point using an exponent and a mantissa. Therefore small exponents can allow byte granularity on the bounds, but larger exponents give coarser granularity. One bounds encoding format based upon (Woodruff et al., 2019) is defined in Section 2.10.1.6.
| Future CHERI bases may use encoding formats with different bounds encoding schemes (see capability encoding format). |
Software can query the bounds of a capability held in a general-purpose register using the following instructions:
2.3.6. Deriving New Bounds
On system initialization, one or more Root capabilities are available; typically, these have bounds which cover all of memory and the maximum permissions set. All smaller capabilities are derived from these.
The ISA does not allow the bounds (and permissions) of a capability with its capability tag set to be increased (monotonicity).
The YBNDSW, YBNDSWI and YBNDSRW instructions generate new capabilities from a source capability and a length operand (rs2 or imm).
The resulting capability has its address set as the base bound and its length as requested, subject to encoding granularity constraints.
These instructions write the newly generated capability to the destination register.
The granularity constraints mean that not all requested combinations of top and base bounds can be encoded exactly.
-
YBNDSW sets the base to
rs1.address, and the length tors2. Set the capability tag to zero if the bounds cannot be encoded exactly. -
YBNDSWI sets the base to
rs1.address, and the length to the immediate value. Set the capability tag to zero if the bounds cannot be encoded exactly. -
YBNDSRW sets the base to
rs1.address, and the length tors2. The bounds may be rounded up if they cannot be encoded exactly.-
If YBNDSRW rounds up the requested bounds, they must still be no larger than the initial bounds.
-
-
YAMASK can be used to calculate the nearest precisely encodable length and base values for a given size.
The bounds are encoded relative to the address field, sharing some upper bits of the address. The number of shared bits depends on the exponent, see Section 2.10.1.6.
2.3.7. Representability and Updating the Address
Software sometimes uses out-of-bounds pointers, for example, to represent a one-past-the end pointer to an array in C (arr + size).
To support this pattern, CHERI must allow these out-of-bounds pointers to be held in capabilities while still protecting the bounds and integrity.
Because the CHERI Concentrate (Woodruff et al., 2019) encoding scheme for memory bounds shares the upper bits of the address with the bounds, only a limited range of out-of-bounds pointers can be represented for any given set of bounds.
This range is known as the representable region.
The relationship between the bounds and the representable region is illustrated in Figure 2.
| While the C standard only requires one-past-the-end pointers to be valid, real-world software has been observed to (temporarily) create pointers that point multiple bytes past the end or even before the start. To maximize software compatibility, the bounds representation was designed to allow for out-of-bounds pointers. |
E, MW and R in the figure are all introduced in Section 2.10.1.6.2 along with the bounds decoding.
The maximum range of address values that the pointer can take without changing the interpretation of bounds is defined by the representable region.
| The historic, uncompressed 64-bit CHERI-MIPS CPU had a 256-bit capability encoding had separate 64-bit values for the base and top memory bounds, and another for metadata fields. This scheme could represent all out-of-bounds pointers with a very high hardware cost. |
Since deriving a new capability with a different address could change the meaning of the bounds, all such derived capabilities (e.g., deriving the next pc capability from the existing pc via control-flow instructions or sequential execution) and instructions that return valid derived capabilities, must check that the new address is within the representable region defined by the source capability. If the interpretation of bounds has changed, then the capability tag of the derived capability is set to zero, so that it is invalid for use.
Software can derive a capability with a new address using instructions such as YADDRW, YADD and YADDI.
| YADDRW writes back a derived capability with a new address field and, if the capability tag was previously set, sets the capability tag of the derived capability to one if the resulting capability still has the same bounds interpretation. |
| Existing software sometimes temporarily moves pointers outside of arrays, and then only comes back into the valid range on dereference, so the encoding was designed to allow valid capabilities to be out-of-bounds. |
| RVY implementations that use a different encoding scheme to RV64LYmw14rc1ps (e.g., for accelerators or specific micro-controllers) may specify an alternative to the representable region check, and may never allow the address to be out of bounds. Therefore, the rest of the specification uses the phrase represented exactly for this check. |
2.3.8. Memory space
A hart supporting RVY has a single byte-addressable address space of 2XLEN bytes for all memory accesses. Each memory region capable of holding a capability also stores a capability tag bit for each naturally aligned YLEN bits (e.g., 16 bytes in RV64), so that capabilities with their capability tag set can only be stored in naturally aligned addresses. Capability tags must be atomically bound to the data they protect.
The memory address space is circular, so the byte at address 2XLEN - 1 is adjacent to the byte at address zero. A capability’s Representable Range described in Section 2.10.1 is also circular, so address 0 is within the Representable Range of a capability where address 2XLEN - 1 is within the bounds. However, the decoded top address of a capability is XLEN + 1 bits wide and does not wrap, so a capability with base 2XLEN - 1 and top 2XLEN + 1 is not a subset of the infinite capability and does not authorize access to the byte at address 0. Like malformed bounds (see Section 2.10.1.6.4), it is impossible for a CHERI core to generate a valid capability with top > 2XLEN. If such a capability exists then it must have been caused by a logic or memory fault. Unlike malformed bounds, the top overflowing is not treated as a special case in the architecture: normal bounds check rules should be followed.
2.3.9. Capability Type (CT)
This metadata value indicates the type of the capability and determines which operations the capability authorizes. Which capability types a given CHERI platform supports is a function of the extensions and capability encoding format in use. The capability encoding specifies a mapping between some bits within the capability format (usually described as "the CT field") and the capability types.
The capability encoding must be able to encode type 0 (unsealed).
If any other sealed type exists, then they can be used to provide different levels of control-flow integrity.
- Unsealed capabilities
-
When
CT=0, the capability authorizes access to a region of memory as defined by the permissions and bounds. All CHERI systems must support unsealed capabilities.
- Sealed capabilities
-
Capabilities with
CT≠0are sealed against modification and cannot be dereferenced to access memory. Instructions that operate on capabilities will produce a result with the capability tag set to zero if the source capability is sealed and the operation would alter its address, bounds, or permissions. Extensions that extend the capability metadata must describe their interaction(s) with sealed capabilities.
Given a capability with CT=0,
deriving a capability with CT≠0 is termed sealing
(or sealing with type x when a particular output CT=x is meant).
In the other direction,
deriving a CT=0 capability from a CT≠0 capability is termed unsealing
(or unsealing from type x when a particular input CT=x is meant).
- Sentry capability type
-
Sentry capabilities provide immutable function pointers within a CHERI software system. Sealed capabilities are a natural foundation, providing immutability.
| Capabilities sealed with a specific CT-field which can be unsealed when passed as an argument to JALR (RVY) are dubbed "sentries" (a portmanteau of "sealed entries"). |
Sentries can establish a form of control-flow integrity between mutually distrusting code. Because they are immutable, the jump target cannot be modified, ensuring that control flow can only enter at the specific address encoded in the capability and not in the middle of a function.
Any sentry type may be passed as the rs1 argument to JALR (RVY), and are unsealed on dereference.
The returned rd value is also sealed as a sentry.
Sentry types may be restricted to forward-edge only and backward-edge only transitions to further improve control-flow integrity.
-
When JALR (RVY) is used as a function call only forward-edge sentries in
rs1are unsealed on dereference. The returnedrdvalue is always sealed as a backward-edge sentry type. -
When JALR (RVY) is used as a function return only backward-edge sentries in
rs1are unsealed on dereference.
| In addition to using sealed capabilities as sentries for secure entry points, sealed capabilities can also be useful to software as secure software tokens. YSUNSEAL can be used to convert such a token back to an unsealed capability. A future extension may add an unseal instruction for performance. |
- Ambient sealing type
-
Some capability types are said to be ambiently available (or just ambient) if they do not require specific authority to seal a capability with that type. Therefore sentry types can be declared ambient. For example, if Zysentry is available on a given platform, the type with which it seals capabilities is considered ambiently available.
The standard capability type mapping is shown in Table 6, extensions and capability encoding formats may add more types.
| Type Name | Integer Value | Description |
|---|---|---|
Unsealed |
0 |
Unsealed capability granting access to memory |
Unrestricted sentry capability1 |
Extension defined |
Immutable unrestricted sentry type for both forward-edge and backward-edge transitions. |
Forward-edge sentry capability |
Extension defined |
Immutable sentry type for forward-edge transitions. |
Backward-edge sentry capability |
Extension defined |
Immutable sentry type for backward-edge transitions. |
1 Zysentry defines a sentry capability of this type.
| The integer value in the table above defines the architectural capability type (i.e., the result of the YTYPER instruction) but does not need to be encoded that way in memory. |
Other encoding formats may provide different type mappings, but the value 0 must always represent an unsealed capability.
|
2.3.10. Architectural Permissions (AP)
This metadata field encodes architecturally defined permissions of the capability. Permissions grant access subject to the capability tag being set, the capability being unsealed, and bounds checks passing. Any operation is also contingent on requirements imposed by other RISC-V architectural features, such as virtual memory, PMP and PMAs, even if the capability grants sufficient permissions. The permissions defined in RVY are listed in Table 7. All capability formats must support at least this set of permissions. Extensions building on top of RVY may define additional permissions. An example of such an extension is Zylevels1. The in-memory format of these permissions depends on the capability encoding.
Permissions can be cleared when deriving a new capability value (using YPERMC) but they can never be added.
| Permission | Type | Comment |
|---|---|---|
Data memory permission |
Authorize data memory read access |
|
Data memory permission |
Authorize data memory write access |
|
Instruction memory permission |
Authorize instruction memory execute access |
|
Data memory permission |
Authorize loading/storing of capability tags |
|
Data memory permission |
Used to restrict the permissions of loaded capabilities. |
|
Privileged state permission |
Authorize privileged instructions and CSR accesses. |
- Read Permission (R)
-
Allow reading data from memory.
- Write Permission (W)
-
Allow writing data to memory.
- Execute Permission (X)
-
Allow instruction execution.
- Capability Permission (C)
-
Allow reading capability tags from memory if R-permission is also granted.
Allow writing capability tags to memory if W-permission is also granted.
If C-permission is missing then the capability tags for capability loads and stores are read and written as zero.
- Load Mutable Permission (LM)
-
Allow preserving the W-permission of capabilities loaded from memory. If a capability grants R-permission and C-permission, but no LM-permission, then a capability loaded via this authorizing capability will have W-permission and LM-permission removed.
The permission stripping behavior only applies to loaded capabilities with their capability tag set and that are not sealed after all other checks. This ensures that capability loads of non-capability data do not modify the loaded value, and that sealed capabilities are not modified.
| Clearing a capability’s LM-permission and W-permission allows sharing a read-only version of a data structure without making a copy. For example, if software removes LM-permission from a capability to a linked list, any pointers loaded through that capability will automatically lose their W-permission, preventing modification of the list content. |
- Access System Registers Permission (ASR, primarily used to authorize CSR accesses)
-
Allow read and write access to all privileged CSRs, some unprivileged CSRs and some privileged instructions. ASR-permission permission checks always use the permission in the pc.
In the unprivileged RVY ISA, the following are affected by ASR-permission:
-
Thread ID CSRs: The utidc CSR requires ASR-permission for writing but not for reading.
-
Instructions: CBO.INVAL (RVY) requires ASR-permission in the pc.
In the privileged RVY ISA, the following are affected by ASR-permission:
-
Instructions: MRET (RVY), SRET (RVY), and DRET (RVY) require ASR-permission in the pc .
-
CSRs: The privileged
stidc,vstidc, andmtidcCSRs require ASR-permission for writing, but not for reading (if access is permitted in the current privilege mode). All other privileged CSRs require ASR-permission in the pc for any access. Access to debug CSRs requires ASR-permission.
| This permission is important in privileged execution environments. Removing this permission allows constraining privileged software to a sandbox that cannot be subverted by changing privileged state. |
| Extensions may add additional non-privileged CSRs that require ASR-permission. |
2.3.10.1. Permission Transitions
Not all capability permissions are orthogonal (that is, some permissions inherently depend on others). As such, using YPERMC to clear some permissions may have the effect of clearing others as well, such that a permission bit being set in the result of YPERMR implies that all bits for permissions upon which it depends will also be set.
For the base set of permissions just defined, the following rules apply. Extensions that define new permission bits may also introduce new dependency constraints. Currently defined examples are:
-
Zyhybrid, see Section 4.1.3
-
Zylevels1, see Section 7.3.2
Capability encoding formats may impose additional constraints to reduce the number of bits necessary to represent permissions.
| YPERMC Rule | Permission | Valid only if |
|---|---|---|
| These rules enforce sensible permission combinations. For example, it makes no sense to allow loading/storing capabilities (C-permission) if you cannot read or write data (R-permission or W-permission). Similarly, LM-permission is only useful if you can already read capabilities (C-permission and R-permission), and ASR-permission is restricted to executable capabilities (X-permission). |
2.3.11. Software-Defined Permissions (SDP)
The metadata also contains an encoding-dependent number of software-defined permission (SDP) bits. They can be inspected by the kernel or application programs to enforce restrictions on API calls (e.g., permit/deny system calls, memory allocation, etc.). They can be cleared by YPERMC but are not interpreted by the CPU otherwise.
While these bits are not used by the hardware as architectural permissions, modification follows the same rules: SDP bits can only be cleared and never set on valid capabilities.
| This property is required to ensure restricted programs cannot forge capabilities that would pass the software-enforced checks. |
| Software is completely free to define the usage of these bits. |
2.3.12. Special Capabilities
2.3.12.1. Root Capabilities
Root (sometimes also primordial, initial) capabilities are those provided by the system at reset. In some systems (and capability encodings), there is a single "Infinite" capability value, which grants all permissions and has bounds covering the whole 2XLEN address space; in such systems, root capabilities are often Infinite. More generally, the set of root capabilities often collectively grant all permissions to all addresses. By way of example, an encoding may prohibit one capability from authorizing both write and execute; a system using such an encoding would typically make available maximally permissive read-write and read-execute capabilities as part of their root set.
|
How unprivileged software receives its root capabilities is largely an ABI question; the privileged specification will detail requirements of capability registers' reset state (and so on the root capabilities held therein). |
Because particular sets of requirements recur throughout the specification, we define some useful short-hand terminology.
- Root Executable Capability
-
An unsealed capability that has bounds covering all addresses and grants at least all of X-permission, R-permission, C-permission, LM-permission, and ASR-permission. Extensions introducing new permissions may require these to be provided by root executable capabilities.
- Root Data Capability
-
An unsealed capability that has bounds covering all addresses and grants at least all of R-permission, W-permission, C-permission, and LM-permission. Extensions introducing new permissions may require these to be provided by root data capabilities.
2.3.12.2. NULL Capability
A capability with all-zero metadata, a zero capability tag, and an address of zero is referred to as the NULL capability. This capability grants no permissions and any dereference results in raising an exception.
2.4. Capability encoding formats
CHERI implementations make trade-offs in their "encoding formats", such as the precision of bounds and the expressible set of combinations of permissions, that impact certain behaviors of the ISA. The CHERI base ISA name includes a compact description of these decisions, and the definition of all CHERI base ISAs includes sufficient details of a capability encoding format to precisely define the execution behavior of all base ISA instructions.
Whilst RV64Y has enough bits in the encoding format to prevent such trade-offs in general, the concepts are introduced in here and the future RV32Y formats will make extensive use of them.
The name RVY refers generically to CHERI base ISAs, which share common semantics but may have different metadata encodings. The RV64Y name on its own does not describe the complete base ISAs, but defines all the semantics of a RV64Y machine, where certain behavioral parameters must be filled in by the capability encoding. For example, the YBNDSRW instruction yields a capability with new bounds that are rounded differently depending on the number of bits allocated to the bounds in the capability format. Systems with XLEN=64 can allocate more bits towards the mantissa of the bounds than XLEN=32 system and therefore have a larger Representable Range.
| These observable differences in behavior are similar to floating point numbers where the supported operations and their semantics are the same for all formats, but the exact result depends on the representation (e.g., 16/32/64-bit IEEE-754 or other floating point formats). |
It is possible to generate code for RVY that is compatible with all valid in-memory encodings.
However, to allow compilers and/or software library authors to make assumptions about encoding-dependent properties such as bounds precisions, these are encoded via an LY<params> suffix to the base ISA name.
The base L<encoding_parameters> encoding format scheme is designed to separate the aspects of capability encoding that influence the behavior of RVY instructions from the other aspects defined by the encoding format.
The intent is to simplify the future development of more (possibly domain-specific) encoding formats while also more directly conveying compatibility of architectural bases.
|
The following parameters are currently defined to distinguish existing formats:
- Parameters for bounds precision and representability
-
These parameters affect the behavior of YBNDSW/YBNDSRW as well as the representability check that affects the tag-clearing behavior of how far you can go out of bounds with YADDRW/YADD.
-
Mantissa width (mw<N>): The mantissa width for the bounds encoding. For example, a format with 14 bits of mantissa, would use
mw14. The mantissa width influences the precision of bounds (much like the mantissa width of floating point numbers defines arithmetic precision). -
Maximum exponent (ea or e<N>): If all meaningful values of the exponent can be encoded directly in the exponent field this uses
ea. Otherwisee<N>describes the largest encodable exponent for a valid capability except for the one used for the whole address space. For example, the CHERIoT capability encoding formats usee14since it uses a four-bit exponent field that can encode only the values 0 through 14 and 24 (which, with its 9-bit mantissas, is sufficient to provide an encoding of bounds that cover the whole address space). The default value for this parameter iseaand may be omitted in that case. -
Representable region (rc1 or r0): The number of mantissa bits used to guarantee representability of out-of-bounds capability values. So far two options have been used in commercial implementations:
rc1, where the encoding uses one additional bit and uses a centered out-of-bounds region, andr0where zero bits are used for out-of-bounds capabilities and there is no guaranteed out-of-bounds range.
-
- Parameter for permissions
-
This parameter defines which permission modifications using YPERMC also clear additional (non-encodable) permissions.
-
Permission encoding (ps or pc): Whether permissions are encoded using a simple representation of one bit per architectural permission (
ps) or a compressed encoding that leverages dependencies between permissions and does not allow encoding all possible combinations (pc).
-
- Parameter for in-memory format
-
-
In-memory encoding (enc<suffix>): This parameter defines layout of capability metadata fields in memory. The default value for this parameter is
enc1and may be omitted in that case. Custom formats may define alternate layouts where all other parameters are otherwise identical, so this parameter can be used to differentiate such formats. Additionally, there is one other value,enc0, which means the compiler and/or software must avoid making any assumptions about the in-memory representation.
-
| In general, only very specialized software such as offline crash-dump debuggers need to know the exact memory representation, and all other software can and should use the inspection instructions such as YBASER, etc. |
- Other parameters
-
These other parameters are not used by the formats currently set forward for ratification but are being used in custom extensions on top of RVY.
-
AUIPC (RVY) shift (as<N>): The shift amount used in the RVY variant of AUIPC (RVY). This is 12 (as in RVI) unless specified otherwise. Also see AUIPC shift.
-
As with other extensions, a version number suffix may be added to the LY string to identify a new version with the same parameters but different in-memory representation.
Any newer version must be forwards compatible with any existing software using the same parameters.
Custom capability encoding formats may be implemented (their name suffix should start with LYX).
| Any future capability encoding formats must provide all the capability guarantees listed in this chapter and must undergo formal verification of these properties before being proposed for ratification. |
The behavior of all RVY instructions is fully defined by the parameters in the LY string.
Therefore, any implementation with matching parameters is binary compatible (assuming the same extensions are implemented).
|
The RV64Y base capability encoding format is based on University of Cambridge CHERI v9 (Watson et al., 2023): RV64LYmw14rc1ps
| It is expected that the actual RVY instantiation is chosen using a profile rather than a full architecture string and therefore the unwieldy suffix should rarely be user-visible. |
For RV64, the number of spare bits in the capability encoding ensure sufficient future extensibility and therefore no custom formats exist.
| RV32Y has insufficient bits available to enable features for all target domains, so multiple RV32Y-extending capability formats must exist. |
2.5. Integrity of Capabilities
CHERI enforces the following rules (integrity checks) for all valid capabilities :
If any of the above rules do not hold for a capability with the capability tag set, it indicates either:
-
State corruption due to memory or logic faults, or
-
The presence of incompatible or faulty CHERI IP within the system.
| These checks are much less rigorous than parity or ECC protection, and are only used to detect simple problems with the capability metadata. |
Performing these checks is optional except for instructions that are defined to accept arbitrary input bit patterns and can write an output with the capability tag set. All instructions that require integrity checks have this noted in the instruction description.
Currently YBLD is the only defined instruction that sets the capability tag on an arbitrary bit pattern and therefore must perform an integrity check on the input capability in rs2.
For all other instructions, performing these checks is optional unless the hart implements additional reliability features (since malformed capabilities with the capability tag set cannot exist under normal operating conditions).
|
| Even though valid capabilities which fail the integrity check could not have been legally generated by the local hart, defining the handling in the architecture allows the behavior to be precisely specified for all 2(YLEN+1) input values. |
2.6. Extended State
As stated above, all state which can hold addresses are extended from XLEN to YLEN bits.
2.6.1. General Purpose Registers
The XLEN-wide integer registers (e.g., x1, x2) are all extended to YLEN bits
and associated capability tags, as shown in Figure 3.
The zero register (x0) is extended with zero metadata and a zero capability tag: this is called the NULL capability.
2.6.2. The Program Counter Capability (pc)
The pc is extended to be a capability.
Extending the pc allows the range of branches, jumps and linear execution for currently executing code to be restricted.
The pc address field is the pc in the base RISC-V ISA so that the
hardware automatically updates it as instructions are executed.
The hardware performs the following checks on pc for each instruction executed in addition to the checks already required by the base RISC-V ISA. A failing check raises a CHERI exception.
-
The capability tag must be set
-
The capability must not be sealed
-
The capability must grant X-permission
-
All bytes of the instruction must be in bounds
-
All integrity checks must have passed.
On system initialization the pc bounds and permissions must be set such that the program can run successfully (e.g., by setting it to a Root Executable capability to ensure all instructions are in bounds).
| Future ISA extensions should respect these rules so that the checked bits do not need to be stored in all copies of the pc in the implementation. |
2.6.3. Added CSRs
RVY adds the YLEN-bit CSR shown in Table 9.
| YLEN CSR | Permissions | Description |
|---|---|---|
RW, ASR-permission required for writes, not reads |
User Thread ID Capability |
2.6.3.1. User Thread Identifier Capability (utidc)
The utidc register is an unprivileged CSR used to identify the current software thread. Any operation that modifies utidc raises an exception unless the ASR-permission is set in the current pc.
|
Each thread (as scheduled by the kernel) can have its own context stored in privileged data structures managed by the compartmentalization TCB, for example a stack of user-level compartment entries and exits. utidc allows compartment-switching code to determine the currently running thread without a call into the operating system. This is read-only without ASR-permission to prevent a malicious compartment from tricking the switching mechanism into accessing data corresponding to the wrong thread. While the RISC-V ABI includes a thread pointer (tp) register, it is not usable for the purpose of reliably identifying the current software thread because the tp register is a general purpose register and can be changed arbitrarily by untrusted code. Extending utidc to a capability allows a data structure to be shared (guarded by e.g. the subset sealing mechanism), which allows for example efficient recovery of a trusted stack, without requiring additional indirection. |
2.6.4. CSR Classes
All CSRs that can hold addresses are extended to YLEN bits.
RVY has three classes of CSRs:
- XLEN-bit CSRs
-
These do not contain pointers (e.g., fcsr from the "F" extension).
- Extended CSRs
-
These are XLEN-bit CSRs extended to YLEN bits, which are able to contain pointers (e.g., mtvec from the privileged specification).
- YLEN-bit CSRs
-
These are added by RVY and contain pointers (e.g., utidc).
When accessing CSRs these rules are followed:
-
Accesses to XLEN-bit CSRs are as specified by Zicsr
-
Accesses to YLEN-bit CSRs and extended CSRs, using CSRRW will:
-
Read YLEN bits
-
Write YLEN bits, and will write the capability tag to zero if any integrity check fails
-
-
Accesses to YLEN-bit CSRs and extended CSRs, using instructions other than CSRRW will:
-
Read YLEN bits
-
Write an XLEN-bit value to the address field, and use the semantics of the YADDRW instruction to determine the final written value
-
| Any YLEN-bit or extended CSR may have additional rules defined to determine the final written value of the metadata and/or to write zero to the capability tag. |
The assembler pseudoinstruction to read a capability CSR csrr rd, csr, is encoded as csrrs rd, csr, x0.
| Instruction | Read Width | Write Width |
|---|---|---|
CSRRW rd==x0 |
YLEN |
|
CSRRW rd!=x0 |
YLEN |
YLEN |
CSRR[C|S] rs1==x0 |
YLEN |
|
CSRR[C|S] rs1!=x0 |
YLEN |
XLEN |
CSRRWI rd==x0 |
XLEN |
|
CSRRWI rd!=x0 |
YLEN |
XLEN |
CSRR[C|S]I uimm==x0 |
YLEN |
|
CSRR[C|S]I uimm!=x0 |
YLEN |
XLEN |
In Table 10, when there is no read or write width shown, the CSR access is not made and there are no side-effects following standard Zicsr rules.
2.7. Capability checks
With RVY, every memory access performed by a CHERI core must be authorized by a capability.
Instruction fetches and data memory accesses may result in a fatal exception if the access is out of bounds, or if the authorizing capability is missing the required permissions. I.e.,:
-
all load instructions requires R-permission
-
all store instructions require W-permission
-
all indirect jumps require X-permission on the target capability
Instruction fetch is also authorized by a capability: the program counter capability (pc) which extends the PC.
| This allows code fetch to be bounded, preventing a wide range of attacks that subvert control flow with non-capability data. |
The authorizing capability is either named explicitly (the base register of a load/store operation) or implicitly (when executing a branch, pc is used for authorization).
E.g., lw t0, 16(sp) loads a word from memory, getting the address, bounds, and permissions from the sp (capability stack pointer) register.
No other exception paths are added by RVY: in particular, capability manipulations do not raise an exception, but may set capability tag of the resulting capability to zero if the operation is not permitted.
2.8. Added Instructions
RVY adds new instructions to operate on capabilities, and redefines part of the RVI/RVE custom encoding space for this purpose.
|
|
|
|
|
|
|
|
111 (>32b) |
|---|---|---|---|---|---|---|---|---|
|
||||||||
|
|
|
|
|
|
|
|
reserved |
|
|
|
|
|
|
|
|
reserved |
|
|
|
|
|
|
|
|
reserved |
|
|
|
|
|
|
|
|
reserved |
Therefore:
-
custom-0 is still available for custom encodings
-
custom-1/2/3 are repurposed as RVY-C/B/A in that order.
| Standard RVY encodings will never be placed in custom-0. |
| Parts of RVY-C/B/A may be returned to custom space in the future. |
2.8.1. Instructions to Update The Capability Pointer
Creating a new capability with a different address (i.e., updating the pointer) requires specific instructions instead of integer ADD/ADDI. These instructions all include a check that the resulting address can be represented exactly within the new capability.
| Mnemonic | Description |
|---|---|
Capability pointer increment by immediate |
|
Capability pointer increment |
|
Write capability address |
2.8.1.1. YADDI
See YADD.
2.8.1.2. YADD
- Synopsis
-
Capability pointer increment
- Mnemonic
-
yadd rd, rs1, rs2
yaddi rd, rs1, imm - Suggested assembly syntax
-
add rd, rs1, rs2
addi rd, rs1, imm
The suggested assembly syntax distinguishes from integer add/addi by operand type.
|
- Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
YADD with rs2=x0 is decoded as YMV instead, the key
difference being that capabilities cannot have their capability tag
cleared by YMV.
|
- Description
-
Copy the capability in register
rs1to registerrd.For YADD, increment
rd.addressby the value inrs2[XLEN-1:0].
For YADDI, incrementrd.addressby the immediate valueimm.Set
rd.tag=0ifrs1is sealed.Set
rd.tag=0if the resulting capability cannot be represented exactly.Set
rd.tag=0ifrs1fails any integrity checks. - Included in
- Operation for YADD
-
let cs1_val = C(cs1); let rs2_val = X(rs2); let newCap = incCapAddrChecked(cs1_val, rs2_val); C(cd) = newCap; RETIRE_SUCCESS - Operation for YADDI
-
let cs1_val = C(cs1); let immBits : xlenbits = sign_extend(imm); let newCap = incCapAddrChecked(cs1_val, immBits); C(cd) = newCap; RETIRE_SUCCESS
2.8.1.3. YADDRW
- Synopsis
-
Write capability address
- Mnemonic
-
yaddrw rd, rs1, rs2 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Copy the capability
rs1tord.Set
rd.addresstors2[XLEN-1:0].Set
rd.tag=0ifrs1is sealed.Set
rd.tag=0if the resulting capability cannot be represented exactly.Set
rd.tag=0ifrs1fails any integrity checks. - Included in
- Operation
-
C(cd) = setCapAddrChecked(C(cs1), X(rs2)); RETIRE_SUCCESS
2.8.2. Instructions to Manipulate Capabilities
For security, capabilities can only be modified in restricted ways. Special instructions are provided to copy capabilities or derive a new capability using manipulations such as shrinking the bounds (YBNDSW), reducing the permissions (YPERMC) or authorizing a capability with another one which has a superset (or identical) bounds and permissions (YBLD).
| Mnemonic | Description |
|---|---|
Clear capability permissions |
|
Capability register copy |
|
YHIW1 |
Write capability metadata and clear capability tag (pseudo) |
Write capability bounds by immediate |
|
Write capability bounds |
|
Write capability bounds, rounding up if required |
|
Unseal by superset reconstruction |
|
Build capability |
2.8.2.1. YPERMC
- Synopsis
-
Clear capability permissions
- Mnemonics
-
ypermc rd, rs1, rs2 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
YPERMC performs the following operations:
-
Convert the AP-field, SDP-field, and any other extension-defined permission-like fields of capability
rs1into a bit field with the format shown in Figure 6. -
The initial value in register
rs2[XLEN-1:0]is treated as a bit mask that specifies bit positions to be cleared in the bit field. Any bit that is high inrs2will cause the corresponding bit to be cleared in the bit field.Future extensions may include hardwired permission bits, in which case they are not cleared by set bits in rs2. -
Encode the resulting architectural permissions as specified by the encoding in use. This may involve iteratively applying the rules in Section 2.3.10.1, as well as any rules added by extensions or the capability encoding, until a fixed point is reached, arriving at a set of permissions not further reduced by any rule. Any permission-dependent capability metadata is updated to reflect any permissions removed by this procedure. Note that encodings may specify procedures for computing the new permission set; while these must be idempotent and respect the rules of Section 2.3.10.1, they need not be of the form "iterate to fixed point".
Depending on the base ISA and supported extensions, some combinations of permissions cannot be encoded or are not useful. In these cases, YPERMC will return a minimal sets of permissions, which may be no permissions. Therefore, it is possible that requesting to clear a permission also clears others, but YPERMC will never add new permissions. -
Copy
rs1tord, and update the AP-field, SDP-field, and any others therein with the newly calculated versions. -
Set
rd.tag=0ifrs1is sealed and any bits in the AP-field or SDP-field were affected by YPERMC; extensions must describe whether such changes to their bits also necessitate capability tag clearing. -
Set
rd.tag=0if any integrity checks fail.
-
| If a future extension adds a new permission that overlaps with an existing permission (e.g., finer-grained ASR-permission), then clearing the original must also clear the new permission. This ensures software forward-compatibility: for example, a kernel that does not know about finer-grained ASR-permission subsets must still be able to prevent all access to privileged instructions and CSRs by clearing ASR-permission. |
| Any future extension that defines new permissions that are a refinement of existing permissions (e.g., finer-grained ASR-permission or those of Zylevels1) must be allocated to the bits that are currently reported as 1 to ensure forward-compatibility. Completely new permissions (e.g., sealing) should use the bits that are reported as zero in the current specification. |
|
Extensions like Zylevels1 introduce bits that are, conceptually, labels on a capability rather than a permission granted by the capability. These bits are, nevertheless, still adjusted using the YPERMC instruction. This avoids the need for a dedicated instruction and allows simultaneous changes of these labels and permissions. |
- Included in
- Operation
-
TODO
2.8.2.2. YMV
- Synopsis
-
Capability register copy
- Mnemonic
-
ymv rd, rs1 - Suggested assembly syntax
-
ymv rd, rs1 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
2.8.2.3. PACKY
- Synopsis
-
Pack Y register
- Mnemonic
-
packy rd, rs1, rs2 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
The PACKY instruction packs the least-significant XLEN-bits of
rs1andrs2intord, and setsrd.tag=0. - Included in
2.8.2.4. YHIW
- Synopsis
-
Capability set metadata
- Mnemonic
-
yhiw rd, rs1, rs2 - Encoding
-
YHIW is a pseudoinstruction for PACKY
- Description
-
Copy
rs1tord.Replace the capability metadata of
rs1(i.e., bits [YLEN-1:XLEN]) withrs2and setrd.tagto 0.The value of rs1.tagdoes not affect the result. - Included in
- Operation
-
let capVal = C(cs1); let intVal = X(rs2); let newCap = bitsToCap(false, intVal @ capVal.address); C(cd) = newCap; RETIRE_SUCCESS
2.8.2.5. YBNDSWI
See YBNDSW.
2.8.2.6. YBNDSW
- Synopsis
-
Write capability bounds
- Mnemonics
-
ybndsw rd, rs1, rs2
ybndswi rd, rs1, imm - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Copy the capability from register
rs1to registerrd. Set the base address of its bounds to the value ofrs1.addressand set the length of its bounds tors2[XLEN-1:0]for YBNDSW, orimmfor YBNDSWI.Set
rd.tag=0ifrs1.tag=0,rs1is sealed or ifrd's bounds exceedrs1's bounds.Set
rd.tag=0if the requested bounds cannot be encoded exactly.Set
rd.tag=0ifrs1fails any integrity checks.YBNDSWI decodes the 9-bit immediate value
imm[8:0]to the requested lengthresultas follows:-
If
imm[8:0] == 0,resultis4096. -
If
imm[8] == 0andimm[7:0] > 0,result[7:0] = imm[7:0]with all other bits set to0. -
If
imm[8] == 1,resultis decoded as follows, with all other bits set to0:-
If
imm[7:4] != 0000, thenresult[11:4] = imm[7:0]. -
If
imm[7:4] == 0000, thenresult[8] = 1,result[7:4] = imm[3:0],result[3] = 1.
-
The resulting logical encodable regions and step sizes are summarized in the table below:
-
| Region | Decoded range (bytes) | Immediate decoding condition |
|---|---|---|
Byte granular |
|
|
8-byte granular |
|
|
|
||
16-byte granular |
|
|
|
|
|
This immediate encoding scheme achieves coverage of almost all observed immediate values while decoding the 9-bit immediate field without any adders or variable shifts.
The linear range, stride-16 range, and stride-8 region are decoded via simple multiplexers and bit wiring.
Mapping |
- Included in
- Operation for YBNDSW
-
let cs1_val = C(cs1); let length = X(rs2); let newBase = cs1_val.address; let newTop : CapLenBits = zero_extend(newBase) + zero_extend(length); // inCapBoundsNoWrap returns false if the input bounds are malformed. let inBounds = inCapBoundsNoWrap(cs1_val, newBase, unsigned(length)); let (exact, newCap) : (bool, Capability) = setCapBounds(cs1_val, newBase, newTop); let cond = not(inBounds & exact) | boundsMalformed(newCap) | not(capReservedValid(newCap)) | capIsSealed(newCap); C(cd) = clearTagIf(newCap, cond); RETIRE_SUCCESS - Operation for YBNDSWI
-
TODO
2.8.2.7. YBNDSRW
- Synopsis
-
Write capability bounds, rounding up if required
- Mnemonic
-
ybndsrw rd, rs1, rs2 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Copy the capability from register
rs1to registerrd. Set the base address of its bounds to the value ofrs1.addressand set the length of its bounds tors2[XLEN-1:0].The base is rounded down and the top is rounded up by the smallest amounts needed to form a capability covering the requested base and top.
Set
rd.tag=0ifrs1.tag=0,rs1is sealed or ifrd's bounds exceedrs1's bounds.Set
rd.tag=0ifrs1fails any integrity checks. - Included in
- Operation
-
let cs1_val = C(cs1); let length = X(rs2); let newBase = cs1_val.address; let newTop : CapLenBits = zero_extend(newBase) + zero_extend(length); // inCapBoundsNoWrap returns false if the input bounds are malformed. let inBounds = inCapBoundsNoWrap(cs1_val, newBase, unsigned(length)); let (_, newCap) : (bool, Capability) = setCapBounds(cs1_val, newBase, newTop); let cond = not(inBounds) | boundsMalformed(newCap) | not(capReservedValid(newCap)) | capIsSealed(newCap); C(cd) = clearTagIf(newCap, cond); RETIRE_SUCCESS
2.8.2.8. YSUNSEAL
- Synopsis
-
Unseal by superset reconstruction
- Mnemonic
-
ysunseal rd, rs1, rs2 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Copy
rs2tord.Set
rd.ct=0. (That is, unsealrd.)Set
rd.tag=1if:-
rs1.tag=1, and -
rs1passes all integrity checks, and -
rs1is not sealed (that is,rs1has zero CT-field), and -
rs2.tag=1, and -
rs2passes all integrity checks, and -
rs2is sealed (that is,rs2has non-zero CT-field), and -
rs2's permissions and bounds are equal to or a subset ofrs1's, and -
any extension-specific constraints on YSUNSEAL hold.
Otherwise, set
rd.tag=0 -
When rs1 is x0 YSUNSEAL will copy rs2 to rd and clear rd.tag and rd.ct.
However future extensions may add additional behavior to update currently reserved fields,
and so software should not assume rs1==0 to be a pseudo-instruction for capability tag and type clearing.
|
|
YSUNSEAL is intended to enable "superset unsealing" of opaque handles to software objects. Specifically, a software component can:
The result of YSUNSEAL will be untagged if the received capability is not a handle to an object in the recipient’s address space. This makes it easy for recipient software to ensure that received capabilities actually are handles to the recipient’s objects. |
|
While YSUNSEAL requires that the capability in its |
- Included in
- Operation
2.8.2.9. YBLD
- Synopsis
-
Build capability
- Mnemonic
-
ybld rd, rs1, rs2 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Copy
rs2tord.Set
rd.tag=1if:
The integrity check on rs2 is required to prevent authorising a capability with a lack of integrity.
The integrity check on rs1 is optional.
|
| YBLD can be used to speed up operations such as paging in memory after swap. |
When rs1 is x0 YBLD will copy rs2 to rd and clear rd.tag.
However future extensions may add additional behavior to update currently reserved fields,
and so software should not assume rs1==0 to be a pseudo-instruction for capability tag clearing.
|
- Included in
- Operation
-
let cs1_val = C(cs1); let cs2_val = C(cs2); let tag = cs1_val.tag & not(capIsSealed(cs1_val)) & capIsSubset(cs2_val, cs1_val); /* Subset checks for malformed bounds, perms, and reserved bits */ C(cd) = { cs2_val with tag = tag }; RETIRE_SUCCESS
2.8.3. Instructions to Decode Capability Bounds
The bounds describing the range of addresses the capability gives access to are stored in a compressed format. These instructions query the bounds and related information.
| Mnemonic | Description |
|---|---|
Read capability base address |
|
Read capability length |
|
Read capability top address |
2.8.3.1. YBASER
- Synopsis
-
Read capability base address
- Mnemonic
-
ybaser rd, rs1 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Decode the base integer address from
rs1's bounds and write the result tord.If
rs1's bounds can’t be decoded, orrs1fails any integrity checks, then return zero.The value of rs1.tagdoes not affect the result. - Included in
- Operation
-
let capVal = C(cs1); X(rd) = match getCapBoundsBits(capVal) { None() => zeros(), Some(base, _) => base }; RETIRE_SUCCESS
2.8.3.2. YLENR
- Synopsis
-
Read capability length
- Mnemonic
-
ylenr rd, rs1 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Calculate the length of
rs1's bounds and write the result inrd.The length is defined as the difference between the decoded bounds' top and base addresses, i.e.,
top - base.Return the maximum length, 2MXLEN-1, if the length of
rs1is 2MXLEN.If
rs1's bounds can’t be decoded, orrs1fails any integrity checks, then return zero.The value of rs1.tagdoes not affect the result. - Included in
- Operation
-
let capVal = C(cs1); // getCapLength returns 0 if the bounds are malformed let len = getCapLength(capVal); X(rd) = to_bits(xlen, if len > cap_max_addr then cap_max_addr else len); RETIRE_SUCCESS
2.8.3.3. YTOPR
- Synopsis
-
Read capability top address
- Mnemonic
-
ytopr rd, rs1 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
2.8.4. Instructions to Extract Capability Fields
These instructions either directly read bit fields from the metadata or capability tag, or only apply simple transformations on the metadata.
| Mnemonic | Description |
|---|---|
Read capability tag |
|
Read capability permissions |
|
Read capability type |
|
YHIR1 |
Read capability metadata (pseudo) |
2.8.4.1. YTAGR
- Synopsis
-
Read capability tag
- Mnemonic
-
ytagr rd, rs1 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Zero extend the value of
rs1.tagand write the result tord. - Included in
- Operation
-
let capVal = C(cs1); X(rd) = zero_extend(bool_to_bits(capVal.tag)); RETIRE_SUCCESS
2.8.4.2. YPERMR
- Synopsis
-
Read capability permissions
- Mnemonic
-
ypermr rd, rs1 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Convert the unpacked AP-field, SDP-field, and any other extension-defined permission-like fields of capability
rs1into a bit field, with the same format as used by YPERMC (see Figure 6), and write the result tord.All bits in the
[23:0]range that are reserved or assigned to extensions that are not implemented by the current hart always report 1.All architectural permission bits in
rdare set to 0 if any integrity checks failed.
The value of rs1.tag does not affect the result.
|
- Included in
- Operation
-
let capVal = C(cs1); X(rd) = packPerms(getArchPermsLegalized(capVal), capVal.sd_perms).bits; RETIRE_SUCCESS
2.8.4.3. YTYPER
- Synopsis
-
Read capability type
- Mnemonic
-
ytyper rd, rs1 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
2.8.4.4. SRLIY
- Synopsis
-
Logical right shift of Y register
- Mnemonic
-
srliy rd, rs1, shamt - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Logical right shift of Y register
rs1tord, zero-filling the upper bits of the result.
The only valid shift amount is XLEN (i.e., YHIR).
A future extension may add an arbitrary shift distance.
|
- Included in
- Operation
-
TODO
2.8.4.5. YHIR
- Synopsis
-
Read capability metadata (pseudo)
- Mnemonic
-
yhir rd, rs1 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
yhir rd, rs1 is a pseudo instruction for a XLEN-wide right shift (SRLIY).
|
- Description
-
Copy the metadata (bits [YLEN-1:XLEN]) of capability
rs1intord.The value of rs1.tagdoes not affect the result. - Included in
- Operation
-
let capVal = C(cs1); X(rd) = capToMetadataBits(capVal).bits; RETIRE_SUCCESS
2.8.5. Miscellaneous Instructions to Handle Capability Data
| Mnemonic | Description |
|---|---|
Capability equality comparison including capability tag |
|
Capability subset |
|
Capability alignment mask |
2.8.5.1. YEQ
- Synopsis
-
Capability equality comparison including capability tag
- Mnemonic
-
yeq rd, rs1, rs2 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Set
rdto 1 if all bits (i.e., YLEN bits and the capability tag) of capabilitiesrs1andrs2are equal, otherwise setrdto 0. - Included in
- Operation
-
let cs1_val = C(cs1); let cs2_val = C(cs2); X(rd) = zero_extend(bool_to_bits(cs1_val == cs2_val)); RETIRE_SUCCESS
2.8.5.2. YSS
- Synopsis
-
Capability Subset
- Mnemonic
-
yss rd, rs1, rs2 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
rdis set to 1 if:-
the capability tag of capabilities
rs1andrs2are equal, and -
rs2's permissions and bounds are equal to or a subset ofrs1's, and -
neither
rs1norrs2fail any integrity checks -
any extension-specific constraints capability subset relationships hold.
-
Otherwise set rd to 0.
Extensions may further impose constraints on when rd is set to 1.
| The implementation of this instruction is similar to YBLD, although YSS does not include the sealed bit in the check. |
- Included in
- Operation
-
let cs1_val = C(cs1); let cs2_val = C(cs2); X(rd) = zero_extend(bool_bits( (cs1_val.tag == cs2_val.tag) & capIsSubset(cs2_val, cs1_val) /* capIsSubset returns false if either input has malformed bounds, perms, or non-zero reserved bits */ )); RETIRE_SUCCESS
2.8.5.3. YAMASK
- Synopsis
-
Capability alignment mask
- Mnemonic
-
yamask rd, rs1 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
rd[XLEN-1:0]is set to a mask that can be used to round addresses down to a value that is sufficiently aligned to set exact bounds for the nearest representable length ofrs1[XLEN-1:0]. The upper bits ofrdare zero extended. See Section 2.10.1.6 for the algorithm used to compute the next representable length. - Included in
- Operation
-
let len = X(rs1); X(rd) = getRepresentableAlignmentMask(len); RETIRE_SUCCESS
2.8.6. Instructions to Load and Store Capability Data
New loads and stores are introduced to handle capability data, LY and SY. They atomically access YLEN bits of data and the associated capability tag.
All capability memory accesses check for C-permission in the authorizing capability in rs1.
If C-permission is granted then:
If C-permission is not granted then:
All capability data memory access instructions require YLEN-aligned addresses, and will take an access fault exception if this requirement is not met. They cannot be emulated.
| An access fault is raised instead of a misaligned exception since these instructions cannot be emulated since there is one hidden capability tag per YLEN-aligned memory region. |
All memory accesses, of any type, require permission from the authorizing capability in rs1.
-
All loads require R-permission, otherwise they raise an exception.
-
All stores require W-permission, otherwise they raise an exception.
Under some circumstances LY will modify the data loaded from memory before writing it back to the destination register. See LY for details.
| Mnemonic | Description |
|---|---|
Load capability |
|
Store capability |
2.8.6.1. LY
- Synopsis
-
Load capability
- Mnemonic
-
ly rd, offset(rs1) - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
Any instance of this instruction with rs1=x0 will raise an exception, as x0 is defined to always hold a NULL capability.
As such, the encodings with rs1=x0 are RESERVED for use by future extensions.
|
- Description
-
Calculate the effective address of the memory access by adding
rs1.addressto the sign-extended 12-bit offset.Authorize the memory access with the capability in
rs1.Load a naturally aligned YLEN-bit data value from memory.
If the PMA is CHERI Capability Tag then load the associated capability tag, otherwise set the capability tag to zero.
The capability tag may also be set to 0 under platform specified conditions.
Extensions may also specify conditions which set the capability tag to zero. Use the YLEN-bit data and the capability tag to determine the value of
rdas specified below.Platforms may strip loaded capability tags for a number of reasons. For example:
-
The RVY privileged specification permits Physical Memory Attributes (PMAs) that cannot store capability tags, as might be the case with MMIO. The capability tags transported by SY instructions to these regions are set to 0 and so will not read back.
-
The MMU of the RVY privileged specification introduces page mappings that always set loaded capability tags to 0 even if the loaded location has a set capability tag. Privileged software can use such mappings to limit capability propagation between virtual address spaces while still allowing for data exchange.
-
CHERIoT platforms use so-called "capability load filters" to allow software (usually shared heap allocators) to ensure that capabilities pointing to deallocated memory cannot be loaded into the register file from memory.
-
A future extension is likely to specify the behavior of the "capability load filter" for embedded CHERI systems.
-
This instruction can propagate valid capabilities which fail integrity checks.
-
- Determining the final value of
rd -
If the capability tag is zero, or the authorizing capability (
rs1) does not grant C-permission then setrd.tag=0. In this case the steps below do not apply.If the capability tag is zero, all YLEN bits are transferred to the register without mutation, such that, for example, a SY instruction writing the destination register back to memory produces an exact copy. That is, the transferred value is not subjected to capability integrity checks and may, if viewed as a capability, not be derivable from the system’s capability roots. Especially, if the capability encoding has reserved bits or reserved values within its fields, these must be faithfully transported through registers. This property is essential for efficient, "capability-oblivious" implementation of C’s
memcpy().If
rd.tag=1,rdis not sealed andrs1does not grant LM-permission, then an implicit YPERMC is performed to clear W-permission and LM-permission fromrd.Extensions may define further circumstances under which implicit YPERMC-s or other mutation of loaded capabilities may take place. While the implicit YPERMC introduces a dependency on the loaded data, implementations can avoid this by deferring the actual masking of permissions until the loaded capability is dereferenced or the metadata bits are inspected using YPERMR or YHIR. Additionally, metadata modifications are on naturally aligned data, and so on the read path from a data cache, the modification typically happens in parallel with data alignment multiplexers. When sending load data to a trace interface, implementations trace the final value written to
rdwhich may not match the value in memory. - Exceptions
-
Load access fault exception when the effective address is not aligned to YLEN/8.
Exceptions occur when the authorizing capability fails one of the checks listed below:
Kind Reason CHERI Load Access Fault
Authorizing capability tag is set to 0.
CHERI Load Access Fault
Authorizing capability is sealed.
CHERI Load Access Fault
Authorizing capability does not grant the necessary permissions.
CHERI Load Access Fault
At least one byte accessed is outside the authorizing capability bounds, or the bounds could not be decoded.
CHERI Load Access Fault
Authorizing capability failed any integrity check.
- Included in
- Operation
-
let offset : xlenbits = sign_extend(imm); let (auth_val, vaddr) = get_cheri_mode_cap_addr(rs1_cs1, offset); let aq : bool = false; let rl : bool = false; match check_and_handle_load_vaddr_for_triggers(vaddr, get_arch_pc()) { Some (ret) => return ret, None () => () }; if not(capTaggedAndReservedValid(auth_val)) then { handle_cheri_exception(CapCheckType_Data, CapEx_TagViolation); RETIRE_FAIL } else if capIsSealed(auth_val) then { handle_cheri_exception(CapCheckType_Data, CapEx_SealViolation); RETIRE_FAIL } else if not(canR(auth_val)) then { handle_cheri_exception(CapCheckType_Data, CapEx_PermissionViolation); RETIRE_FAIL } else if not(validAddrRange(vaddr, cap_size) | capBoundsInfinite(auth_val)) then { handle_cheri_exception(CapCheckType_Data, CapEx_InvalidAddressViolation); RETIRE_FAIL } else if not(inCapBounds(auth_val, vaddr, cap_size)) then { handle_cheri_exception(CapCheckType_Data, CapEx_LengthViolation); RETIRE_FAIL } else if not(is_aligned_addr(vaddr, cap_size)) then { handle_mem_exception(vaddr, E_Load_Addr_Align()); RETIRE_FAIL } else match translateAddr(vaddr, Read(Cap)) { TR_Failure(E_Extension(_)) => { internal_error(__FILE__, __LINE__, "unexpected cheri exception for cap load") }, TR_Failure(e) => { handle_mem_exception(vaddr, e); RETIRE_FAIL }, TR_Address(addr, pbmt, ptw_info) => { let c = mem_read_cap(addr, pbmt, aq, aq & rl, false); match c { MemValue(v) => { let cr = clearTagIf(v, ptw_info.ptw_lc == PTW_LC_CLEAR | not(canC(auth_val))); C(cd) = legalizeLM(cr, auth_val); RETIRE_SUCCESS }, MemException(e) => {handle_mem_exception(vaddr, e); RETIRE_FAIL } } } }
2.8.6.2. SY
- Synopsis
-
Store capability
- Mnemonic
-
sy rs2, offset(rs1) - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
Any instance of this instruction with rs1=x0 will raise an exception, as x0 is defined to always hold a NULL capability.
As such, the encodings with rs1=x0 are RESERVED for use by future extensions.
|
- Description
-
Calculate the effective address of the memory access by adding
rs1.addressto the sign-extended 12-bit offset.Authorize the memory access with the capability in
rs1.Store a naturally aligned YLEN-bit data value in
rs2to memory and the associated capability tag inrs2.This instruction can propagate valid capabilities which fail integrity checks.
- Stored Capability Tag Value
-
The stored capability tag is set to zero if:
-
rs2.tag=0, or -
rs1does not grant C-permission, or -
The PMA is CHERI Capability Tag Strip
Extensions may define further circumstances under which stored capabilities may have their capability tags set to 0.
-
- Exceptions
-
Store/AMO access fault exception when the effective address is not aligned to YLEN/8.
Store/AMO access fault if the stored capability tag is set to one and the PMA is CHERI Capability Tag Fault.
Exceptions occur when the authorizing capability fails one of the checks listed below:
Kind Reason CHERI Store/AMO Access Fault
Authorizing capability tag is set to 0.
CHERI Store/AMO Access Fault
Authorizing capability is sealed.
CHERI Store/AMO Access Fault
Authorizing capability does not grant the necessary permissions.
CHERI Store/AMO Access Fault
At least one byte accessed is outside the authorizing capability bounds, or the bounds could not be decoded.
CHERI Store/AMO Access Fault
Authorizing capability failed any integrity check.
- Included in
- Operation
-
let offset : xlenbits = sign_extend(imm); let (auth_val, vaddr) = get_cheri_mode_cap_addr(rs1_cs1, offset); let cs2_val = C(cs2); let aq : bool = false; let rl : bool = false; let cs2_val = clearTagIf(cs2_val, not(canC(auth_val))); match check_and_handle_store_vaddr_for_triggers(vaddr, get_arch_pc()) { Some (ret) => return ret, None () => () }; if not(capTaggedAndReservedValid(auth_val)) then { handle_cheri_exception(CapCheckType_Data, CapEx_TagViolation); RETIRE_FAIL } else if capIsSealed(auth_val) then { handle_cheri_exception(CapCheckType_Data, CapEx_SealViolation); RETIRE_FAIL } else if not(canW(auth_val)) then { handle_cheri_exception(CapCheckType_Data, CapEx_PermissionViolation); RETIRE_FAIL } else if not(validAddrRange(vaddr, cap_size) | capBoundsInfinite(auth_val)) then { handle_cheri_exception(CapCheckType_Data, CapEx_InvalidAddressViolation); RETIRE_FAIL } else if not(inCapBounds(auth_val, vaddr, cap_size)) then { handle_cheri_exception(CapCheckType_Data, CapEx_LengthViolation); RETIRE_FAIL } else if not(is_aligned_addr(vaddr, cap_size)) then { handle_mem_exception(vaddr, E_SAMO_Addr_Align()); RETIRE_FAIL } else match translateAddr(vaddr, Write(if cs2_val.tag then Cap else Data)) { TR_Failure(e) => { handle_mem_exception(vaddr, e); RETIRE_FAIL }, TR_Address(addr, pbmt, _) => { let eares : MemoryOpResult(unit) = mem_write_ea_cap(addr, aq & rl, rl, false); match (eares) { MemException(e) => { handle_mem_exception(vaddr, e); RETIRE_FAIL }, MemValue(_) => { let res : MemoryOpResult(bool) = mem_write_cap(addr, pbmt, cs2_val, aq & rl, rl, false); match (res) { MemValue(true) => RETIRE_SUCCESS, MemValue(false) => internal_error(__FILE__, __LINE__, "store got false from mem_write_value"), MemException(e) => { handle_mem_exception(vaddr, e); RETIRE_FAIL } } } } } }
2.9. Changes to Existing RISC-V Base ISA Instructions
RVY extend existing instructions that are used for handling addresses so that they manipulate a whole capability.
-
Whenever an input operand is used as an address (e.g., the load/store base address), all capability bits are fed into the instruction instead of just XLEN bits.
-
Any instruction that writes back an address (e.g., AUIPC (RVY) or CSRRW (RVY)) to the destination register, writes a full capability register instead of just XLEN bits. For all other results the high bits of the register and the capability tag are zeroed.
-
Whenever a capability with a new address is returned, the result is always created using the semantics of the YADDRW instruction.
ADD and ADDI are not affected by the rule above.
Even though they are used for handling addresses, they also have other uses.
New encodings are used for capability addition: YADD and YADDI.
They must be used for all address incrementing.
|
Integer add (
|
The rules above apply to the base ISA instructions listed in the following subsections, but also apply to instructions added by other extensions. Any change to instruction semantics (or remapping of opcodes) for RVY is called out in the chapter defining the extension.
2.9.1. Changes to load/stores
All load and store instructions behave as described in Load and Store Instructions with one fundamental difference:
-
Any memory instruction that has
rs1as a base address register reads the full capability register instead. The base address is unchanged, i.e., using the value fromrs1. The metadata and capability tag are used to authorize the access. -
For a load instruction, the lower XLEN bits of the result written to the destination register are the same as in the RV32I/RV64I specification.
All load and store instructions authorized by rs1 raise exceptions if any of these checks fail:
-
rs1must not bex01 -
The capability tag (
rs1.tag) must be set -
rs1must be unsealed -
For loads, R-permission must be set in
rs1 -
For stores, W-permission must be set in
rs1 -
All integrity checks on
rs1must pass
1 All load/store encodings are reserved if rs1=x0 (since dereferencing NULL always faults).
All load instructions, except for the RVY LY, always zero the capability tag and metadata of the result register.
All store instructions, except for the RVY SY, always write zero to the capability tag or capability tags associated with the memory locations that are written to. Therefore, misaligned stores may clear up to two associated capability tag bits.
The changed interpretation of the base register also applies to all loads, stores and all other memory operations defined in later chapters of this specification with a base operand of rs1 unless stated otherwise.
Under RVY all loads and stores are authorized by rs1.
These rules affect the following base ISA instructions listed in Table 19, and also apply to instructions added by other extensions, e.g.,:
-
Floating-point loads and stores.
-
Atomic memory accesses, see "Zaamo" for RVY and "Zalrsc" for RVY.
| Mnemonic | Description |
|---|---|
Integer loads (authorized by the capability in |
|
Integer stores (authorized by the capability in |
2.9.2. Changes to PC
-
Whenever the address field of the pc is modified, it is always updated using the semantics of the YADDRW instruction. This includes adding an offset to the pc from direct jumps and branches for both the target address and the link register. In this case, e.g.,
new_pc = YADDRW(old_pc, offset) -
JALR (RVY) copies
rs1into the pc, and increments the address field with the offset. In this case, e.g.,new_pc = YADDRW(rs1, offset)
These rules affect the following base ISA instructions listed in Table 19, and also apply to instructions added by other extensions, e.g.:
| Mnemonic | Description |
|---|---|
Add upper immediate to pc |
|
Immediate offset jump, and link to capability register |
|
Jump to capability register, and link to capability register |
2.9.3. AUIPC (RVY)
- Synopsis
-
Add upper immediate to pc
- Mnemonic
-
auipc rd, imm - Encoding
| This instruction is extended from the version in the base ISA. |
- Description
-
Form a 32-bit offset from the 20-bit immediate filling the lowest bits with zero; the number of places to shift is determined by the capability encoding’s choice of the AUIPC shift value (12, unless otherwise specified by the capability encoding format). Take the value of the AUIPC instruction’s pc, increment its address by the 32-bit offset using the semantics of the YADDRW instruction and write the result to
rd.Set
rd.tag=0if the resulting capability cannot be represented exactly. - Included in
- Operation
-
let off : xlenbits = sign_extend(imm @ 0x000); let (representable, newCap) = setCapAddr(PCC, PC + off); C(cd) = clearTagIf(newCap, not(representable)); RETIRE_SUCCESS
2.9.4. The AUIPC Shift
The RISC-V base integer ISA frequently splits signed 32-bit constants
across instructions as the addition of a signed 12-bit constant
and a 20-bit constant shifted left by 12 bits.
For example, the I-type instruction ADDI, with its 12-bit immediate,
is to be combined with the U-type LUI instruction and its 20-bit immediate
when values beyond the reach of a signed 12-bit value are needed.
To reach a given value in this way involve "overshooting" the desired value:
for example, to materialize 0xf01 (3841) into a register,
one uses LUI to materialize 0x1000 (4096)
and ADDI to subtract 0xff (255).
Similarly, the U-type AUIPC instruction, with its 20-bit immediate,
is designed to compose well with the signed 12-bit immediate operands
of load (I-type) and store (S-type) instructions.
When manipulating addresses within capabilities, there is a risk
that such two-step sequences could take the address out of bounds
before attempting to bring it back within bounds.
Many capability encodings, including those of RV64LYmw14rc1ps,
have a representable range sufficient
to ensure that any capability whose length is larger than 2 KiB
(that is, those for which a signed 12-bit displacement might be insufficient)
are able to represent at least 2 KiB on either side of their bounds.
However, this is not an essential property of capability encodings,
and so this specification allows the capability encoding to specify
the shift used within address-manipulating instructions with shifted immediates.
For AUIPC (RVY) specifically, we refer to this value as the AUIPC shift,
and take it to be 12 unless the capability encoding sets it to another value.
(Taking the shift to be 11 instead of 12 decreases the reach of AUIPC
from ±2 GiB to ±1 GiB, but ensures that all values within that range
can be obtained with the same sign bit in the AUIPC immediate
and subsequent 12-bit immediate(s),
thereby ensuring that in-bounds addresses can be reached without risk of
the intermediate computation exceeding capability bounds.)
| Future extensions that add instructions with similar semantics should make use of this same encoding-specified shift value or otherwise allow the capability encoding to set the shift amount. |
2.9.5. JAL (RVY)
- Synopsis
-
Immediate offset jump, and link to capability register
- Mnemonic
-
jal rd, offset - Encoding
- Description
-
Direct jump with an address offset.
-
The target address is obtained by adding the sign-extended 20-bit J-immediate to
pc.address. -
The target pc is obtained by applying the target address to the pc of the JAL instruction, using the semantics of the YADDRW instruction.
-
The pc of the next instruction is sealed as a backward-edge sentry capability and written to
rd. -
Jump to the target pc.
If the only supported CT-field is zero, then no backward-edge sentry capabilities exist, and so sealing has no effect. This behavior requires non-zero CT-field values to be implemented, such as by the Zysentry extension. A future extension may raise an exception on the branch instruction itself if fetching a minimum sized instruction at the target pc will raise a CHERI Instruction Access Fault. Performing the pc bounds check at the branch source instead of on instruction fetch is helpful for debugging and can simplify the implementation of CPUs with very short pipelines.
-
- Included in
- Operation
-
TODO
2.9.6. JALR (RVY)
- Synopsis
-
Jump to capability register, and link to capability register
- Mnemonic
-
jalr rd, rs1, offset - Encoding
| This instruction is extended from the version in the base ISA. |
- Description
-
Indirect jump to the target capability in
rs1with an address offset.The description below is generic, and implementations which need control-flow-integrity will include at least one extension which defines one or more sentry capabilities. All such extensions are required to detail the specialized behavior of JALR to remove any ambiguity. For example, see Zysentry. -
rs1is written to the target pc. -
If
rd≠x0,rs1is sealed andrs1is not a forward-edge sentry capability, then the behavior is reserved1. -
If
rd=x0, 'rs1' is the link register ,rs1is sealed andrs1is not a backward-edge sentry capability, then the behavior is reserved1. -
The target address is obtained by adding the sign-extended 12-bit I-immediate to
rs1.address, then setting the least-significant bit of the result to zero. -
Unseal the target pc if it is any sentry capability,
rs1.address[0]is zero, and the I-immediate is zero. -
Set the address of the target pc to the target address using the semantics of the YADDRW instruction.
-
The pc of the next instruction is sealed as a backward-edge sentry capability and written to
rd. -
Jump to the target pc.
1 Extensions that introduce new sealed types must define how they interact with JALR (RVY), otherwise the behaviour is to set the capability tag of the target pc to zero.
If the only supported CT-field is zero, then no sentry capabilities exist, and so sealing and unsealing have no effect on JALR. In this case the specialized operation becomes:
-
rs1is written to the target pc. -
The target address is obtained by adding the sign-extended 12-bit I-immediate to
rs1.address, then setting the least-significant bit of the result to zero. -
Set the address of the target pc to the target address using the semantics of the YADDRW instruction.
-
The pc of the next instruction is written to
rd. -
Jump to the target pc.
A future extension may raise an exception on the JALR (RVY) instruction itself if the target pc will raise a CHERI Instruction Access Fault at the target. The standard software calling convention uses 'x1' as the link register. -
-
- Included in
- Operation
-
TODO
2.9.7. Changes to BEQ, BNE
For beq and bne only, if rs1≤rs2 then the encoding is RESERVED.
| These encodings are redundant and may be used by future extensions. |
| Future behavior for these reserved branch encodings may include branching on capability tag values only, or YLEN-bit compares. |
If the target of a taken branch lies outside the bounds of pc, the next instruction fetch will raise an exception.
| A future extension may raise an exception on the branch instruction itself if fetching a minimum sized instruction at the target pc will raise a CHERI Instruction Access Fault. |
2.10. The RV64LYmw14rc1ps Capability Base for RV64Y
This section describes the in-memory format and properties of the capability encoding intended for RV64Y.
| The format is closely modeled upon features from CHERI v9 (Watson et al., 2023), and the bounds encoding scheme is based upon CHERI Concentrate (Woodruff et al., 2019). |
2.10.1. Capability Encoding
| Reserved bits must be 0 in valid capabilities and are available for future extensions to RVY. |
The encoding diagram above of the capability format includes some fields which depend upon the presence of extensions:
- Zyhybrid
-
When Zyhybrid is supported, capabilities include an P-bit (bit 52). If the capability does not grant X-permission or Zyhybrid is not supported, the P-bit is always reserved and so must be zero in valid capabilities.
- Zylevels1
-
If Zylevels1 is available, bits 6 and 7 of the
APfield are allocated, otherwise they must always be set to one for any valid capability. Additionally, the GL flag is only available if Zylevels1 is implemented, otherwise it is reserved and must be zero.
This capability encoding has the following properties that affect the observable behavior of RVY instructions such as YBNDSW and YPERMC:
-
Mantissa width (mw14): The mantissa width for the bounds encoding uses 14 bits
-
Maximum exponent (e52): The maximum value for the exponent in a valid capability is 52.
-
Representable region (rc1): The encoding uses one additional bit to ensure a centered region of at least 1/4 of the capability size remains representable when creating out-of-bounds derived capabilities.
-
Permission encoding (ps): The permissions are encoded using a simple representation of one bit per architectural permission.
2.10.1.1. Capability Encoding Summary
| Parameter | Value | Comment |
|---|---|---|
MW |
14 |
Mantissa width |
EW |
6 |
Exponent width |
CAP_MAX_E |
52 |
Maximum exponent value |
enableL8 |
0 |
Whether the encoding format includes the L8 bit |
AP_PBit |
0 |
Whether the P-bit is encoded in the AP-field |
AP_MAX |
ones |
Value of the AP field giving maximum permissions |
| Extension | Comment |
|---|---|
Compatible |
|
Compatible |
|
Compatible |
|
All RV64Y versions of other standard extensions |
Compatible |
| Feature | Comment |
|---|---|
Representable region |
At least 1/4 of the capability size |
Permission encodings |
All combinations can be represented, some combinations are reserved |
2.10.1.2. Architectural Permissions (AP) Encoding
The permissions field is 8 bits wide and is encoded using one bit per architectural permission as shown in Table 23. A permission is granted if its corresponding bit, and those of any dependent permissions, are set; otherwise, the capability does not grant that permission. Certain combinations of permissions are impractical. For example, C-permission is superfluous when the capability does not grant either R-permission or W-permission. Therefore, it is only legal to encode a subset of all combinations, but this capability encoding does not make use of this redundancy as there are sufficient reserved bits.
| In the future, if there are no further remaining reserved bits, but extensions need to allocate further capability metadata bits, it will be possible to use the redundancy to create a future version of this encoding that is fully compatible for all software but with observable differences in the in-memory representation of capabilities. |
| Bit | Encoded permission |
|---|---|
0 |
|
1 |
|
2 |
|
3 |
|
4 |
|
5 |
|
6 |
LG-permission if Zylevels1 is implemented; reserved |
7 |
SL-permission if Zylevels1 is implemented; reserved |
| Future extensions may define new permissions and, if so, must augment the above table. |
2.10.1.3. Capability Mode (P) Encoding
The P-bit is only assigned meaning when the implementation supports Zyhybrid and X-permission is set. In valid capabilities, the bit assigned to the P-bit must be zero if X-permission isn’t set.
2.10.1.5. Capability Type (CT) Encoding
The capabilities of this chapter define a 1-bit field for CT-field values;
this field directly encodes the values 0 and 1:
-
The encoded value
0indicates an unsealed type. -
If Zysentry is supported, then
1encodes an unrestricted sentry capability. -
Otherwise, the value
1is reserved.
2.10.1.6. Bounds (EF, T, TE, B, BE) Encoding
2.10.1.6.1. Concept
This bounds encoding scheme is based upon (Woodruff et al., 2019).
The bounds encode the base and top addresses that constrain memory accesses. The capability can be used to access any memory location A in the range base ≤ A < top. The bounds are encoded in a compressed format, so it is not possible to encode any arbitrary combination of base and top addresses. An invalid capability with capability tag cleared is produced when attempting to construct a capability that is not representable because its bounds cannot be correctly encoded. The bounds are decoded as described in Section 2.10.1.
The bounds field has the following components:
-
T: Value substituted into the capability’s address to decode the top address
-
B: Value substituted into the capability’s address to decode the base address
-
E: Exponent that determines the position at which B and T are substituted into the capability’s address
-
EF: Exponent format flag indicating the encoding for T, B and E
-
The exponent is stored in T and B if EF=0, so it is 'internal'
-
The exponent is zero if EF=1
-
The bit width of T and B are defined in terms of the mantissa width (MW) which is set depending on capability encoding as shown in Table 20.
The exponent E indicates the position of T and B within the capability’s address as described in Section 2.10.1. The bit width of the exponent (EW) is set depending on the encoding. The maximum value of the exponent is calculated as follows:
CAP_MAX_E = XLEN - MW + 2
The values of EW and CAP_MAX_E are shown in Table 20.
| The address and bounds must be representable in valid capabilities i.e., when the capability tag is set (see Section 2.10.1.6.4). |
2.10.1.6.2. Decoding
The metadata is encoded in a compressed format termed CHERI Concentrate (Woodruff et al., 2019). It uses a floating point representation to encode the bounds relative to the capability address. The base and top addresses from the bounds are decoded as shown below.
The pseudocode below does not have a formal notation.
It is a place-holder until the sail implementation has been integrated in the specification.
In this notation, / means "integer division", [] are the bit-select operators, and arithmetic is signed.
|
EW = (XLEN == 32) ? 5 : 6
CAP_MAX_E = XLEN - MW + 2
If EF = 1:
E = 0
T[EW / 2 - 1:0] = TE
B[EW / 2 - 1:0] = BE
LCout = (T[MW - 3:0] < B[MW - 3:0]) ? 1 : 0
LMSB = (XLEN == 32) ? L~8~ : 0
else:
E = CAP_MAX_E - ( (XLEN == 32) ? { L~8~, TE, BE } : { TE, BE } )
T[EW / 2 - 1:0] = 0
B[EW / 2 - 1:0] = 0
LCout = (T[MW - 3:EW / 2] < B[MW - 3:EW / 2]) ? 1 : 0
LMSB = 1
Reconstituting the top two bits of T:
T[MW - 1:MW - 2] = B[MW - 1:MW - 2] + LCout + LMSB
-
If E = 0 the lower section does not exist.
-
If E+MW=XLEN then the top section is only the least significant bit of ct for the top bound, and top section doesn’t exist for the bottom bound.
-
If E+MW>XLEN then neither top section exists, and so the bounds are calculated with no dependency on the address field a.
The corrections ct and cb are calculated as shown below using the definitions in Table 24 and Table 25.
A[MW-1:0] = a[E + MW - 1:E]
R[MW-1:0] = B - 2MW-2
| A < R | T < R | ct |
|---|---|---|
false |
false |
0 |
false |
true |
+1 |
true |
false |
-1 |
true |
true |
0 |
| A < R | B < R | cb |
|---|---|---|
false |
false |
0 |
false |
true |
+1 |
true |
false |
-1 |
true |
true |
0 |
The base, b, and top, t, addresses are derived from the address by substituting a[E + MW - 1:E] with B and T respectively and clearing the lower E bits. The most significant bits of a may be adjusted up or down by 1 using corrections cb and ct to allow encoding memory regions that span alignment boundaries.
The EF bit selects between two cases:
-
EF = 1: The exponent is 0. When
enableL8=1, L8 encodes the MSB of the length, which can be used to derive T[MW-1:MW-2], forming a full MW-wide T field. -
EF = 0: The exponent is internal with E stored in the lower bits of T and B, with L8 used for the MSB of E when
enableL8=1. E is chosen so that the most significant non-zero bit of the length of the region aligns with T[MW - 2] such that this bit is implied by E.
The most significant two bits of T can be derived from B using
the equality T = B + L, where L[MW - 2] is known from the values of EF and E
(as well as L8 when enableL8=1).
A carry out is implied if T[MW - 3:0] < B[MW - 3:0] since it is
guaranteed that the top is larger than the base.
The compressed bounds encoding allows the address to roam over a large representable region while maintaining the original bounds. This is enabled by defining a lower boundary R from the out-of-bounds values that allows us to disambiguate the location of the bounds with respect to an out-of-bounds address. R is calculated relative to the base by subtracting 2MW-2 from B. If B, T or a[E + MW - 1:E] is less than R, it is inferred that they lie in the 2E+MW aligned region above R labeled spaceU in Figure 2 and the corrections ct and cb are computed accordingly. The overall effect is that the address can roam 2E+MW/4 bytes below the base address and at least 2E+MW/4 bytes above the top address while still allowing the bounds to be correctly decoded.
2.10.1.6.3. Top bound MSB correction
A capability has infinite bounds if its bounds cover the entire address space such that the base address b=0 and the top address t≥2XLEN, i.e., t is an XLEN + 1 bit value. However, b is an XLEN-bit value and the size mismatch introduces additional complications when decoding, so the following condition is required to correct t for capabilities whose Representable Range wraps the edge of the address space:
if ( (E < (CAP_MAX_E - 1)) && (t[XLEN: XLEN - 1] - b[XLEN - 1] > 1) )
t[XLEN] = !t[XLEN]
| The comparison is unsigned. |
That is, invert the most significant bit of t if the decoded length of the capability is larger than E.
| A capability has infinite bounds if E=CAP_MAX_E and it is not malformed (see Section 2.10.1.6.4); this check is equivalent to b=0 and t≥2XLEN. |
2.10.1.6.4. Malformed Capability Bounds
A capability is malformed if its bounds cannot be correctly decoded.
The following check indicates whether a capability is malformed.
If enableL8 is true, the L8 bit is available in the capability encoding format for extra precision when EF=1.
malformedMSB = (E == CAP_MAX_E && B != 0)
|| (E == CAP_MAX_E - 1 && B[MW - 1] != 0)
malformedLSB = (E < 0) || (E == 0 && enableL8)
malformed = !EF && (malformedMSB || malformedLSB)
Capabilities with malformed bounds:
2.10.2. Representable Range Check
The concept of the representability check was introduced in Section 2.3.7.
The definition of the check is:
-
A source capability with address a, metadata m that decodes to give the bounds b and t.
-
A derived capability with arbitrary address a' with the same metadata m that decodes to give the bounds b' and t'.
The address a' is within the source capability’s representable range if b == b' && t == t'.
If the address a' is outside the representable range, then the derived capability has the capability tag set to zero.
2.10.2.1. Practical Information
An artifact of the bounds encoding is that if the new address
causes t != t', then it is also the case that b != b'.
The inverse is also true, if b != b' then t != t'.
Therefore, for representable range checking, it is acceptable
to either check t == t' or b == b'.
The top and bottom capability bounds are formed of two or three sections:
-
Upper bits from the address
-
This is only if the other sections do not fill the available bits (E + MW < XLEN)
-
-
Middle bits from T and B decoded from the metadata
-
Lower bits are set to zero
-
This is only if there is an internal exponent (EF=0)
-
| Configuration | Upper Section (if E + MW < XLEN) | Middle Section | Lower Section |
|---|---|---|---|
EF=0 |
address[XLEN-1:E + MW] + ct |
T[MW - 1:0] |
{E{1’b0}} |
EF=1, i.e., E=0 |
address[XLEN-1:MW] + ct |
T[MW - 1:0] |
|
The representable range defines the range of addresses which do not corrupt the bounds encoding. The encoding was first introduced in Section 2.10.1, and is repeated in a different form in Table 26 to aid this description.
For the address to be valid for the current bounds encoding, the value
in the Upper Section of Table 26 must
not change as this will change the meaning of the bounds. This
is because T, B and E will be unchanged for the source and
destination capabilities. Therefore, the Middle and Lower sections
of the bounds calculation are also unchanged for source and
destination capabilities.
When E > CAP_MAX_E - 2, the calculation of the top bound is entirely derived
from T and E which will be identical for both the source and destination
capabilities, thus guaranteeing that t == t'. Likewise, with such values of E, the
base bound is entirely derived from B and E and therefore b == b'.
The calculation of the MSB of the top bound may be inverted as specified
in Section 2.10.1.6.3.
Assuming (E < (CAP_MAX_E - 1)), the truth-table for this inversion is as follows:
| input_t[XLEN:XLEN-1] | b[XLEN-1] | output_t[XLEN:XLEN-1] |
|---|---|---|
00 |
0 |
00 |
01 |
0 |
01 |
10 |
0 |
00 |
11 |
0 |
01 |
00 |
1 |
10 |
01 |
1 |
01 |
10 |
1 |
10 |
11 |
1 |
01 |
Inspection of Table 27 shows
that output_t[XLEN] does not depend on input_t[XLEN] as:
-
output_t[XLEN] = {input_t[XLEN-1], b[XLEN-1]} == 2’b01.
This leads to the conclusions:
-
If
t[XLEN-1] == t'[XLEN-1]andb[XLEN-1] == b'[XLEN-1], then it is guaranteedt[XLEN] == t'[XLEN]. -
If
t[XLEN-1] != t'[XLEN-1]orb[XLEN-1] != b'[XLEN-1], then the representable check will fail regardless of checkingt[XLEN] == t'[XLEN].
Therefore, for the purpose of representable range checking, it is not
required to check that t[XLEN]==t'[XLEN].
Given that t[XLEN] is not part of the representable range check:
-
when
E == CAP_MAX_E - 2,t[XLEN-1:E] == T[MW-1:0]andb[XLEN-1:E] == B[MW-1:0].
Therefore, T and B are both derived from the capabilities metadata and are
therefore constant. Which means that in this case too, the representable
range check always passes.
As a result:
-
If E > CAP_MAX_E - 3, then the representability check always passes, even though the bounds are only infinite if E = CAP_MAX_E
This gives a range of s=2E+MW, as shown in
Figure 2.
The gap between the object bounds and the bound of the representable range
is always guaranteed
to be at least 1/4 of s. This is represented by R = B - 2MW-2 in
Section 2.10.1.
This gives useful guarantees, such that if an executed instruction is in
pc bounds, then it is also guaranteed that the next linear instruction
is representable.
2.10.3. Encoding of Special Capabilities
2.10.3.1. NULL Capability Encoding
The NULL capability is represented with 0 in all fields. This implies that it has no permissions and its exponent E is CAP_MAX_E (52), so its bounds cover the entire address space such that the expanded base is 0 and top is 2XLEN.
| Field | Value | Comment |
|---|---|---|
Capability Tag |
zero |
Capability is not valid |
zeros |
Grants no permissions |
|
zeros |
Grants no permissions |
|
P1 |
zero |
No meaning since non-executable (Zyhybrid only) |
CT |
zero |
Unsealed |
EF |
zero |
Internal exponent format |
L82 |
zero |
Top address reconstruction bit |
T |
zeros |
Top address bits |
TE |
zeros |
Exponent bits |
B |
zeros |
Base address bits |
BE |
zeros |
Exponent bits |
Address |
zeros |
Capability address |
Reserved |
zeros |
All reserved fields |
1 Only present if AP_MBit=1 and Zyhybrid is implemented.
2 Only present if enableL8=1.
Permissions added by extensions (such as those of Zylevels1) are presumed absent in NULL capabilities.
2.10.3.2. Infinite Capability Encoding
This encoding is for an Infinite capability value, which grants all permissions while its bounds also cover the whole address space. It includes X-permission and so includes the P-bit if Zyhybrid is supported. This infinite capability is both a Root Executable and a Root Data capability.
| Field | Value | Comment |
|---|---|---|
Capability Tag |
one |
Capability is valid |
SDP |
ones |
Grants all permissions |
AP |
AP_MAX |
Grants all permissions |
P1 |
one |
CHERI Pointer Mode |
CT |
zero |
Unsealed |
EF |
zero |
Internal exponent format |
L82 |
zero |
Top address reconstruction bit |
T |
zeros |
Top address bits |
TE |
zeros |
Exponent bits |
B |
zeros |
Base address bits |
BE |
zeros |
Exponent bits |
Address |
any3 |
Capability address |
Reserved |
zeros |
All reserved fields |
1 Only present if AP_MBit=1 and Zyhybrid is implemented.
2 Only present if enableL8 is set.
3If an infinite capability is used as a constant in either hardware or software, then the address field will typically be set to zero. If the address field is non-zero then it is still referred to as an infinite capability, and it still has the authority to authorize all memory accesses.
Permissions added by extensions such as those of Zylevels1) are presumed present in Infinite capabilities.
3. "Zysentry" Extension for Creation of Sentry Capabilities
The Zysentry extension:
-
Defines one sentry capability type, the sentry capability type for both forward-edge and backward-edge control-flow transitions, with a CT-field value of
1. -
Adds the YSENTRY instruction to allow ambient sealing of capabilities as sentries with CT-field value of
1.
Zysentry is only compatible with capability encoding formats which can encode the CT-field value of 1.
3.1. Interaction with JALR (RVY)
Zysentry enables sealing and unsealing behavior in JALR (RVY) with the single sentry capability of type 1 being available.
Therefore the full operational description of JALR (RVY) is specialized to:
-
rs1is written to the target pc. -
The target address is obtained by adding the sign-extended 12-bit I-immediate to
rs1.address, then setting the least-significant bit of the result to zero. -
Unseal the target pc if it is sealed as a forward-edge sentry capability1 and
rs1.address[0]is zero and the I-immediate is zero. -
Set the address of the target pc to the target address using the semantics of the YADDRW instruction.
-
The pc of the next instruction is sealed as a sentry capability of type
1and written tord. -
Jump to the target pc.
1 type 1 defined by this extension is a forward-edge sentry capability, other compatible extensions may declare more forward-edge types which JALR (RVY) will unseal.
3.2. Interaction with JAL (RVY)
Zysentry enables sealing behavior in JAL (RVY) with the single sentry capability of type 1 being available.
Therefore the sealed type of rd is defined as follows:
-
The pc of the next instruction is sealed as a sentry capability of type
1and written tord.
3.3. Interaction with YBLD
The sentry capability type defined by this extension is ambient and so YBLD can output a sealed capability of this type.
3.4. Added instructions
3.4.1. YSENTRY
- Synopsis
-
Seal capability as a sentry
- Mnemonic
-
ysentry rd, rs1 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Copy
rs1tord.Set the capability type (CT-field) of
rdto the value1, representing a sentry type.YSENTRY does not require any permission to seal, and so is considered ambient. Set
rd.tag=0ifrs1is sealed. - Included in
- Operation
-
let cs1_val = C(cs1); let inCap = clearTagIf(cs1_val, capIsSealed(cs1_val)); C(cd) = sealCap(inCap); RETIRE_SUCCESS
4. "Zyhybrid" Extension for CHERI Pointer Modes
Zyhybrid is an optional extension to RVY which adds the ability to execute standard RISC-V (RV32[IE]/RV64[IE]) code on an RVY hart, while still allowing access to RVY instructions.
The ability to choose between these two behaviors is referred to as switching between CHERI Pointer Modes. This extension introduces a new bit in the capability metadata, the P-bit, to control these modes. When installed in pc, the P-bit determines the current execution mode.
| The P-bit determines whether pointers are interpreted as standard RISC-V Integer Addresses or as CHERI Capabilities. |
Zyhybrid adds instructions (see Table 51) to query and update the current mode.
This extension also adds the default data capability (ddc), an unprivileged CSR used to authorize data memory accesses when in Integral Pointer Mode.
| Together with pc, ddc enables confining execution to a compartment (or sandbox) where all memory accesses are bounded. These compartments provide binary compatibility for existing RV32[IE]/RV64[IE] code. Provided that the execution environment has set up ddc and pc appropriately, non-CHERI-aware programs will execute unmodified within these bounds. |
For detailed examples of how this extension facilitates co-existence and sandboxing, see the appendix on Section C.4.
RVY implementations which support Zyhybrid are typically referred to as CHERI Hybrid. Implementations which do not support Zyhybrid are referred to as CHERI Purecap and always operate in Capability Pointer Mode.
Because the base architecture remains RVY, the custom encoding space re-allocated to CHERI remains re-allocated.
| If an implementation needs to be able access custom encodings in spaces which have been reallocated, then privileged software should disable CHERI entirely. |
4.1. CHERI Pointer Modes
The two CHERI Pointer Modes are:
- Capability Pointer Mode
-
All pointer operands to instructions are interpreted as capabilities. Instruction semantics are as defined in the RVY base ISA.
- Integral Pointer Mode
-
All pointer operands to instructions are interpreted as for the RV32[IE]/RV64[IE] base ISA, i.e., as plain memory addresses without metadata. While the base ISA remains RVY (not RVI/RVE), this mode provides backwards compatibility with RVI/RVE. Operands are still checked against a capability, but instead of using the metadata from the full
YLENregister, the bounds and permissions are obtained from ddc (for data accesses) or pc (for instruction accesses).ARC-NOTE: Naming of these modes is still an open ARC comment. The goal is to differentiate interpretation of pointers as plain integer addresses vs. full capabilities with metadata. The current placeholder names Integral Pointer Mode and Capability Pointer Mode match compiler terminology (integral vs. non-integral pointers).
The following options have been considered:
Compatibility Mode Name Purecap Mode Name Notes Integral Pointer Mode
Capability Pointer Mode
Matches compiler terminology
Non-CHERI Mode
CHERI Mode
Using a negative to describe a mode is awkward
Non-CHERI Pointer Mode
CHERI Pointer Mode
Same again just with "Pointer"
Address Mode
Capability Mode
Address Pointer Mode
Capability Pointer Mode
"Address Pointer" is a bit odd
(Non-CHERI) Address Mode
(CHERI) Capability Mode
Older rejected proposal, parens are a bit awkward
Integer Mode
Capability Mode
CHERIv9 naming scheme.
RVI Mode
RVY Mode
Omits RVE, should it be RVI/RVE mode?
RVI Pointer Mode
RVY Pointer Mode
Again omits RVE
One past suggestion was "Pointer Mode" vs "Capability Mode". However, this is also confusing since capabilities are also pointers (just not "classic" pointers that are a number). In this naming scheme we want to show the difference in how hardware interprets pointers-type operands: as binary number (i.e., an address), or as a capability pointer (address+metadata).
If RVC encodings are supported, load/store encodings will revert to their non-CHERI encodings, such as C.LY reverting to C.FSD for RV64/RV64Y. This behavior is summarized in Table 41 and Table 42.
Instructions which are modified on an RVY architecture (see Table 36) revert to their standard RVI/RVE behavior.
All RVY instructions and CSRs are available in addition to all standard RV32[IE]/RV64[IE] instructions and CSRs.
Non-standard extensions with encodings in remapped custom space are not supported. The authorizing capability for data access is ddc (as opposed to
rs1). That is, all data memory accesses are implicitly authorized by ddc with only the memory address sourced fromrs1.All instruction fetches are authorized by pc.
Prefetches are also checked against the appropriate CSR (ddc for PREFETCH.W (RVY) and PREFETCH.R (RVY), pc for PREFETCH.I (RVY)) and execute as nops if authorization fails.
Authorization of prefetches is useful to mitigate against side channels, e.g., preventing userspace from fetching kernel memory into a cache. Reads to extended CSRs are XLEN-wide, and writes use the semantics of the YADDRW instruction (see Section 4.4).
The CHERI Pointer Mode is key in providing backwards compatibility with the base RV32[IE]/RV64[IE] ISAs.
| The CHERI Pointer Mode is always Capability Pointer Mode on implementations that support RVY, but not Zyhybrid. |
|
Software is Purecap if it uses CHERI capabilities for all memory accesses (including loads, stores, and instruction fetches). Purecap software requires RVY. Software is Hybrid if it uses both integer addresses and CHERI capabilities. Hybrid software requires both RVY and Zyhybrid. |
4.1.1. CHERI Pointer Mode Encoding
The current CHERI Pointer Mode is controlled by the P-bit in the capability metadata of pc. The P-bit (P) is only architecturally relevant for capabilities granting X-permission, as it only affects execution state when installed into pc.
| While the P-bit can be read or written explicitly using YMODER and YMODEW, these instructions do not change the current execution mode. The mode changes when a capability is installed into pc (e.g., via an indirect jump, see Section 4.1.2). |
Capabilities lacking X-permission may not have a defined P-bit field in their encoding, and attempting to update this field may be a no-op. Zyhybrid requires a capability encoding that supports transport of the P-bit (e.g., RV64LYmw14rc1ps).
-
CHERI Pointer Mode (P)=0 indicates Capability Pointer Mode.
-
CHERI Pointer Mode (P)=1 indicates Integral Pointer Mode.
When executing YPERMC, if X-permission is removed while the P-bit is set to one, and the capability encoding still permits representing the P-bit, then the P-bit must be set to zero.
4.1.2. Changing CHERI Pointer Mode
| Mnemonic | From mode | Description |
|---|---|---|
Capability Pointer Mode |
Jump to capability register, and link to capability register |
|
Capability Pointer Mode |
Switch execution to Integral Pointer Mode |
|
Integral Pointer Mode |
Switch execution to Capability Pointer Mode |
When JALR (RVY) copies rs1 into pc it includes copying the P-bit and so setting the CHERI Pointer Mode of the target instruction.
|
The P-bit of a X-permission-granting capability can be read and written by the instructions listed in Table 31:
| Mnemonic | Description |
|---|---|
Set capability execution mode |
|
Read capability mode |
| In addition to the mode switching instructions, the current mode can also be updated by setting the P-bit of a target capability using YMODEW followed by a JALR (RVY). |
4.1.3. Representation of the P-bit in the capability encoding
For capabilities that do not grant X-permission, P-bit must always be interpreted and reported as 0 representing Capability Pointer Mode.
| While this is not phrased as an additional rule for YPERMC to follow beyond those of Section 2.3.10.1, capability encodings may nevertheless take advantage of this implication in their representation of architectural CHERI capabilities. |
4.1.4. Observing the CHERI Pointer Mode
The effective CHERI Pointer Mode cannot be determined just by reading the P-bit from pc since it also depends on the execution environment.
The following code sequence demonstrates how a program can observe the current, effective CHERI Pointer Mode.
It will write, to x1, the value 1 for Capability Pointer Mode (wherein pc has a set capability tag)
or 0 for Integral Pointer Mode (wherein pc is just an address and has a clear capability tag):
auipc x1, 0
ytagr x1, x1
| Implementations that support Zyhybrid will typically boot into Integral Pointer Mode so that non-CHERI-aware software can run unmodified. CHERI-aware software can observe and switch the mode as required. |
4.2. Added instructions
4.2.1. YMODEW
- Synopsis
-
Set capability execution mode
- Mnemonic
-
ymodew rd, rs1, rs2 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Copy
rs1tord.If
rs1is sealed or ifrs1fails any integrity check, then setrd.tag=0.Otherwise, if
rs1grants X-permission then update the P-bit ofrdto:-
Capability Pointer Mode if the least significant bit of
rs2is 0, or, -
Integral Pointer Mode if the least significant bit of
rs2is 1.The value of rs1.tagdoes not affect the result.
-
- Included in
- Operation
-
let cap = C(cs1); let mode = execution_mode_encdec(X(rs2)[0 .. 0]); let cap = clearTagIf(cap, capIsSealed(cap)); let hasMode = not(permsMalformed(cap)) & canX(cap); let newCap = if hasMode then setCapMode(cap, mode) else cap; C(cd) = newCap; RETIRE_SUCCESS
4.2.2. YMODER
- Synopsis
-
Read capability mode
- Mnemonic
-
ymoder rd, rs1 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Decode the CHERI Pointer Mode from the capability in
rs1and write the result tord.Set
rdto 0 ifrs1does not grant X-permissionSet
rdto 0 if any integrity checks failed.Otherwise set
rdaccording tors1's CHERI Pointer Mode (P-bit):-
Set
rdto 0 for Capability Pointer Mode, or, -
Set
rdto 1 for Integral Pointer Mode.The value of rs1.tagdoes not affect the result.
-
- Included in
- Operation
-
let capVal = C(cs1); X(rd) = zero_extend(execution_mode_encdec(getCapMode(capVal))); RETIRE_SUCCESS
4.2.3. YMODESWI
See YMODESWY.
4.2.4. YMODESWY
- Synopsis
-
Switch execution mode to Capability Pointer Mode (YMODESWY), or Integral Pointer Mode (YMODESWI), 32-bit encodings
- Mnemonic
-
ymodeswy
ymodeswi - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Set the current CHERI Pointer Mode in pc.
- Included in
- Operation
-
let mode : ExecutionMode = match effective_cheri_mode() { IntPtrMode => CapPtrMode, CapPtrMode => IntPtrMode, }; if debug_mode_active then dinfc = setCapMode(infinite_cap, mode); set_next_pcc(setCapMode(PCC, mode)); RETIRE_SUCCESS
4.3. Added State
Zyhybrid adds the YLEN-wide CSR shown in Table 32.
| YLEN CSR | Permissions | Description |
|---|---|---|
URW |
User Default Data Capability |
4.3.1. Default Data Capability CSR (ddc)
ddc is a read-write, user mode accessible capability CSR. It does not require ASR-permission in pc for writes or reads. Similarly to pc authorizing all control flow and instruction fetches, this capability register is implicitly checked to authorize all data memory accesses when the current CHERI mode is Integral Pointer Mode. On startup ddc bounds and permissions must be set such that the program can run successfully (e.g., by setting it to have sufficiently broad bounds and permissions, possibly a Root Data capability).
4.4. Zicsr in Integral Pointer Mode
In addition to the rules in Section 2.6.4, when executing in Integral Pointer Mode, extended CSRs are always accessed as XLEN-wide for backwards compatibility. The final written value is determined using the semantics of the YADDRW instruction. YLEN-bit CSRs (including ddc) continue to be accessed as YLEN-wide.
4.4.5. CSRRCI (RVY)
- Synopsis
-
CSR access (CSRRWI, CSRRS, CSRRSI, CSRRC, CSRRCI) 32-bit encodings for RVY
- Mnemonics
-
csrrs rd, csr, rs1
csrrc rd, csr, rs1
csrrwi rd, csr, imm
csrrsi rd, csr, imm
csrrci rd, csr, imm - Encoding
- Description
-
These CSR instructions have extended functionality for accessing YLEN-bit CSRs and extended CSRs.
Access to XLEN-bit CSRs is as defined in Zicsr.
Zicsr rules are followed when determining whether to read or write the CSR. Suppressed read or write actions have no side-effects on the CSR.
All writes are XLEN bits only and use the semantics of the YADDRW instruction to determine the final write data.
Read data from YLEN-bit CSRs is always YLEN bits.
Read data from extended CSRs is YLEN bits in Capability Pointer Mode or, if Zyhybrid is supported, XLEN bits in Integral Pointer Mode.
- Permissions
-
Accessing CSRs may require ASR-permission.
- Prerequisites
-
RVY, Zicsr
- Included in
- Operation
TBD
4.4.6. CSRRW (RVY)
- Synopsis
-
CSR access (CSRRW) 32-bit encodings for (RVY)
- Mnemonic
-
csrrw rd, csr, rs1
- Encoding
- Description
-
CSRRW has extended functionality for accessing YLEN-bit CSRs and extended CSRs.
Access to XLEN-bit CSRs is as defined in Zicsr.
CSRRW accesses to YLEN-bit CSRs read YLEN bits into
rdand write YLEN bits ofrs1into the CSR.CSRRW accesses to extended CSRs read YLEN bits into
rdand write YLEN bits ofrs1into the CSR. However, if Zyhybrid is supported and the current mode is Integral Pointer Mode, accesses to extended CSRs are XLEN-wide. The final write data for extended CSRs is determined using the semantics of the YADDRW instruction.In all cases, when writing YLEN bits of
rs1, if any integrity check fails then set the capability tag to zero before writing to the CSR. - Permissions
-
Accessing CSRs may require ASR-permission.
- Prerequisites
-
RVY, Zicsr
- Included in
- Operation
TBD
5. "Zabhlrsc" Extension for Byte and Halfword Load Reserved/Store Conditional, Version 0.9
The Zalrsc extension offers LR/SC (load reserved/store conditional) instructions for words and doublewords. Zabhlrsc extends this by adding byte and halfword versions.
|
The absence of LR/SC operations for subword data types is problematic for CHERI software (RVY base architectures). Non-CHERI RISC-V software can use LR/SC on larger data types than are strictly required for the memory access to register the reservation set. RVY checks memory bounds and so it is impossible to round a subword access up to a word or larger to gain the reservation set. |
5.1. Byte and Halfword Atomic Load Reserved/Store Conditional Instructions
The Zabhlrsc extension provides the LR.[B|H] and SC.[B|H] instructions.
LR.[B|H] behave analogously to LR.[W|D].
SC.[B|H] behave analogously to SC.[W|D].
All Zabhlrsc instructions sign extend the result and write it to rd. :leveloffset: +1
6. Vector "V" Extension (RVY)
The Vector extension for RVY does not support capability tags in the vector registers. Consequently, vector stores will always clear capability tags in memory.
A future extension may allow capability tags to be stored in vector registers.
Until that time, vector load and store instructions must not be used to implement generic
memory copying in software, such as the memcpy() standard C library function,
that requires capabilities to be preserved,
because the vector registers do not hold capabilities, so the capability tags of any
copied capabilities will be set to 0 in the destination memory.
|
Under RVY, vector loads and stores follow the standard rules for active elements:
-
Only active elements are subject to CHERI exception checks.
-
CHERI exceptions are only raised on fault-only-first loads if element 0 is both active and fails any exception checks.
Additionally, the standard RVY rule that all loads and stores where the base register is x0 are reserved applies to all vector memory access instructions.
The approach of using indexed loads with the base register set to the value zero and XLEN-wide offsets does not work well with CHERI as the authorizing capability must cover all of memory.
If the authorizing capability is specified as x0 then the instruction encoding is reserved.
|
7. "Zylevels1" Extension for CHERI 2-Level Information Flow Control
Zylevels1 adds an Information Flow Control (IFC) mechanism to CHERI. It adds one new "level" metadata bit to classify capabilities as either global or local, adds checks to memory operations to control how capabilities can be shared, and adds two new level-related permissions, Store Local (SL) and Load Global (LG).
7.1. Added Metadata Bits (Permissions and Flags)
| Bit | Type | Comment |
|---|---|---|
Information flow label |
Used to classify capabilities as global or local. |
|
Data memory permission |
Used to filter the capability tags of stored capabilities. |
|
Data memory permission |
Used to filter the permissions of loaded capabilities. |
7.1.1. The Capability Global (GL) Flag
The Capability Global (GL) flag is a metadata bit used to track and control the propagation of capabilities. It works in conjunction with the LG-permission and SL-permission permissions to enforce information flow boundaries.
The Capability Global flag holds one of two values:
-
1: the capability is global.
-
0: the capability is local.
Like permissions, the Capability Global flag can be cleared when creating a new capability from an existing one, but it can never be set unless derived from a superset capability which has the Capability Global flag set.
7.1.2. Store Local Permission (SL)
Store Local Permission (SL) controls whether local capabilities can be stored to memory. Storing a local capability (one without the GL(obal) Flag set) using an authorizing capability that lacks SL-permission results in the stored capability having its capability tag set to zero.
SL-permission is dependent on both C-permission and W-permission. If either of these permissions is clear, SL-permission is ignored and does not need to be encodable in the capability format.
7.1.3. Load Global Permission (LG)
Load Global Permission (LG) controls whether global capabilities can be loaded from memory. Loading a capability using an authorizing capability that lacks LG-permission clears the GL(obal) Flag bit of the loaded capability, making it local. If the loaded capability is unsealed, its LG-permission is also cleared.
This behavior is similar to how LM-permission affects loaded capabilities (but note the difference in interaction with seals).
LG-permission is dependent on both C-permission and R-permission. If either of these permissions is clear, LG-permission is ignored and does not need to be encodable in the capability format.
7.2. Interaction with Root Capabilities
The Root capabilities used in the system are extended:
-
The definitions of Root Executable and Root Data capabilities are both augmented to require that GL(obal) Flag be set to global.
-
A Root Executable capability is required to grant LG-permission.
-
A Root Data capability is required to grant both LG-permission and SL-permission.
7.3. Interaction with YPERMC and YPERMR
The GL(obal) Flag, SL-permission, and LG-permission fields are mapped into the capability permissions bitfield (Figure 6), used by YPERMC and YPERMR, as shown in Figure 12.
7.3.1. YPERMC and the Capability Global (GL) Flag
YPERMC can produce a new capability with its GL(obal) Flag cleared, even if the source capability is sealed. This differs from architectural and software permissions. This applies to both the implicit clearing of permissions during memory loads and explicit YPERMC instructions.
7.3.2. Additional YPERMC rules
As mentioned, the SL-permission and LG-permission permissions are dependent on base permissions. YPERMC operations (including implicit ones) and/or the capability encoding clear these permissions when their dependencies are cleared. Specifically, we add the following rules to those of Section 2.3.10.1:
| YPERMC Rule | Permission | Valid only if |
|---|---|---|
7.4. Interaction with LY
As outlined above, Zylevels1 introduces two new constraints on capabilities loaded from memory.
These constraints apply to LY (ly rd, offset(rs1)) and other instructions with similar semantics.
The behavior can be described as implicitly reducing the permissions of the loaded capability:
-
If the authority (
rs1) lacks LG-permission and the loaded capability is unsealed, both its GL(obal) Flag and LG-permission are cleared in the result register (rd). -
If the authority (
rs1) lacks LG-permission and the loaded capability is sealed, its GL(obal) Flag is cleared in the result register (rd).The absence of LG-permission affects the GL(obal) Flag even of sealed capabilities because the latter is an information flow label rather than a architectural permission.
| Auth cap field | Data cap field | ||||
|---|---|---|---|---|---|
R |
C |
LG |
Tag |
Sealed |
Action |
1 |
1 |
0 |
1 |
Yes |
Load data capability with its GL(obal) Flag cleared |
No |
Load data capability with both its GL(obal) Flag and LG-permission cleared |
||||
All other cases |
Load data capability with both its GL(obal) Flag and LG-permission unmodified |
||||
| LG-permission is only effective when both R-permission and C-permission are granted. |
| Because SL-permission is only relevant to capabilities granting W-permission, any load that clears W-permission (e.g., due to a lack of LM-permission permission) will also necessarily clear SL-permission. |
7.5. Interaction with SY
Zylevels1 adds a constraint to SY (sy rs2, offset(rs1)) and similar instructions.
The capability is stored with a capability tag set to one only if:
-
The capability being stored (
rs2) is global (GL(obal) Flag=1), OR -
The authority used for the store (
rs1) grants SL-permission.
Otherwise, the capability is stored with the capability tag set to zero.
| While a lack ofLG-permission restricts flow by reducing permissions (labeling the loaded capability as local and stripping permissions), SL-permission restricts flow by invalidating capabilities (by setting the capability tag to zero). |
| Auth cap field | Data cap field | |||
|---|---|---|---|---|
W |
C |
SL |
GL |
Notes |
1 |
1 |
1 |
X |
Store data capability unmodified |
0 |
1 |
Store data capability unmodified |
||
0 |
Store data capability with capability tag set to zero |
|||
| SL-permission is only effective when both W-permission and C-permission are granted. |
7.6. Interaction with YSS
In implementations of Zylevels1, the YSS instruction (yss rd, rs1, rs2) indicates that rs2 is a subset of rs1 (setting rd to 1) only if:
-
The Global flag of the supposed subset capability (
rs2) is clear (0), OR -
The Global flag of the supposed superset capability (
rs1) is set (1).
The existing permission subset logic applies to the new SL-permission and LG-permission permissions.
7.7. Interaction with YBLD
A YBLD instruction (ybld rd, rs1, rs2) may yield a valid capability (rd.tag=1) only if:
-
The Global flag of the bits to be reconstituted (
rs2) is clear (0), OR -
The Global flag of the reconstituting superset capability (
rs1) is set (1).
The existing permission subset logic applies to the new SL-permission and LG-permission permissions.
7.8. Interaction with YSUNSEAL
The YSUNSEAL instruction (ysunseal rd, rs1, rs2) ensures that the result has GL(obal) Flag set only if the unsealing authority (rs1) also has GL(obal) Flag set.
(That is, rd is global if and only if both the authority in rs1 and the unsealed form of rs2 are global.)
The existing permission subset logic applies to the new SL-permission and LG-permission permissions.
7.9. Rationale and Software Use Cases
The primary goal of Zylevels1 is to prevent storing pointers to specific memory regions in order to enforce security invariants. There are many uses of this mechanism, but two examples are listed below.
7.9.1. Restricting Capability Flow Between Regions or Domains (e.g., Stack-to-Heap or Kernel-to-User)
Software can use these features to prevent pointers from leaking between different memory regions or privilege domains that have different security properties. The general pattern is to mark sensitive capabilities as local (by clearing their GL(obal) Flag) and ensuring that destination memory regions are accessed through authorities that lack the SL-permission.
-
Intra-program flow (e.g., Stack-to-Heap): To prevent pointers to short-lived memory (like the stack) from leaking into long-lived memory (like the heap), software marks all stack pointers as local. If the authorities for the heap lack the SL-permission, any attempt to store a stack pointer into the heap results in the hardware invalidating the stored capability. This ensures stack pointers are strictly confined to registers and the stack itself.
-
Cross-domain flow (e.g., Kernel-to-User): These features also apply across privilege boundaries. For example, a kernel can ensure that the capability authorizing a write to userspace (e.g., for a
copy_to_useroperation) lacks the SL-permission. Even if a kernel bug causes it to accidentally attempt to copy sensitive, local kernel capabilities into the user’s buffer, the hardware will invalidate those capabilities. This prevents unintentional leaks of usable capabilities to a less-privileged domain.
7.9.2. Enforcing Shallow vs. Deep No-Capture Guarantees
When passing a capability to a less-trusted function, a caller often wants to enforce "no-capture" guarantees, ensuring the callee cannot hold onto the capability after returning. Zylevels1 provides two levels of protection against capability capture.
-
Shallow no-capture (via GL(obal) Flag and SL-permission): The caller makes the argument capability local by clearing its GL(obal) Flag. Because the callee’s global variables and persistent data structures are accessed through capabilities that lack the SL-permission, the callee cannot store the local argument capability into them. This enforces a shallow guarantee: the callee cannot capture the argument itself, but it might still load a global capability through the argument and capture that.
-
Deep no-capture (via LG-permission): To solve the shallow limitation, the caller also removes the LG-permission from the argument capability. If the callee loads any capability through this argument, the hardware automatically removes the loaded capability’s GL(obal) Flag and LG-permission. This enforces a deep no-capture guarantee: the callee is prevented from capturing the argument and anything reachable from it.
Appendix A: CHERI (RV64Y) Unprivileged Appendix
A.1. RVY ISA Extension Summary
An RVY core supports all instructions from RVI and adds new instructions for CHERI functionality. Additionally, some RVI instruction (as well as instructions defined in other extensions) have modified behavior. The following sections detail the list of added/modified instructions per extension.
A.1.1. RVY added instructions
| Mnemonic | Function |
|---|---|
Load capability |
|
Store capability |
|
Capability pointer increment |
|
Capability pointer increment by immediate |
|
Write capability address |
|
Read capability tag |
|
Read capability permissions |
|
Capability register copy |
|
Clear capability permissions |
|
Logical right shift of Y register |
|
Read capability metadata (pseudo) |
|
Pack Y register |
|
Write capability metadata and clear capability tag (pseudo) |
|
Capability equality comparison including capability tag |
|
Capability subset |
|
Build capability |
|
Unseal by superset reconstruction |
|
Write capability bounds |
|
Write capability bounds by immediate |
|
Write capability bounds, rounding up if required |
|
Capability alignment mask |
|
Read capability base address |
|
Read capability length |
|
Read capability type |
|
Read capability top address |
A.1.2. RVI (RVY modified behavior)
| Mnemonic | Function |
|---|---|
Add upper immediate to pc |
|
Immediate offset jump, and link to capability register |
|
Jump to capability register, and link to capability register |
A.1.3. Zicsr (RVY modified behavior)
| Mnemonic | Function |
|---|---|
CSR write |
|
CSR set |
|
CSR clear |
|
CSR write (immediate form) |
|
CSR set (immediate form) |
|
CSR clear (immediate form) |
A.1.4. Zca (RVY added instructions)
These 16-bit instructions are supported by any RVY core that includes the standard C extension.
Zcf (RV32) and Zcd (RV64) are incompatible with RVY.
| Mnemonic | Function |
|---|---|
Load capability stack pointer relative, 16-bit encoding |
|
Store capability stack pointer relative, 16-bit encoding |
|
Load capability, 16-bit encoding |
|
Store capability, 16-bit encoding |
A.1.5. RV32 / RV32Y RVC load/store mapping summary
| Encoding | Supported Extensions | |||||
|---|---|---|---|---|---|---|
[15:13] |
[1:0] |
Zca |
Zcf |
Zcd |
Zcmp/ Zcmt |
Zclsd |
111 |
00 |
N/A |
C.FSW |
N/A |
N/A |
C.SD |
011 |
00 |
N/A |
C.FLW |
N/A |
N/A |
C.LD |
111 |
10 |
N/A |
C.FSWSP |
N/A |
N/A |
C.SDSP |
011 |
10 |
N/A |
C.FLWSP |
N/A |
N/A |
C.LDSP |
101 |
00 |
N/A |
N/A |
C.FSD |
reserved |
N/A |
001 |
00 |
N/A |
N/A |
C.FLD |
reserved |
N/A |
101 |
10 |
N/A |
N/A |
C.FSDSP |
N/A |
|
001 |
10 |
N/A |
N/A |
C.FLDSP |
reserved |
N/A |
| Encoding | Supported Extensions | |||
|---|---|---|---|---|
[15:13] |
[1:0] |
Zca |
Zcd |
Zcmp/ Zcmt |
111 |
00 |
|||
111 |
10 |
|||
011 |
10 |
|||
011 |
00 |
|||
101 |
00 |
N/A |
C.FSD |
reserved |
001 |
00 |
N/A |
C.FLD |
reserved |
101 |
10 |
N/A |
C.FSDSP |
reserved for Zcmp / Zcmt (RV32Y) |
001 |
10 |
N/A |
C.FLDSP |
reserved |
| Zcf and Zclsd are incompatible with RV32Y. |
A.1.6. RV64 / RV64Y RVC load/store mapping summary
| Encoding | Supported Extensions | |||
|---|---|---|---|---|
[15:13] |
[1:0] |
Zca |
Zcd |
Zcmp/ Zcmt |
111 |
00 |
C.SD |
N/A |
N/A |
011 |
00 |
C.LD |
N/A |
N/A |
111 |
10 |
C.SDSP |
N/A |
N/A |
011 |
10 |
C.LDSP |
N/A |
N/A |
101 |
00 |
N/A |
C.FSD |
reserved |
001 |
00 |
N/A |
C.FLD |
reserved |
101 |
10 |
N/A |
C.FSDSP |
|
001 |
10 |
N/A |
C.FLDSP |
reserved |
| Encoding | Supported Extensions | |
|---|---|---|
[15:13] |
[1:0] |
Zca |
111 |
00 |
C.SD |
011 |
00 |
C.LD |
111 |
10 |
C.SDSP |
011 |
10 |
C.LDSP |
101 |
00 |
|
001 |
00 |
|
101 |
10 |
|
001 |
10 |
|
| Zcd, Zcmp and Zcmt are incompatible with RV64Y. |
A.1.6.1. C.LY
see C.LYSP.
A.1.6.2. C.LYSP
- Synopsis
-
Capability loads (C.LY, C.LYSP), 16-bit encodings
| These instructions have different encodings for RV64Y and RV32Y. |
- Mnemonics
-
c.ly rd', offset(rs1')
c.lysp rd', offset(sp) - Expansions
-
ly rd', offset(rs1')
ly rd', offset(sp) - Encoding
- Capability Pointer Mode Description
-
Load capability instruction, authorized by the capability in
rs1. Take a load address misaligned exception if not naturally aligned. - Exceptions
-
Exceptions occur when the authorizing capability fails one of the checks listed below:
Kind Reason CHERI Load Access Fault
Authorizing capability tag is set to 0.
CHERI Load Access Fault
Authorizing capability is sealed.
CHERI Load Access Fault
Authorizing capability does not grant the necessary permissions. Only R-permission is required.
CHERI Load Access Fault
At least one byte accessed is outside the authorizing capability bounds, or the bounds could not be decoded.
CHERI Load Access Fault
Authorizing capability failed any integrity check.
- Prerequisites
-
Zca, RVY
- Included in
- Operation (after expansion to 32-bit encodings)
-
See LY
A.1.6.3. C.SY
see C.SYSP.
A.1.6.4. C.SYSP
- Synopsis
-
Capability stores (C.SY, C.SYSP), 16-bit encodings
| These instructions have different encodings for RV64Y and RV32Y. |
- Mnemonics
-
c.sy rs2', offset(rs1')
c.sysp rs2', offset(sp) - Expansions
-
sy rs2', offset(rs1')
sy rs2', offset(sp) - Encoding
- Capability Pointer Mode Description
-
Store the YLEN-bit value in
rs2'to memory. The capability inspauthorizes the operation. The effective address of the memory access is obtained by adding the address ofspto the zero-extended offset. - Capability Tag of the written capability value
-
The capability written to memory has the capability tag set to 0 if the capability tag of
rs2'is 0 or if the authorizing capability (sp) does not grant C-permission.Extensions may define further circumstances under which stored capabilities may have their capability tags set to 0.
This instruction can propagate valid capabilities which fail integrity checks.
- Exceptions
-
Store/AMO access fault exception when the effective address is not aligned to YLEN/8.
Store/AMO access fault if the stored capability tag is set to one and the PMA is CHERI Capability Tag Fault.
Exceptions occur when the authorizing capability fails one of the checks listed below:
Kind Reason CHERI Store/AMO Access Fault
Authorizing capability tag is set to 0.
CHERI Store/AMO Access Fault
Authorizing capability is sealed.
CHERI Store/AMO Access Fault
Authorizing capability does not grant the necessary permissions.
CHERI Store/AMO Access Fault
At least one byte accessed is outside the authorizing capability bounds, or the bounds could not be decoded.
CHERI Store/AMO Access Fault
Authorizing capability failed any integrity check.
- Prerequisites
-
Zca, RVY
- Included in
- Operation (after expansion to 32-bit encodings)
-
See SY
A.1.7. Zca (RVY modified behavior)
An RVY core which supports C also supports Zca (RVY modified behavior) which modifies the behavior of some instructions.
c.ymv is renamed from c.mv to avoid ambiguity in disassembly.
|
| Mnemonic | Function |
|---|---|
Stack pointer increment in blocks of 16, 16-bit encoding |
|
Stack pointer increment in blocks of 4, 16-bit encoding |
|
Capability register copy, 16-bit encoding |
|
Jump to capability register, and link to capability register, 16-bit encoding |
|
Jump to capability register, 16-bit encoding |
A.1.7.1. C.ADDI16SP (RVY)
- Synopsis
-
Stack pointer increment in blocks of 16, 16-bit encoding
- Mnemonic
-
c.addi16sp nzimm - Expansion
-
yaddi sp, sp, nzimm - Encoding
- Description
-
Add the non-zero sign-extended 6-bit immediate to the value in the stack pointer (
sp=x2), where the immediate is scaled to represent multiples of 16 in the range (-512,496).Set
sp.tag=0ifspis sealed.Set
rd.tag=0if the resulting capability cannot be represented exactly.Set
rd.tag=0ifspfails any integrity checks. - Prerequisites
-
Zca, RVY
- Included in
- Operation
-
execute(CADDI(sp, sp, sign_extend(nzimm)))
A.1.7.2. C.ADDI4SPN (RVY)
- Synopsis
-
Stack pointer increment in blocks of 4, 16-bit encoding
- Mnemonic
-
c.addi4spn rd', nzuimm - Expansion
-
yaddi rd', sp, nzuimm - Encoding
- Description
-
Copy
sptord'. Add a zero-extended non-zero immediate, scaled by 4, tord'.address.Set
rd'.tag=0ifspis sealed.Set
rd'.tag=0if the resulting capability cannot be represented exactly.Set
rd'.tag=0ifsp's bounds are malformed, or if any of the reserved fields are set. - Prerequisites
-
Zca, RVY
- Included in
- Operation
-
let cd = creg2reg_idx(cdc) in execute(CADDI(cd, sp, zero_extend(nzuimm)))
A.1.7.3. C.YMV
- Synopsis
-
Capability register copy, 16-bit encoding
- Mnemonic
-
c.ymv rd, rs2 - Expansion
-
ymv rd, rs2 - Suggested assembly syntax
-
ymv rd, rs2
c.mv is remapped to copy YLEN-bit registers for RVY. The mnemonic is changed to avoid ambiguity about whether the copy is XLEN or YLEN-bits.
|
- Encoding
A.1.7.4. C.JR (RVY)
- Synopsis
-
Jump to capability register, 16-bit encoding
- Mnemonic
-
c.jr rs1 - Expansion
-
jalr x0, 0(rs1) - Encoding
- Capability Pointer Mode Description
-
See JALR (RVY) for execution of the expanded instruction as shown above. Note that the
offsetis zero in the expansion. - Prerequisites
-
Zca, RVY
- Included in
- Operation (after expansion to 32-bit encodings)
-
See JALR (RVY)
A.1.7.5. C.JALR (RVY)
- Synopsis
-
Jump to capability register, and link to capability register, 16-bit encoding
- Mnemonic
-
c.jalr x1, rs1 - Expansion
-
jalr x1, 0(rs1) - Encoding
- Description
-
See JALR (RVY) for execution of the expanded instruction as shown above. Note that the
offsetis zero in the expansion. - Exceptions
-
See JALR (RVY)
- Prerequisites
-
Zca, RVY
- Included in
- Operation (after expansion to 32-bit encodings)
-
See JALR (RVY)
A.1.8. Zalrsc (RVY added instructions)
Specifying RVY and Zalrsc adds atomic capability load and store instructions.
| Mnemonic | Function |
|---|---|
Load Reserved capability |
|
Store Conditional capability |
A.1.8.1. LR.Y
- Synopsis
-
Load Reserved capability
- Mnemonic
-
lr.y rd, 0(rs1) - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
Any instance of this instruction with rs1=x0 will raise an exception, as x0 is defined to always hold a NULL capability.
As such, the encodings with rs1=x0 are RESERVED for use by future extensions.
|
- Description
-
Calculate the effective address of the memory access by adding
rs1.addressto the sign-extended 12-bit offset.Authorize the memory access with the capability in
rs1.Load a naturally aligned YLEN-bit data value from memory.
If the PMA is CHERI Capability Tag then load the associated capability tag, otherwise set the capability tag to zero.
Set the reservation as for LR.W/D.
Use the YLEN-bit data and the capability tag to determine the value of
rdas specified by the LY instruction.This instruction can propagate valid capabilities which fail integrity checks.
- Exceptions
-
All misaligned load reservations cause a load address misaligned exception to allow software emulation (if the Zam extension is supported), otherwise they take a load access fault exception.
Exceptions occur when the authorizing capability fails one of the checks listed below:
Kind Reason CHERI Load Access Fault
Authorizing capability tag is set to 0.
CHERI Load Access Fault
Authorizing capability is sealed.
CHERI Load Access Fault
Authorizing capability does not grant the necessary permissions. Only R-permission is required.
CHERI Load Access Fault
At least one byte accessed is outside the authorizing capability bounds, or the bounds could not be decoded.
CHERI Load Access Fault
Authorizing capability failed any integrity check.
- Prerequisites
-
RVY, and A or Zalrsc
- Included in
- Operation
TBD
A.1.8.2. SC.Y
- Synopsis
-
Store Conditional capability
Any instance of this instruction with rs1=x0 will raise an exception, as x0 is defined to always hold a NULL capability.
As such, the encodings with rs1=x0 are RESERVED for use by future extensions.
|
- Mnemonic
-
sc.y rd, rs2, 0(rs1) - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Calculate the effective address of the memory access by adding
rs1.addressto the sign-extended 12-bit offset.Authorize the memory access with the capability in
rs1.Conditionally store, following the same rules as SC.W, a naturally aligned YLEN-bit data value in
rs2to memory and the associated capability tag inrs2.Set rd to 1 for success or 0 for failure.
The written capability tag may be cleared following the same modification rules as SY.
This instruction can propagate valid capabilities which fail integrity checks.
- Exceptions
-
Store/AMO access fault exception when the effective address is not aligned to YLEN/8.
Store/AMO access fault if the stored capability tag is set to one and the PMA is CHERI Capability Tag Fault.
Exceptions occur when the authorizing capability fails one of the checks listed below:
Kind Reason CHERI Store/AMO Access Fault
Authorizing capability tag is set to 0.
CHERI Store/AMO Access Fault
Authorizing capability is sealed.
CHERI Store/AMO Access Fault
Authorizing capability does not grant the necessary permissions.
CHERI Store/AMO Access Fault
At least one byte accessed is outside the authorizing capability bounds, or the bounds could not be decoded.
CHERI Store/AMO Access Fault
Authorizing capability failed any integrity check.
- Prerequisites
-
RVY, and A or Zalrsc
- Included in
- Operation
TBD
A.1.9. Zaamo (RVY added instructions)
Specifying RVY and Zaamo gives Zaamo (RVY added instructions) functionality, which adds atomic capability swap.
| Mnemonic | Function |
|---|---|
Atomic swap of capabilities |
A.1.9.1. AMOSWAP.Y
- Synopsis
-
Atomic swap of capabilities
- Mnemonic
-
amoswap.y rd, rs2, 0(rs1) - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
Any instance of this instruction with rs1=x0 will raise an exception, as x0 is defined to always hold a NULL capability.
As such, the encodings with rs1=x0 are RESERVED for use by future extensions.
|
- Permissions
-
Requires R-permission and W-permission in the authorizing capability.
Requires all bytes of the access to be in capability bounds.
- Exceptions
-
If the address is not naturally aligned raise a Store/AMO address misaligned exception or a Store/AMO access fault exception. See "Zaamo" for details on which one is raised.
Exceptions occur when the authorizing capability fails one of the checks listed below:
Kind Reason CHERI Store/AMO Access Fault
Authorizing capability tag is set to 0.
CHERI Store/AMO Access Fault
Authorizing capability is sealed.
CHERI Store/AMO Access Fault
Authorizing capability does not grant the necessary permissions. W-permission and R-permission are both required.
CHERI Store/AMO Access Fault
At least one byte accessed is outside the authorizing capability bounds, or the bounds could not be decoded.
- Prerequisites
-
RVY, and Zaamo
- Included in
- Operation
-
TODO
A.1.10. Zba (RVY added instructions)
Specifying RVY and Zba gives Zba (RVY added instructions) functionality, which adds more instructions.
| Mnemonic | Function |
|---|---|
shift and add, representability check |
|
shift and add, representability check |
|
shift and add, representability check |
|
shift and add, representability check |
|
shift and add unsigned word, representability check |
|
shift and add unsigned word, representability check |
|
shift and add unsigned word, representability check |
|
shift and add unsigned word, representability check |
There is currently no RVY equivalent for add.uw.
A future extension may add such an instruction.
|
A.1.10.4. YSH4ADD (RV64Y)
- Synopsis
-
Shift by n and add for address generation (YSH1ADD, YSH2ADD, YSH3ADD, YSH4ADD)
- Mnemonics (RVY)
-
ysh1add rd, rs1, rs2
ysh2add rd, rs1, rs2
ysh3add rd, rs1, rs2 - Mnemonics (RV64Y)
-
ysh4add rd, rs1, rs2 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Copy the capability in
rs2tord.Increment
rd.addressbyrs1shifted left by n bit positions.Set
rd.tag=0ifrs2is sealed.Set
rd.tag=0if the resulting capability cannot be represented exactly.Set
rd.tag=0ifrs2fails any integrity checks. - Included in
- Operation
-
let rs1_val = X(rs1); let cs2_val = C(cs2); let shamt : range(0,3) = match op { RISCV_SH1ADD => 1, RISCV_SH2ADD => 2, RISCV_SH3ADD => 3, }; let result = incCapAddrChecked(cs2_val, rs1_val << shamt); C(cd) = result; RETIRE_SUCCESS
A.1.10.8. YSH4ADD.UW (RV64Y)
- Synopsis
-
Shift by n and add unsigned words for address generation (YSH1ADD.UW, YSH2ADD.UW, YSH3ADD.UW, YSH4ADD.UW)
- Mnemonics (RV64Y)
-
ysh1add.uw rd, rs1, rs2
ysh2add.uw rd, rs1, rs2
ysh3add.uw rd, rs1, rs2
ysh4add.uw rd, rs1, rs2 - Encoding
| The instruction encoding is not final and is highly likely to change prior to v1.0 |
- Description
-
Copy the capability in
rs2tord.Increment
rd.addressby the unsigned wordrs1shifted left by n bit positions.Set
rd.tag=0ifrs2is sealed.Set
rd.tag=0if the resulting capability cannot be represented exactly.Set
rd.tag=0ifrs2fails any integrity checks. - Included in
- Operation
-
let rs1_val = X(rs1); let cs2_val = C(cs2); let shamt : range(0,3) = match op { RISCV_ADDUW => 0, RISCV_SH1ADDUW => 1, RISCV_SH2ADDUW => 2, RISCV_SH3ADDUW => 3, }; let result = incCapAddrChecked(cs2_val, zero_extend(rs1_val[31..0]) << shamt); C(cd) = result; RETIRE_SUCCESS
A.1.11. Zicbom (RVY modified behavior)
Specifying RVY and Zicbom gives Zicbom (RVY modified behavior) functionality, which extends the checking.
| Mnemonic | Function |
|---|---|
Cache block invalidate (implemented as clean) |
|
Cache block clean |
|
Cache block flush |
A.1.11.1. CBO.CLEAN (RVY)
- Synopsis
-
Perform a clean operation on a cache block
- Mnemonic
-
cbo.clean 0(rs1) - Encoding
- Description
-
A CBO.CLEAN instruction performs a clean operation on the cache block whose effective address is the base address specified in
rs1. The authorizing capability for this operation isrs1.
- Exceptions
-
Kind Reason CHERI Store/AMO Access Fault
Authorizing capability tag is set to 0.
CHERI Store/AMO Access Fault
Authorizing capability is sealed.
CHERI Store/AMO Access Fault
Authorizing capability does not grant the necessary permissions. W-permission and R-permission are both required.
CHERI Store/AMO Access Fault
None of the bytes accessed are within the bounds, or the bounds could not be decoded.
CHERI Store/AMO Access Fault
Authorizing capability failed any integrity check.
- Prerequisites
-
Zicbom, RVY
- Included in
- Operation
TBD
A.1.11.2. CBO.FLUSH (RVY)
- Synopsis
-
Perform a flush operation on a cache block
- Mnemonic
-
cbo.flush 0(rs1) - Encoding
- Description
-
A CBO.FLUSH instruction performs a flush operation on the cache block whose effective address is the base address specified in
rs1. The authorizing capability for this operation isrs1.
- Exceptions
-
Kind Reason CHERI Store/AMO Access Fault
Authorizing capability tag is set to 0.
CHERI Store/AMO Access Fault
Authorizing capability is sealed.
CHERI Store/AMO Access Fault
Authorizing capability does not grant the necessary permissions. W-permission and R-permission are both required.
CHERI Store/AMO Access Fault
None of the bytes accessed are within the bounds, or the bounds could not be decoded.
CHERI Store/AMO Access Fault
Authorizing capability failed any integrity check.
- Prerequisites
-
Zicbom, RVY
- Included in
- Operation
TBD
A.1.11.3. CBO.INVAL (RVY)
- Synopsis
-
Perform an invalidate operation on a cache block
- Mnemonic
-
cbo.inval 0(rs1) - Encoding
- Description
-
A CBO.INVAL instruction performs an invalidate operation on the cache block whose effective address is the base address specified in
rs1. The authorizing capability for this instruction isrs1.
- Exceptions
-
Kind Reason Illegal instruction
pc does not grant ASR-permission.
CHERI Store/AMO Access Fault
Authorizing capability tag is set to 0.
CHERI Store/AMO Access Fault
Authorizing capability is sealed.
CHERI Store/AMO Access Fault
Authorizing capability does not grant the necessary permissions. W-permission, R-permission are both required.
CHERI Store/AMO Access Fault
At least one byte accessed is outside the authorizing capability bounds, or the bounds could not be decoded.
CHERI Store/AMO Access Fault
Authorizing capability failed any integrity check.
|
CSR state controls whether CBO.INVAL performs cache block flushes instead of invalidations for less privileged modes. Invalidating a cache block can re-expose capabilities previously stored to it after the most recent flush, not just secret values. As such, CBO.INVAL has stricter checks on its use than CBO.FLUSH, and should only be made available to, and used by, sufficiently-trusted software. Untrusted software should use CBO.FLUSH instead as a minimum, and a sensible implementation choice for CHERI systems is to always execute CBO.INVAL as CBO.FLUSH. |
- Prerequisites
-
Zicbom, RVY
- Included in
- Operation
TBD
A.1.12. Zicboz (RVY modified behavior)
Specifying RVY and Zicboz gives Zicboz (RVY modified behavior) functionality, which extends the checking.
| Mnemonic | Function |
|---|---|
Cache block zero |
A.1.12.1. CBO.ZERO (RVY)
- Synopsis
-
Store zeros to the full set of bytes corresponding to a cache block
- Mnemonic
-
cbo.zero 0(rs1) - Encoding
- Description
-
A
cbo.zeroinstruction performs stores of zeros to the full set of bytes corresponding to the cache block whose effective address is the base address specified inrs1. An implementation may or may not update the entire set of bytes atomically although each individual write must atomically set the capability tag of the corresponding aligned YLEN-bit location to zero. The authorizing capability for this instruction isrs1. - Exceptions
-
Store/AMO access fault exception when the effective address is not aligned to YLEN/8.
Store/AMO access fault if the stored capability tag is set to one and the PMA is CHERI Capability Tag Fault.
Exceptions occur when the authorizing capability fails one of the checks listed below:
Kind Reason CHERI Store/AMO Access Fault
Authorizing capability tag is set to 0.
CHERI Store/AMO Access Fault
Authorizing capability is sealed.
CHERI Store/AMO Access Fault
Authorizing capability does not grant the necessary permissions.
CHERI Store/AMO Access Fault
At least one byte accessed is outside the authorizing capability bounds, or the bounds could not be decoded.
CHERI Store/AMO Access Fault
Authorizing capability failed any integrity check.
- Prerequisites
-
Zicboz, RVY
- Included in
- Operation
TBD
A.1.13. Zicbop (RVY modified behavior)
Specifying RVY and Zicbop gives Zicbop (RVY modified behavior) functionality, which extends the checking.
| Mnemonic | Function |
|---|---|
Cache Block Prefetch for Instruction Fetch |
|
Cache Block Prefetch for Data Read |
|
Cache block Prefetch for Data Write |
A.1.13.1. PREFETCH.I (RVY)
- Synopsis
-
Provide a HINT to hardware that a cache block is likely to be accessed by an instruction fetch in the near future
- Mnemonic
-
prefetch.i offset(rs1) - Encoding
- Description
-
A PREFETCH.I instruction indicates to hardware that the cache block whose effective address is the sum of the base address specified in
rs1and the sign-extended offset encoded in imm[11:0], where imm[4:0] equals 0b00000, is likely to be accessed by an instruction fetch in the near future. The encoding is only valid if imm[4:0]=0. The authorizing capability for this operation isrs1. This instruction does not throw any exceptions. However, following the rules from Chapter 2, this instruction does not perform a prefetch if it is not authorized byrs1.PREFETCH.I does not perform a memory access if one or more of the following conditions of the authorizing capability are met:
-
The capability tag is not set
-
The sealed bit is set
-
No bytes of the cache line requested is in bounds
-
X-permission is not set
-
Any integrity check fails
-
|
If the checks above pass, an implementation may opt to cache a copy of the cache block in a cache accessed by an instruction fetch in order to improve memory access latency, but this behavior is not required. |
- Prerequisites
-
Zicbop, RVY
- Included in
- Operation
TODO
A.1.13.2. PREFETCH.R (RVY)
- Synopsis
-
Provide a HINT to hardware that a cache block is likely to be accessed by a data read in the near future
- Mnemonic
-
prefetch.r offset(rs1) - Encoding
- Description
-
A PREFETCH.R instruction indicates to hardware that the cache block whose effective address is the sum of the base address specified in
rs1and the sign-extended offset encoded in imm[11:0], where imm[4:0] equals 0b00000, is likely to be accessed by a data read (i.e., load) in the near future. The encoding is only valid if imm[4:0]=0. The authorizing capability for this operation isrs1. This instruction does not throw any exceptions. However, following the rules from Chapter 2, this instruction does not perform a prefetch if it is not authorized byrs1.PREFETCH.R does not perform a memory access if one or more of the following conditions of the authorizing capability are met:
-
The capability tag is not set
-
The sealed bit is set
-
No bytes of the cache line requested is in bounds
-
R-permission is not set
-
Any integrity check fails
-
|
If the checks above pass, an implementation may opt to cache a copy of the cache block in a cache accessed by a data read in order to improve memory access latency, but this behavior is not required. |
- Prerequisites
-
Zicbop, RVY
- Included in
- Operation
TODO
A.1.13.3. PREFETCH.W (RVY)
- Synopsis
-
Provide a HINT to hardware that a cache block is likely to be accessed by a data write in the near future
- Mnemonic
-
prefetch.w offset(rs1) - Encoding
- Description
-
A PREFETCH.W instruction indicates to hardware that the cache block whose effective address is the sum of the base address specified in
rs1and the sign-extended offset encoded in imm[11:0], where imm[4:0] equals 0b00000, is likely to be accessed by a data write (i.e., store) in the near future. The encoding is only valid if imm[4:0]=0. The authorizing capability for this operation isrs1. This instruction does not throw any exceptions. However, following the rules from Chapter 2, this instruction does not perform a prefetch if it is not authorized byrs1.PREFETCH.W does not perform a memory access if one or more of the following conditions of the authorizing capability are met:
-
The capability tag is not set
-
The sealed bit is set
-
No bytes of the cache line requested is in bounds
-
W-permission is not set
-
Any integrity check fails
-
|
If the checks above pass, an implementation may opt to cache a copy of the cache block in a cache accessed by a data write in order to improve memory access latency, but this behavior is not required. |
- Prerequisites
-
Zicbop, RVY
- Included in
- Operation
TODO
A.1.14. Zysentry
Zysentry adds the YSENTRY instruction.
| Mnemonic | Function |
|---|---|
Seal capability as a sentry |
A.1.15. Zyhybrid
An RVY core which supports Zyhybrid adds the instructions in Table 51.
| Mnemonic | Function |
|---|---|
Set capability execution mode |
|
Read capability mode |
|
Switch execution to Capability Pointer Mode |
|
Switch execution to Integral Pointer Mode |
Appendix B: RVY Instruction Encoding Overview
B.3. AsciiDoc Table Encoding Overview
B.3.1. 3OP Instruction Encodings
|
||||||||||||||
|
|
|
|
|
|
|
||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
B.3.2. 2OP Instruction Encodings
|
||||||||||||||
|
|
|
|
|
|
|
||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
B.3.3. YADDI/LY/SY Instruction Encodings
|
||||||||||||||
|
|
|
|
|
|
|
||||||||
|
|
|
|
|
||||||||||
|
|
|
|
|
||||||||||
|
|
|
|
|
|
|||||||||
B.3.4. AMO Instruction Encodings
|
||||||||||||||
|
|
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|||||||
|
|
|
|
|
|
|
|
|||||||
|
|
|
|
|
|
|
|
|||||||
B.3.5. MISC Instruction Encodings
|
||||||||||||||
|
|
|
|
|
|
|
|
|||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|||||||||
B.4. RVY Custom-3 Instruction Allocation
B.4.1. 1. Funct3 Allocations
| funct3 | Instruction(s) |
|---|---|
000 |
R-Type (3-op and 1/2-op) |
001 |
LY |
010 |
SY |
011 |
AMO |
100 |
YADDI |
101 |
MISC IMM (SRLIY/YBNDSWI) |
110 |
Unallocated |
111 |
Unallocated |
B.4.2. 2. R-Type 3-Operand (funct3=000)
| funct7[6:3] \ funct7[2:0] | 000 | 001 | 010 | 011 | 100 | 101 | 110 | 111 |
|---|---|---|---|---|---|---|---|---|
0000 |
||||||||
0001 |
||||||||
0010 |
||||||||
0011 |
||||||||
0100 |
||||||||
0101 |
||||||||
0110 |
||||||||
0111 |
||||||||
1000 |
||||||||
1001 |
||||||||
1010 |
||||||||
1011 |
||||||||
1100 |
||||||||
1101 |
||||||||
1110 |
||||||||
1111 |
1OP/2OP |
B.4.3. 3. R-Type 1-Op/2-Op (funct3=000, funct7=1111010)
Note: The 5-bit rs2 field is split into columns rs2[4:3] and rows rs2[2:0].
| rs2[2:0] \ rs2[4:3] | 00 | 01 | 10 | 11 |
|---|---|---|---|---|
000 |
||||
001 |
||||
010 |
||||
011 |
||||
100 |
||||
101 |
||||
110 |
||||
111 |
B.4.4. 4. R-Type 1-Op/2-Op (funct3=000, funct7=1111011)
Note: The 5-bit rs2 field is split into columns rs2[4:3] and rows rs2[2:0].
| rs2[2:0] \ rs2[4:3] | 00 | 01 | 10 | 11 |
|---|---|---|---|---|
000 |
||||
001 |
||||
010 |
||||
011 |
||||
100 |
||||
101 |
||||
110 |
||||
111 |
B.5. 5. AMO Sub-opcode Allocations (funct3=100)
| funct7[6:3] \ funct7[2:0] | 000 | 001 | 010 | 011 | 100 | 101 | 110 | 111 |
|---|---|---|---|---|---|---|---|---|
0000 |
||||||||
0001 |
||||||||
0010 |
||||||||
0011 |
||||||||
0100 |
||||||||
0101 |
||||||||
0110 |
||||||||
0111 |
||||||||
1000 |
||||||||
1001 |
||||||||
1010 |
||||||||
1011 |
||||||||
1100 |
||||||||
1101 |
||||||||
1110 |
||||||||
1111 |
B.6. 6. MISC Sub-opcode Allocations (funct3=101)
| funct7[6:3] \ funct7[2:0] | 000 | 001 | 010 | 011 | 100 | 101 | 110 | 111 |
|---|---|---|---|---|---|---|---|---|
0000 |
||||||||
0001 |
||||||||
0010 |
||||||||
0011 |
||||||||
0100 |
||||||||
0101 |
||||||||
0110 |
||||||||
0111 |
||||||||
1000 |
||||||||
1001 |
||||||||
1010 |
||||||||
1011 |
||||||||
1100 |
||||||||
1101 |
||||||||
1110 |
||||||||
1111 |
B.7. Placeholder references to the unprivileged spec
| This chapter only exists for the standalone document to allow references to resolve. |
- RV32I
-
See Chapter RV32I Base Integer Instruction Set in (RISC-V, 2023).
- RV32E and RV64E
-
See Chapter RV32E and RV64E Base Integer Instruction Sets in
- General purpose registers
-
See Chapter RV32I Base Integer Instruction Set in (RISC-V, 2023).
- Load and Store Instructions
-
See Chapter RV32I Base Integer Instruction Set in (RISC-V, 2023).
- Integer Register-Immediate Instructions
-
See Chapter RV32I Base Integer Instruction Set in (RISC-V, 2023).
- Control Transfer Instructions
-
See Chapter RV32I Base Integer Instruction Set in (RISC-V, 2023).
- Atomics
-
See Chapter "A" Extension for Atomic Instructions in (RISC-V, 2023).
- Zba
-
See Chapter "B" Extension for Bit Manipulation in (RISC-V, 2023).
- Zicbom
-
See Chapter "CMO" Extensions for Base Cache Management Operation ISA in (RISC-V, 2023).
- Zcmt
-
See Chapter "Zc*" Extension for Code Size Reduction in (RISC-V, 2023).
- Zcmp
-
See Chapter "Zc*" Extension for Code Size Reduction in (RISC-V, 2023).
- jvt
-
See Chapter "Zc*" Extension for Code Size Reduction in (RISC-V, 2023).
- Zaamo
-
See Chapter "A" Extension for Atomic Instructions in (RISC-V, 2023).
- "Zalrsc" for RVY
-
See Chapter "A" Extension for Atomic Instructions in (RISC-V, 2023).
- "Zaamo" for RVY
-
See Chapter "A" Extension for Atomic Instructions in (RISC-V, 2023).
Chapters for the privileged specification
8. "Machine/Supervisor-Level ISA (RVY)" Extensions, Version 1.0
| This chapter will appear in the priv spec. Exact location TBD. |
This chapter describes integration of RVY with the RISC-V privileged architecture.
8.1. Machine-Level CSRs added or extended by RVY
RVY extends some M-mode CSRs to hold capabilities or otherwise add new functions. ASR-permission in the pc is always required for access to privileged CSRs.
8.1.1. Machine Trap Vector Base Address Capability Register (mtvec)
The mtvec register is extended to hold a code capability. Its reset value is nominally a Root Executable capability.
| mtvec (RVY) exists in all CHERI implementations, and so may be used as a source of a Root Executable capability after reset. |
The fields in the metadata are WARL as many fields can be implemented as constants.
| Examples of WARL behavior include always setting X-permission to 1 and setting the reserved fields to zero, otherwise the capability is unusable. Another example is to partially or fully restrict the bounds to constant values. |
| Care must be taken however that suitable root capabilities are available to software after reset if this CSR does not represent one. |
When traps are taken into machine mode, the pc is updated following the standard mtvec behavior.
The capability tag and metadata from mtvec (RVY) are also written to the pc.
Following the standard mtvec behavior, the value of mtvec.address can be viewed with a range of different addresses:
-
The MODE field is included in
mtvec.address[1:0]but it does not form part of the trap vector address. -
When MODE=Vectored, the trap vector address is incremented by four times the interrupt number.
-
CSR reads include MODE in
mtvec.address[1:0].
HICAUSE is defined to be the largest interrupt cause value that the implementation can write
to xcause when an interrupt is taken.
Therefore the minimum observable address is mtvec.address & ~3 and the maximum is (mtvec.address & ~3) + 4 x HICAUSE.
All possible observable values must be in the Representable Range. Software must ensure this is true when writing to mtvec (RVY), and the hardware sets the capability tag to zero if any values are out of the Representable Range.
| Modifying the address of any capability outside of the Representable Range without clearing the capability tag causes a security hole as the interpretation of the bounds changes. Therefore requiring that all possible observable addresses are representable but not necessary in bounds is the minimum security requirement. |
mtvec (RVY) is always updated using the semantics of the YADDRW instruction and so writing a sealed capability will cause the capability tag to be set to zero.
| The capability in mtvec (RVY) is not unsealed when it is written to pc, unlike other executing from other CSRs such as mepc (RVY). |
mtvec (RVY) follows the rule from mtvec about not needing to be able to hold all possible invalid addresses (see Invalid address conversion).
8.1.2. Machine Scratch Capability Register (mscratch)
The mscratch register is extended to hold a capability.
The reset value of the capability tag of this CSR is zero, the reset values of the metadata and address fields are UNSPECIFIED.
It is not WARL, all capability fields must be implemented.
8.1.3. Machine Exception Program Counter Capability (mepc)
The mepc is extended to hold a capability. Its reset value is nominally a Root Executable capability.
mepc.address is the mepc CSR, and so the follows the standard rules meaning that:
-
mepc.address[0]=0, and -
mepc.address[1]=0when IALIGN is fixed to 32 -
mepc.address[1]reads as zero when IALIGN is programmable and is set to 32
As listed above for mtvec (RVY), this means that mepc.address can represent multiple different values.
Therefore software must ensure that all possible values are in the Representable Range on writing, otherwise the hardware sets the written capability tag to zero.
Sealed capabilities may be written to mepc (RVY). The capability tag is set to zero on writing if:
-
mepc.address[0]=1, or -
mepc.address[1]=1when IALIGN=32
In the following case the value of the capability tag observable in the CSR depends on the value of IALIGN:
-
mepc (RVY) is sealed, the capability tag is set, and
-
mepc.address[1]=1and IALIGN=16 when writing the CSR
The capability tag is zero then IALIGN=32 when reading the CSR, or executing MRET (RVY), and the capability tag is one when IALIGN=16.
When a trap is taken into M-mode, the pc is written to mepc.address following the standard behavior.
The capability tag and metadata of the pc are also written to mepc (RVY).
On execution of an MRET (RVY) instruction, the capability value from mepc (RVY) is unsealed and written to pc.
mepc (RVY) follows the rule from mepc about not needing to be able to hold all possible invalid addresses (see Invalid address conversion).
8.1.4. Machine Thread Identifier Capability (mtidc)
The mtidc register is used to identify the current software thread in machine mode, using the method defined in the section for the unprivileged utidc CSR. On reset the capability tag of mtidc will be set to zero and the remainder of the data is UNSPECIFIED.
8.2. Machine-Level CSRs modified by RVY
8.2.1. Machine Status Registers (mstatus and mstatush)
The mstatus and mstatush registers have two additional restrictions:
-
The MXL, SXL and UXL fields that control the value of XLEN for S-mode and U-mode must be read-only and equal to MXL in RVY implementations. Only 1 and 2 are supported values.
-
The MBE, SBE, and UBE fields that control the memory system endianness for M-mode, S-mode, and U-mode must be read-only in RVY implementations. SBE and UBE must be read only and equal to MBE, if S-mode or U-mode, respectively, is implemented, or read-only zero otherwise.
Changing XLEN or endianness would change the interpretation of all in-memory capabilities, so allowing these fields to change at runtime is prohibited.
| These restrictions may be relaxed by a future extension. Such an extension is likely to enforce the constraint that any privilege level with XLEN less than MXLEN has CHERI disabled. |
MXR has no effect on the CHERI permission checking.
| CHERI does not need to make use execute only memory for security reasons, and so MXR has no relevance. Additionally the 32-bit encoding format does not allow X-permission to be encoded without R-permission. |
8.2.2. Machine Cause Register (mcause)
RVY adds new exception codes for CHERI exceptions that mcause must be able to represent.
The new exception codes and priorities are listed in
Machine cause (mcause) register values after trap and Table 52 respectively.
| Priority | Exc.Code | Description |
|---|---|---|
Highest |
3 |
Instruction address breakpoint |
32 |
Prior to instruction address translation: |
|
12, 1 |
During instruction address translation: |
|
1 |
With physical address for instruction: |
|
2 |
Illegal instruction |
|
33,34 |
Prior to address translation for an explicit memory access: |
|
4,6 |
Load/store/AMO capability address misaligned |
|
4,6 |
Optionally: |
|
36, 13, 15, 5, 7 |
During address translation for an explicit memory access: |
|
5,7 |
With physical address for an explicit memory access: |
|
4,6 |
If not higher priority: |
|
Lowest |
35 |
CHERI Load Capability Fault2 |
1 pc bounds are checked against all bytes of fetched instructions. If the instructions could not be decoded to determine the length, then the pc bounds check is made against the minimum sized instruction supported by the implementation which can be executed, when prioritizing against Instruction Access Faults.
2 CHERI Load Capability Fault is the lowest priority as determining whether to raise the exception may include checking the loaded capability tag.
| The full details of CHERI Instruction Access Fault, CHERI Load Access Fault and CHERI Store/AMO Access Fault are in Table 53. |
8.2.3. Machine Trap Delegation Register (medeleg)
Bits 32,33,34,35,36 of medeleg refer to valid CHERI exceptions and so can be used to delegate CHERI exceptions to supervisor mode.
8.2.4. "Smstateen/Ssstateen" Integration
mstateen0)8.3. Supervisor-Level CSRs added or extended by RVY
RVY extends some of the existing RISC-V CSRs to be able to hold capabilities or with other new functions. ASR-permission in the pc is required for access to all privileged CSRs.
8.3.1. Supervisor Trap Vector Base Address Capability Register (stvec)
The stvec register is extended to hold a capability.
When the S-mode execution environment starts, the value is nominally the Root Executable capability.
The handling of stvec (RVY) is otherwise identical to mtvec (RVY), but in supervisor mode.
8.3.2. Supervisor Scratch Capability Register (sscratch)
The sscratch register is extended to hold a capability.
At the start of the S-mode execution environment, the value of the capability tag of this CSR is zero and the values of the metadata and address fields are UNSPECIFIED.
It is not WARL, all capability fields must be implemented.
8.3.3. Supervisor Exception Program Counter Capability (sepc)
The sepc register is extended to hold a capability.
When the S-mode execution environment starts, the value is nominally the Root Executable capability.
As shown in Table 67, sepc (RVY) is a code capability, so it does not need to be able to hold all possible invalid addresses (see Invalid address conversion). Additionally, the capability in sepc (RVY) is unsealed when it is written to pc on execution of an SRET (RVY) instruction. The handling of sepc (RVY) is otherwise identical to mepc (RVY), but in supervisor mode.
8.3.4. Supervisor Thread Identifier Capability (stidc)
The stidc register is used to identify the current software thread in supervisor mode, using the method defined in the section for the unprivileged utidc CSR.
At the start of the S-mode execution environment, the value of the capability tag of this CSR is zero and the values of the metadata and address fields are UNSPECIFIED.
8.4. Supervisor-Level CSRs modified by RVY
8.4.1. Supervisor Cause Register (scause)
RVY adds new exception codes for CHERI exceptions that scause must be able to represent.
The new exception code is listed in .Supervisor cause (scause) register values after trap.
The behavior and usage of scause otherwise remains as described in scause.
See mcause (RVY) for the new exceptions priorities when RVY is implemented.
8.4.2. "Smstateen/Ssstateen" Integration
The TID (thread ID) bit in sstateen0 controls access to the utidc CSR.
See utidc for a description of the usage.
sstateen0)8.5. CHERI Exception handling
CHERI faults are typically higher priority than standard RISC-V faults. E.g., CHERI faults on the pc are higher priority than any other fault effecting the program counter such as instruction access fault.
auth_cap is rs1, unless in Integral Pointer Mode when it is ddc (if Zyhybrid is implemented).
|
| Instructions | Xcause | Description | Check |
|---|---|---|---|
All instructions have these exception checks first |
|||
All |
32 |
CHERI Instruction Access Fault |
pc capability tag is zero |
All |
32 |
CHERI Instruction Access Fault |
pc is sealed |
All |
32 |
CHERI Instruction Access Fault |
pc does not grant X-permission |
All |
32 |
CHERI Instruction Access Fault |
Any byte of current instruction out of pc bounds1 |
All |
32 |
CHERI Instruction Access Fault |
|
CSR/Xret additional exception check |
|||
CSR*, MRET (RVY), SRET (RVY), CBO.INVAL (RVY) |
2 |
Illegal instruction |
pc does not grant ASR-permission when required for CSR access or execution of MRET (RVY), SRET (RVY) or CBO.INVAL (RVY) |
Load additional exception checks |
|||
All loads |
33 |
CHERI Load Access Fault |
|
All loads |
33 |
CHERI Load Access Fault |
|
All loads |
33 |
CHERI Load Access Fault |
|
All loads |
33 |
CHERI Load Access Fault |
Any byte of load access out of |
All loads |
33 |
CHERI Load Access Fault |
|
Capability loads |
52 |
Load access fault |
Misaligned capability load |
Store/atomic/cache-block-operation additional exception checks |
|||
All stores, all atomics, all CBOs |
34 |
CHERI Store/AMO Access Fault |
|
All stores, all atomics, all CBOs |
34 |
CHERI Store/AMO Access Fault |
|
All stores, CBO.ZERO |
34 |
CHERI Store/AMO Access Fault |
|
All atomics, CBO.CLEAN, CBO.FLUSH, CBO.INVAL |
34 |
CHERI Store/AMO Access Fault |
|
All stores, all atomics |
34 |
CHERI Store/AMO Access Fault |
any byte of access out of |
CBO.ZERO, CBO.INVAL |
34 |
CHERI Store/AMO Access Fault |
any byte of cache block out of |
CBO.CLEAN, CBO.FLUSH |
34 |
CHERI Store/AMO Access Fault |
all bytes of cache block out of |
All stores, all atomics, all CBOs |
34 |
CHERI Store/AMO Access Fault |
|
Capability stores |
72 |
Store access fault |
Misaligned capability store |
1 The bounds checks include the cases where the bounds could not be decoded.
2 Misaligned capability accesses raise access faults instead of misaligned faults since they cannot be emulated in software.
| CBO.ZERO (RVY) is performed as a cache block wide store. All CMOs operate on the cache block which contains the address. Prefetch instructions check that the authorizing capability is has its capability tag set, is not sealed, has the required permission (R-permission, W-permission, X-permission) corresponding to the instruction, and has bounds which include at least one byte of the cache block; if any check fails, the prefetch is not performed but no exception is generated. |
8.6. CHERI Exceptions and speculative execution
| CHERI adds architectural guarantees that can prove to be microarchitecturally useful. Speculative-execution attacks can — among other factors — rely on instructions that fail CHERI permission checks not to take effect. When implementing any of the extensions proposed here, microarchitects need to carefully consider the interaction of late-exception raising and side-channel attacks. |
8.7. Physical Memory Attributes (PMA)
Typically, only parts of the entire memory space need to support CHERI capability tags. Therefore, it is desirable that harts supporting RVY extend PMAs with Physical Memory Attributes indicating whether a memory region allows storing CHERI capability tags. If they are not supported, then what the behavior is when attempting to access them.
There are three levels of support:
| PMA | Load Behavior | Store Behavior | Comment |
|---|---|---|---|
CHERI Capability Tag |
Load capability tag |
Store capability tag |
Tagged memory supporting capability tags |
CHERI Capability Tag Strip |
Load zero capability tag |
Ignore stored capability tag |
No support for capability tags, ignore them |
CHERI Capability Tag Fault |
Load zero capability tag |
Store/AMO Access Fault on capability tag1 |
No support for capability tags, trap on storing one |
1 The access fault is triggered on all capability stores or atomics such as SY or AMOSWAP.Y when C-permission and W-permission are granted and the to-be-stored capability tag is set to one. For SC.Y, the access fault is raised if the to-be-stored capability tag is set in rs2 even when the store fails.
Memory regions that do not have the CHERI Capability Tag PMA do not require storage for capability tags.
8.8. Modified Trap-Return Instructions Behavior
When the RVY base ISA is implemented, the trap-return instructions (MRET and SRET) read the full YLEN bits of the mepc (RVY)/sepc (RVY) register and unseal it prior to exception return if it is a sentry capability.
8.8.2. MRET (RVY)
- Synopsis
-
Trap Return (MRET, SRET)
- Mnemonics
-
mret
sret - Encoding
- Description
-
Return from machine mode (MRET (RVY)) or supervisor mode (SRET (RVY)) trap handler. MRET unseals mepc (RVY) and writes the result into pc. SRET unseals sepc (RVY) and writes the result into pc.
- Exceptions
-
An illegal instruction fault is raised when pc does not grant ASR-permission because MRET (RVY) and SRET (RVY) require access to privileged CSRs.
- Prerequisites (MRET)
-
Machine-Level ISA, RVY
- Prerequisites (SRET)
-
Supervisor-Level ISA, RVY
- Operation
TBD
9. "Zyhybrid for Privileged Architectures" Extension, Version 1.0
When using a system with Zyhybrid, it may be desirable to disable CHERI register and instruction access to some (or all) privilege levels such that they operate as a RV32I/RV64I system without any observable presence of CHERI features. This includes allowing custom encodings reallocated to CHERI to revert to being custom. Zyhybrid includes functions to disable explicit access to CHERI registers and instructions (hereafter referred to as disabling CHERI).
The Zyhybrid extension makes the Y bit of misa, menvcfg, and senvcfg writable to allow CHERI to be disabled.
The effective CHERI-enable for the current privilege is:
| On reset CHERI is always disabled for backwards compatibility (misa.Y resets to zero, ddc and pc bounds are nominally root capabilities (see Root). |
The following occurs when executing code in a privilege mode that has CHERI disabled:
-
Custom encoding spaces reallocated as standard encoding spaces for RVY revert to being custom encoding spaces, and so the encodings in RVY and Zyhybrid are no longer available.
-
Natively YLEN CSRs are no longer available, and may have been mapped to different standard CSRs.
-
Executing CSR instructions accessing any CSR extended to YLEN only allows XLEN access (this is identical to Integral Pointer Mode access).
Disabling CHERI has no effect on implicit accesses or security checks. The last capability written to pc and ddc before disabling CHERI will be used to authorize instruction execution and data memory accesses respectively.
|
Disabling CHERI prevents low-privileged Integral Pointer Mode software from interfering with the correct operation of higher-privileged Integral Pointer Mode software that does not perform ddc switches on trap entry and return. Disabling CHERI allows harts supporting CHERI to be fully compatible with standard RV32[IE]/RV64[IE] base architectures, including any instructions mapped into the reallocated custom encoding spaces. This is the default behavior on reset. |
Table 55 summarizes the behavior of a hart for the different CHERI modes, while executing outside debug mode.
| Y1=0 | Y=1, P-bit=1 | Y=1, P-bit=0 | |
|---|---|---|---|
Authorizing capability for data memory accesses |
capability in |
||
Natively YLEN CSRs available |
✘ |
✔ |
✔ |
Extended YLEN CSR access width |
XLEN |
XLEN |
YLEN |
CHERI instructions available |
✘ |
✔2 |
✔ |
custom-1/2/3 available for custom use |
✔ |
✘ |
✘ |
Summary |
Fully RV32[IE]/RV64[IE] compatible3 |
Integral Pointer Mode |
Capability Pointer Mode |
1 Y represents the effective CHERI enable for the current privilege mode.
2 The compressed instructions operating on capability data are unavailable as their encodings will revert to non-CHERI standard behavior.
3 The hart is fully compatible with standard RISC-V when Y=0 provided that pc, Xtvec, Xepc and ddc have not been changed from the default reset state (i.e., hold Root Executable and Root Data capabilities).
10. "Supervisor-Level ISA for Virtual Memory (RV64Y)" Extension, Version 1.0 for RV64Y
CHERI checks are made on the effective address according to the current translation scheme. I.e., on the virtual address if translation is enabled or the physical address if translation is disabled.
Implicit memory accesses made by the page table walker are not subject to CHERI checks.
| A future extension may add CHERI checks to the page table walker. |
10.1. Limiting Capability Propagation
|
Page table enforcement can allow the operating system to limit the flow of capabilities between processes. It is highly desirable that a process should only possess capabilities that have been issued for that address space by the operating system. Unix processes may share memory for efficient communication, but capability pointers must not be shared across these channels into a foreign address space. An operating system might defend against this by only issuing a capability to the shared region that does not grant the load/store capability permission. However, there are circumstances where portions of general-purpose, mmapped* memory become shared, and the operating system must prevent future capability communication through those pages. This is not possible without restructuring software, as the capability for the original allocation, which spans both shared memory and private memory, would need to be deleted and replaced with a list of distinct capabilities with appropriate permissions for each range. Such a change would not be transparent to the program. Such sharing through virtual memory is on the page granularity, so preventing capability writes with a PTE permission is a natural solution. * allocated using mmap |
10.2. CHERI Store/AMO Page Fault
RV64Y adds the the following new fault type:
-
CHERI Store/AMO Page Fault (cause value 36)
It is prioritized against other fault types as shown in Table 52.
10.3. The pte.rvy field for capability flow control
|
As RV32Y has no field allocated in the PTE, capability loads and stores operate as normal.
Therefore the RVY field is reserved in the RV64 PTE formats only (e.g. Figure 50) for use by RV64Y extensions.
The principle is that extensions, such as Svyrg may redefine the usage of the RVY field by adding an enable bit into |
The definition of the RVY field is as follows:
| Bit | Name | Comment |
|---|---|---|
pte.rvy[3] |
pte.y |
Enable capability (Y) access |
pte.rvy[2] |
reserved |
reserved |
pte.rvy[1] |
reserved |
reserved |
pte.rvy[0] |
reserved |
reserved |
If pte.y=0 then:
-
All capability loads set the loaded capability tag to zero
-
All capability stores with the to-be-stored capability tag set raise a CHERI Store/AMO Page Fault.
If pte.y=1 then:
-
All capability loads and capability stores operate as normal.
10.4. Invalid Virtual Address Handling
When address translation is in effect for RV64Y, the upper bits of virtual memory addresses must match for the address to be valid.
The CSRs shown in Table 67, as well as the pc, need not hold all possible invalid addresses. Implementations may convert an invalid address into some other invalid address that the register is capable of holding.
However, the bounds encoding of capabilities depends on the address value if the bounds are not infinite.
Therefore implementations must not convert invalid addresses to other arbitrary invalid addresses in an unrestricted manner if the bounds are not infinite.
If the bounds could not be decoded due to the address being invalid, then a CHERI Instruction Access Fault, CHERI Load Access Fault or CHERI Store/AMO Access Fault exception is raised as appropriate.
| In all cases, if the authorizing capability has bounds that cover all addresses, then the behavior is identical to the normal RISC-V behavior without CHERI. |
| Not requiring the implementation to decode the bounds for invalid addresses reduces the size of bounds comparators from 64-bits to the supported virtual address width. |
10.4.1. Updating CSRs
A CSR may be updated to hold a capability with an invalid address, due to:
-
executing instructions, such as CSRRW (RVY)
-
hardware updates to CSRs such as storing the pc into mepc (RVY)/sepc (RVY) etc. when taking an exception.
To ensure that the bounds of a valid capability cannot be corrupted:
-
If the new address is invalid and the capability bounds do not cover all addresses, then set the capability tag to zero before writing to the CSR.
| When the capability’s address is invalid and happens to match an invalid address which the CSR can hold, then it is implementation-defined whether to set the capability tag to zero. |
10.4.2. Branches and Jumps
If the effective target address of the jump or branch is invalid, and the authorizing capability’s bounds do not cover all addresses, then set the capability tag of the target pc to zero. This will cause a CHERI Instruction Access Fault exception when executing the target instruction.
| RISC-V harts that do not support RVY normally raise an instruction access fault or page fault after jumping or branching to an invalid address. Therefore, RVY aims to preserve that behavior to ensure that harts supporting RVY and Zyhybrid are fully compatible with RISC-V harts provided that pc and ddc are set to Root Executable and Root Data capabilities, respectively. |
10.4.3. Memory Accesses
If the effective address of the memory access is invalid, and the authorizing capability’s bounds do not cover all addresses, then raise a CHERI Load Access Fault or CHERI Store/AMO Access Fault exception because the bounds cannot be reliably decoded.
10.5. Integrating RVY with Debug
10.5.1. Integrating RVY with Sdext
| This chapter will appear in the priv spec. Exact location TBD. |
This section describes changes to integrate the Sdext ISA and RVY. It must be implemented to make external debug compatible with RVY. Modifications to Sdext are kept to a minimum.
The following features, which are optional in Sdext, must be implemented for use with RVY:
-
The
hartinforegister must be implemented. -
All harts which support RVY must provide
hartinfo.nscratchof at least 1 and implement the dscratch0 (RVY) register. -
All harts which support RVY must provide
hartinfo.datasizeof at least 1 andhartinfo.dataaccessof 0. -
The program buffer must be implemented, with
abstractcs.progbufsizeof at least 4 ifdmstatus.impebreakis 1, or at least 5 ifdmstatus.impebreakis 0.
|
These requirements allow a debugger to read and write capabilities in integer
registers without disturbing other registers. These requirements may be
relaxed if some other means of accessing capabilities in integer registers,
such as an extension of the Access Register abstract command, is added. The
following sequences demonstrate how a debugger can read and write a capability
in
The low |
10.5.1.1. Debug Mode
When executing code due to an abstract command, the hart stays in debug mode and the rules outlined in Section 4.1 of the RISC-V Debug Specification apply.
10.5.1.2. Core Debug Registers
RVY renames and extends debug CSRs that are designated to hold addresses to be able to hold capabilities. The renamed debug CSRs are listed in Table 69.
The pc must grant ASR-permission to access debug CSRs. This permission is automatically provided when the hart enters debug mode as described in the dpc (RVY) section. The pc metadata can only be changed if the implementation supports executing control transfer instructions from the program buffer — this is an optional feature according to the RISC-V Debug Specification.
This specification extends the following registers from the RISC-V Debug Specification.
- Debug Program Counter (dpc)
-
dpc is a DXLEN-bit register used as the PC saved when entering debug mode.
Figure 23. Debug program counter
- Debug Scratch Register 1 (dscratch1)
-
dscratch1 is an optional DXLEN-bit scratch register that can be used by implementations which need it.
Figure 24. Debug scratch 0 register
- Debug Scratch Register 1 (dscratch1)
-
dscratch1 is an optional DXLEN-bit scratch register that can be used by implementations which need it.
Figure 25. Debug scratch 1 register
10.5.1.3. Debug Program Counter Capability (dpc)
The dpc register is extended to hold a capability.
The reset value of the capability tag of this CSR is zero, the reset values of the metadata and address fields are UNSPECIFIED.
Upon entry to debug mode, the RISC-V Debug Specification, does not specify how to update the PC, and says PC-relative instructions may be illegal. This concept is extended to include any instruction which reads or updates pc, which refers to all jumps, conditional branches and AUIPC (RVY). The exceptions are YMODESWY and YMODESWI, which are supported if Zyhybrid is implemented, see drootc for details.
As a result, the value of pc is UNSPECIFIED in debug mode according to this specification. The pc metadata has no architectural effect in debug mode. Therefore ASR-permission is implicitly granted for access to all CSRs for instruction execution.
On debug mode entry, dpc (RVY) is updated with the capability in pc whose address field is set to the address of the next instruction to be executed upon debug mode exit as described in the RISC-V Debug Specification.
When leaving debug mode, an unsealed capability value is copied from the value in dpc (RVY) and written into pc. A debugger may write dpc (RVY) to change where the hart resumes and its mode, permissions, sealing or bounds.
The legalization of dpc (RVY) follows the same rules described for mepc (RVY).
10.5.1.4. Debug Scratch Register 0 (dscratch0)
The dscratch1 register is extended to hold a capability.
The reset value of the capability tag of this CSR is zero, the reset values of the metadata and address fields are UNSPECIFIED.
10.5.1.5. Debug Scratch Register 1 (dscratch1)
The dscratch1 register is extended to hold a capability.
The reset value of the capability tag of this CSR is zero, the reset values of the metadata and address fields are UNSPECIFIED.
10.5.1.6. Debug Root Capability Selector (drootcsel)
drootcsel is a debug mode accessible integer CSR. The address and access details are shown in Table 68.
It selects which Root capability is exposed through drootc.
The reset value is 0, which must cause drootc to expose a
Root Executable capability.
Other capability values may be defined for exposure through drootc by the capability encoding, and may be selected by having the debugger write to this register. Writes are WARL, so the debugger may confirm that its selection has been applied.
10.5.1.7. Debug Root Capability Register (drootc)
drootc is a debug mode accessible capability CSR. The address and access details are shown in Table 68. It exposes the capability selected by drootcsel.
If Zyhybrid is implemented,
the Root Executable exposed when drootcsel is 0 is further specified as follows:
-
The P-bit is reset to Integral Pointer Mode (1).
-
The debugger can set the P-bit to Capability Pointer Mode (0) by executing YMODESWY from the program buffer.
-
Executing YMODESWY causes execution of subsequent instructions from the program buffer, starting from the next instruction, to be executed in Capability Pointer Mode. It also sets the CHERI Pointer Mode to Capability Pointer Mode on future entry into debug mode.
-
Therefore to enable use of a CHERI debugger, only a single YMODESWY needs to be executed once from the program buffer after resetting the core.
-
The debugger can also execute YMODESWI to change the CHERI Pointer Mode back to Integral Pointer Mode. This affects the execution of the next instruction in the program buffer, updates the P-bit of drootc, and thereby controls which CHERI Pointer Mode to use on the next entry into debug mode.
-
The P-bit of this capability is only updated by executing YMODESWY or YMODESWI from the program buffer.
10.5.1.8. Modified Trap-Return Instruction Behavior
The DRET instruction reads the full YLEN bits of the mepc (RVY)/sepc (RVY) register and unseals it prior to exception return if it is a sentry capability.
10.5.1.8.1. DRET (RVY)
- Synopsis
-
Debug Return (DRET)
- Mnemonic
-
dret - Encoding
- Description
-
DRET (RVY) returns from debug mode. It unseals dpc (RVY) and writes the result into pc.
| The DRET (RVY) instruction is the recommended way to exit debug mode. However, it is a pseudoinstruction to return that technically does not execute from the program buffer or memory. It currently does not require the pc to grant ASR-permission so it never raises an exception. |
- Prerequisites
-
Sdext, RVY
- Operation
TBD
10.5.2. Integrating Zyhybrid with Sdext
When entering debug mode, whether the core enters Integral Pointer Mode or Capability Pointer Mode is controlled by the P-bit in the drootc capability selected by drootcsel value 0.
The following sequence executed from the program buffer will write 0 for Capability Pointer Mode and 1 for Integral Pointer Mode to x1:
csrr x1, drootc
ymoder x1, x1
| There is no CHERI enable/disable bit for debug mode, so CHERI register and instruction access is always permitted in debug mode. |
10.5.2.1. Debug Default Data Capability CSR (dddc)
The reset value of the capability tag of this CSR is zero, the reset values of the metadata and address fields are UNSPECIFIED.
This CSR is only implemented if Zyhybrid is implemented.
Upon entry to debug mode, ddc is saved in dddc. ddc is set to a Root Data capability such that ddc's address remains unchanged.
When debug mode is exited by executing DRET (RVY), the hart’s ddc is updated to the capability stored in dddc. A debugger may write dddc to change the hart’s context.
As shown in Table 67, dddc is a data pointer, so it does not need to be able to hold all possible invalid addresses (see Invalid address conversion).
10.5.3. "Sdtrig (RVY)", Integrating RVY with Sdtrig
| This chapter will appear in the priv spec. Exact location TBD. |
The Sdtrig extension is orthogonal to RVY. However, the priority of synchronous exceptions and where triggers fit is adjusted as shown in Table 57.
Debug triggers are higher priority than CHERI exceptions to allow debug.
| Priority | Exception Code | Description | Trigger |
|---|---|---|---|
Highest |
3 |
etrigger |
|
3 |
Instruction address breakpoint |
mcontrol/mcontrol6 execute address before |
|
32 |
Prior to instruction address translation: |
||
12, 20, 1 |
During instruction address translation: First encountered page fault, guest-page fault, or access fault |
||
1 |
With physical address for instruction: Instruction access fault |
||
3 |
mcontrol/mcontrol6 execute data before |
||
2 |
Illegal instruction |
mcontrol/mcontrol6 load/store address before, store data before |
|
33,34 |
Prior to address translation for an explicit memory access: |
||
4,6 |
Load/store/AMO capability address misaligned |
||
4, 6 |
Optionally: Load/Store/AMO address misaligned |
||
36, 13, 15, 21, 23, 5, 7 |
During address translation for an explicit memory access: First encountered CHERI Store/AMO Page Fault, page fault, guest-page fault, or access fault |
||
5, 7 |
With physical address for an explicit memory access: Load/store/AMO access fault |
||
4, 6 |
If not higher priority: Load/store/AMO address misaligned |
||
35 |
CHERI Load Capability Fault |
||
Lowest |
3 |
mcontrol/mcontrol6 load data before |
| See the notes beneath Synchronous exception priority in decreasing priority order for details about CHERI load page fault priority. |
11. "Svyrg" Extension, Version 1.0 for RV64Y
This extension specifies use of the RVY field from the PTE formats (e.g., see Figure 50).
Svyrg implies Sv39.
The Svyrg extension is enabled when the sstatus.YRGE bit is set.
The extension adds the ability for supervisor-mode software to quickly enable trapping loads of capabilities from all pages of memory, incrementally allow loads of capabilities from such pages, and track stores of capabilities to all pages of memory. Applied to userspace pages, this has been shown to allow the operating system to implement capability revocation schemes, which allow userspace memory allocators to deterministically guard against use-after-reallocation (Filardo et al., 2024). Applied to kernel pages, they can similarly be used against use-after-reallocation within the kernel itself.
The 4-bit pte.rvy field is subdivided into four 1-bit fields, two controlling capability loads (including the capability loaded during an AMO) and two controlling capability stores (again, including the capability stored as part of an AMO).
| Bit | Name | Comment |
|---|---|---|
Capability load/AMO fields |
||
pte.rvy[0] |
pte.yr |
Capability readable |
pte.rvy[1] |
pte.yrg |
Capability read generation |
Capability store/AMO fields |
||
pte.rvy[2] |
pte.yw |
Capability writable |
pte.rvy[3] |
pte.yd |
Capability dirty |
When all of the following are true, Svyrg adds two related architectural features, CHERI Load Capability Faults and Capability Dirty Tracking:
-
sstatus.YRGEis set. -
The authorizing capability has C-permission.
-
The PMA is set to CHERI Capability Tag.
11.1. CHERI Load Capability Faults
Svyrg defines a new fault type:
-
CHERI Load Capability Fault (cause value 35)
In the case of AMOs that could trigger both a CHERI Store/AMO Page Fault, due to storing a valid capability tag, and a CHERI Load Capability Fault, the CHERI Store/AMO Page Fault takes priority as shown in Table 52
pte.yr and pte.yrg are used to enable capability loads or AMOs to write a capability tag to rd.
When pte.yr is clear, pte.yrg controls whether capabilities can write a capability tag to rd. When clear capability tags cannot be written to rd, and when set, they can.
When pte.yr is set, pte.yrg can be used to trap on capability loads or AMOs when it does not match the Capability Read Generation value that is represented by the value of sstatus.UYRG for userspace pages (pte.u=1) or sstatus.SYRG for kernel pages (pte.u=0).
The implementation raises a CHERI Load Capability Fault when, in addition to the rules above, all of the following are true:
-
A capability load or AMO is executed.
-
pte.yr is set.
-
if pte.u=1, pte.yrg does not equal
sstatus.UYRG. -
if pte.u=0, pte.yrg does not equal
sstatus.SYRG. -
Optionally, the loaded capability tag is set1.
-
Any other platform specific rules have not forced the loaded capability tag to be clear.
|
1Checking the value of the capability tag requires taking data dependent exceptions on loaded capabilities for loads or AMOs. Ideally all implementations would trap precisely (taking the capability tag into account in all cases) rather than conservatively (trapping more often, potentially on every loaded capability). However, the loaded capability tag may not be available in all implementations when determining whether to raise the exception, and therefore flexibility is permitted. As a result, the software is required to be tolerant of raising the trap when the capability tag is not set, potentially resulting in spurious traps from pages that have pte.yr=1, and so are likely to store valid capabilities. Implementations that already take synchronous traps on loaded data, such as ECC faults, are recommended to check the loaded capability tag when determining whether to raise the fault. |
| pte.yr | pte.yrg | tag1 | Load Capability Behavior |
|---|---|---|---|
0 |
0 |
X |
Clear loaded capability tag |
0 |
1 |
X |
Normal operation |
1 |
≠ |
0 |
Implementation defined choice of |
1 |
≠ |
1 |
CHERI Load Capability Fault |
1 |
= |
X |
Normal operation |
1 The loaded capability tag.
2 if pte.u=1, sstatus.UYRG, else sstatus.SYRG.
| CHERI Load Capability Faults may be used to implement the load-barrier primitive from (Filardo et al., 2024). |
11.2. Capability Dirty Tracking
When pte.yw is clear, capability stores or AMOs where the to-be-stored capability tag is set will raise a CHERI Store/AMO Page Fault fault.
When pte.yw is set, capability stores to the virtual page are permitted. In addition, the pte.yd bit indicates that a capability was stored to the virtual page since the last time the pte.yd bit was cleared.
| This is akin to the pte.d bit indicating that a store occurred through this PTE since the last time pte.d was cleared. |
Capability dirty tracking behavior is enabled when, in addition to the rules above, all of the following are true:
-
A capability store or AMO instruction is executed.
-
The to-be-stored capability tag is set.
-
pte.yw is set.
-
pte.yd is clear.
Two schemes for capability dirty tracking are permitted, and the scheme in use is determined by whether the Svade or Svadu extensions are enabled.
-
For Svade, take a CHERI Store/AMO Page Fault.
-
For Svadu, do a hardware update that sets pte.yd=1, following the same rules as setting pte.d.
-
When setting pte.yd, the hardware update also necessarily sets (or leaves set) pte.a and pte.d.
-
| pte.yw | pte.yd | tag1 | Store Capability Behavior |
|---|---|---|---|
0 |
X |
0 |
Normal operation |
0 |
X |
1 |
CHERI Store/AMO Page Fault |
1 |
0 |
0 |
Normal operation |
1 |
0 |
1 |
CHERI Store/AMO Page Fault (Svade) or |
1 |
1 |
X |
Normal operation |
1 The to-be-stored capability tag.
The capability dirty tracking is resolved during memory translation, but there are cases where it is not known if there will be a capability tag stored to memory or not at this point. Capability dirty tracking must be triggered when pte.yw=1 and pte.yd=0 and the to-be-stored capability tag is set, and may be triggered in the following case where it is not known if there will be a stored capability tag during translation:
-
SC.Y triggers capability dirty tracking if the capability tag is set in rs2, even if the store fails. This matches the semantics of SC.* with regard to pte.d.
|
pte.yd must always be set when a capability with a valid capability tag is written to a virtual page so that software knows which pages have had capabilities stored to them. It may be set too often, which may cause software to examine the page to check for capabilities when none are present. This is a situation software is required to handle anyway, as it is always possible for all capabilities in a page to be overwritten by non-capability data. In this case the pte.yd bit would still be set. Future AMOs fall into this category:
Checking the stored capability tag is less of a burden to the implementation than checking the loaded capability tag for CHERI Load Capability Fault, which is why checking the loaded capability tag is optional behavior. However, a future extension may reduce the burden further by removing the check on the to-be-stored capability tag. |
| Capability dirty tracking may be used to implement the store-barrier primitive from (Filardo et al., 2024). |
The minimum level of PTE support is to set pte.yr=1, pte.yd=1, pte.yw=1 and pte.yrg=0 in all PTEs intended for storing capabilities (e.g., private anonymous mappings) and set sstatus.UYRG=0 and sstatus.SYRG=0 on all harts, which will enable capabilities to be loaded and stored successfully.
|
11.3. UYRG CSR field
The mstatus, sstatus and vsstatus CSRs include the Userspace Capability Read Generation (UYRG) bit, the Supervisor version (SYRG) and the enable bit (YRGE).
Appendix C: CHERI (RV64Y) Privileged Appendix
C.1. RVY Privileged Extensions Summary
C.1.1. Machine level ISA for RVY
| Mnemonic | Function |
|---|---|
Return from machine mode handler, sets pc from mtvec (RVY) , needs ASR-permission |
C.1.2. Supervisor level ISA for RVY
| Mnemonic | Function |
|---|---|
Return from supervisor mode handler, sets pc from stvec (RVY), needs ASR-permission |
C.1.3. Sdext for RVY
| Mnemonic | Function |
|---|---|
Return from debug mode, sets ddc from dddc and pc from dpc (RVY) |
C.2. RVY YLEN CSR Summary
this section includes debug CSRs
| YLEN CSR | Prerequisites |
|---|---|
Sdext |
|
Sdext |
|
Sdext |
|
M-mode |
|
S-mode |
|
M-mode |
|
S-mode |
|
M-mode |
|
S-mode |
| YLEN CSR | Action on XLEN write | Action on YLEN write |
|---|---|---|
Apply Invalid address conversion. Always update the CSR with YADDRW even if the address didn’t change. |
Apply Invalid address conversion and update the CSR with the result if the address changed, direct write if address didn’t change |
|
Update the CSR using YADDRW. |
direct write |
|
Update the CSR using YADDRW. |
direct write |
|
Update the CSR using YADDRW. |
direct write |
|
Update the CSR using YADDRW. |
direct write |
|
Apply Invalid address conversion. Always update the CSR with YADDRW even if the address didn’t change, including the MODE field in the address for simplicity. Vector range check * if vectored mode is programmed. |
Apply Invalid address conversion. Always update the CSR with YADDRW even if the address didn’t change, including the MODE field in the address for simplicity. Vector range check * if vectored mode is programmed. |
|
Apply Invalid address conversion. Always update the CSR with YADDRW even if the address didn’t change, including the MODE field in the address for simplicity. Vector range check * if vectored mode is programmed. |
Apply Invalid address conversion. Always update the CSR with YADDRW even if the address didn’t change, including the MODE field in the address for simplicity. Vector range check * if vectored mode is programmed. |
|
Apply Invalid address conversion. Always update the CSR with YADDRW even if the address didn’t change. |
Apply Invalid address conversion and update the CSR with the result if the address changed, direct write if address didn’t change |
|
Apply Invalid address conversion. Always update the CSR with YADDRW even if the address didn’t change. |
Apply Invalid address conversion and update the CSR with the result if the address changed, direct write if address didn’t change |
* The vector range check is to ensure that vectored entry to the handler is within bounds of the capability written to xtvec.
The check on writing must include the lowest (0 offset) and highest possible offset (e.g., 64 * MXLEN bits where HICAUSE=16).
XLEN bits of extended YLEN-wide CSRs are written when executing CSRRWI (RVY), CSRRC (RVY), CSRRS (RVY), CSRRCI (RVY) or CSRRSI (RVY) regardless of the CHERI Pointer Mode. When using CSRRW (RVY), YLEN bits are written when the CHERI Pointer Mode is Capability Pointer Mode and XLEN bits are written when the mode is Integral Pointer Mode; therefore, writing XLEN bits with CSRRW (RVY) is only possible when Zyhybrid is implemented.
| YLEN CSR | Action on XLEN write | Action on YLEN write |
|---|---|---|
Apply Invalid address conversion. Always update the CSR with YADDRW even if the address didn’t change. |
Apply Invalid address conversion and update the CSR with the result if the address changed, direct write if address didn’t change |
|
Apply Invalid address conversion. Always update the CSR with YADDRW even if the address didn’t change. |
Apply Invalid address conversion and update the CSR with the result if the address changed, direct write if address didn’t change |
|
Ignore |
Ignore |
|
Ignore |
Ignore |
|
Update the CSR using YADDRW. |
direct write |
|
Update the CSR using YADDRW. |
direct write |
|
Update the CSR using YADDRW. |
direct write |
XLEN bits of YLEN-wide CSRs added in Zyhybrid are written when executing CSRRWI (RVY), CSRRC (RVY), CSRRS (RVY), CSRRCI (RVY) or CSRRSI (RVY) regardless of the CHERI Pointer Mode. YLEN bits are always written when using CSRRW (RVY) regardless of the CHERI Pointer Mode.
Implementations which allow misa.C to be writable need to legalize xepc
on reading if the misa.C value has changed since the value was written as this
can cause the read value of bit [1] to change state.
|
| YLEN CSR | Code Pointer | Data Pointer | Unseal On Execution |
|---|---|---|---|
✔ |
✔ |
||
✔ |
|||
✔ |
|||
✔ |
✔ |
||
✔ |
✔ |
||
✔ |
|||
✔ |
Some CSRs store code pointers or data pointers as shown in Table 67. These are WARL CSRs that do not need to store full 64-bit addresses on RV64, and so need not be capable of holding all possible invalid addresses. Prior to writing an invalid address to these CSRs, the address must be converted to another invalid address that the CSR is capable of holding. CSRs that store fewer address bits are also subject to the invalid address check in Invalid address conversion on writing.
The tables below show all YLEN-wide CSRs.
| YLEN CSR | Prerequisites | Address | Permissions | Reset Value | Description |
|---|---|---|---|---|---|
Sdext |
0x7b1 |
DRW |
tag=0, otherwise specified by the platform |
Debug Program Counter Capability |
|
Sdext |
0x7b2 |
DRW |
tag=0, otherwise specified by the platform |
Debug Scratch Capability 0 |
|
Sdext |
0x7b3 |
DRW |
tag=0, otherwise specified by the platform |
Debug Scratch Capability 1 |
|
M-mode |
0x340 |
MRW, ASR-permission |
tag=0, otherwise specified by the platform |
Machine Scratch Capability |
|
S-mode |
0x140 |
SRW, ASR-permission |
tag=0, otherwise specified by the platform |
Supervisor Scratch Capability |
|
M-mode |
0x305 |
MRW, ASR-permission |
Nominally Root Executable |
Machine Trap-Vector Base-Address Capability |
|
S-mode |
0x105 |
SRW, ASR-permission |
Nominally Root Executable |
Supervisor Trap-Vector Base-Address Capability |
|
M-mode |
0x341 |
MRW, ASR-permission |
Nominally Root Executable |
Machine Exception Program Counter Capability |
|
S-mode |
0x141 |
SRW, ASR-permission |
Nominally Root Executable |
Supervisor Exception Program Counter Capability |
|
Zyhybrid, Sdext |
0x7bc |
DRW |
tag=0, otherwise specified by the platform |
Debug Default Data Capability (saved/restored on debug mode entry/exit) |
|
Zyhybrid |
0x416 |
URW |
nominally Root Data |
User Default Data Capability |
|
Sdext |
0x7ba |
DRW |
0 |
Multiplexing selector for drootc |
|
Sdext |
0x7bd |
DRW |
nominally Root Executable |
Source of authority in debug mode, writes are ignored |
|
RVY |
0x780 |
Read: M, Write: M, ASR-permission |
tag=0, otherwise specified by the platform |
Machine thread ID |
|
RVY |
0x580 |
Read: S, Write: S, ASR-permission |
tag=0, otherwise specified by the platform |
Supervisor thread ID |
|
RVY |
0x480 |
Read: U, Write: U, ASR-permission |
tag=0, otherwise specified by the platform |
User thread ID |
Where reset values are specified in Table 68, they are typically a maximum possible value. For example, a Root Executable as specified for mtvec (RVY) is the maximum, the platform may reset this CSR to a smaller memory range, or to have fewer permissions.
Machine-Level ISA (RVY) and Supervisor-Level ISA (RVY) extend the CSRs listed in Table 69, Table 70, Table 71 , and Table 72 from the base RISC-V ISA and its extensions.
| If Zyhybrid is supported then the CHERI Pointer Mode determines whether YLEN or XLEN bits are returned (see CSRRW (RVY)). |
| RVY CSR | Address | Prerequisites | Permissions | Description |
|---|---|---|---|---|
0x7b1 |
Sdext |
DRW |
Debug Program Counter Capability |
|
0x7b2 |
Sdext |
DRW |
Debug Scratch Capability 0 |
|
0x7b3 |
Sdext |
DRW |
Debug Scratch Capability 1 |
| RVY CSR | Address | Prerequisites | Permissions | Description |
|---|---|---|---|---|
0x340 |
M-mode |
MRW, ASR-permission |
Machine Scratch Capability |
|
0x305 |
M-mode |
MRW, ASR-permission |
Machine Trap-Vector Base-Address Capability |
|
0x341 |
M-mode |
MRW, ASR-permission |
Machine Exception Program Counter Capability |
|
|
| RVY CSR | Address | Prerequisites | Permissions | Description |
|---|---|---|---|---|
0x140 |
S-mode |
SRW, ASR-permission |
Supervisor Scratch Capability |
|
0x105 |
S-mode |
SRW, ASR-permission |
Supervisor Trap-Vector Base-Address Capability |
|
0x141 |
S-mode |
SRW, ASR-permission |
Supervisor Exception Program Counter Capability |
| RVY CSR | Address | Prerequisites | Permissions | Description |
|---|
C.3. CHERI System Implications
| Unclear if this chapter will appear in the priv spec. May just be in the standalone spec. |
CHERI processors need memory systems which support the capability tags in memory.
There are, or will soon be, a wide range of CHERI systems in existence from tiny IoT devices up to server chips.
There are two types of bus connections used in SoCs which contain CHERI CPUs:
-
Tag-aware busses, where the bus protocol is extended to carry the capability tag along with the data. This is typically done using user-defined bits in the protocol.
-
These busses will read capability tags from memory (if capability tags are present in the target memory) and return them to the requestor.
-
These busses will write the capability tag to memory as an extension of the data write.
-
-
Non-capability tag-aware busses, i.e., current non-CHERI-aware busses.
-
Reads of tagged memory will not read the capability tag.
-
Writes to tagged memory will set the capability tag of any YLEN-aligned YLEN-wide memory location to zero where any byte matches the memory write.
-
The fundamental rule for any CHERI system is that the capability tag and data are always accessed atomically. For every naturally aligned YLEN-wide memory location, it must never be possible to:
-
Update any data bytes without also writing the capability tag
-
This implies setting the capability tag to zero if a non-CHERI aware bus master overwrites a capability in memory
-
-
Read a capability tag value with mismatched (stale or newer) data
-
Write a capability tag without also writing the data.
| Clearing capability tags in memory does not necessarily require updating the associated data. |
C.3.1. Small CHERI system example
This example shows a minimum-sized system where only the local memory is extended to support capability tags. The capability tag-aware region is highlighted. All capability tags are created by the CHERI CPU, and only stored locally. The memory is shared with the system, probably via a secure DMA, which is not capability tag-aware.
Therefore the connection between CPU and memory is tag-aware, and the connection to the system is not capability tag-aware.
All writes from the system port to the memory must clear any memory capability tags to follow the rules from above.
C.3.2. Large CHERI system example
In the case of a large CHERI SoC with caches, all the cached memory visible to the CHERI CPUs must support capability tags. All memory is backed up by DRAM, and standard DRAM does not offer the extra bit required for CHERI capability tag storage and so a typical system will have a capability tag cache IP.
A region of DRAM is typically reserved for CHERI capability tag storage.
The capability tag cache sits on the boundary of the capability tag-aware and non-tag-aware memory domains, and it provides the bridge between the two. It stores capability tags locally in its cache, and if there is a miss, it will create an extra bus request to access the region of DRAM reserved for capability tag storage. Therefore in the case of a miss a single access is split into two - one to access the data and one to access the capability tag.
The key property of the capability tag cache is to preserve the atomic access of data and capability tags in the memory system so that all CPUs have a consistent view of capability tags and data.
The region of DRAM reserved for capability tag storage must be accessible only by the capability tag cache, therefore no bus initiators should be able to write to the DRAM without the transactions passing through the capability tag cache.
Therefore the GPUs and peripherals cannot write to the capability tag storage in the DRAM or the capability tag supporting memory data storage region. These constraints will be part of the design of the network-on-chip. It is possible for the GPU and peripherals to read the capability tag supporting memory data storage region of the DRAM, if required.
| It would be possible to allow a DMA to access the capability tagged memory region of the DRAM directly to allow swap to/from DRAM and external devices such as flash. This will require the highest level of security in the SoC, as the CHERI protection model relies on the integrity of the capability tags, and so the root-of-trust will need to authenticate and encrypt the transfer, with anti-rollback protection. |
For further information on the capability tag cache see (Efficient Tagged Memory, 2017).
C.3.3. Large CHERI pure-capability system example
In this example every DRAM access passes through the capability tag cache, and so all bus masters are capability tag-aware and can access the capability tags associated with memory if permitted by the network-on-chip.
The system topology is simpler than in Figure 36.
There is likely to be a performance difference between the two systems. The main motivation for Figure 36 is to avoid the GPU DRAM traffic needing to look-up every capability tag in the capability tag cache, potentially adding overhead to every transaction.
C.4. Hybrid Mode Usage Models
The Zyhybrid extension enables a hart to switch between Capability Pointer Mode and Integral Pointer Mode.
This functionality supports various usage models that facilitate the co-existence of and transition between non-CHERI software and pure-capability CHERI software.
C.4.1. High-Level Overview of Compatibility
There are three operating modes on a RVY-enabled core:
- RVI/RVE mode (
misa.Y=0 orxenvcfg.Y=0) -
The base ISA is RVI or RVE. There is no access to extended YLEN registers. custom-1/2/3 major opcodes remain available for vendor extensions.
- RVY pure-capability mode (
misa.Y=1 andxenvcfg.Y=1, and pc.P-bit = 0) -
The base ISA is RVY, and custom-1/2/3 major opcodes are used for RVY instructions. All loads and stores use a YLEN base register for permissions and bounds checks.
- RVY in RVI compatibility mode (
misa.Y=1 andxenvcfg.Y=1, and pc.P-bit = 1) -
The base ISA is RVY, and custom-1/2/3 major opcodes are used for RVY instructions. However, all loads and stores use a XLEN base register and check ddc for permissions and bounds. This mode requires
Zyhybridsupport. Some implementations, like CHERIoT, will not support this mode.
C.4.2. Example Usage Models
- Purecap Kernel with 64-bit Plain RISC-V Programs
-
In this model, a CHERI-aware operating system (the kernel) executes in Capability Pointer Mode, benefiting from full memory safety for kernel operations. User applications may be standard 64-bit RISC-V programs executing in Integral Pointer Mode. The kernel can decide based on the ELF header whether to start the program with CHERI enabled and in pure-capability mode or completely disabled.
To set up this environment and handle transitions, the following sequence is typical:
-
Initialize ddc for User Space: The kernel creates a data capability with read and write permissions. Its bounds are restricted to the user program’s data segment. This capability is written to the ddc CSR.
-
Setup pc for User Space: The kernel creates a capability for the user program entry point. It sets the P-bit to Integral Pointer Mode so the processor starts in Integral Pointer Mode. This capability is written to sepc.
-
Enter User Mode: The kernel executes the
sretinstruction. This installs the capability from sepc into pc, switching the mode to Integral Pointer Mode. -
Return to Kernel Mode: When the user program makes a system call (via
ecall) or an error occurs, the hardware saves the current pc into sepc. It then loads the kernel’s exception vector capability from stvec into pc. Since stvec was set up with its P-bit set for pure-capability execution, this switches the execution mode back to Capability Pointer Mode.The kernel can disable CHERI for user mode by clearing the appropriate enable bits (e.g., bit in
senvcfg.Y). This ensures that the user application cannot execute any CHERI instructions. It also guarantees that the program has access to the custom-1/2/3 opcode space, which CHERI would otherwise use for its own instructions in Integral Pointer Mode.To allow mixing plain RISC-V and pure-capability RISC-V user applications, the kernel must either context-switch the state of senvcfg.Y, or run the plain RISC-V applications in RVI compatibility mode, in which case the custom opcode space reserved by RVY is not available to userspace.
-
- Plain RISC-V Program with a Purecap Library Sandbox
-
A large non-CHERI application (executing in Integral Pointer Mode) may wish to use a specific library that has been recompiled for CHERI (executing in Capability Pointer Mode) to process untrusted data (e.g., an image or video codec).
To set up this environment and handle transitions, the following sequence is typical:
-
Prepare Library Capabilities: A dynamic linker or runtime creates a capability for the library’s entry point with the P-bit set to Capability Pointer Mode. This capability only covers the library’s code and read-only data section.
-
Setup Sandbox Environment: Before running the library, the system sets ddc to NULL. This stops the library from accessing memory unless it uses specific capabilities given to it.
-
Invoke the Library: The main program (in Integral Pointer Mode) calls the library using JALR (RVY). This installs the capability into pc and switches the mode to Capability Pointer Mode. It also saves a return capability in the link register.
-
Return from the Library: When finished, the library returns by jumping to the return capability in the link register. This switches the mode back to Integral Pointer Mode.
-
- Pure-capability RISC-V Program Calling into a Non-CHERI Library
-
Conversely, a new pure-capability application may need to link against a non-CHERI binary-only library for which source code is unavailable.
To set up this environment and handle transitions, the following sequence is typical:
-
Prepare Non-CHERI Code Capability: The pure-capability program creates a capability for the non-CHERI library’s functions with the P-bit set to Integral Pointer Mode. This capability only covers the non-CHERI library’s code region.
-
Setup ddc for Non-CHERI Code: In pure-capability code, ddc is usually NULL. Before calling the non-CHERI library, the program must load a capability into ddc. This capability must cover all memory the non-CHERI library needs (heap, globals, and stack).
-
Invoke Non-CHERI Code: The pure-capability program calls the non-CHERI code using JALR (RVY). This switches the processor to Integral Pointer Mode and installs the restricted pc.
-
Restore State on Return: When the non-CHERI library returns (usually using a standard
JALRinstruction), the pure-capability program restores its state and sets ddc back to NULL.
-
- Hybrid Mode: RVI Code with Explicit Capabilities
-
For example, a Just-In-Time (JIT) compiler running in a pure-capability environment might generate code that uses standard integer addresses (or 32-bit compressed pointers) to avoid the overhead of larger capability pointers. While described here in the context of a JIT compiler and language runtime, this model is generalizable to other scenarios requiring efficient execution of code using smaller pointers within a larger pure-capability application.
This model sets up and switches modes just like the sandboxing models above. The main difference is that the generated code (running in Integral Pointer Mode) uses CHERI instructions to talk to the pure-capability environment:
-
Accessing C Runtime Data: The code can access data in the surrounding C++ runtime using explicit capability-based load/store operations. At the same time, it uses standard integer addresses for its own heap via ddc. This can be achieved by executing YMODESWY before the memory access and YMODESWI to return back to address interpretation.
-
Calling Runtime Helpers: Runtime helper functions are given to the code as sentry capabilities. When the code calls these helpers, the processor automatically switches back to Capability Pointer Mode. This lets the runtime run with full safety before returning to the JIT code.
-
C.4.3. CSRs and Registers Involved in Mode Transitions
When transitioning between modes, certain capability registers and CSRs must be configured to ensure correct execution and authorization:
- ddc (Default Data Capability)
-
This CSR must be written with a capability covering the data memory that the code in Integral Pointer Mode is authorized to access. Memory accesses in Integral Pointer Mode are implicitly authorized by ddc.
- Exception Return Capability Registers (
sepcormepc) -
When a privileged environment prepares to transition to a lower privilege mode via an exception return instruction, it must write the target code capability to
sepcormepc. This capability must have its P-bit set to the desired execution mode (Capability Pointer Mode or Integral Pointer Mode). The exception return instruction installs this capability into pc, thereby setting the mode. - Trap Vector Registers (stvec or mtvec)
-
These registers hold the capability for the exception vector. When an exception or interrupt occurs, the hardware installs this capability into pc, thereby setting the mode for the trap handler. For example, if stvec was set up with its P-bit set to 0, the processor will switch to Capability Pointer Mode on entry to the trap handler.
C.4.4. CHERI Enable Bits in Setup (when changing privilege levels)
In addition to setting up capabilities and mode bits, the execution environment must manage the CHERI enable bits provided by the privileged architecture:
- Per-Privilege Enable Bits
-
The privileged architecture defines enable bits (often denoted as
Y) in CSRs such asmisa,menvcfg, andsenvcfgto control CHERI availability in each privilege mode (see Chapter 9). - Reset State
-
On reset, CHERI is disabled to ensure complete backwards compatibility with standard RISC-V software. This behavior applies to cores that support execution in both Capability Pointer Mode and Integral Pointer Mode.
- Enabling CHERI
-
A higher privilege mode must set the appropriate enable bits to allow a lower privilege mode to use CHERI instructions or switch between Capability Pointer Mode and Integral Pointer Mode.
- Disabled CHERI with Bounds Enforcement
-
If CHERI is disabled for a specific privilege mode, that mode cannot execute CHERI instructions or change modes. However, the hardware continues to enforce the bounds defined by the last installed pc and ddc. This allows a kernel to run non-CHERI-aware code in a strict integer environment while still confining it within capability bounds.
C.4.5. Transition Instructions and Frequency
Transitions between modes are performed using specific instructions:
- YMODESWI and YMODESWY
-
These instructions are used to switch between modes without changing the control flow. They are typically used when entering or leaving a section of code that requires a different mode.
- JALR (RVY)
-
When jumping to a target capability with the P-bit set differently from the current mode, the jump performs a mode switch. This is commonly used for function calls between compartments or libraries in different modes.
The frequency of transitions depends on the model:
-
Kernel/User boundary: Transitions occur on every system call, exception, and interrupt, which is relatively infrequent compared to instruction execution.
-
Library calls: Transitions occur on every call to and return from the sandboxed library. If these calls are frequent, the overhead of mode switching (which may involve saving/restoring registers and clearing state) should be considered.
C.5. Placeholder references to privileged spec
| This chapter only exists for the standalone document to allow references to resolve. |
- Control and Status Registers (CSRs) overview
-
See Chapter Control and Status Registers (CSRs) in (RISC-V, 2023).
- Machine Status Registers (mstatus and mstatush)
- Base ISA Control in
mstatusRegister - Endianness Control in
mstatusandmstatushRegisters -
See
mtatusin Chapter Machine-Level ISA, Version 1.13 in (RISC-V, 2023).
- Machine Scratch Register (mscratch)
-
See
mscratchin Chapter Machine-Level ISA, Version 1.13 in (RISC-V, 2023).
- Machine Cause (
mcause) Register - Synchronous exception priority in decreasing priority order
- Machine cause (
mcause) register values after trap -
See
mcausein Chapter Machine-Level ISA, Version 1.13 in (RISC-V, 2023).
mcause) register.- Machine Trap-Vector Base-Address (
mtvec) Register -
See
mtvecin Chapter Machine-Level ISA, Version 1.13 in (RISC-V, 2023).
- Machine Exception Program Counter (mepc)
-
See
mepcin Chapter Machine-Level ISA, Version 1.13 in (RISC-V, 2023).
- Machine Trap Delegation Register (medeleg)
-
See
medelegin Chapter Machine-Level ISA, Version 1.13 in (RISC-V, 2023).
- Machine Trap Value Register (mtval)
-
See
mtvalin Chapter Machine-Level ISA, Version 1.13 in (RISC-V, 2023).
- Machine ISA (
misa) Register -
See
misain Chapter Machine-Level ISA, Version 1.13 in (RISC-V, 2023). RVY sets the Y bit to be 1, and I or E are set to show how many X registers are present.
If Zyhybrid is implemented, then Y is writable.
- Machine Environment Configuration (
menvcfg) Register -
See
menvcfgin Chapter Machine-Level ISA, Version 1.13 in (RISC-V, 2023). Zyhybrid adds a new Y bit.
- Trap-Return Instructions
-
See Trap-Return Instructions in Chapter Supervisor-Level ISA, Version 1.13 in (RISC-V, 2023).
- Supervisor Trap Vector Base Address (
stvec) Register -
See
stvecin Chapter Supervisor-Level ISA, Version 1.13 in (RISC-V, 2023).
stvec) register.- Supervisor Scratch (
sscratch) Register -
See
sscratchin Chapter Supervisor-Level ISA, Version 1.13 in (RISC-V, 2023).
- Supervisor Exception Program Counter (
sepc) Register -
See
sepcin Chapter Supervisor-Level ISA, Version 1.13 in (RISC-V, 2023).
- Supervisor Trap Value (
stval) Register -
See
stvalin Chapter Supervisor-Level ISA, Version 1.13 in (RISC-V, 2023).
- Supervisor Cause (
scause) Register - .Supervisor cause (
scause) register values after trap -
See
scausein Chapter Supervisor-Level ISA, Version 1.13 in (RISC-V, 2023).
scause) register.- Supervisor Environment Configuration (
senvcfg) Register -
See
senvcfgin Chapter Supervisor-Level ISA, Version 1.13 in (RISC-V, 2023). Zyhybrid adds a new Y bit.
- Supervisor Status (
sstatus) Register -
See
sstatusin Chapter Supervisor-Level ISA, Version 1.13 in (RISC-V, 2023).
- Page-Based 39-bit Virtual-Memory System (Sv39)
Bibliography
Efficient Tagged Memory. (2017). www.cl.cam.ac.uk/research/security/ctsrd/pdfs/201711-iccd2017-efficient-tags.pdf
Filardo, N. W., Gutstein, B. F., Woodruff, J., Clarke, J., Rugg, P., Davis, B., Johnston, M., Norton, R., Chisnall, D., Moore, S. W., Neumann, P. G., & Watson, R. N. M. (2024). Cornucopia Reloaded: Load Barriers for CHERI Heap Temporal Safety. doi.org/10.1145/3620665.3640416
RISC-V. (2023). RISC-V Unprivileged Specification. github.com/riscv/riscv-isa-manual/releases/download/riscv-isa-release-056b6ff-2023-10-02/unpriv-isa-asciidoc.pdf
RISC-V. (2023). RISC-V Privileged Specification. github.com/riscv/riscv-isa-manual/releases/download/riscv-isa-release-056b6ff-2023-10-02/priv-isa-asciidoc.pdf
Watson, R. N. M., Neumann, P. G., Woodruff, J., Roe, M., Almatary, H., Anderson, J., Baldwin, J., Barnes, G., Chisnall, D., Clarke, J., Davis, B., Eisen, L., Filardo, N. W., Fuchs, F. A., Grisenthwaite, R., Joannou, A., Laurie, B., Markettos, A. T., Moore, S. W., … Xia, H. (2023). Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 9) (UCAM-CL-TR-987; Issue UCAM-CL-TR-987). University of Cambridge, Computer Laboratory. doi.org/10.48456/tr-987
Woodruff, J., Joannou, A., Xia, H., Fox, A., Norton, R. M., Chisnall, D., Davis, B., Gudka, K., Filardo, N. W., Markettos, A. T., & others. (2019). Cheri Concentrate: Practical compressed capabilities. IEEE Transactions on Computers, 68(10), 1455–1469. doi.org/10.1109/TC.2019.2914037