kpreisser opened issue #5399:
Hi!
(Please note that I don't know much about Rust, so please correct me if I'm saying anything that doesn't make sense.)
As far as I understand panics in Rust, they indicate that an unrecoverable/serious error has occured, after which the process should be terminated (to not run into undefined behavior).
In bytecodealliance/wasmtime-dotnet#192, we found that on Windows, when a panic occurs in the Wasmtime C API, will raise an SEH Exception (e.g. with Win32's
RaiseException
or_CxxThrowException
from the MSVC runtime).However, because .NET appears to use the same mechanism to handle exceptions, such a panic will surface as
SEHException
in a .NET application on the managed-to-native transition, which can be caught by the user if they have e.g. ancatch (Exception)
orcatch (SEHException)
clause. This means that in such a case, the process will not actually terminate, but will can continue to run, which could be problematic because we may now have undefined behavior with possible security implications.This can even happen in
wasmtime-dotnet
itself: When a .NET exception occurs in a wasm callback,wasmtime-dotnet
will catch the exception (by using ancatch (Exception ex)
clause to catch all .NET exceptions), and transform it into awasm_trap_t*
, which is then returned at the native wasmtime callback. [^1]Now, imagine there is a host-to-wasm and a wasm-to-host transition on the stack, and you call a wasmtime function that panics, resulting in a
SEHException
on Windows on the managed-to-native transition. Even if the user code on top of the wasm-to-host transition doesn't have acatch (Exception)
orcatch (SEHException)
clause, theSEHException
will be caught byFunction
's callback handler and transformed into awasm_trap_t*
, which is then reported at the managed-to-native transition (likewasmtime_call_func
) aswasmtime_error_t*
, and that is thrown in .NET code as aWasmtimeException
.
So even if you just usecatch (WasmtimeException ...)
e.g. aroundFunction.Invoke()
(as it is expected that such an exception may be thrown here), it can happen that you catch a Rust panic that was actually intended to terminate the process.On Windows there is an alternative function
RaiseFailFastException
, which bypasses all exception handlers and ensures the process is terminated (I assume this is also e.g. what .NET internally does inEnvironment.FailFast()
).
From Rust PR rust-lang/rust#32900, it seems that there is another panic mode (abort
) which would have a similar effect to callingRaiseFailFastException
.Quoting @peterhuene from https://github.com/bytecodealliance/wasmtime-dotnet/pull/192#issuecomment-1341345790 (please see the conversation there for more background on this in
wasmtime-dotnet
):That said, I do think changing the panic mode for the C API to abort would make the most sense to address this issue. Would you mind opening an issue in the Wasmtime repo to explore doing so and reference this conversation?
Would it be possible to change the panic mode for the C API to
abort
, to ensure on Windows the process is terminated when a panic occurs?
(Note that e.g. on Linux, this is what already happens in .NET applications usingwasmtime-dotnet
, since the CLR cannot catch the panic there.)Thank you!
[^1]: This ensures we don't let any .NET exception bubble through the native-to-managed transition. If
wasmtime-dotnet
wouldn't catch an exception thrown in .NET code, on Windows, the .NET CLR would unwind the stack up to the next .NET exception handler even if there are managed-to-native and native-to-managed transitions on the stack, which seems to be incompatible with Wasmtime - see https://github.com/bytecodealliance/wasmtime-dotnet/pull/187 for an example.
kpreisser edited issue #5399:
Hi!
(Please note that I don't know much about Rust, so please correct me if I'm saying anything that doesn't make sense.)
As far as I understand panics in Rust, they indicate that an unrecoverable/serious error has occured, after which the process should be terminated (to not run into undefined behavior).
In bytecodealliance/wasmtime-dotnet#192, we found that on Windows, when a panic occurs in the Wasmtime C API, will raise an SEH Exception (e.g. with Win32's
RaiseException
or_CxxThrowException
from the MSVC runtime).However, because .NET appears to use the same mechanism to handle exceptions, such a panic will surface as
SEHException
in a .NET application on the managed-to-native transition, which can be caught by the user if they have e.g. ancatch (Exception)
orcatch (SEHException)
clause. This means that in such a case, the process will not actually terminate, but will can continue to run, which could be problematic because we may now have undefined behavior with possible security implications.This can even happen in
wasmtime-dotnet
itself: When a .NET exception occurs in a wasm callback,wasmtime-dotnet
will catch the exception (by using ancatch (Exception ex)
clause to catch all .NET exceptions), and transform it into awasm_trap_t*
, which is then returned at the native wasmtime callback. [^1]Now, imagine there is a host-to-wasm and a wasm-to-host transition on the stack, and you call a wasmtime function that panics, resulting in a
SEHException
on Windows on the managed-to-native transition. Even if the user code on top of the wasm-to-host transition doesn't have acatch (Exception)
orcatch (SEHException)
clause, theSEHException
will be caught byFunction
's callback handler and transformed into awasm_trap_t*
, which is then reported at the managed-to-native transition (likewasmtime_call_func
) aswasmtime_error_t*
, and that is thrown in .NET code as aWasmtimeException
.
So even if you just usecatch (WasmtimeException ...)
e.g. aroundFunction.Invoke()
(as it is expected that such an exception may be thrown here), it can happen that you catch a Rust panic that was actually intended to terminate the process.On Windows there is an alternative function
RaiseFailFastException
, which bypasses all exception handlers and ensures the process is terminated (I assume this is also e.g. what .NET internally does inEnvironment.FailFast()
).
From Rust PR rust-lang/rust#32900, it seems that there is another panic mode (abort
) which would have a similar effect to callingRaiseFailFastException
.Quoting @peterhuene from https://github.com/bytecodealliance/wasmtime-dotnet/pull/192#issuecomment-1341345790 (please see the conversation there for more background on this in
wasmtime-dotnet
):That said, I do think changing the panic mode for the C API to abort would make the most sense to address this issue. Would you mind opening an issue in the Wasmtime repo to explore doing so and reference this conversation?
Would it be possible to change the panic mode for the C API to
abort
, to ensure on Windows the process is terminated when a panic occurs?
(Note that e.g. on Linux, this is what already happens in .NET applications usingwasmtime-dotnet
, since the CLR cannot catch the panic there.)Thank you!
[^1]: This ensures we don't let any .NET exception bubble through the native-to-managed transition. If
wasmtime-dotnet
wouldn't catch an exception thrown in .NET code, on Windows, the .NET CLR would unwind the stack up to the next .NET exception handler even if there are managed-to-native and native-to-managed transitions on the stack, which seems to be incompatible with Wasmtime - see https://github.com/bytecodealliance/wasmtime-dotnet/pull/187 for an example.
kpreisser edited issue #5399:
Hi!
(Please note that I don't know much about Rust, so please correct me if I'm saying anything that doesn't make sense.)
As far as I understand panics in Rust, they indicate that an unrecoverable/serious error has occured, after which the process should be terminated (to not run into undefined behavior).
In bytecodealliance/wasmtime-dotnet#192, we found that on Windows, when a panic occurs in the Wasmtime C API, will raise an SEH Exception (e.g. with Win32's
RaiseException
or_CxxThrowException
from the MSVC runtime).However, because .NET appears to use the same mechanism to handle exceptions, such a panic will surface as
SEHException
in a .NET application on the managed-to-native transition, which can be caught by the user if they have e.g. ancatch (Exception)
orcatch (SEHException)
clause. This means that in such a case, the process will not actually terminate, but will can continue to run, which could be problematic because we may now have undefined behavior with possible security implications.This can even happen in
wasmtime-dotnet
itself: When a .NET exception occurs in a wasm callback,wasmtime-dotnet
will catch the exception (by using ancatch (Exception ex)
clause to catch all .NET exceptions), and transform it into awasm_trap_t*
, which is then returned at the native wasmtime callback. [^1]Now, imagine there is a host-to-wasm and a wasm-to-host transition on the stack, and you call a wasmtime function that panics, resulting in a
SEHException
on Windows on the managed-to-native transition. Even if the user code on top of the wasm-to-host transition doesn't have acatch (Exception)
orcatch (SEHException)
clause, theSEHException
will be caught byFunction
's callback handler and transformed into awasm_trap_t*
, which is then reported at the managed-to-native transition (likewasmtime_call_func
) aswasmtime_error_t*
, and that is thrown in .NET code as aWasmtimeException
.
So even if you just usecatch (WasmtimeException ...)
e.g. aroundFunction.Invoke()
(as it is expected that such an exception may be thrown here), it can happen that you catch a Rust panic that was actually intended to terminate the process.On Windows there is an alternative function
RaiseFailFastException
, which bypasses all exception handlers and ensures the process is terminated (I assume this is also e.g. what .NET internally does inEnvironment.FailFast()
).
From Rust PR rust-lang/rust#32900, it seems that there is another panic mode (abort
) which would have a similar effect to callingRaiseFailFastException
.Quoting @peterhuene from https://github.com/bytecodealliance/wasmtime-dotnet/pull/192#issuecomment-1341345790 (please see the conversation there for more background on this in
wasmtime-dotnet
):That said, I do think changing the panic mode for the C API to abort would make the most sense to address this issue. Would you mind opening an issue in the Wasmtime repo to explore doing so and reference this conversation?
Would it be possible to change the panic mode for the C API to
abort
, to ensure on Windows the process is terminated when a panic occurs?
(Note that e.g. on Linux, this is what already happens in .NET applications usingwasmtime-dotnet
, since the CLR cannot catch the panic there.)Thank you!
[^1]: This ensures we don't let any .NET exception bubble through the native-to-managed transition. If
wasmtime-dotnet
wouldn't catch an exception thrown in .NET code, on Windows, the .NET CLR would unwind the stack up to the next .NET exception handler (that catches this exception type) even if there are managed-to-native and native-to-managed transitions on the stack, which seems to be incompatible with Wasmtime - see https://github.com/bytecodealliance/wasmtime-dotnet/pull/187 for an example.
kpreisser edited issue #5399:
Hi!
(Please note that I don't know much about Rust, so please correct me if I'm saying anything that doesn't make sense.)
As far as I understand panics in Rust, they indicate that an unrecoverable/serious error has occured, after which the process should be terminated (to not run into undefined behavior).
In bytecodealliance/wasmtime-dotnet#192, we found that on Windows, when a panic occurs in the Wasmtime C API, will raise an SEH Exception (e.g. with Win32's
RaiseException
or_CxxThrowException
from the MSVC runtime).However, because .NET appears to use the same mechanism to handle exceptions, such a panic will surface as
SEHException
in a .NET application on the managed-to-native transition, which can be caught by the user if they have e.g. ancatch (Exception)
orcatch (SEHException)
clause. This means that in such a case, the process will not actually terminate, but will can continue to run, which could be problematic because we may now have undefined behavior with possible security implications.This can even happen in
wasmtime-dotnet
itself: When a .NET exception occurs in a wasm callback,wasmtime-dotnet
will catch the exception (by using ancatch (Exception ex)
clause to catch all .NET exceptions), and transform it into awasm_trap_t*
, which is then returned at the native wasmtime callback. [^1]Now, imagine there is a host-to-wasm and a wasm-to-host transition on the stack, and you call a wasmtime function that panics, resulting in a
SEHException
on Windows on the managed-to-native transition. Even if the user code on top of the wasm-to-host transition doesn't have acatch (Exception)
orcatch (SEHException)
clause, theSEHException
will be caught byFunction
's callback handler and transformed into awasm_trap_t*
, which is then reported at the managed-to-native transition (likewasmtime_call_func
) aswasmtime_error_t*
, and that is thrown in .NET code as aWasmtimeException
.
So even if you just usecatch (WasmtimeException ...)
e.g. aroundFunction.Invoke()
(as it is expected that such an exception may be thrown here), it can happen that you catch a Rust panic that was actually intended to terminate the process.On Windows there is an alternative function
RaiseFailFastException
, which bypasses all exception handlers and ensures the process is terminated (I assume this is also e.g. what .NET internally does inEnvironment.FailFast()
).
From Rust PR rust-lang/rust#32900, it seems that there is another panic mode (abort
) which would have a similar effect to callingRaiseFailFastException
.Quoting @peterhuene from https://github.com/bytecodealliance/wasmtime-dotnet/pull/192#issuecomment-1341345790 (please see the conversation there for more background on this in
wasmtime-dotnet
):That said, I do think changing the panic mode for the C API to abort would make the most sense to address this issue. Would you mind opening an issue in the Wasmtime repo to explore doing so and reference this conversation?
Would it be possible to change the panic mode for the C API to
abort
, to ensure on Windows the process is terminated when a panic occurs?
(Note that e.g. on Linux, this is what already happens in .NET applications usingwasmtime-dotnet
, since the CLR cannot catch the panic there.)Thank you!
[^1]: This ensures we don't let any .NET exception bubble through the native-to-managed transition. If
wasmtime-dotnet
wouldn't catch an exception thrown in .NET code, on Windows, the .NET CLR would unwind the stack up to the next .NET exception handler (that catches this exception type) even if there are managed-to-native and native-to-managed transitions on the stack, which seems to be incompatible with Wasmtime - see bytecodealliance/wasmtime-dotnet#187 for an example.
kpreisser edited issue #5399:
Hi!
(Please note that I don't know much about Rust, so please correct me if I'm saying anything that doesn't make sense.)
As far as I understand panics in Rust, they indicate that an unrecoverable/serious error has occured, after which the process should be terminated (to not run into undefined behavior).
In bytecodealliance/wasmtime-dotnet#192, we found that on Windows, when a panic occurs in the Wasmtime C API, will raise an SEH Exception (e.g. with Win32's
RaiseException
or_CxxThrowException
from the MSVC runtime).However, because .NET appears to use the same mechanism to handle exceptions, such a panic will surface as
SEHException
in a .NET application on the managed-to-native transition, which can be caught by the user if they have e.g. ancatch (Exception)
orcatch (SEHException)
clause. This means that in such a case, the process will not actually terminate, but will can continue to run, which could be problematic because we may now have undefined behavior with possible security implications.This can even happen in
wasmtime-dotnet
itself: When a .NET exception occurs in a wasm callback,wasmtime-dotnet
will catch the exception (by using ancatch (Exception ex)
clause to catch all .NET exceptions), and transform it into awasm_trap_t*
, which is then returned at the native wasmtime callback. [^1]Now, imagine there is a host-to-wasm and a wasm-to-host transition on the stack, and you call a wasmtime function that panics, resulting in a
SEHException
on Windows on the managed-to-native transition. Even if the user code on top of the wasm-to-host transition doesn't have acatch (Exception)
orcatch (SEHException)
clause, theSEHException
will be caught byFunction
's callback handler and transformed into awasm_trap_t*
, which is then reported at the managed-to-native transition (likewasmtime_call_func
) aswasmtime_error_t*
, and that is thrown in .NET code as aWasmtimeException
.
So even if you just usecatch (WasmtimeException ...)
e.g. aroundFunction.Invoke()
(as it is expected that such an exception may be thrown here), it can happen that you catch a Rust panic that was actually intended to terminate the process.On Windows there is an alternative function
RaiseFailFastException
, which bypasses all exception handlers and ensures the process is terminated (I assume this is also e.g. what .NET internally does inEnvironment.FailFast()
).
From Rust PR rust-lang/rust#32900, I understand that there is another panic mode (abort
) which would have a similar effect to callingRaiseFailFastException
.Quoting @peterhuene from https://github.com/bytecodealliance/wasmtime-dotnet/pull/192#issuecomment-1341345790 (please see the conversation there for more background on this in
wasmtime-dotnet
):That said, I do think changing the panic mode for the C API to abort would make the most sense to address this issue. Would you mind opening an issue in the Wasmtime repo to explore doing so and reference this conversation?
Would it be possible to change the panic mode for the C API to
abort
, to ensure on Windows the process is terminated when a panic occurs?
(Note that e.g. on Linux, this is what already happens in .NET applications usingwasmtime-dotnet
, since the CLR cannot catch the panic there.)Thank you!
[^1]: This ensures we don't let any .NET exception bubble through the native-to-managed transition. If
wasmtime-dotnet
wouldn't catch an exception thrown in .NET code, on Windows, the .NET CLR would unwind the stack up to the next .NET exception handler (that catches this exception type) even if there are managed-to-native and native-to-managed transitions on the stack, which seems to be incompatible with Wasmtime - see bytecodealliance/wasmtime-dotnet#187 for an example.
bjorn3 commented on issue #5399:
Using
panic=abort
for the C api is not enough. You also need to catch exceptions thrown from the .NET side as unwinding throughextern "C"
is UB. In the future unwinding out from anextern "C"
rust function will abort independent of the panic mode, but unwinding into rust from a function declared asextern "C"
is still UB.
kpreisser commented on issue #5399:
Hi @bjorn3, thanks for your reply!
You also need to catch exceptions thrown from the .NET side as unwinding through
extern "C"
is UB.If I understand you correctly, that should already be the case in
wasmtime-dotnet
, as it uses acatch (Exception ex)
clause at wasmtime callbacks (e.g. defined withwasmtime_func_new
orwasmtime_func_new_unchecked
), to ensure no unwinding can happen beyond the native-to-managed transition (see the referenced issue in the footnote for an example where this still happend previously but was fixed).Thanks!
kpreisser edited issue #5399:
Hi!
(Please note that I don't know much about Rust, so please correct me if I'm saying anything that doesn't make sense.)
As far as I understand panics in Rust, they indicate that an unrecoverable/serious error has occured, after which the process should be terminated (to not run into undefined behavior).
In bytecodealliance/wasmtime-dotnet#192, we found that on Windows, when a panic occurs in the Wasmtime C API, it will raise an SEH Exception (e.g. with Win32's
RaiseException
or_CxxThrowException
from the MSVC runtime).However, because .NET appears to use the same mechanism to handle exceptions, such a panic will surface as
SEHException
in a .NET application on the managed-to-native transition, which can be caught by the user if they have e.g. ancatch (Exception)
orcatch (SEHException)
clause. This means that in such a case, the process will not actually terminate, but will can continue to run, which could be problematic because we may now have undefined behavior with possible security implications.This can even happen in
wasmtime-dotnet
itself: When a .NET exception occurs in a wasm callback,wasmtime-dotnet
will catch the exception (by using ancatch (Exception ex)
clause to catch all .NET exceptions), and transform it into awasm_trap_t*
, which is then returned at the native wasmtime callback. [^1]Now, imagine there is a host-to-wasm and a wasm-to-host transition on the stack, and you call a wasmtime function that panics, resulting in a
SEHException
on Windows on the managed-to-native transition. Even if the user code on top of the wasm-to-host transition doesn't have acatch (Exception)
orcatch (SEHException)
clause, theSEHException
will be caught byFunction
's callback handler and transformed into awasm_trap_t*
, which is then reported at the managed-to-native transition (likewasmtime_call_func
) aswasmtime_error_t*
, and that is thrown in .NET code as aWasmtimeException
.
So even if you just usecatch (WasmtimeException ...)
e.g. aroundFunction.Invoke()
(as it is expected that such an exception may be thrown here), it can happen that you catch a Rust panic that was actually intended to terminate the process.On Windows there is an alternative function
RaiseFailFastException
, which bypasses all exception handlers and ensures the process is terminated (I assume this is also e.g. what .NET internally does inEnvironment.FailFast()
).
From Rust PR rust-lang/rust#32900, I understand that there is another panic mode (abort
) which would have a similar effect to callingRaiseFailFastException
.Quoting @peterhuene from https://github.com/bytecodealliance/wasmtime-dotnet/pull/192#issuecomment-1341345790 (please see the conversation there for more background on this in
wasmtime-dotnet
):That said, I do think changing the panic mode for the C API to abort would make the most sense to address this issue. Would you mind opening an issue in the Wasmtime repo to explore doing so and reference this conversation?
Would it be possible to change the panic mode for the C API to
abort
, to ensure on Windows the process is terminated when a panic occurs?
(Note that e.g. on Linux, this is what already happens in .NET applications usingwasmtime-dotnet
, since the CLR cannot catch the panic there.)Thank you!
[^1]: This ensures we don't let any .NET exception bubble through the native-to-managed transition. If
wasmtime-dotnet
wouldn't catch an exception thrown in .NET code, on Windows, the .NET CLR would unwind the stack up to the next .NET exception handler (that catches this exception type) even if there are managed-to-native and native-to-managed transitions on the stack, which seems to be incompatible with Wasmtime - see bytecodealliance/wasmtime-dotnet#187 for an example.
kpreisser edited a comment on issue #5399:
Hi @bjorn3, thanks for your reply!
You also need to catch exceptions thrown from the .NET side as unwinding through
extern "C"
is UB.If I understand you correctly, that should already be the case in
wasmtime-dotnet
, as it uses acatch (Exception ex)
clause at wasmtime callbacks (e.g. defined withwasmtime_func_new
orwasmtime_func_new_unchecked
), to ensure no unwinding can happen beyond the native-to-managed transition (see the referenced issue in the footnote for an example where this still happend previously but has been fixed).Thanks!
alexcrichton commented on issue #5399:
I agree that changing to
panic=abort
is the best solution here. This will get a bit tricky with CI since it will require a lot of new artifacts to be built (can't sharepanic=abort
andpanic=unwind
), but otherwise should be easy enough to configure at least.
kpreisser edited issue #5399:
Hi!
(Please note that I don't know much about Rust, so please correct me if I'm saying anything that doesn't make sense.)
As far as I understand panics in Rust, they indicate that an unrecoverable/serious error has occured, after which the process should be terminated (to not run into undefined behavior).
In bytecodealliance/wasmtime-dotnet#192, we found that on Windows, when a panic occurs in the Wasmtime C API, it will raise an SEH Exception (e.g. with Win32's
RaiseException
or_CxxThrowException
from the MSVC runtime).However, because .NET appears to use the same mechanism to handle exceptions, such a panic will surface as
SEHException
in a .NET application on the managed-to-native transition, which can be caught by the user if they have e.g. ancatch (Exception)
orcatch (SEHException)
clause. This means that in such a case, the process will not actually terminate, but will can continue to run, which could be problematic because we may now have undefined behavior with possible security implications.This can even happen in
wasmtime-dotnet
if user code actually doesn't intend to catchSEHException
: When a .NET exception occurs in a wasm callback,wasmtime-dotnet
will catch the exception (by using ancatch (Exception ex)
clause to catch all .NET exceptions), and transform it into awasm_trap_t*
, which is then returned at the native wasmtime callback. [^1]
Now, imagine there is a host-to-wasm and a wasm-to-host transition on the stack, and you call a wasmtime function that panics, resulting in aSEHException
on Windows on the managed-to-native transition. Even if the user code on top of the wasm-to-host transition doesn't have acatch (Exception)
orcatch (SEHException)
clause, theSEHException
will be caught byFunction
's callback handler and transformed into awasm_trap_t*
, which is then reported at the managed-to-native transition (likewasmtime_call_func
) aswasmtime_error_t*
, and that is thrown in .NET code as aWasmtimeException
.
So even if you just usecatch (WasmtimeException ...)
e.g. aroundFunction.Invoke()
(as it is expected that such an exception may be thrown here), it can happen that you catch a Rust panic that was actually intended to terminate the process.On Windows there is an alternative function
RaiseFailFastException
, which bypasses all exception handlers and ensures the process is terminated (I assume this is also e.g. what .NET internally does inEnvironment.FailFast()
).
From Rust PR rust-lang/rust#32900, I understand that there is another panic mode (abort
) which would have a similar effect to callingRaiseFailFastException
.Quoting @peterhuene from https://github.com/bytecodealliance/wasmtime-dotnet/pull/192#issuecomment-1341345790 (please see the conversation there for more background on this in
wasmtime-dotnet
):That said, I do think changing the panic mode for the C API to abort would make the most sense to address this issue. Would you mind opening an issue in the Wasmtime repo to explore doing so and reference this conversation?
Would it be possible to change the panic mode for the C API to
abort
, to ensure on Windows the process is terminated when a panic occurs?
(Note that e.g. on Linux, this is what already happens in .NET applications usingwasmtime-dotnet
, since the CLR cannot catch the panic there.)Thank you!
[^1]: This ensures we don't let any .NET exception bubble through the native-to-managed transition. If
wasmtime-dotnet
wouldn't catch an exception thrown in .NET code, on Windows, the .NET CLR would unwind the stack up to the next .NET exception handler (that catches this exception type) even if there are managed-to-native and native-to-managed transitions on the stack, which seems to be incompatible with Wasmtime - see bytecodealliance/wasmtime-dotnet#187 for an example.
kpreisser edited issue #5399:
Hi!
(Please note that I don't know much about Rust, so please correct me if I'm saying anything that doesn't make sense.)
As far as I understand panics in Rust, they indicate that an unrecoverable/serious error has occured, after which the process should be terminated (to not run into undefined behavior).
In bytecodealliance/wasmtime-dotnet#192, we found that on Windows, when a panic occurs in the Wasmtime C API, it will raise an SEH Exception (e.g. with Win32's
RaiseException
or_CxxThrowException
from the MSVC runtime).However, because .NET appears to use the same mechanism to handle exceptions, such a panic will surface as
SEHException
in a .NET application on the managed-to-native transition, which can be caught by the user if they have e.g. ancatch (Exception)
orcatch (SEHException)
clause. This means that in such a case, the process will not actually terminate, but will can continue to run, which could be problematic because we may now have undefined behavior with possible security implications.This can even happen in
wasmtime-dotnet
if user code actually doesn't intend to catchSEHException
:
When a .NET exception occurs in a wasm callback,wasmtime-dotnet
will catch the exception (by using ancatch (Exception ex)
clause to catch all .NET exceptions), and transform it into awasm_trap_t*
, which is then returned at the native wasmtime callback. [^1]
Now, imagine there is a host-to-wasm and a wasm-to-host transition on the stack, and you call a wasmtime function that panics, resulting in aSEHException
on Windows on the managed-to-native transition. Even if the user code on top of the wasm-to-host transition doesn't have acatch (Exception)
orcatch (SEHException)
clause, theSEHException
will be caught byFunction
's callback handler and transformed into awasm_trap_t*
, which is then reported at the managed-to-native transition (likewasmtime_call_func
) aswasmtime_error_t*
, and that is thrown in .NET code as aWasmtimeException
.
So even if you just usecatch (WasmtimeException ...)
e.g. aroundFunction.Invoke()
(as it is expected that such an exception may be thrown here), it can happen that you catch a Rust panic that was actually intended to terminate the process.On Windows there is an alternative function
RaiseFailFastException
, which bypasses all exception handlers and ensures the process is terminated (I assume this is also e.g. what .NET internally does inEnvironment.FailFast()
).
From Rust PR rust-lang/rust#32900, I understand that there is another panic mode (abort
) which would have a similar effect to callingRaiseFailFastException
.Quoting @peterhuene from https://github.com/bytecodealliance/wasmtime-dotnet/pull/192#issuecomment-1341345790 (please see the conversation there for more background on this in
wasmtime-dotnet
):That said, I do think changing the panic mode for the C API to abort would make the most sense to address this issue. Would you mind opening an issue in the Wasmtime repo to explore doing so and reference this conversation?
Would it be possible to change the panic mode for the C API to
abort
, to ensure on Windows the process is terminated when a panic occurs?
(Note that e.g. on Linux, this is what already happens in .NET applications usingwasmtime-dotnet
, since the CLR cannot catch the panic there.)Thank you!
[^1]: This ensures we don't let any .NET exception bubble through the native-to-managed transition. If
wasmtime-dotnet
wouldn't catch an exception thrown in .NET code, on Windows, the .NET CLR would unwind the stack up to the next .NET exception handler (that catches this exception type) even if there are managed-to-native and native-to-managed transitions on the stack, which seems to be incompatible with Wasmtime - see bytecodealliance/wasmtime-dotnet#187 for an example.
Muon commented on issue #5399:
As far as I understand panics in Rust, they indicate that an unrecoverable/serious error has occured, after which the process should be terminated (to not run into undefined behavior).
To my understanding, this is not the case. A panic is a sign that whatever you tried to do was incorrect, and that logical invariants may not be upheld any more. However,
catch_unwind()
is notunsafe
. Therefore, if you panic, it's your responsibility to ensure that UB cannot happen if the panic is caught and execution continues.
Muon edited a comment on issue #5399:
As far as I understand panics in Rust, they indicate that an unrecoverable/serious error has occured, after which the process should be terminated (to not run into undefined behavior).
To my understanding, this is not the case. A panic is a sign that whatever you tried to do was incorrect, and that logical invariants may not be upheld any more. However,
catch_unwind()
is notunsafe
. Therefore, if you panic in a safe function, it's your responsibility to ensure that UB cannot happen if the panic is caught and execution continues.
rockwotj commented on issue #5399:
I'm not sure if this is the right issue, but I'm using the C API and would like to handle panics. I'm seeing cases where there are panics if there is no memory left to allocate memory:
Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: thread '<unnamed>' panicked at 'unable to make memory executable: failed to make memory executable Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: Caused by: Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: Cannot allocate memory (os error 12)', crates/jit/src/code_memory.rs:254:18 Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: fatal runtime error: Rust panics must be rethrown Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: Aborting.
I'd like to handle that and not crash the process. Would patches be accepted to handle this specific case in
wasmtime_module_new
and return an error? https://github.com/bytecodealliance/wasmtime/blob/c4f261af155017eae09dc0b86a395090b0dfbf41/crates/c-api/src/module.rs#L32C26-L32C41
rockwotj edited a comment on issue #5399:
I'm not sure if this is the right issue, but I'm using the C API and would like to handle panics. I'm seeing cases where there are panics if there is no memory left to allocate memory:
Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: thread '<unnamed>' panicked at 'unable to make memory executable: failed to make memory executable Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: Caused by: Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: Cannot allocate memory (os error 12)', crates/jit/src/code_memory.rs:254:18 Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: fatal runtime error: Rust panics must be rethrown Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: Aborting.
I'd like to handle that and not crash the process. Would patches be accepted to handle this specific case in
wasmtime_module_new
and return an error?
rockwotj edited a comment on issue #5399:
I'm not sure if this is the right issue, but I'm using the C API and would like to handle panics. I'm seeing cases where there are panics if there is no memory left to allocate memory:
Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: thread '<unnamed>' panicked at 'unable to make memory executable: failed to make memory executable Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: Caused by: Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: Cannot allocate memory (os error 12)', crates/jit/src/code_memory.rs:254:18 Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: fatal runtime error: Rust panics must be rethrown Sep 14 14:49:23 rp-node-0-overly-top-warthog rpk[21379]: Aborting.
I'd like to handle that and not crash the process. Would patches be accepted to handle this specific case in
wasmtime_module_new
and return an error?
alexcrichton commented on issue #5399:
Ah for that case specifically the panic is this call to
.expect
and that's not something you should be catching in the C API but is instead an error which should be bubbled up. If you'd like sending a PR there to use?
to bubble up the error I believe would fix that issue (as it'd be returned through the error returned bywasm_module_new
)
Last updated: Nov 22 2024 at 17:03 UTC