On Wed, Aug 29, 2018 at 11:40:41PM +0200, Jann Horn wrote: > > If we want to detect this kind of thing in tests, we should probably be > > relying on tools like ASan, which would cover all mmaps. > > > > It would be nice if there was a low-cost way to detect this in > > production use, but it looks like this replaces mmap with > > read_in_full(), which I think is a non-starter for most uses. > > I think even with ASAN, you'd still need read_in_full() or an mmap() > wrapper that fiddles with the ASAN shadow, because mmap() always maps > whole pages: > > $ cat mmap-read-asan-blah.c > #include <sys/mman.h> > #include <stdlib.h> > int main(void) { > volatile char *p = mmap(NULL, 1, PROT_READ|PROT_WRITE, > MAP_PRIVATE|MAP_ANONYMOUS, -1, 0); > p[200] = 1; > } > $ gcc -o mmap-read-asan-blah mmap-read-asan-blah.c -fsanitize=address > $ ./mmap-read-asan-blah > $ Yeah, I was just trying to run your tests with ASan and couldn't convince it to complain. I also tried MSan, but no luck. > But that aside, you do have a point about having some custom hack for > a single patch. I'm also not sure how portable it is. Looks like we have a Windows wrapper for getpagesize(), but I don't see any other uses of mprotect(). -Peff