File: mmap_56bit_test.c

package info (click to toggle)
llvm-toolchain-19 1%3A19.1.7-7
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 1,998,872 kB
  • sloc: cpp: 6,951,694; ansic: 1,486,157; asm: 913,598; python: 232,024; f90: 80,126; objc: 75,281; lisp: 37,276; pascal: 16,990; sh: 10,033; ml: 5,058; perl: 4,724; awk: 3,523; makefile: 3,177; javascript: 2,504; xml: 892; fortran: 664; cs: 573
file content (33 lines) | stat: -rw-r--r-- 1,158 bytes parent folder | download | duplicates (14)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
// RUN: %clang %s -pie -fPIE -o %t && %run %t
// REQUIRES: x86_64-target-arch

// FIXME: Fails Asan, as expected, with 5lvl page tables.
// UNSUPPORTED: x86_64-target-arch

#include <assert.h>
#include <stdio.h>
#include <sys/mman.h>

int main() {
    for (int j = 0; j < 1024; j++) {
        // Try 1TB offsets. This attempts to find memory addresses where the
        // shadow mappings - which assume a 47-bit address space - are invalid.
        unsigned long long target = (1ULL << 56) - (2 * 4096) - (j * (1ULL << 40));

        // Since we don't use MAP_FIXED, mmap might return an address that is
        // lower in the address space (due to sanitizer and/or kernel limits).
        // That is fine - if the app is also restricted from making high
        // allocations, then they are safe.
        char* ptr = (char*) mmap ((void*) target, 4096, PROT_READ | PROT_WRITE,
                                  MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
        printf ("Allocated at %p\n", ptr);

        assert (ptr != MAP_FAILED);
        for (int i = 0; i < 100; i++) {
            ptr [i] = 0;
        }
        munmap (ptr, 4096);
    }

    return 0;
}