File: mmap_56bit_test.c

package info (click to toggle)
llvm-toolchain-20 1%3A20.1.6-1~exp1
  • links: PTS, VCS
  • area: main
  • in suites: experimental
  • size: 2,111,304 kB
  • sloc: cpp: 7,438,677; ansic: 1,393,822; asm: 1,012,926; python: 241,650; f90: 86,635; objc: 75,479; lisp: 42,144; pascal: 17,286; sh: 10,027; ml: 5,082; perl: 4,730; awk: 3,523; makefile: 3,349; javascript: 2,251; xml: 892; fortran: 672
file content (33 lines) | stat: -rw-r--r-- 1,158 bytes parent folder | download | duplicates (12)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
// RUN: %clang %s -pie -fPIE -o %t && %run %t
// REQUIRES: x86_64-target-arch

// FIXME: Fails Asan, as expected, with 5lvl page tables.
// UNSUPPORTED: x86_64-target-arch

#include <assert.h>
#include <stdio.h>
#include <sys/mman.h>

int main() {
    for (int j = 0; j < 1024; j++) {
        // Try 1TB offsets. This attempts to find memory addresses where the
        // shadow mappings - which assume a 47-bit address space - are invalid.
        unsigned long long target = (1ULL << 56) - (2 * 4096) - (j * (1ULL << 40));

        // Since we don't use MAP_FIXED, mmap might return an address that is
        // lower in the address space (due to sanitizer and/or kernel limits).
        // That is fine - if the app is also restricted from making high
        // allocations, then they are safe.
        char* ptr = (char*) mmap ((void*) target, 4096, PROT_READ | PROT_WRITE,
                                  MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
        printf ("Allocated at %p\n", ptr);

        assert (ptr != MAP_FAILED);
        for (int i = 0; i < 100; i++) {
            ptr [i] = 0;
        }
        munmap (ptr, 4096);
    }

    return 0;
}