Provided by: manpages_5.10-1ubuntu1_all bug

NAME

       pkeys - overview of Memory Protection Keys

DESCRIPTION

       Memory  Protection  Keys (pkeys) are an extension to existing page-based memory permissions.  Normal page
       permissions using page tables  require  expensive  system  calls  and  TLB  invalidations  when  changing
       permissions.   Memory  Protection  Keys  provide  a  mechanism for changing protections without requiring
       modification of the page tables on every permission change.

       To use pkeys, software must first "tag" a page in the page tables with a pkey.   After  this  tag  is  in
       place,  an  application only has to change the contents of a register in order to remove write access, or
       all access to a tagged page.

       Protection keys work in conjunction with the existing PROT_READ/ PROT_WRITE/ PROT_EXEC permissions passed
       to system calls such as mprotect(2) and mmap(2), but always act to  further  restrict  these  traditional
       permission mechanisms.

       If  a  process  performs  an  access  that violates pkey restrictions, it receives a SIGSEGV signal.  See
       sigaction(2) for details of the information available with that signal.

       To use the pkeys feature, the processor must support it, and the kernel  must  contain  support  for  the
       feature  on a given processor.  As of early 2016 only future Intel x86 processors are supported, and this
       hardware supports 16 protection keys in each process.  However, pkey 0 is used as the default key,  so  a
       maximum of 15 are available for actual application use.  The default key is assigned to any memory region
       for which a pkey has not been explicitly assigned via pkey_mprotect(2).

       Protection  keys have the potential to add a layer of security and reliability to applications.  But they
       have not been  primarily  designed  as  a  security  feature.   For  instance,  WRPKRU  is  a  completely
       unprivileged instruction, so pkeys are useless in any case that an attacker controls the PKRU register or
       can execute arbitrary instructions.

       Applications  should  be  very  careful to ensure that they do not "leak" protection keys.  For instance,
       before calling pkey_free(2), the application should be sure that no memory has that  pkey  assigned.   If
       the  application  left the freed pkey assigned, a future user of that pkey might inadvertently change the
       permissions of an unrelated data structure,  which  could  impact  security  or  stability.   The  kernel
       currently  allows  in-use  pkeys  to  have pkey_free(2) called on them because it would have processor or
       memory performance implications to perform the additional checks needed to disallow  it.   Implementation
       of the necessary checks is left up to applications.  Applications may implement these checks by searching
       the  /proc/[pid]/smaps  file  for memory regions with the pkey assigned.  Further details can be found in
       proc(5).

       Any application wanting to use protection keys needs to be able to function without them.  They might  be
       unavailable because the hardware that the application runs on does not support them, the kernel code does
       not  contain  support, the kernel support has been disabled, or because the keys have all been allocated,
       perhaps by a library the application is using.  It  is  recommended  that  applications  wanting  to  use
       protection  keys  should  simply  call  pkey_alloc(2)  and  test  whether  the  call succeeds, instead of
       attempting to detect support for the feature in any other way.

       Although unnecessary, hardware support for protection keys may be enumerated with the cpuid  instruction.
       Details of how to do this can be found in the Intel Software Developers Manual.  The kernel performs this
       enumeration  and  exposes  the information in /proc/cpuinfo under the "flags" field.  The string "pku" in
       this field indicates hardware support for protection keys and  the  string  "ospke"  indicates  that  the
       kernel contains and has enabled protection keys support.

       Applications  using  threads  and  protection  keys  should  be  especially careful.  Threads inherit the
       protection key rights of the parent at the time of the clone(2), system call.  Applications should either
       ensure that their own permissions are appropriate for child threads at the time when clone(2) is  called,
       or ensure that each child thread can perform its own initialization of protection key rights.

   Signal Handler Behavior
       Each  time a signal handler is invoked (including nested signals), the thread is temporarily given a new,
       default set of protection key rights that override the rights from the interrupted context.   This  means
       that applications must re-establish their desired protection key rights upon entering a signal handler if
       the desired rights differ from the defaults.  The rights of any interrupted context are restored when the
       signal handler returns.

       This  signal  behavior  is  unusual  and  is  due  to  the  fact that the x86 PKRU register (which stores
       protection key access rights) is managed with the same hardware mechanism (XSAVE) that manages  floating-
       point registers.  The signal behavior is the same as that of floating-point registers.

   Protection Keys system calls
       The Linux kernel implements the following pkey-related system calls: pkey_mprotect(2), pkey_alloc(2), and
       pkey_free(2).

       The  Linux  pkey  system  calls  are  available  only  if  the  kernel  was configured and built with the
       CONFIG_X86_INTEL_MEMORY_PROTECTION_KEYS option.

EXAMPLES

       The program below allocates a page of memory with read and write permissions.  It then writes  some  data
       to  the  memory and successfully reads it back.  After that, it attempts to allocate a protection key and
       disallows access to the page by using the WRPKRU instruction.  It then tries to access the page, which we
       now expect to cause a fatal signal to the application.

           $ ./a.out
           buffer contains: 73
           about to read buffer again...
           Segmentation fault (core dumped)

   Program source

       #define _GNU_SOURCE
       #include <unistd.h>
       #include <sys/syscall.h>
       #include <stdio.h>
       #include <sys/mman.h>

       static inline void
       wrpkru(unsigned int pkru)
       {
           unsigned int eax = pkru;
           unsigned int ecx = 0;
           unsigned int edx = 0;

           asm volatile(".byte 0x0f,0x01,0xef\n\t"
                        : : "a" (eax), "c" (ecx), "d" (edx));
       }

       int
       pkey_set(int pkey, unsigned long rights, unsigned long flags)
       {
           unsigned int pkru = (rights << (2 * pkey));
           return wrpkru(pkru);
       }

       int
       pkey_mprotect(void *ptr, size_t size, unsigned long orig_prot,
                     unsigned long pkey)
       {
           return syscall(SYS_pkey_mprotect, ptr, size, orig_prot, pkey);
       }

       int
       pkey_alloc(void)
       {
           return syscall(SYS_pkey_alloc, 0, 0);
       }

       int
       pkey_free(unsigned long pkey)
       {
           return syscall(SYS_pkey_free, pkey);
       }

       #define errExit(msg)    do { perror(msg); exit(EXIT_FAILURE); \
                                  } while (0)

       int
       main(void)
       {
           int status;
           int pkey;
           int *buffer;

           /*
            *Allocate one page of memory
            */
           buffer = mmap(NULL, getpagesize(), PROT_READ | PROT_WRITE,
                         MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
           if (buffer == MAP_FAILED)
               errExit("mmap");

           /*
            * Put some random data into the page (still OK to touch)
            */
           *buffer = __LINE__;
           printf("buffer contains: %d\n", *buffer);

           /*
            * Allocate a protection key:
            */
           pkey = pkey_alloc();
           if (pkey == -1)
               errExit("pkey_alloc");

           /*
            * Disable access to any memory with "pkey" set,
            * even though there is none right now
            */
           status = pkey_set(pkey, PKEY_DISABLE_ACCESS, 0);
           if (status)
               errExit("pkey_set");

           /*
            * Set the protection key on "buffer".
            * Note that it is still read/write as far as mprotect() is
            * concerned and the previous pkey_set() overrides it.
            */
           status = pkey_mprotect(buffer, getpagesize(),
                                  PROT_READ | PROT_WRITE, pkey);
           if (status == -1)
               errExit("pkey_mprotect");

           printf("about to read buffer again...\n");

           /*
            * This will crash, because we have disallowed access
            */
           printf("buffer contains: %d\n", *buffer);

           status = pkey_free(pkey);
           if (status == -1)
               errExit("pkey_free");

           exit(EXIT_SUCCESS);
       }

SEE ALSO

       pkey_alloc(2), pkey_free(2), pkey_mprotect(2), sigaction(2)

COLOPHON

       This page is part of release 5.10 of  the  Linux  man-pages  project.   A  description  of  the  project,
       information   about   reporting   bugs,   and   the  latest  version  of  this  page,  can  be  found  at
       https://www.kernel.org/doc/man-pages/.

Linux                                              2020-06-09                                           PKEYS(7)