wasmtime_runtime/mpk/
enabled.rs

1//!
2
3use super::{pkru, sys};
4use anyhow::{Context, Result};
5use std::sync::OnceLock;
6
7/// Check if the MPK feature is supported.
8pub fn is_supported() -> bool {
9    cfg!(target_os = "linux") && cfg!(target_arch = "x86_64") && pkru::has_cpuid_bit_set()
10}
11
12/// Allocate up to `max` protection keys.
13///
14/// This asks the kernel for all available keys up to `max` in a thread-safe way
15/// (we can expect 1-15; 0 is kernel-reserved). This avoids interference when
16/// multiple threads try to allocate keys at the same time (e.g., during
17/// testing). It also ensures that a single copy of the keys is reserved for the
18/// lifetime of the process. Because of this, `max` is only a hint to
19/// allocation: it only is effective on the first invocation of this function.
20///
21/// TODO: this is not the best-possible design. This creates global state that
22/// would prevent any other code in the process from using protection keys; the
23/// `KEYS` are never deallocated from the system with `pkey_dealloc`.
24pub fn keys(max: usize) -> &'static [ProtectionKey] {
25    let keys = KEYS.get_or_init(|| {
26        let mut allocated = vec![];
27        if is_supported() {
28            while allocated.len() < max {
29                if let Ok(key_id) = sys::pkey_alloc(0, 0) {
30                    debug_assert!(key_id < 16);
31                    // UNSAFETY: here we unsafely assume that the
32                    // system-allocated pkey will exist forever.
33                    allocated.push(ProtectionKey {
34                        id: key_id,
35                        stripe: allocated.len().try_into().unwrap(),
36                    });
37                } else {
38                    break;
39                }
40            }
41        }
42        allocated
43    });
44    &keys[..keys.len().min(max)]
45}
46static KEYS: OnceLock<Vec<ProtectionKey>> = OnceLock::new();
47
48/// Only allow access to pages marked by the keys set in `mask`.
49///
50/// Any accesses to pages marked by another key will result in a `SIGSEGV`
51/// fault.
52pub fn allow(mask: ProtectionMask) {
53    let previous = if log::log_enabled!(log::Level::Trace) {
54        pkru::read()
55    } else {
56        0
57    };
58    pkru::write(mask.0);
59    log::trace!("PKRU change: {:#034b} => {:#034b}", previous, pkru::read());
60}
61
62/// Retrieve the current protection mask.
63pub fn current_mask() -> ProtectionMask {
64    ProtectionMask(pkru::read())
65}
66
67/// An MPK protection key.
68///
69/// The expected usage is:
70/// - receive system-allocated keys from [`keys`]
71/// - mark some regions of memory as accessible with [`ProtectionKey::protect`]
72/// - [`allow`] or disallow access to the memory regions using a
73///   [`ProtectionMask`]; any accesses to unmarked pages result in a fault
74/// - drop the key
75#[derive(Clone, Copy, Debug)]
76pub struct ProtectionKey {
77    id: u32,
78    stripe: u32,
79}
80
81impl ProtectionKey {
82    /// Mark a page as protected by this [`ProtectionKey`].
83    ///
84    /// This "colors" the pages of `region` via a kernel `pkey_mprotect` call to
85    /// only allow reads and writes when this [`ProtectionKey`] is activated
86    /// (see [`allow`]).
87    ///
88    /// # Errors
89    ///
90    /// This will fail if the region is not page aligned or for some unknown
91    /// kernel reason.
92    pub fn protect(&self, region: &mut [u8]) -> Result<()> {
93        let addr = region.as_mut_ptr() as usize;
94        let len = region.len();
95        let prot = sys::PROT_NONE;
96        sys::pkey_mprotect(addr, len, prot, self.id).with_context(|| {
97            format!(
98                "failed to mark region with pkey (addr = {addr:#x}, len = {len}, prot = {prot:#b})"
99            )
100        })
101    }
102
103    /// Convert the [`ProtectionKey`] to its 0-based index; this is useful for
104    /// determining which allocation "stripe" a key belongs to.
105    ///
106    /// This function assumes that the kernel has allocated key 0 for itself.
107    pub fn as_stripe(&self) -> usize {
108        self.stripe as usize
109    }
110}
111
112/// A bit field indicating which protection keys should be allowed and disabled.
113///
114/// The internal representation makes it easy to use [`ProtectionMask`] directly
115/// with the PKRU register. When bits `n` and `n+1` are set, it means the
116/// protection key is *not* allowed (see the PKRU write and access disabled
117/// bits).
118pub struct ProtectionMask(u32);
119impl ProtectionMask {
120    /// Allow access from all protection keys.
121    #[inline]
122    pub fn all() -> Self {
123        Self(pkru::ALLOW_ACCESS)
124    }
125
126    /// Only allow access to memory protected with protection key 0; note that
127    /// this does not mean "none" but rather allows access from the default
128    /// kernel protection key.
129    #[inline]
130    pub fn zero() -> Self {
131        Self(pkru::DISABLE_ACCESS ^ 0b11)
132    }
133
134    /// Include `pkey` as another allowed protection key in the mask.
135    #[inline]
136    pub fn or(self, pkey: ProtectionKey) -> Self {
137        let mask = pkru::DISABLE_ACCESS ^ 0b11 << (pkey.id * 2);
138        Self(self.0 & mask)
139    }
140}
141
142/// Helper macro for skipping tests on systems that do not have MPK enabled
143/// (e.g., older architecture, disabled by kernel, etc.)
144#[cfg(test)]
145macro_rules! skip_if_mpk_unavailable {
146    () => {
147        if !crate::mpk::is_supported() {
148            println!("> mpk is not supported: ignoring test");
149            return;
150        }
151    };
152}
153/// Necessary for inter-module access.
154#[cfg(test)]
155pub(crate) use skip_if_mpk_unavailable;
156
157#[cfg(test)]
158mod tests {
159    use super::*;
160
161    #[test]
162    fn check_is_supported() {
163        println!("is pku supported = {}", is_supported());
164        if std::env::var("WASMTIME_TEST_FORCE_MPK").is_ok() {
165            assert!(is_supported());
166        }
167    }
168
169    #[test]
170    fn check_initialized_keys() {
171        if is_supported() {
172            assert!(!keys(15).is_empty())
173        }
174    }
175
176    #[test]
177    fn check_invalid_mark() {
178        skip_if_mpk_unavailable!();
179        let pkey = keys(15)[0];
180        let unaligned_region = unsafe {
181            let addr = 1 as *mut u8; // this is not page-aligned!
182            let len = 1;
183            std::slice::from_raw_parts_mut(addr, len)
184        };
185        let result = pkey.protect(unaligned_region);
186        assert!(result.is_err());
187        assert_eq!(
188            result.unwrap_err().to_string(),
189            "failed to mark region with pkey (addr = 0x1, len = 1, prot = 0b0)"
190        );
191    }
192
193    #[test]
194    fn check_masking() {
195        skip_if_mpk_unavailable!();
196        let original = pkru::read();
197
198        allow(ProtectionMask::all());
199        assert_eq!(0, pkru::read());
200
201        allow(ProtectionMask::all().or(ProtectionKey { id: 5, stripe: 0 }));
202        assert_eq!(0, pkru::read());
203
204        allow(ProtectionMask::zero());
205        assert_eq!(0b11111111_11111111_11111111_11111100, pkru::read());
206
207        allow(ProtectionMask::zero().or(ProtectionKey { id: 5, stripe: 0 }));
208        assert_eq!(0b11111111_11111111_11110011_11111100, pkru::read());
209
210        // Reset the PKRU state to what we originally observed.
211        pkru::write(original);
212    }
213}